From b69d6ca9f0d25d629eada82f77c67d0143666687 Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Tue, 18 Apr 2023 20:18:44 -0400 Subject: [PATCH 1/3] Regenerate with new method names --- openapi.json | 30663 ++++++++++++++++++++++++++++--------------------- 1 file changed, 17291 insertions(+), 13372 deletions(-) diff --git a/openapi.json b/openapi.json index de328145..1ae98cf7 100644 --- a/openapi.json +++ b/openapi.json @@ -3,30 +3,536 @@ "info": { "title": "HashiCorp Vault API", "description": "HTTP API that gives you full access to Vault. All API routes are prefixed with `/v1/`.", - "version": "1.13.0", + "version": "1.14.0", "license": { "name": "Mozilla Public License 2.0", "url": "https://www.mozilla.org/en-US/MPL/2.0" } }, "paths": { + "/auth/token/accessors/": { + "description": "List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'.", + "x-vault-sudo": true, + "get": { + "summary": "List token accessors, which can then be\nbe used to iterate and discover their properties\nor revoke them. Because this can be used to\ncause a denial of service, this endpoint\nrequires 'sudo' capability in addition to\n'list'.", + "operationId": "token-list-accessors", + "tags": [ + "auth" + ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/create": { + "description": "The token create path is used to create new tokens.", + "parameters": [ + { + "name": "format", + "description": "Return json formatted output", + "in": "query", + "schema": { + "type": "string" + } + } + ], + "post": { + "summary": "The token create path is used to create new tokens.", + "operationId": "token-create", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenCreateRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/create-orphan": { + "description": "The token create path is used to create new orphan tokens.", + "parameters": [ + { + "name": "format", + "description": "Return json formatted output", + "in": "query", + "schema": { + "type": "string" + } + } + ], + "post": { + "summary": "The token create path is used to create new orphan tokens.", + "operationId": "token-create-orphan", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenCreateOrphanRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/create/{role_name}": { + "description": "This token create path is used to create new tokens adhering to the given role.", + "parameters": [ + { + "name": "format", + "description": "Return json formatted output", + "in": "query", + "schema": { + "type": "string" + } + }, + { + "name": "role_name", + "description": "Name of the role", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + } + ], + "post": { + "summary": "This token create path is used to create new tokens adhering to the given role.", + "operationId": "token-create-against-role", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenCreateAgainstRoleRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/lookup": { + "description": "This endpoint will lookup a token and its properties.", + "get": { + "operationId": "token-look-up-self3", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "operationId": "token-look-up", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenLookUpRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/lookup-accessor": { + "description": "This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID.", + "post": { + "summary": "This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID.", + "operationId": "token-look-up-accessor", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenLookUpAccessorRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/lookup-self": { + "description": "This endpoint will lookup a token and its properties.", + "get": { + "operationId": "token-look-up-self", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "operationId": "token-look-up-self2", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenLookUpSelf2Request" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/renew": { + "description": "This endpoint will renew the given token and prevent expiration.", + "post": { + "summary": "This endpoint will renew the given token and prevent expiration.", + "operationId": "token-renew", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenRenewRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/renew-accessor": { + "description": "This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID.", + "post": { + "summary": "This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID.", + "operationId": "token-renew-accessor", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenRenewAccessorRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/renew-self": { + "description": "This endpoint will renew the token used to call it and prevent expiration.", + "post": { + "summary": "This endpoint will renew the token used to call it and prevent expiration.", + "operationId": "token-renew-self", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenRenewSelfRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/revoke": { + "description": "This endpoint will delete the given token and all of its child tokens.", + "post": { + "summary": "This endpoint will delete the given token and all of its child tokens.", + "operationId": "token-revoke", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenRevokeRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/revoke-accessor": { + "description": "This endpoint will delete the token associated with the accessor and all of its child tokens.", + "post": { + "summary": "This endpoint will delete the token associated with the accessor and all of its child tokens.", + "operationId": "token-revoke-accessor", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenRevokeAccessorRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/revoke-orphan": { + "description": "This endpoint will delete the token and orphan its child tokens.", + "post": { + "summary": "This endpoint will delete the token and orphan its child tokens.", + "operationId": "token-revoke-orphan", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenRevokeOrphanRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/revoke-self": { + "description": "This endpoint will delete the token used to call it and all of its child tokens.", + "post": { + "summary": "This endpoint will delete the token used to call it and all of its child tokens.", + "operationId": "token-revoke-self", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/roles": { + "description": "This endpoint lists configured roles.", + "get": { + "summary": "This endpoint lists configured roles.", + "operationId": "token-list-roles", + "tags": [ + "auth" + ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/token/roles/{role_name}": { + "parameters": [ + { + "name": "role_name", + "description": "Name of the role", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + } + ], + "x-vault-createSupported": true, + "get": { + "operationId": "token-read-role", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "operationId": "token-write-role", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TokenWriteRoleRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + }, + "delete": { + "operationId": "token-delete-role", + "tags": [ + "auth" + ], + "responses": { + "204": { + "description": "empty body" + } + } + } + }, + "/auth/token/tidy": { + "description": "This endpoint performs cleanup tasks that can be run if certain error conditions have occurred.", + "post": { + "summary": "This endpoint performs cleanup tasks that can be run if certain error\nconditions have occurred.", + "operationId": "token-tidy", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, "/auth/{alicloud_mount_path}/login": { "description": "Authenticates an RAM entity with Vault.", "parameters": [ { "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "alicloud" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { "summary": "Authenticates an RAM entity with Vault.", - "operationId": "AliCloudLogin", + "operationId": "ali-cloud-log-in", "tags": [ "auth" ], @@ -34,9 +540,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/AliCloudLoginRequest" - } + "schema": {} } } }, @@ -52,17 +556,18 @@ "parameters": [ { "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "alicloud" - } + }, + "required": true } ], "get": { "summary": "Lists all the roles that are registered with Vault.", - "operationId": "AliCloudListAuthRoles", + "operationId": "ali-cloud-list-auth-roles", "tags": [ "auth" ], @@ -91,20 +596,21 @@ "description": "Create a role and associate policies to it.", "parameters": [ { - "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "The name of the role as it should appear in Vault.", "in": "path", "schema": { - "type": "string", - "default": "alicloud" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "The name of the role as it should appear in Vault.", + "name": "alicloud_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "alicloud" }, "required": true } @@ -112,7 +618,7 @@ "x-vault-createSupported": true, "get": { "summary": "Create a role and associate policies to it.", - "operationId": "AliCloudReadAuthRole", + "operationId": "ali-cloud-read-auth-role", "tags": [ "auth" ], @@ -124,7 +630,7 @@ }, "post": { "summary": "Create a role and associate policies to it.", - "operationId": "AliCloudWriteAuthRole", + "operationId": "ali-cloud-write-auth-role", "tags": [ "auth" ], @@ -132,9 +638,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/AliCloudWriteAuthRoleRequest" - } + "schema": {} } } }, @@ -146,7 +650,7 @@ }, "delete": { "summary": "Create a role and associate policies to it.", - "operationId": "AliCloudDeleteAuthRole", + "operationId": "ali-cloud-delete-auth-role", "tags": [ "auth" ], @@ -162,17 +666,18 @@ "parameters": [ { "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "alicloud" - } + }, + "required": true } ], "get": { "summary": "Lists all the roles that are registered with Vault.", - "operationId": "AliCloudListAuthRoles2", + "operationId": "ali-cloud-list-auth-roles2", "tags": [ "auth" ], @@ -202,17 +707,18 @@ "parameters": [ { "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "approle" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { - "operationId": "AppRoleLogin", + "operationId": "app-role-log-in", "tags": [ "auth" ], @@ -221,7 +727,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleLoginRequest" + "$ref": "#/components/schemas/AppRoleLogInRequest" } } } @@ -238,16 +744,17 @@ "parameters": [ { "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "approle" - } + }, + "required": true } ], "get": { - "operationId": "AppRoleListRoles", + "operationId": "app-role-list-roles", "tags": [ "auth" ], @@ -283,27 +790,28 @@ "description": "Register an role with the backend.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AppRoleReadRole", + "operationId": "app-role-read-role", "tags": [ "auth" ], @@ -321,7 +829,7 @@ } }, "post": { - "operationId": "AppRoleWriteRole", + "operationId": "app-role-write-role", "tags": [ "auth" ], @@ -342,7 +850,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteRole", + "operationId": "app-role-delete-role", "tags": [ "auth" ], @@ -356,15 +864,6 @@ "/auth/{approle_mount_path}/role/{role_name}/bind-secret-id": { "description": "Impose secret_id to be presented during login using this role.", "parameters": [ - { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "approle" - } - }, { "name": "role_name", "description": "Name of the role. Must be less than 4096 bytes.", @@ -373,10 +872,20 @@ "type": "string" }, "required": true + }, + { + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "approle" + }, + "required": true } ], "get": { - "operationId": "AppRoleReadBindSecretID", + "operationId": "app-role-read-bind-secret-id", "tags": [ "auth" ], @@ -386,7 +895,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadBindSecretIDResponse" + "$ref": "#/components/schemas/AppRoleReadBindSecretIdResponse" } } } @@ -394,7 +903,7 @@ } }, "post": { - "operationId": "AppRoleWriteBindSecretID", + "operationId": "app-role-write-bind-secret-id", "tags": [ "auth" ], @@ -403,7 +912,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteBindSecretIDRequest" + "$ref": "#/components/schemas/AppRoleWriteBindSecretIdRequest" } } } @@ -415,7 +924,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteBindSecretID", + "operationId": "app-role-delete-bind-secret-id", "tags": [ "auth" ], @@ -430,26 +939,27 @@ "description": "Deprecated: Comma separated list of CIDR blocks, if set, specifies blocks of IP addresses which can perform the login operation", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadBoundCIDRList", + "operationId": "app-role-read-bound-cidr-list", "tags": [ "auth" ], @@ -459,7 +969,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadBoundCIDRListResponse" + "$ref": "#/components/schemas/AppRoleReadBoundCidrListResponse" } } } @@ -467,7 +977,7 @@ } }, "post": { - "operationId": "AppRoleWriteBoundCIDRList", + "operationId": "app-role-write-bound-cidr-list", "tags": [ "auth" ], @@ -476,7 +986,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteBoundCIDRListRequest" + "$ref": "#/components/schemas/AppRoleWriteBoundCidrListRequest" } } } @@ -488,7 +998,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteBoundCIDRList", + "operationId": "app-role-delete-bound-cidr-list", "tags": [ "auth" ], @@ -503,26 +1013,27 @@ "description": "Assign a SecretID of choice against the role.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "post": { - "operationId": "AppRoleWriteCustomSecretID", + "operationId": "app-role-write-custom-secret-id", "tags": [ "auth" ], @@ -531,7 +1042,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteCustomSecretIDRequest" + "$ref": "#/components/schemas/AppRoleWriteCustomSecretIdRequest" } } } @@ -542,7 +1053,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteCustomSecretIDResponse" + "$ref": "#/components/schemas/AppRoleWriteCustomSecretIdResponse" } } } @@ -554,26 +1065,27 @@ "description": "Enables cluster local secret IDs", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadLocalSecretIDs", + "operationId": "app-role-read-local-secret-ids", "tags": [ "auth" ], @@ -583,7 +1095,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadLocalSecretIDsResponse" + "$ref": "#/components/schemas/AppRoleReadLocalSecretIdsResponse" } } } @@ -595,26 +1107,27 @@ "description": "Updates the value of 'period' on the role", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadPeriod", + "operationId": "app-role-read-period", "tags": [ "auth" ], @@ -632,7 +1145,7 @@ } }, "post": { - "operationId": "AppRoleWritePeriod", + "operationId": "app-role-write-period", "tags": [ "auth" ], @@ -653,7 +1166,7 @@ } }, "delete": { - "operationId": "AppRoleDeletePeriod", + "operationId": "app-role-delete-period", "tags": [ "auth" ], @@ -668,26 +1181,27 @@ "description": "Policies of the role.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadPolicies", + "operationId": "app-role-read-policies", "tags": [ "auth" ], @@ -705,7 +1219,7 @@ } }, "post": { - "operationId": "AppRoleWritePolicies", + "operationId": "app-role-write-policies", "tags": [ "auth" ], @@ -726,7 +1240,7 @@ } }, "delete": { - "operationId": "AppRoleDeletePolicies", + "operationId": "app-role-delete-policies", "tags": [ "auth" ], @@ -741,26 +1255,27 @@ "description": "Returns the 'role_id' of the role.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadRoleID", + "operationId": "app-role-read-role-id", "tags": [ "auth" ], @@ -770,7 +1285,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadRoleIDResponse" + "$ref": "#/components/schemas/AppRoleReadRoleIdResponse" } } } @@ -778,7 +1293,7 @@ } }, "post": { - "operationId": "AppRoleWriteRoleID", + "operationId": "app-role-write-role-id", "tags": [ "auth" ], @@ -787,7 +1302,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteRoleIDRequest" + "$ref": "#/components/schemas/AppRoleWriteRoleIdRequest" } } } @@ -803,26 +1318,27 @@ "description": "Generate a SecretID against this role.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleListSecretID", + "operationId": "app-role-list-secret-ids", "tags": [ "auth" ], @@ -846,7 +1362,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleListSecretIDResponse" + "$ref": "#/components/schemas/AppRoleListSecretIdsResponse" } } } @@ -854,7 +1370,7 @@ } }, "post": { - "operationId": "AppRoleWriteSecretID", + "operationId": "app-role-write-secret-id", "tags": [ "auth" ], @@ -863,7 +1379,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDRequest" + "$ref": "#/components/schemas/AppRoleWriteSecretIdRequest" } } } @@ -874,7 +1390,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDResponse" + "$ref": "#/components/schemas/AppRoleWriteSecretIdResponse" } } } @@ -885,26 +1401,27 @@ "/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy": { "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "post": { - "operationId": "AppRoleWriteSecretIDAccessorDestroy", + "operationId": "app-role-destroy-secret-id-by-accessor", "tags": [ "auth" ], @@ -913,7 +1430,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDAccessorDestroyRequest" + "$ref": "#/components/schemas/AppRoleDestroySecretIdByAccessorRequest" } } } @@ -925,7 +1442,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteSecretIDAccessorDestroy", + "operationId": "app-role-destroy-secret-id-by-accessor2", "tags": [ "auth" ], @@ -939,26 +1456,27 @@ "/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/lookup": { "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "post": { - "operationId": "AppRoleWriteSecretIDAccessorLookup", + "operationId": "app-role-look-up-secret-id-by-accessor", "tags": [ "auth" ], @@ -967,7 +1485,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDAccessorLookupRequest" + "$ref": "#/components/schemas/AppRoleLookUpSecretIdByAccessorRequest" } } } @@ -978,7 +1496,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDAccessorLookupResponse" + "$ref": "#/components/schemas/AppRoleLookUpSecretIdByAccessorResponse" } } } @@ -990,26 +1508,27 @@ "description": "Comma separated list of CIDR blocks, if set, specifies blocks of IP addresses which can perform the login operation", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadSecretIDBoundCIDRs", + "operationId": "app-role-read-secret-id-bound-cidrs", "tags": [ "auth" ], @@ -1019,7 +1538,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadSecretIDBoundCIDRsResponse" + "$ref": "#/components/schemas/AppRoleReadSecretIdBoundCidrsResponse" } } } @@ -1027,7 +1546,7 @@ } }, "post": { - "operationId": "AppRoleWriteSecretIDBoundCIDRs", + "operationId": "app-role-write-secret-id-bound-cidrs", "tags": [ "auth" ], @@ -1036,7 +1555,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDBoundCIDRsRequest" + "$ref": "#/components/schemas/AppRoleWriteSecretIdBoundCidrsRequest" } } } @@ -1048,7 +1567,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteSecretIDBoundCIDRs", + "operationId": "app-role-delete-secret-id-bound-cidrs", "tags": [ "auth" ], @@ -1063,26 +1582,27 @@ "description": "Use limit of the SecretID generated against the role.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadSecretIDNumUses", + "operationId": "app-role-read-secret-id-num-uses", "tags": [ "auth" ], @@ -1092,7 +1612,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadSecretIDNumUsesResponse" + "$ref": "#/components/schemas/AppRoleReadSecretIdNumUsesResponse" } } } @@ -1100,7 +1620,7 @@ } }, "post": { - "operationId": "AppRoleWriteSecretIDNumUses", + "operationId": "app-role-write-secret-id-num-uses", "tags": [ "auth" ], @@ -1109,7 +1629,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDNumUsesRequest" + "$ref": "#/components/schemas/AppRoleWriteSecretIdNumUsesRequest" } } } @@ -1121,7 +1641,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteSecretIDNumUses", + "operationId": "app-role-delete-secret-id-num-uses", "tags": [ "auth" ], @@ -1136,26 +1656,27 @@ "description": "Duration in seconds of the SecretID generated against the role.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadSecretIDTTL", + "operationId": "app-role-read-secret-id-ttl", "tags": [ "auth" ], @@ -1165,7 +1686,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadSecretIDTTLResponse" + "$ref": "#/components/schemas/AppRoleReadSecretIdTtlResponse" } } } @@ -1173,7 +1694,7 @@ } }, "post": { - "operationId": "AppRoleWriteSecretIDTTL", + "operationId": "app-role-write-secret-id-ttl", "tags": [ "auth" ], @@ -1182,7 +1703,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDTTLRequest" + "$ref": "#/components/schemas/AppRoleWriteSecretIdTtlRequest" } } } @@ -1194,7 +1715,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteSecretIDTTL", + "operationId": "app-role-delete-secret-id-ttl", "tags": [ "auth" ], @@ -1209,26 +1730,27 @@ "description": "Invalidate an issued secret_id", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "post": { - "operationId": "AppRoleWriteSecretIDDestroy", + "operationId": "app-role-destroy-secret-id", "tags": [ "auth" ], @@ -1237,7 +1759,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDDestroyRequest" + "$ref": "#/components/schemas/AppRoleDestroySecretIdRequest" } } } @@ -1249,7 +1771,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteSecretIDDestroy", + "operationId": "app-role-destroy-secret-id2", "tags": [ "auth" ], @@ -1264,26 +1786,27 @@ "description": "Read the properties of an issued secret_id", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "post": { - "operationId": "AppRoleWriteSecretIDLookup", + "operationId": "app-role-look-up-secret-id", "tags": [ "auth" ], @@ -1292,7 +1815,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDLookupRequest" + "$ref": "#/components/schemas/AppRoleLookUpSecretIdRequest" } } } @@ -1303,7 +1826,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteSecretIDLookupResponse" + "$ref": "#/components/schemas/AppRoleLookUpSecretIdResponse" } } } @@ -1315,26 +1838,27 @@ "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadTokenBoundCIDRs", + "operationId": "app-role-read-token-bound-cidrs", "tags": [ "auth" ], @@ -1344,7 +1868,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadTokenBoundCIDRsResponse" + "$ref": "#/components/schemas/AppRoleReadTokenBoundCidrsResponse" } } } @@ -1352,7 +1876,7 @@ } }, "post": { - "operationId": "AppRoleWriteTokenBoundCIDRs", + "operationId": "app-role-write-token-bound-cidrs", "tags": [ "auth" ], @@ -1361,7 +1885,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteTokenBoundCIDRsRequest" + "$ref": "#/components/schemas/AppRoleWriteTokenBoundCidrsRequest" } } } @@ -1373,7 +1897,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteTokenBoundCIDRs", + "operationId": "app-role-delete-token-bound-cidrs", "tags": [ "auth" ], @@ -1388,26 +1912,27 @@ "description": "Duration in seconds, the maximum lifetime of the tokens issued by using the SecretIDs that were generated against this role, after which the tokens are not allowed to be renewed.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadTokenMaxTTL", + "operationId": "app-role-read-token-max-ttl", "tags": [ "auth" ], @@ -1417,7 +1942,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadTokenMaxTTLResponse" + "$ref": "#/components/schemas/AppRoleReadTokenMaxTtlResponse" } } } @@ -1425,7 +1950,7 @@ } }, "post": { - "operationId": "AppRoleWriteTokenMaxTTL", + "operationId": "app-role-write-token-max-ttl", "tags": [ "auth" ], @@ -1434,7 +1959,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteTokenMaxTTLRequest" + "$ref": "#/components/schemas/AppRoleWriteTokenMaxTtlRequest" } } } @@ -1446,7 +1971,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteTokenMaxTTL", + "operationId": "app-role-delete-token-max-ttl", "tags": [ "auth" ], @@ -1461,26 +1986,27 @@ "description": "Number of times issued tokens can be used", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadTokenNumUses", + "operationId": "app-role-read-token-num-uses", "tags": [ "auth" ], @@ -1498,7 +2024,7 @@ } }, "post": { - "operationId": "AppRoleWriteTokenNumUses", + "operationId": "app-role-write-token-num-uses", "tags": [ "auth" ], @@ -1519,7 +2045,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteTokenNumUses", + "operationId": "app-role-delete-token-num-uses", "tags": [ "auth" ], @@ -1534,26 +2060,27 @@ "description": "Duration in seconds, the lifetime of the token issued by using the SecretID that is generated against this role, before which the token needs to be renewed.", "parameters": [ { - "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_name", + "description": "Name of the role. Must be less than 4096 bytes.", "in": "path", "schema": { - "type": "string", - "default": "approle" - } + "type": "string" + }, + "required": true }, { - "name": "role_name", - "description": "Name of the role. Must be less than 4096 bytes.", + "name": "approle_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "approle" }, "required": true } ], "get": { - "operationId": "AppRoleReadTokenTTL", + "operationId": "app-role-read-token-ttl", "tags": [ "auth" ], @@ -1563,7 +2090,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleReadTokenTTLResponse" + "$ref": "#/components/schemas/AppRoleReadTokenTtlResponse" } } } @@ -1571,7 +2098,7 @@ } }, "post": { - "operationId": "AppRoleWriteTokenTTL", + "operationId": "app-role-write-token-ttl", "tags": [ "auth" ], @@ -1580,7 +2107,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleWriteTokenTTLRequest" + "$ref": "#/components/schemas/AppRoleWriteTokenTtlRequest" } } } @@ -1592,7 +2119,7 @@ } }, "delete": { - "operationId": "AppRoleDeleteTokenTTL", + "operationId": "app-role-delete-token-ttl", "tags": [ "auth" ], @@ -1608,23 +2135,23 @@ "parameters": [ { "name": "approle_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "approle" - } + }, + "required": true } ], "post": { - "summary": "Trigger the clean-up of expired SecretID entries.", - "operationId": "AppRoleTidySecretID", + "operationId": "app-role-tidy-secret-id", "tags": [ "auth" ], "responses": { - "200": { - "description": "OK" + "202": { + "description": "Accepted" } } } @@ -1633,27 +2160,28 @@ "description": "Adds the AWS Public Key that is used to verify the PKCS#7 signature of the identity document.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "cert_name", + "description": "Name of the certificate.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "cert_name", - "description": "Name of the certificate.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSConfigReadCertificate", + "operationId": "aws-read-certificate-configuration", "tags": [ "auth" ], @@ -1664,7 +2192,7 @@ } }, "post": { - "operationId": "AWSConfigWriteCertificate", + "operationId": "aws-configure-certificate", "tags": [ "auth" ], @@ -1673,7 +2201,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteCertificateRequest" + "$ref": "#/components/schemas/AwsConfigureCertificateRequest" } } } @@ -1685,7 +2213,7 @@ } }, "delete": { - "operationId": "AWSConfigDeleteCertificate", + "operationId": "aws-delete-certificate-configuration", "tags": [ "auth" ], @@ -1701,16 +2229,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSConfigListCertificates", + "operationId": "aws-list-certificate-configurations", "tags": [ "auth" ], @@ -1740,17 +2269,18 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSConfigReadClient", + "operationId": "aws-read-client-configuration", "tags": [ "auth" ], @@ -1761,7 +2291,7 @@ } }, "post": { - "operationId": "AWSConfigWriteClient", + "operationId": "aws-configure-client", "tags": [ "auth" ], @@ -1770,7 +2300,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteClientRequest" + "$ref": "#/components/schemas/AwsConfigureClientRequest" } } } @@ -1782,7 +2312,7 @@ } }, "delete": { - "operationId": "AWSConfigDeleteClient", + "operationId": "aws-delete-client-configuration", "tags": [ "auth" ], @@ -1798,16 +2328,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSConfigReadIdentity", + "operationId": "aws-read-identity-integration-configuration", "tags": [ "auth" ], @@ -1818,7 +2349,7 @@ } }, "post": { - "operationId": "AWSConfigWriteIdentity", + "operationId": "aws-configure-identity-integration", "tags": [ "auth" ], @@ -1827,7 +2358,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteIdentityRequest" + "$ref": "#/components/schemas/AwsConfigureIdentityIntegrationRequest" } } } @@ -1844,16 +2375,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "post": { - "operationId": "AWSConfigRotateRoot", + "operationId": "aws-rotate-auth-root-credentials", "tags": [ "auth" ], @@ -1869,16 +2401,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSConfigListSecurityTokenService", + "operationId": "aws-list-sts-role-relationships", "tags": [ "auth" ], @@ -1917,17 +2450,18 @@ }, { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSConfigReadSecurityTokenServiceAccount", + "operationId": "aws-read-sts-role", "tags": [ "auth" ], @@ -1938,7 +2472,7 @@ } }, "post": { - "operationId": "AWSConfigWriteSecurityTokenServiceAccount", + "operationId": "aws-write-sts-role", "tags": [ "auth" ], @@ -1947,7 +2481,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteSecurityTokenServiceAccountRequest" + "$ref": "#/components/schemas/AwsWriteStsRoleRequest" } } } @@ -1959,7 +2493,7 @@ } }, "delete": { - "operationId": "AWSConfigDeleteSecurityTokenServiceAccount", + "operationId": "aws-delete-sts-role", "tags": [ "auth" ], @@ -1975,17 +2509,18 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSConfigReadIdentityAccessList", + "operationId": "aws-read-identity-access-list-tidy-settings", "tags": [ "auth" ], @@ -1996,7 +2531,7 @@ } }, "post": { - "operationId": "AWSConfigWriteIdentityAccessList", + "operationId": "aws-configure-identity-access-list-tidy-operation", "tags": [ "auth" ], @@ -2005,7 +2540,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteIdentityAccessListRequest" + "$ref": "#/components/schemas/AwsConfigureIdentityAccessListTidyOperationRequest" } } } @@ -2017,7 +2552,7 @@ } }, "delete": { - "operationId": "AWSConfigDeleteIdentityAccessList", + "operationId": "aws-delete-identity-access-list-tidy-settings", "tags": [ "auth" ], @@ -2033,17 +2568,18 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSConfigReadIdentityWhiteList", + "operationId": "aws-read-identity-whitelist-tidy-settings", "tags": [ "auth" ], @@ -2054,7 +2590,7 @@ } }, "post": { - "operationId": "AWSConfigWriteIdentityWhiteList", + "operationId": "aws-configure-identity-whitelist-tidy-operation", "tags": [ "auth" ], @@ -2063,7 +2599,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteIdentityWhiteListRequest" + "$ref": "#/components/schemas/AwsConfigureIdentityWhitelistTidyOperationRequest" } } } @@ -2075,7 +2611,7 @@ } }, "delete": { - "operationId": "AWSConfigDeleteIdentityWhiteList", + "operationId": "aws-delete-identity-whitelist-tidy-settings", "tags": [ "auth" ], @@ -2091,17 +2627,18 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSConfigReadRoleTagBlackList", + "operationId": "aws-read-role-tag-blacklist-tidy-settings", "tags": [ "auth" ], @@ -2112,7 +2649,7 @@ } }, "post": { - "operationId": "AWSConfigWriteRoleTagBlackList", + "operationId": "aws-configure-role-tag-blacklist-tidy-operation", "tags": [ "auth" ], @@ -2121,7 +2658,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteRoleTagBlackListRequest" + "$ref": "#/components/schemas/AwsConfigureRoleTagBlacklistTidyOperationRequest" } } } @@ -2133,7 +2670,7 @@ } }, "delete": { - "operationId": "AWSConfigDeleteRoleTagBlackList", + "operationId": "aws-delete-role-tag-blacklist-tidy-settings", "tags": [ "auth" ], @@ -2149,17 +2686,18 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSConfigReadRoleTagDenyList", + "operationId": "aws-read-role-tag-deny-list-tidy-settings", "tags": [ "auth" ], @@ -2170,7 +2708,7 @@ } }, "post": { - "operationId": "AWSConfigWriteRoleTagDenyList", + "operationId": "aws-configure-role-tag-deny-list-tidy-operation", "tags": [ "auth" ], @@ -2179,7 +2717,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteRoleTagDenyListRequest" + "$ref": "#/components/schemas/AwsConfigureRoleTagDenyListTidyOperationRequest" } } } @@ -2191,7 +2729,7 @@ } }, "delete": { - "operationId": "AWSConfigDeleteRoleTagDenyList", + "operationId": "aws-delete-role-tag-deny-list-tidy-settings", "tags": [ "auth" ], @@ -2207,16 +2745,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSListIdentityAccessList", + "operationId": "aws-list-identity-access-list", "tags": [ "auth" ], @@ -2245,26 +2784,27 @@ "description": "Read or delete entries in the identity access list.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "instance_id", + "description": "EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "instance_id", - "description": "EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "get": { - "operationId": "AWSReadIdentityAccessListFor", + "operationId": "aws-read-identity-access-list", "tags": [ "auth" ], @@ -2275,7 +2815,7 @@ } }, "delete": { - "operationId": "AWSDeleteIdentityAccessListFor", + "operationId": "aws-delete-identity-access-list", "tags": [ "auth" ], @@ -2291,16 +2831,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSListIdentityWhiteList", + "operationId": "aws-list-identity-whitelist", "tags": [ "auth" ], @@ -2329,26 +2870,27 @@ "description": "Read or delete entries in the identity access list.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "instance_id", + "description": "EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "instance_id", - "description": "EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "get": { - "operationId": "AWSReadIdentityWhiteListFor", + "operationId": "aws-read-identity-whitelist", "tags": [ "auth" ], @@ -2359,7 +2901,7 @@ } }, "delete": { - "operationId": "AWSDeleteIdentityWhiteListFor", + "operationId": "aws-delete-identity-whitelist", "tags": [ "auth" ], @@ -2375,17 +2917,18 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { - "operationId": "AWSLogin", + "operationId": "aws-log-in", "tags": [ "auth" ], @@ -2394,7 +2937,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSLoginRequest" + "$ref": "#/components/schemas/AwsLogInRequest" } } } @@ -2411,16 +2954,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSListAuthRoles", + "operationId": "aws-list-auth-roles", "tags": [ "auth" ], @@ -2449,27 +2993,28 @@ "description": "Create a role and associate policies to it.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "Name of the role.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AWSReadAuthRole", + "operationId": "aws-read-auth-role", "tags": [ "auth" ], @@ -2480,7 +3025,7 @@ } }, "post": { - "operationId": "AWSWriteAuthRole", + "operationId": "aws-write-auth-role", "tags": [ "auth" ], @@ -2489,7 +3034,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSWriteAuthRoleRequest" + "$ref": "#/components/schemas/AwsWriteAuthRoleRequest" } } } @@ -2501,7 +3046,7 @@ } }, "delete": { - "operationId": "AWSDeleteAuthRole", + "operationId": "aws-delete-auth-role", "tags": [ "auth" ], @@ -2516,26 +3061,27 @@ "description": "Create a tag on a role in order to be able to further restrict the capabilities of a role.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "Name of the role.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "post": { - "operationId": "AWSWriteAuthRoleTag", + "operationId": "aws-write-role-tag", "tags": [ "auth" ], @@ -2544,7 +3090,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSWriteAuthRoleTagRequest" + "$ref": "#/components/schemas/AwsWriteRoleTagRequest" } } } @@ -2561,16 +3107,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSListAuthRoles2", + "operationId": "aws-list-roles2", "tags": [ "auth" ], @@ -2600,16 +3147,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSListRoleTagBlackList", + "operationId": "aws-list-role-tag-blacklists", "tags": [ "auth" ], @@ -2638,26 +3186,27 @@ "description": "Blacklist a previously created role tag.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_tag", + "description": "Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "role_tag", - "description": "Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "get": { - "operationId": "AWSReadRoleTagBlackListFor", + "operationId": "aws-read-role-tag-blacklist", "tags": [ "auth" ], @@ -2668,7 +3217,7 @@ } }, "post": { - "operationId": "AWSWriteRoleTagBlackListFor", + "operationId": "aws-write-role-tag-blacklist", "tags": [ "auth" ], @@ -2679,7 +3228,7 @@ } }, "delete": { - "operationId": "AWSDeleteRoleTagBlackListFor", + "operationId": "aws-delete-role-tag-blacklist", "tags": [ "auth" ], @@ -2695,16 +3244,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "get": { - "operationId": "AWSListRoleTagDenyList", + "operationId": "aws-list-role-tag-deny-lists", "tags": [ "auth" ], @@ -2733,26 +3283,27 @@ "description": "Blacklist a previously created role tag.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role_tag", + "description": "Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "role_tag", - "description": "Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "get": { - "operationId": "AWSReadRoleTagDenyListFor", + "operationId": "aws-read-role-tag-deny-list", "tags": [ "auth" ], @@ -2763,7 +3314,7 @@ } }, "post": { - "operationId": "AWSWriteRoleTagDenyListFor", + "operationId": "aws-write-role-tag-deny-list", "tags": [ "auth" ], @@ -2774,7 +3325,7 @@ } }, "delete": { - "operationId": "AWSDeleteRoleTagDenyListFor", + "operationId": "aws-delete-role-tag-deny-list", "tags": [ "auth" ], @@ -2790,16 +3341,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "post": { - "operationId": "AWSWriteIdentityAccessListTidySettings", + "operationId": "aws-tidy-identity-access-list", "tags": [ "auth" ], @@ -2808,7 +3360,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSWriteIdentityAccessListTidySettingsRequest" + "$ref": "#/components/schemas/AwsTidyIdentityAccessListRequest" } } } @@ -2825,16 +3377,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "post": { - "operationId": "AWSWriteIdentityWhiteListTidySettings", + "operationId": "aws-tidy-identity-whitelist", "tags": [ "auth" ], @@ -2843,7 +3396,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSWriteIdentityWhiteListTidySettingsRequest" + "$ref": "#/components/schemas/AwsTidyIdentityWhitelistRequest" } } } @@ -2860,16 +3413,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "post": { - "operationId": "AWSWriteRoleTagBlackListTidySettings", + "operationId": "aws-tidy-role-tag-blacklist", "tags": [ "auth" ], @@ -2878,7 +3432,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSWriteRoleTagBlackListTidySettingsRequest" + "$ref": "#/components/schemas/AwsTidyRoleTagBlacklistRequest" } } } @@ -2895,16 +3449,17 @@ "parameters": [ { "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "aws" - } + }, + "required": true } ], "post": { - "operationId": "AWSWriteRoleTagDenyListTidySettings", + "operationId": "aws-tidy-role-tag-deny-list", "tags": [ "auth" ], @@ -2913,7 +3468,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSWriteRoleTagDenyListTidySettingsRequest" + "$ref": "#/components/schemas/AwsTidyRoleTagDenyListRequest" } } } @@ -2930,17 +3485,18 @@ "parameters": [ { "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "azure" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AzureReadAuthConfig", + "operationId": "azure-read-auth-configuration", "tags": [ "auth" ], @@ -2951,7 +3507,7 @@ } }, "post": { - "operationId": "AzureWriteAuthConfig", + "operationId": "azure-configure-auth", "tags": [ "auth" ], @@ -2959,9 +3515,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/AzureWriteAuthConfigRequest" - } + "schema": {} } } }, @@ -2972,7 +3526,7 @@ } }, "delete": { - "operationId": "AzureDeleteAuthConfig", + "operationId": "azure-delete-auth-configuration", "tags": [ "auth" ], @@ -2988,17 +3542,18 @@ "parameters": [ { "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "azure" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { - "operationId": "AzureLogin", + "operationId": "azure-log-in", "tags": [ "auth" ], @@ -3006,9 +3561,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/AzureLoginRequest" - } + "schema": {} } } }, @@ -3024,16 +3577,17 @@ "parameters": [ { "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "azure" - } + }, + "required": true } ], "get": { - "operationId": "AzureListAuthRoles", + "operationId": "azure-list-auth-roles", "tags": [ "auth" ], @@ -3061,15 +3615,6 @@ "/auth/{azure_mount_path}/role/{name}": { "description": "Register an role with the backend.", "parameters": [ - { - "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "azure" - } - }, { "name": "name", "description": "Name of the role.", @@ -3078,70 +3623,21 @@ "type": "string" }, "required": true - } - ], - "x-vault-createSupported": true, - "get": { - "operationId": "AzureReadAuthRole", - "tags": [ - "auth" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "AzureWriteAuthRole", - "tags": [ - "auth" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/AzureWriteAuthRoleRequest" - } - } - } }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "AzureDeleteAuthRole", - "tags": [ - "auth" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/auth/{centrify_mount_path}/config": { - "description": "This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users.", - "parameters": [ { - "name": "centrify_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "azure_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "centrify" - } + "default": "azure" + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform\nfor authenticating users.", - "operationId": "CentrifyReadConfig", + "operationId": "azure-read-auth-role", "tags": [ "auth" ], @@ -3152,8 +3648,7 @@ } }, "post": { - "summary": "This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform\nfor authenticating users.", - "operationId": "CentrifyWriteConfig", + "operationId": "azure-write-auth-role", "tags": [ "auth" ], @@ -3161,9 +3656,90 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/CentrifyWriteConfigRequest" - } + "schema": {} + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + }, + "delete": { + "operationId": "azure-delete-auth-role", + "tags": [ + "auth" + ], + "responses": { + "204": { + "description": "empty body" + } + } + } + }, + "/auth/{azure_mount_path}/rotate-root": { + "description": "Attempt to rotate the root credentials used to communicate with Azure.", + "parameters": [ + { + "name": "azure_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "azure" + }, + "required": true + } + ], + "post": { + "operationId": "azure-rotate-root-credentials", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/auth/{centrify_mount_path}/config": { + "description": "This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users.", + "parameters": [ + { + "name": "centrify_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "centrify" + }, + "required": true + } + ], + "x-vault-createSupported": true, + "get": { + "operationId": "centrify-read-configuration", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "operationId": "centrify-configure", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} } } }, @@ -3179,18 +3755,19 @@ "parameters": [ { "name": "centrify_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "centrify" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "CentrifyLogin", + "operationId": "centrify-log-in", "tags": [ "auth" ], @@ -3198,9 +3775,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/CentrifyLoginRequest" - } + "schema": {} } } }, @@ -3216,12 +3791,13 @@ "parameters": [ { "name": "cert_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "cert" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -3230,7 +3806,7 @@ }, "get": { "summary": "Manage trusted certificates used for authentication.", - "operationId": "CertificatesList", + "operationId": "cert-list-certificates", "tags": [ "auth" ], @@ -3259,20 +3835,21 @@ "description": "Manage trusted certificates used for authentication.", "parameters": [ { - "name": "cert_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "The name of the certificate", "in": "path", "schema": { - "type": "string", - "default": "cert" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "The name of the certificate", + "name": "cert_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "cert" }, "required": true } @@ -3283,7 +3860,7 @@ }, "get": { "summary": "Manage trusted certificates used for authentication.", - "operationId": "CertificatesRead", + "operationId": "cert-read-certificate", "tags": [ "auth" ], @@ -3295,7 +3872,7 @@ }, "post": { "summary": "Manage trusted certificates used for authentication.", - "operationId": "CertificatesWrite", + "operationId": "cert-write-certificate", "tags": [ "auth" ], @@ -3304,7 +3881,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/CertificatesWriteRequest" + "$ref": "#/components/schemas/CertWriteCertificateRequest" } } } @@ -3317,7 +3894,7 @@ }, "delete": { "summary": "Manage trusted certificates used for authentication.", - "operationId": "CertificatesDelete", + "operationId": "cert-delete-certificate", "tags": [ "auth" ], @@ -3332,16 +3909,17 @@ "parameters": [ { "name": "cert_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "cert" - } + }, + "required": true } ], "get": { - "operationId": "CertificatesReadConfig", + "operationId": "cert-read-configuration", "tags": [ "auth" ], @@ -3352,7 +3930,7 @@ } }, "post": { - "operationId": "CertificatesWriteConfig", + "operationId": "cert-configure", "tags": [ "auth" ], @@ -3361,7 +3939,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/CertificatesWriteConfigRequest" + "$ref": "#/components/schemas/CertConfigureRequest" } } } @@ -3378,16 +3956,17 @@ "parameters": [ { "name": "cert_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "cert" - } + }, + "required": true } ], "get": { - "operationId": "CertificatesListCRLs", + "operationId": "cert-list-crls", "tags": [ "auth" ], @@ -3416,27 +3995,28 @@ "description": "Manage Certificate Revocation Lists checked during authentication.", "parameters": [ { - "name": "cert_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "The name of the certificate", "in": "path", "schema": { - "type": "string", - "default": "cert" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "The name of the certificate", + "name": "cert_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "cert" }, "required": true } ], "get": { "summary": "Manage Certificate Revocation Lists checked during authentication.", - "operationId": "CertificatesReadCRL", + "operationId": "cert-read-crl", "tags": [ "auth" ], @@ -3448,7 +4028,7 @@ }, "post": { "summary": "Manage Certificate Revocation Lists checked during authentication.", - "operationId": "CertificatesWriteCRL", + "operationId": "cert-write-crl", "tags": [ "auth" ], @@ -3457,7 +4037,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/CertificatesWriteCRLRequest" + "$ref": "#/components/schemas/CertWriteCrlRequest" } } } @@ -3470,7 +4050,7 @@ }, "delete": { "summary": "Manage Certificate Revocation Lists checked during authentication.", - "operationId": "CertificatesDeleteCRL", + "operationId": "cert-delete-crl", "tags": [ "auth" ], @@ -3485,17 +4065,18 @@ "parameters": [ { "name": "cert_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "cert" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { - "operationId": "CertificatesLogin", + "operationId": "cert-log-in", "tags": [ "auth" ], @@ -3504,7 +4085,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/CertificatesLoginRequest" + "$ref": "#/components/schemas/CertLogInRequest" } } } @@ -3521,17 +4102,17 @@ "parameters": [ { "name": "cf_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "cf" - } + }, + "required": true } ], - "x-vault-createSupported": true, "get": { - "operationId": "CloudFoundryReadConfig", + "operationId": "cloud-foundry-read-configuration", "tags": [ "auth" ], @@ -3542,7 +4123,7 @@ } }, "post": { - "operationId": "CloudFoundryWriteConfig", + "operationId": "cloud-foundry-configure", "tags": [ "auth" ], @@ -3550,9 +4131,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/CloudFoundryWriteConfigRequest" - } + "schema": {} } } }, @@ -3563,7 +4142,7 @@ } }, "delete": { - "operationId": "CloudFoundryDeleteConfig", + "operationId": "cloud-foundry-delete-configuration", "tags": [ "auth" ], @@ -3579,17 +4158,18 @@ "parameters": [ { "name": "cf_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "cf" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { - "operationId": "CloudFoundryLogin", + "operationId": "cloud-foundry-log-in", "tags": [ "auth" ], @@ -3597,9 +4177,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/CloudFoundryLoginRequest" - } + "schema": {} } } }, @@ -3615,16 +4193,17 @@ "parameters": [ { "name": "cf_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "cf" - } + }, + "required": true } ], "get": { - "operationId": "CloudFoundryListRoles", + "operationId": "cloud-foundry-list-roles", "tags": [ "auth" ], @@ -3653,27 +4232,28 @@ "description": "Read, write and reference policies and roles that tokens can be made for.", "parameters": [ { - "name": "cf_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "The name of the role.", "in": "path", "schema": { - "type": "string", - "default": "cf" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "The name of the role.", + "name": "cf_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "cf" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "CloudFoundryReadRole", + "operationId": "cloud-foundry-read-role", "tags": [ "auth" ], @@ -3684,7 +4264,7 @@ } }, "post": { - "operationId": "CloudFoundryWriteRole", + "operationId": "cloud-foundry-write-role", "tags": [ "auth" ], @@ -3692,9 +4272,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/CloudFoundryWriteRoleRequest" - } + "schema": {} } } }, @@ -3705,7 +4283,7 @@ } }, "delete": { - "operationId": "CloudFoundryDeleteRole", + "operationId": "cloud-foundry-delete-role", "tags": [ "auth" ], @@ -3721,17 +4299,17 @@ "parameters": [ { "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcp" - } + }, + "required": true } ], "get": { - "summary": "Configure credentials used to query the GCP IAM API to verify authenticating service accounts", - "operationId": "GoogleCloudReadAuthConfig", + "operationId": "google-cloud-read-auth-configuration", "tags": [ "auth" ], @@ -3742,8 +4320,7 @@ } }, "post": { - "summary": "Configure credentials used to query the GCP IAM API to verify authenticating service accounts", - "operationId": "GoogleCloudWriteAuthConfig", + "operationId": "google-cloud-configure-auth", "tags": [ "auth" ], @@ -3751,9 +4328,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteAuthConfigRequest" - } + "schema": {} } } }, @@ -3769,17 +4344,18 @@ "parameters": [ { "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcp" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { - "operationId": "GoogleCloudLogin", + "operationId": "google-cloud-log-in", "tags": [ "auth" ], @@ -3787,9 +4363,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudLoginRequest" - } + "schema": {} } } }, @@ -3805,17 +4379,18 @@ "parameters": [ { "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcp" - } + }, + "required": true } ], "get": { "summary": "Lists all the roles that are registered with Vault.", - "operationId": "GoogleCloudListRoles", + "operationId": "google-cloud-list-roles", "tags": [ "auth" ], @@ -3844,20 +4419,21 @@ "description": "Create a GCP role with associated policies and required attributes.", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } @@ -3865,7 +4441,7 @@ "x-vault-createSupported": true, "get": { "summary": "Create a GCP role with associated policies and required attributes.", - "operationId": "GoogleCloudReadRole", + "operationId": "google-cloud-read-role", "tags": [ "auth" ], @@ -3877,7 +4453,7 @@ }, "post": { "summary": "Create a GCP role with associated policies and required attributes.", - "operationId": "GoogleCloudWriteRole", + "operationId": "google-cloud-write-role", "tags": [ "auth" ], @@ -3885,9 +4461,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteRoleRequest" - } + "schema": {} } } }, @@ -3899,7 +4473,7 @@ }, "delete": { "summary": "Create a GCP role with associated policies and required attributes.", - "operationId": "GoogleCloudDeleteRole", + "operationId": "google-cloud-delete-role", "tags": [ "auth" ], @@ -3914,27 +4488,28 @@ "description": "Add or remove labels for an existing 'gce' role", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "post": { "summary": "Add or remove labels for an existing 'gce' role", - "operationId": "GoogleCloudWriteRoleLabels", + "operationId": "google-cloud-edit-labels-for-role", "tags": [ "auth" ], @@ -3942,9 +4517,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteRoleLabelsRequest" - } + "schema": {} } } }, @@ -3959,27 +4532,28 @@ "description": "Add or remove service accounts for an existing `iam` role", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "post": { "summary": "Add or remove service accounts for an existing `iam` role", - "operationId": "GoogleCloudWriteRoleServiceAccounts", + "operationId": "google-cloud-edit-service-accounts-for-role", "tags": [ "auth" ], @@ -3987,9 +4561,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteRoleServiceAccountsRequest" - } + "schema": {} } } }, @@ -4005,17 +4577,18 @@ "parameters": [ { "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcp" - } + }, + "required": true } ], "get": { "summary": "Lists all the roles that are registered with Vault.", - "operationId": "GoogleCloudListRoles2", + "operationId": "google-cloud-list-roles2", "tags": [ "auth" ], @@ -4044,16 +4617,17 @@ "parameters": [ { "name": "github_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "github" - } + }, + "required": true } ], "get": { - "operationId": "GitHubReadConfig", + "operationId": "github-read-configuration", "tags": [ "auth" ], @@ -4064,7 +4638,7 @@ } }, "post": { - "operationId": "GitHubWriteConfig", + "operationId": "github-configure", "tags": [ "auth" ], @@ -4073,7 +4647,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GitHubWriteConfigRequest" + "$ref": "#/components/schemas/GithubConfigureRequest" } } } @@ -4089,17 +4663,18 @@ "parameters": [ { "name": "github_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "github" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { - "operationId": "GitHubLogin", + "operationId": "github-log-in", "tags": [ "auth" ], @@ -4108,7 +4683,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GitHubLoginRequest" + "$ref": "#/components/schemas/GithubLogInRequest" } } } @@ -4125,17 +4700,18 @@ "parameters": [ { "name": "github_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "github" - } + }, + "required": true } ], "get": { "summary": "Read mappings for teams", - "operationId": "GitHubReadMapTeams", + "operationId": "github-read-teams", "tags": [ "auth" ], @@ -4160,20 +4736,21 @@ "description": "Read/write/delete a single teams mapping", "parameters": [ { - "name": "github_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Key for the teams mapping", "in": "path", "schema": { - "type": "string", - "default": "github" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Key for the teams mapping", + "name": "github_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "github" }, "required": true } @@ -4181,7 +4758,7 @@ "x-vault-createSupported": true, "get": { "summary": "Read/write/delete a single teams mapping", - "operationId": "GitHubReadMapTeam", + "operationId": "github-read-team-mapping", "tags": [ "auth" ], @@ -4193,7 +4770,7 @@ }, "post": { "summary": "Read/write/delete a single teams mapping", - "operationId": "GitHubWriteMapTeam", + "operationId": "github-write-team-mapping", "tags": [ "auth" ], @@ -4202,7 +4779,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GitHubWriteMapTeamRequest" + "$ref": "#/components/schemas/GithubWriteTeamMappingRequest" } } } @@ -4215,7 +4792,7 @@ }, "delete": { "summary": "Read/write/delete a single teams mapping", - "operationId": "GitHubDeleteMapTeam", + "operationId": "github-delete-team-mapping", "tags": [ "auth" ], @@ -4231,17 +4808,18 @@ "parameters": [ { "name": "github_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "github" - } + }, + "required": true } ], "get": { "summary": "Read mappings for users", - "operationId": "GitHubReadMapUsers", + "operationId": "github-read-users", "tags": [ "auth" ], @@ -4266,20 +4844,21 @@ "description": "Read/write/delete a single users mapping", "parameters": [ { - "name": "github_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Key for the users mapping", "in": "path", "schema": { - "type": "string", - "default": "github" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Key for the users mapping", + "name": "github_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "github" }, "required": true } @@ -4287,7 +4866,7 @@ "x-vault-createSupported": true, "get": { "summary": "Read/write/delete a single users mapping", - "operationId": "GitHubReadMapUser", + "operationId": "github-read-user-mapping", "tags": [ "auth" ], @@ -4299,7 +4878,7 @@ }, "post": { "summary": "Read/write/delete a single users mapping", - "operationId": "GitHubWriteMapUser", + "operationId": "github-write-user-mapping", "tags": [ "auth" ], @@ -4308,7 +4887,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GitHubWriteMapUserRequest" + "$ref": "#/components/schemas/GithubWriteUserMappingRequest" } } } @@ -4321,7 +4900,7 @@ }, "delete": { "summary": "Read/write/delete a single users mapping", - "operationId": "GitHubDeleteMapUser", + "operationId": "github-delete-user-mapping", "tags": [ "auth" ], @@ -4337,17 +4916,18 @@ "parameters": [ { "name": "jwt_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "jwt" - } + }, + "required": true } ], "get": { "summary": "Read the current JWT authentication backend configuration.", - "operationId": "JWTReadConfig", + "operationId": "jwt-read-configuration", "tags": [ "auth" ], @@ -4360,7 +4940,7 @@ "post": { "summary": "Configure the JWT authentication backend.", "description": "The JWT authentication backend validates JWTs (or OIDC) using the configured\ncredentials. If using OIDC Discovery, the URL must be provided, along\nwith (optionally) the CA cert to use for the connection. If performing JWT\nvalidation locally, a set of public keys must be provided.", - "operationId": "JWTWriteConfig", + "operationId": "jwt-configure", "tags": [ "auth" ], @@ -4368,9 +4948,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/JWTWriteConfigRequest" - } + "schema": {} } } }, @@ -4386,18 +4964,19 @@ "parameters": [ { "name": "jwt_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "jwt" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { "summary": "Authenticates to Vault using a JWT (or OIDC) token.", - "operationId": "JWTLogin", + "operationId": "jwt-log-in", "tags": [ "auth" ], @@ -4405,9 +4984,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/JWTLoginRequest" - } + "schema": {} } } }, @@ -4422,18 +4999,19 @@ "parameters": [ { "name": "jwt_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "jwt" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { "summary": "Request an authorization URL to start an OIDC login flow.", - "operationId": "JWTWriteOIDCAuthURL", + "operationId": "jwt-oidc-request-authorization-url", "tags": [ "auth" ], @@ -4441,9 +5019,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/JWTWriteOIDCAuthURLRequest" - } + "schema": {} } } }, @@ -4458,18 +5034,19 @@ "parameters": [ { "name": "jwt_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "jwt" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { "summary": "Callback endpoint to complete an OIDC login.", - "operationId": "JWTReadOIDCCallback", + "operationId": "jwt-oidc-callback", "tags": [ "auth" ], @@ -4481,7 +5058,7 @@ }, "post": { "summary": "Callback endpoint to handle form_posts.", - "operationId": "JWTWriteOIDCCallback", + "operationId": "jwt-oidc-callback-with-parameters", "tags": [ "auth" ], @@ -4489,9 +5066,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/JWTWriteOIDCCallbackRequest" - } + "schema": {} } } }, @@ -4507,18 +5082,19 @@ "parameters": [ { "name": "jwt_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "jwt" - } + }, + "required": true } ], "get": { "summary": "Lists all the roles registered with the backend.", "description": "The list will contain the names of the roles.", - "operationId": "JWTListRoles", + "operationId": "jwt-list-roles", "tags": [ "auth" ], @@ -4547,20 +5123,21 @@ "description": "Register an role with the backend.", "parameters": [ { - "name": "jwt_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "jwt" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "jwt_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "jwt" }, "required": true } @@ -4568,7 +5145,7 @@ "x-vault-createSupported": true, "get": { "summary": "Read an existing role.", - "operationId": "JWTReadRole", + "operationId": "jwt-read-role", "tags": [ "auth" ], @@ -4581,7 +5158,7 @@ "post": { "summary": "Register an role with the backend.", "description": "A role is required to authenticate with this backend. The role binds\n\t\tJWT token information with token policies and settings.\n\t\tThe bindings, token polices and token settings can all be configured\n\t\tusing this endpoint", - "operationId": "JWTWriteRole", + "operationId": "jwt-write-role", "tags": [ "auth" ], @@ -4589,9 +5166,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/JWTWriteRoleRequest" - } + "schema": {} } } }, @@ -4603,7 +5178,7 @@ }, "delete": { "summary": "Delete an existing role.", - "operationId": "JWTDeleteRole", + "operationId": "jwt-delete-role", "tags": [ "auth" ], @@ -4619,17 +5194,17 @@ "parameters": [ { "name": "kerberos_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "kerberos" - } + }, + "required": true } ], - "x-vault-createSupported": true, "get": { - "operationId": "KerberosReadConfig", + "operationId": "kerberos-read-configuration", "tags": [ "auth" ], @@ -4640,7 +5215,7 @@ } }, "post": { - "operationId": "KerberosWriteConfig", + "operationId": "kerberos-configure", "tags": [ "auth" ], @@ -4648,9 +5223,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/KerberosWriteConfigRequest" - } + "schema": {} } } }, @@ -4666,16 +5239,17 @@ "parameters": [ { "name": "kerberos_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "kerberos" - } + }, + "required": true } ], "get": { - "operationId": "KerberosReadLDAPConfig", + "operationId": "kerberos-read-ldap-configuration", "tags": [ "auth" ], @@ -4686,7 +5260,7 @@ } }, "post": { - "operationId": "KerberosWriteLDAPConfig", + "operationId": "kerberos-configure-ldap", "tags": [ "auth" ], @@ -4694,9 +5268,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/KerberosWriteLDAPConfigRequest" - } + "schema": {} } } }, @@ -4712,16 +5284,17 @@ "parameters": [ { "name": "kerberos_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "kerberos" - } + }, + "required": true } ], "get": { - "operationId": "KerberosListGroups", + "operationId": "kerberos-list-groups", "tags": [ "auth" ], @@ -4750,26 +5323,27 @@ "description": "Manage users allowed to authenticate.", "parameters": [ { - "name": "kerberos_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the LDAP group.", "in": "path", "schema": { - "type": "string", - "default": "kerberos" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the LDAP group.", + "name": "kerberos_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kerberos" }, "required": true } ], "get": { - "operationId": "KerberosReadGroup", + "operationId": "kerberos-read-group", "tags": [ "auth" ], @@ -4780,7 +5354,7 @@ } }, "post": { - "operationId": "KerberosWriteGroup", + "operationId": "kerberos-write-group", "tags": [ "auth" ], @@ -4788,9 +5362,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/KerberosWriteGroupRequest" - } + "schema": {} } } }, @@ -4801,7 +5373,7 @@ } }, "delete": { - "operationId": "KerberosDeleteGroup", + "operationId": "kerberos-delete-group", "tags": [ "auth" ], @@ -4816,17 +5388,29 @@ "parameters": [ { "name": "kerberos_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "kerberos" - } + }, + "required": true } ], "x-vault-unauthenticated": true, + "get": { + "operationId": "kerberos-log-in2", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, "post": { - "operationId": "KerberosLogin", + "operationId": "kerberos-log-in", "tags": [ "auth" ], @@ -4834,9 +5418,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/KerberosLoginRequest" - } + "schema": {} } } }, @@ -4852,18 +5434,17 @@ "parameters": [ { "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "kubernetes" - } + }, + "required": true } ], - "x-vault-createSupported": true, "get": { - "summary": "Configures the JWT Public Key and Kubernetes API information.", - "operationId": "KubernetesReadAuthConfig", + "operationId": "kubernetes-read-auth-configuration", "tags": [ "auth" ], @@ -4874,8 +5455,7 @@ } }, "post": { - "summary": "Configures the JWT Public Key and Kubernetes API information.", - "operationId": "KubernetesWriteAuthConfig", + "operationId": "kubernetes-configure-auth", "tags": [ "auth" ], @@ -4883,9 +5463,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/KubernetesWriteAuthConfigRequest" - } + "schema": {} } } }, @@ -4901,18 +5479,19 @@ "parameters": [ { "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "kubernetes" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { "summary": "Authenticates Kubernetes service accounts with Vault.", - "operationId": "KubernetesLogin", + "operationId": "kubernetes-log-in", "tags": [ "auth" ], @@ -4920,9 +5499,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/KubernetesLoginRequest" - } + "schema": {} } } }, @@ -4938,12 +5515,13 @@ "parameters": [ { "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "kubernetes" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -4952,7 +5530,7 @@ }, "get": { "summary": "Lists all the roles registered with the backend.", - "operationId": "KubernetesListAuthRoles", + "operationId": "kubernetes-list-auth-roles", "tags": [ "auth" ], @@ -4981,20 +5559,21 @@ "description": "Register an role with the backend.", "parameters": [ { - "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "kubernetes" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "kubernetes_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kubernetes" }, "required": true } @@ -5006,7 +5585,7 @@ }, "get": { "summary": "Register an role with the backend.", - "operationId": "KubernetesReadAuthRole", + "operationId": "kubernetes-read-auth-role", "tags": [ "auth" ], @@ -5018,7 +5597,7 @@ }, "post": { "summary": "Register an role with the backend.", - "operationId": "KubernetesWriteAuthRole", + "operationId": "kubernetes-write-auth-role", "tags": [ "auth" ], @@ -5026,9 +5605,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/KubernetesWriteAuthRoleRequest" - } + "schema": {} } } }, @@ -5040,7 +5617,7 @@ }, "delete": { "summary": "Register an role with the backend.", - "operationId": "KubernetesDeleteAuthRole", + "operationId": "kubernetes-delete-auth-role", "tags": [ "auth" ], @@ -5056,20 +5633,20 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], "x-vault-displayAttrs": { "action": "Configure" }, "get": { - "summary": "Configure the LDAP server to connect to, along with its options.", - "operationId": "LDAPReadAuthConfig", + "operationId": "ldap-read-auth-configuration", "tags": [ "auth" ], @@ -5080,8 +5657,7 @@ } }, "post": { - "summary": "Configure the LDAP server to connect to, along with its options.", - "operationId": "LDAPWriteAuthConfig", + "operationId": "ldap-configure-auth", "tags": [ "auth" ], @@ -5090,7 +5666,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/LDAPWriteAuthConfigRequest" + "$ref": "#/components/schemas/LdapConfigureAuthRequest" } } } @@ -5107,12 +5683,13 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -5121,7 +5698,7 @@ }, "get": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "LDAPListGroups", + "operationId": "ldap-list-groups", "tags": [ "auth" ], @@ -5150,20 +5727,21 @@ "description": "Manage additional groups for users allowed to authenticate.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the LDAP group.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the LDAP group.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } @@ -5174,7 +5752,7 @@ }, "get": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "LDAPReadGroup", + "operationId": "ldap-read-group", "tags": [ "auth" ], @@ -5186,7 +5764,7 @@ }, "post": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "LDAPWriteGroup", + "operationId": "ldap-write-group", "tags": [ "auth" ], @@ -5195,7 +5773,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/LDAPWriteGroupRequest" + "$ref": "#/components/schemas/LdapWriteGroupRequest" } } } @@ -5208,7 +5786,7 @@ }, "delete": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "LDAPDeleteGroup", + "operationId": "ldap-delete-group", "tags": [ "auth" ], @@ -5223,20 +5801,21 @@ "description": "Log in with a username and password.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "username", + "description": "DN (distinguished name) to be used for login.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "username", - "description": "DN (distinguished name) to be used for login.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } @@ -5244,7 +5823,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "LDAPLogin", + "operationId": "ldap-log-in", "tags": [ "auth" ], @@ -5253,7 +5832,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/LDAPLoginRequest" + "$ref": "#/components/schemas/LdapLogInRequest" } } } @@ -5270,12 +5849,13 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -5284,7 +5864,7 @@ }, "get": { "summary": "Manage users allowed to authenticate.", - "operationId": "LDAPListUsers", + "operationId": "ldap-list-users", "tags": [ "auth" ], @@ -5313,20 +5893,21 @@ "description": "Manage users allowed to authenticate.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the LDAP user.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the LDAP user.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } @@ -5337,7 +5918,7 @@ }, "get": { "summary": "Manage users allowed to authenticate.", - "operationId": "LDAPReadUser", + "operationId": "ldap-read-user", "tags": [ "auth" ], @@ -5349,7 +5930,7 @@ }, "post": { "summary": "Manage users allowed to authenticate.", - "operationId": "LDAPWriteUser", + "operationId": "ldap-write-user", "tags": [ "auth" ], @@ -5358,7 +5939,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/LDAPWriteUserRequest" + "$ref": "#/components/schemas/LdapWriteUserRequest" } } } @@ -5371,7 +5952,7 @@ }, "delete": { "summary": "Manage users allowed to authenticate.", - "operationId": "LDAPDeleteUser", + "operationId": "ldap-delete-user", "tags": [ "auth" ], @@ -5387,18 +5968,18 @@ "parameters": [ { "name": "oci_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "oci" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Manages the configuration for the Vault Auth Plugin.", - "operationId": "OCIReadConfig", + "operationId": "oci-read-configuration", "tags": [ "auth" ], @@ -5409,8 +5990,7 @@ } }, "post": { - "summary": "Manages the configuration for the Vault Auth Plugin.", - "operationId": "OCIWriteConfig", + "operationId": "oci-configure", "tags": [ "auth" ], @@ -5418,9 +5998,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/OCIWriteConfigRequest" - } + "schema": {} } } }, @@ -5431,8 +6009,7 @@ } }, "delete": { - "summary": "Manages the configuration for the Vault Auth Plugin.", - "operationId": "OCIDeleteConfig", + "operationId": "oci-delete-configuration", "tags": [ "auth" ], @@ -5448,12 +6025,13 @@ "parameters": [ { "name": "oci_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "oci" - } + }, + "required": true } ] }, @@ -5461,20 +6039,21 @@ "description": "Authenticates to Vault using OCI credentials", "parameters": [ { - "name": "oci_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "oci" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "Name of the role.", + "name": "oci_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "oci" }, "required": true } @@ -5482,7 +6061,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Authenticates to Vault using OCI credentials", - "operationId": "OCILoginWithRole", + "operationId": "oci-log-in", "tags": [ "auth" ], @@ -5490,9 +6069,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/OCILoginWithRoleRequest" - } + "schema": {} } } }, @@ -5508,17 +6085,18 @@ "parameters": [ { "name": "oci_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "oci" - } + }, + "required": true } ], "get": { "summary": "Lists all the roles that are registered with Vault.", - "operationId": "OCIListRoles", + "operationId": "oci-list-roles", "tags": [ "auth" ], @@ -5547,20 +6125,21 @@ "description": "Create a role and associate policies to it.", "parameters": [ { - "name": "oci_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "oci" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "Name of the role.", + "name": "oci_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "oci" }, "required": true } @@ -5568,7 +6147,7 @@ "x-vault-createSupported": true, "get": { "summary": "Create a role and associate policies to it.", - "operationId": "OCIReadRole", + "operationId": "oci-read-role", "tags": [ "auth" ], @@ -5580,7 +6159,7 @@ }, "post": { "summary": "Create a role and associate policies to it.", - "operationId": "OCIWriteRole", + "operationId": "oci-write-role", "tags": [ "auth" ], @@ -5588,9 +6167,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/OCIWriteRoleRequest" - } + "schema": {} } } }, @@ -5602,7 +6179,7 @@ }, "delete": { "summary": "Create a role and associate policies to it.", - "operationId": "OCIDeleteRole", + "operationId": "oci-delete-role", "tags": [ "auth" ], @@ -5613,144 +6190,26 @@ } } }, - "/auth/{oidc_mount_path}/config": { - "description": "Configures the JWT authentication backend.", + "/auth/{okta_mount_path}/config": { + "description": "This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com", "parameters": [ { - "name": "oidc_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "okta_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "oidc" - } + "default": "okta" + }, + "required": true } ], - "get": { - "summary": "Read the current JWT authentication backend configuration.", - "operationId": "OIDCReadAuthConfig", - "tags": [ - "auth" - ], - "responses": { - "200": { - "description": "OK" - } - } + "x-vault-createSupported": true, + "x-vault-displayAttrs": { + "action": "Configure" }, - "post": { - "summary": "Configure the JWT authentication backend.", - "description": "The JWT authentication backend validates JWTs (or OIDC) using the configured\ncredentials. If using OIDC Discovery, the URL must be provided, along\nwith (optionally) the CA cert to use for the connection. If performing JWT\nvalidation locally, a set of public keys must be provided.", - "operationId": "OIDCWriteAuthConfig", - "tags": [ - "auth" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCWriteAuthConfigRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{oidc_mount_path}/login": { - "description": "Authenticates to Vault using a JWT (or OIDC) token.", - "parameters": [ - { - "name": "oidc_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "oidc" - } - } - ], - "x-vault-unauthenticated": true, - "post": { - "summary": "Authenticates to Vault using a JWT (or OIDC) token.", - "operationId": "OIDCLogin", - "tags": [ - "auth" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCLoginRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{oidc_mount_path}/oidc/auth_url": { - "parameters": [ - { - "name": "oidc_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "oidc" - } - } - ], - "x-vault-unauthenticated": true, - "post": { - "summary": "Request an authorization URL to start an OIDC login flow.", - "operationId": "OIDCWriteAuthURL", - "tags": [ - "auth" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCWriteAuthURLRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{oidc_mount_path}/oidc/callback": { - "parameters": [ - { - "name": "oidc_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "oidc" - } - } - ], - "x-vault-unauthenticated": true, "get": { - "summary": "Callback endpoint to complete an OIDC login.", - "operationId": "OIDCReadCallback", + "operationId": "okta-read-configuration", "tags": [ "auth" ], @@ -5761,8 +6220,7 @@ } }, "post": { - "summary": "Callback endpoint to handle form_posts.", - "operationId": "OIDCWriteCallback", + "operationId": "okta-configure", "tags": [ "auth" ], @@ -5771,7 +6229,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OIDCWriteCallbackRequest" + "$ref": "#/components/schemas/OktaConfigureRequest" } } } @@ -5783,190 +6241,27 @@ } } }, - "/auth/{oidc_mount_path}/role": { - "description": "Lists all the roles registered with the backend.", + "/auth/{okta_mount_path}/groups": { + "description": "Manage users allowed to authenticate.", "parameters": [ { - "name": "oidc_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "okta_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "oidc" - } + "default": "okta" + }, + "required": true } ], + "x-vault-displayAttrs": { + "navigation": true, + "itemType": "Group" + }, "get": { - "summary": "Lists all the roles registered with the backend.", - "description": "The list will contain the names of the roles.", - "operationId": "OIDCListAuthRoles", - "tags": [ - "auth" - ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{oidc_mount_path}/role/{name}": { - "description": "Register an role with the backend.", - "parameters": [ - { - "name": "name", - "description": "Name of the role.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "oidc_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "oidc" - } - } - ], - "x-vault-createSupported": true, - "get": { - "summary": "Read an existing role.", - "operationId": "OIDCReadAuthRole", - "tags": [ - "auth" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Register an role with the backend.", - "description": "A role is required to authenticate with this backend. The role binds\n\t\tJWT token information with token policies and settings.\n\t\tThe bindings, token polices and token settings can all be configured\n\t\tusing this endpoint", - "operationId": "OIDCWriteAuthRole", - "tags": [ - "auth" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCWriteAuthRoleRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "Delete an existing role.", - "operationId": "OIDCDeleteAuthRole", - "tags": [ - "auth" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/auth/{okta_mount_path}/config": { - "description": "This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com", - "parameters": [ - { - "name": "okta_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "okta" - } - } - ], - "x-vault-createSupported": true, - "x-vault-displayAttrs": { - "action": "Configure" - }, - "get": { - "summary": "This endpoint allows you to configure the Okta and its\nconfiguration options.\n\nThe Okta organization are the characters at the front of the URL for Okta.\nExample https://ORG.okta.com", - "operationId": "OktaReadConfig", - "tags": [ - "auth" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "This endpoint allows you to configure the Okta and its\nconfiguration options.\n\nThe Okta organization are the characters at the front of the URL for Okta.\nExample https://ORG.okta.com", - "operationId": "OktaWriteConfig", - "tags": [ - "auth" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OktaWriteConfigRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{okta_mount_path}/groups": { - "description": "Manage users allowed to authenticate.", - "parameters": [ - { - "name": "okta_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "okta" - } - } - ], - "x-vault-displayAttrs": { - "navigation": true, - "itemType": "Group" - }, - "get": { - "summary": "Manage users allowed to authenticate.", - "operationId": "OktaListGroups", + "summary": "Manage users allowed to authenticate.", + "operationId": "okta-list-groups", "tags": [ "auth" ], @@ -6005,12 +6300,13 @@ }, { "name": "okta_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "okta" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -6019,7 +6315,7 @@ }, "get": { "summary": "Manage users allowed to authenticate.", - "operationId": "OktaReadGroup", + "operationId": "okta-read-group", "tags": [ "auth" ], @@ -6031,7 +6327,7 @@ }, "post": { "summary": "Manage users allowed to authenticate.", - "operationId": "OktaWriteGroup", + "operationId": "okta-write-group", "tags": [ "auth" ], @@ -6053,7 +6349,7 @@ }, "delete": { "summary": "Manage users allowed to authenticate.", - "operationId": "OktaDeleteGroup", + "operationId": "okta-delete-group", "tags": [ "auth" ], @@ -6068,20 +6364,21 @@ "description": "Log in with a username and password.", "parameters": [ { - "name": "okta_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "username", + "description": "Username to be used for login.", "in": "path", "schema": { - "type": "string", - "default": "okta" - } + "type": "string" + }, + "required": true }, { - "name": "username", - "description": "Username to be used for login.", + "name": "okta_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "okta" }, "required": true } @@ -6089,7 +6386,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "OktaLogin", + "operationId": "okta-log-in", "tags": [ "auth" ], @@ -6098,7 +6395,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OktaLoginRequest" + "$ref": "#/components/schemas/OktaLogInRequest" } } } @@ -6115,12 +6412,13 @@ "parameters": [ { "name": "okta_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "okta" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -6129,7 +6427,7 @@ }, "get": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "OktaListUsers", + "operationId": "okta-list-users", "tags": [ "auth" ], @@ -6168,12 +6466,13 @@ }, { "name": "okta_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "okta" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -6182,7 +6481,7 @@ }, "get": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "OktaReadUser", + "operationId": "okta-read-user", "tags": [ "auth" ], @@ -6194,7 +6493,7 @@ }, "post": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "OktaWriteUser", + "operationId": "okta-write-user", "tags": [ "auth" ], @@ -6216,7 +6515,7 @@ }, "delete": { "summary": "Manage additional groups for users allowed to authenticate.", - "operationId": "OktaDeleteUser", + "operationId": "okta-delete-user", "tags": [ "auth" ], @@ -6240,17 +6539,18 @@ }, { "name": "okta_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "okta" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { - "operationId": "OktaVerify", + "operationId": "okta-verify", "tags": [ "auth" ], @@ -6266,12 +6566,13 @@ "parameters": [ { "name": "radius_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "radius" - } + }, + "required": true } ], "x-vault-createSupported": true, @@ -6279,8 +6580,7 @@ "action": "Configure" }, "get": { - "summary": "Configure the RADIUS server to connect to, along with its options.", - "operationId": "RadiusReadConfig", + "operationId": "radius-read-configuration", "tags": [ "auth" ], @@ -6291,8 +6591,7 @@ } }, "post": { - "summary": "Configure the RADIUS server to connect to, along with its options.", - "operationId": "RadiusWriteConfig", + "operationId": "radius-configure", "tags": [ "auth" ], @@ -6301,7 +6600,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RadiusWriteConfigRequest" + "$ref": "#/components/schemas/RadiusConfigureRequest" } } } @@ -6318,18 +6617,19 @@ "parameters": [ { "name": "radius_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "radius" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "RadiusLogin", + "operationId": "radius-log-in", "tags": [ "auth" ], @@ -6338,7 +6638,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RadiusLoginRequest" + "$ref": "#/components/schemas/RadiusLogInRequest" } } } @@ -6354,20 +6654,21 @@ "description": "Log in with a username and password.", "parameters": [ { - "name": "radius_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "urlusername", + "description": "Username to be used for login. (URL parameter)", "in": "path", "schema": { - "type": "string", - "default": "radius" - } + "type": "string" + }, + "required": true }, { - "name": "urlusername", - "description": "Username to be used for login. (URL parameter)", + "name": "radius_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "radius" }, "required": true } @@ -6375,7 +6676,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "RadiusLoginWithUsername", + "operationId": "radius-log-in-with-username", "tags": [ "auth" ], @@ -6384,7 +6685,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RadiusLoginWithUsernameRequest" + "$ref": "#/components/schemas/RadiusLogInWithUsernameRequest" } } } @@ -6401,12 +6702,13 @@ "parameters": [ { "name": "radius_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "radius" - } + }, + "required": true } ], "x-vault-displayAttrs": { @@ -6415,7 +6717,7 @@ }, "get": { "summary": "Manage users allowed to authenticate.", - "operationId": "RadiusListUsers", + "operationId": "radius-list-users", "tags": [ "auth" ], @@ -6454,12 +6756,13 @@ }, { "name": "radius_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "radius" - } + }, + "required": true } ], "x-vault-createSupported": true, @@ -6469,7 +6772,7 @@ }, "get": { "summary": "Manage users allowed to authenticate.", - "operationId": "RadiusReadUser", + "operationId": "radius-read-user", "tags": [ "auth" ], @@ -6481,7 +6784,7 @@ }, "post": { "summary": "Manage users allowed to authenticate.", - "operationId": "RadiusWriteUser", + "operationId": "radius-write-user", "tags": [ "auth" ], @@ -6503,7 +6806,7 @@ }, "delete": { "summary": "Manage users allowed to authenticate.", - "operationId": "RadiusDeleteUser", + "operationId": "radius-delete-user", "tags": [ "auth" ], @@ -6514,23 +6817,74 @@ } } }, - "/auth/{token_mount_path}/accessors/": { - "description": "List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'.", + "/auth/{userpass_mount_path}/login/{username}": { + "description": "Log in with a username and password.", "parameters": [ { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "username", + "description": "Username of the user.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "userpass_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "token" + "default": "userpass" + }, + "required": true + } + ], + "x-vault-unauthenticated": true, + "post": { + "summary": "Log in with a username and password.", + "operationId": "userpass-log-in", + "tags": [ + "auth" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/UserpassLogInRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" } } + } + }, + "/auth/{userpass_mount_path}/users": { + "description": "Manage users allowed to authenticate.", + "parameters": [ + { + "name": "userpass_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "userpass" + }, + "required": true + } ], - "x-vault-sudo": true, + "x-vault-displayAttrs": { + "navigation": true, + "itemType": "User" + }, "get": { - "summary": "List token accessors, which can then be\nbe used to iterate and discover their properties\nor revoke them. Because this can be used to\ncause a denial of service, this endpoint\nrequires 'sudo' capability in addition to\n'list'.", - "operationId": "TokenListAccessors", + "summary": "Manage users allowed to authenticate.", + "operationId": "userpass-list-users", "tags": [ "auth" ], @@ -6555,30 +6909,49 @@ } } }, - "/auth/{token_mount_path}/create": { - "description": "The token create path is used to create new tokens.", + "/auth/{userpass_mount_path}/users/{username}": { + "description": "Manage users allowed to authenticate.", "parameters": [ { - "name": "format", - "description": "Return json formatted output", - "in": "query", + "name": "username", + "description": "Username for this user.", + "in": "path", "schema": { "type": "string" - } + }, + "required": true }, { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "userpass_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "token" - } + "default": "userpass" + }, + "required": true } ], + "x-vault-createSupported": true, + "x-vault-displayAttrs": { + "itemType": "User", + "action": "Create" + }, + "get": { + "summary": "Manage users allowed to authenticate.", + "operationId": "userpass-read-user", + "tags": [ + "auth" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, "post": { - "summary": "The token create path is used to create new tokens.", - "operationId": "TokenWriteCreate", + "summary": "Manage users allowed to authenticate.", + "operationId": "userpass-write-user", "tags": [ "auth" ], @@ -6587,7 +6960,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenWriteCreateRequest" + "$ref": "#/components/schemas/UserpassWriteUserRequest" } } } @@ -6597,32 +6970,46 @@ "description": "OK" } } + }, + "delete": { + "summary": "Manage users allowed to authenticate.", + "operationId": "userpass-delete-user", + "tags": [ + "auth" + ], + "responses": { + "204": { + "description": "empty body" + } + } } }, - "/auth/{token_mount_path}/create-orphan": { - "description": "The token create path is used to create new orphan tokens.", + "/auth/{userpass_mount_path}/users/{username}/password": { + "description": "Reset user's password.", "parameters": [ { - "name": "format", - "description": "Return json formatted output", - "in": "query", + "name": "username", + "description": "Username for this user.", + "in": "path", "schema": { "type": "string" - } + }, + "required": true }, { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "userpass_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "token" - } + "default": "userpass" + }, + "required": true } ], "post": { - "summary": "The token create path is used to create new orphan tokens.", - "operationId": "TokenWriteCreateOrphan", + "summary": "Reset user's password.", + "operationId": "userpass-reset-password", "tags": [ "auth" ], @@ -6631,7 +7018,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenWriteCreateOrphanRequest" + "$ref": "#/components/schemas/UserpassResetPasswordRequest" } } } @@ -6643,20 +7030,12 @@ } } }, - "/auth/{token_mount_path}/create/{role_name}": { - "description": "This token create path is used to create new tokens adhering to the given role.", + "/auth/{userpass_mount_path}/users/{username}/policies": { + "description": "Update the policies associated with the username.", "parameters": [ { - "name": "format", - "description": "Return json formatted output", - "in": "query", - "schema": { - "type": "string" - } - }, - { - "name": "role_name", - "description": "Name of the role", + "name": "username", + "description": "Username for this user.", "in": "path", "schema": { "type": "string" @@ -6664,18 +7043,19 @@ "required": true }, { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "userpass_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "token" - } + "default": "userpass" + }, + "required": true } ], "post": { - "summary": "This token create path is used to create new tokens adhering to the given role.", - "operationId": "TokenWriteCreateWithRole", + "summary": "Update the policies associated with the username.", + "operationId": "userpass-update-policies", "tags": [ "auth" ], @@ -6684,7 +7064,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenWriteCreateWithRoleRequest" + "$ref": "#/components/schemas/UserpassUpdatePoliciesRequest" } } } @@ -6696,24 +7076,35 @@ } } }, - "/auth/{token_mount_path}/lookup": { - "description": "This endpoint will lookup a token and its properties.", + "/cubbyhole/{path}": { + "description": "Pass-through secret storage to a token-specific cubbyhole in the storage backend, allowing you to read/write arbitrary data into secret storage.", "parameters": [ { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "path", + "description": "Specifies the path of the secret.", "in": "path", "schema": { - "type": "string", - "default": "token" - } + "type": "string" + }, + "required": true } ], + "x-vault-createSupported": true, "get": { - "summary": "This endpoint will lookup a token and its properties.", - "operationId": "TokenReadLookup", + "summary": "Retrieve the secret at the specified location.", + "operationId": "cubbyhole-read", "tags": [ - "auth" + "secrets" + ], + "parameters": [ + { + "name": "list", + "description": "Return a list if `true`", + "in": "query", + "schema": { + "type": "string" + } + } ], "responses": { "200": { @@ -6722,53 +7113,44 @@ } }, "post": { - "summary": "This endpoint will lookup a token and its properties.", - "operationId": "TokenWriteLookup", + "summary": "Store a secret at the specified location.", + "operationId": "cubbyhole-write", "tags": [ - "auth" + "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/TokenWriteLookupRequest" - } - } - } - }, "responses": { "200": { "description": "OK" } } - } - }, - "/auth/{token_mount_path}/lookup-accessor": { - "description": "This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" + }, + "delete": { + "summary": "Deletes the secret at the specified location.", + "operationId": "cubbyhole-delete", + "tags": [ + "secrets" + ], + "responses": { + "204": { + "description": "empty body" } } - ], + } + }, + "/identity/alias": { + "description": "Create a new alias.", "post": { - "summary": "This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID.", - "operationId": "TokenWriteLookupAccessor", + "summary": "Create a new alias.", + "operationId": "alias-create", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenWriteLookupAccessorRequest" + "$ref": "#/components/schemas/AliasCreateRequest" } } } @@ -6780,24 +7162,52 @@ } } }, - "/auth/{token_mount_path}/lookup-self": { - "description": "This endpoint will lookup a token and its properties.", + "/identity/alias/id": { + "description": "List all the alias IDs.", + "get": { + "summary": "List all the alias IDs.", + "operationId": "alias-list-by-id", + "tags": [ + "identity" + ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/identity/alias/id/{id}": { + "description": "Update, read or delete an alias ID.", "parameters": [ { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "id", + "description": "ID of the alias", "in": "path", "schema": { - "type": "string", - "default": "token" - } + "type": "string" + }, + "required": true } ], "get": { - "summary": "This endpoint will lookup a token and its properties.", - "operationId": "TokenReadLookupSelf", + "operationId": "alias-read-by-id", "tags": [ - "auth" + "identity" ], "responses": { "200": { @@ -6806,17 +7216,16 @@ } }, "post": { - "summary": "This endpoint will lookup a token and its properties.", - "operationId": "TokenWriteLookupSelf", + "operationId": "alias-update-by-id", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenWriteLookupSelfRequest" + "$ref": "#/components/schemas/AliasUpdateByIdRequest" } } } @@ -6826,33 +7235,33 @@ "description": "OK" } } - } - }, - "/auth/{token_mount_path}/renew": { - "description": "This endpoint will renew the given token and prevent expiration.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" + }, + "delete": { + "operationId": "alias-delete-by-id", + "tags": [ + "identity" + ], + "responses": { + "204": { + "description": "empty body" } } - ], + } + }, + "/identity/entity": { + "description": "Create a new entity", "post": { - "summary": "This endpoint will renew the given token and prevent expiration.", - "operationId": "TokenRenew", + "summary": "Create a new entity", + "operationId": "entity-create", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenRenewRequest" + "$ref": "#/components/schemas/EntityCreateRequest" } } } @@ -6864,31 +7273,20 @@ } } }, - "/auth/{token_mount_path}/renew-accessor": { - "description": "This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" - } - } - ], + "/identity/entity-alias": { + "description": "Create a new alias.", "post": { - "summary": "This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID.", - "operationId": "TokenRenewAccessor", + "summary": "Create a new alias.", + "operationId": "entity-create-alias", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenRenewAccessorRequest" + "$ref": "#/components/schemas/EntityCreateAliasRequest" } } } @@ -6900,35 +7298,28 @@ } } }, - "/auth/{token_mount_path}/renew-self": { - "description": "This endpoint will renew the token used to call it and prevent expiration.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" - } - } - ], - "post": { - "summary": "This endpoint will renew the token used to call it and prevent expiration.", - "operationId": "TokenRenewSelf", + "/identity/entity-alias/id": { + "description": "List all the alias IDs.", + "get": { + "summary": "List all the alias IDs.", + "operationId": "entity-list-aliases-by-id", "tags": [ - "auth" + "identity" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/TokenRenewSelfRequest" - } - } + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true } - }, + ], "responses": { "200": { "description": "OK" @@ -6936,67 +7327,41 @@ } } }, - "/auth/{token_mount_path}/revoke": { - "description": "This endpoint will delete the given token and all of its child tokens.", + "/identity/entity-alias/id/{id}": { + "description": "Update, read or delete an alias ID.", "parameters": [ { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "id", + "description": "ID of the alias", "in": "path", "schema": { - "type": "string", - "default": "token" - } + "type": "string" + }, + "required": true } ], - "post": { - "summary": "This endpoint will delete the given token and all of its child tokens.", - "operationId": "TokenRevoke", + "get": { + "operationId": "entity-read-alias-by-id", "tags": [ - "auth" + "identity" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/TokenRevokeRequest" - } - } - } - }, "responses": { "200": { "description": "OK" } } - } - }, - "/auth/{token_mount_path}/revoke-accessor": { - "description": "This endpoint will delete the token associated with the accessor and all of its child tokens.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" - } - } - ], + }, "post": { - "summary": "This endpoint will delete the token associated with the accessor and all of its child tokens.", - "operationId": "TokenRevokeAccessor", + "operationId": "entity-update-alias-by-id", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenRevokeAccessorRequest" + "$ref": "#/components/schemas/EntityUpdateAliasByIdRequest" } } } @@ -7006,33 +7371,33 @@ "description": "OK" } } - } - }, - "/auth/{token_mount_path}/revoke-orphan": { - "description": "This endpoint will delete the token and orphan its child tokens.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" + }, + "delete": { + "operationId": "entity-delete-alias-by-id", + "tags": [ + "identity" + ], + "responses": { + "204": { + "description": "empty body" } } - ], + } + }, + "/identity/entity/batch-delete": { + "description": "Delete all of the entities provided", "post": { - "summary": "This endpoint will delete the token and orphan its child tokens.", - "operationId": "TokenRevokeOrphan", + "summary": "Delete all of the entities provided", + "operationId": "entity-batch-delete", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenRevokeOrphanRequest" + "$ref": "#/components/schemas/EntityBatchDeleteRequest" } } } @@ -7044,50 +7409,13 @@ } } }, - "/auth/{token_mount_path}/revoke-self": { - "description": "This endpoint will delete the token used to call it and all of its child tokens.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" - } - } - ], - "post": { - "summary": "This endpoint will delete the token used to call it and all of its child tokens.", - "operationId": "TokenRevokeSelf", - "tags": [ - "auth" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{token_mount_path}/roles": { - "description": "This endpoint lists configured roles.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" - } - } - ], + "/identity/entity/id": { + "description": "List all the entity IDs", "get": { - "summary": "This endpoint lists configured roles.", - "operationId": "TokenListRoles", + "summary": "List all the entity IDs", + "operationId": "entity-list-by-id", "tags": [ - "auth" + "identity" ], "parameters": [ { @@ -7110,32 +7438,23 @@ } } }, - "/auth/{token_mount_path}/roles/{role_name}": { + "/identity/entity/id/{id}": { + "description": "Update, read or delete an entity using entity ID", "parameters": [ { - "name": "role_name", - "description": "Name of the role", + "name": "id", + "description": "ID of the entity. If set, updates the corresponding existing entity.", "in": "path", "schema": { "type": "string" }, "required": true - }, - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" - } } ], - "x-vault-createSupported": true, "get": { - "operationId": "TokenReadRole", + "operationId": "entity-read-by-id", "tags": [ - "auth" + "identity" ], "responses": { "200": { @@ -7144,16 +7463,16 @@ } }, "post": { - "operationId": "TokenWriteRole", + "operationId": "entity-update-by-id", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TokenWriteRoleRequest" + "$ref": "#/components/schemas/EntityUpdateByIdRequest" } } } @@ -7165,9 +7484,9 @@ } }, "delete": { - "operationId": "TokenDeleteRole", + "operationId": "entity-delete-by-id", "tags": [ - "auth" + "identity" ], "responses": { "204": { @@ -7176,67 +7495,20 @@ } } }, - "/auth/{token_mount_path}/tidy": { - "description": "This endpoint performs cleanup tasks that can be run if certain error conditions have occurred.", - "parameters": [ - { - "name": "token_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "token" - } - } - ], - "post": { - "summary": "This endpoint performs cleanup tasks that can be run if certain error\nconditions have occurred.", - "operationId": "TokenTidy", - "tags": [ - "auth" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{userpass_mount_path}/login/{username}": { - "description": "Log in with a username and password.", - "parameters": [ - { - "name": "username", - "description": "Username of the user.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "userpass_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "userpass" - } - } - ], - "x-vault-unauthenticated": true, + "/identity/entity/merge": { + "description": "Merge two or more entities together", "post": { - "summary": "Log in with a username and password.", - "operationId": "UserpassLogin", + "summary": "Merge two or more entities together", + "operationId": "entity-merge", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/UserpassLoginRequest" + "$ref": "#/components/schemas/EntityMergeRequest" } } } @@ -7248,28 +7520,13 @@ } } }, - "/auth/{userpass_mount_path}/users": { - "description": "Manage users allowed to authenticate.", - "parameters": [ - { - "name": "userpass_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "userpass" - } - } - ], - "x-vault-displayAttrs": { - "navigation": true, - "itemType": "User" - }, + "/identity/entity/name": { + "description": "List all the entity names", "get": { - "summary": "Manage users allowed to authenticate.", - "operationId": "UserpassListUsers", + "summary": "List all the entity names", + "operationId": "entity-list-by-name", "tags": [ - "auth" + "identity" ], "parameters": [ { @@ -7292,38 +7549,23 @@ } } }, - "/auth/{userpass_mount_path}/users/{username}": { - "description": "Manage users allowed to authenticate.", + "/identity/entity/name/{name}": { + "description": "Update, read or delete an entity using entity name", "parameters": [ { - "name": "username", - "description": "Username for this user.", + "name": "name", + "description": "Name of the entity", "in": "path", "schema": { "type": "string" }, "required": true - }, - { - "name": "userpass_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "userpass" - } } ], - "x-vault-createSupported": true, - "x-vault-displayAttrs": { - "itemType": "User", - "action": "Create" - }, "get": { - "summary": "Manage users allowed to authenticate.", - "operationId": "UserpassReadUser", + "operationId": "entity-read-by-name", "tags": [ - "auth" + "identity" ], "responses": { "200": { @@ -7332,17 +7574,16 @@ } }, "post": { - "summary": "Manage users allowed to authenticate.", - "operationId": "UserpassWriteUser", + "operationId": "entity-update-by-name", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/UserpassWriteUserRequest" + "$ref": "#/components/schemas/EntityUpdateByNameRequest" } } } @@ -7354,10 +7595,9 @@ } }, "delete": { - "summary": "Manage users allowed to authenticate.", - "operationId": "UserpassDeleteUser", + "operationId": "entity-delete-by-name", "tags": [ - "auth" + "identity" ], "responses": { "204": { @@ -7366,85 +7606,20 @@ } } }, - "/auth/{userpass_mount_path}/users/{username}/password": { - "description": "Reset user's password.", - "parameters": [ - { - "name": "username", - "description": "Username for this user.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "userpass_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "userpass" - } - } - ], - "post": { - "summary": "Reset user's password.", - "operationId": "UserpassWriteUserPassword", - "tags": [ - "auth" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/UserpassWriteUserPasswordRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/auth/{userpass_mount_path}/users/{username}/policies": { - "description": "Update the policies associated with the username.", - "parameters": [ - { - "name": "username", - "description": "Username for this user.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "userpass_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "userpass" - } - } - ], + "/identity/group": { + "description": "Create a new group.", "post": { - "summary": "Update the policies associated with the username.", - "operationId": "UserpassWriteUserPolicies", + "summary": "Create a new group.", + "operationId": "group-create", "tags": [ - "auth" + "identity" ], "requestBody": { "required": true, "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/UserpassWriteUserPoliciesRequest" + "$ref": "#/components/schemas/GroupCreateRequest" } } } @@ -7456,11 +7631,11 @@ } } }, - "/identity/alias": { - "description": "Create a new alias.", + "/identity/group-alias": { + "description": "Creates a new group alias, or updates an existing one.", "post": { - "summary": "Create a new alias.", - "operationId": "AliasWrite", + "summary": "Creates a new group alias, or updates an existing one.", + "operationId": "group-create-alias", "tags": [ "identity" ], @@ -7469,7 +7644,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AliasWriteRequest" + "$ref": "#/components/schemas/GroupCreateAliasRequest" } } } @@ -7481,11 +7656,11 @@ } } }, - "/identity/alias/id": { - "description": "List all the alias IDs.", + "/identity/group-alias/id": { + "description": "List all the group alias IDs.", "get": { - "summary": "List all the alias IDs.", - "operationId": "AliasListByID", + "summary": "List all the group alias IDs.", + "operationId": "group-list-aliases-by-id", "tags": [ "identity" ], @@ -7510,12 +7685,11 @@ } } }, - "/identity/alias/id/{id}": { - "description": "Update, read or delete an alias ID.", + "/identity/group-alias/id/{id}": { "parameters": [ { "name": "id", - "description": "ID of the alias", + "description": "ID of the group alias.", "in": "path", "schema": { "type": "string" @@ -7524,8 +7698,7 @@ } ], "get": { - "summary": "Update, read or delete an alias ID.", - "operationId": "AliasReadByID", + "operationId": "group-read-alias-by-id", "tags": [ "identity" ], @@ -7536,8 +7709,7 @@ } }, "post": { - "summary": "Update, read or delete an alias ID.", - "operationId": "AliasWriteByID", + "operationId": "group-update-alias-by-id", "tags": [ "identity" ], @@ -7546,7 +7718,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AliasWriteByIDRequest" + "$ref": "#/components/schemas/GroupUpdateAliasByIdRequest" } } } @@ -7558,8 +7730,7 @@ } }, "delete": { - "summary": "Update, read or delete an alias ID.", - "operationId": "AliasDeleteByID", + "operationId": "group-delete-alias-by-id", "tags": [ "identity" ], @@ -7570,61 +7741,11 @@ } } }, - "/identity/entity": { - "description": "Create a new entity", - "post": { - "summary": "Create a new entity", - "operationId": "EntityWrite", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/EntityWriteRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/entity-alias": { - "description": "Create a new alias.", - "post": { - "summary": "Create a new alias.", - "operationId": "EntityWriteAlias", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/EntityWriteAliasRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/entity-alias/id": { - "description": "List all the alias IDs.", + "/identity/group/id": { + "description": "List all the group IDs.", "get": { - "summary": "List all the alias IDs.", - "operationId": "EntityListAliasesByID", + "summary": "List all the group IDs.", + "operationId": "group-list-by-id", "tags": [ "identity" ], @@ -7649,12 +7770,12 @@ } } }, - "/identity/entity-alias/id/{id}": { - "description": "Update, read or delete an alias ID.", + "/identity/group/id/{id}": { + "description": "Update or delete an existing group using its ID.", "parameters": [ { "name": "id", - "description": "ID of the alias", + "description": "ID of the group. If set, updates the corresponding existing group.", "in": "path", "schema": { "type": "string" @@ -7663,8 +7784,7 @@ } ], "get": { - "summary": "Update, read or delete an alias ID.", - "operationId": "EntityReadAliasByID", + "operationId": "group-read-by-id", "tags": [ "identity" ], @@ -7675,8 +7795,7 @@ } }, "post": { - "summary": "Update, read or delete an alias ID.", - "operationId": "EntityWriteAliasByID", + "operationId": "group-update-by-id", "tags": [ "identity" ], @@ -7685,7 +7804,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/EntityWriteAliasByIDRequest" + "$ref": "#/components/schemas/GroupUpdateByIdRequest" } } } @@ -7697,8 +7816,7 @@ } }, "delete": { - "summary": "Update, read or delete an alias ID.", - "operationId": "EntityDeleteAliasByID", + "operationId": "group-delete-by-id", "tags": [ "identity" ], @@ -7709,36 +7827,9 @@ } } }, - "/identity/entity/batch-delete": { - "description": "Delete all of the entities provided", - "post": { - "summary": "Delete all of the entities provided", - "operationId": "EntityBatchDelete", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/EntityBatchDeleteRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/entity/id": { - "description": "List all the entity IDs", + "/identity/group/name": { "get": { - "summary": "List all the entity IDs", - "operationId": "EntityListByID", + "operationId": "group-list-by-name", "tags": [ "identity" ], @@ -7763,12 +7854,11 @@ } } }, - "/identity/entity/id/{id}": { - "description": "Update, read or delete an entity using entity ID", + "/identity/group/name/{name}": { "parameters": [ { - "name": "id", - "description": "ID of the entity. If set, updates the corresponding existing entity.", + "name": "name", + "description": "Name of the group.", "in": "path", "schema": { "type": "string" @@ -7777,8 +7867,7 @@ } ], "get": { - "summary": "Update, read or delete an entity using entity ID", - "operationId": "EntityReadByID", + "operationId": "group-read-by-name", "tags": [ "identity" ], @@ -7789,8 +7878,7 @@ } }, "post": { - "summary": "Update, read or delete an entity using entity ID", - "operationId": "EntityWriteByID", + "operationId": "group-update-by-name", "tags": [ "identity" ], @@ -7799,7 +7887,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/EntityWriteByIDRequest" + "$ref": "#/components/schemas/GroupUpdateByNameRequest" } } } @@ -7811,8 +7899,7 @@ } }, "delete": { - "summary": "Update, read or delete an entity using entity ID", - "operationId": "EntityDeleteByID", + "operationId": "group-delete-by-name", "tags": [ "identity" ], @@ -7823,11 +7910,11 @@ } } }, - "/identity/entity/merge": { - "description": "Merge two or more entities together", + "/identity/lookup/entity": { + "description": "Query entities based on various properties.", "post": { - "summary": "Merge two or more entities together", - "operationId": "EntityMerge", + "summary": "Query entities based on various properties.", + "operationId": "entity-look-up", "tags": [ "identity" ], @@ -7836,7 +7923,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/EntityMergeRequest" + "$ref": "#/components/schemas/EntityLookUpRequest" } } } @@ -7848,11 +7935,35 @@ } } }, - "/identity/entity/name": { - "description": "List all the entity names", + "/identity/lookup/group": { + "description": "Query groups based on various properties.", + "post": { + "summary": "Query groups based on various properties.", + "operationId": "group-look-up", + "tags": [ + "identity" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/GroupLookUpRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/identity/mfa/login-enforcement": { "get": { - "summary": "List all the entity names", - "operationId": "EntityListByName", + "summary": "List login enforcements", + "operationId": "mfa-list-login-enforcements", "tags": [ "identity" ], @@ -7877,12 +7988,11 @@ } } }, - "/identity/entity/name/{name}": { - "description": "Update, read or delete an entity using entity name", + "/identity/mfa/login-enforcement/{name}": { "parameters": [ { "name": "name", - "description": "Name of the entity", + "description": "Name for this login enforcement configuration", "in": "path", "schema": { "type": "string" @@ -7891,8 +8001,8 @@ } ], "get": { - "summary": "Update, read or delete an entity using entity name", - "operationId": "EntityReadByName", + "summary": "Read the current login enforcement", + "operationId": "mfa-read-login-enforcement", "tags": [ "identity" ], @@ -7903,8 +8013,8 @@ } }, "post": { - "summary": "Update, read or delete an entity using entity name", - "operationId": "EntityWriteByName", + "summary": "Create or update a login enforcement", + "operationId": "mfa-write-login-enforcement", "tags": [ "identity" ], @@ -7913,7 +8023,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/EntityWriteByNameRequest" + "$ref": "#/components/schemas/MfaWriteLoginEnforcementRequest" } } } @@ -7925,8 +8035,8 @@ } }, "delete": { - "summary": "Update, read or delete an entity using entity name", - "operationId": "EntityDeleteByName", + "summary": "Delete a login enforcement", + "operationId": "mfa-delete-login-enforcement", "tags": [ "identity" ], @@ -7937,49 +8047,27 @@ } } }, - "/identity/group": { - "description": "Create a new group.", - "post": { - "summary": "Create a new group.", - "operationId": "GroupWrite", + "/identity/mfa/method": { + "get": { + "summary": "List MFA method configurations for all MFA methods", + "operationId": "mfa-list-methods", "tags": [ "identity" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GroupWriteRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true } - } - } - }, - "/identity/group-alias": { - "description": "Creates a new group alias, or updates an existing one.", - "post": { - "summary": "Creates a new group alias, or updates an existing one.", - "operationId": "GroupWriteAlias", - "tags": [ - "identity" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GroupWriteAliasRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -7987,11 +8075,10 @@ } } }, - "/identity/group-alias/id": { - "description": "List all the group alias IDs.", + "/identity/mfa/method/duo": { "get": { - "summary": "List all the group alias IDs.", - "operationId": "GroupListAliasesByID", + "summary": "List MFA method configurations for the given MFA method", + "operationId": "mfa-list-duo-methods", "tags": [ "identity" ], @@ -8016,11 +8103,11 @@ } } }, - "/identity/group-alias/id/{id}": { + "/identity/mfa/method/duo/{method_id}": { "parameters": [ { - "name": "id", - "description": "ID of the group alias.", + "name": "method_id", + "description": "The unique identifier for this MFA method.", "in": "path", "schema": { "type": "string" @@ -8029,7 +8116,8 @@ } ], "get": { - "operationId": "GroupReadAliasByID", + "summary": "Read the current configuration for the given MFA method", + "operationId": "mfa-read-duo-method-configuration", "tags": [ "identity" ], @@ -8040,7 +8128,8 @@ } }, "post": { - "operationId": "GroupWriteAliasByID", + "summary": "Update or create a configuration for the given MFA method", + "operationId": "mfa-configure-duo-method", "tags": [ "identity" ], @@ -8049,7 +8138,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GroupWriteAliasByIDRequest" + "$ref": "#/components/schemas/MfaConfigureDuoMethodRequest" } } } @@ -8061,7 +8150,8 @@ } }, "delete": { - "operationId": "GroupDeleteAliasByID", + "summary": "Delete a configuration for the given MFA method", + "operationId": "mfa-delete-duo-method", "tags": [ "identity" ], @@ -8072,11 +8162,10 @@ } } }, - "/identity/group/id": { - "description": "List all the group IDs.", + "/identity/mfa/method/okta": { "get": { - "summary": "List all the group IDs.", - "operationId": "GroupListByID", + "summary": "List MFA method configurations for the given MFA method", + "operationId": "mfa-list-okta-methods", "tags": [ "identity" ], @@ -8101,12 +8190,11 @@ } } }, - "/identity/group/id/{id}": { - "description": "Update or delete an existing group using its ID.", + "/identity/mfa/method/okta/{method_id}": { "parameters": [ { - "name": "id", - "description": "ID of the group. If set, updates the corresponding existing group.", + "name": "method_id", + "description": "The unique identifier for this MFA method.", "in": "path", "schema": { "type": "string" @@ -8115,8 +8203,8 @@ } ], "get": { - "summary": "Update or delete an existing group using its ID.", - "operationId": "GroupReadByID", + "summary": "Read the current configuration for the given MFA method", + "operationId": "mfa-read-okta-method-configuration", "tags": [ "identity" ], @@ -8127,8 +8215,8 @@ } }, "post": { - "summary": "Update or delete an existing group using its ID.", - "operationId": "GroupWriteByID", + "summary": "Update or create a configuration for the given MFA method", + "operationId": "mfa-configure-okta-method", "tags": [ "identity" ], @@ -8137,7 +8225,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GroupWriteByIDRequest" + "$ref": "#/components/schemas/MfaConfigureOktaMethodRequest" } } } @@ -8149,8 +8237,8 @@ } }, "delete": { - "summary": "Update or delete an existing group using its ID.", - "operationId": "GroupDeleteByID", + "summary": "Delete a configuration for the given MFA method", + "operationId": "mfa-delete-okta-method", "tags": [ "identity" ], @@ -8161,9 +8249,10 @@ } } }, - "/identity/group/name": { + "/identity/mfa/method/pingid": { "get": { - "operationId": "GroupListByName", + "summary": "List MFA method configurations for the given MFA method", + "operationId": "mfa-list-ping-id-methods", "tags": [ "identity" ], @@ -8188,11 +8277,11 @@ } } }, - "/identity/group/name/{name}": { + "/identity/mfa/method/pingid/{method_id}": { "parameters": [ { - "name": "name", - "description": "Name of the group.", + "name": "method_id", + "description": "The unique identifier for this MFA method.", "in": "path", "schema": { "type": "string" @@ -8201,7 +8290,8 @@ } ], "get": { - "operationId": "GroupReadByName", + "summary": "Read the current configuration for the given MFA method", + "operationId": "mfa-read-ping-id-method-configuration", "tags": [ "identity" ], @@ -8212,7 +8302,8 @@ } }, "post": { - "operationId": "GroupWriteByName", + "summary": "Update or create a configuration for the given MFA method", + "operationId": "mfa-configure-ping-id-method", "tags": [ "identity" ], @@ -8221,7 +8312,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GroupWriteByNameRequest" + "$ref": "#/components/schemas/MfaConfigurePingIdMethodRequest" } } } @@ -8233,7 +8324,8 @@ } }, "delete": { - "operationId": "GroupDeleteByName", + "summary": "Delete a configuration for the given MFA method", + "operationId": "mfa-delete-ping-id-method", "tags": [ "identity" ], @@ -8244,11 +8336,38 @@ } } }, - "/identity/lookup/entity": { - "description": "Query entities based on various properties.", + "/identity/mfa/method/totp": { + "get": { + "summary": "List MFA method configurations for the given MFA method", + "operationId": "mfa-list-totp-methods", + "tags": [ + "identity" + ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/identity/mfa/method/totp/admin-destroy": { "post": { - "summary": "Query entities based on various properties.", - "operationId": "EntityLookup", + "summary": "Destroys a TOTP secret for the given MFA method ID on the given entity", + "operationId": "mfa-admin-destroy-totp-secret", "tags": [ "identity" ], @@ -8257,7 +8376,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/EntityLookupRequest" + "$ref": "#/components/schemas/MfaAdminDestroyTotpSecretRequest" } } } @@ -8269,11 +8388,10 @@ } } }, - "/identity/lookup/group": { - "description": "Query groups based on various properties.", + "/identity/mfa/method/totp/admin-generate": { "post": { - "summary": "Query groups based on various properties.", - "operationId": "GroupLookup", + "summary": "Update or create TOTP secret for the given method ID on the given entity.", + "operationId": "mfa-admin-generate-totp-secret", "tags": [ "identity" ], @@ -8282,7 +8400,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GroupLookupRequest" + "$ref": "#/components/schemas/MfaAdminGenerateTotpSecretRequest" } } } @@ -8294,27 +8412,23 @@ } } }, - "/identity/mfa/login-enforcement": { - "get": { - "summary": "List login enforcements", - "operationId": "MFAListLoginEnforcements", + "/identity/mfa/method/totp/generate": { + "post": { + "summary": "Update or create TOTP secret for the given method ID on the given entity.", + "operationId": "mfa-generate-totp-secret", "tags": [ "identity" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/MfaGenerateTotpSecretRequest" + } + } } - ], + }, "responses": { "200": { "description": "OK" @@ -8322,11 +8436,11 @@ } } }, - "/identity/mfa/login-enforcement/{name}": { + "/identity/mfa/method/totp/{method_id}": { "parameters": [ { - "name": "name", - "description": "Name for this login enforcement configuration", + "name": "method_id", + "description": "The unique identifier for this MFA method.", "in": "path", "schema": { "type": "string" @@ -8335,8 +8449,8 @@ } ], "get": { - "summary": "Read the current login enforcement", - "operationId": "MFAReadLoginEnforcement", + "summary": "Read the current configuration for the given MFA method", + "operationId": "mfa-read-totp-method-configuration", "tags": [ "identity" ], @@ -8347,8 +8461,8 @@ } }, "post": { - "summary": "Create or update a login enforcement", - "operationId": "MFAWriteLoginEnforcement", + "summary": "Update or create a configuration for the given MFA method", + "operationId": "mfa-configure-totp-method", "tags": [ "identity" ], @@ -8357,7 +8471,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MFAWriteLoginEnforcementRequest" + "$ref": "#/components/schemas/MfaConfigureTotpMethodRequest" } } } @@ -8369,8 +8483,8 @@ } }, "delete": { - "summary": "Delete a login enforcement", - "operationId": "MFADeleteLoginEnforcement", + "summary": "Delete a configuration for the given MFA method", + "operationId": "mfa-delete-totp-method", "tags": [ "identity" ], @@ -8381,63 +8495,7 @@ } } }, - "/identity/mfa/method": { - "get": { - "summary": "List MFA method configurations for all MFA methods", - "operationId": "MFAMethodList", - "tags": [ - "identity" - ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/mfa/method/duo": { - "get": { - "summary": "List MFA method configurations for the given MFA method", - "operationId": "MFAMethodListDuo", - "tags": [ - "identity" - ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/mfa/method/duo/{method_id}": { + "/identity/mfa/method/{method_id}": { "parameters": [ { "name": "method_id", @@ -8450,8 +8508,8 @@ } ], "get": { - "summary": "Read the current configuration for the given MFA method", - "operationId": "MFAMethodReadDuo", + "summary": "Read the current configuration for the given ID regardless of the MFA method type", + "operationId": "mfa-read-method-configuration", "tags": [ "identity" ], @@ -8460,46 +8518,44 @@ "description": "OK" } } - }, - "post": { - "summary": "Update or create a configuration for the given MFA method", - "operationId": "MFAMethodWriteDuo", + } + }, + "/identity/oidc/.well-known/keys": { + "description": "Retrieve public keys", + "x-vault-unauthenticated": true, + "get": { + "summary": "Retrieve public keys", + "operationId": "oidc-read-public-keys", "tags": [ "identity" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/MFAMethodWriteDuoRequest" - } - } - } - }, "responses": { "200": { "description": "OK" } } - }, - "delete": { - "summary": "Delete a configuration for the given MFA method", - "operationId": "MFAMethodDeleteDuo", + } + }, + "/identity/oidc/.well-known/openid-configuration": { + "description": "Query OIDC configurations", + "x-vault-unauthenticated": true, + "get": { + "summary": "Query OIDC configurations", + "operationId": "oidc-read-open-id-configuration", "tags": [ "identity" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK" } } } }, - "/identity/mfa/method/okta": { + "/identity/oidc/assignment": { + "description": "List OIDC assignments", "get": { - "summary": "List MFA method configurations for the given MFA method", - "operationId": "MFAMethodListOkta", + "operationId": "oidc-list-assignments", "tags": [ "identity" ], @@ -8524,11 +8580,12 @@ } } }, - "/identity/mfa/method/okta/{method_id}": { + "/identity/oidc/assignment/{name}": { + "description": "CRUD operations for OIDC assignments.", "parameters": [ { - "name": "method_id", - "description": "The unique identifier for this MFA method.", + "name": "name", + "description": "Name of the assignment", "in": "path", "schema": { "type": "string" @@ -8536,9 +8593,9 @@ "required": true } ], + "x-vault-createSupported": true, "get": { - "summary": "Read the current configuration for the given MFA method", - "operationId": "MFAMethodReadOkta", + "operationId": "oidc-read-assignment", "tags": [ "identity" ], @@ -8549,8 +8606,7 @@ } }, "post": { - "summary": "Update or create a configuration for the given MFA method", - "operationId": "MFAMethodWriteOkta", + "operationId": "oidc-write-assignment", "tags": [ "identity" ], @@ -8559,7 +8615,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MFAMethodWriteOktaRequest" + "$ref": "#/components/schemas/OidcWriteAssignmentRequest" } } } @@ -8571,8 +8627,7 @@ } }, "delete": { - "summary": "Delete a configuration for the given MFA method", - "operationId": "MFAMethodDeleteOkta", + "operationId": "oidc-delete-assignment", "tags": [ "identity" ], @@ -8583,10 +8638,10 @@ } } }, - "/identity/mfa/method/pingid": { + "/identity/oidc/client": { + "description": "List OIDC clients", "get": { - "summary": "List MFA method configurations for the given MFA method", - "operationId": "MFAMethodListPingID", + "operationId": "oidc-list-clients", "tags": [ "identity" ], @@ -8611,11 +8666,12 @@ } } }, - "/identity/mfa/method/pingid/{method_id}": { + "/identity/oidc/client/{name}": { + "description": "CRUD operations for OIDC clients.", "parameters": [ { - "name": "method_id", - "description": "The unique identifier for this MFA method.", + "name": "name", + "description": "Name of the client.", "in": "path", "schema": { "type": "string" @@ -8623,9 +8679,9 @@ "required": true } ], + "x-vault-createSupported": true, "get": { - "summary": "Read the current configuration for the given MFA method", - "operationId": "MFAMethodReadPingID", + "operationId": "oidc-read-client", "tags": [ "identity" ], @@ -8636,8 +8692,7 @@ } }, "post": { - "summary": "Update or create a configuration for the given MFA method", - "operationId": "MFAMethodWritePingID", + "operationId": "oidc-write-client", "tags": [ "identity" ], @@ -8646,7 +8701,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MFAMethodWritePingIDRequest" + "$ref": "#/components/schemas/OidcWriteClientRequest" } } } @@ -8658,8 +8713,7 @@ } }, "delete": { - "summary": "Delete a configuration for the given MFA method", - "operationId": "MFAMethodDeletePingID", + "operationId": "oidc-delete-client", "tags": [ "identity" ], @@ -8670,38 +8724,21 @@ } } }, - "/identity/mfa/method/totp": { + "/identity/oidc/config": { + "description": "OIDC configuration", "get": { - "summary": "List MFA method configurations for the given MFA method", - "operationId": "MFAMethodListTOTP", + "operationId": "oidc-read-configuration", "tags": [ "identity" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], "responses": { "200": { "description": "OK" } } - } - }, - "/identity/mfa/method/totp/admin-destroy": { + }, "post": { - "summary": "Destroys a TOTP secret for the given MFA method ID on the given entity", - "operationId": "MFAMethodAdminDestroyTOTP", + "operationId": "oidc-configure", "tags": [ "identity" ], @@ -8710,7 +8747,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MFAMethodAdminDestroyTOTPRequest" + "$ref": "#/components/schemas/OidcConfigureRequest" } } } @@ -8722,10 +8759,11 @@ } } }, - "/identity/mfa/method/totp/admin-generate": { + "/identity/oidc/introspect": { + "description": "Verify the authenticity of an OIDC token", "post": { - "summary": "Update or create TOTP secret for the given method ID on the given entity.", - "operationId": "MFAMethodAdminGenerateTOTP", + "summary": "Verify the authenticity of an OIDC token", + "operationId": "oidc-introspect", "tags": [ "identity" ], @@ -8734,7 +8772,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MFAMethodAdminGenerateTOTPRequest" + "$ref": "#/components/schemas/OidcIntrospectRequest" } } } @@ -8746,23 +8784,28 @@ } } }, - "/identity/mfa/method/totp/generate": { - "post": { - "summary": "Update or create TOTP secret for the given method ID on the given entity.", - "operationId": "MFAMethodGenerateTOTP", + "/identity/oidc/key": { + "description": "List OIDC keys", + "get": { + "summary": "List OIDC keys", + "operationId": "oidc-list-keys", "tags": [ "identity" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/MFAMethodGenerateTOTPRequest" - } - } + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true } - }, + ], "responses": { "200": { "description": "OK" @@ -8770,11 +8813,12 @@ } } }, - "/identity/mfa/method/totp/{method_id}": { + "/identity/oidc/key/{name}": { + "description": "CRUD operations for OIDC keys.", "parameters": [ { - "name": "method_id", - "description": "The unique identifier for this MFA method.", + "name": "name", + "description": "Name of the key", "in": "path", "schema": { "type": "string" @@ -8782,9 +8826,10 @@ "required": true } ], + "x-vault-createSupported": true, "get": { - "summary": "Read the current configuration for the given MFA method", - "operationId": "MFAMethodReadTOTP", + "summary": "CRUD operations for OIDC keys.", + "operationId": "oidc-read-key", "tags": [ "identity" ], @@ -8795,8 +8840,8 @@ } }, "post": { - "summary": "Update or create a configuration for the given MFA method", - "operationId": "MFAMethodWriteTOTP", + "summary": "CRUD operations for OIDC keys.", + "operationId": "oidc-write-key", "tags": [ "identity" ], @@ -8805,7 +8850,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MFAMethodWriteTOTPRequest" + "$ref": "#/components/schemas/OidcWriteKeyRequest" } } } @@ -8817,8 +8862,8 @@ } }, "delete": { - "summary": "Delete a configuration for the given MFA method", - "operationId": "MFAMethodDeleteTOTP", + "summary": "CRUD operations for OIDC keys.", + "operationId": "oidc-delete-key", "tags": [ "identity" ], @@ -8829,11 +8874,12 @@ } } }, - "/identity/mfa/method/{method_id}": { + "/identity/oidc/key/{name}/rotate": { + "description": "Rotate a named OIDC key.", "parameters": [ { - "name": "method_id", - "description": "The unique identifier for this MFA method.", + "name": "name", + "description": "Name of the key", "in": "path", "schema": { "type": "string" @@ -8841,28 +8887,22 @@ "required": true } ], - "get": { - "summary": "Read the current configuration for the given ID regardless of the MFA method type", - "operationId": "MFAMethodRead", + "post": { + "summary": "Rotate a named OIDC key.", + "operationId": "oidc-rotate-key", "tags": [ "identity" ], - "responses": { - "200": { - "description": "OK" + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/OidcRotateKeyRequest" + } + } } - } - } - }, - "/identity/oidc/.well-known/keys": { - "description": "Retrieve public keys", - "x-vault-unauthenticated": true, - "get": { - "summary": "Retrieve public keys", - "operationId": "OIDCReadWellKnownKeys", - "tags": [ - "identity" - ], + }, "responses": { "200": { "description": "OK" @@ -8870,26 +8910,21 @@ } } }, - "/identity/oidc/.well-known/openid-configuration": { - "description": "Query OIDC configurations", - "x-vault-unauthenticated": true, - "get": { - "summary": "Query OIDC configurations", - "operationId": "OIDCReadWellKnownOpenIDConfiguration", - "tags": [ - "identity" - ], - "responses": { - "200": { - "description": "OK" + "/identity/oidc/provider": { + "description": "List OIDC providers", + "parameters": [ + { + "name": "allowed_client_id", + "description": "Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids.", + "in": "query", + "schema": { + "type": "string", + "default": "" } } - } - }, - "/identity/oidc/assignment": { - "description": "List OIDC assignments", + ], "get": { - "operationId": "OIDCListAssignments", + "operationId": "oidc-list-providers", "tags": [ "identity" ], @@ -8914,12 +8949,12 @@ } } }, - "/identity/oidc/assignment/{name}": { - "description": "CRUD operations for OIDC assignments.", + "/identity/oidc/provider/{name}": { + "description": "CRUD operations for OIDC providers.", "parameters": [ { "name": "name", - "description": "Name of the assignment", + "description": "Name of the provider", "in": "path", "schema": { "type": "string" @@ -8929,7 +8964,7 @@ ], "x-vault-createSupported": true, "get": { - "operationId": "OIDCReadAssignment", + "operationId": "oidc-read-provider", "tags": [ "identity" ], @@ -8940,7 +8975,7 @@ } }, "post": { - "operationId": "OIDCWriteAssignment", + "operationId": "oidc-write-provider", "tags": [ "identity" ], @@ -8949,7 +8984,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OIDCWriteAssignmentRequest" + "$ref": "#/components/schemas/OidcWriteProviderRequest" } } } @@ -8961,378 +8996,7 @@ } }, "delete": { - "operationId": "OIDCDeleteAssignment", - "tags": [ - "identity" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/identity/oidc/client": { - "description": "List OIDC clients", - "get": { - "operationId": "OIDCListClients", - "tags": [ - "identity" - ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/oidc/client/{name}": { - "description": "CRUD operations for OIDC clients.", - "parameters": [ - { - "name": "name", - "description": "Name of the client.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - } - ], - "x-vault-createSupported": true, - "get": { - "operationId": "OIDCReadClient", - "tags": [ - "identity" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "OIDCWriteClient", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCWriteClientRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "OIDCDeleteClient", - "tags": [ - "identity" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/identity/oidc/config": { - "description": "OIDC configuration", - "get": { - "summary": "OIDC configuration", - "operationId": "OIDCReadConfig", - "tags": [ - "identity" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "OIDC configuration", - "operationId": "OIDCWriteConfig", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCWriteConfigRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/oidc/introspect": { - "description": "Verify the authenticity of an OIDC token", - "post": { - "summary": "Verify the authenticity of an OIDC token", - "operationId": "OIDCIntrospect", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCIntrospectRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/oidc/key": { - "description": "List OIDC keys", - "get": { - "summary": "List OIDC keys", - "operationId": "OIDCListKeys", - "tags": [ - "identity" - ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/oidc/key/{name}": { - "description": "CRUD operations for OIDC keys.", - "parameters": [ - { - "name": "name", - "description": "Name of the key", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - } - ], - "x-vault-createSupported": true, - "get": { - "summary": "CRUD operations for OIDC keys.", - "operationId": "OIDCReadKey", - "tags": [ - "identity" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "CRUD operations for OIDC keys.", - "operationId": "OIDCWriteKey", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCWriteKeyRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "CRUD operations for OIDC keys.", - "operationId": "OIDCDeleteKey", - "tags": [ - "identity" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/identity/oidc/key/{name}/rotate": { - "description": "Rotate a named OIDC key.", - "parameters": [ - { - "name": "name", - "description": "Name of the key", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - } - ], - "post": { - "summary": "Rotate a named OIDC key.", - "operationId": "OIDCRotateKey", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCRotateKeyRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/oidc/provider": { - "description": "List OIDC providers", - "parameters": [ - { - "name": "allowed_client_id", - "description": "Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids.", - "in": "query", - "schema": { - "type": "string", - "default": "" - } - } - ], - "get": { - "operationId": "OIDCListProviders", - "tags": [ - "identity" - ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/identity/oidc/provider/{name}": { - "description": "CRUD operations for OIDC providers.", - "parameters": [ - { - "name": "name", - "description": "Name of the provider", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - } - ], - "x-vault-createSupported": true, - "get": { - "operationId": "OIDCReadProvider", - "tags": [ - "identity" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "OIDCWriteProvider", - "tags": [ - "identity" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OIDCWriteProviderRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "OIDCDeleteProvider", + "operationId": "oidc-delete-provider", "tags": [ "identity" ], @@ -9356,8 +9020,9 @@ "required": true } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "OIDCReadProviderWellKnownKeys", + "operationId": "oidc-read-provider-public-keys", "tags": [ "identity" ], @@ -9381,8 +9046,9 @@ "required": true } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "OIDCReadProviderWellKnownOpenIDConfiguration", + "operationId": "oidc-read-provider-open-id-configuration", "tags": [ "identity" ], @@ -9407,7 +9073,7 @@ } ], "get": { - "operationId": "OIDCReadProviderAuthorize", + "operationId": "oidc-provider-authorize", "tags": [ "identity" ], @@ -9418,7 +9084,7 @@ } }, "post": { - "operationId": "OIDCWriteProviderAuthorize", + "operationId": "oidc-provider-authorize2", "tags": [ "identity" ], @@ -9427,7 +9093,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OIDCWriteProviderAuthorizeRequest" + "$ref": "#/components/schemas/OidcProviderAuthorize2Request" } } } @@ -9452,8 +9118,9 @@ "required": true } ], + "x-vault-unauthenticated": true, "post": { - "operationId": "OIDCWriteProviderToken", + "operationId": "oidc-provider-token", "tags": [ "identity" ], @@ -9462,7 +9129,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OIDCWriteProviderTokenRequest" + "$ref": "#/components/schemas/OidcProviderTokenRequest" } } } @@ -9488,7 +9155,7 @@ } ], "get": { - "operationId": "OIDCReadProviderUserInfo", + "operationId": "oidc-provider-user-info", "tags": [ "identity" ], @@ -9499,7 +9166,7 @@ } }, "post": { - "operationId": "OIDCWriteProviderUserInfo", + "operationId": "oidc-provider-user-info2", "tags": [ "identity" ], @@ -9514,7 +9181,7 @@ "description": "List configured OIDC roles", "get": { "summary": "List configured OIDC roles", - "operationId": "OIDCListRoles", + "operationId": "oidc-list-roles", "tags": [ "identity" ], @@ -9555,7 +9222,7 @@ "x-vault-createSupported": true, "get": { "summary": "CRUD operations on OIDC Roles", - "operationId": "OIDCReadRole", + "operationId": "oidc-read-role", "tags": [ "identity" ], @@ -9567,7 +9234,7 @@ }, "post": { "summary": "CRUD operations on OIDC Roles", - "operationId": "OIDCWriteRole", + "operationId": "oidc-write-role", "tags": [ "identity" ], @@ -9576,7 +9243,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OIDCWriteRoleRequest" + "$ref": "#/components/schemas/OidcWriteRoleRequest" } } } @@ -9589,7 +9256,7 @@ }, "delete": { "summary": "CRUD operations on OIDC Roles", - "operationId": "OIDCDeleteRole", + "operationId": "oidc-delete-role", "tags": [ "identity" ], @@ -9603,7 +9270,7 @@ "/identity/oidc/scope": { "description": "List OIDC scopes", "get": { - "operationId": "OIDCListScopes", + "operationId": "oidc-list-scopes", "tags": [ "identity" ], @@ -9643,7 +9310,7 @@ ], "x-vault-createSupported": true, "get": { - "operationId": "OIDCReadScope", + "operationId": "oidc-read-scope", "tags": [ "identity" ], @@ -9654,7 +9321,7 @@ } }, "post": { - "operationId": "OIDCWriteScope", + "operationId": "oidc-write-scope", "tags": [ "identity" ], @@ -9663,7 +9330,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OIDCWriteScopeRequest" + "$ref": "#/components/schemas/OidcWriteScopeRequest" } } } @@ -9675,7 +9342,7 @@ } }, "delete": { - "operationId": "OIDCDeleteScope", + "operationId": "oidc-delete-scope", "tags": [ "identity" ], @@ -9701,7 +9368,7 @@ ], "get": { "summary": "Generate an OIDC token", - "operationId": "OIDCReadToken", + "operationId": "oidc-generate-token", "tags": [ "identity" ], @@ -9716,7 +9383,7 @@ "description": "Create a new alias.", "post": { "summary": "Create a new alias.", - "operationId": "PersonaWrite", + "operationId": "persona-create", "tags": [ "identity" ], @@ -9725,7 +9392,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PersonaWriteRequest" + "$ref": "#/components/schemas/PersonaCreateRequest" } } } @@ -9741,7 +9408,7 @@ "description": "List all the alias IDs.", "get": { "summary": "List all the alias IDs.", - "operationId": "PersonaListByID", + "operationId": "persona-list-by-id", "tags": [ "identity" ], @@ -9780,8 +9447,7 @@ } ], "get": { - "summary": "Update, read or delete an alias ID.", - "operationId": "PersonaIDReadByID", + "operationId": "persona-read-by-id", "tags": [ "identity" ], @@ -9792,8 +9458,7 @@ } }, "post": { - "summary": "Update, read or delete an alias ID.", - "operationId": "PersonaIDWriteByID", + "operationId": "persona-update-by-id", "tags": [ "identity" ], @@ -9802,7 +9467,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PersonaIDWriteByIDRequest" + "$ref": "#/components/schemas/PersonaUpdateByIdRequest" } } } @@ -9814,8 +9479,7 @@ } }, "delete": { - "summary": "Update, read or delete an alias ID.", - "operationId": "PersonaIDDeleteByID", + "operationId": "persona-delete-by-id", "tags": [ "identity" ], @@ -9831,7 +9495,7 @@ "x-vault-sudo": true, "get": { "summary": "List the enabled audit devices.", - "operationId": "ReadAuditDevices", + "operationId": "auditing-list-enabled-devices", "tags": [ "system" ], @@ -9856,8 +9520,7 @@ } ], "post": { - "summary": "The hash of the given string via the given audit backend", - "operationId": "CalculateAuditHash", + "operationId": "auditing-calculate-hash", "tags": [ "system" ], @@ -9866,14 +9529,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/CalculateAuditHashRequest" + "$ref": "#/components/schemas/AuditingCalculateHashRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/AuditingCalculateHashResponse" + } + } + } } } } @@ -9894,7 +9564,7 @@ "x-vault-sudo": true, "post": { "summary": "Enable a new audit device at the supplied path.", - "operationId": "WriteAuditDevice", + "operationId": "auditing-enable-device", "tags": [ "system" ], @@ -9903,26 +9573,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteAuditDeviceRequest" + "$ref": "#/components/schemas/AuditingEnableDeviceRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Disable the audit device at the given path.", - "operationId": "DeleteAuditDevice", + "operationId": "auditing-disable-device", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -9930,8 +9600,7 @@ "/sys/auth": { "description": "List the currently enabled credential backends.", "get": { - "summary": "List the currently enabled credential backends.", - "operationId": "ReadAuthMethods", + "operationId": "auth-list-enabled-methods", "tags": [ "system" ], @@ -9958,20 +9627,27 @@ "x-vault-sudo": true, "get": { "summary": "Read the configuration of the auth engine at the given path.", - "operationId": "ReadAuthMethod", + "operationId": "auth-read-configuration", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/AuthReadConfigurationResponse" + } + } + } } } }, "post": { "summary": "Enables a new auth method.", "description": "After enabling, the auth method can be accessed and configured via the auth path specified as part of the URL. This auth path will be nested under the auth prefix.\n\nFor example, enable the \"foo\" auth method will make it accessible at /auth/foo.", - "operationId": "WriteAuthMethod", + "operationId": "auth-enable-method", "tags": [ "system" ], @@ -9980,26 +9656,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteAuthMethodRequest" + "$ref": "#/components/schemas/AuthEnableMethodRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Disable the auth method at the given auth path", - "operationId": "DeleteAuthMethod", + "operationId": "auth-disable-method", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -10021,20 +9697,27 @@ "get": { "summary": "Reads the given auth path's configuration.", "description": "This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`.", - "operationId": "ReadAuthMethodTune", + "operationId": "auth-read-tuning-information", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/AuthReadTuningInformationResponse" + } + } + } } } }, "post": { "summary": "Tune configuration parameters for a given auth path.", "description": "This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`.", - "operationId": "WriteAuthMethodTune", + "operationId": "auth-tune-configuration-parameters", "tags": [ "system" ], @@ -10043,13 +9726,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteAuthMethodTuneRequest" + "$ref": "#/components/schemas/AuthTuneConfigurationParametersRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -10058,8 +9741,7 @@ "/sys/capabilities": { "description": "Fetches the capabilities of the given token on the given path.", "post": { - "summary": "Fetches the capabilities of the given token on the given path.", - "operationId": "WriteCapabilities", + "operationId": "query-token-capabilities", "tags": [ "system" ], @@ -10068,7 +9750,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteCapabilitiesRequest" + "$ref": "#/components/schemas/QueryTokenCapabilitiesRequest" } } } @@ -10083,8 +9765,7 @@ "/sys/capabilities-accessor": { "description": "Fetches the capabilities of the token associated with the given token, on the given path.", "post": { - "summary": "Fetches the capabilities of the token associated with the given token, on the given path.", - "operationId": "WriteCapabilitiesAccessor", + "operationId": "query-token-accessor-capabilities", "tags": [ "system" ], @@ -10093,7 +9774,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteCapabilitiesAccessorRequest" + "$ref": "#/components/schemas/QueryTokenAccessorCapabilitiesRequest" } } } @@ -10108,8 +9789,7 @@ "/sys/capabilities-self": { "description": "Fetches the capabilities of the given token on the given path.", "post": { - "summary": "Fetches the capabilities of the given token on the given path.", - "operationId": "WriteCapabilitiesSelf", + "operationId": "query-token-self-capabilities", "tags": [ "system" ], @@ -10118,7 +9798,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteCapabilitiesSelfRequest" + "$ref": "#/components/schemas/QueryTokenSelfCapabilitiesRequest" } } } @@ -10135,13 +9815,20 @@ "x-vault-sudo": true, "get": { "summary": "List the request headers that are configured to be audited.", - "operationId": "ReadConfigAuditingRequestHeaders", + "operationId": "auditing-list-request-headers", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/AuditingListRequestHeadersResponse" + } + } + } } } } @@ -10161,7 +9848,7 @@ "x-vault-sudo": true, "get": { "summary": "List the information for the given request header.", - "operationId": "ReadConfigAuditingRequestHeader", + "operationId": "auditing-read-request-header-information", "tags": [ "system" ], @@ -10173,7 +9860,7 @@ }, "post": { "summary": "Enable auditing of a header.", - "operationId": "WriteConfigAuditingRequestHeader", + "operationId": "auditing-enable-request-header", "tags": [ "system" ], @@ -10182,26 +9869,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteConfigAuditingRequestHeaderRequest" + "$ref": "#/components/schemas/AuditingEnableRequestHeaderRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Disable auditing of the given request header.", - "operationId": "DeleteConfigAuditingRequestHeader", + "operationId": "auditing-disable-request-header", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -10211,19 +9898,26 @@ "x-vault-sudo": true, "get": { "summary": "Return the current CORS settings.", - "operationId": "ReadConfigCORS", + "operationId": "cors-read-configuration", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/CorsReadConfigurationResponse" + } + } + } } } }, "post": { "summary": "Configure the CORS settings.", - "operationId": "WriteConfigCORS", + "operationId": "cors-configure", "tags": [ "system" ], @@ -10232,26 +9926,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteConfigCORSRequest" + "$ref": "#/components/schemas/CorsConfigureRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Remove any CORS settings.", - "operationId": "DeleteConfigCORS", + "operationId": "cors-delete-configuration", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -10269,12 +9963,12 @@ ], "post": { "summary": "Reload the given subsystem", - "operationId": "WriteConfigReloadSubsystem", + "operationId": "reload-subsystem", "tags": [ "system" ], "responses": { - "200": { + "204": { "description": "OK" } } @@ -10284,7 +9978,7 @@ "get": { "summary": "Return a sanitized version of the Vault server configuration.", "description": "The sanitized output strips configuration values in the storage, HA storage, and seals stanzas, which may contain sensitive values such as API tokens. It also removes any token or secret fields in other stanzas, such as the circonus_api_token from telemetry.", - "operationId": "ReadConfigStateSanitized", + "operationId": "read-sanitized-configuration-state", "tags": [ "system" ], @@ -10300,7 +9994,7 @@ "x-vault-sudo": true, "get": { "summary": "Return a list of configured UI headers.", - "operationId": "ListConfigUIHeaders", + "operationId": "ui-headers-list", "tags": [ "system" ], @@ -10320,7 +10014,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/UiHeadersListResponse" + } + } + } } } } @@ -10341,19 +10042,26 @@ "x-vault-sudo": true, "get": { "summary": "Return the given UI header's configuration", - "operationId": "ReadConfigUIHeader", + "operationId": "ui-headers-read-configuration", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/UiHeadersReadConfigurationResponse" + } + } + } } } }, "post": { "summary": "Configure the values to be returned for the UI header.", - "operationId": "WriteConfigUIHeader", + "operationId": "ui-headers-configure", "tags": [ "system" ], @@ -10362,7 +10070,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteConfigUIHeaderRequest" + "$ref": "#/components/schemas/UiHeadersConfigureRequest" } } } @@ -10375,13 +10083,28 @@ }, "delete": { "summary": "Remove a UI header.", - "operationId": "DeleteConfigUIHeader", + "operationId": "ui-headers-delete-configuration", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" + } + } + } + }, + "/sys/experiments": { + "description": "Returns information about Vault's experimental features. Should NOT be used in production.", + "get": { + "summary": "Returns the available and enabled experiments", + "operationId": "list-experimental-features", + "tags": [ + "system" + ], + "responses": { + "200": { + "description": "OK" } } } @@ -10390,20 +10113,27 @@ "description": "Reads, generates, or deletes a root token regeneration process.", "get": { "summary": "Read the configuration and progress of the current root generation attempt.", - "operationId": "ReadGenerateRoot", + "operationId": "root-token-generation-read-progress2", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RootTokenGenerationReadProgress2Response" + } + } + } } } }, "post": { "summary": "Initializes a new root generation attempt.", "description": "Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required.", - "operationId": "WriteGenerateRoot", + "operationId": "root-token-generation-initialize-2", "tags": [ "system" ], @@ -10412,26 +10142,33 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteGenerateRootRequest" + "$ref": "#/components/schemas/RootTokenGenerationInitialize2Request" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RootTokenGenerationInitialize2Response" + } + } + } } } }, "delete": { "summary": "Cancels any in-progress root generation attempt.", - "operationId": "DeleteGenerateRoot", + "operationId": "root-token-generation-cancel-2", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -10441,20 +10178,27 @@ "x-vault-unauthenticated": true, "get": { "summary": "Read the configuration and progress of the current root generation attempt.", - "operationId": "ReadGenerateRootAttempt", + "operationId": "root-token-generation-read-progress", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RootTokenGenerationReadProgressResponse" + } + } + } } } }, "post": { "summary": "Initializes a new root generation attempt.", "description": "Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required.", - "operationId": "WriteGenerateRootAttempt", + "operationId": "root-token-generation-initialize", "tags": [ "system" ], @@ -10463,26 +10207,33 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteGenerateRootAttemptRequest" + "$ref": "#/components/schemas/RootTokenGenerationInitializeRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RootTokenGenerationInitializeResponse" + } + } + } } } }, "delete": { "summary": "Cancels any in-progress root generation attempt.", - "operationId": "DeleteGenerateRootAttempt", + "operationId": "root-token-generation-cancel", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -10493,7 +10244,7 @@ "post": { "summary": "Enter a single unseal key share to progress the root generation attempt.", "description": "If the threshold number of unseal key shares is reached, Vault will complete the root generation and issue the new token. Otherwise, this API must be called multiple times until that threshold is met. The attempt nonce must be provided with each call.", - "operationId": "WriteGenerateRootUpdate", + "operationId": "root-token-generation-update", "tags": [ "system" ], @@ -10502,14 +10253,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteGenerateRootUpdateRequest" + "$ref": "#/components/schemas/RootTokenGenerationUpdateRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RootTokenGenerationUpdateResponse" + } + } + } } } } @@ -10518,13 +10276,20 @@ "description": "Provides information about the nodes in an HA cluster.", "get": { "summary": "Check the HA status of a Vault cluster", - "operationId": "ReadHAStatus", + "operationId": "ha-status", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/HaStatusResponse" + } + } + } } } } @@ -10534,7 +10299,7 @@ "x-vault-unauthenticated": true, "get": { "summary": "Returns the health status of Vault.", - "operationId": "ReadHealth", + "operationId": "read-health-status", "tags": [ "system" ], @@ -10562,13 +10327,20 @@ "get": { "summary": "Information about the host instance that this Vault server is running on.", "description": "Information about the host instance that this Vault server is running on.\n\t\tThe information that gets collected includes host hardware information, and CPU,\n\t\tdisk, and memory utilization", - "operationId": "ReadHostInfo", + "operationId": "collect-host-information", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/CollectHostInformationResponse" + } + } + } } } } @@ -10577,7 +10349,7 @@ "get": { "summary": "reports in-flight requests", "description": "This path responds to the following HTTP methods.\n\t\tGET /\n\t\t\tReturns a map of in-flight requests.", - "operationId": "ReadInFlightRequests", + "operationId": "collect-in-flight-request-information", "tags": [ "system" ], @@ -10593,7 +10365,7 @@ "x-vault-unauthenticated": true, "get": { "summary": "Returns the initialization status of Vault.", - "operationId": "ReadInit", + "operationId": "read-initialization-status", "tags": [ "system" ], @@ -10606,7 +10378,7 @@ "post": { "summary": "Initialize a new Vault.", "description": "The Vault must not have been previously initialized. The recovery options, as well as the stored shares option, are only available when using Vault HSM.", - "operationId": "WriteInit", + "operationId": "initialize", "tags": [ "system" ], @@ -10615,7 +10387,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteInitRequest" + "$ref": "#/components/schemas/InitializeRequest" } } } @@ -10631,7 +10403,7 @@ "description": "Query the historical count of clients.", "get": { "summary": "Report the client count metrics, for this namespace and all child namespaces.", - "operationId": "ReadInternalCountersActivity", + "operationId": "internal-client-activity-report-counts", "tags": [ "system" ], @@ -10646,7 +10418,7 @@ "description": "Export the historical activity of clients.", "get": { "summary": "Report the client count metrics, for this namespace and all child namespaces.", - "operationId": "ReadInternalCountersActivityExport", + "operationId": "internal-client-activity-export", "tags": [ "system" ], @@ -10661,7 +10433,7 @@ "description": "Count of active clients so far this month.", "get": { "summary": "Report the number of clients for this month, for this namespace and all child namespaces.", - "operationId": "ReadInternalCountersActivityMonthly", + "operationId": "internal-client-activity-report-counts-this-month", "tags": [ "system" ], @@ -10676,7 +10448,7 @@ "description": "Control the collection and reporting of client counts.", "get": { "summary": "Read the client count tracking configuration.", - "operationId": "ReadInternalCountersConfig", + "operationId": "internal-client-activity-read-configuration", "tags": [ "system" ], @@ -10688,7 +10460,7 @@ }, "post": { "summary": "Enable or disable collection of client count, set retention period, or set default reporting period.", - "operationId": "WriteInternalCountersConfig", + "operationId": "internal-client-activity-configure", "tags": [ "system" ], @@ -10697,7 +10469,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteInternalCountersConfigRequest" + "$ref": "#/components/schemas/InternalClientActivityConfigureRequest" } } } @@ -10713,13 +10485,20 @@ "description": "Count of active entities in this Vault cluster.", "get": { "summary": "Backwards compatibility is not guaranteed for this API", - "operationId": "ReadInternalCountersEntities", + "operationId": "internal-count-entities", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalCountEntitiesResponse" + } + } + } } } } @@ -10728,7 +10507,7 @@ "description": "Currently unsupported. Previously, count of requests seen by this Vault cluster over time.", "get": { "summary": "Backwards compatibility is not guaranteed for this API", - "operationId": "ReadInternalCountersRequests", + "operationId": "internal-count-requests", "tags": [ "system" ], @@ -10736,20 +10515,28 @@ "200": { "description": "OK" } - } + }, + "deprecated": true } }, "/sys/internal/counters/tokens": { "description": "Count of active tokens in this Vault cluster.", "get": { "summary": "Backwards compatibility is not guaranteed for this API", - "operationId": "ReadInternalCountersTokens", + "operationId": "internal-count-tokens", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalCountTokensResponse" + } + } + } } } } @@ -10770,7 +10557,7 @@ "x-vault-sudo": true, "get": { "summary": "Expose the route entry and mount entry tables present in the router", - "operationId": "ReadInternalInspectRouter", + "operationId": "internal-inspect-router", "tags": [ "system" ], @@ -10782,10 +10569,21 @@ } }, "/sys/internal/specs/openapi": { + "description": "Generate an OpenAPI 3 document of all mounted paths.", + "parameters": [ + { + "name": "generic_mount_paths", + "description": "Use generic mount paths", + "in": "query", + "schema": { + "type": "boolean", + "default": false + } + } + ], "x-vault-unauthenticated": true, "get": { - "summary": "Generate an OpenAPI 3 document of all mounted paths.", - "operationId": "ReadInternalSpecsOpenAPI", + "operationId": "internal-generate-open-api-document", "tags": [ "system" ], @@ -10794,19 +10592,47 @@ "description": "OK" } } + }, + "post": { + "operationId": "internal-generate-open-api-document2", + "tags": [ + "system" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalGenerateOpenApiDocument2Request" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } } }, "/sys/internal/ui/feature-flags": { "description": "Enabled feature flags. Internal API; its location, inputs, and outputs may change.", "get": { "summary": "Lists enabled feature flags.", - "operationId": "ReadInternalUIFeatureFlags", + "operationId": "internal-ui-list-enabled-feature-flags", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalUiListEnabledFeatureFlagsResponse" + } + } + } } } } @@ -10816,13 +10642,20 @@ "x-vault-unauthenticated": true, "get": { "summary": "Lists all enabled and visible auth and secrets mounts.", - "operationId": "ReadInternalUIMounts", + "operationId": "internal-ui-list-enabled-visible-mounts", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalUiListEnabledVisibleMountsResponse" + } + } + } } } } @@ -10843,13 +10676,20 @@ "x-vault-unauthenticated": true, "get": { "summary": "Return information about the given mount.", - "operationId": "ReadInternalUIMount", + "operationId": "internal-ui-read-mount-information", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalUiReadMountInformationResponse" + } + } + } } } } @@ -10859,13 +10699,20 @@ "x-vault-unauthenticated": true, "get": { "summary": "Backwards compatibility is not guaranteed for this API", - "operationId": "ReadInternalUINamespaces", + "operationId": "internal-ui-list-namespaces", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalUiListNamespacesResponse" + } + } + } } } } @@ -10874,13 +10721,23 @@ "description": "Information about a token's resultant ACL. Internal API; its location, inputs, and outputs may change.", "get": { "summary": "Backwards compatibility is not guaranteed for this API", - "operationId": "ReadInternalUIResultantACL", + "operationId": "internal-ui-read-resultant-acl", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/InternalUiReadResultantAclResponse" + } + } + } + }, + "204": { + "description": "empty response returned if no client token" } } } @@ -10889,7 +10746,7 @@ "description": "Provides information about the backend encryption key.", "get": { "summary": "Provides information about the backend encryption key.", - "operationId": "ReadKeyStatus", + "operationId": "encryption-key-status", "tags": [ "system" ], @@ -10905,13 +10762,20 @@ "x-vault-unauthenticated": true, "get": { "summary": "Returns the high availability status and current leader instance of Vault.", - "operationId": "ReadLeader", + "operationId": "leader-status", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/LeaderStatusResponse" + } + } + } } } } @@ -10920,14 +10784,20 @@ "description": "List leases associated with this Vault cluster", "x-vault-sudo": true, "get": { - "summary": "List leases associated with this Vault cluster", - "operationId": "ReadLeases", + "operationId": "leases-list", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/LeasesListResponse" + } + } + } } } } @@ -10935,14 +10805,20 @@ "/sys/leases/count": { "description": "Count of leases associated with this Vault cluster", "get": { - "summary": "Count of leases associated with this Vault cluster", - "operationId": "ReadLeasesCount", + "operationId": "leases-count", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/LeasesCountResponse" + } + } + } } } } @@ -10950,8 +10826,7 @@ "/sys/leases/lookup": { "description": "View or list lease metadata.", "post": { - "summary": "Retrieve lease metadata.", - "operationId": "WriteLeasesLookup", + "operationId": "leases-read-lease", "tags": [ "system" ], @@ -10960,14 +10835,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLeasesLookupRequest" + "$ref": "#/components/schemas/LeasesReadLeaseRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/LeasesReadLeaseResponse" + } + } + } } } } @@ -10976,8 +10858,7 @@ "description": "View or list lease metadata.", "x-vault-sudo": true, "get": { - "summary": "Returns a list of lease ids.", - "operationId": "SysListLeasesLookup", + "operationId": "leases-look-up", "tags": [ "system" ], @@ -10997,7 +10878,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/LeasesLookUpResponse" + } + } + } } } } @@ -11017,8 +10905,7 @@ ], "x-vault-sudo": true, "get": { - "summary": "Returns a list of lease ids.", - "operationId": "ListLeasesLookupPrefix", + "operationId": "leases-look-up-with-prefix", "tags": [ "system" ], @@ -11038,7 +10925,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/LeasesLookUpWithPrefixResponse" + } + } + } } } } @@ -11047,7 +10941,7 @@ "description": "Renew a lease on a secret", "post": { "summary": "Renews a lease, requesting to extend the lease.", - "operationId": "WriteLeasesRenew", + "operationId": "leases-renew-lease", "tags": [ "system" ], @@ -11056,13 +10950,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLeasesRenewRequest" + "$ref": "#/components/schemas/LeasesRenewLeaseRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -11083,7 +10977,7 @@ ], "post": { "summary": "Renews a lease, requesting to extend the lease.", - "operationId": "WriteLeasesRenew2", + "operationId": "leases-renew-lease-with-id", "tags": [ "system" ], @@ -11092,13 +10986,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLeasesRenew2Request" + "$ref": "#/components/schemas/LeasesRenewLeaseWithIdRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -11108,7 +11002,7 @@ "description": "Revoke a leased secret immediately", "post": { "summary": "Revokes a lease immediately.", - "operationId": "WriteLeasesRevoke", + "operationId": "leases-revoke-lease", "tags": [ "system" ], @@ -11117,13 +11011,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLeasesRevokeRequest" + "$ref": "#/components/schemas/LeasesRevokeLeaseRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -11146,12 +11040,12 @@ "post": { "summary": "Revokes all secrets or tokens generated under a given prefix immediately", "description": "Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation.\n\nBy ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled.", - "operationId": "WriteLeasesRevokeForce", + "operationId": "leases-force-revoke-lease-with-prefix", "tags": [ "system" ], "responses": { - "200": { + "204": { "description": "OK" } } @@ -11173,7 +11067,7 @@ "x-vault-sudo": true, "post": { "summary": "Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately.", - "operationId": "WriteLeasesRevokePrefix", + "operationId": "leases-revoke-lease-with-prefix", "tags": [ "system" ], @@ -11182,13 +11076,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLeasesRevokePrefixRequest" + "$ref": "#/components/schemas/LeasesRevokeLeaseWithPrefixRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -11209,7 +11103,7 @@ ], "post": { "summary": "Revokes a lease immediately.", - "operationId": "WriteLeasesRevoke2", + "operationId": "leases-revoke-lease-with-id", "tags": [ "system" ], @@ -11218,13 +11112,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLeasesRevoke2Request" + "$ref": "#/components/schemas/LeasesRevokeLeaseWithIdRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -11233,8 +11127,22 @@ "/sys/leases/tidy": { "description": "This endpoint performs cleanup tasks that can be run if certain error conditions have occurred.", "post": { - "summary": "This endpoint performs cleanup tasks that can be run if certain error\nconditions have occurred.", - "operationId": "WriteLeasesTidy", + "operationId": "leases-tidy", + "tags": [ + "system" + ], + "responses": { + "204": { + "description": "OK" + } + } + } + }, + "/sys/locked-users": { + "description": "Report the locked user count metrics", + "get": { + "summary": "Report the locked user count metrics, for this namespace and all child namespaces.", + "operationId": "locked-users-list", "tags": [ "system" ], @@ -11245,7 +11153,7 @@ } } }, - "/sys/lockedusers/{mount_accessor}/unlock/{alias_identifier}": { + "/sys/locked-users/{mount_accessor}/unlock/{alias_identifier}": { "description": "Unlock the locked user with given mount_accessor and alias_identifier.", "parameters": [ { @@ -11269,7 +11177,7 @@ ], "post": { "summary": "Unlocks the user with given mount_accessor and alias_identifier", - "operationId": "SysWriteLockedusersMountAccessorUnlockAliasIdentifier", + "operationId": "locked-users-unlock", "tags": [ "system" ], @@ -11283,7 +11191,7 @@ "/sys/loggers": { "get": { "summary": "Read the log level for all existing loggers.", - "operationId": "ReadLoggers", + "operationId": "loggers-read-verbosity-level", "tags": [ "system" ], @@ -11295,7 +11203,7 @@ }, "post": { "summary": "Modify the log level for all existing loggers.", - "operationId": "WriteLoggers", + "operationId": "loggers-update-verbosity-level", "tags": [ "system" ], @@ -11304,26 +11212,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLoggersRequest" + "$ref": "#/components/schemas/LoggersUpdateVerbosityLevelRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Revert the all loggers to use log level provided in config.", - "operationId": "DeleteLoggers", + "operationId": "loggers-revert-verbosity-level", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -11342,7 +11250,7 @@ ], "get": { "summary": "Read the log level for a single logger.", - "operationId": "ReadLogger", + "operationId": "loggers-read-verbosity-level-for", "tags": [ "system" ], @@ -11354,7 +11262,7 @@ }, "post": { "summary": "Modify the log level of a single logger.", - "operationId": "WriteLogger", + "operationId": "loggers-update-verbosity-level-for", "tags": [ "system" ], @@ -11363,26 +11271,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteLoggerRequest" + "$ref": "#/components/schemas/LoggersUpdateVerbosityLevelForRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Revert a single logger to use log level provided in config.", - "operationId": "DeleteLogger", + "operationId": "loggers-revert-verbosity-level-for", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -11400,8 +11308,7 @@ } ], "get": { - "summary": "Export the metrics aggregated for telemetry purpose.", - "operationId": "ReadMetrics", + "operationId": "metrics", "tags": [ "system" ], @@ -11416,7 +11323,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token", - "operationId": "MFAValidate", + "operationId": "mfa-validate", "tags": [ "system" ], @@ -11425,7 +11332,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MFAValidateRequest" + "$ref": "#/components/schemas/MfaValidateRequest" } } } @@ -11458,7 +11365,7 @@ } ], "get": { - "operationId": "Monitor", + "operationId": "monitor", "tags": [ "system" ], @@ -11472,8 +11379,7 @@ "/sys/mounts": { "description": "List the currently mounted backends.", "get": { - "summary": "List the currently mounted backends.", - "operationId": "ReadMounts", + "operationId": "mounts-list-secrets-engines", "tags": [ "system" ], @@ -11499,19 +11405,26 @@ ], "get": { "summary": "Read the configuration of the secret engine at the given path.", - "operationId": "ReadMount", + "operationId": "mounts-read-configuration", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/MountsReadConfigurationResponse" + } + } + } } } }, "post": { "summary": "Enable a new secrets engine at the given path.", - "operationId": "WriteMount", + "operationId": "mounts-enable-secrets-engine", "tags": [ "system" ], @@ -11520,26 +11433,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteMountRequest" + "$ref": "#/components/schemas/MountsEnableSecretsEngineRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Disable the mount point specified at the given path.", - "operationId": "DeleteMount", + "operationId": "mounts-disable-secrets-engine", "tags": [ "system" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK" } } } @@ -11558,20 +11471,25 @@ } ], "get": { - "summary": "Tune backend configuration parameters for this mount.", - "operationId": "ReadMountsConfig", + "operationId": "mounts-read-tuning-information", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/MountsReadTuningInformationResponse" + } + } + } } } }, "post": { - "summary": "Tune backend configuration parameters for this mount.", - "operationId": "WriteMountsConfig", + "operationId": "mounts-tune-configuration-parameters", "tags": [ "system" ], @@ -11580,7 +11498,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteMountsConfigRequest" + "$ref": "#/components/schemas/MountsTuneConfigurationParametersRequest" } } } @@ -11595,14 +11513,20 @@ "/sys/plugins/catalog": { "description": "Lists all the plugins known to Vault", "get": { - "summary": "Lists all the plugins known to Vault", - "operationId": "ReadPluginsCatalog", + "operationId": "plugins-catalog-list-plugins", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsCatalogListPluginsResponse" + } + } + } } } } @@ -11623,19 +11547,26 @@ "x-vault-sudo": true, "get": { "summary": "Return the configuration data for the plugin with the given name.", - "operationId": "SysReadPluginsCatalogName", + "operationId": "plugins-catalog-read-plugin-configuration", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsCatalogReadPluginConfigurationResponse" + } + } + } } } }, "post": { "summary": "Register a new plugin, or updates an existing one with the supplied name.", - "operationId": "SysWritePluginsCatalogName", + "operationId": "plugins-catalog-register-plugin", "tags": [ "system" ], @@ -11644,7 +11575,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SysWritePluginsCatalogNameRequest" + "$ref": "#/components/schemas/PluginsCatalogRegisterPluginRequest" } } } @@ -11657,13 +11588,13 @@ }, "delete": { "summary": "Remove the plugin with the given name.", - "operationId": "SysDeletePluginsCatalogName", + "operationId": "plugins-catalog-remove-plugin", "tags": [ "system" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK" } } } @@ -11684,7 +11615,7 @@ "x-vault-sudo": true, "get": { "summary": "List the plugins in the catalog.", - "operationId": "ListPluginsCatalogByType", + "operationId": "plugins-catalog-list-plugins-with-type", "tags": [ "system" ], @@ -11704,7 +11635,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsCatalogListPluginsWithTypeResponse" + } + } + } } } } @@ -11734,19 +11672,26 @@ "x-vault-sudo": true, "get": { "summary": "Return the configuration data for the plugin with the given name.", - "operationId": "ReadPluginsCatalogByTypeByName", + "operationId": "plugins-catalog-read-plugin-configuration-with-type", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsCatalogReadPluginConfigurationWithTypeResponse" + } + } + } } } }, "post": { "summary": "Register a new plugin, or updates an existing one with the supplied name.", - "operationId": "WritePluginsCatalogByTypeByName", + "operationId": "plugins-catalog-register-plugin-with-type", "tags": [ "system" ], @@ -11755,7 +11700,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WritePluginsCatalogByTypeByNameRequest" + "$ref": "#/components/schemas/PluginsCatalogRegisterPluginWithTypeRequest" } } } @@ -11768,13 +11713,13 @@ }, "delete": { "summary": "Remove the plugin with the given name.", - "operationId": "DeletePluginsCatalogByTypeByName", + "operationId": "plugins-catalog-remove-plugin-with-type", "tags": [ "system" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK" } } } @@ -11784,7 +11729,7 @@ "post": { "summary": "Reload mounted plugin backends.", "description": "Either the plugin name (`plugin`) or the desired plugin backend mounts (`mounts`) must be provided, but not both. In the case that the plugin name is provided, all mounted paths that use that plugin backend will be reloaded. If (`scope`) is provided and is (`global`), the plugin(s) are reloaded globally.", - "operationId": "WritePluginsReloadBackend", + "operationId": "plugins-reload-backends", "tags": [ "system" ], @@ -11793,14 +11738,31 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WritePluginsReloadBackendRequest" + "$ref": "#/components/schemas/PluginsReloadBackendsRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsReloadBackendsResponse" + } + } + } + }, + "202": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsReloadBackendsResponse" + } + } + } } } } @@ -11808,8 +11770,7 @@ "/sys/policies/acl": { "description": "List the configured access control policies.", "get": { - "summary": "List the configured access control policies.", - "operationId": "ListPoliciesACL", + "operationId": "policies-list-acl-policies", "tags": [ "system" ], @@ -11829,7 +11790,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PoliciesListAclPoliciesResponse" + } + } + } } } } @@ -11849,19 +11817,26 @@ ], "get": { "summary": "Retrieve information about the named ACL policy.", - "operationId": "ReadPoliciesACL", + "operationId": "policies-read-acl-policy", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PoliciesReadAclPolicyResponse" + } + } + } } } }, "post": { "summary": "Add a new or update an existing ACL policy.", - "operationId": "WritePoliciesACL", + "operationId": "policies-write-acl-policy", "tags": [ "system" ], @@ -11870,26 +11845,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WritePoliciesACLRequest" + "$ref": "#/components/schemas/PoliciesWriteAclPolicyRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Delete the ACL policy with the given name.", - "operationId": "DeletePoliciesACL", + "operationId": "policies-delete-acl-policy", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -11897,7 +11872,7 @@ "/sys/policies/password": { "get": { "summary": "List the existing password policies.", - "operationId": "ListPoliciesPassword", + "operationId": "policies-list-password-policies", "tags": [ "system" ], @@ -11917,7 +11892,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PoliciesListPasswordPoliciesResponse" + } + } + } } } } @@ -11937,19 +11919,26 @@ ], "get": { "summary": "Retrieve an existing password policy.", - "operationId": "ReadPoliciesPassword", + "operationId": "policies-read-password-policy", "tags": [ "system" ], "responses": { - "200": { - "description": "OK" + "204": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PoliciesReadPasswordPolicyResponse" + } + } + } } } }, "post": { "summary": "Add a new or update an existing password policy.", - "operationId": "WritePoliciesPassword", + "operationId": "policies-write-password-policy", "tags": [ "system" ], @@ -11958,26 +11947,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WritePoliciesPasswordRequest" + "$ref": "#/components/schemas/PoliciesWritePasswordPolicyRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Delete a password policy.", - "operationId": "DeletePoliciesPassword", + "operationId": "policies-delete-password-policy", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -11997,13 +11986,20 @@ ], "get": { "summary": "Generate a password from an existing password policy.", - "operationId": "ReadPoliciesPasswordGenerate", + "operationId": "policies-generate-password-from-password-policy", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PoliciesGeneratePasswordFromPasswordPolicyResponse" + } + } + } } } } @@ -12011,8 +12007,7 @@ "/sys/policy": { "description": "List the configured access control policies.", "get": { - "summary": "List the configured access control policies.", - "operationId": "ReadPolicies", + "operationId": "policies-list", "tags": [ "system" ], @@ -12028,7 +12023,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PoliciesListResponse" + } + } + } } } } @@ -12048,19 +12050,26 @@ ], "get": { "summary": "Retrieve the policy body for the named policy.", - "operationId": "ReadPolicy", + "operationId": "policies-read-acl-policy2", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PoliciesReadAclPolicy2Response" + } + } + } } } }, "post": { "summary": "Add a new or update an existing policy.", - "operationId": "WritePolicy", + "operationId": "policies-write-acl-policy2", "tags": [ "system" ], @@ -12069,26 +12078,26 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WritePolicyRequest" + "$ref": "#/components/schemas/PoliciesWriteAclPolicy2Request" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } }, "delete": { "summary": "Delete the policy with the given name.", - "operationId": "DeletePolicy", + "operationId": "policies-delete-acl-policy2", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -12097,7 +12106,7 @@ "get": { "summary": "Returns an HTML page listing the available profiles.", "description": "Returns an HTML page listing the available \nprofiles. This should be mainly accessed via browsers or applications that can \nrender pages.", - "operationId": "PprofRead", + "operationId": "pprof-index", "tags": [ "system" ], @@ -12112,7 +12121,7 @@ "get": { "summary": "Returns a sampling of all past memory allocations.", "description": "Returns a sampling of all past memory allocations.", - "operationId": "PprofReadAllocs", + "operationId": "pprof-memory-allocations", "tags": [ "system" ], @@ -12127,7 +12136,7 @@ "get": { "summary": "Returns stack traces that led to blocking on synchronization primitives", "description": "Returns stack traces that led to blocking on synchronization primitives", - "operationId": "PprofReadBlock", + "operationId": "pprof-blocking", "tags": [ "system" ], @@ -12142,7 +12151,7 @@ "get": { "summary": "Returns the running program's command line.", "description": "Returns the running program's command line, with arguments separated by NUL bytes.", - "operationId": "PprofReadCmdline", + "operationId": "pprof-command-line", "tags": [ "system" ], @@ -12157,7 +12166,7 @@ "get": { "summary": "Returns stack traces of all current goroutines.", "description": "Returns stack traces of all current goroutines.", - "operationId": "PprofReadGoroutine", + "operationId": "pprof-goroutines", "tags": [ "system" ], @@ -12172,7 +12181,7 @@ "get": { "summary": "Returns a sampling of memory allocations of live object.", "description": "Returns a sampling of memory allocations of live object.", - "operationId": "PprofReadHeap", + "operationId": "pprof-memory-allocations-live", "tags": [ "system" ], @@ -12187,7 +12196,7 @@ "get": { "summary": "Returns stack traces of holders of contended mutexes", "description": "Returns stack traces of holders of contended mutexes", - "operationId": "PprofReadMutex", + "operationId": "pprof-mutexes", "tags": [ "system" ], @@ -12202,7 +12211,7 @@ "get": { "summary": "Returns a pprof-formatted cpu profile payload.", "description": "Returns a pprof-formatted cpu profile payload. Profiling lasts for duration specified in seconds GET parameter, or for 30 seconds if not specified.", - "operationId": "PprofReadProfile", + "operationId": "pprof-cpu-profile", "tags": [ "system" ], @@ -12217,7 +12226,7 @@ "get": { "summary": "Returns the program counters listed in the request.", "description": "Returns the program counters listed in the request.", - "operationId": "PprofReadSymbol", + "operationId": "pprof-symbols", "tags": [ "system" ], @@ -12232,7 +12241,7 @@ "get": { "summary": "Returns stack traces that led to the creation of new OS threads", "description": "Returns stack traces that led to the creation of new OS threads", - "operationId": "PprofReadThreadcreate", + "operationId": "pprof-thread-creations", "tags": [ "system" ], @@ -12247,7 +12256,7 @@ "get": { "summary": "Returns the execution trace in binary form.", "description": "Returns the execution trace in binary form. Tracing lasts for duration specified in seconds GET parameter, or for 1 second if not specified.", - "operationId": "PprofReadTrace", + "operationId": "pprof-execution-trace", "tags": [ "system" ], @@ -12261,18 +12270,25 @@ "/sys/quotas/config": { "description": "Create, update and read the quota configuration.", "get": { - "operationId": "ReadQuotasConfig", + "operationId": "rate-limit-quotas-read-configuration", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RateLimitQuotasReadConfigurationResponse" + } + } + } } } }, "post": { - "operationId": "WriteQuotasConfig", + "operationId": "rate-limit-quotas-configure", "tags": [ "system" ], @@ -12281,13 +12297,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteQuotasConfigRequest" + "$ref": "#/components/schemas/RateLimitQuotasConfigureRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -12296,7 +12312,7 @@ "/sys/quotas/rate-limit": { "description": "Lists the names of all the rate limit quotas.", "get": { - "operationId": "ListQuotasRateLimits", + "operationId": "rate-limit-quotas-list", "tags": [ "system" ], @@ -12316,7 +12332,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RateLimitQuotasListResponse" + } + } + } } } } @@ -12335,78 +12358,25 @@ } ], "get": { - "operationId": "ReadQuotasRateLimit", + "operationId": "rate-limit-quotas-read", "tags": [ "system" ], "responses": { "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "WriteQuotasRateLimit", - "tags": [ - "system" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/WriteQuotasRateLimitRequest" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RateLimitQuotasReadResponse" + } } } } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "DeleteQuotasRateLimit", - "tags": [ - "system" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/sys/raw": { - "description": "Write, Read, and Delete data directly in the Storage backend.", - "x-vault-sudo": true, - "x-vault-createSupported": true, - "get": { - "summary": "Read the value of the key at the given path.", - "operationId": "ReadRaw", - "tags": [ - "system" - ], - "parameters": [ - { - "name": "list", - "description": "Return a list if `true`", - "in": "query", - "schema": { - "type": "string" - } - } - ], - "responses": { - "200": { - "description": "OK" - } } }, "post": { - "summary": "Update the value of the key at the given path.", - "operationId": "WriteRaw", + "operationId": "rate-limit-quotas-write", "tags": [ "system" ], @@ -12415,97 +12385,25 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteRawRequest" + "$ref": "#/components/schemas/RateLimitQuotasWriteRequest" } } } }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "Delete the key with given path.", - "operationId": "DeleteRaw", - "tags": [ - "system" - ], "responses": { "204": { - "description": "empty body" - } - } - } - }, - "/sys/raw/{path}": { - "description": "Write, Read, and Delete data directly in the Storage backend.", - "parameters": [ - { - "name": "path", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - } - ], - "x-vault-sudo": true, - "x-vault-createSupported": true, - "get": { - "summary": "Read the value of the key at the given path.", - "operationId": "ReadRawPath", - "tags": [ - "system" - ], - "parameters": [ - { - "name": "list", - "description": "Return a list if `true`", - "in": "query", - "schema": { - "type": "string" - } - } - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Update the value of the key at the given path.", - "operationId": "WriteRawPath", - "tags": [ - "system" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/WriteRawPathRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" + "description": "No Content" } } }, "delete": { - "summary": "Delete the key with given path.", - "operationId": "DeleteRawPath", + "operationId": "rate-limit-quotas-delete", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -12514,25 +12412,32 @@ "description": "Allows fetching or deleting the backup of the rotated unseal keys.", "get": { "summary": "Return the backup copy of PGP-encrypted unseal keys.", - "operationId": "ReadRekeyBackup", + "operationId": "rekey-read-backup-key", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyReadBackupKeyResponse" + } + } + } } } }, "delete": { "summary": "Delete the backup copy of PGP-encrypted unseal keys.", - "operationId": "DeleteRekeyBackup", + "operationId": "rekey-delete-backup-key", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -12541,20 +12446,27 @@ "x-vault-unauthenticated": true, "get": { "summary": "Reads the configuration and progress of the current rekey attempt.", - "operationId": "ReadRekeyInit", + "operationId": "rekey-attempt-read-progress", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyAttemptReadProgressResponse" + } + } + } } } }, "post": { "summary": "Initializes a new rekey attempt.", "description": "Only a single rekey attempt can take place at a time, and changing the parameters of a rekey requires canceling and starting a new rekey, which will also provide a new nonce.", - "operationId": "WriteRekeyInit", + "operationId": "rekey-attempt-initialize", "tags": [ "system" ], @@ -12563,27 +12475,34 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteRekeyInitRequest" + "$ref": "#/components/schemas/RekeyAttemptInitializeRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyAttemptInitializeResponse" + } + } + } } } }, "delete": { "summary": "Cancels any in-progress rekey.", "description": "This clears the rekey settings as well as any progress made. This must be called to change the parameters of the rekey. Note: verification is still a part of a rekey. If rekeying is canceled during the verification flow, the current unseal keys remain valid.", - "operationId": "DeleteRekeyInit", + "operationId": "rekey-attempt-cancel", "tags": [ "system" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK" } } } @@ -12591,26 +12510,31 @@ "/sys/rekey/recovery-key-backup": { "description": "Allows fetching or deleting the backup of the rotated unseal keys.", "get": { - "summary": "Allows fetching or deleting the backup of the rotated unseal keys.", - "operationId": "ReadRekeyRecoveryKeyBackup", + "operationId": "rekey-read-backup-recovery-key", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyReadBackupRecoveryKeyResponse" + } + } + } } } }, "delete": { - "summary": "Allows fetching or deleting the backup of the rotated unseal keys.", - "operationId": "DeleteRekeyRecoveryKeyBackup", + "operationId": "rekey-delete-backup-recovery-key", "tags": [ "system" ], "responses": { "204": { - "description": "empty body" + "description": "OK" } } } @@ -12619,7 +12543,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Enter a single unseal key share to progress the rekey of the Vault.", - "operationId": "WriteRekeyUpdate", + "operationId": "rekey-attempt-update", "tags": [ "system" ], @@ -12628,14 +12552,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteRekeyUpdateRequest" + "$ref": "#/components/schemas/RekeyAttemptUpdateRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyAttemptUpdateResponse" + } + } + } } } } @@ -12644,19 +12575,26 @@ "x-vault-unauthenticated": true, "get": { "summary": "Read the configuration and progress of the current rekey verification attempt.", - "operationId": "ReadRekeyVerify", + "operationId": "rekey-verification-read-progress", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyVerificationReadProgressResponse" + } + } + } } } }, "post": { "summary": "Enter a single new key share to progress the rekey verification operation.", - "operationId": "WriteRekeyVerify", + "operationId": "rekey-verification-update", "tags": [ "system" ], @@ -12665,27 +12603,41 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteRekeyVerifyRequest" + "$ref": "#/components/schemas/RekeyVerificationUpdateRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyVerificationUpdateResponse" + } + } + } } } }, "delete": { "summary": "Cancel any in-progress rekey verification operation.", "description": "This clears any progress made and resets the nonce. Unlike a `DELETE` against `sys/rekey/init`, this only resets the current verification operation, not the entire rekey atttempt.", - "operationId": "DeleteRekeyVerify", + "operationId": "rekey-verification-cancel", "tags": [ "system" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RekeyVerificationCancelResponse" + } + } + } } } } @@ -12695,7 +12647,7 @@ "x-vault-sudo": true, "post": { "summary": "Initiate a mount migration", - "operationId": "Remount", + "operationId": "remount", "tags": [ "system" ], @@ -12711,7 +12663,14 @@ }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RemountResponse" + } + } + } } } } @@ -12731,13 +12690,20 @@ ], "get": { "summary": "Check status of a mount migration", - "operationId": "ReadRemountStatus", + "operationId": "remount-status", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/RemountStatusResponse" + } + } + } } } } @@ -12746,7 +12712,7 @@ "description": "Renew a lease on a secret", "post": { "summary": "Renews a lease, requesting to extend the lease.", - "operationId": "Renew", + "operationId": "leases-renew-lease2", "tags": [ "system" ], @@ -12755,13 +12721,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RenewRequest" + "$ref": "#/components/schemas/LeasesRenewLease2Request" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -12782,7 +12748,7 @@ ], "post": { "summary": "Renews a lease, requesting to extend the lease.", - "operationId": "RenewFor", + "operationId": "leases-renew-lease-with-id2", "tags": [ "system" ], @@ -12791,13 +12757,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RenewForRequest" + "$ref": "#/components/schemas/LeasesRenewLeaseWithId2Request" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -12806,7 +12772,7 @@ "/sys/replication/status": { "x-vault-unauthenticated": true, "get": { - "operationId": "ReadReplicationStatus", + "operationId": "replication-status", "tags": [ "system" ], @@ -12821,7 +12787,7 @@ "description": "Revoke a leased secret immediately", "post": { "summary": "Revokes a lease immediately.", - "operationId": "Revoke", + "operationId": "leases-revoke-lease2", "tags": [ "system" ], @@ -12830,13 +12796,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RevokeRequest" + "$ref": "#/components/schemas/LeasesRevokeLease2Request" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -12859,12 +12825,12 @@ "post": { "summary": "Revokes all secrets or tokens generated under a given prefix immediately", "description": "Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation.\n\nBy ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled.", - "operationId": "RevokeForce", + "operationId": "leases-force-revoke-lease-with-prefix2", "tags": [ "system" ], "responses": { - "200": { + "204": { "description": "OK" } } @@ -12886,7 +12852,7 @@ "x-vault-sudo": true, "post": { "summary": "Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately.", - "operationId": "RevokePrefix", + "operationId": "leases-revoke-lease-with-prefix2", "tags": [ "system" ], @@ -12895,13 +12861,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RevokePrefixRequest" + "$ref": "#/components/schemas/LeasesRevokeLeaseWithPrefix2Request" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -12922,7 +12888,7 @@ ], "post": { "summary": "Revokes a lease immediately.", - "operationId": "RevokeLease", + "operationId": "leases-revoke-lease-with-id2", "tags": [ "system" ], @@ -12931,13 +12897,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RevokeLeaseRequest" + "$ref": "#/components/schemas/LeasesRevokeLeaseWithId2Request" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -12947,13 +12913,12 @@ "description": "Rotates the backend encryption key used to persist data.", "x-vault-sudo": true, "post": { - "summary": "Rotates the backend encryption key used to persist data.", - "operationId": "Rotate", + "operationId": "encryption-key-rotate", "tags": [ "system" ], "responses": { - "200": { + "204": { "description": "OK" } } @@ -12962,18 +12927,25 @@ "/sys/rotate/config": { "description": "Configures settings related to the backend encryption key management.", "get": { - "operationId": "ReadRotateConfig", + "operationId": "encryption-key-read-rotation-configuration", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/EncryptionKeyReadRotationConfigurationResponse" + } + } + } } } }, "post": { - "operationId": "WriteRotateConfig", + "operationId": "encryption-key-configure-rotation", "tags": [ "system" ], @@ -12982,13 +12954,13 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WriteRotateConfigRequest" + "$ref": "#/components/schemas/EncryptionKeyConfigureRotationRequest" } } } }, "responses": { - "200": { + "204": { "description": "OK" } } @@ -12998,12 +12970,12 @@ "description": "Seals the Vault.", "post": { "summary": "Seal the Vault.", - "operationId": "Seal", + "operationId": "seal", "tags": [ "system" ], "responses": { - "200": { + "204": { "description": "OK" } } @@ -13014,13 +12986,20 @@ "x-vault-unauthenticated": true, "get": { "summary": "Check the seal status of a Vault.", - "operationId": "ReadSealStatus", + "operationId": "seal-status", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/SealStatusResponse" + } + } + } } } } @@ -13029,7 +13008,7 @@ "post": { "summary": "Cause the node to give up active status.", "description": "This endpoint forces the node to give up active status. If the node does not have active status, this endpoint does nothing. Note that the node will sleep for ten seconds before attempting to grab the active lock again, but if no standby nodes grab the active lock in the interim, the same node may become the active node again.", - "operationId": "StepDownLeader", + "operationId": "step-down-leader", "tags": [ "system" ], @@ -13043,8 +13022,7 @@ "/sys/tools/hash": { "description": "Generate a hash sum for input data", "post": { - "summary": "Generate a hash sum for input data", - "operationId": "ToolsHash", + "operationId": "generate-hash", "tags": [ "system" ], @@ -13053,14 +13031,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ToolsHashRequest" + "$ref": "#/components/schemas/GenerateHashRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/GenerateHashResponse" + } + } + } } } } @@ -13079,8 +13064,7 @@ } ], "post": { - "summary": "Generate a hash sum for input data", - "operationId": "ToolsHashWith", + "operationId": "generate-hash-with-algorithm", "tags": [ "system" ], @@ -13089,14 +13073,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ToolsHashWithRequest" + "$ref": "#/components/schemas/GenerateHashWithAlgorithmRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/GenerateHashWithAlgorithmResponse" + } + } + } } } } @@ -13104,8 +13095,7 @@ "/sys/tools/random": { "description": "Generate random bytes", "post": { - "summary": "Generate random bytes", - "operationId": "ToolsGenerateRandom", + "operationId": "generate-random", "tags": [ "system" ], @@ -13114,14 +13104,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ToolsGenerateRandomRequest" + "$ref": "#/components/schemas/GenerateRandomRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/GenerateRandomResponse" + } + } + } } } } @@ -13141,8 +13138,7 @@ } ], "post": { - "summary": "Generate random bytes", - "operationId": "ToolsGenerateRandomSource", + "operationId": "generate-random-with-source", "tags": [ "system" ], @@ -13151,14 +13147,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ToolsGenerateRandomSourceRequest" + "$ref": "#/components/schemas/GenerateRandomWithSourceRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/GenerateRandomWithSourceResponse" + } + } + } } } } @@ -13187,8 +13190,7 @@ } ], "post": { - "summary": "Generate random bytes", - "operationId": "ToolsGenerateRandomSourceBytes", + "operationId": "generate-random-with-source-and-bytes", "tags": [ "system" ], @@ -13197,14 +13199,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ToolsGenerateRandomSourceBytesRequest" + "$ref": "#/components/schemas/GenerateRandomWithSourceAndBytesRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/GenerateRandomWithSourceAndBytesResponse" + } + } + } } } } @@ -13223,8 +13232,7 @@ } ], "post": { - "summary": "Generate random bytes", - "operationId": "SysWriteToolsRandomUrlbytes", + "operationId": "generate-random-with-bytes", "tags": [ "system" ], @@ -13233,14 +13241,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SysWriteToolsRandomUrlbytesRequest" + "$ref": "#/components/schemas/GenerateRandomWithBytesRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/GenerateRandomWithBytesResponse" + } + } + } } } } @@ -13250,7 +13265,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Unseal the Vault.", - "operationId": "Unseal", + "operationId": "unseal", "tags": [ "system" ], @@ -13266,7 +13281,14 @@ }, "responses": { "200": { - "description": "OK" + "description": "", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/UnsealResponse" + } + } + } } } } @@ -13275,7 +13297,7 @@ "description": "List historical version changes sorted by installation time in ascending order.", "get": { "summary": "Returns map of historical version change entries", - "operationId": "ListVersionHistory", + "operationId": "version-history", "tags": [ "system" ], @@ -13295,7 +13317,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/VersionHistoryResponse" + } + } + } } } } @@ -13305,19 +13334,26 @@ "x-vault-unauthenticated": true, "get": { "summary": "Look up wrapping properties for the requester's token.", - "operationId": "WrappingReadLookup", + "operationId": "read-wrapping-properties2", "tags": [ "system" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/ReadWrappingProperties2Response" + } + } + } } } }, "post": { "summary": "Look up wrapping properties for the given token.", - "operationId": "WrappingWriteLookup", + "operationId": "read-wrapping-properties", "tags": [ "system" ], @@ -13326,14 +13362,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WrappingWriteLookupRequest" + "$ref": "#/components/schemas/ReadWrappingPropertiesRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/ReadWrappingPropertiesResponse" + } + } + } } } } @@ -13341,8 +13384,7 @@ "/sys/wrapping/rewrap": { "description": "Rotates a response-wrapped token.", "post": { - "summary": "Rotates a response-wrapped token.", - "operationId": "WrappingRewrap", + "operationId": "rewrap", "tags": [ "system" ], @@ -13351,7 +13393,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WrappingRewrapRequest" + "$ref": "#/components/schemas/RewrapRequest" } } } @@ -13366,8 +13408,7 @@ "/sys/wrapping/unwrap": { "description": "Unwraps a response-wrapped token.", "post": { - "summary": "Unwraps a response-wrapped token.", - "operationId": "WrappingUnwrap", + "operationId": "unwrap", "tags": [ "system" ], @@ -13376,7 +13417,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/WrappingUnwrapRequest" + "$ref": "#/components/schemas/UnwrapRequest" } } } @@ -13384,6 +13425,9 @@ "responses": { "200": { "description": "OK" + }, + "204": { + "description": "No content" } } } @@ -13391,8 +13435,7 @@ "/sys/wrapping/wrap": { "description": "Response-wraps an arbitrary JSON object.", "post": { - "summary": "Response-wraps an arbitrary JSON object.", - "operationId": "WrappingWrap", + "operationId": "wrap", "tags": [ "system" ], @@ -13403,22 +13446,22 @@ } } }, - "/{ad_mount_path}/config": { - "description": "Configure the AD server to connect to, along with password options.", + "/{alicloud_mount_path}/config": { + "description": "Configure the access key and secret to use for RAM and STS calls.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "alicloud_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "ad" - } + "default": "alicloud" + }, + "required": true } ], "get": { - "summary": "Configure the AD server to connect to, along with password options.", - "operationId": "ActiveDirectoryReadConfig", + "operationId": "ali-cloud-read-configuration", "tags": [ "secrets" ], @@ -13429,8 +13472,7 @@ } }, "post": { - "summary": "Configure the AD server to connect to, along with password options.", - "operationId": "ActiveDirectoryWriteConfig", + "operationId": "ali-cloud-configure", "tags": [ "secrets" ], @@ -13438,9 +13480,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/ActiveDirectoryWriteConfigRequest" - } + "schema": {} } } }, @@ -13451,8 +13491,7 @@ } }, "delete": { - "summary": "Configure the AD server to connect to, along with password options.", - "operationId": "ActiveDirectoryDeleteConfig", + "operationId": "ali-cloud-delete-configuration", "tags": [ "secrets" ], @@ -13463,30 +13502,32 @@ } } }, - "/{ad_mount_path}/creds/{name}": { - "description": "Retrieve a role's creds by role name.", + "/{alicloud_mount_path}/creds/{name}": { + "description": "Generate an API key or STS credential using the given role's configuration.'", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "The name of the role.", "in": "path", "schema": { - "type": "string", - "default": "ad" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role", + "name": "alicloud_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "alicloud" }, "required": true } ], "get": { - "operationId": "ActiveDirectoryReadCredentials", + "summary": "Generate an API key or STS credential using the given role's configuration.'", + "operationId": "ali-cloud-generate-credentials", "tags": [ "secrets" ], @@ -13497,21 +13538,23 @@ } } }, - "/{ad_mount_path}/library": { - "description": "List the name of each set of service accounts currently stored.", + "/{alicloud_mount_path}/role": { + "description": "List the existing roles in this backend.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "alicloud_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "ad" - } + "default": "alicloud" + }, + "required": true } ], "get": { - "operationId": "ActiveDirectoryListLibraries", + "summary": "List the existing roles in this backend.", + "operationId": "ali-cloud-list-roles", "tags": [ "secrets" ], @@ -13536,31 +13579,45 @@ } } }, - "/{ad_mount_path}/library/manage/{name}/check-in": { - "description": "Force checking service accounts in to the library.", + "/{alicloud_mount_path}/role/{name}": { + "description": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "The name of the role.", "in": "path", "schema": { - "type": "string", - "default": "ad" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the set.", + "name": "alicloud_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "alicloud" }, "required": true } ], + "x-vault-createSupported": true, + "get": { + "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", + "operationId": "ali-cloud-read-role", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, "post": { - "summary": "Check service accounts in to the library.", - "operationId": "ActiveDirectoryCheckInManageLibrary", + "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", + "operationId": "ali-cloud-write-role", "tags": [ "secrets" ], @@ -13568,9 +13625,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/ActiveDirectoryCheckInManageLibraryRequest" - } + "schema": {} } } }, @@ -13579,34 +13634,36 @@ "description": "OK" } } + }, + "delete": { + "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", + "operationId": "ali-cloud-delete-role", + "tags": [ + "secrets" + ], + "responses": { + "204": { + "description": "empty body" + } + } } }, - "/{ad_mount_path}/library/{name}": { - "description": "Build a library of service accounts that can be checked out.", + "/{aws_mount_path}/config/lease": { + "description": "Configure the default lease information for generated credentials.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "ad" - } - }, - { - "name": "name", - "description": "Name of the set.", - "in": "path", - "schema": { - "type": "string" + "default": "aws" }, "required": true } ], - "x-vault-createSupported": true, "get": { - "summary": "Read a library set.", - "operationId": "ActiveDirectoryReadLibrary", + "operationId": "aws-read-lease-configuration", "tags": [ "secrets" ], @@ -13617,8 +13674,7 @@ } }, "post": { - "summary": "Update a library set.", - "operationId": "ActiveDirectoryWriteLibrary", + "operationId": "aws-configure-lease", "tags": [ "secrets" ], @@ -13627,7 +13683,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ActiveDirectoryWriteLibraryRequest" + "$ref": "#/components/schemas/AwsConfigureLeaseRequest" } } } @@ -13637,45 +13693,35 @@ "description": "OK" } } - }, - "delete": { - "summary": "Delete a library set.", - "operationId": "ActiveDirectoryDeleteLibrary", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } } }, - "/{ad_mount_path}/library/{name}/check-in": { - "description": "Check service accounts in to the library.", + "/{aws_mount_path}/config/root": { + "description": "Configure the root credentials that are used to manage IAM.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "ad" - } - }, - { - "name": "name", - "description": "Name of the set.", - "in": "path", - "schema": { - "type": "string" + "default": "aws" }, "required": true } ], + "get": { + "operationId": "aws-read-root-iam-credentials-configuration", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, "post": { - "summary": "Check service accounts in to the library.", - "operationId": "ActiveDirectoryCheckInLibrary", + "operationId": "aws-configure-root-iam-credentials", "tags": [ "secrets" ], @@ -13684,7 +13730,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ActiveDirectoryCheckInLibraryRequest" + "$ref": "#/components/schemas/AwsConfigureRootIamCredentialsRequest" } } } @@ -13696,44 +13742,25 @@ } } }, - "/{ad_mount_path}/library/{name}/check-out": { - "description": "Check a service account out from the library.", + "/{aws_mount_path}/config/rotate-root": { + "description": "Request to rotate the AWS credentials used by Vault", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "ad" - } - }, - { - "name": "name", - "description": "Name of the set", - "in": "path", - "schema": { - "type": "string" + "default": "aws" }, "required": true } ], "post": { - "summary": "Check a service account out from the library.", - "operationId": "ActiveDirectoryCheckOutLibrary", + "operationId": "aws-rotate-root-iam-credentials", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/ActiveDirectoryCheckOutLibraryRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -13741,31 +13768,31 @@ } } }, - "/{ad_mount_path}/library/{name}/status": { - "description": "Check the status of the service accounts in a library.", + "/{aws_mount_path}/creds/{name}": { + "description": "Generate AWS credentials from a specific Vault role.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role", "in": "path", "schema": { - "type": "string", - "default": "ad" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the set.", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "get": { - "summary": "Check the status of the service accounts in a library set.", - "operationId": "ActiveDirectoryReadLibraryStatus", + "operationId": "aws-generate-credentials", "tags": [ "secrets" ], @@ -13774,24 +13801,46 @@ "description": "OK" } } + }, + "post": { + "operationId": "aws-generate-credentials2", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/AwsGenerateCredentials2Request" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } } }, - "/{ad_mount_path}/roles": { - "description": "List the name of each role currently stored.", + "/{aws_mount_path}/roles": { + "description": "List the existing roles in this backend", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "ad" - } + "default": "aws" + }, + "required": true } ], "get": { - "summary": "List the name of each role currently stored.", - "operationId": "ActiveDirectoryListRoles", + "summary": "List the existing roles in this backend", + "operationId": "aws-list-roles", "tags": [ "secrets" ], @@ -13816,31 +13865,35 @@ } } }, - "/{ad_mount_path}/roles/{name}": { - "description": "Manage roles to build links between Vault and Active Directory service accounts.", + "/{aws_mount_path}/roles/{name}": { + "description": "Read, write and reference IAM policies that access keys can be made for.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the policy", "in": "path", "schema": { "type": "string", - "default": "ad" - } + "x-vault-displayAttrs": { + "name": "Policy Name" + } + }, + "required": true }, { - "name": "name", - "description": "Name of the role", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], "get": { - "summary": "Manage roles to build links between Vault and Active Directory service accounts.", - "operationId": "ActiveDirectoryReadRole", + "summary": "Read, write and reference IAM policies that access keys can be made for.", + "operationId": "aws-read-role", "tags": [ "secrets" ], @@ -13851,8 +13904,8 @@ } }, "post": { - "summary": "Manage roles to build links between Vault and Active Directory service accounts.", - "operationId": "ActiveDirectoryWriteRole", + "summary": "Read, write and reference IAM policies that access keys can be made for.", + "operationId": "aws-write-role", "tags": [ "secrets" ], @@ -13861,7 +13914,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ActiveDirectoryWriteRoleRequest" + "$ref": "#/components/schemas/AwsWriteRoleRequest" } } } @@ -13873,8 +13926,8 @@ } }, "delete": { - "summary": "Manage roles to build links between Vault and Active Directory service accounts.", - "operationId": "ActiveDirectoryDeleteRole", + "summary": "Read, write and reference IAM policies that access keys can be made for.", + "operationId": "aws-delete-role", "tags": [ "secrets" ], @@ -13885,31 +13938,31 @@ } } }, - "/{ad_mount_path}/rotate-role/{name}": { - "description": "Request to rotate the role's credentials.", + "/{aws_mount_path}/sts/{name}": { + "description": "Generate AWS credentials from a specific Vault role.", "parameters": [ { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role", "in": "path", "schema": { - "type": "string", - "default": "ad" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the static role", + "name": "aws_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "aws" }, "required": true } ], - "x-vault-createSupported": true, - "post": { - "operationId": "ActiveDirectoryRotateRole", + "get": { + "operationId": "aws-generate-sts-credentials", "tags": [ "secrets" ], @@ -13918,26 +13971,22 @@ "description": "OK" } } - } - }, - "/{ad_mount_path}/rotate-root": { - "description": "Request to rotate the role's credentials.", - "parameters": [ - { - "name": "ad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "ad" - } - } - ], + }, "post": { - "operationId": "ActiveDirectoryRotateRoot", + "operationId": "aws-generate-sts-credentials2", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/AwsGenerateStsCredentials2Request" + } + } + } + }, "responses": { "200": { "description": "OK" @@ -13945,22 +13994,23 @@ } } }, - "/{alicloud_mount_path}/config": { - "description": "Configure the access key and secret to use for RAM and STS calls.", + "/{azure_mount_path}/config": { + "description": "Configure the Azure Secret backend.", "parameters": [ { - "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "azure_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "alicloud" - } + "default": "azure" + }, + "required": true } ], + "x-vault-createSupported": true, "get": { - "summary": "Configure the access key and secret to use for RAM and STS calls.", - "operationId": "AliCloudReadConfig", + "operationId": "azure-read-configuration", "tags": [ "secrets" ], @@ -13971,8 +14021,7 @@ } }, "post": { - "summary": "Configure the access key and secret to use for RAM and STS calls.", - "operationId": "AliCloudWriteConfig", + "operationId": "azure-configure", "tags": [ "secrets" ], @@ -13980,9 +14029,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/AliCloudWriteConfigRequest" - } + "schema": {} } } }, @@ -13993,8 +14040,7 @@ } }, "delete": { - "summary": "Configure the access key and secret to use for RAM and STS calls.", - "operationId": "AliCloudDeleteConfig", + "operationId": "azure-delete-configuration", "tags": [ "secrets" ], @@ -14005,31 +14051,31 @@ } } }, - "/{alicloud_mount_path}/creds/{name}": { - "description": "Generate an API key or STS credential using the given role's configuration.'", + "/{azure_mount_path}/creds/{role}": { + "description": "Request Service Principal credentials for a given Vault role.", "parameters": [ { - "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "Name of the Vault role", "in": "path", "schema": { - "type": "string", - "default": "alicloud" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "The name of the role.", + "name": "azure_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "azure" }, "required": true } ], "get": { - "summary": "Generate an API key or STS credential using the given role's configuration.'", - "operationId": "AliCloudReadCredentials", + "operationId": "azure-request-service-principal-credentials", "tags": [ "secrets" ], @@ -14040,22 +14086,23 @@ } } }, - "/{alicloud_mount_path}/role": { - "description": "List the existing roles in this backend.", + "/{azure_mount_path}/roles": { + "description": "List existing roles.", "parameters": [ { - "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "azure_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "alicloud" - } + "default": "azure" + }, + "required": true } ], "get": { - "summary": "List the existing roles in this backend.", - "operationId": "AliCloudListRoles", + "summary": "List existing roles.", + "operationId": "azure-list-roles", "tags": [ "secrets" ], @@ -14080,32 +14127,33 @@ } } }, - "/{alicloud_mount_path}/role/{name}": { - "description": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", + "/{azure_mount_path}/roles/{name}": { + "description": "Manage the Vault roles used to generate Azure credentials.", "parameters": [ { - "name": "alicloud_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "alicloud" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "The name of the role.", + "name": "azure_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "azure" }, "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", - "operationId": "AliCloudReadRole", + "summary": "Manage the Vault roles used to generate Azure credentials.", + "operationId": "azure-read-role", "tags": [ "secrets" ], @@ -14116,8 +14164,8 @@ } }, "post": { - "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", - "operationId": "AliCloudWriteRole", + "summary": "Manage the Vault roles used to generate Azure credentials.", + "operationId": "azure-write-role", "tags": [ "secrets" ], @@ -14125,9 +14173,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/AliCloudWriteRoleRequest" - } + "schema": {} } } }, @@ -14138,8 +14184,8 @@ } }, "delete": { - "summary": "Read, write and reference policies and roles that API keys or STS credentials can be made for.", - "operationId": "AliCloudDeleteRole", + "summary": "Manage the Vault roles used to generate Azure credentials.", + "operationId": "azure-delete-role", "tags": [ "secrets" ], @@ -14150,47 +14196,25 @@ } } }, - "/{aws_mount_path}/config/lease": { - "description": "Configure the default lease information for generated credentials.", + "/{azure_mount_path}/rotate-root": { + "description": "Attempt to rotate the root credentials used to communicate with Azure.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "azure_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "aws" - } + "default": "azure" + }, + "required": true } ], - "get": { - "summary": "Configure the default lease information for generated credentials.", - "operationId": "AWSConfigReadLease", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, "post": { - "summary": "Configure the default lease information for generated credentials.", - "operationId": "AWSConfigWriteLease", + "operationId": "azure-rotate-root", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/AWSConfigWriteLeaseRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -14198,22 +14222,21 @@ } } }, - "/{aws_mount_path}/config/root": { - "description": "Configure the root credentials that are used to manage IAM.", + "/{consul_mount_path}/config/access": { "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "consul_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "aws" - } + "default": "consul" + }, + "required": true } ], "get": { - "summary": "Configure the root credentials that are used to manage IAM.", - "operationId": "AWSConfigReadRootIAMCredentials", + "operationId": "consul-read-access-configuration", "tags": [ "secrets" ], @@ -14224,8 +14247,7 @@ } }, "post": { - "summary": "Configure the root credentials that are used to manage IAM.", - "operationId": "AWSConfigWriteRootIAMCredentials", + "operationId": "consul-configure-access", "tags": [ "secrets" ], @@ -14234,7 +14256,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSConfigWriteRootIAMCredentialsRequest" + "$ref": "#/components/schemas/ConsulConfigureAccessRequest" } } } @@ -14246,72 +14268,33 @@ } } }, - "/{aws_mount_path}/config/rotate-root": { - "description": "Request to rotate the AWS credentials used by Vault", + "/{consul_mount_path}/creds/{role}": { "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } - } - ], - "post": { - "operationId": "AWSConfigRotateRootIAMCredentials", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{aws_mount_path}/creds": { - "description": "Generate AWS credentials from a specific Vault role.", - "parameters": [ + "type": "string" + }, + "required": true + }, { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "consul_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "aws" - } + "default": "consul" + }, + "required": true } ], "get": { - "summary": "Generate AWS credentials from a specific Vault role.", - "operationId": "AWSReadCredentials", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Generate AWS credentials from a specific Vault role.", - "operationId": "AWSWriteCredentials", + "operationId": "consul-generate-credentials", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/AWSWriteCredentialsRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -14319,22 +14302,21 @@ } } }, - "/{aws_mount_path}/roles": { - "description": "List the existing roles in this backend", + "/{consul_mount_path}/roles": { "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "consul_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "aws" - } + "default": "consul" + }, + "required": true } ], "get": { - "summary": "List the existing roles in this backend", - "operationId": "AWSListRoles", + "operationId": "consul-list-roles", "tags": [ "secrets" ], @@ -14359,34 +14341,30 @@ } } }, - "/{aws_mount_path}/roles/{name}": { - "description": "Read, write and reference IAM policies that access keys can be made for.", + "/{consul_mount_path}/roles/{name}": { "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "aws" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the policy", + "name": "consul_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "x-vault-displayAttrs": { - "name": "Policy Name" - } + "default": "consul" }, "required": true } ], "get": { - "summary": "Read, write and reference IAM policies that access keys can be made for.", - "operationId": "AWSReadRole", + "operationId": "consul-read-role", "tags": [ "secrets" ], @@ -14397,8 +14375,7 @@ } }, "post": { - "summary": "Read, write and reference IAM policies that access keys can be made for.", - "operationId": "AWSWriteRole", + "operationId": "consul-write-role", "tags": [ "secrets" ], @@ -14407,7 +14384,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AWSWriteRoleRequest" + "$ref": "#/components/schemas/ConsulWriteRoleRequest" } } } @@ -14419,8 +14396,7 @@ } }, "delete": { - "summary": "Read, write and reference IAM policies that access keys can be made for.", - "operationId": "AWSDeleteRole", + "operationId": "consul-delete-role", "tags": [ "secrets" ], @@ -14431,56 +14407,40 @@ } } }, - "/{aws_mount_path}/sts/{name}": { - "description": "Generate AWS credentials from a specific Vault role.", + "/{database_mount_path}/config": { + "description": "Configure connection details to a database plugin.", "parameters": [ { - "name": "aws_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "aws" - } - }, - { - "name": "name", - "description": "Name of the role", - "in": "path", - "schema": { - "type": "string" + "default": "database" }, "required": true } ], "get": { - "summary": "Generate AWS credentials from a specific Vault role.", - "operationId": "AWSReadSecurityTokenService", + "summary": "Configure connection details to a database plugin.", + "operationId": "database-list-connections", "tags": [ "secrets" ], - "responses": { - "200": { - "description": "OK" + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true } - } - }, - "post": { - "summary": "Generate AWS credentials from a specific Vault role.", - "operationId": "AWSWriteSecurityTokenService", - "tags": [ - "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/AWSWriteSecurityTokenServiceRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -14488,22 +14448,32 @@ } } }, - "/{azure_mount_path}/config": { - "description": "Configure the Azure Secret backend.", + "/{database_mount_path}/config/{name}": { + "description": "Configure connection details to a database plugin.", "parameters": [ { - "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of this database connection", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "azure" - } + "default": "database" + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "AzureReadConfig", + "operationId": "database-read-connection-configuration", "tags": [ "secrets" ], @@ -14514,7 +14484,7 @@ } }, "post": { - "operationId": "AzureWriteConfig", + "operationId": "database-configure-connection", "tags": [ "secrets" ], @@ -14523,7 +14493,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AzureWriteConfigRequest" + "$ref": "#/components/schemas/DatabaseConfigureConnectionRequest" } } } @@ -14535,7 +14505,7 @@ } }, "delete": { - "operationId": "AzureDeleteConfig", + "operationId": "database-delete-connection-configuration", "tags": [ "secrets" ], @@ -14546,30 +14516,32 @@ } } }, - "/{azure_mount_path}/creds/{role}": { - "description": "Request Service Principal credentials for a given Vault role.", + "/{database_mount_path}/creds/{name}": { + "description": "Request database credentials for a certain role.", "parameters": [ { - "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "azure" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "Name of the Vault role", + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "database" }, "required": true } ], "get": { - "operationId": "AzureReadCredentials", + "summary": "Request database credentials for a certain role.", + "operationId": "database-generate-credentials", "tags": [ "secrets" ], @@ -14580,22 +14552,59 @@ } } }, - "/{azure_mount_path}/roles": { - "description": "List existing roles.", + "/{database_mount_path}/reset/{name}": { + "description": "Resets a database plugin.", "parameters": [ { - "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of this database connection", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "azure" + "default": "database" + }, + "required": true + } + ], + "post": { + "summary": "Resets a database plugin.", + "operationId": "database-reset-connection", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" } } + } + }, + "/{database_mount_path}/roles": { + "description": "Manage the roles that can be created with this backend.", + "parameters": [ + { + "name": "database_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "database" + }, + "required": true + } ], "get": { - "summary": "List existing roles.", - "operationId": "AzureListRoles", + "summary": "Manage the roles that can be created with this backend.", + "operationId": "database-list-roles", "tags": [ "secrets" ], @@ -14620,32 +14629,33 @@ } } }, - "/{azure_mount_path}/roles/{name}": { - "description": "Manage the Vault roles used to generate Azure credentials.", + "/{database_mount_path}/roles/{name}": { + "description": "Manage the roles that can be created with this backend.", "parameters": [ { - "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "azure" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "database" }, "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Manage the Vault roles used to generate Azure credentials.", - "operationId": "AzureReadRole", + "summary": "Manage the roles that can be created with this backend.", + "operationId": "database-read-role", "tags": [ "secrets" ], @@ -14656,8 +14666,8 @@ } }, "post": { - "summary": "Manage the Vault roles used to generate Azure credentials.", - "operationId": "AzureWriteRole", + "summary": "Manage the roles that can be created with this backend.", + "operationId": "database-write-role", "tags": [ "secrets" ], @@ -14666,7 +14676,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AzureWriteRoleRequest" + "$ref": "#/components/schemas/DatabaseWriteRoleRequest" } } } @@ -14678,8 +14688,8 @@ } }, "delete": { - "summary": "Manage the Vault roles used to generate Azure credentials.", - "operationId": "AzureDeleteRole", + "summary": "Manage the roles that can be created with this backend.", + "operationId": "database-delete-role", "tags": [ "secrets" ], @@ -14690,21 +14700,31 @@ } } }, - "/{azure_mount_path}/rotate-root": { - "description": "Attempt to rotate the root credentials used to communicate with Azure.", + "/{database_mount_path}/rotate-role/{name}": { + "description": "Request to rotate the credentials for a static user account.", "parameters": [ { - "name": "azure_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the static role", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "azure" - } + "default": "database" + }, + "required": true } ], "post": { - "operationId": "AzureRotateRoot", + "operationId": "database-rotate-static-role-credentials", "tags": [ "secrets" ], @@ -14715,44 +14735,34 @@ } } }, - "/{consul_mount_path}/config/access": { + "/{database_mount_path}/rotate-root/{name}": { + "description": "Request to rotate the root credentials for a certain database connection.", "parameters": [ { - "name": "consul_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of this database connection", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "consul" - } + "default": "database" + }, + "required": true } ], - "get": { - "operationId": "ConsulReadAccessConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, "post": { - "operationId": "ConsulWriteAccessConfig", + "operationId": "database-rotate-root-credentials", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/ConsulWriteAccessConfigRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -14760,29 +14770,32 @@ } } }, - "/{consul_mount_path}/creds/{role}": { + "/{database_mount_path}/static-creds/{name}": { + "description": "Request database credentials for a certain static role. These credentials are rotated periodically.", "parameters": [ { - "name": "consul_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the static role.", "in": "path", "schema": { - "type": "string", - "default": "consul" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "Name of the role.", + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "database" }, "required": true } ], "get": { - "operationId": "ConsulReadCredentials", + "summary": "Request database credentials for a certain static role. These credentials are\nrotated periodically.", + "operationId": "database-read-static-role-credentials", "tags": [ "secrets" ], @@ -14793,20 +14806,23 @@ } } }, - "/{consul_mount_path}/roles": { + "/{database_mount_path}/static-roles": { + "description": "Manage the static roles that can be created with this backend.", "parameters": [ { - "name": "consul_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "consul" - } + "default": "database" + }, + "required": true } ], "get": { - "operationId": "ConsulListRoles", + "summary": "Manage the static roles that can be created with this backend.", + "operationId": "database-list-static-roles", "tags": [ "secrets" ], @@ -14831,29 +14847,33 @@ } } }, - "/{consul_mount_path}/roles/{name}": { + "/{database_mount_path}/static-roles/{name}": { + "description": "Manage the static roles that can be created with this backend.", "parameters": [ { - "name": "consul_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "consul" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "database_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "database" }, "required": true } ], + "x-vault-createSupported": true, "get": { - "operationId": "ConsulReadRole", + "summary": "Manage the static roles that can be created with this backend.", + "operationId": "database-read-static-role", "tags": [ "secrets" ], @@ -14864,7 +14884,8 @@ } }, "post": { - "operationId": "ConsulWriteRole", + "summary": "Manage the static roles that can be created with this backend.", + "operationId": "database-write-static-role", "tags": [ "secrets" ], @@ -14873,7 +14894,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/ConsulWriteRoleRequest" + "$ref": "#/components/schemas/DatabaseWriteStaticRoleRequest" } } } @@ -14885,7 +14906,8 @@ } }, "delete": { - "operationId": "ConsulDeleteRole", + "summary": "Manage the static roles that can be created with this backend.", + "operationId": "database-delete-static-role", "tags": [ "secrets" ], @@ -14896,45 +14918,25 @@ } } }, - "/{cubbyhole_mount_path}/{path}": { - "description": "Pass-through secret storage to a token-specific cubbyhole in the storage backend, allowing you to read/write arbitrary data into secret storage.", + "/{gcp_mount_path}/config": { + "description": "Configure the GCP backend.", "parameters": [ { - "name": "cubbyhole_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "cubbyhole" - } - }, - { - "name": "path", - "description": "Specifies the path of the secret.", - "in": "path", - "schema": { - "type": "string" + "default": "gcp" }, "required": true } ], - "x-vault-createSupported": true, "get": { - "summary": "Retrieve the secret at the specified location.", - "operationId": "CubbyholeRead", + "operationId": "google-cloud-read-configuration", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Return a list if `true`", - "in": "query", - "schema": { - "type": "string" - } - } - ], "responses": { "200": { "description": "OK" @@ -14942,46 +14944,67 @@ } }, "post": { - "summary": "Store a secret at the specified location.", - "operationId": "CubbyholeWrite", + "operationId": "google-cloud-configure", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } + } + }, "responses": { "200": { "description": "OK" } } - }, - "delete": { - "summary": "Deletes the secret at the specified location.", - "operationId": "CubbyholeDelete", + } + }, + "/{gcp_mount_path}/config/rotate-root": { + "description": "Request to rotate the GCP credentials used by Vault", + "parameters": [ + { + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "gcp" + }, + "required": true + } + ], + "post": { + "operationId": "google-cloud-rotate-root-credentials", "tags": [ "secrets" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK" } } } }, - "/{database_mount_path}/config": { - "description": "Configure connection details to a database plugin.", + "/{gcp_mount_path}/impersonated-account": { + "description": "List created impersonated accounts.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "database" - } + "default": "gcp" + }, + "required": true } ], "get": { - "summary": "Configure connection details to a database plugin.", - "operationId": "DatabaseListConfig", + "operationId": "google-cloud-list-impersonated-accounts", "tags": [ "secrets" ], @@ -15006,32 +15029,32 @@ } } }, - "/{database_mount_path}/config/{name}": { - "description": "Configure connection details to a database plugin.", + "/{gcp_mount_path}/impersonated-account/{name}": { + "description": "Register and manage a GCP service account to generate credentials under", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Required. Name to refer to this impersonated account in Vault. Cannot be updated.", "in": "path", "schema": { - "type": "string", - "default": "database" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of this database connection", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Configure connection details to a database plugin.", - "operationId": "DatabaseReadConfig", + "operationId": "google-cloud-read-impersonated-account", "tags": [ "secrets" ], @@ -15042,8 +15065,7 @@ } }, "post": { - "summary": "Configure connection details to a database plugin.", - "operationId": "DatabaseWriteConfig", + "operationId": "google-cloud-write-impersonated-account", "tags": [ "secrets" ], @@ -15051,9 +15073,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/DatabaseWriteConfigRequest" - } + "schema": {} } } }, @@ -15064,8 +15084,7 @@ } }, "delete": { - "summary": "Configure connection details to a database plugin.", - "operationId": "DatabaseDeleteConfig", + "operationId": "google-cloud-delete-impersonated-account", "tags": [ "secrets" ], @@ -15076,31 +15095,42 @@ } } }, - "/{database_mount_path}/creds/{name}": { - "description": "Request database credentials for a certain role.", + "/{gcp_mount_path}/impersonated-account/{name}/token": { + "description": "Generate an OAuth2 access token secret.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Required. Name of the impersonated account.", "in": "path", "schema": { - "type": "string", - "default": "database" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "get": { - "summary": "Request database credentials for a certain role.", - "operationId": "DatabaseReadCredentials", + "operationId": "google-cloud-generate-impersonated-account-access-token", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "operationId": "google-cloud-generate-impersonated-account-access-token", "tags": [ "secrets" ], @@ -15111,34 +15141,93 @@ } } }, - "/{database_mount_path}/reset/{name}": { - "description": "Resets a database plugin.", + "/{gcp_mount_path}/impersonated-accounts": { + "description": "List created impersonated accounts.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "database" + "default": "gcp" + }, + "required": true + } + ], + "get": { + "operationId": "google-cloud-list-impersonated-accounts", + "tags": [ + "secrets" + ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true } - }, + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/{gcp_mount_path}/key/{roleset}": { + "description": "Generate a service account private key secret.", + "parameters": [ { - "name": "name", - "description": "Name of this database connection", + "name": "roleset", + "description": "Required. Name of the role set.", "in": "path", "schema": { "type": "string" }, "required": true + }, + { + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "gcp" + }, + "required": true } ], + "get": { + "operationId": "google-cloud-generate-roleset-key2", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, "post": { - "summary": "Resets a database plugin.", - "operationId": "DatabaseReset", + "operationId": "google-cloud-generate-roleset-key-with-parameters2", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } + } + }, "responses": { "200": { "description": "OK" @@ -15146,22 +15235,22 @@ } } }, - "/{database_mount_path}/roles": { - "description": "Manage the roles that can be created with this backend.", + "/{gcp_mount_path}/roleset": { + "description": "List existing rolesets.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "database" - } + "default": "gcp" + }, + "required": true } ], "get": { - "summary": "Manage the roles that can be created with this backend.", - "operationId": "DatabaseListRoles", + "operationId": "google-cloud-list-rolesets", "tags": [ "secrets" ], @@ -15186,32 +15275,32 @@ } } }, - "/{database_mount_path}/roles/{name}": { - "description": "Manage the roles that can be created with this backend.", + "/{gcp_mount_path}/roleset/{name}": { + "description": "Read/write sets of IAM roles to be given to generated credentials for specified GCP resources.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Required. Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "database" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Manage the roles that can be created with this backend.", - "operationId": "DatabaseReadRole", + "operationId": "google-cloud-read-roleset", "tags": [ "secrets" ], @@ -15222,8 +15311,7 @@ } }, "post": { - "summary": "Manage the roles that can be created with this backend.", - "operationId": "DatabaseWriteRole", + "operationId": "google-cloud-write-roleset", "tags": [ "secrets" ], @@ -15231,9 +15319,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/DatabaseWriteRoleRequest" - } + "schema": {} } } }, @@ -15244,8 +15330,7 @@ } }, "delete": { - "summary": "Manage the roles that can be created with this backend.", - "operationId": "DatabaseDeleteRole", + "operationId": "google-cloud-delete-roleset", "tags": [ "secrets" ], @@ -15256,30 +15341,31 @@ } } }, - "/{database_mount_path}/rotate-role/{name}": { - "description": "Request to rotate the credentials for a static user account.", + "/{gcp_mount_path}/roleset/{name}/rotate": { + "description": "Rotates or recreates the service account bound to a roleset.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "database" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the static role", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "post": { - "operationId": "DatabaseRotateRole", + "operationId": "google-cloud-rotate-roleset", "tags": [ "secrets" ], @@ -15290,30 +15376,31 @@ } } }, - "/{database_mount_path}/rotate-root/{name}": { - "description": "Request to rotate the root credentials for a certain database connection.", + "/{gcp_mount_path}/roleset/{name}/rotate-key": { + "description": "Rotate the service account key used to generate access tokens for a roleset.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role.", "in": "path", "schema": { - "type": "string", - "default": "database" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of this database connection", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "post": { - "operationId": "DatabaseRotateRoot", + "operationId": "google-cloud-rotate-roleset-key", "tags": [ "secrets" ], @@ -15324,31 +15411,96 @@ } } }, - "/{database_mount_path}/static-creds/{name}": { - "description": "Request database credentials for a certain static role. These credentials are rotated periodically.", + "/{gcp_mount_path}/roleset/{roleset}/key": { + "description": "Generate a service account private key secret.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "roleset", + "description": "Required. Name of the role set.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "database" + "default": "gcp" + }, + "required": true + } + ], + "get": { + "operationId": "google-cloud-generate-roleset-key", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "operationId": "google-cloud-generate-roleset-key-with-parameters", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } } }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/{gcp_mount_path}/roleset/{roleset}/token": { + "description": "Generate an OAuth2 access token secret.", + "parameters": [ { - "name": "name", - "description": "Name of the static role.", + "name": "roleset", + "description": "Required. Name of the role set.", "in": "path", "schema": { "type": "string" }, "required": true + }, + { + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "gcp" + }, + "required": true } ], "get": { - "summary": "Request database credentials for a certain static role. These credentials are\nrotated periodically.", - "operationId": "DatabaseReadStaticCredentials", + "operationId": "google-cloud-generate-roleset-access-token", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "operationId": "google-cloud-generate-roleset-access-token-with-parameters", "tags": [ "secrets" ], @@ -15359,22 +15511,22 @@ } } }, - "/{database_mount_path}/static-roles": { - "description": "Manage the static roles that can be created with this backend.", + "/{gcp_mount_path}/rolesets": { + "description": "List existing rolesets.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "database" - } + "default": "gcp" + }, + "required": true } ], "get": { - "summary": "Manage the static roles that can be created with this backend.", - "operationId": "DatabaseListStaticRoles", + "operationId": "google-cloud-list-rolesets", "tags": [ "secrets" ], @@ -15399,32 +15551,72 @@ } } }, - "/{database_mount_path}/static-roles/{name}": { - "description": "Manage the static roles that can be created with this backend.", + "/{gcp_mount_path}/static-account": { + "description": "List created static accounts.", "parameters": [ { - "name": "database_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "database" + "default": "gcp" + }, + "required": true + } + ], + "get": { + "operationId": "google-cloud-list-static-accounts", + "tags": [ + "secrets" + ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true } - }, + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, + "/{gcp_mount_path}/static-account/{name}": { + "description": "Register and manage a GCP service account to generate credentials under", + "parameters": [ { "name": "name", - "description": "Name of the role.", + "description": "Required. Name to refer to this static account in Vault. Cannot be updated.", "in": "path", "schema": { "type": "string" }, "required": true + }, + { + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "gcp" + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Manage the static roles that can be created with this backend.", - "operationId": "DatabaseReadStaticRole", + "operationId": "google-cloud-read-static-account", "tags": [ "secrets" ], @@ -15435,8 +15627,7 @@ } }, "post": { - "summary": "Manage the static roles that can be created with this backend.", - "operationId": "DatabaseWriteStaticRole", + "operationId": "google-cloud-write-static-account", "tags": [ "secrets" ], @@ -15444,9 +15635,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/DatabaseWriteStaticRoleRequest" - } + "schema": {} } } }, @@ -15457,8 +15646,7 @@ } }, "delete": { - "summary": "Manage the static roles that can be created with this backend.", - "operationId": "DatabaseDeleteStaticRole", + "operationId": "google-cloud-delete-static-account", "tags": [ "secrets" ], @@ -15469,21 +15657,31 @@ } } }, - "/{gcp_mount_path}/config": { - "description": "Configure the GCP backend.", + "/{gcp_mount_path}/static-account/{name}/key": { + "description": "Generate a service account private key secret.", "parameters": [ + { + "name": "name", + "description": "Required. Name of the static account.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, { "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcp" - } + }, + "required": true } ], "get": { - "operationId": "GoogleCloudReadConfig", + "operationId": "google-cloud-generate-static-account-key", "tags": [ "secrets" ], @@ -15494,7 +15692,7 @@ } }, "post": { - "operationId": "GoogleCloudWriteConfig", + "operationId": "google-cloud-generate-static-account-key-with-parameters", "tags": [ "secrets" ], @@ -15502,9 +15700,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteConfigRequest" - } + "schema": {} } } }, @@ -15515,21 +15711,31 @@ } } }, - "/{gcp_mount_path}/config/rotate-root": { - "description": "Request to rotate the GCP credentials used by Vault", + "/{gcp_mount_path}/static-account/{name}/rotate-key": { + "description": "Rotate the key used to generate access tokens for a static account", "parameters": [ + { + "name": "name", + "description": "Name of the account.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, { "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcp" - } + }, + "required": true } ], "post": { - "operationId": "GoogleCloudRotateRoot", + "operationId": "google-cloud-rotate-static-account-key", "tags": [ "secrets" ], @@ -15540,30 +15746,31 @@ } } }, - "/{gcp_mount_path}/key/{roleset}": { - "description": "Generate a service account private key secret.", + "/{gcp_mount_path}/static-account/{name}/token": { + "description": "Generate an OAuth2 access token secret.", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Required. Name of the static account.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "roleset", - "description": "Required. Name of the role set.", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], "get": { - "operationId": "GoogleCloudReadKey", + "operationId": "google-cloud-generate-static-account-access-token", "tags": [ "secrets" ], @@ -15574,20 +15781,10 @@ } }, "post": { - "operationId": "GoogleCloudWriteKey", + "operationId": "google-cloud-generate-static-account-access-token-with-parameters", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteKeyRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -15595,97 +15792,71 @@ } } }, - "/{gcp_mount_path}/roleset/{name}": { - "description": "Read/write sets of IAM roles to be given to generated credentials for specified GCP resources.", + "/{gcp_mount_path}/static-accounts": { + "description": "List created static accounts.", "parameters": [ { "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcp" - } - }, - { - "name": "name", - "description": "Required. Name of the role.", - "in": "path", - "schema": { - "type": "string" }, "required": true } ], - "x-vault-createSupported": true, "get": { - "operationId": "GoogleCloudReadRoleset", + "operationId": "google-cloud-list-static-accounts", "tags": [ "secrets" ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], "responses": { "200": { "description": "OK" } } - }, - "post": { - "operationId": "GoogleCloudWriteRoleset", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteRolesetRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "GoogleCloudDeleteRoleset", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } } }, - "/{gcp_mount_path}/roleset/{name}/rotate": { - "description": "Rotates or recreates the service account bound to a roleset.", + "/{gcp_mount_path}/token/{roleset}": { + "description": "Generate an OAuth2 access token secret.", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "roleset", + "description": "Required. Name of the role set.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role.", + "name": "gcp_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcp" }, "required": true } ], - "post": { - "operationId": "GoogleCloudRotateRoleset", + "get": { + "operationId": "google-cloud-generate-roleset-access-token2", "tags": [ "secrets" ], @@ -15694,32 +15865,9 @@ "description": "OK" } } - } - }, - "/{gcp_mount_path}/roleset/{name}/rotate-key": { - "description": "Rotate the service account key used to generate access tokens for a roleset.", - "parameters": [ - { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "gcp" - } - }, - { - "name": "name", - "description": "Name of the role.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - } - ], + }, "post": { - "operationId": "GoogleCloudRotateRolesetKey", + "operationId": "google-cloud-generate-roleset-access-token-with-parameters2", "tags": [ "secrets" ], @@ -15730,30 +15878,23 @@ } } }, - "/{gcp_mount_path}/roleset/{roleset}/key": { - "description": "Generate a service account private key secret.", + "/{gcpkms_mount_path}/config": { + "description": "Configure the GCP KMS secrets engine", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "gcp" - } - }, - { - "name": "roleset", - "description": "Required. Name of the role set.", - "in": "path", - "schema": { - "type": "string" + "default": "gcpkms" }, "required": true } ], + "x-vault-createSupported": true, "get": { - "operationId": "GoogleCloudReadRolesetKey", + "operationId": "google-cloud-kms-read-configuration", "tags": [ "secrets" ], @@ -15764,7 +15905,7 @@ } }, "post": { - "operationId": "GoogleCloudWriteRolesetKey", + "operationId": "google-cloud-kms-configure", "tags": [ "secrets" ], @@ -15772,9 +15913,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteRolesetKeyRequest" - } + "schema": {} } } }, @@ -15783,46 +15922,100 @@ "description": "OK" } } + }, + "delete": { + "operationId": "google-cloud-kms-delete-configuration", + "tags": [ + "secrets" + ], + "responses": { + "204": { + "description": "empty body" + } + } } }, - "/{gcp_mount_path}/roleset/{roleset}/token": { - "description": "Generate an OAuth2 access token secret.", + "/{gcpkms_mount_path}/decrypt/{key}": { + "description": "Decrypt a ciphertext value using a named key", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "roleset", - "description": "Required. Name of the role set.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], - "get": { - "operationId": "GoogleCloudReadRolesetToken", + "post": { + "summary": "Decrypt a ciphertext value using a named key", + "operationId": "google-cloud-kms-decrypt", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } + } + }, "responses": { "200": { "description": "OK" } } - }, + } + }, + "/{gcpkms_mount_path}/encrypt/{key}": { + "description": "Encrypt a plaintext value using a named key", + "parameters": [ + { + "name": "key", + "description": "Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "gcpkms" + }, + "required": true + } + ], "post": { - "operationId": "GoogleCloudWriteRolesetToken", + "summary": "Encrypt a plaintext value using a named key", + "operationId": "google-cloud-kms-encrypt", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } + } + }, "responses": { "200": { "description": "OK" @@ -15830,21 +16023,23 @@ } } }, - "/{gcp_mount_path}/rolesets": { - "description": "List existing rolesets.", + "/{gcpkms_mount_path}/keys": { + "description": "List named keys", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "gcp" - } + "default": "gcpkms" + }, + "required": true } ], "get": { - "operationId": "GoogleCloudListRolesets", + "summary": "List named keys", + "operationId": "google-cloud-kms-list-keys", "tags": [ "secrets" ], @@ -15869,31 +16064,32 @@ } } }, - "/{gcp_mount_path}/static-account/{name}": { - "description": "Register and manage a GCP service account to generate credentials under", + "/{gcpkms_mount_path}/keys/config/{key}": { + "description": "Configure the key in Vault", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key in Vault.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Required. Name to refer to this static account in Vault. Cannot be updated.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "GoogleCloudReadStaticAccount", + "operationId": "google-cloud-kms-read-key-configuration", "tags": [ "secrets" ], @@ -15904,7 +16100,7 @@ } }, "post": { - "operationId": "GoogleCloudWriteStaticAccount", + "operationId": "google-cloud-kms-configure-key", "tags": [ "secrets" ], @@ -15912,9 +16108,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteStaticAccountRequest" - } + "schema": {} } } }, @@ -15923,43 +16117,33 @@ "description": "OK" } } - }, - "delete": { - "operationId": "GoogleCloudDeleteStaticAccount", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } } }, - "/{gcp_mount_path}/static-account/{name}/key": { - "description": "Generate a service account private key secret.", + "/{gcpkms_mount_path}/keys/deregister/{key}": { + "description": "Deregister an existing key in Vault", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Required. Name of the static account.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], - "get": { - "operationId": "GoogleCloudReadStaticAccountKey", + "post": { + "operationId": "google-cloud-kms-deregister-key", "tags": [ "secrets" ], @@ -15969,55 +16153,55 @@ } } }, - "post": { - "operationId": "GoogleCloudWriteStaticAccountKey", + "delete": { + "operationId": "google-cloud-kms-deregister-key2", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudWriteStaticAccountKeyRequest" - } - } - } - }, "responses": { - "200": { - "description": "OK" + "204": { + "description": "empty body" } } } }, - "/{gcp_mount_path}/static-account/{name}/rotate-key": { - "description": "Rotate the key used to generate access tokens for a static account", + "/{gcpkms_mount_path}/keys/register/{key}": { + "description": "Register an existing crypto key in Google Cloud KMS", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the account.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], "post": { - "operationId": "GoogleCloudRotateStaticAccountKey", + "summary": "Register an existing crypto key in Google Cloud KMS", + "operationId": "google-cloud-kms-register-key", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } + } + }, "responses": { "200": { "description": "OK" @@ -16025,83 +16209,35 @@ } } }, - "/{gcp_mount_path}/static-account/{name}/token": { - "description": "Generate an OAuth2 access token secret.", + "/{gcpkms_mount_path}/keys/rotate/{key}": { + "description": "Rotate a crypto key to a new primary version", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "gcp" - } - }, - { - "name": "name", - "description": "Required. Name of the static account.", + "name": "key", + "description": "Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key.", "in": "path", "schema": { "type": "string" }, "required": true - } - ], - "get": { - "operationId": "GoogleCloudReadStaticAccountToken", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "GoogleCloudWriteStaticAccountToken", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{gcp_mount_path}/static-accounts": { - "description": "List created static accounts.", - "parameters": [ + }, { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "gcp" - } + "default": "gcpkms" + }, + "required": true } ], - "get": { - "operationId": "GoogleCloudListStaticAccounts", + "post": { + "summary": "Rotate a crypto key to a new primary version", + "operationId": "google-cloud-kms-rotate-key", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], "responses": { "200": { "description": "OK" @@ -16109,30 +16245,32 @@ } } }, - "/{gcp_mount_path}/token/{roleset}": { - "description": "Generate an OAuth2 access token secret.", + "/{gcpkms_mount_path}/keys/trim/{key}": { + "description": "Delete old crypto key versions from Google Cloud KMS", "parameters": [ { - "name": "gcp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key in Vault.", "in": "path", "schema": { - "type": "string", - "default": "gcp" - } + "type": "string" + }, + "required": true }, { - "name": "roleset", - "description": "Required. Name of the role set.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], - "get": { - "operationId": "GoogleCloudReadToken", + "x-vault-createSupported": true, + "post": { + "operationId": "google-cloud-kms-trim-key-versions", "tags": [ "secrets" ], @@ -16142,35 +16280,45 @@ } } }, - "post": { - "operationId": "GoogleCloudWriteToken", + "delete": { + "operationId": "google-cloud-kms-trim-key-versions2", "tags": [ "secrets" ], "responses": { - "200": { - "description": "OK" + "204": { + "description": "empty body" } } } }, - "/{gcpkms_mount_path}/config": { - "description": "Configure the GCP KMS secrets engine", + "/{gcpkms_mount_path}/keys/{key}": { + "description": "Interact with crypto keys in Vault and Google Cloud KMS", "parameters": [ + { + "name": "key", + "description": "Name of the key in Vault.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, { "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcpkms" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Configure the GCP KMS secrets engine", - "operationId": "GoogleCloudKMSReadConfig", + "summary": "Interact with crypto keys in Vault and Google Cloud KMS", + "operationId": "google-cloud-kms-read-key", "tags": [ "secrets" ], @@ -16181,8 +16329,8 @@ } }, "post": { - "summary": "Configure the GCP KMS secrets engine", - "operationId": "GoogleCloudKMSWriteConfig", + "summary": "Interact with crypto keys in Vault and Google Cloud KMS", + "operationId": "google-cloud-kms-write-key", "tags": [ "secrets" ], @@ -16190,9 +16338,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSWriteConfigRequest" - } + "schema": {} } } }, @@ -16203,8 +16349,8 @@ } }, "delete": { - "summary": "Configure the GCP KMS secrets engine", - "operationId": "GoogleCloudKMSDeleteConfig", + "summary": "Interact with crypto keys in Vault and Google Cloud KMS", + "operationId": "google-cloud-kms-delete-key", "tags": [ "secrets" ], @@ -16215,45 +16361,35 @@ } } }, - "/{gcpkms_mount_path}/decrypt/{key}": { - "description": "Decrypt a ciphertext value using a named key", + "/{gcpkms_mount_path}/pubkey/{key}": { + "description": "Retrieve the public key associated with the named key", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS.", "in": "path", "schema": { - "type": "string", - "default": "gcpkms" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], - "x-vault-createSupported": true, - "post": { - "summary": "Decrypt a ciphertext value using a named key", - "operationId": "GoogleCloudKMSDecrypt", + "get": { + "summary": "Retrieve the public key associated with the named key", + "operationId": "google-cloud-kms-retrieve-public-key", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSDecryptRequest" - } - } - } - }, "responses": { "200": { "description": "OK" @@ -16261,32 +16397,32 @@ } } }, - "/{gcpkms_mount_path}/encrypt/{key}": { - "description": "Encrypt a plaintext value using a named key", + "/{gcpkms_mount_path}/reencrypt/{key}": { + "description": "Re-encrypt existing ciphertext data to a new version", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS.", "in": "path", "schema": { - "type": "string", - "default": "gcpkms" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], - "x-vault-createSupported": true, "post": { - "summary": "Encrypt a plaintext value using a named key", - "operationId": "GoogleCloudKMSEncrypt", + "summary": "Re-encrypt existing ciphertext data to a new version", + "operationId": "google-cloud-kms-reencrypt", "tags": [ "secrets" ], @@ -16294,9 +16430,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSEncryptRequest" - } + "schema": {} } } }, @@ -16307,39 +16441,43 @@ } } }, - "/{gcpkms_mount_path}/keys": { - "description": "List named keys", + "/{gcpkms_mount_path}/sign/{key}": { + "description": "Signs a message or digest using a named key", "parameters": [ + { + "name": "key", + "description": "Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, { "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "gcpkms" - } + }, + "required": true } ], - "get": { - "summary": "List named keys", - "operationId": "GoogleCloudKMSListKeys", + "post": { + "summary": "Signs a message or digest using a named key", + "operationId": "google-cloud-kms-sign", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } } - ], + }, "responses": { "200": { "description": "OK" @@ -16347,44 +16485,32 @@ } } }, - "/{gcpkms_mount_path}/keys/config/{key}": { - "description": "Configure the key in Vault", + "/{gcpkms_mount_path}/verify/{key}": { + "description": "Verify a signature using a named key", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "key", + "description": "Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key.", "in": "path", "schema": { - "type": "string", - "default": "gcpkms" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Name of the key in Vault.", + "name": "gcpkms_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "gcpkms" }, "required": true } ], - "x-vault-createSupported": true, - "get": { - "summary": "Configure the key in Vault", - "operationId": "GoogleCloudKMSReadKeyConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, "post": { - "summary": "Configure the key in Vault", - "operationId": "GoogleCloudKMSWriteKeyConfig", + "summary": "Verify a signature using a named key", + "operationId": "google-cloud-kms-verify", "tags": [ "secrets" ], @@ -16392,9 +16518,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSWriteKeyConfigRequest" - } + "schema": {} } } }, @@ -16405,31 +16529,22 @@ } } }, - "/{gcpkms_mount_path}/keys/deregister/{key}": { - "description": "Deregister an existing key in Vault", + "/{kubernetes_mount_path}/check": { + "description": "Checks the Kubernetes configuration is valid.", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "kubernetes_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "gcpkms" - } - }, - { - "name": "key", - "description": "Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched.", - "in": "path", - "schema": { - "type": "string" + "default": "kubernetes" }, "required": true } ], - "post": { - "summary": "Deregister an existing key in Vault", - "operationId": "GoogleCloudKMSDeregisterKey", + "get": { + "operationId": "kubernetes-check-configuration", "tags": [ "secrets" ], @@ -16440,31 +16555,33 @@ } } }, - "/{gcpkms_mount_path}/keys/register/{key}": { - "description": "Register an existing crypto key in Google Cloud KMS", + "/{kubernetes_mount_path}/config": { + "description": "Configure the Kubernetes secret engine plugin.", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "kubernetes_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "gcpkms" - } - }, - { - "name": "key", - "description": "Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data.", - "in": "path", - "schema": { - "type": "string" + "default": "kubernetes" }, "required": true } ], + "get": { + "operationId": "kubernetes-read-configuration", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, "post": { - "summary": "Register an existing crypto key in Google Cloud KMS", - "operationId": "GoogleCloudKMSRegisterKey", + "operationId": "kubernetes-configure", "tags": [ "secrets" ], @@ -16472,9 +16589,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSRegisterKeyRequest" - } + "schema": {} } } }, @@ -16483,36 +16598,55 @@ "description": "OK" } } + }, + "delete": { + "operationId": "kubernetes-delete-configuration", + "tags": [ + "secrets" + ], + "responses": { + "204": { + "description": "empty body" + } + } } }, - "/{gcpkms_mount_path}/keys/rotate/{key}": { - "description": "Rotate a crypto key to a new primary version", + "/{kubernetes_mount_path}/creds/{name}": { + "description": "Request Kubernetes service account credentials for a given Vault role.", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the Vault role", "in": "path", "schema": { - "type": "string", - "default": "gcpkms" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key.", + "name": "kubernetes_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kubernetes" }, "required": true } ], "post": { - "summary": "Rotate a crypto key to a new primary version", - "operationId": "GoogleCloudKMSRotateKey", + "operationId": "kubernetes-generate-credentials", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } + } + }, "responses": { "200": { "description": "OK" @@ -16520,34 +16654,39 @@ } } }, - "/{gcpkms_mount_path}/keys/trim/{key}": { - "description": "Delete old crypto key versions from Google Cloud KMS", + "/{kubernetes_mount_path}/roles": { + "description": "List the existing roles in this secrets engine.", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "kubernetes_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "gcpkms" - } - }, - { - "name": "key", - "description": "Name of the key in Vault.", - "in": "path", - "schema": { - "type": "string" + "default": "kubernetes" }, "required": true } ], - "post": { - "summary": "Delete old crypto key versions from Google Cloud KMS", - "operationId": "GoogleCloudKMSTrimKey", + "get": { + "operationId": "kubernetes-list-roles", "tags": [ "secrets" ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], "responses": { "200": { "description": "OK" @@ -16555,32 +16694,32 @@ } } }, - "/{gcpkms_mount_path}/keys/{key}": { - "description": "Interact with crypto keys in Vault and Google Cloud KMS", + "/{kubernetes_mount_path}/roles/{name}": { + "description": "Manage the roles that can be created with this secrets engine.", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role", "in": "path", "schema": { - "type": "string", - "default": "gcpkms" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Name of the key in Vault.", + "name": "kubernetes_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kubernetes" }, "required": true } ], "x-vault-createSupported": true, "get": { - "summary": "Interact with crypto keys in Vault and Google Cloud KMS", - "operationId": "GoogleCloudKMSReadKey", + "operationId": "kubernetes-read-role", "tags": [ "secrets" ], @@ -16591,8 +16730,7 @@ } }, "post": { - "summary": "Interact with crypto keys in Vault and Google Cloud KMS", - "operationId": "GoogleCloudKMSWriteKey", + "operationId": "kubernetes-write-role", "tags": [ "secrets" ], @@ -16600,9 +16738,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSWriteKeyRequest" - } + "schema": {} } } }, @@ -16613,8 +16749,7 @@ } }, "delete": { - "summary": "Interact with crypto keys in Vault and Google Cloud KMS", - "operationId": "GoogleCloudKMSDeleteKey", + "operationId": "kubernetes-delete-role", "tags": [ "secrets" ], @@ -16625,159 +16760,124 @@ } } }, - "/{gcpkms_mount_path}/pubkey/{key}": { - "description": "Retrieve the public key associated with the named key", + "/{kv-v1_mount_path}/{path}": { + "description": "Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage.", "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "path", + "description": "Location of the secret.", "in": "path", "schema": { - "type": "string", - "default": "gcpkms" - } + "type": "string" + }, + "required": true }, { - "name": "key", - "description": "Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS.", + "name": "kv-v1_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kv-v1" }, "required": true } ], + "x-vault-createSupported": true, "get": { - "summary": "Retrieve the public key associated with the named key", - "operationId": "GoogleCloudKMSReadPubkey", + "operationId": "kv-v1-read", "tags": [ "secrets" ], + "parameters": [ + { + "name": "list", + "description": "Return a list if `true`", + "in": "query", + "schema": { + "type": "string" + } + } + ], "responses": { "200": { "description": "OK" } } - } - }, - "/{gcpkms_mount_path}/reencrypt/{key}": { - "description": "Re-encrypt existing ciphertext data to a new version", - "parameters": [ - { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "gcpkms" - } - }, - { - "name": "key", - "description": "Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - } - ], - "x-vault-createSupported": true, + }, "post": { - "summary": "Re-encrypt existing ciphertext data to a new version", - "operationId": "GoogleCloudKMSReencrypt", + "operationId": "kv-v1-write", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSReencryptRequest" - } - } + "responses": { + "204": { + "description": "No Content" } - }, + } + }, + "delete": { + "operationId": "kv-v1-delete", + "tags": [ + "secrets" + ], "responses": { - "200": { - "description": "OK" + "204": { + "description": "No Content" } } } }, - "/{gcpkms_mount_path}/sign/{key}": { - "description": "Signs a message or digest using a named key", + "/{kv-v2_mount_path}/^.*$": { "parameters": [ { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "gcpkms" - } - }, + "default": "kv-v2" + }, + "required": true + } + ] + }, + "/{kv-v2_mount_path}/config": { + "description": "Configures settings for the KV store", + "parameters": [ { - "name": "key", - "description": "Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key.", + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kv-v2" }, "required": true } ], - "x-vault-createSupported": true, - "post": { - "summary": "Signs a message or digest using a named key", - "operationId": "GoogleCloudKMSSign", + "get": { + "summary": "Read the backend level settings.", + "operationId": "kv-v2-read-configuration", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSSignRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" - } - } - } - }, - "/{gcpkms_mount_path}/verify/{key}": { - "description": "Verify a signature using a named key", - "parameters": [ - { - "name": "gcpkms_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "gcpkms" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/KvV2ReadConfigurationResponse" + } + } + } } - }, - { - "name": "key", - "description": "Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true } - ], - "x-vault-createSupported": true, + }, "post": { - "summary": "Verify a signature using a named key", - "operationId": "GoogleCloudKMSVerify", + "summary": "Configure backend level settings that are applied to every key in the key-value store.", + "operationId": "kv-v2-configure", "tags": [ "secrets" ], @@ -16786,45 +16886,62 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GoogleCloudKMSVerifyRequest" + "$ref": "#/components/schemas/KvV2ConfigureRequest" } } } }, "responses": { - "200": { - "description": "OK" + "204": { + "description": "No Content" } } } }, - "/{kubernetes_mount_path}/config": { - "description": "Configure the Kubernetes secret engine plugin.", + "/{kv-v2_mount_path}/data/{path}": { + "description": "Write, Patch, Read, and Delete data in the Key-Value Store.", "parameters": [ { - "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "path", + "description": "Location of the secret.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "kubernetes" - } + "default": "kv-v2" + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "KubernetesReadConfig", + "operationId": "kv-v2-read", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/KvV2ReadResponse" + } + } + } } } }, "post": { - "operationId": "KubernetesWriteConfig", + "operationId": "kv-v2-write", "tags": [ "secrets" ], @@ -16833,53 +16950,61 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/KubernetesWriteConfigRequest" + "$ref": "#/components/schemas/KvV2WriteRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/KvV2WriteResponse" + } + } + } } } }, "delete": { - "operationId": "KubernetesDeleteConfig", + "operationId": "kv-v2-delete", "tags": [ "secrets" ], "responses": { "204": { - "description": "empty body" + "description": "No Content" } } } }, - "/{kubernetes_mount_path}/creds/{name}": { - "description": "Request Kubernetes service account credentials for a given Vault role.", + "/{kv-v2_mount_path}/delete/{path}": { + "description": "Marks one or more versions as deleted in the KV store.", "parameters": [ { - "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "path", + "description": "Location of the secret.", "in": "path", "schema": { - "type": "string", - "default": "kubernetes" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the Vault role", + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kv-v2" }, "required": true } ], "post": { - "operationId": "KubernetesWriteCredentials", + "operationId": "kv-v2-delete-versions", "tags": [ "secrets" ], @@ -16888,93 +17013,117 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/KubernetesWriteCredentialsRequest" + "$ref": "#/components/schemas/KvV2DeleteVersionsRequest" } } } }, "responses": { - "200": { - "description": "OK" + "204": { + "description": "No Content" } } } }, - "/{kubernetes_mount_path}/roles": { - "description": "List the existing roles in this secrets engine.", + "/{kv-v2_mount_path}/destroy/{path}": { + "description": "Permanently removes one or more versions in the KV store", "parameters": [ { - "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "path", + "description": "Location of the secret.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "kubernetes" - } + "default": "kv-v2" + }, + "required": true } ], - "get": { - "operationId": "KubernetesListRoles", + "post": { + "operationId": "kv-v2-destroy-versions", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/KvV2DestroyVersionsRequest" + } + } } - ], + }, "responses": { - "200": { - "description": "OK" + "204": { + "description": "No Content" } } } }, - "/{kubernetes_mount_path}/roles/{name}": { - "description": "Manage the roles that can be created with this secrets engine.", + "/{kv-v2_mount_path}/metadata/{path}": { + "description": "Configures settings for the KV store", "parameters": [ { - "name": "kubernetes_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "path", + "description": "Location of the secret.", "in": "path", "schema": { - "type": "string", - "default": "kubernetes" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role", + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kv-v2" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "KubernetesReadRole", + "operationId": "kv-v2-read-metadata", "tags": [ "secrets" ], + "parameters": [ + { + "name": "list", + "description": "Return a list if `true`", + "in": "query", + "schema": { + "type": "string" + } + } + ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/KvV2ReadMetadataResponse" + } + } + } } } }, "post": { - "operationId": "KubernetesWriteRole", + "operationId": "kv-v2-write-metadata", "tags": [ "secrets" ], @@ -16983,95 +17132,112 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/KubernetesWriteRoleRequest" + "$ref": "#/components/schemas/KvV2WriteMetadataRequest" } } } }, "responses": { - "200": { - "description": "OK" + "204": { + "description": "No Content" } } }, "delete": { - "operationId": "KubernetesDeleteRole", + "operationId": "kv-v2-delete-metadata", "tags": [ "secrets" ], "responses": { "204": { - "description": "empty body" + "description": "No Content" } } } }, - "/{kv_mount_path}/{path}": { - "description": "Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage.", + "/{kv-v2_mount_path}/subkeys/{path}": { + "description": "Read the structure of a secret entry from the Key-Value store with the values removed.", "parameters": [ { - "name": "kv_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "path", + "description": "Location of the secret.", "in": "path", "schema": { - "type": "string", - "default": "kv" - } + "type": "string" + }, + "required": true }, { - "name": "path", - "description": "Location of the secret.", + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "kv-v2" }, "required": true } ], - "x-vault-createSupported": true, "get": { - "summary": "Pass-through secret storage to the storage backend, allowing you to\nread/write arbitrary data into secret storage.", - "operationId": "KVv1Read", + "operationId": "kv-v2-read-subkeys", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Return a list if `true`", - "in": "query", - "schema": { - "type": "string" - } - } - ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/KvV2ReadSubkeysResponse" + } + } + } } } - }, + } + }, + "/{kv-v2_mount_path}/undelete/{path}": { + "description": "Undeletes one or more versions from the KV store.", + "parameters": [ + { + "name": "path", + "description": "Location of the secret.", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "kv-v2_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "kv-v2" + }, + "required": true + } + ], "post": { - "summary": "Pass-through secret storage to the storage backend, allowing you to\nread/write arbitrary data into secret storage.", - "operationId": "KVv1Write", + "operationId": "kv-v2-undelete-versions", "tags": [ "secrets" ], - "responses": { - "200": { - "description": "OK" + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/KvV2UndeleteVersionsRequest" + } + } } - } - }, - "delete": { - "summary": "Pass-through secret storage to the storage backend, allowing you to\nread/write arbitrary data into secret storage.", - "operationId": "KVv1Delete", - "tags": [ - "secrets" - ], + }, "responses": { "204": { - "description": "empty body" + "description": "No Content" } } } @@ -17081,17 +17247,18 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "LDAPReadConfig", + "operationId": "ldap-read-configuration", "tags": [ "secrets" ], @@ -17102,7 +17269,7 @@ } }, "post": { - "operationId": "LDAPWriteConfig", + "operationId": "ldap-configure", "tags": [ "secrets" ], @@ -17110,9 +17277,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/LDAPWriteConfigRequest" - } + "schema": {} } } }, @@ -17123,7 +17288,7 @@ } }, "delete": { - "operationId": "LDAPDeleteConfig", + "operationId": "ldap-delete-configuration", "tags": [ "secrets" ], @@ -17137,15 +17302,6 @@ "/{ldap_mount_path}/creds/{name}": { "description": "Request LDAP credentials for a dynamic role. These credentials are created within the LDAP system when querying this endpoint.", "parameters": [ - { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "ldap" - } - }, { "name": "name", "description": "Name of the dynamic role.", @@ -17154,13 +17310,23 @@ "type": "string" }, "required": true - } - ], - "get": { - "operationId": "LDAPReadCredentials", - "tags": [ - "secrets" - ], + }, + { + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "ldap" + }, + "required": true + } + ], + "get": { + "operationId": "ldap-request-dynamic-role-credentials", + "tags": [ + "secrets" + ], "responses": { "200": { "description": "OK" @@ -17173,16 +17339,17 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], "get": { - "operationId": "LDAPListLibraries", + "operationId": "ldap-library-list", "tags": [ "secrets" ], @@ -17211,27 +17378,28 @@ "description": "Force checking service accounts in to the library.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the set.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the set.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], "post": { "summary": "Check service accounts in to the library.", - "operationId": "LDAPCheckInManageLibrary", + "operationId": "ldap-library-force-check-in", "tags": [ "secrets" ], @@ -17239,9 +17407,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/LDAPCheckInManageLibraryRequest" - } + "schema": {} } } }, @@ -17256,20 +17422,21 @@ "description": "Build a library of service accounts that can be checked out.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the set.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the set.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } @@ -17277,7 +17444,7 @@ "x-vault-createSupported": true, "get": { "summary": "Read a library set.", - "operationId": "LDAPReadLibrary", + "operationId": "ldap-library-read", "tags": [ "secrets" ], @@ -17289,7 +17456,7 @@ }, "post": { "summary": "Update a library set.", - "operationId": "LDAPWriteLibrary", + "operationId": "ldap-library-configure", "tags": [ "secrets" ], @@ -17297,9 +17464,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/LDAPWriteLibraryRequest" - } + "schema": {} } } }, @@ -17311,7 +17476,7 @@ }, "delete": { "summary": "Delete a library set.", - "operationId": "LDAPDeleteLibrary", + "operationId": "ldap-library-delete", "tags": [ "secrets" ], @@ -17326,27 +17491,28 @@ "description": "Check service accounts in to the library.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the set.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the set.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], "post": { "summary": "Check service accounts in to the library.", - "operationId": "LDAPCheckInLibrary", + "operationId": "ldap-library-check-in", "tags": [ "secrets" ], @@ -17354,9 +17520,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/LDAPCheckInLibraryRequest" - } + "schema": {} } } }, @@ -17371,27 +17535,28 @@ "description": "Check a service account out from the library.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the set", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the set", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], "post": { "summary": "Check a service account out from the library.", - "operationId": "LDAPCheckOutLibrary", + "operationId": "ldap-library-check-out", "tags": [ "secrets" ], @@ -17399,9 +17564,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/LDAPCheckOutLibraryRequest" - } + "schema": {} } } }, @@ -17416,27 +17579,28 @@ "description": "Check the status of the service accounts in a library.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the set.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the set.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], "get": { "summary": "Check the status of the service accounts in a library set.", - "operationId": "LDAPReadLibraryStatus", + "operationId": "ldap-library-check-status", "tags": [ "secrets" ], @@ -17452,16 +17616,17 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], "get": { - "operationId": "LDAPListRoles", + "operationId": "ldap-list-dynamic-roles", "tags": [ "secrets" ], @@ -17490,27 +17655,28 @@ "description": "Manage the static roles that can be created with this backend.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role (lowercase)", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role (lowercase)", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "LDAPReadRole", + "operationId": "ldap-read-dynamic-role", "tags": [ "secrets" ], @@ -17521,7 +17687,7 @@ } }, "post": { - "operationId": "LDAPWriteRole", + "operationId": "ldap-write-dynamic-role", "tags": [ "secrets" ], @@ -17529,9 +17695,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/LDAPWriteRoleRequest" - } + "schema": {} } } }, @@ -17542,7 +17706,7 @@ } }, "delete": { - "operationId": "LDAPDeleteRole", + "operationId": "ldap-delete-dynamic-role", "tags": [ "secrets" ], @@ -17557,27 +17721,27 @@ "description": "Request to rotate the credentials for a static user account.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the static role", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the static role", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], - "x-vault-createSupported": true, "post": { - "operationId": "LDAPRotateRole", + "operationId": "ldap-rotate-static-role", "tags": [ "secrets" ], @@ -17593,17 +17757,17 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], - "x-vault-createSupported": true, "post": { - "operationId": "LDAPRotateRoot", + "operationId": "ldap-rotate-root", "tags": [ "secrets" ], @@ -17618,26 +17782,27 @@ "description": "Request LDAP credentials for a certain static role. These credentials are rotated periodically.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the static role.", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the static role.", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], "get": { - "operationId": "LDAPReadStaticCredentials", + "operationId": "ldap-request-static-role-credentials", "tags": [ "secrets" ], @@ -17653,16 +17818,17 @@ "parameters": [ { "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ldap" - } + }, + "required": true } ], "get": { - "operationId": "LDAPListStaticRoles", + "operationId": "ldap-list-static-roles", "tags": [ "secrets" ], @@ -17691,27 +17857,28 @@ "description": "Manage the static roles that can be created with this backend.", "parameters": [ { - "name": "ldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role", "in": "path", "schema": { - "type": "string", - "default": "ldap" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role", + "name": "ldap_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ldap" }, "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "LDAPReadStaticRole", + "operationId": "ldap-read-static-role", "tags": [ "secrets" ], @@ -17722,7 +17889,7 @@ } }, "post": { - "operationId": "LDAPWriteStaticRole", + "operationId": "ldap-write-static-role", "tags": [ "secrets" ], @@ -17730,9 +17897,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/LDAPWriteStaticRoleRequest" - } + "schema": {} } } }, @@ -17743,7 +17908,7 @@ } }, "delete": { - "operationId": "LDAPDeleteStaticRole", + "operationId": "ldap-delete-static-role", "tags": [ "secrets" ], @@ -17759,17 +17924,17 @@ "parameters": [ { "name": "mongodbatlas_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "mongodbatlas" - } + }, + "required": true } ], "get": { - "summary": "Configure the credentials that are used to manage Database Users.", - "operationId": "MongoDBAtlasReadConfig", + "operationId": "mongo-db-atlas-read-configuration", "tags": [ "secrets" ], @@ -17780,8 +17945,7 @@ } }, "post": { - "summary": "Configure the credentials that are used to manage Database Users.", - "operationId": "MongoDBAtlasWriteConfig", + "operationId": "mongo-db-atlas-configure", "tags": [ "secrets" ], @@ -17789,9 +17953,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/MongoDBAtlasWriteConfigRequest" - } + "schema": {} } } }, @@ -17806,27 +17968,27 @@ "description": "Generate MongoDB Atlas Programmatic API from a specific Vault role.", "parameters": [ { - "name": "mongodbatlas_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "name", + "description": "Name of the role", "in": "path", "schema": { - "type": "string", - "default": "mongodbatlas" - } + "type": "string" + }, + "required": true }, { - "name": "name", - "description": "Name of the role", + "name": "mongodbatlas_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "mongodbatlas" }, "required": true } ], "get": { - "summary": "Generate MongoDB Atlas Programmatic API from a specific Vault role.", - "operationId": "MongoDBAtlasReadCredentials", + "operationId": "mongo-db-atlas-generate-credentials", "tags": [ "secrets" ], @@ -17837,8 +17999,7 @@ } }, "post": { - "summary": "Generate MongoDB Atlas Programmatic API from a specific Vault role.", - "operationId": "MongoDBAtlasWriteCredentials", + "operationId": "mongo-db-atlas-generate-credentials2", "tags": [ "secrets" ], @@ -17854,17 +18015,18 @@ "parameters": [ { "name": "mongodbatlas_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "mongodbatlas" - } + }, + "required": true } ], "get": { "summary": "List the existing roles in this backend", - "operationId": "MongoDBAtlasListRoles", + "operationId": "mongo-db-atlas-list-roles", "tags": [ "secrets" ], @@ -17892,28 +18054,87 @@ "/{mongodbatlas_mount_path}/roles/{name}": { "description": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", "parameters": [ + { + "name": "name", + "description": "Name of the Roles", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, { "name": "mongodbatlas_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "mongodbatlas" + }, + "required": true + } + ], + "get": { + "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", + "operationId": "mongo-db-atlas-read-role", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" + } + } + }, + "post": { + "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", + "operationId": "mongo-db-atlas-write-role", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": {} + } } }, + "responses": { + "200": { + "description": "OK" + } + } + }, + "delete": { + "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", + "operationId": "mongo-db-atlas-delete-role", + "tags": [ + "secrets" + ], + "responses": { + "204": { + "description": "empty body" + } + } + } + }, + "/{nomad_mount_path}/config/access": { + "parameters": [ { - "name": "name", - "description": "Name of the Roles", + "name": "nomad_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "nomad" }, "required": true } ], + "x-vault-createSupported": true, "get": { - "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", - "operationId": "MongoDBAtlasReadRole", + "operationId": "nomad-read-access-configuration", "tags": [ "secrets" ], @@ -17924,8 +18145,7 @@ } }, "post": { - "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", - "operationId": "MongoDBAtlasWriteRole", + "operationId": "nomad-configure-access", "tags": [ "secrets" ], @@ -17934,7 +18154,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/MongoDBAtlasWriteRoleRequest" + "$ref": "#/components/schemas/NomadConfigureAccessRequest" } } } @@ -17946,8 +18166,7 @@ } }, "delete": { - "summary": "Manage the roles used to generate MongoDB Atlas Programmatic API Keys.", - "operationId": "MongoDBAtlasDeleteRole", + "operationId": "nomad-delete-access-configuration", "tags": [ "secrets" ], @@ -17958,21 +18177,22 @@ } } }, - "/{nomad_mount_path}/config/access": { + "/{nomad_mount_path}/config/lease": { + "description": "Configure the lease parameters for generated tokens", "parameters": [ { "name": "nomad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "nomad" - } + }, + "required": true } ], - "x-vault-createSupported": true, "get": { - "operationId": "NomadReadAccessConfig", + "operationId": "nomad-read-lease-configuration", "tags": [ "secrets" ], @@ -17983,7 +18203,7 @@ } }, "post": { - "operationId": "NomadWriteAccessConfig", + "operationId": "nomad-configure-lease", "tags": [ "secrets" ], @@ -17992,7 +18212,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/NomadWriteAccessConfigRequest" + "$ref": "#/components/schemas/NomadConfigureLeaseRequest" } } } @@ -18004,67 +18224,7 @@ } }, "delete": { - "operationId": "NomadDeleteAccessConfig", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/{nomad_mount_path}/config/lease": { - "description": "Configure the lease parameters for generated tokens", - "parameters": [ - { - "name": "nomad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "nomad" - } - } - ], - "get": { - "summary": "Configure the lease parameters for generated tokens", - "operationId": "NomadReadLeaseConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Configure the lease parameters for generated tokens", - "operationId": "NomadWriteLeaseConfig", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/NomadWriteLeaseConfigRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "Configure the lease parameters for generated tokens", - "operationId": "NomadDeleteLeaseConfig", + "operationId": "nomad-delete-lease-configuration", "tags": [ "secrets" ], @@ -18088,16 +18248,17 @@ }, { "name": "nomad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "nomad" - } + }, + "required": true } ], "get": { - "operationId": "NomadReadCredentials", + "operationId": "nomad-generate-credentials", "tags": [ "secrets" ], @@ -18112,16 +18273,17 @@ "parameters": [ { "name": "nomad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "nomad" - } + }, + "required": true } ], "get": { - "operationId": "NomadListRoles", + "operationId": "nomad-list-roles", "tags": [ "secrets" ], @@ -18159,17 +18321,18 @@ }, { "name": "nomad_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "nomad" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "NomadReadRole", + "operationId": "nomad-read-role", "tags": [ "secrets" ], @@ -18180,7 +18343,7 @@ } }, "post": { - "operationId": "NomadWriteRole", + "operationId": "nomad-write-role", "tags": [ "secrets" ], @@ -18201,7 +18364,7 @@ } }, "delete": { - "operationId": "NomadDeleteRole", + "operationId": "nomad-delete-role", "tags": [ "secrets" ], @@ -18212,188 +18375,216 @@ } } }, - "/{openldap_mount_path}/config": { - "description": "Configure the LDAP secrets engine plugin.", + "/{pki_mount_path}/ca": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "openldap" - } + "default": "pki" + }, + "required": true } ], - "x-vault-createSupported": true, + "x-vault-unauthenticated": true, "get": { - "operationId": "OpenLDAPReadConfig", + "operationId": "pki-read-ca-der", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCaDerResponse" + } + } + } } } - }, - "post": { - "operationId": "OpenLDAPWriteConfig", + } + }, + "/{pki_mount_path}/ca/pem": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "parameters": [ + { + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "pki" + }, + "required": true + } + ], + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-ca-pem", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OpenLDAPWriteConfigRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCaPemResponse" + } + } + } } } - }, - "delete": { - "operationId": "OpenLDAPDeleteConfig", + } + }, + "/{pki_mount_path}/ca_chain": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "parameters": [ + { + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "pki" + }, + "required": true + } + ], + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-ca-chain-pem", "tags": [ "secrets" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCaChainPemResponse" + } + } + } } } } }, - "/{openldap_mount_path}/creds/{name}": { - "description": "Request LDAP credentials for a dynamic role. These credentials are created within the LDAP system when querying this endpoint.", + "/{pki_mount_path}/cert/ca_chain": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "name", - "description": "Name of the dynamic role.", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true - }, - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "OpenLDAPReadCredentials", + "operationId": "pki-read-cert-ca-chain", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCertCaChainResponse" + } + } + } } } } }, - "/{openldap_mount_path}/library": { - "description": "List the name of each set of service accounts currently stored.", + "/{pki_mount_path}/cert/crl": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "openldap" - } + "default": "pki" + }, + "required": true } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "OpenLDAPListLibraries", + "operationId": "pki-read-cert-crl", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCertCrlResponse" + } + } + } } } } }, - "/{openldap_mount_path}/library/manage/{name}/check-in": { - "description": "Force checking service accounts in to the library.", + "/{pki_mount_path}/cert/delta-crl": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "name", - "description": "Name of the set.", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true - }, - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } } ], - "post": { - "summary": "Check service accounts in to the library.", - "operationId": "OpenLDAPCheckInManageLibrary", + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-cert-delta-crl", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OpenLDAPCheckInManageLibraryRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCertDeltaCrlResponse" + } + } + } } } } }, - "/{openldap_mount_path}/library/{name}": { - "description": "Build a library of service accounts that can be checked out.", + "/{pki_mount_path}/cert/{serial}": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "name", - "description": "Name of the set.", + "name": "serial", + "description": "Certificate serial number, in colon- or hyphen-separated octal", "in": "path", "schema": { "type": "string" @@ -18401,69 +18592,42 @@ "required": true }, { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "openldap" - } + "default": "pki" + }, + "required": true } ], - "x-vault-createSupported": true, + "x-vault-unauthenticated": true, "get": { - "summary": "Read a library set.", - "operationId": "OpenLDAPReadLibrary", + "operationId": "pki-read-cert", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Update a library set.", - "operationId": "OpenLDAPWriteLibrary", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OpenLDAPWriteLibraryRequest" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCertResponse" + } } } } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "Delete a library set.", - "operationId": "OpenLDAPDeleteLibrary", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } } } }, - "/{openldap_mount_path}/library/{name}/check-in": { - "description": "Check service accounts in to the library.", + "/{pki_mount_path}/cert/{serial}/raw": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "name", - "description": "Name of the set.", + "name": "serial", + "description": "Certificate serial number, in colon- or hyphen-separated octal", "in": "path", "schema": { "type": "string" @@ -18471,44 +18635,42 @@ "required": true }, { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "openldap" - } + "default": "pki" + }, + "required": true } ], - "post": { - "summary": "Check service accounts in to the library.", - "operationId": "OpenLDAPCheckInLibrary", + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-cert-raw-der", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OpenLDAPCheckInLibraryRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCertRawDerResponse" + } + } + } } } } }, - "/{openldap_mount_path}/library/{name}/check-out": { - "description": "Check a service account out from the library.", + "/{pki_mount_path}/cert/{serial}/raw/pem": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "name", - "description": "Name of the set", + "name": "serial", + "description": "Certificate serial number, in colon- or hyphen-separated octal", "in": "path", "schema": { "type": "string" @@ -18516,88 +18678,99 @@ "required": true }, { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "openldap" - } + "default": "pki" + }, + "required": true } ], - "post": { - "summary": "Check a service account out from the library.", - "operationId": "OpenLDAPCheckOutLibrary", + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-cert-raw-pem", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/OpenLDAPCheckOutLibraryRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCertRawPemResponse" + } + } + } } } } }, - "/{openldap_mount_path}/library/{name}/status": { - "description": "Check the status of the service accounts in a library.", + "/{pki_mount_path}/certs": { + "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { - "name": "name", - "description": "Name of the set.", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true - }, - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } } ], "get": { - "summary": "Check the status of the service accounts in a library set.", - "operationId": "OpenLDAPReadLibraryStatus", + "operationId": "pki-list-certs", "tags": [ "secrets" ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiListCertsResponse" + } + } + } } } } }, - "/{openldap_mount_path}/role": { - "description": "List all the dynamic roles Vault is currently managing in LDAP.", + "/{pki_mount_path}/certs/revoked": { + "description": "List all revoked serial numbers within the local cluster", "parameters": [ { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "openldap" - } + "default": "pki" + }, + "required": true } ], "get": { - "operationId": "OpenLDAPListRoles", + "operationId": "pki-list-revoked-certs", "tags": [ "secrets" ], @@ -18617,47 +18790,52 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiListRevokedCertsResponse" + } + } + } } } } }, - "/{openldap_mount_path}/role/{name}": { - "description": "Manage the static roles that can be created with this backend.", + "/{pki_mount_path}/config/auto-tidy": { + "description": "Modifies the current configuration for automatic tidy execution.", "parameters": [ { - "name": "name", - "description": "Name of the role (lowercase)", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true - }, - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } } ], - "x-vault-createSupported": true, "get": { - "operationId": "OpenLDAPReadRole", + "operationId": "pki-read-auto-tidy-configuration", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadAutoTidyConfigurationResponse" + } + } + } } } }, "post": { - "operationId": "OpenLDAPWriteRole", + "operationId": "pki-configure-auto-tidy", "tags": [ "secrets" ], @@ -18666,199 +18844,163 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OpenLDAPWriteRoleRequest" + "$ref": "#/components/schemas/PkiConfigureAutoTidyRequest" } } } }, "responses": { "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "OpenLDAPDeleteRole", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureAutoTidyResponse" + } + } + } } } } }, - "/{openldap_mount_path}/rotate-role/{name}": { - "description": "Request to rotate the credentials for a static user account.", + "/{pki_mount_path}/config/ca": { + "description": "Set the CA certificate and private key used for generated credentials.", "parameters": [ { - "name": "name", - "description": "Name of the static role", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true - }, - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } } ], - "x-vault-createSupported": true, "post": { - "operationId": "OpenLDAPRotateRole", + "operationId": "pki-configure-ca", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureCaRequest" + } + } + } + }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureCaResponse" + } + } + } } } } }, - "/{openldap_mount_path}/rotate-root": { - "description": "Request to rotate the root credentials Vault uses for the LDAP administrator account.", + "/{pki_mount_path}/config/cluster": { + "description": "Set cluster-local configuration, including address to this PR cluster.", "parameters": [ { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "openldap" - } + "default": "pki" + }, + "required": true } ], - "x-vault-createSupported": true, - "post": { - "operationId": "OpenLDAPRotateRoot", + "get": { + "operationId": "pki-read-cluster-configuration", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadClusterConfigurationResponse" + } + } + } } } - } - }, - "/{openldap_mount_path}/static-cred/{name}": { - "description": "Request LDAP credentials for a certain static role. These credentials are rotated periodically.", - "parameters": [ - { - "name": "name", - "description": "Name of the static role.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } - } - ], - "get": { - "operationId": "OpenLDAPReadStaticCredentials", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{openldap_mount_path}/static-role": { - "description": "This path lists all the static roles Vault is currently managing within the LDAP system.", - "parameters": [ - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } - } - ], - "get": { - "operationId": "OpenLDAPListStaticRoles", + }, + "post": { + "operationId": "pki-configure-cluster", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureClusterRequest" + } + } } - ], + }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureClusterResponse" + } + } + } } } } }, - "/{openldap_mount_path}/static-role/{name}": { - "description": "Manage the static roles that can be created with this backend.", + "/{pki_mount_path}/config/crl": { + "description": "Configure the CRL expiration.", "parameters": [ { - "name": "name", - "description": "Name of the role", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true - }, - { - "name": "openldap_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "openldap" - } } ], - "x-vault-createSupported": true, "get": { - "operationId": "OpenLDAPReadStaticRole", + "operationId": "pki-read-crl-configuration", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCrlConfigurationResponse" + } + } + } } } }, "post": { - "operationId": "OpenLDAPWriteStaticRole", + "operationId": "pki-configure-crl", "tags": [ "secrets" ], @@ -18867,130 +19009,120 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OpenLDAPWriteStaticRoleRequest" + "$ref": "#/components/schemas/PkiConfigureCrlRequest" } } } }, "responses": { "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "OpenLDAPDeleteStaticRole", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureCrlResponse" + } + } + } } } } }, - "/{pki_mount_path}//delta": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "/{pki_mount_path}/config/issuers": { + "description": "Read and set the default issuer certificate for signing.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PkiReadDelta", + "operationId": "pki-read-issuers-configuration", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}//delta/pem": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", - "parameters": [ - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadIssuersConfigurationResponse" + } + } + } } } - ], - "get": { - "operationId": "PkiReadDeltaPem", + }, + "post": { + "operationId": "pki-configure-issuers", "tags": [ "secrets" ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}//der": { - "description": "Fetch an issuer's Certificate Revocation Log (CRL).", - "parameters": [ - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureIssuersRequest" + } + } } - } - ], - "get": { - "operationId": "PkiReadDer", - "tags": [ - "secrets" - ], + }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureIssuersResponse" + } + } + } } } } }, - "/{pki_mount_path}//json": { - "description": "Fetch a single issuer certificate.", + "/{pki_mount_path}/config/keys": { + "description": "Read and set the default key used for signing", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PkiReadJson", + "operationId": "pki-read-keys-configuration", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadKeysConfigurationResponse" + } + } + } } } }, "post": { - "operationId": "PkiWriteJson", + "operationId": "pki-configure-keys", "tags": [ "secrets" ], @@ -18999,69 +19131,59 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PkiWriteJsonRequest" + "$ref": "#/components/schemas/PkiConfigureKeysRequest" } } } }, "responses": { "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "PkiDeleteJson", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureKeysResponse" + } + } + } } } } }, - "/{pki_mount_path}//pem": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "/{pki_mount_path}/config/urls": { + "description": "Set the URLs for the issuing CA, CRL distribution points, and OCSP servers.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PkiReadPem", + "operationId": "pki-read-urls-configuration", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/bundle": { - "description": "Import the specified issuing certificates.", - "parameters": [ - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadUrlsConfigurationResponse" + } + } + } } } - ], + }, "post": { - "operationId": "PKIBundleWrite", + "operationId": "pki-configure-urls", "tags": [ "secrets" ], @@ -19070,366 +19192,300 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIBundleWriteRequest" + "$ref": "#/components/schemas/PkiConfigureUrlsRequest" } } } }, "responses": { "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/ca": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", - "parameters": [ - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" - } - } - ], - "x-vault-unauthenticated": true, - "get": { - "operationId": "PKIReadCA", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiConfigureUrlsResponse" + } + } + } } } } }, - "/{pki_mount_path}/ca/pem": { + "/{pki_mount_path}/crl": { "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCAPem", + "operationId": "pki-read-crl-der", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCrlDerResponse" + } + } + } } } } }, - "/{pki_mount_path}/ca_chain": { + "/{pki_mount_path}/crl/delta": { "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCAChain", + "operationId": "pki-read-crl-delta", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/cert": { - "description": "Import the specified issuing certificates.", - "parameters": [ - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" - } - } - ], - "post": { - "operationId": "PKIWriteCerts", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteCertsRequest" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCrlDeltaResponse" + } } } } - }, - "responses": { - "200": { - "description": "OK" - } } } }, - "/{pki_mount_path}/cert/ca_chain": { + "/{pki_mount_path}/crl/delta/pem": { "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCertCAChain", + "operationId": "pki-read-crl-delta-pem", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCrlDeltaPemResponse" + } + } + } } } } }, - "/{pki_mount_path}/cert/{serial}": { + "/{pki_mount_path}/crl/pem": { "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } - }, - { - "name": "serial", - "description": "Certificate serial number, in colon- or hyphen-separated octal", - "in": "path", - "schema": { - "type": "string" }, "required": true } ], "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCert", + "operationId": "pki-read-crl-pem", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadCrlPemResponse" + } + } + } } } } }, - "/{pki_mount_path}/cert/{serial}/raw": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "/{pki_mount_path}/crl/rotate": { + "description": "Force a rebuild of the CRL.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } - }, - { - "name": "serial", - "description": "Certificate serial number, in colon- or hyphen-separated octal", - "in": "path", - "schema": { - "type": "string" }, "required": true } ], - "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCertRaw", + "operationId": "pki-rotate-crl", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiRotateCrlResponse" + } + } + } } } } }, - "/{pki_mount_path}/cert/{serial}/raw/pem": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "/{pki_mount_path}/crl/rotate-delta": { + "description": "Force a rebuild of the delta CRL.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } - }, - { - "name": "serial", - "description": "Certificate serial number, in colon- or hyphen-separated octal", - "in": "path", - "schema": { - "type": "string" }, "required": true } ], - "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCertRawPem", + "operationId": "pki-rotate-delta-crl", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiRotateDeltaCrlResponse" + } + } + } } } } }, - "/{pki_mount_path}/certs": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "/{pki_mount_path}/intermediate/cross-sign": { + "description": "Generate a new CSR and private key used for signing.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], - "get": { - "operationId": "PKIListCerts", + "post": { + "operationId": "pki-cross-sign-intermediate", "tags": [ "secrets" ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiCrossSignIntermediateRequest" + } + } } - ], + }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiCrossSignIntermediateResponse" + } + } + } } } } }, - "/{pki_mount_path}/certs/revoked": { - "description": "List all revoked serial numbers within the local cluster", + "/{pki_mount_path}/intermediate/generate/{exported}": { + "description": "Generate a new CSR and private key used for signing.", "parameters": [ { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "exported", + "description": "Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key!", "in": "path", "schema": { "type": "string", - "default": "pki" - } - } - ], - "get": { - "operationId": "PKIListCertsRevoked", - "tags": [ - "secrets" - ], - "parameters": [ - { - "name": "list", - "description": "Must be set to `true`", - "in": "query", - "schema": { - "type": "string", - "enum": [ - "true" - ] - }, - "required": true - } - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/config/auto-tidy": { - "description": "Modifies the current configuration for automatic tidy execution.", - "parameters": [ + "enum": [ + "internal", + "external", + "kms" + ] + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], - "get": { - "operationId": "PKIReadAutoTidyConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, "post": { - "operationId": "PKIWriteAutoTidyConfig", + "operationId": "pki-generate-intermediate", "tags": [ "secrets" ], @@ -19438,33 +19494,41 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteAutoTidyConfigRequest" + "$ref": "#/components/schemas/PkiGenerateIntermediateRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiGenerateIntermediateResponse" + } + } + } } } } }, - "/{pki_mount_path}/config/ca": { - "description": "Set the CA certificate and private key used for generated credentials.", + "/{pki_mount_path}/intermediate/set-signed": { + "description": "Provide the signed intermediate CA cert.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIWriteCAConfig", + "operationId": "pki-set-signed-intermediate", "tags": [ "secrets" ], @@ -19473,44 +19537,50 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteCAConfigRequest" + "$ref": "#/components/schemas/PkiSetSignedIntermediateRequest" } } } }, "responses": { "200": { - "description": "OK" - } - } + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiSetSignedIntermediateResponse" + } + } + } + } + } } }, - "/{pki_mount_path}/config/cluster": { - "description": "Set cluster-local configuration, including address to this PR cluster.", + "/{pki_mount_path}/issue/{role}": { + "description": "Request a certificate using a certain role with the provided details.", "parameters": [ + { + "name": "role", + "description": "The desired role with configuration for this request", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], - "get": { - "operationId": "PKIReadClusterConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, "post": { - "operationId": "PKIWriteClusterConfig", + "operationId": "pki-issue-with-role", "tags": [ "secrets" ], @@ -19519,44 +19589,69 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteClusterConfigRequest" + "$ref": "#/components/schemas/PkiIssueWithRoleRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssueWithRoleResponse" + } + } + } } } } }, - "/{pki_mount_path}/config/crl": { - "description": "Configure the CRL expiration.", + "/{pki_mount_path}/issuer/{issuer_ref}": { + "description": "Fetch a single issuer certificate.", "parameters": [ + { + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", + "in": "path", + "schema": { + "type": "string", + "default": "default" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PKIReadCRLConfig", + "operationId": "pki-read-issuer", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadIssuerResponse" + } + } + } } } }, "post": { - "operationId": "PKIWriteCRLConfig", + "operationId": "pki-write-issuer", "tags": [ "secrets" ], @@ -19565,391 +19660,382 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteCRLConfigRequest" + "$ref": "#/components/schemas/PkiWriteIssuerRequest" } } } }, "responses": { "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/config/issuers": { - "description": "Read and set the default issuer certificate for signing.", - "parameters": [ - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" - } - } - ], - "get": { - "operationId": "PKIReadIssuersConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiWriteIssuerResponse" + } + } + } } } }, - "post": { - "operationId": "PKIWriteIssuersConfig", + "delete": { + "operationId": "pki-delete-issuer", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteIssuersConfigRequest" - } - } - } - }, "responses": { - "200": { - "description": "OK" + "204": { + "description": "No Content" } } } }, - "/{pki_mount_path}/config/keys": { - "description": "Read and set the default key used for signing", + "/{pki_mount_path}/issuer/{issuer_ref}/crl": { + "description": "Fetch an issuer's Certificate Revocation Log (CRL).", "parameters": [ + { + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", + "in": "path", + "schema": { + "type": "string", + "default": "default" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadKeysConfig", + "operationId": "pki-issuer-read-crl", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "PKIWriteKeysConfig", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteKeysConfigRequest" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerReadCrlResponse" + } } } } - }, - "responses": { - "200": { - "description": "OK" - } } } }, - "/{pki_mount_path}/config/urls": { - "description": "Set the URLs for the issuing CA, CRL distribution points, and OCSP servers.", + "/{pki_mount_path}/issuer/{issuer_ref}/crl/delta": { + "description": "Fetch an issuer's Certificate Revocation Log (CRL).", "parameters": [ + { + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", + "in": "path", + "schema": { + "type": "string", + "default": "default" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadURLConfig", + "operationId": "pki-issuer-read-crl-delta", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "PKIWriteURLConfig", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteURLConfigRequest" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerReadCrlDeltaResponse" + } } } } - }, - "responses": { - "200": { - "description": "OK" - } } } }, - "/{pki_mount_path}/crl": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "/{pki_mount_path}/issuer/{issuer_ref}/crl/delta/der": { + "description": "Fetch an issuer's Certificate Revocation Log (CRL).", "parameters": [ + { + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", + "in": "path", + "schema": { + "type": "string", + "default": "default" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCRL", + "operationId": "pki-issuer-read-crl-delta-der", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerReadCrlDeltaDerResponse" + } + } + } } } } }, - "/{pki_mount_path}/crl/rotate": { - "description": "Force a rebuild of the CRL.", + "/{pki_mount_path}/issuer/{issuer_ref}/crl/delta/pem": { + "description": "Fetch an issuer's Certificate Revocation Log (CRL).", "parameters": [ { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "in": "path", "schema": { "type": "string", - "default": "pki" - } - } - ], - "get": { - "operationId": "PKIReadCRLRotate", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/crl/rotate-delta": { - "description": "Force a rebuild of the delta CRL.", - "parameters": [ + "default": "default" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadCRLRotateDelta", + "operationId": "pki-issuer-read-crl-delta-pem", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerReadCrlDeltaPemResponse" + } + } + } } } } }, - "/{pki_mount_path}/delta-crl": { - "description": "Fetch a CA, CRL, CA Chain, or non-revoked certificate.", + "/{pki_mount_path}/issuer/{issuer_ref}/crl/der": { + "description": "Fetch an issuer's Certificate Revocation Log (CRL).", "parameters": [ + { + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", + "in": "path", + "schema": { + "type": "string", + "default": "default" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], + "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadDeltaCRL", + "operationId": "pki-issuer-read-crl-der", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerReadCrlDerResponse" + } + } + } } } } }, - "/{pki_mount_path}/intermediate/cross-sign": { - "description": "Generate a new CSR and private key used for signing.", + "/{pki_mount_path}/issuer/{issuer_ref}/crl/pem": { + "description": "Fetch an issuer's Certificate Revocation Log (CRL).", "parameters": [ + { + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", + "in": "path", + "schema": { + "type": "string", + "default": "default" + }, + "required": true + }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], - "post": { - "operationId": "PKIWriteIntermediateCrossSign", + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-issuer-read-crl-pem", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteIntermediateCrossSignRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerReadCrlPemResponse" + } + } + } } } } }, - "/{pki_mount_path}/intermediate/generate/{exported}": { - "description": "Generate a new CSR and private key used for signing.", + "/{pki_mount_path}/issuer/{issuer_ref}/der": { + "description": "Fetch a single issuer certificate.", "parameters": [ { - "name": "exported", - "description": "Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key!", + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "in": "path", "schema": { "type": "string", - "enum": [ - "internal", - "external", - "kms" - ] + "default": "default" }, "required": true }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], - "post": { - "operationId": "PKIWriteIntermediateGenerate", + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-issuer-der", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteIntermediateGenerateRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadIssuerDerResponse" + } + } + } + }, + "304": { + "description": "Not Modified" } } } }, - "/{pki_mount_path}/intermediate/set-signed": { - "description": "Provide the signed intermediate CA cert.", + "/{pki_mount_path}/issuer/{issuer_ref}/issue/{role}": { + "description": "Request a certificate using a certain role with the provided details.", "parameters": [ { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "in": "path", "schema": { "type": "string", - "default": "pki" - } - } - ], - "post": { - "operationId": "PKIWriteIntermediateSetSigned", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteIntermediateSetSignedRequest" - } - } - } + "default": "default" + }, + "required": true + }, + { + "name": "role", + "description": "The desired role with configuration for this request", + "in": "path", + "schema": { + "type": "string" + }, + "required": true }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/internal|exported": { - "description": "Generate a new private key used for signing.", - "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIWriteInternalExported", + "operationId": "pki-issuer-issue-with-role", "tags": [ "secrets" ], @@ -19958,64 +20044,74 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteInternalExportedRequest" + "$ref": "#/components/schemas/PkiIssuerIssueWithRoleRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerIssueWithRoleResponse" + } + } + } } } } }, - "/{pki_mount_path}/issue/{role}": { - "description": "Request a certificate using a certain role with the provided details.", + "/{pki_mount_path}/issuer/{issuer_ref}/json": { + "description": "Fetch a single issuer certificate.", "parameters": [ { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "issuer_ref", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "in": "path", "schema": { "type": "string", - "default": "pki" - } + "default": "default" + }, + "required": true }, { - "name": "role", - "description": "The desired role with configuration for this request", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true } ], - "post": { - "operationId": "PKIWriteIssueRole", + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-issuer-json", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIWriteIssueRoleRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadIssuerJsonResponse" + } + } + } + }, + "304": { + "description": "Not Modified" } } } }, - "/{pki_mount_path}/issuer/{issuer_ref}/issue/{role}": { - "description": "Request a certificate using a certain role with the provided details.", + "/{pki_mount_path}/issuer/{issuer_ref}/pem": { + "description": "Fetch a single issuer certificate.", "parameters": [ { "name": "issuer_ref", @@ -20029,41 +20125,34 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } - }, - { - "name": "role", - "description": "The desired role with configuration for this request", - "in": "path", - "schema": { - "type": "string" }, "required": true } ], - "post": { - "operationId": "PKIIssuerIssueRole", + "x-vault-unauthenticated": true, + "get": { + "operationId": "pki-read-issuer-pem", "tags": [ "secrets" ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PKIIssuerIssueRoleRequest" - } - } - } - }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadIssuerPemResponse" + } + } + } + }, + "304": { + "description": "Not Modified" } } } @@ -20083,16 +20172,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIIssuerResignCRLs", + "operationId": "pki-issuer-resign-crls", "tags": [ "secrets" ], @@ -20101,14 +20191,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuerResignCRLsRequest" + "$ref": "#/components/schemas/PkiIssuerResignCrlsRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerResignCrlsResponse" + } + } + } } } } @@ -20128,22 +20225,30 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIIssuerRevoke", + "operationId": "pki-revoke-issuer", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiRevokeIssuerResponse" + } + } + } } } } @@ -20163,16 +20268,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIIssuerSignIntermediate", + "operationId": "pki-issuer-sign-intermediate", "tags": [ "secrets" ], @@ -20181,14 +20287,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuerSignIntermediateRequest" + "$ref": "#/components/schemas/PkiIssuerSignIntermediateRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerSignIntermediateResponse" + } + } + } } } } @@ -20208,16 +20321,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIIssuerSignRevocationList", + "operationId": "pki-issuer-sign-revocation-list", "tags": [ "secrets" ], @@ -20226,14 +20340,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuerSignRevocationListRequest" + "$ref": "#/components/schemas/PkiIssuerSignRevocationListRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerSignRevocationListResponse" + } + } + } } } } @@ -20253,16 +20374,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIIssuerSignSelfIssued", + "operationId": "pki-issuer-sign-self-issued", "tags": [ "secrets" ], @@ -20271,14 +20393,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuerSignSelfIssuedRequest" + "$ref": "#/components/schemas/PkiIssuerSignSelfIssuedRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerSignSelfIssuedResponse" + } + } + } } } } @@ -20298,16 +20427,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIIssuerSignVerbatim", + "operationId": "pki-issuer-sign-verbatim", "tags": [ "secrets" ], @@ -20316,14 +20446,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuerSignVerbatimRequest" + "$ref": "#/components/schemas/PkiIssuerSignVerbatimRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerSignVerbatimResponse" + } + } + } } } } @@ -20342,26 +20479,27 @@ "required": true }, { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "The desired role with configuration for this request", "in": "path", "schema": { - "type": "string", - "default": "pki" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "The desired role with configuration for this request", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true } ], "post": { - "operationId": "PKIIssuerSignVerbatimRole", + "operationId": "pki-issuer-sign-verbatim-with-role", "tags": [ "secrets" ], @@ -20370,14 +20508,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuerSignVerbatimRoleRequest" + "$ref": "#/components/schemas/PkiIssuerSignVerbatimWithRoleRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerSignVerbatimWithRoleResponse" + } + } + } } } } @@ -20396,26 +20541,27 @@ "required": true }, { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "The desired role with configuration for this request", "in": "path", "schema": { - "type": "string", - "default": "pki" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "The desired role with configuration for this request", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true } ], "post": { - "operationId": "PKIIssuerSignRole", + "operationId": "pki-issuer-sign-with-role", "tags": [ "secrets" ], @@ -20424,14 +20570,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuerSignRoleRequest" + "$ref": "#/components/schemas/PkiIssuerSignWithRoleRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuerSignWithRoleResponse" + } + } + } } } } @@ -20441,16 +20594,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PKIIssuersList", + "operationId": "pki-list-issuers", "tags": [ "secrets" ], @@ -20470,7 +20624,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiListIssuersResponse" + } + } + } } } } @@ -20494,16 +20655,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIIssuersGenerateIntermediate", + "operationId": "pki-issuers-generate-intermediate", "tags": [ "secrets" ], @@ -20512,14 +20674,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuersGenerateIntermediateRequest" + "$ref": "#/components/schemas/PkiIssuersGenerateIntermediateRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuersGenerateIntermediateResponse" + } + } + } } } } @@ -20543,16 +20712,103 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "pki" + }, + "required": true + } + ], + "post": { + "operationId": "pki-issuers-generate-root", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuersGenerateRootRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuersGenerateRootResponse" + } + } + } + } + } + } + }, + "/{pki_mount_path}/issuers/import/bundle": { + "description": "Import the specified issuing certificates.", + "parameters": [ + { + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" + }, + "required": true + } + ], + "post": { + "operationId": "pki-issuers-import-bundle", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuersImportBundleRequest" + } + } } + }, + "responses": { + "200": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuersImportBundleResponse" + } + } + } + } + } + } + }, + "/{pki_mount_path}/issuers/import/cert": { + "description": "Import the specified issuing certificates.", + "parameters": [ + { + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "pki" + }, + "required": true } ], "post": { - "operationId": "PKIIssuersGenerateRoot", + "operationId": "pki-issuers-import-cert", "tags": [ "secrets" ], @@ -20561,14 +20817,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIIssuersGenerateRootRequest" + "$ref": "#/components/schemas/PkiIssuersImportCertRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuersImportCertResponse" + } + } + } } } } @@ -20588,27 +20851,35 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PKIReadKey", + "operationId": "pki-read-key", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadKeyResponse" + } + } + } } } }, "post": { - "operationId": "PKIWriteKey", + "operationId": "pki-write-key", "tags": [ "secrets" ], @@ -20617,25 +20888,32 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteKeyRequest" + "$ref": "#/components/schemas/PkiWriteKeyRequest" } } } }, "responses": { - "200": { - "description": "OK" + "204": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiWriteKeyResponse" + } + } + } } } }, "delete": { - "operationId": "PKIDeleteKey", + "operationId": "pki-delete-key", "tags": [ "secrets" ], "responses": { "204": { - "description": "empty body" + "description": "No Content" } } } @@ -20645,16 +20923,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PKIListKeys", + "operationId": "pki-list-keys", "tags": [ "secrets" ], @@ -20674,26 +20953,34 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiListKeysResponse" + } + } + } } } } }, - "/{pki_mount_path}/keys/import": { - "description": "Import the specified key.", + "/{pki_mount_path}/keys/generate/exported": { + "description": "Generate a new private key used for signing.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIImportKeys", + "operationId": "pki-generate-exported-key", "tags": [ "secrets" ], @@ -20702,33 +20989,41 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIImportKeysRequest" + "$ref": "#/components/schemas/PkiGenerateExportedKeyRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiGenerateExportedKeyResponse" + } + } + } } } } }, - "/{pki_mount_path}/kms": { + "/{pki_mount_path}/keys/generate/internal": { "description": "Generate a new private key used for signing.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIWriteKMS", + "operationId": "pki-generate-internal-key", "tags": [ "secrets" ], @@ -20737,56 +21032,141 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteKMSRequest" + "$ref": "#/components/schemas/PkiGenerateInternalKeyRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiGenerateInternalKeyResponse" + } + } + } } } } }, - "/{pki_mount_path}/ocsp": { - "description": "Query a certificate's revocation status through OCSP'", + "/{pki_mount_path}/keys/generate/kms": { + "description": "Generate a new private key used for signing.", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" + }, + "required": true + } + ], + "post": { + "operationId": "pki-generate-kms-key", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiGenerateKmsKeyRequest" + } + } } + }, + "responses": { + "200": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiGenerateKmsKeyResponse" + } + } + } + } + } + } + }, + "/{pki_mount_path}/keys/import": { + "description": "Import the specified key.", + "parameters": [ + { + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "pki" + }, + "required": true } ], - "x-vault-unauthenticated": true, "post": { - "operationId": "PKIWriteOCSP", + "operationId": "pki-import-key", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiImportKeyRequest" + } + } + } + }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiImportKeyResponse" + } + } + } } } } }, - "/{pki_mount_path}/ocsp/{req}": { + "/{pki_mount_path}/ocsp": { "description": "Query a certificate's revocation status through OCSP'", "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" + }, + "required": true + } + ], + "x-vault-unauthenticated": true, + "post": { + "operationId": "pki-query-ocsp", + "tags": [ + "secrets" + ], + "responses": { + "200": { + "description": "OK" } - }, + } + } + }, + "/{pki_mount_path}/ocsp/{req}": { + "description": "Query a certificate's revocation status through OCSP'", + "parameters": [ { "name": "req", "description": "base-64 encoded ocsp request", @@ -20795,11 +21175,21 @@ "type": "string" }, "required": true + }, + { + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "pki" + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { - "operationId": "PKIReadOCSPReq", + "operationId": "pki-query-ocsp-with-get-req", "tags": [ "secrets" ], @@ -20815,16 +21205,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIRevoke", + "operationId": "pki-revoke", "tags": [ "secrets" ], @@ -20833,14 +21224,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIRevokeRequest" + "$ref": "#/components/schemas/PkiRevokeRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiRevokeResponse" + } + } + } } } } @@ -20850,16 +21248,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIRevokeWithKey", + "operationId": "pki-revoke-with-key", "tags": [ "secrets" ], @@ -20868,14 +21267,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIRevokeWithKeyRequest" + "$ref": "#/components/schemas/PkiRevokeWithKeyRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiRevokeWithKeyResponse" + } + } + } } } } @@ -20885,16 +21291,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PKIListRoles", + "operationId": "pki-list-roles", "tags": [ "secrets" ], @@ -20914,7 +21321,14 @@ ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiListRolesResponse" + } + } + } } } } @@ -20933,27 +21347,35 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "get": { - "operationId": "PKIReadRole", + "operationId": "pki-read-role", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReadRoleResponse" + } + } + } } } }, "post": { - "operationId": "PKIWriteRole", + "operationId": "pki-write-role", "tags": [ "secrets" ], @@ -20962,25 +21384,32 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIWriteRoleRequest" + "$ref": "#/components/schemas/PkiWriteRoleRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiWriteRoleResponse" + } + } + } } } }, "delete": { - "operationId": "PKIDeleteRole", + "operationId": "pki-delete-role", "tags": [ "secrets" ], "responses": { "204": { - "description": "empty body" + "description": "No Content" } } } @@ -20990,23 +21419,24 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "x-vault-sudo": true, "delete": { - "operationId": "PKIDeleteRoot", + "operationId": "pki-delete-root", "tags": [ "secrets" ], "responses": { - "204": { - "description": "empty body" + "200": { + "description": "OK" } } } @@ -21030,16 +21460,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIGenerateRoot", + "operationId": "pki-generate-root", "tags": [ "secrets" ], @@ -21048,14 +21479,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIGenerateRootRequest" + "$ref": "#/components/schemas/PkiGenerateRootRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiGenerateRootResponse" + } + } + } } } } @@ -21065,16 +21503,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIReplaceRoot", + "operationId": "pki-replace-root", "tags": [ "secrets" ], @@ -21083,14 +21522,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIReplaceRootRequest" + "$ref": "#/components/schemas/PkiReplaceRootRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiReplaceRootResponse" + } + } + } } } } @@ -21114,16 +21560,17 @@ }, { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIRotateRoot", + "operationId": "pki-issuers-rotate-root", "tags": [ "secrets" ], @@ -21132,14 +21579,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIRotateRootRequest" + "$ref": "#/components/schemas/PkiIssuersRotateRootRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiIssuersRotateRootResponse" + } + } + } } } } @@ -21149,16 +21603,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKIRootSignIntermediate", + "operationId": "pki-root-sign-intermediate", "tags": [ "secrets" ], @@ -21167,14 +21622,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIRootSignIntermediateRequest" + "$ref": "#/components/schemas/PkiRootSignIntermediateRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiRootSignIntermediateResponse" + } + } + } } } } @@ -21184,17 +21646,18 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "x-vault-sudo": true, "post": { - "operationId": "PKIRootSignSelfIssued", + "operationId": "pki-root-sign-self-issued", "tags": [ "secrets" ], @@ -21203,14 +21666,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKIRootSignSelfIssuedRequest" + "$ref": "#/components/schemas/PkiRootSignSelfIssuedRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiRootSignSelfIssuedResponse" + } + } + } } } } @@ -21220,16 +21690,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKISignVerbatim", + "operationId": "pki-sign-verbatim", "tags": [ "secrets" ], @@ -21238,14 +21709,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKISignVerbatimRequest" + "$ref": "#/components/schemas/PkiSignVerbatimRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiSignVerbatimResponse" + } + } + } } } } @@ -21254,26 +21732,27 @@ "description": "Issue a certificate directly based on the provided CSR.", "parameters": [ { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "The desired role with configuration for this request", "in": "path", "schema": { - "type": "string", - "default": "pki" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "The desired role with configuration for this request", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true } ], "post": { - "operationId": "PKISignVerbatimRole", + "operationId": "pki-sign-verbatim-with-role", "tags": [ "secrets" ], @@ -21282,14 +21761,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKISignVerbatimRoleRequest" + "$ref": "#/components/schemas/PkiSignVerbatimWithRoleRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiSignVerbatimWithRoleResponse" + } + } + } } } } @@ -21298,26 +21784,27 @@ "description": "Request certificates using a certain role with the provided details.", "parameters": [ { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "role", + "description": "The desired role with configuration for this request", "in": "path", "schema": { - "type": "string", - "default": "pki" - } + "type": "string" + }, + "required": true }, { - "name": "role", - "description": "The desired role with configuration for this request", + "name": "pki_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "pki" }, "required": true } ], "post": { - "operationId": "PKISignRole", + "operationId": "pki-sign-with-role", "tags": [ "secrets" ], @@ -21326,14 +21813,21 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKISignRoleRequest" + "$ref": "#/components/schemas/PkiSignWithRoleRequest" } } } }, "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiSignWithRoleResponse" + } + } + } } } } @@ -21343,16 +21837,17 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKITidy", + "operationId": "pki-tidy", "tags": [ "secrets" ], @@ -21361,14 +21856,14 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/PKITidyRequest" + "$ref": "#/components/schemas/PkiTidyRequest" } } } }, "responses": { - "200": { - "description": "OK" + "202": { + "description": "Accepted" } } } @@ -21378,22 +21873,30 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } + }, + "required": true } ], "post": { - "operationId": "PKITidyCancel", + "operationId": "pki-tidy-cancel", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiTidyCancelResponse" + } + } + } } } } @@ -21403,125 +21906,31 @@ "parameters": [ { "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "pki" - } - } - ], - "get": { - "operationId": "PKITidyStatus", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/{issuer_ref}/crl/pem|/der|/delta/pem": { - "description": "Fetch an issuer's Certificate Revocation Log (CRL).", - "parameters": [ - { - "name": "issuer_ref", - "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", - "in": "path", - "schema": { - "type": "string", - "default": "default" }, "required": true - }, - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" - } - } - ], - "get": { - "operationId": "PkiReadIssuerRefCrlPemDerDeltaPem", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{pki_mount_path}/{issuer_ref}/der|/pem": { - "description": "Fetch a single issuer certificate.", - "parameters": [ - { - "name": "issuer_ref", - "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", - "in": "path", - "schema": { - "type": "string", - "default": "default" - }, - "required": true - }, - { - "name": "pki_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "pki" - } } ], "get": { - "operationId": "PkiReadIssuerRefDerPem", + "operationId": "pki-tidy-status", "tags": [ "secrets" ], "responses": { "200": { - "description": "OK" - } - } - }, - "post": { - "operationId": "PkiWriteIssuerRefDerPem", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/PkiWriteIssuerRefDerPemRequest" + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PkiTidyStatusResponse" + } } } } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "operationId": "PkiDeleteIssuerRefDerPem", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } } } }, @@ -21530,17 +21939,18 @@ "parameters": [ { "name": "rabbitmq_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "rabbitmq" - } + }, + "required": true } ], "post": { "summary": "Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API.", - "operationId": "RabbitMQWriteConnectionConfig", + "operationId": "rabbit-mq-configure-connection", "tags": [ "secrets" ], @@ -21549,7 +21959,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RabbitMQWriteConnectionConfigRequest" + "$ref": "#/components/schemas/RabbitMqConfigureConnectionRequest" } } } @@ -21566,17 +21976,17 @@ "parameters": [ { "name": "rabbitmq_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "rabbitmq" - } + }, + "required": true } ], "get": { - "summary": "Configure the lease parameters for generated credentials", - "operationId": "RabbitMQReadLeaseConfig", + "operationId": "rabbit-mq-read-lease-configuration", "tags": [ "secrets" ], @@ -21587,8 +21997,7 @@ } }, "post": { - "summary": "Configure the lease parameters for generated credentials", - "operationId": "RabbitMQWriteLeaseConfig", + "operationId": "rabbit-mq-configure-lease", "tags": [ "secrets" ], @@ -21597,7 +22006,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RabbitMQWriteLeaseConfigRequest" + "$ref": "#/components/schemas/RabbitMqConfigureLeaseRequest" } } } @@ -21623,17 +22032,18 @@ }, { "name": "rabbitmq_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "rabbitmq" - } + }, + "required": true } ], "get": { "summary": "Request RabbitMQ credentials for a certain role.", - "operationId": "RabbitMQReadCredentials", + "operationId": "rabbit-mq-request-credentials", "tags": [ "secrets" ], @@ -21649,17 +22059,18 @@ "parameters": [ { "name": "rabbitmq_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "rabbitmq" - } + }, + "required": true } ], "get": { "summary": "Manage the roles that can be created with this backend.", - "operationId": "RabbitMQListRoles", + "operationId": "rabbit-mq-list-roles", "tags": [ "secrets" ], @@ -21698,17 +22109,18 @@ }, { "name": "rabbitmq_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "rabbitmq" - } + }, + "required": true } ], "get": { "summary": "Manage the roles that can be created with this backend.", - "operationId": "RabbitMQReadRole", + "operationId": "rabbit-mq-read-role", "tags": [ "secrets" ], @@ -21720,7 +22132,7 @@ }, "post": { "summary": "Manage the roles that can be created with this backend.", - "operationId": "RabbitMQWriteRole", + "operationId": "rabbit-mq-write-role", "tags": [ "secrets" ], @@ -21729,7 +22141,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RabbitMQWriteRoleRequest" + "$ref": "#/components/schemas/RabbitMqWriteRoleRequest" } } } @@ -21742,7 +22154,7 @@ }, "delete": { "summary": "Manage the roles that can be created with this backend.", - "operationId": "RabbitMQDeleteRole", + "operationId": "rabbit-mq-delete-role", "tags": [ "secrets" ], @@ -21753,36 +22165,22 @@ } } }, - "/{secret_mount_path}/.*": { - "parameters": [ - { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "secret" - } - } - ] - }, - "/{secret_mount_path}/config": { - "description": "Configures settings for the KV store", + "/{ssh_mount_path}/config/ca": { + "description": "Set the SSH private key used for signing certificates.", "parameters": [ { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "ssh_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", - "default": "secret" - } + "default": "ssh" + }, + "required": true } ], - "x-vault-createSupported": true, "get": { - "summary": "Read the backend level settings.", - "operationId": "KVv2ReadConfig", + "operationId": "ssh-read-ca-configuration", "tags": [ "secrets" ], @@ -21793,8 +22191,7 @@ } }, "post": { - "summary": "Configure backend level settings that are applied to every key in the key-value store.", - "operationId": "KVv2WriteConfig", + "operationId": "ssh-configure-ca", "tags": [ "secrets" ], @@ -21803,7 +22200,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/KVv2WriteConfigRequest" + "$ref": "#/components/schemas/SshConfigureCaRequest" } } } @@ -21813,34 +22210,35 @@ "description": "OK" } } + }, + "delete": { + "operationId": "ssh-delete-ca-configuration", + "tags": [ + "secrets" + ], + "responses": { + "204": { + "description": "empty body" + } + } } }, - "/{secret_mount_path}/data/{path}": { - "description": "Write, Patch, Read, and Delete data in the Key-Value Store.", + "/{ssh_mount_path}/config/zeroaddress": { + "description": "Assign zero address as default CIDR block for select roles.", "parameters": [ { - "name": "path", - "description": "Location of the secret.", + "name": "ssh_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "ssh" }, "required": true - }, - { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "secret" - } } ], - "x-vault-createSupported": true, "get": { - "summary": "Write, Patch, Read, and Delete data in the Key-Value Store.", - "operationId": "KVv2Read", + "operationId": "ssh-read-zero-address-configuration", "tags": [ "secrets" ], @@ -21851,8 +22249,7 @@ } }, "post": { - "summary": "Write, Patch, Read, and Delete data in the Key-Value Store.", - "operationId": "KVv2Write", + "operationId": "ssh-configure-zero-address", "tags": [ "secrets" ], @@ -21861,7 +22258,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/KVv2WriteRequest" + "$ref": "#/components/schemas/SshConfigureZeroAddressRequest" } } } @@ -21873,381 +22270,7 @@ } }, "delete": { - "summary": "Write, Patch, Read, and Delete data in the Key-Value Store.", - "operationId": "KVv2Delete", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/{secret_mount_path}/delete/{path}": { - "description": "Marks one or more versions as deleted in the KV store.", - "parameters": [ - { - "name": "path", - "description": "Location of the secret.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "secret" - } - } - ], - "x-vault-createSupported": true, - "post": { - "summary": "Marks one or more versions as deleted in the KV store.", - "operationId": "KVv2DeleteVersions", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/KVv2DeleteVersionsRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{secret_mount_path}/destroy/{path}": { - "description": "Permanently removes one or more versions in the KV store", - "parameters": [ - { - "name": "path", - "description": "Location of the secret.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "secret" - } - } - ], - "x-vault-createSupported": true, - "post": { - "summary": "Permanently removes one or more versions in the KV store", - "operationId": "KVv2DestroyVersions", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/KVv2DestroyVersionsRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{secret_mount_path}/metadata/{path}": { - "description": "Configures settings for the KV store", - "parameters": [ - { - "name": "path", - "description": "Location of the secret.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "secret" - } - } - ], - "x-vault-createSupported": true, - "get": { - "summary": "Configures settings for the KV store", - "operationId": "KVv2ReadMetadata", - "tags": [ - "secrets" - ], - "parameters": [ - { - "name": "list", - "description": "Return a list if `true`", - "in": "query", - "schema": { - "type": "string" - } - } - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Configures settings for the KV store", - "operationId": "KVv2WriteMetadata", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/KVv2WriteMetadataRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "Configures settings for the KV store", - "operationId": "KVv2DeleteMetadata", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/{secret_mount_path}/subkeys/{path}": { - "description": "Read the structure of a secret entry from the Key-Value store with the values removed.", - "parameters": [ - { - "name": "path", - "description": "Location of the secret.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "secret" - } - } - ], - "get": { - "summary": "Read the structure of a secret entry from the Key-Value store with the values removed.", - "operationId": "KVv2ReadSubkeys", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{secret_mount_path}/undelete/{path}": { - "description": "Undeletes one or more versions from the KV store.", - "parameters": [ - { - "name": "path", - "description": "Location of the secret.", - "in": "path", - "schema": { - "type": "string" - }, - "required": true - }, - { - "name": "secret_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "secret" - } - } - ], - "x-vault-createSupported": true, - "post": { - "summary": "Undeletes one or more versions from the KV store.", - "operationId": "KVv2UndeleteVersions", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/KVv2UndeleteVersionsRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{ssh_mount_path}/config/ca": { - "description": "Set the SSH private key used for signing certificates.", - "parameters": [ - { - "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "ssh" - } - } - ], - "get": { - "summary": "Set the SSH private key used for signing certificates.", - "operationId": "SSHReadCAConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Set the SSH private key used for signing certificates.", - "operationId": "SSHWriteCAConfig", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/SSHWriteCAConfigRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "Set the SSH private key used for signing certificates.", - "operationId": "SSHDeleteCAConfig", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } - } - }, - "/{ssh_mount_path}/config/zeroaddress": { - "description": "Assign zero address as default CIDR block for select roles.", - "parameters": [ - { - "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "ssh" - } - } - ], - "get": { - "summary": "Assign zero address as default CIDR block for select roles.", - "operationId": "SSHReadZeroAddressConfig", - "tags": [ - "secrets" - ], - "responses": { - "200": { - "description": "OK" - } - } - }, - "post": { - "summary": "Assign zero address as default CIDR block for select roles.", - "operationId": "SSHWriteZeroAddressConfig", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/SSHWriteZeroAddressConfigRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - }, - "delete": { - "summary": "Assign zero address as default CIDR block for select roles.", - "operationId": "SSHDeleteZeroAddressConfig", + "operationId": "ssh-delete-zero-address-configuration", "tags": [ "secrets" ], @@ -22272,17 +22295,18 @@ }, { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } + }, + "required": true } ], "post": { "summary": "Creates a credential for establishing SSH connection with the remote host.", - "operationId": "SSHWriteCredentials", + "operationId": "ssh-generate-credentials", "tags": [ "secrets" ], @@ -22291,7 +22315,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SSHWriteCredentialsRequest" + "$ref": "#/components/schemas/SshGenerateCredentialsRequest" } } } @@ -22317,61 +22341,17 @@ }, { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } - } - ], - "post": { - "operationId": "SSHWriteIssue", - "tags": [ - "secrets" - ], - "requestBody": { - "required": true, - "content": { - "application/json": { - "schema": { - "$ref": "#/components/schemas/SSHWriteIssueRequest" - } - } - } - }, - "responses": { - "200": { - "description": "OK" - } - } - } - }, - "/{ssh_mount_path}/keys/{key_name}": { - "description": "Register a shared private key with Vault.", - "parameters": [ - { - "name": "key_name", - "description": "[Required] Name of the key", - "in": "path", - "schema": { - "type": "string" }, "required": true - }, - { - "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "ssh" - } } ], "post": { - "summary": "Register a shared private key with Vault.", - "operationId": "SSHWriteKeys", + "operationId": "ssh-issue-certificate", "tags": [ "secrets" ], @@ -22380,7 +22360,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SSHWriteKeysRequest" + "$ref": "#/components/schemas/SshIssueCertificateRequest" } } } @@ -22390,18 +22370,6 @@ "description": "OK" } } - }, - "delete": { - "summary": "Register a shared private key with Vault.", - "operationId": "SSHDeleteKeys", - "tags": [ - "secrets" - ], - "responses": { - "204": { - "description": "empty body" - } - } } }, "/{ssh_mount_path}/lookup": { @@ -22409,17 +22377,18 @@ "parameters": [ { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } + }, + "required": true } ], "post": { "summary": "List all the roles associated with the given IP address.", - "operationId": "SSHLookup", + "operationId": "ssh-list-roles-by-ip", "tags": [ "secrets" ], @@ -22428,7 +22397,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SSHLookupRequest" + "$ref": "#/components/schemas/SshListRolesByIpRequest" } } } @@ -22445,18 +22414,19 @@ "parameters": [ { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "get": { "summary": "Retrieve the public key.", - "operationId": "SSHReadPublicKey", + "operationId": "ssh-read-public-key", "tags": [ "secrets" ], @@ -22472,17 +22442,18 @@ "parameters": [ { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } + }, + "required": true } ], "get": { "summary": "Manage the 'roles' that can be created with this backend.", - "operationId": "SSHListRoles", + "operationId": "ssh-list-roles", "tags": [ "secrets" ], @@ -22521,17 +22492,18 @@ }, { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } + }, + "required": true } ], "get": { "summary": "Manage the 'roles' that can be created with this backend.", - "operationId": "SSHReadRole", + "operationId": "ssh-read-role", "tags": [ "secrets" ], @@ -22543,7 +22515,7 @@ }, "post": { "summary": "Manage the 'roles' that can be created with this backend.", - "operationId": "SSHWriteRole", + "operationId": "ssh-write-role", "tags": [ "secrets" ], @@ -22552,7 +22524,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SSHWriteRoleRequest" + "$ref": "#/components/schemas/SshWriteRoleRequest" } } } @@ -22565,7 +22537,7 @@ }, "delete": { "summary": "Manage the 'roles' that can be created with this backend.", - "operationId": "SSHDeleteRole", + "operationId": "ssh-delete-role", "tags": [ "secrets" ], @@ -22590,17 +22562,18 @@ }, { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } + }, + "required": true } ], "post": { "summary": "Request signing an SSH key using a certain role with the provided details.", - "operationId": "SSHSign", + "operationId": "ssh-sign-certificate", "tags": [ "secrets" ], @@ -22609,7 +22582,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SSHSignRequest" + "$ref": "#/components/schemas/SshSignCertificateRequest" } } } @@ -22621,23 +22594,51 @@ } } }, + "/{ssh_mount_path}/tidy/dynamic-keys": { + "description": "This endpoint removes the stored host keys used for the removed Dynamic Key feature, if present.", + "parameters": [ + { + "name": "ssh_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "ssh" + }, + "required": true + } + ], + "delete": { + "summary": "This endpoint removes the stored host keys used for the removed Dynamic Key feature, if present.", + "operationId": "ssh-tidy-dynamic-host-keys", + "tags": [ + "secrets" + ], + "responses": { + "204": { + "description": "empty body" + } + } + } + }, "/{ssh_mount_path}/verify": { "description": "Validate the OTP provided by Vault SSH Agent.", "parameters": [ { "name": "ssh_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "ssh" - } + }, + "required": true } ], "x-vault-unauthenticated": true, "post": { "summary": "Validate the OTP provided by Vault SSH Agent.", - "operationId": "SSHVerify", + "operationId": "ssh-verify-otp", "tags": [ "secrets" ], @@ -22646,7 +22647,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/SSHVerifyRequest" + "$ref": "#/components/schemas/SshVerifyOtpRequest" } } } @@ -22663,17 +22664,18 @@ "parameters": [ { "name": "terraform_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "terraform" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { - "operationId": "TerraformReadConfig", + "operationId": "terraform-cloud-read-configuration", "tags": [ "secrets" ], @@ -22684,7 +22686,7 @@ } }, "post": { - "operationId": "TerraformWriteConfig", + "operationId": "terraform-cloud-configure", "tags": [ "secrets" ], @@ -22692,9 +22694,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/TerraformWriteConfigRequest" - } + "schema": {} } } }, @@ -22705,7 +22705,7 @@ } }, "delete": { - "operationId": "TerraformDeleteConfig", + "operationId": "terraform-cloud-delete-configuration", "tags": [ "secrets" ], @@ -22730,17 +22730,17 @@ }, { "name": "terraform_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "terraform" - } + }, + "required": true } ], "get": { - "summary": "Generate a Terraform Cloud or Enterprise API token from a specific Vault role.", - "operationId": "TerraformReadCredentials", + "operationId": "terraform-cloud-generate-credentials", "tags": [ "secrets" ], @@ -22751,8 +22751,7 @@ } }, "post": { - "summary": "Generate a Terraform Cloud or Enterprise API token from a specific Vault role.", - "operationId": "TerraformWriteCredentials", + "operationId": "terraform-cloud-generate-credentials2", "tags": [ "secrets" ], @@ -22768,16 +22767,17 @@ "parameters": [ { "name": "terraform_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "terraform" - } + }, + "required": true } ], "get": { - "operationId": "TerraformListRoles", + "operationId": "terraform-cloud-list-roles", "tags": [ "secrets" ], @@ -22816,17 +22816,17 @@ }, { "name": "terraform_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "terraform" - } + }, + "required": true } ], - "x-vault-createSupported": true, "get": { - "operationId": "TerraformReadRole", + "operationId": "terraform-cloud-read-role", "tags": [ "secrets" ], @@ -22837,7 +22837,7 @@ } }, "post": { - "operationId": "TerraformWriteRole", + "operationId": "terraform-cloud-write-role", "tags": [ "secrets" ], @@ -22845,9 +22845,7 @@ "required": true, "content": { "application/json": { - "schema": { - "$ref": "#/components/schemas/TerraformWriteRoleRequest" - } + "schema": {} } } }, @@ -22858,7 +22856,7 @@ } }, "delete": { - "operationId": "TerraformDeleteRole", + "operationId": "terraform-cloud-delete-role", "tags": [ "secrets" ], @@ -22883,16 +22881,17 @@ }, { "name": "terraform_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "terraform" - } + }, + "required": true } ], "post": { - "operationId": "TerraformRotateRole", + "operationId": "terraform-cloud-rotate-role", "tags": [ "secrets" ], @@ -22917,17 +22916,17 @@ }, { "name": "totp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "totp" - } + }, + "required": true } ], "get": { - "summary": "Request time-based one-time use password or validate a password for a certain key .", - "operationId": "TOTPReadCode", + "operationId": "totp-generate-code", "tags": [ "secrets" ], @@ -22938,8 +22937,7 @@ } }, "post": { - "summary": "Request time-based one-time use password or validate a password for a certain key .", - "operationId": "TOTPWriteCode", + "operationId": "totp-validate-code", "tags": [ "secrets" ], @@ -22948,7 +22946,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TOTPWriteCodeRequest" + "$ref": "#/components/schemas/TotpValidateCodeRequest" } } } @@ -22965,17 +22963,18 @@ "parameters": [ { "name": "totp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "totp" - } + }, + "required": true } ], "get": { "summary": "Manage the keys that can be created with this backend.", - "operationId": "TOTPListKeys", + "operationId": "totp-list-keys", "tags": [ "secrets" ], @@ -23014,17 +23013,17 @@ }, { "name": "totp_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "totp" - } + }, + "required": true } ], "get": { - "summary": "Manage the keys that can be created with this backend.", - "operationId": "TOTPReadKey", + "operationId": "totp-read-key", "tags": [ "secrets" ], @@ -23035,8 +23034,7 @@ } }, "post": { - "summary": "Manage the keys that can be created with this backend.", - "operationId": "TOTPWriteKey", + "operationId": "totp-create-key", "tags": [ "secrets" ], @@ -23045,7 +23043,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TOTPWriteKeyRequest" + "$ref": "#/components/schemas/TotpCreateKeyRequest" } } } @@ -23057,8 +23055,7 @@ } }, "delete": { - "summary": "Manage the keys that can be created with this backend.", - "operationId": "TOTPDeleteKey", + "operationId": "totp-delete-key", "tags": [ "secrets" ], @@ -23083,17 +23080,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "get": { "summary": "Backup the named key", - "operationId": "TransitBackup", + "operationId": "transit-back-up-key", "tags": [ "secrets" ], @@ -23109,18 +23107,19 @@ "parameters": [ { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "x-vault-createSupported": true, "get": { "summary": "Returns the size of the active cache", - "operationId": "TransitReadCacheConfig", + "operationId": "transit-read-cache-configuration", "tags": [ "secrets" ], @@ -23132,7 +23131,7 @@ }, "post": { "summary": "Configures a new cache of the specified size", - "operationId": "TransitWriteCacheConfig", + "operationId": "transit-configure-cache", "tags": [ "secrets" ], @@ -23141,7 +23140,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitWriteCacheConfigRequest" + "$ref": "#/components/schemas/TransitConfigureCacheRequest" } } } @@ -23158,17 +23157,17 @@ "parameters": [ { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "get": { - "summary": "Configuration common across all keys", - "operationId": "TransitReadConfigKeys", + "operationId": "transit-read-keys-configuration", "tags": [ "secrets" ], @@ -23179,8 +23178,7 @@ } }, "post": { - "summary": "Configuration common across all keys", - "operationId": "TransitWriteConfigKeys", + "operationId": "transit-configure-keys", "tags": [ "secrets" ], @@ -23189,7 +23187,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitWriteConfigKeysRequest" + "$ref": "#/components/schemas/TransitConfigureKeysRequest" } } } @@ -23224,17 +23222,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Generate a data key", - "operationId": "TransitGenerateDataKey", + "operationId": "transit-generate-data-key", "tags": [ "secrets" ], @@ -23269,17 +23268,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Decrypt a ciphertext value using a named key", - "operationId": "TransitDecrypt", + "operationId": "transit-decrypt", "tags": [ "secrets" ], @@ -23314,18 +23314,19 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "x-vault-createSupported": true, "post": { "summary": "Encrypt a plaintext value or a batch of plaintext\nblocks using a named key", - "operationId": "TransitEncrypt", + "operationId": "transit-encrypt", "tags": [ "secrets" ], @@ -23359,27 +23360,28 @@ "required": true }, { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "type", + "description": "Type of key to export (encryption-key, signing-key, hmac-key)", "in": "path", "schema": { - "type": "string", - "default": "transit" - } + "type": "string" + }, + "required": true }, { - "name": "type", - "description": "Type of key to export (encryption-key, signing-key, hmac-key)", + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "transit" }, "required": true } ], "get": { "summary": "Export named encryption or signing key", - "operationId": "TransitExport", + "operationId": "transit-export-key", "tags": [ "secrets" ], @@ -23402,15 +23404,6 @@ }, "required": true }, - { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", - "in": "path", - "schema": { - "type": "string", - "default": "transit" - } - }, { "name": "type", "description": "Type of key to export (encryption-key, signing-key, hmac-key)", @@ -23428,11 +23421,21 @@ "type": "string" }, "required": true + }, + { + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "transit" + }, + "required": true } ], "get": { "summary": "Export named encryption or signing key", - "operationId": "TransitExportVersion", + "operationId": "transit-export-key-version", "tags": [ "secrets" ], @@ -23448,17 +23451,18 @@ "parameters": [ { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Generate a hash sum for input data", - "operationId": "TransitHash", + "operationId": "transit-hash", "tags": [ "secrets" ], @@ -23483,27 +23487,28 @@ "description": "Generate a hash sum for input data", "parameters": [ { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "urlalgorithm", + "description": "Algorithm to use (POST URL parameter)", "in": "path", "schema": { - "type": "string", - "default": "transit" - } + "type": "string" + }, + "required": true }, { - "name": "urlalgorithm", - "description": "Algorithm to use (POST URL parameter)", + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "transit" }, "required": true } ], "post": { "summary": "Generate a hash sum for input data", - "operationId": "TransitHashWithAlgorithm", + "operationId": "transit-hash-with-algorithm", "tags": [ "secrets" ], @@ -23538,17 +23543,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Generate an HMAC for input data using the named key", - "operationId": "TransitGenerateHMAC", + "operationId": "transit-generate-hmac", "tags": [ "secrets" ], @@ -23557,7 +23563,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitGenerateHMACRequest" + "$ref": "#/components/schemas/TransitGenerateHmacRequest" } } } @@ -23582,27 +23588,28 @@ "required": true }, { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "urlalgorithm", + "description": "Algorithm to use (POST URL parameter)", "in": "path", "schema": { - "type": "string", - "default": "transit" - } + "type": "string" + }, + "required": true }, { - "name": "urlalgorithm", - "description": "Algorithm to use (POST URL parameter)", + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "transit" }, "required": true } ], "post": { "summary": "Generate an HMAC for input data using the named key", - "operationId": "TransitGenerateHMACWithAlgorithm", + "operationId": "transit-generate-hmac-with-algorithm", "tags": [ "secrets" ], @@ -23611,7 +23618,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitGenerateHMACWithAlgorithmRequest" + "$ref": "#/components/schemas/TransitGenerateHmacWithAlgorithmRequest" } } } @@ -23628,17 +23635,18 @@ "parameters": [ { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "get": { "summary": "Managed named encryption keys", - "operationId": "TransitListKeys", + "operationId": "transit-list-keys", "tags": [ "secrets" ], @@ -23677,17 +23685,17 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "get": { - "summary": "Managed named encryption keys", - "operationId": "TransitReadKey", + "operationId": "transit-read-key", "tags": [ "secrets" ], @@ -23698,8 +23706,7 @@ } }, "post": { - "summary": "Managed named encryption keys", - "operationId": "TransitWriteKey", + "operationId": "transit-create-key", "tags": [ "secrets" ], @@ -23708,7 +23715,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitWriteKeyRequest" + "$ref": "#/components/schemas/TransitCreateKeyRequest" } } } @@ -23720,8 +23727,7 @@ } }, "delete": { - "summary": "Managed named encryption keys", - "operationId": "TransitDeleteKey", + "operationId": "transit-delete-key", "tags": [ "secrets" ], @@ -23746,17 +23752,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Configure a named encryption key", - "operationId": "TransitWriteKeyConfig", + "operationId": "transit-configure-key", "tags": [ "secrets" ], @@ -23765,7 +23772,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitWriteKeyConfigRequest" + "$ref": "#/components/schemas/TransitConfigureKeyRequest" } } } @@ -23791,17 +23798,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Imports an externally-generated key into a new transit key", - "operationId": "TransitImportKey", + "operationId": "transit-import-key", "tags": [ "secrets" ], @@ -23836,17 +23844,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Imports an externally-generated key into an existing imported key", - "operationId": "TransitImportKeyVersion", + "operationId": "transit-import-key-version", "tags": [ "secrets" ], @@ -23881,20 +23890,31 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Rotate named encryption key", - "operationId": "TransitRotateKey", + "operationId": "transit-rotate-key", "tags": [ "secrets" ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TransitRotateKeyRequest" + } + } + } + }, "responses": { "200": { "description": "OK" @@ -23916,17 +23936,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Trim key versions of a named key", - "operationId": "TransitTrimKey", + "operationId": "transit-trim-key", "tags": [ "secrets" ], @@ -23952,17 +23973,18 @@ "parameters": [ { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Generate random bytes", - "operationId": "TransitGenerateRandom", + "operationId": "transit-generate-random", "tags": [ "secrets" ], @@ -23998,17 +24020,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Generate random bytes", - "operationId": "TransitGenerateRandomSource", + "operationId": "transit-generate-random-with-source", "tags": [ "secrets" ], @@ -24017,7 +24040,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitGenerateRandomSourceRequest" + "$ref": "#/components/schemas/TransitGenerateRandomWithSourceRequest" } } } @@ -24043,27 +24066,28 @@ "required": true }, { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "urlbytes", + "description": "The number of bytes to generate (POST URL parameter)", "in": "path", "schema": { - "type": "string", - "default": "transit" - } + "type": "string" + }, + "required": true }, { - "name": "urlbytes", - "description": "The number of bytes to generate (POST URL parameter)", + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "transit" }, "required": true } ], "post": { "summary": "Generate random bytes", - "operationId": "TransitGenerateRandomSourceBytes", + "operationId": "transit-generate-random-with-source-and-bytes", "tags": [ "secrets" ], @@ -24072,7 +24096,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitGenerateRandomSourceBytesRequest" + "$ref": "#/components/schemas/TransitGenerateRandomWithSourceAndBytesRequest" } } } @@ -24088,27 +24112,28 @@ "description": "Generate random bytes", "parameters": [ { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "urlbytes", + "description": "The number of bytes to generate (POST URL parameter)", "in": "path", "schema": { - "type": "string", - "default": "transit" - } + "type": "string" + }, + "required": true }, { - "name": "urlbytes", - "description": "The number of bytes to generate (POST URL parameter)", + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "transit" }, "required": true } ], "post": { "summary": "Generate random bytes", - "operationId": "TransitWriteRandomUrlbytes", + "operationId": "transit-generate-random-with-bytes", "tags": [ "secrets" ], @@ -24117,7 +24142,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitWriteRandomUrlbytesRequest" + "$ref": "#/components/schemas/TransitGenerateRandomWithBytesRequest" } } } @@ -24134,17 +24159,18 @@ "parameters": [ { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Restore the named key", - "operationId": "TransitRestore", + "operationId": "transit-restore-key", "tags": [ "secrets" ], @@ -24153,7 +24179,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitRestoreRequest" + "$ref": "#/components/schemas/TransitRestoreKeyRequest" } } } @@ -24179,17 +24205,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Restore the named key", - "operationId": "TransitRestoreKey", + "operationId": "transit-restore-and-rename-key", "tags": [ "secrets" ], @@ -24198,7 +24225,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/TransitRestoreKeyRequest" + "$ref": "#/components/schemas/TransitRestoreAndRenameKeyRequest" } } } @@ -24224,17 +24251,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Rewrap ciphertext", - "operationId": "TransitRewrap", + "operationId": "transit-rewrap", "tags": [ "secrets" ], @@ -24269,17 +24297,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Generate a signature for input data using the named key", - "operationId": "TransitSign", + "operationId": "transit-sign", "tags": [ "secrets" ], @@ -24313,27 +24342,28 @@ "required": true }, { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "urlalgorithm", + "description": "Hash algorithm to use (POST URL parameter)", "in": "path", "schema": { - "type": "string", - "default": "transit" - } + "type": "string" + }, + "required": true }, { - "name": "urlalgorithm", - "description": "Hash algorithm to use (POST URL parameter)", + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "transit" }, "required": true } ], "post": { "summary": "Generate a signature for input data using the named key", - "operationId": "TransitSignWithAlgorithm", + "operationId": "transit-sign-with-algorithm", "tags": [ "secrets" ], @@ -24368,17 +24398,18 @@ }, { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "post": { "summary": "Verify a signature or HMAC for input data created using the named key", - "operationId": "TransitVerify", + "operationId": "transit-verify", "tags": [ "secrets" ], @@ -24412,27 +24443,28 @@ "required": true }, { - "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "name": "urlalgorithm", + "description": "Hash algorithm to use (POST URL parameter)", "in": "path", "schema": { - "type": "string", - "default": "transit" - } + "type": "string" + }, + "required": true }, { - "name": "urlalgorithm", - "description": "Hash algorithm to use (POST URL parameter)", + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { - "type": "string" + "type": "string", + "default": "transit" }, "required": true } ], "post": { "summary": "Verify a signature or HMAC for input data created using the named key", - "operationId": "TransitVerifyWithAlgorithm", + "operationId": "transit-verify-with-algorithm", "tags": [ "secrets" ], @@ -24458,17 +24490,18 @@ "parameters": [ { "name": "transit_mount_path", - "description": "Path where the backend was mounted; the endpoint path will be offset by the mount path", + "description": "Path that the backend was mounted at", "in": "path", "schema": { "type": "string", "default": "transit" - } + }, + "required": true } ], "get": { "summary": "Returns the public key to use for wrapping imported keys", - "operationId": "TransitReadWrappingKey", + "operationId": "transit-read-wrapping-key", "tags": [ "secrets" ], @@ -24482,369 +24515,503 @@ }, "components": { "schemas": { - "AWSConfigWriteCertificateRequest": { + "AliCloudConfigureRequest": { "type": "object", "properties": { - "aws_public_cert": { + "access_key": { "type": "string", - "description": "Base64 encoded AWS Public cert required to verify PKCS7 signature of the EC2 instance metadata." + "description": "Access key with appropriate permissions." }, - "type": { + "secret_key": { "type": "string", - "description": "Takes the value of either \"pkcs7\" or \"identity\", indicating the type of document which can be verified using the given certificate. The reason is that the PKCS#7 document will have a DSA digest and the identity signature will have an RSA signature, and accordingly the public certificates to verify those also vary. Defaults to \"pkcs7\".", - "default": "pkcs7" + "description": "Secret key with appropriate permissions." } } }, - "AWSConfigWriteClientRequest": { + "AliCloudLogInRequest": { "type": "object", "properties": { - "access_key": { - "type": "string", - "description": "AWS Access Key ID for the account used to make AWS API requests.", - "default": "" - }, - "allowed_sts_header_values": { - "type": "array", - "description": "List of additional headers that are allowed to be in AWS STS request headers", - "items": { - "type": "string" - } - }, - "endpoint": { - "type": "string", - "description": "URL to override the default generated endpoint for making AWS EC2 API calls.", - "default": "" - }, - "iam_endpoint": { - "type": "string", - "description": "URL to override the default generated endpoint for making AWS IAM API calls.", - "default": "" - }, - "iam_server_id_header_value": { - "type": "string", - "description": "Value to require in the X-Vault-AWS-IAM-Server-ID request header", - "default": "" - }, - "max_retries": { - "type": "integer", - "description": "Maximum number of retries for recoverable exceptions of AWS APIs", - "default": -1 - }, - "secret_key": { + "identity_request_headers": { "type": "string", - "description": "AWS Secret Access Key for the account used to make AWS API requests.", - "default": "" + "description": "The request headers. This must include the headers over which AliCloud has included a signature." }, - "sts_endpoint": { + "identity_request_url": { "type": "string", - "description": "URL to override the default generated endpoint for making AWS STS API calls.", - "default": "" + "description": "Base64-encoded full URL against which to make the AliCloud request." }, - "sts_region": { + "role": { "type": "string", - "description": "The region ID for the sts_endpoint, if set.", - "default": "" + "description": "Name of the role against which the login is being attempted. If 'role' is not specified, then the login endpoint looks for a role name in the ARN returned by the GetCallerIdentity request. If a matching role is not found, login fails." } - } + }, + "required": [ + "role" + ] }, - "AWSConfigWriteIdentityAccessListRequest": { + "AliCloudWriteAuthRoleRequest": { "type": "object", "properties": { - "disable_periodic_tidy": { - "type": "boolean", - "description": "If set to 'true', disables the periodic tidying of the 'identity-accesslist/' entries.", - "default": false + "arn": { + "type": "string", + "description": "ARN of the RAM to bind to this role." }, - "safety_buffer": { + "bound_cidrs": { + "type": "array", + "description": "Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used.", + "items": { + "type": "string" + }, + "deprecated": true + }, + "max_ttl": { "type": "integer", - "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", + "description": "Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used.", "format": "seconds", - "default": 259200 - } - } - }, - "AWSConfigWriteIdentityRequest": { - "type": "object", - "properties": { - "ec2_alias": { - "type": "string", - "description": "Configure how the AWS auth method generates entity alias when using EC2 auth. Valid values are \"role_id\", \"instance_id\", and \"image_id\". Defaults to \"role_id\".", - "default": "instance_id" + "deprecated": true }, - "ec2_metadata": { + "period": { + "type": "integer", + "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", + "format": "seconds", + "deprecated": true + }, + "policies": { "type": "array", - "description": "The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: account_id, auth_type. These fields are available to add: ami_id, instance_id, region. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'.", + "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", + "items": { + "type": "string" + }, + "deprecated": true + }, + "token_bound_cidrs": { + "type": "array", + "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "items": { "type": "string" }, - "default": [ - "default" - ], "x-vault-displayAttrs": { - "name": "ec2_metadata", - "value": "field1,field2" + "name": "Generated Token's Bound CIDRs", + "group": "Tokens" } }, - "iam_alias": { - "type": "string", - "description": "Configure how the AWS auth method generates entity aliases when using IAM auth. Valid values are \"role_id\", \"unique_id\", and \"full_arn\". Defaults to \"role_id\".", - "default": "unique_id" + "token_explicit_max_ttl": { + "type": "integer", + "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Explicit Maximum TTL", + "group": "Tokens" + } }, - "iam_metadata": { + "token_max_ttl": { + "type": "integer", + "description": "The maximum lifetime of the generated token", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Maximum TTL", + "group": "Tokens" + } + }, + "token_no_default_policy": { + "type": "boolean", + "description": "If true, the 'default' policy will not automatically be added to generated tokens", + "x-vault-displayAttrs": { + "name": "Do Not Attach 'default' Policy To Generated Tokens", + "group": "Tokens" + } + }, + "token_num_uses": { + "type": "integer", + "description": "The maximum number of times a token may be used, a value of zero means unlimited", + "x-vault-displayAttrs": { + "name": "Maximum Uses of Generated Tokens", + "group": "Tokens" + } + }, + "token_period": { + "type": "integer", + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Period", + "group": "Tokens" + } + }, + "token_policies": { "type": "array", - "description": "The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: account_id, auth_type. These fields are available to add: canonical_arn, client_arn, client_user_id, inferred_aws_region, inferred_entity_id, inferred_entity_type. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'.", + "description": "Comma-separated list of policies", "items": { "type": "string" }, - "default": [ - "default" - ], "x-vault-displayAttrs": { - "name": "iam_metadata", - "value": "field1,field2" + "name": "Generated Token's Policies", + "group": "Tokens" } - } - } - }, - "AWSConfigWriteIdentityWhiteListRequest": { - "type": "object", - "properties": { - "disable_periodic_tidy": { - "type": "boolean", - "description": "If set to 'true', disables the periodic tidying of the 'identity-accesslist/' entries.", - "default": false }, - "safety_buffer": { + "token_ttl": { "type": "integer", - "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", + "description": "The initial ttl of the token to generate", "format": "seconds", - "default": 259200 - } - } - }, - "AWSConfigWriteLeaseRequest": { - "type": "object", - "properties": { - "lease": { - "type": "string", - "description": "Default lease for roles." + "x-vault-displayAttrs": { + "name": "Generated Token's Initial TTL", + "group": "Tokens" + } }, - "lease_max": { + "token_type": { "type": "string", - "description": "Maximum time a credential is valid for." - } - } - }, - "AWSConfigWriteRoleTagBlackListRequest": { - "type": "object", - "properties": { - "disable_periodic_tidy": { - "type": "boolean", - "description": "If set to 'true', disables the periodic tidying of deny listed entries.", - "default": false + "description": "The type of token to generate, service or batch", + "default": "default-service", + "x-vault-displayAttrs": { + "name": "Generated Token's Type", + "group": "Tokens" + } }, - "safety_buffer": { + "ttl": { "type": "integer", - "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. Defaults to 4320h (180 days).", + "description": "Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used.", "format": "seconds", - "default": 15552000 + "deprecated": true } } }, - "AWSConfigWriteRoleTagDenyListRequest": { + "AliCloudWriteRoleRequest": { "type": "object", "properties": { - "disable_periodic_tidy": { - "type": "boolean", - "description": "If set to 'true', disables the periodic tidying of deny listed entries.", - "default": false + "inline_policies": { + "type": "string", + "description": "JSON of policies to be dynamically applied to users of this role." }, - "safety_buffer": { + "max_ttl": { "type": "integer", - "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. Defaults to 4320h (180 days).", - "format": "seconds", - "default": 15552000 + "description": "The maximum allowed lifetime of tokens issued using this role.", + "format": "seconds" + }, + "remote_policies": { + "type": "array", + "description": "The name and type of each remote policy to be applied. Example: \"name:AliyunRDSReadOnlyAccess,type:System\".", + "items": { + "type": "string" + } + }, + "role_arn": { + "type": "string", + "description": "ARN of the role to be assumed. If provided, inline_policies and remote_policies should be blank. At creation time, this role must have configured trusted actors, and the access key and secret that will be used to assume the role (in /config) must qualify as a trusted actor." + }, + "ttl": { + "type": "integer", + "description": "Duration in seconds after which the issued token should expire. Defaults to 0, in which case the value will fallback to the system/mount defaults.", + "format": "seconds" } } }, - "AWSConfigWriteRootIAMCredentialsRequest": { + "AliasCreateRequest": { "type": "object", "properties": { - "access_key": { + "canonical_id": { "type": "string", - "description": "Access key with permission to create new keys." + "description": "Entity ID to which this alias belongs to" }, - "iam_endpoint": { + "entity_id": { "type": "string", - "description": "Endpoint to custom IAM server URL" + "description": "Entity ID to which this alias belongs to. This field is deprecated in favor of 'canonical_id'." }, - "max_retries": { - "type": "integer", - "description": "Maximum number of retries for recoverable exceptions of AWS APIs", - "default": -1 + "id": { + "type": "string", + "description": "ID of the alias" }, - "region": { + "mount_accessor": { "type": "string", - "description": "Region for API calls." + "description": "Mount accessor to which this alias belongs to" }, - "secret_key": { + "name": { "type": "string", - "description": "Secret key with permission to create new keys." + "description": "Name of the alias" + } + } + }, + "AliasUpdateByIdRequest": { + "type": "object", + "properties": { + "canonical_id": { + "type": "string", + "description": "Entity ID to which this alias should be tied to" }, - "sts_endpoint": { + "entity_id": { "type": "string", - "description": "Endpoint to custom STS server URL" + "description": "Entity ID to which this alias should be tied to. This field is deprecated in favor of 'canonical_id'." }, - "username_template": { + "mount_accessor": { "type": "string", - "description": "Template to generate custom IAM usernames" + "description": "Mount accessor to which this alias belongs to" + }, + "name": { + "type": "string", + "description": "Name of the alias" } } }, - "AWSConfigWriteSecurityTokenServiceAccountRequest": { + "AppRoleDestroySecretIdByAccessorRequest": { "type": "object", "properties": { - "sts_role": { + "secret_id_accessor": { "type": "string", - "description": "AWS ARN for STS role to be assumed when interacting with the account specified. The Vault server must have permissions to assume this role." + "description": "Accessor of the SecretID" } } }, - "AWSLoginRequest": { + "AppRoleDestroySecretIdRequest": { "type": "object", "properties": { - "iam_http_request_method": { - "type": "string", - "description": "HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value" - }, - "iam_request_body": { - "type": "string", - "description": "Base64-encoded request body when auth_type is iam. This must match the request body included in the signature." - }, - "iam_request_headers": { - "type": "string", - "description": "Key/value pairs of headers for use in the sts:GetCallerIdentity HTTP requests headers when auth_type is iam. Can be either a Base64-encoded, JSON-serialized string, or a JSON object of key/value pairs. This must at a minimum include the headers over which AWS has included a signature." - }, - "iam_request_url": { + "secret_id": { "type": "string", - "description": "Base64-encoded full URL against which to make the AWS request when using iam auth_type." - }, - "identity": { - "type": "string", - "description": "Base64 encoded EC2 instance identity document. This needs to be supplied along with the 'signature' parameter. If using 'curl' for fetching the identity document, consider using the option '-w 0' while piping the output to 'base64' binary." - }, - "nonce": { - "type": "string", - "description": "The nonce to be used for subsequent login requests when auth_type is ec2. If this parameter is not specified at all and if reauthentication is allowed, then the backend will generate a random nonce, attaches it to the instance's identity access list entry and returns the nonce back as part of auth metadata. This value should be used with further login requests, to establish client authenticity. Clients can choose to set a custom nonce if preferred, in which case, it is recommended that clients provide a strong nonce. If a nonce is provided but with an empty value, it indicates intent to disable reauthentication. Note that, when 'disallow_reauthentication' option is enabled on either the role or the role tag, the 'nonce' holds no significance." - }, - "pkcs7": { - "type": "string", - "description": "PKCS7 signature of the identity document when using an auth_type of ec2." - }, - "role": { - "type": "string", - "description": "Name of the role against which the login is being attempted. If 'role' is not specified, then the login endpoint looks for a role bearing the name of the AMI ID of the EC2 instance that is trying to login. If a matching role is not found, login fails." - }, - "signature": { - "type": "string", - "description": "Base64 encoded SHA256 RSA signature of the instance identity document. This needs to be supplied along with 'identity' parameter." + "description": "SecretID attached to the role." } } }, - "AWSWriteAuthRoleRequest": { + "AppRoleListRolesResponse": { "type": "object", "properties": { - "allow_instance_migration": { - "type": "boolean", - "description": "If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution. This is only checked when auth_type is ec2.", - "default": false - }, - "auth_type": { - "type": "string", - "description": "The auth_type permitted to authenticate to this role. Must be one of iam or ec2 and cannot be changed after role creation." - }, - "bound_account_id": { + "keys": { "type": "array", - "description": "If set, defines a constraint on the EC2 instances that the account ID in its identity document to match one of the IDs specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", "items": { "type": "string" } - }, - "bound_ami_id": { + } + } + }, + "AppRoleListSecretIdsResponse": { + "type": "object", + "properties": { + "keys": { "type": "array", - "description": "If set, defines a constraint on the EC2 instances that they should be using one of the AMI IDs specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", "items": { "type": "string" } + } + } + }, + "AppRoleLogInRequest": { + "type": "object", + "properties": { + "role_id": { + "type": "string", + "description": "Unique identifier of the Role. Required to be supplied when the 'bind_secret_id' constraint is set." }, - "bound_ec2_instance_id": { + "secret_id": { + "type": "string", + "description": "SecretID belong to the App role", + "default": "" + } + } + }, + "AppRoleLogInResponse": { + "type": "object", + "properties": { + "role": { + "type": "string" + } + } + }, + "AppRoleLookUpSecretIdByAccessorRequest": { + "type": "object", + "properties": { + "secret_id_accessor": { + "type": "string", + "description": "Accessor of the SecretID" + } + } + }, + "AppRoleLookUpSecretIdByAccessorResponse": { + "type": "object", + "properties": { + "cidr_list": { "type": "array", - "description": "If set, defines a constraint on the EC2 instances to have one of the given instance IDs. Can be a list or comma-separated string of EC2 instance IDs. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "description": "List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", "items": { "type": "string" } }, - "bound_iam_instance_profile_arn": { + "creation_time": { + "type": "string", + "format": "date-time" + }, + "expiration_time": { + "type": "string", + "format": "date-time" + }, + "last_updated_time": { + "type": "string", + "format": "date-time" + }, + "metadata": { + "type": "object", + "format": "kvpairs" + }, + "secret_id_accessor": { + "type": "string", + "description": "Accessor of the secret ID" + }, + "secret_id_num_uses": { + "type": "integer", + "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + }, + "secret_id_ttl": { + "type": "integer", + "description": "Duration in seconds after which the issued secret ID expires.", + "format": "seconds" + }, + "token_bound_cidrs": { "type": "array", - "description": "If set, defines a constraint on the EC2 instances to be associated with an IAM instance profile ARN which has a prefix that matches one of the values specified by this parameter. The value is prefix-matched (as though it were a glob ending in '*'). This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "description": "List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", "items": { "type": "string" } - }, - "bound_iam_principal_arn": { + } + } + }, + "AppRoleLookUpSecretIdRequest": { + "type": "object", + "properties": { + "secret_id": { + "type": "string", + "description": "SecretID attached to the role." + } + } + }, + "AppRoleLookUpSecretIdResponse": { + "type": "object", + "properties": { + "cidr_list": { "type": "array", - "description": "ARN of the IAM principals to bind to this role. Only applicable when auth_type is iam.", + "description": "List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", "items": { "type": "string" } }, - "bound_iam_role_arn": { + "creation_time": { + "type": "string", + "format": "date-time" + }, + "expiration_time": { + "type": "string", + "format": "date-time" + }, + "last_updated_time": { + "type": "string", + "format": "date-time" + }, + "metadata": { + "type": "object", + "format": "kvpairs" + }, + "secret_id_accessor": { + "type": "string", + "description": "Accessor of the secret ID" + }, + "secret_id_num_uses": { + "type": "integer", + "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + }, + "secret_id_ttl": { + "type": "integer", + "description": "Duration in seconds after which the issued secret ID expires.", + "format": "seconds" + }, + "token_bound_cidrs": { "type": "array", - "description": "If set, defines a constraint on the authenticating EC2 instance that it must match one of the IAM role ARNs specified by this parameter. The value is prefix-matched (as though it were a glob ending in '*'). The configured IAM user or EC2 instance role must be allowed to execute the 'iam:GetInstanceProfile' action if this is specified. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "description": "List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", "items": { "type": "string" } - }, - "bound_region": { + } + } + }, + "AppRoleReadBindSecretIdResponse": { + "type": "object", + "properties": { + "bind_secret_id": { + "type": "boolean", + "description": "Impose secret_id to be presented when logging in using this role. Defaults to 'true'." + } + } + }, + "AppRoleReadBoundCidrListResponse": { + "type": "object", + "properties": { + "bound_cidr_list": { "type": "array", - "description": "If set, defines a constraint on the EC2 instances that the region in its identity document match one of the regions specified by this parameter. This is only applicable when auth_type is ec2.", + "description": "Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", "items": { "type": "string" - } + }, + "deprecated": true + } + } + }, + "AppRoleReadLocalSecretIdsResponse": { + "type": "object", + "properties": { + "local_secret_ids": { + "type": "boolean", + "description": "If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later" + } + } + }, + "AppRoleReadPeriodResponse": { + "type": "object", + "properties": { + "period": { + "type": "integer", + "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", + "format": "seconds", + "deprecated": true }, - "bound_subnet_id": { + "token_period": { + "type": "integer", + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", + "format": "seconds" + } + } + }, + "AppRoleReadPoliciesResponse": { + "type": "object", + "properties": { + "policies": { "type": "array", - "description": "If set, defines a constraint on the EC2 instance to be associated with the subnet ID that matches one of the values specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", "items": { "type": "string" - } + }, + "deprecated": true }, - "bound_vpc_id": { + "token_policies": { "type": "array", - "description": "If set, defines a constraint on the EC2 instance to be associated with a VPC ID that matches one of the value specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "description": "Comma-separated list of policies", "items": { "type": "string" } - }, - "disallow_reauthentication": { - "type": "boolean", - "description": "If set, only allows a single token to be granted per instance ID. In order to perform a fresh login, the entry in the access list for the instance ID needs to be cleared using 'auth/aws-ec2/identity-accesslist/' endpoint. This is only applicable when auth_type is ec2.", - "default": false - }, - "inferred_aws_region": { - "type": "string", - "description": "When auth_type is iam and inferred_entity_type is set, the region to assume the inferred entity exists in." - }, - "inferred_entity_type": { + } + } + }, + "AppRoleReadRoleIdResponse": { + "type": "object", + "properties": { + "role_id": { "type": "string", - "description": "When auth_type is iam, the AWS entity type to infer from the authenticated principal. The only supported value is ec2_instance, which will extract the EC2 instance ID from the authenticated role and apply the following restrictions specific to EC2 instances: bound_ami_id, bound_account_id, bound_iam_role_arn, bound_iam_instance_profile_arn, bound_vpc_id, bound_subnet_id. The configured EC2 client must be able to find the inferred instance ID in the results, and the instance must be running. If unable to determine the EC2 instance ID or unable to find the EC2 instance ID among running instances, then authentication will fail." + "description": "Identifier of the role. Defaults to a UUID." + } + } + }, + "AppRoleReadRoleResponse": { + "type": "object", + "properties": { + "bind_secret_id": { + "type": "boolean", + "description": "Impose secret ID to be presented when logging in using this role." }, - "max_ttl": { - "type": "integer", - "description": "Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used.", - "format": "seconds", - "deprecated": true + "local_secret_ids": { + "type": "boolean", + "description": "If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later" }, "period": { "type": "integer", @@ -24860,660 +25027,287 @@ }, "deprecated": true }, - "resolve_aws_unique_ids": { - "type": "boolean", - "description": "If set, resolve all AWS IAM ARNs into AWS's internal unique IDs. When an IAM entity (e.g., user, role, or instance profile) is deleted, then all references to it within the role will be invalidated, which prevents a new IAM entity from being created with the same name and matching the role's IAM binds. Once set, this cannot be unset.", - "default": true + "secret_id_bound_cidrs": { + "type": "array", + "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", + "items": { + "type": "string" + } }, - "role_tag": { - "type": "string", - "description": "If set, enables the role tags for this role. The value set for this field should be the 'key' of the tag on the EC2 instance. The 'value' of the tag should be generated using 'role//tag' endpoint. Defaults to an empty string, meaning that role tags are disabled. This is only allowed if auth_type is ec2.", - "default": "" + "secret_id_num_uses": { + "type": "integer", + "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + }, + "secret_id_ttl": { + "type": "integer", + "description": "Duration in seconds after which the issued secret ID expires.", + "format": "seconds" }, "token_bound_cidrs": { "type": "array", "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Bound CIDRs", - "group": "Tokens" } }, "token_explicit_max_ttl": { "type": "integer", "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Explicit Maximum TTL", - "group": "Tokens" - } + "format": "seconds" }, "token_max_ttl": { "type": "integer", "description": "The maximum lifetime of the generated token", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Maximum TTL", - "group": "Tokens" - } + "format": "seconds" }, "token_no_default_policy": { "type": "boolean", - "description": "If true, the 'default' policy will not automatically be added to generated tokens", - "x-vault-displayAttrs": { - "name": "Do Not Attach 'default' Policy To Generated Tokens", - "group": "Tokens" - } + "description": "If true, the 'default' policy will not automatically be added to generated tokens" }, "token_num_uses": { "type": "integer", - "description": "The maximum number of times a token may be used, a value of zero means unlimited", - "x-vault-displayAttrs": { - "name": "Maximum Uses of Generated Tokens", - "group": "Tokens" - } + "description": "The maximum number of times a token may be used, a value of zero means unlimited" }, "token_period": { "type": "integer", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Period", - "group": "Tokens" - } + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value.", + "format": "seconds" }, "token_policies": { "type": "array", "description": "Comma-separated list of policies", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Policies", - "group": "Tokens" } }, "token_ttl": { "type": "integer", "description": "The initial ttl of the token to generate", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Initial TTL", - "group": "Tokens" - } + "format": "seconds" }, "token_type": { "type": "string", "description": "The type of token to generate, service or batch", - "default": "default-service", - "x-vault-displayAttrs": { - "name": "Generated Token's Type", - "group": "Tokens" + "default": "default-service" + } + } + }, + "AppRoleReadSecretIdBoundCidrsResponse": { + "type": "object", + "properties": { + "secret_id_bound_cidrs": { + "type": "array", + "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", + "items": { + "type": "string" } - }, - "ttl": { + } + } + }, + "AppRoleReadSecretIdNumUsesResponse": { + "type": "object", + "properties": { + "secret_id_num_uses": { "type": "integer", - "description": "Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used.", - "format": "seconds", - "deprecated": true + "description": "Number of times a secret ID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the secret ID is of unlimited use." } } }, - "AWSWriteAuthRoleTagRequest": { + "AppRoleReadSecretIdTtlResponse": { "type": "object", "properties": { - "allow_instance_migration": { - "type": "boolean", - "description": "If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution.", - "default": false - }, - "disallow_reauthentication": { - "type": "boolean", - "description": "If set, only allows a single token to be granted per instance ID. In order to perform a fresh login, the entry in access list for the instance ID needs to be cleared using the 'auth/aws-ec2/identity-accesslist/' endpoint.", - "default": false - }, - "instance_id": { - "type": "string", - "description": "Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID." - }, - "max_ttl": { + "secret_id_ttl": { "type": "integer", - "description": "If set, specifies the maximum allowed token lifetime.", - "format": "seconds", - "default": 0 - }, - "policies": { + "description": "Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration.", + "format": "seconds" + } + } + }, + "AppRoleReadTokenBoundCidrsResponse": { + "type": "object", + "properties": { + "token_bound_cidrs": { "type": "array", - "description": "Policies to be associated with the tag. If set, must be a subset of the role's policies. If set, but set to an empty value, only the 'default' policy will be given to issued tokens.", + "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", "items": { "type": "string" } } } }, - "AWSWriteCredentialsRequest": { + "AppRoleReadTokenMaxTtlResponse": { "type": "object", "properties": { - "name": { - "type": "string", - "description": "Name of the role" - }, - "role_arn": { - "type": "string", - "description": "ARN of role to assume when credential_type is assumed_role" - }, - "role_session_name": { - "type": "string", - "description": "Session name to use when assuming role. Max chars: 64" - }, - "ttl": { + "token_max_ttl": { "type": "integer", - "description": "Lifetime of the returned credentials in seconds", - "format": "seconds", - "default": 3600 + "description": "The maximum lifetime of the generated token", + "format": "seconds" } } }, - "AWSWriteIdentityAccessListTidySettingsRequest": { + "AppRoleReadTokenNumUsesResponse": { "type": "object", "properties": { - "safety_buffer": { + "token_num_uses": { "type": "integer", - "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", - "format": "seconds", - "default": 259200 + "description": "The maximum number of times a token may be used, a value of zero means unlimited" } } }, - "AWSWriteIdentityWhiteListTidySettingsRequest": { + "AppRoleReadTokenTtlResponse": { "type": "object", "properties": { - "safety_buffer": { + "token_ttl": { "type": "integer", - "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", - "format": "seconds", - "default": 259200 + "description": "The initial ttl of the token to generate", + "format": "seconds" } } }, - "AWSWriteRoleRequest": { + "AppRoleWriteBindSecretIdRequest": { "type": "object", "properties": { - "arn": { - "type": "string", - "description": "Use role_arns or policy_arns instead.", - "deprecated": true - }, - "credential_type": { - "type": "string", - "description": "Type of credential to retrieve. Must be one of assumed_role, iam_user, or federation_token" - }, - "default_sts_ttl": { - "type": "integer", - "description": "Default TTL for assumed_role and federation_token credential types when no TTL is explicitly requested with the credentials", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Default STS TTL" + "bind_secret_id": { + "type": "boolean", + "description": "Impose secret_id to be presented when logging in using this role.", + "default": true + } + } + }, + "AppRoleWriteBoundCidrListRequest": { + "type": "object", + "properties": { + "bound_cidr_list": { + "type": "array", + "description": "Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", + "items": { + "type": "string" } - }, - "iam_groups": { + } + } + }, + "AppRoleWriteCustomSecretIdRequest": { + "type": "object", + "properties": { + "cidr_list": { "type": "array", - "description": "Names of IAM groups that generated IAM users will be added to. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.", + "description": "Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IAM Groups", - "value": "group1,group2" } }, - "iam_tags": { - "type": "object", - "description": "IAM tags to be set for any users created by this role. These must be presented as Key-Value pairs. This can be represented as a map or a list of equal sign delimited key pairs.", - "format": "kvpairs", - "x-vault-displayAttrs": { - "name": "IAM Tags", - "value": "[key1=value1, key2=value2]" - } + "metadata": { + "type": "string", + "description": "Metadata to be tied to the SecretID. This should be a JSON formatted string containing metadata in key value pairs." }, - "max_sts_ttl": { + "num_uses": { "type": "integer", - "description": "Max allowed TTL for assumed_role and federation_token credential types", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Max STS TTL" - } - }, - "permissions_boundary_arn": { - "type": "string", - "description": "ARN of an IAM policy to attach as a permissions boundary on IAM user credentials; only valid when credential_type isiam_user", - "x-vault-displayAttrs": { - "name": "Permissions Boundary ARN" - } + "description": "Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role's secret_id_num_uses." }, - "policy": { + "secret_id": { "type": "string", - "description": "Use policy_document instead.", - "deprecated": true + "description": "SecretID to be attached to the role." }, - "policy_arns": { + "token_bound_cidrs": { "type": "array", - "description": "ARNs of AWS policies. Behavior varies by credential_type. When credential_type is iam_user, then it will attach the specified policies to the generated IAM user. When credential_type is assumed_role or federation_token, the policies will be passed as the PolicyArns parameter, acting as a filter on permissions available.", + "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Policy ARNs" } }, - "policy_document": { + "ttl": { + "type": "integer", + "description": "Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role's secret_id_ttl.", + "format": "seconds" + } + } + }, + "AppRoleWriteCustomSecretIdResponse": { + "type": "object", + "properties": { + "secret_id": { "type": "string", - "description": "JSON-encoded IAM policy document. Behavior varies by credential_type. When credential_type is iam_user, then it will attach the contents of the policy_document to the IAM user generated. When credential_type is assumed_role or federation_token, this will be passed in as the Policy parameter to the AssumeRole or GetFederationToken API call, acting as a filter on permissions available." + "description": "Secret ID attached to the role." }, - "role_arns": { - "type": "array", - "description": "ARNs of AWS roles allowed to be assumed. Only valid when credential_type is assumed_role", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Role ARNs" - } - }, - "user_path": { - "type": "string", - "description": "Path for IAM User. Only valid when credential_type is iam_user", - "default": "/", - "x-vault-displayAttrs": { - "name": "User Path", - "value": "/" - } - } - } - }, - "AWSWriteRoleTagBlackListTidySettingsRequest": { - "type": "object", - "properties": { - "safety_buffer": { - "type": "integer", - "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage.", - "format": "seconds", - "default": 259200 - } - } - }, - "AWSWriteRoleTagDenyListTidySettingsRequest": { - "type": "object", - "properties": { - "safety_buffer": { - "type": "integer", - "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage.", - "format": "seconds", - "default": 259200 - } - } - }, - "AWSWriteSecurityTokenServiceRequest": { - "type": "object", - "properties": { - "role_arn": { - "type": "string", - "description": "ARN of role to assume when credential_type is assumed_role" - }, - "role_session_name": { + "secret_id_accessor": { "type": "string", - "description": "Session name to use when assuming role. Max chars: 64" + "description": "Accessor of the secret ID" }, - "ttl": { + "secret_id_num_uses": { "type": "integer", - "description": "Lifetime of the returned credentials in seconds", - "format": "seconds", - "default": 3600 - } - } - }, - "ActiveDirectoryCheckInLibraryRequest": { - "type": "object", - "properties": { - "service_account_names": { - "type": "array", - "description": "The username/logon name for the service accounts to check in.", - "items": { - "type": "string" - } - } - } - }, - "ActiveDirectoryCheckInManageLibraryRequest": { - "type": "object", - "properties": { - "service_account_names": { - "type": "array", - "description": "The username/logon name for the service accounts to check in.", - "items": { - "type": "string" - } - } - } - }, - "ActiveDirectoryCheckOutLibraryRequest": { - "type": "object", - "properties": { - "ttl": { + "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + }, + "secret_id_ttl": { "type": "integer", - "description": "The length of time before the check-out will expire, in seconds.", + "description": "Duration in seconds after which the issued secret ID expires.", "format": "seconds" } } }, - "ActiveDirectoryWriteConfigRequest": { + "AppRoleWritePeriodRequest": { "type": "object", "properties": { - "anonymous_group_search": { - "type": "boolean", - "description": "Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).", - "default": false, - "x-vault-displayAttrs": { - "name": "Anonymous group search" - } - }, - "binddn": { - "type": "string", - "description": "LDAP DN for searching for the user DN (optional)", - "x-vault-displayAttrs": { - "name": "Name of Object to bind (binddn)" - } - }, - "bindpass": { - "type": "string", - "description": "LDAP password for searching for the user DN (optional)", - "x-vault-displayAttrs": { - "sensitive": true - } - }, - "case_sensitive_names": { - "type": "boolean", - "description": "If true, case sensitivity will be used when comparing usernames and groups for matching policies." - }, - "certificate": { - "type": "string", - "description": "CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional)", - "x-vault-displayAttrs": { - "name": "CA certificate", - "editType": "file" - } - }, - "client_tls_cert": { - "type": "string", - "description": "Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional)", - "x-vault-displayAttrs": { - "name": "Client certificate", - "editType": "file" - } - }, - "client_tls_key": { - "type": "string", - "description": "Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional)", - "x-vault-displayAttrs": { - "name": "Client key", - "editType": "file" - } - }, - "deny_null_bind": { - "type": "boolean", - "description": "Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true", - "default": true - }, - "discoverdn": { - "type": "boolean", - "description": "Use anonymous bind to discover the bind DN of a user (optional)", - "x-vault-displayAttrs": { - "name": "Discover DN" - } - }, - "formatter": { - "type": "string", - "description": "Text to insert the password into, ex. \"customPrefix{{PASSWORD}}customSuffix\".", - "deprecated": true - }, - "groupattr": { - "type": "string", - "description": "LDAP attribute to follow on objects returned by in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn", - "default": "cn", - "x-vault-displayAttrs": { - "name": "Group Attribute", - "value": "cn" - } - }, - "groupdn": { - "type": "string", - "description": "LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org)", - "x-vault-displayAttrs": { - "name": "Group DN" - } - }, - "groupfilter": { - "type": "string", - "description": "Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))", - "default": "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))", - "x-vault-displayAttrs": { - "name": "Group Filter" - } - }, - "insecure_tls": { - "type": "boolean", - "description": "Skip LDAP server SSL Certificate verification - VERY insecure (optional)", - "x-vault-displayAttrs": { - "name": "Insecure TLS" - } - }, - "last_rotation_tolerance": { + "period": { "type": "integer", - "description": "The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band.", + "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", "format": "seconds", - "default": 5 - }, - "length": { - "type": "integer", - "description": "The desired length of passwords that Vault generates.", - "default": 64, "deprecated": true }, - "max_ttl": { - "type": "integer", - "description": "In seconds, the maximum password time-to-live.", - "format": "seconds" - }, - "password_policy": { - "type": "string", - "description": "Name of the password policy to use to generate passwords." - }, - "request_timeout": { - "type": "integer", - "description": "Timeout, in seconds, for the connection when making requests against the server before returning back an error.", - "format": "seconds", - "default": "90s" - }, - "starttls": { - "type": "boolean", - "description": "Issue a StartTLS command after establishing unencrypted connection (optional)", - "x-vault-displayAttrs": { - "name": "Issue StartTLS" - } - }, - "tls_max_version": { - "type": "string", - "description": "Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], - "default": "tls12", - "x-vault-displayAttrs": { - "name": "Maximum TLS Version" - } - }, - "tls_min_version": { - "type": "string", - "description": "Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], - "default": "tls12", - "x-vault-displayAttrs": { - "name": "Minimum TLS Version" - } - }, - "ttl": { + "token_period": { "type": "integer", - "description": "In seconds, the default password time-to-live.", + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", "format": "seconds" - }, - "upndomain": { - "type": "string", - "description": "Enables userPrincipalDomain login with [username]@UPNDomain (optional)", - "x-vault-displayAttrs": { - "name": "User Principal (UPN) Domain" - } - }, - "url": { - "type": "string", - "description": "LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.", - "default": "ldap://127.0.0.1", - "x-vault-displayAttrs": { - "name": "URL" - } - }, - "use_pre111_group_cn_behavior": { - "type": "boolean", - "description": "In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations." - }, - "use_token_groups": { - "type": "boolean", - "description": "If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones.", - "default": false - }, - "userattr": { - "type": "string", - "description": "Attribute used for users (default: cn)", - "default": "cn", - "x-vault-displayAttrs": { - "name": "User Attribute", - "value": "cn" - } - }, - "userdn": { - "type": "string", - "description": "LDAP domain to use for users (eg: ou=People,dc=example,dc=org)", - "x-vault-displayAttrs": { - "name": "User DN" - } - }, - "userfilter": { - "type": "string", - "description": "Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}})", - "default": "({{.UserAttr}}={{.Username}})", - "x-vault-displayAttrs": { - "name": "User Search Filter" - } - }, - "username_as_alias": { - "type": "boolean", - "description": "If true, sets the alias name to the username", - "default": false } } }, - "ActiveDirectoryWriteLibraryRequest": { + "AppRoleWritePoliciesRequest": { "type": "object", "properties": { - "disable_check_in_enforcement": { - "type": "boolean", - "description": "Disable the default behavior of requiring that check-ins are performed by the entity that checked them out.", - "default": false - }, - "max_ttl": { - "type": "integer", - "description": "In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours.", - "format": "seconds", - "default": 86400 + "policies": { + "type": "array", + "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", + "items": { + "type": "string" + }, + "deprecated": true }, - "service_account_names": { + "token_policies": { "type": "array", - "description": "The username/logon name for the service accounts with which this set will be associated.", + "description": "Comma-separated list of policies", "items": { "type": "string" } - }, - "ttl": { - "type": "integer", - "description": "In seconds, the amount of time a check-out should last. Defaults to 24 hours.", - "format": "seconds", - "default": 86400 } } }, - "ActiveDirectoryWriteRoleRequest": { + "AppRoleWriteRoleIdRequest": { "type": "object", "properties": { - "service_account_name": { + "role_id": { "type": "string", - "description": "The username/logon name for the service account with which this role will be associated." - }, - "ttl": { - "type": "integer", - "description": "In seconds, the default password time-to-live.", - "format": "seconds" + "description": "Identifier of the role. Defaults to a UUID." } } }, - "AliCloudLoginRequest": { - "type": "object", - "properties": { - "identity_request_headers": { - "type": "string", - "description": "The request headers. This must include the headers over which AliCloud has included a signature." - }, - "identity_request_url": { - "type": "string", - "description": "Base64-encoded full URL against which to make the AliCloud request." - }, - "role": { - "type": "string", - "description": "Name of the role against which the login is being attempted. If 'role' is not specified, then the login endpoint looks for a role name in the ARN returned by the GetCallerIdentity request. If a matching role is not found, login fails." - } - }, - "required": [ - "role" - ] - }, - "AliCloudWriteAuthRoleRequest": { + "AppRoleWriteRoleRequest": { "type": "object", "properties": { - "arn": { - "type": "string", - "description": "ARN of the RAM to bind to this role." + "bind_secret_id": { + "type": "boolean", + "description": "Impose secret_id to be presented when logging in using this role. Defaults to 'true'.", + "default": true }, - "bound_cidrs": { + "bound_cidr_list": { "type": "array", - "description": "Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used.", + "description": "Use \"secret_id_bound_cidrs\" instead.", "items": { "type": "string" }, "deprecated": true }, - "max_ttl": { - "type": "integer", - "description": "Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used.", - "format": "seconds", - "deprecated": true + "local_secret_ids": { + "type": "boolean", + "description": "If set, the secret IDs generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later." }, "period": { "type": "integer", @@ -25529,6 +25323,26 @@ }, "deprecated": true }, + "role_id": { + "type": "string", + "description": "Identifier of the role. Defaults to a UUID." + }, + "secret_id_bound_cidrs": { + "type": "array", + "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", + "items": { + "type": "string" + } + }, + "secret_id_num_uses": { + "type": "integer", + "description": "Number of times a SecretID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the the secret_id is of unlimited use." + }, + "secret_id_ttl": { + "type": "integer", + "description": "Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration.", + "format": "seconds" + }, "token_bound_cidrs": { "type": "array", "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", @@ -25611,522 +25425,864 @@ "name": "Generated Token's Type", "group": "Tokens" } - }, - "ttl": { - "type": "integer", - "description": "Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used.", - "format": "seconds", - "deprecated": true } } }, - "AliCloudWriteConfigRequest": { + "AppRoleWriteSecretIdBoundCidrsRequest": { "type": "object", "properties": { - "access_key": { - "type": "string", - "description": "Access key with appropriate permissions." - }, - "secret_key": { - "type": "string", - "description": "Secret key with appropriate permissions." + "secret_id_bound_cidrs": { + "type": "array", + "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", + "items": { + "type": "string" + } } } }, - "AliCloudWriteRoleRequest": { + "AppRoleWriteSecretIdNumUsesRequest": { "type": "object", "properties": { - "inline_policies": { + "secret_id_num_uses": { + "type": "integer", + "description": "Number of times a SecretID can access the role, after which the SecretID will expire." + } + } + }, + "AppRoleWriteSecretIdRequest": { + "type": "object", + "properties": { + "cidr_list": { + "type": "array", + "description": "Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", + "items": { + "type": "string" + } + }, + "metadata": { "type": "string", - "description": "JSON of policies to be dynamically applied to users of this role." + "description": "Metadata to be tied to the SecretID. This should be a JSON formatted string containing the metadata in key value pairs." }, - "max_ttl": { + "num_uses": { "type": "integer", - "description": "The maximum allowed lifetime of tokens issued using this role.", - "format": "seconds" + "description": "Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role's secret_id_num_uses." }, - "remote_policies": { + "token_bound_cidrs": { "type": "array", - "description": "The name and type of each remote policy to be applied. Example: \"name:AliyunRDSReadOnlyAccess,type:System\".", + "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "items": { "type": "string" } }, - "role_arn": { - "type": "string", - "description": "ARN of the role to be assumed. If provided, inline_policies and remote_policies should be blank. At creation time, this role must have configured trusted actors, and the access key and secret that will be used to assume the role (in /config) must qualify as a trusted actor." - }, "ttl": { "type": "integer", - "description": "Duration in seconds after which the issued token should expire. Defaults to 0, in which case the value will fallback to the system/mount defaults.", + "description": "Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role's secret_id_ttl.", "format": "seconds" } } }, - "AliasWriteByIDRequest": { + "AppRoleWriteSecretIdResponse": { "type": "object", "properties": { - "canonical_id": { + "secret_id": { "type": "string", - "description": "Entity ID to which this alias should be tied to" + "description": "Secret ID attached to the role." }, - "entity_id": { + "secret_id_accessor": { "type": "string", - "description": "Entity ID to which this alias should be tied to. This field is deprecated in favor of 'canonical_id'." + "description": "Accessor of the secret ID" }, - "mount_accessor": { - "type": "string", - "description": "Mount accessor to which this alias belongs to" + "secret_id_num_uses": { + "type": "integer", + "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, - "name": { - "type": "string", - "description": "Name of the alias" + "secret_id_ttl": { + "type": "integer", + "description": "Duration in seconds after which the issued secret ID expires.", + "format": "seconds" } } }, - "AliasWriteRequest": { + "AppRoleWriteSecretIdTtlRequest": { "type": "object", "properties": { - "canonical_id": { - "type": "string", - "description": "Entity ID to which this alias belongs to" - }, - "entity_id": { - "type": "string", - "description": "Entity ID to which this alias belongs to. This field is deprecated in favor of 'canonical_id'." - }, - "id": { - "type": "string", - "description": "ID of the alias" - }, - "mount_accessor": { - "type": "string", - "description": "Mount accessor to which this alias belongs to" - }, - "name": { - "type": "string", - "description": "Name of the alias" + "secret_id_ttl": { + "type": "integer", + "description": "Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration.", + "format": "seconds" } } }, - "AppRoleListRolesResponse": { + "AppRoleWriteTokenBoundCidrsRequest": { "type": "object", "properties": { - "keys": { + "token_bound_cidrs": { "type": "array", + "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "items": { "type": "string" } } } }, - "AppRoleListSecretIDResponse": { + "AppRoleWriteTokenMaxTtlRequest": { "type": "object", "properties": { - "keys": { - "type": "array", - "items": { - "type": "string" - } + "token_max_ttl": { + "type": "integer", + "description": "The maximum lifetime of the generated token", + "format": "seconds" } } }, - "AppRoleLoginRequest": { + "AppRoleWriteTokenNumUsesRequest": { "type": "object", "properties": { - "role_id": { - "type": "string", - "description": "Unique identifier of the Role. Required to be supplied when the 'bind_secret_id' constraint is set." - }, - "secret_id": { - "type": "string", - "description": "SecretID belong to the App role", - "default": "" - } - } + "token_num_uses": { + "type": "integer", + "description": "The maximum number of times a token may be used, a value of zero means unlimited" + } + } }, - "AppRoleReadBindSecretIDResponse": { + "AppRoleWriteTokenTtlRequest": { "type": "object", "properties": { - "bind_secret_id": { - "type": "boolean", - "description": "Impose secret_id to be presented when logging in using this role. Defaults to 'true'." + "token_ttl": { + "type": "integer", + "description": "The initial ttl of the token to generate", + "format": "seconds" } } }, - "AppRoleReadBoundCIDRListResponse": { + "AuditingCalculateHashRequest": { "type": "object", "properties": { - "bound_cidr_list": { - "type": "array", - "description": "Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", - "items": { - "type": "string" - }, - "deprecated": true + "input": { + "type": "string" } } }, - "AppRoleReadLocalSecretIDsResponse": { + "AuditingCalculateHashResponse": { "type": "object", "properties": { - "local_secret_ids": { - "type": "boolean", - "description": "If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later" + "hash": { + "type": "string" } } }, - "AppRoleReadPeriodResponse": { + "AuditingEnableDeviceRequest": { "type": "object", "properties": { - "period": { - "type": "integer", - "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "seconds", - "deprecated": true + "description": { + "type": "string", + "description": "User-friendly description for this audit backend." }, - "token_period": { - "type": "integer", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "seconds" + "local": { + "type": "boolean", + "description": "Mark the mount as a local mount, which is not replicated and is unaffected by replication.", + "default": false + }, + "options": { + "type": "object", + "description": "Configuration options for the audit backend.", + "format": "kvpairs" + }, + "type": { + "type": "string", + "description": "The type of the backend. Example: \"mysql\"" } } }, - "AppRoleReadPoliciesResponse": { + "AuditingEnableRequestHeaderRequest": { "type": "object", "properties": { - "policies": { - "type": "array", - "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", - "items": { - "type": "string" - }, - "deprecated": true - }, - "token_policies": { - "type": "array", - "description": "Comma-separated list of policies", - "items": { - "type": "string" - } + "hmac": { + "type": "boolean" } } }, - "AppRoleReadRoleIDResponse": { + "AuditingListRequestHeadersResponse": { "type": "object", "properties": { - "role_id": { - "type": "string", - "description": "Identifier of the role. Defaults to a UUID." + "headers": { + "type": "object", + "format": "map" } } }, - "AppRoleReadRoleResponse": { + "AuthEnableMethodRequest": { "type": "object", "properties": { - "bind_secret_id": { + "config": { + "type": "object", + "description": "Configuration for this mount, such as plugin_name.", + "format": "map" + }, + "description": { + "type": "string", + "description": "User-friendly description for this credential backend." + }, + "external_entropy_access": { "type": "boolean", - "description": "Impose secret ID to be presented when logging in using this role." + "description": "Whether to give the mount access to Vault's external entropy.", + "default": false }, - "local_secret_ids": { + "local": { "type": "boolean", - "description": "If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later" + "description": "Mark the mount as a local mount, which is not replicated and is unaffected by replication.", + "default": false }, - "period": { - "type": "integer", - "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "seconds", - "deprecated": true + "options": { + "type": "object", + "description": "The options to pass into the backend. Should be a json object with string keys and values.", + "format": "kvpairs" }, - "policies": { + "plugin_name": { + "type": "string", + "description": "Name of the auth plugin to use based from the name in the plugin catalog." + }, + "plugin_version": { + "type": "string", + "description": "The semantic version of the plugin to use." + }, + "seal_wrap": { + "type": "boolean", + "description": "Whether to turn on seal wrapping for the mount.", + "default": false + }, + "type": { + "type": "string", + "description": "The type of the backend. Example: \"userpass\"" + } + } + }, + "AuthReadConfigurationResponse": { + "type": "object", + "properties": { + "accessor": { + "type": "string" + }, + "config": { + "type": "object", + "format": "map" + }, + "deprecation_status": { + "type": "string" + }, + "description": { + "type": "string" + }, + "external_entropy_access": { + "type": "boolean" + }, + "local": { + "type": "boolean" + }, + "options": { + "type": "object", + "format": "map" + }, + "plugin_version": { + "type": "string" + }, + "running_plugin_version": { + "type": "string" + }, + "running_sha256": { + "type": "string" + }, + "seal_wrap": { + "type": "boolean" + }, + "type": { + "type": "string" + }, + "uuid": { + "type": "string" + } + } + }, + "AuthReadTuningInformationResponse": { + "type": "object", + "properties": { + "allowed_managed_keys": { "type": "array", - "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", "items": { "type": "string" - }, - "deprecated": true + } }, - "secret_id_bound_cidrs": { + "allowed_response_headers": { "type": "array", - "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", "items": { "type": "string" } }, - "secret_id_num_uses": { - "type": "integer", - "description": "Number of times a secret ID can access the role, after which the secret ID will expire." - }, - "secret_id_ttl": { - "type": "integer", - "description": "Duration in seconds after which the issued secret ID expires.", - "format": "seconds" + "audit_non_hmac_request_keys": { + "type": "array", + "items": { + "type": "string" + } }, - "token_bound_cidrs": { + "audit_non_hmac_response_keys": { "type": "array", - "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "items": { "type": "string" } }, - "token_explicit_max_ttl": { - "type": "integer", - "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", - "format": "seconds" + "default_lease_ttl": { + "type": "integer" }, - "token_max_ttl": { - "type": "integer", - "description": "The maximum lifetime of the generated token", - "format": "seconds" + "description": { + "type": "string" }, - "token_no_default_policy": { - "type": "boolean", - "description": "If true, the 'default' policy will not automatically be added to generated tokens" + "external_entropy_access": { + "type": "boolean" }, - "token_num_uses": { - "type": "integer", - "description": "The maximum number of times a token may be used, a value of zero means unlimited" + "force_no_cache": { + "type": "boolean" }, - "token_period": { - "type": "integer", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value.", - "format": "seconds" + "listing_visibility": { + "type": "string" }, - "token_policies": { + "max_lease_ttl": { + "type": "integer" + }, + "options": { + "type": "object", + "format": "map" + }, + "passthrough_request_headers": { "type": "array", - "description": "Comma-separated list of policies", "items": { "type": "string" } }, - "token_ttl": { - "type": "integer", - "description": "The initial ttl of the token to generate", - "format": "seconds" + "plugin_version": { + "type": "string" }, "token_type": { - "type": "string", - "description": "The type of token to generate, service or batch", - "default": "default-service" - } - } - }, - "AppRoleReadSecretIDBoundCIDRsResponse": { - "type": "object", - "properties": { - "secret_id_bound_cidrs": { - "type": "array", - "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", - "items": { - "type": "string" - } - } - } - }, - "AppRoleReadSecretIDNumUsesResponse": { - "type": "object", - "properties": { - "secret_id_num_uses": { + "type": "string" + }, + "user_lockout_counter_reset_duration": { "type": "integer", - "description": "Number of times a secret ID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the secret ID is of unlimited use." - } - } - }, - "AppRoleReadSecretIDTTLResponse": { - "type": "object", - "properties": { - "secret_id_ttl": { + "format": "int64" + }, + "user_lockout_disable": { + "type": "boolean" + }, + "user_lockout_duration": { "type": "integer", - "description": "Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration.", - "format": "seconds" + "format": "int64" + }, + "user_lockout_threshold": { + "type": "integer", + "format": "int64" } } }, - "AppRoleReadTokenBoundCIDRsResponse": { + "AuthTuneConfigurationParametersRequest": { "type": "object", "properties": { - "token_bound_cidrs": { + "allowed_response_headers": { "type": "array", - "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", + "description": "A list of headers to whitelist and allow a plugin to set on responses.", "items": { "type": "string" } - } - } - }, - "AppRoleReadTokenMaxTTLResponse": { - "type": "object", - "properties": { - "token_max_ttl": { - "type": "integer", - "description": "The maximum lifetime of the generated token", - "format": "seconds" - } - } - }, - "AppRoleReadTokenNumUsesResponse": { - "type": "object", - "properties": { - "token_num_uses": { - "type": "integer", - "description": "The maximum number of times a token may be used, a value of zero means unlimited" - } - } - }, - "AppRoleReadTokenTTLResponse": { - "type": "object", - "properties": { - "token_ttl": { - "type": "integer", - "description": "The initial ttl of the token to generate", - "format": "seconds" - } - } - }, - "AppRoleWriteBindSecretIDRequest": { - "type": "object", - "properties": { - "bind_secret_id": { - "type": "boolean", - "description": "Impose secret_id to be presented when logging in using this role.", - "default": true - } - } - }, - "AppRoleWriteBoundCIDRListRequest": { - "type": "object", - "properties": { - "bound_cidr_list": { + }, + "audit_non_hmac_request_keys": { "type": "array", - "description": "Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", + "description": "The list of keys in the request data object that will not be HMAC'ed by audit devices.", "items": { "type": "string" } - } - } - }, - "AppRoleWriteCustomSecretIDRequest": { - "type": "object", - "properties": { - "cidr_list": { + }, + "audit_non_hmac_response_keys": { "type": "array", - "description": "Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", + "description": "The list of keys in the response data object that will not be HMAC'ed by audit devices.", "items": { "type": "string" } }, - "metadata": { + "default_lease_ttl": { "type": "string", - "description": "Metadata to be tied to the SecretID. This should be a JSON formatted string containing metadata in key value pairs." + "description": "The default lease TTL for this mount." }, - "num_uses": { - "type": "integer", - "description": "Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role's secret_id_num_uses." + "description": { + "type": "string", + "description": "User-friendly description for this credential backend." }, - "secret_id": { + "listing_visibility": { "type": "string", - "description": "SecretID to be attached to the role." + "description": "Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are 'unauth' and 'hidden', with the empty default ('') behaving like 'hidden'." }, - "token_bound_cidrs": { + "max_lease_ttl": { + "type": "string", + "description": "The max lease TTL for this mount." + }, + "options": { + "type": "object", + "description": "The options to pass into the backend. Should be a json object with string keys and values.", + "format": "kvpairs" + }, + "passthrough_request_headers": { "type": "array", - "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", + "description": "A list of headers to whitelist and pass from the request to the plugin.", "items": { "type": "string" } }, - "ttl": { - "type": "integer", - "description": "Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role's secret_id_ttl.", - "format": "seconds" + "plugin_version": { + "type": "string", + "description": "The semantic version of the plugin to use." + }, + "token_type": { + "type": "string", + "description": "The type of token to issue (service or batch)." + }, + "user_lockout_config": { + "type": "object", + "description": "The user lockout configuration to pass into the backend. Should be a json object with string keys and values.", + "format": "map" } } }, - "AppRoleWriteCustomSecretIDResponse": { + "AwsConfigureCertificateRequest": { "type": "object", "properties": { - "secret_id": { + "aws_public_cert": { "type": "string", - "description": "Secret ID attached to the role." + "description": "Base64 encoded AWS Public cert required to verify PKCS7 signature of the EC2 instance metadata." }, - "secret_id_accessor": { + "type": { "type": "string", - "description": "Accessor of the secret ID" + "description": "Takes the value of either \"pkcs7\" or \"identity\", indicating the type of document which can be verified using the given certificate. The reason is that the PKCS#7 document will have a DSA digest and the identity signature will have an RSA signature, and accordingly the public certificates to verify those also vary. Defaults to \"pkcs7\".", + "default": "pkcs7" + } + } + }, + "AwsConfigureClientRequest": { + "type": "object", + "properties": { + "access_key": { + "type": "string", + "description": "AWS Access Key ID for the account used to make AWS API requests.", + "default": "" }, - "secret_id_num_uses": { - "type": "integer", - "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + "allowed_sts_header_values": { + "type": "array", + "description": "List of additional headers that are allowed to be in AWS STS request headers", + "items": { + "type": "string" + } }, - "secret_id_ttl": { + "endpoint": { + "type": "string", + "description": "URL to override the default generated endpoint for making AWS EC2 API calls.", + "default": "" + }, + "iam_endpoint": { + "type": "string", + "description": "URL to override the default generated endpoint for making AWS IAM API calls.", + "default": "" + }, + "iam_server_id_header_value": { + "type": "string", + "description": "Value to require in the X-Vault-AWS-IAM-Server-ID request header", + "default": "" + }, + "max_retries": { "type": "integer", - "description": "Duration in seconds after which the issued secret ID expires.", - "format": "seconds" + "description": "Maximum number of retries for recoverable exceptions of AWS APIs", + "default": -1 + }, + "secret_key": { + "type": "string", + "description": "AWS Secret Access Key for the account used to make AWS API requests.", + "default": "" + }, + "sts_endpoint": { + "type": "string", + "description": "URL to override the default generated endpoint for making AWS STS API calls.", + "default": "" + }, + "sts_region": { + "type": "string", + "description": "The region ID for the sts_endpoint, if set.", + "default": "" } } }, - "AppRoleWritePeriodRequest": { + "AwsConfigureIdentityAccessListTidyOperationRequest": { "type": "object", "properties": { - "period": { - "type": "integer", - "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "seconds", - "deprecated": true + "disable_periodic_tidy": { + "type": "boolean", + "description": "If set to 'true', disables the periodic tidying of the 'identity-accesslist/' entries.", + "default": false }, - "token_period": { + "safety_buffer": { "type": "integer", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "seconds" + "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", + "format": "seconds", + "default": 259200 } } }, - "AppRoleWritePoliciesRequest": { + "AwsConfigureIdentityIntegrationRequest": { "type": "object", "properties": { - "policies": { + "ec2_alias": { + "type": "string", + "description": "Configure how the AWS auth method generates entity alias when using EC2 auth. Valid values are \"role_id\", \"instance_id\", and \"image_id\". Defaults to \"role_id\".", + "default": "instance_id" + }, + "ec2_metadata": { "type": "array", - "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", + "description": "The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: account_id, auth_type. These fields are available to add: ami_id, instance_id, region. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'.", "items": { "type": "string" }, - "deprecated": true + "default": [ + "default" + ], + "x-vault-displayAttrs": { + "name": "ec2_metadata", + "value": "field1,field2" + } }, - "token_policies": { + "iam_alias": { + "type": "string", + "description": "Configure how the AWS auth method generates entity aliases when using IAM auth. Valid values are \"role_id\", \"unique_id\", and \"full_arn\". Defaults to \"role_id\".", + "default": "unique_id" + }, + "iam_metadata": { "type": "array", - "description": "Comma-separated list of policies", + "description": "The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: account_id, auth_type. These fields are available to add: canonical_arn, client_arn, client_user_id, inferred_aws_region, inferred_entity_id, inferred_entity_type. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'.", "items": { "type": "string" + }, + "default": [ + "default" + ], + "x-vault-displayAttrs": { + "name": "iam_metadata", + "value": "field1,field2" } } } }, - "AppRoleWriteRoleIDRequest": { + "AwsConfigureIdentityWhitelistTidyOperationRequest": { "type": "object", "properties": { - "role_id": { + "disable_periodic_tidy": { + "type": "boolean", + "description": "If set to 'true', disables the periodic tidying of the 'identity-accesslist/' entries.", + "default": false + }, + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", + "format": "seconds", + "default": 259200 + } + } + }, + "AwsConfigureLeaseRequest": { + "type": "object", + "properties": { + "lease": { "type": "string", - "description": "Identifier of the role. Defaults to a UUID." + "description": "Default lease for roles." + }, + "lease_max": { + "type": "string", + "description": "Maximum time a credential is valid for." } } }, - "AppRoleWriteRoleRequest": { + "AwsConfigureRoleTagBlacklistTidyOperationRequest": { "type": "object", "properties": { - "bind_secret_id": { + "disable_periodic_tidy": { "type": "boolean", - "description": "Impose secret_id to be presented when logging in using this role. Defaults to 'true'.", - "default": true + "description": "If set to 'true', disables the periodic tidying of deny listed entries.", + "default": false }, - "bound_cidr_list": { + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. Defaults to 4320h (180 days).", + "format": "seconds", + "default": 15552000 + } + } + }, + "AwsConfigureRoleTagDenyListTidyOperationRequest": { + "type": "object", + "properties": { + "disable_periodic_tidy": { + "type": "boolean", + "description": "If set to 'true', disables the periodic tidying of deny listed entries.", + "default": false + }, + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. Defaults to 4320h (180 days).", + "format": "seconds", + "default": 15552000 + } + } + }, + "AwsConfigureRootIamCredentialsRequest": { + "type": "object", + "properties": { + "access_key": { + "type": "string", + "description": "Access key with permission to create new keys." + }, + "iam_endpoint": { + "type": "string", + "description": "Endpoint to custom IAM server URL" + }, + "max_retries": { + "type": "integer", + "description": "Maximum number of retries for recoverable exceptions of AWS APIs", + "default": -1 + }, + "region": { + "type": "string", + "description": "Region for API calls." + }, + "secret_key": { + "type": "string", + "description": "Secret key with permission to create new keys." + }, + "sts_endpoint": { + "type": "string", + "description": "Endpoint to custom STS server URL" + }, + "username_template": { + "type": "string", + "description": "Template to generate custom IAM usernames" + } + } + }, + "AwsGenerateCredentials2Request": { + "type": "object", + "properties": { + "role_arn": { + "type": "string", + "description": "ARN of role to assume when credential_type is assumed_role" + }, + "role_session_name": { + "type": "string", + "description": "Session name to use when assuming role. Max chars: 64" + }, + "ttl": { + "type": "integer", + "description": "Lifetime of the returned credentials in seconds", + "format": "seconds", + "default": 3600 + } + } + }, + "AwsGenerateStsCredentials2Request": { + "type": "object", + "properties": { + "role_arn": { + "type": "string", + "description": "ARN of role to assume when credential_type is assumed_role" + }, + "role_session_name": { + "type": "string", + "description": "Session name to use when assuming role. Max chars: 64" + }, + "ttl": { + "type": "integer", + "description": "Lifetime of the returned credentials in seconds", + "format": "seconds", + "default": 3600 + } + } + }, + "AwsLogInRequest": { + "type": "object", + "properties": { + "iam_http_request_method": { + "type": "string", + "description": "HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value" + }, + "iam_request_body": { + "type": "string", + "description": "Base64-encoded request body when auth_type is iam. This must match the request body included in the signature." + }, + "iam_request_headers": { + "type": "string", + "description": "Key/value pairs of headers for use in the sts:GetCallerIdentity HTTP requests headers when auth_type is iam. Can be either a Base64-encoded, JSON-serialized string, or a JSON object of key/value pairs. This must at a minimum include the headers over which AWS has included a signature." + }, + "iam_request_url": { + "type": "string", + "description": "Base64-encoded full URL against which to make the AWS request when using iam auth_type." + }, + "identity": { + "type": "string", + "description": "Base64 encoded EC2 instance identity document. This needs to be supplied along with the 'signature' parameter. If using 'curl' for fetching the identity document, consider using the option '-w 0' while piping the output to 'base64' binary." + }, + "nonce": { + "type": "string", + "description": "The nonce to be used for subsequent login requests when auth_type is ec2. If this parameter is not specified at all and if reauthentication is allowed, then the backend will generate a random nonce, attaches it to the instance's identity access list entry and returns the nonce back as part of auth metadata. This value should be used with further login requests, to establish client authenticity. Clients can choose to set a custom nonce if preferred, in which case, it is recommended that clients provide a strong nonce. If a nonce is provided but with an empty value, it indicates intent to disable reauthentication. Note that, when 'disallow_reauthentication' option is enabled on either the role or the role tag, the 'nonce' holds no significance." + }, + "pkcs7": { + "type": "string", + "description": "PKCS7 signature of the identity document when using an auth_type of ec2." + }, + "role": { + "type": "string", + "description": "Name of the role against which the login is being attempted. If 'role' is not specified, then the login endpoint looks for a role bearing the name of the AMI ID of the EC2 instance that is trying to login. If a matching role is not found, login fails." + }, + "signature": { + "type": "string", + "description": "Base64 encoded SHA256 RSA signature of the instance identity document. This needs to be supplied along with 'identity' parameter." + } + } + }, + "AwsTidyIdentityAccessListRequest": { + "type": "object", + "properties": { + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", + "format": "seconds", + "default": 259200 + } + } + }, + "AwsTidyIdentityWhitelistRequest": { + "type": "object", + "properties": { + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage.", + "format": "seconds", + "default": 259200 + } + } + }, + "AwsTidyRoleTagBlacklistRequest": { + "type": "object", + "properties": { + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage.", + "format": "seconds", + "default": 259200 + } + } + }, + "AwsTidyRoleTagDenyListRequest": { + "type": "object", + "properties": { + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage.", + "format": "seconds", + "default": 259200 + } + } + }, + "AwsWriteAuthRoleRequest": { + "type": "object", + "properties": { + "allow_instance_migration": { + "type": "boolean", + "description": "If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution. This is only checked when auth_type is ec2.", + "default": false + }, + "auth_type": { + "type": "string", + "description": "The auth_type permitted to authenticate to this role. Must be one of iam or ec2 and cannot be changed after role creation." + }, + "bound_account_id": { "type": "array", - "description": "Use \"secret_id_bound_cidrs\" instead.", + "description": "If set, defines a constraint on the EC2 instances that the account ID in its identity document to match one of the IDs specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", "items": { "type": "string" - }, - "deprecated": true + } }, - "local_secret_ids": { + "bound_ami_id": { + "type": "array", + "description": "If set, defines a constraint on the EC2 instances that they should be using one of the AMI IDs specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "items": { + "type": "string" + } + }, + "bound_ec2_instance_id": { + "type": "array", + "description": "If set, defines a constraint on the EC2 instances to have one of the given instance IDs. Can be a list or comma-separated string of EC2 instance IDs. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "items": { + "type": "string" + } + }, + "bound_iam_instance_profile_arn": { + "type": "array", + "description": "If set, defines a constraint on the EC2 instances to be associated with an IAM instance profile ARN which has a prefix that matches one of the values specified by this parameter. The value is prefix-matched (as though it were a glob ending in '*'). This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "items": { + "type": "string" + } + }, + "bound_iam_principal_arn": { + "type": "array", + "description": "ARN of the IAM principals to bind to this role. Only applicable when auth_type is iam.", + "items": { + "type": "string" + } + }, + "bound_iam_role_arn": { + "type": "array", + "description": "If set, defines a constraint on the authenticating EC2 instance that it must match one of the IAM role ARNs specified by this parameter. The value is prefix-matched (as though it were a glob ending in '*'). The configured IAM user or EC2 instance role must be allowed to execute the 'iam:GetInstanceProfile' action if this is specified. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "items": { + "type": "string" + } + }, + "bound_region": { + "type": "array", + "description": "If set, defines a constraint on the EC2 instances that the region in its identity document match one of the regions specified by this parameter. This is only applicable when auth_type is ec2.", + "items": { + "type": "string" + } + }, + "bound_subnet_id": { + "type": "array", + "description": "If set, defines a constraint on the EC2 instance to be associated with the subnet ID that matches one of the values specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "items": { + "type": "string" + } + }, + "bound_vpc_id": { + "type": "array", + "description": "If set, defines a constraint on the EC2 instance to be associated with a VPC ID that matches one of the value specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", + "items": { + "type": "string" + } + }, + "disallow_reauthentication": { "type": "boolean", - "description": "If set, the secret IDs generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later." + "description": "If set, only allows a single token to be granted per instance ID. In order to perform a fresh login, the entry in the access list for the instance ID needs to be cleared using 'auth/aws-ec2/identity-accesslist/' endpoint. This is only applicable when auth_type is ec2.", + "default": false + }, + "inferred_aws_region": { + "type": "string", + "description": "When auth_type is iam and inferred_entity_type is set, the region to assume the inferred entity exists in." + }, + "inferred_entity_type": { + "type": "string", + "description": "When auth_type is iam, the AWS entity type to infer from the authenticated principal. The only supported value is ec2_instance, which will extract the EC2 instance ID from the authenticated role and apply the following restrictions specific to EC2 instances: bound_ami_id, bound_account_id, bound_iam_role_arn, bound_iam_instance_profile_arn, bound_vpc_id, bound_subnet_id. The configured EC2 client must be able to find the inferred instance ID in the results, and the instance must be running. If unable to determine the EC2 instance ID or unable to find the EC2 instance ID among running instances, then authentication will fail." + }, + "max_ttl": { + "type": "integer", + "description": "Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used.", + "format": "seconds", + "deprecated": true }, "period": { "type": "integer", @@ -26142,25 +26298,15 @@ }, "deprecated": true }, - "role_id": { - "type": "string", - "description": "Identifier of the role. Defaults to a UUID." - }, - "secret_id_bound_cidrs": { - "type": "array", - "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", - "items": { - "type": "string" - } - }, - "secret_id_num_uses": { - "type": "integer", - "description": "Number of times a SecretID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the the secret_id is of unlimited use." + "resolve_aws_unique_ids": { + "type": "boolean", + "description": "If set, resolve all AWS IAM ARNs into AWS's internal unique IDs. When an IAM entity (e.g., user, role, or instance profile) is deleted, then all references to it within the role will be invalidated, which prevents a new IAM entity from being created with the same name and matching the role's IAM binds. Once set, this cannot be unset.", + "default": true }, - "secret_id_ttl": { - "type": "integer", - "description": "Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration.", - "format": "seconds" + "role_tag": { + "type": "string", + "description": "If set, enables the role tags for this role. The value set for this field should be the 'key' of the tag on the EC2 instance. The 'value' of the tag should be generated using 'role//tag' endpoint. Defaults to an empty string, meaning that role tags are disabled. This is only allowed if auth_type is ec2.", + "default": "" }, "token_bound_cidrs": { "type": "array", @@ -26244,268 +26390,224 @@ "name": "Generated Token's Type", "group": "Tokens" } + }, + "ttl": { + "type": "integer", + "description": "Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used.", + "format": "seconds", + "deprecated": true } } }, - "AppRoleWriteSecretIDAccessorDestroyRequest": { + "AwsWriteRoleRequest": { "type": "object", "properties": { - "secret_id_accessor": { + "arn": { "type": "string", - "description": "Accessor of the SecretID" - } - } - }, - "AppRoleWriteSecretIDAccessorLookupRequest": { - "type": "object", - "properties": { - "secret_id_accessor": { + "description": "Use role_arns or policy_arns instead.", + "deprecated": true + }, + "credential_type": { "type": "string", - "description": "Accessor of the SecretID" - } - } - }, - "AppRoleWriteSecretIDAccessorLookupResponse": { - "type": "object", - "properties": { - "cidr_list": { + "description": "Type of credential to retrieve. Must be one of assumed_role, iam_user, or federation_token" + }, + "default_sts_ttl": { + "type": "integer", + "description": "Default TTL for assumed_role and federation_token credential types when no TTL is explicitly requested with the credentials", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Default STS TTL" + } + }, + "iam_groups": { "type": "array", - "description": "List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", + "description": "Names of IAM groups that generated IAM users will be added to. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IAM Groups", + "value": "group1,group2" } }, - "creation_time": { - "type": "string", - "format": "date-time" + "iam_tags": { + "type": "object", + "description": "IAM tags to be set for any users created by this role. These must be presented as Key-Value pairs. This can be represented as a map or a list of equal sign delimited key pairs.", + "format": "kvpairs", + "x-vault-displayAttrs": { + "name": "IAM Tags", + "value": "[key1=value1, key2=value2]" + } }, - "expiration_time": { - "type": "string", - "format": "date-time" + "max_sts_ttl": { + "type": "integer", + "description": "Max allowed TTL for assumed_role and federation_token credential types", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Max STS TTL" + } }, - "last_updated_time": { + "permissions_boundary_arn": { "type": "string", - "format": "date-time" - }, - "metadata": { - "type": "object", - "format": "map" + "description": "ARN of an IAM policy to attach as a permissions boundary on IAM user credentials; only valid when credential_type isiam_user", + "x-vault-displayAttrs": { + "name": "Permissions Boundary ARN" + } }, - "secret_id_accessor": { + "policy": { "type": "string", - "description": "Accessor of the secret ID" + "description": "Use policy_document instead.", + "deprecated": true }, - "secret_id_num_uses": { - "type": "integer", - "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + "policy_arns": { + "type": "array", + "description": "ARNs of AWS policies. Behavior varies by credential_type. When credential_type is iam_user, then it will attach the specified policies to the generated IAM user. When credential_type is assumed_role or federation_token, the policies will be passed as the PolicyArns parameter, acting as a filter on permissions available.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Policy ARNs" + } }, - "secret_id_ttl": { - "type": "integer", - "description": "Duration in seconds after which the issued secret ID expires.", - "format": "seconds" + "policy_document": { + "type": "string", + "description": "JSON-encoded IAM policy document. Behavior varies by credential_type. When credential_type is iam_user, then it will attach the contents of the policy_document to the IAM user generated. When credential_type is assumed_role or federation_token, this will be passed in as the Policy parameter to the AssumeRole or GetFederationToken API call, acting as a filter on permissions available." }, - "token_bound_cidrs": { + "role_arns": { "type": "array", - "description": "List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", + "description": "ARNs of AWS roles allowed to be assumed. Only valid when credential_type is assumed_role", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Role ARNs" + } + }, + "user_path": { + "type": "string", + "description": "Path for IAM User. Only valid when credential_type is iam_user", + "default": "/", + "x-vault-displayAttrs": { + "name": "User Path", + "value": "/" } } } }, - "AppRoleWriteSecretIDBoundCIDRsRequest": { + "AwsWriteRoleTagRequest": { "type": "object", "properties": { - "secret_id_bound_cidrs": { + "allow_instance_migration": { + "type": "boolean", + "description": "If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution.", + "default": false + }, + "disallow_reauthentication": { + "type": "boolean", + "description": "If set, only allows a single token to be granted per instance ID. In order to perform a fresh login, the entry in access list for the instance ID needs to be cleared using the 'auth/aws-ec2/identity-accesslist/' endpoint.", + "default": false + }, + "instance_id": { + "type": "string", + "description": "Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID." + }, + "max_ttl": { + "type": "integer", + "description": "If set, specifies the maximum allowed token lifetime.", + "format": "seconds", + "default": 0 + }, + "policies": { "type": "array", - "description": "Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation.", + "description": "Policies to be associated with the tag. If set, must be a subset of the role's policies. If set, but set to an empty value, only the 'default' policy will be given to issued tokens.", "items": { "type": "string" } } } }, - "AppRoleWriteSecretIDDestroyRequest": { + "AwsWriteStsRoleRequest": { "type": "object", "properties": { - "secret_id": { + "sts_role": { "type": "string", - "description": "SecretID attached to the role." + "description": "AWS ARN for STS role to be assumed when interacting with the account specified. The Vault server must have permissions to assume this role." } } }, - "AppRoleWriteSecretIDLookupRequest": { + "AzureConfigureAuthRequest": { "type": "object", "properties": { - "secret_id": { + "client_id": { "type": "string", - "description": "SecretID attached to the role." - } - } - }, - "AppRoleWriteSecretIDLookupResponse": { - "type": "object", - "properties": { - "cidr_list": { - "type": "array", - "description": "List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", - "items": { - "type": "string" + "description": "The OAuth2 client id to connection to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable.", + "x-vault-displayAttrs": { + "name": "Client ID" } }, - "creation_time": { - "type": "string", - "format": "date-time" - }, - "expiration_time": { + "client_secret": { "type": "string", - "format": "date-time" + "description": "The OAuth2 client secret to connection to Azure. This value can also be provided with the AZURE_CLIENT_SECRET environment variable." }, - "last_updated_time": { + "environment": { "type": "string", - "format": "date-time" - }, - "metadata": { - "type": "object", - "format": "map" + "description": "The Azure environment name. If not provided, AzurePublicCloud is used. This value can also be provided with the AZURE_ENVIRONMENT environment variable." }, - "secret_id_accessor": { + "resource": { "type": "string", - "description": "Accessor of the secret ID" - }, - "secret_id_num_uses": { - "type": "integer", - "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + "description": "The resource URL for the vault application in Azure Active Directory. This value can also be provided with the AZURE_AD_RESOURCE environment variable." }, - "secret_id_ttl": { + "root_password_ttl": { "type": "integer", - "description": "Duration in seconds after which the issued secret ID expires.", - "format": "seconds" + "description": "The TTL of the root password in Azure. This can be either a number of seconds or a time formatted duration (ex: 24h, 48ds)", + "format": "seconds", + "default": 15768000000000000 }, - "token_bound_cidrs": { - "type": "array", - "description": "List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any.", - "items": { - "type": "string" + "tenant_id": { + "type": "string", + "description": "The tenant id for the Azure Active Directory. This is sometimes referred to as Directory ID in AD. This value can also be provided with the AZURE_TENANT_ID environment variable.", + "x-vault-displayAttrs": { + "name": "Tenant ID" } } } }, - "AppRoleWriteSecretIDNumUsesRequest": { - "type": "object", - "properties": { - "secret_id_num_uses": { - "type": "integer", - "description": "Number of times a SecretID can access the role, after which the SecretID will expire." - } - } - }, - "AppRoleWriteSecretIDRequest": { + "AzureConfigureRequest": { "type": "object", "properties": { - "cidr_list": { - "type": "array", - "description": "Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role.", - "items": { - "type": "string" - } - }, - "metadata": { + "client_id": { "type": "string", - "description": "Metadata to be tied to the SecretID. This should be a JSON formatted string containing the metadata in key value pairs." - }, - "num_uses": { - "type": "integer", - "description": "Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role's secret_id_num_uses." + "description": "The OAuth2 client id to connect to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable." }, - "token_bound_cidrs": { - "type": "array", - "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", - "items": { - "type": "string" - } + "client_secret": { + "type": "string", + "description": "The OAuth2 client secret to connect to Azure. This value can also be provided with the AZURE_CLIENT_SECRET environment variable." }, - "ttl": { - "type": "integer", - "description": "Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role's secret_id_ttl.", - "format": "seconds" - } - } - }, - "AppRoleWriteSecretIDResponse": { - "type": "object", - "properties": { - "secret_id": { + "environment": { "type": "string", - "description": "Secret ID attached to the role." + "description": "The Azure environment name. If not provided, AzurePublicCloud is used. This value can also be provided with the AZURE_ENVIRONMENT environment variable." }, - "secret_id_accessor": { + "password_policy": { "type": "string", - "description": "Accessor of the secret ID" + "description": "Name of the password policy to use to generate passwords for dynamic credentials." }, - "secret_id_num_uses": { + "root_password_ttl": { "type": "integer", - "description": "Number of times a secret ID can access the role, after which the secret ID will expire." + "description": "The TTL of the root password in Azure. This can be either a number of seconds or a time formatted duration (ex: 24h, 48ds)", + "format": "seconds", + "default": 15768000000000000 }, - "secret_id_ttl": { - "type": "integer", - "description": "Duration in seconds after which the issued secret ID expires.", - "format": "seconds" - } - } - }, - "AppRoleWriteSecretIDTTLRequest": { - "type": "object", - "properties": { - "secret_id_ttl": { - "type": "integer", - "description": "Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration.", - "format": "seconds" - } - } - }, - "AppRoleWriteTokenBoundCIDRsRequest": { - "type": "object", - "properties": { - "token_bound_cidrs": { - "type": "array", - "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", - "items": { - "type": "string" - } - } - } - }, - "AppRoleWriteTokenMaxTTLRequest": { - "type": "object", - "properties": { - "token_max_ttl": { - "type": "integer", - "description": "The maximum lifetime of the generated token", - "format": "seconds" - } - } - }, - "AppRoleWriteTokenNumUsesRequest": { - "type": "object", - "properties": { - "token_num_uses": { - "type": "integer", - "description": "The maximum number of times a token may be used, a value of zero means unlimited" - } - } - }, - "AppRoleWriteTokenTTLRequest": { - "type": "object", - "properties": { - "token_ttl": { - "type": "integer", - "description": "The initial ttl of the token to generate", - "format": "seconds" + "subscription_id": { + "type": "string", + "description": "The subscription id for the Azure Active Directory. This value can also be provided with the AZURE_SUBSCRIPTION_ID environment variable." + }, + "tenant_id": { + "type": "string", + "description": "The tenant id for the Azure Active Directory. This value can also be provided with the AZURE_TENANT_ID environment variable." } } }, - "AzureLoginRequest": { + "AzureLogInRequest": { "type": "object", "properties": { "jwt": { @@ -26516,6 +26618,10 @@ "type": "string", "description": "The resource group from the instance." }, + "resource_id": { + "type": "string", + "description": "The fully qualified ID of the resource, includingthe resource name and resource type. Use the format, /subscriptions/{guid}/resourceGroups/{resource-group-name}/{resource-provider-namespace}/{resource-type}/{resource-name}. This value is ignored if vm_name or vmss_name is specified." + }, "role": { "type": "string", "description": "The token role." @@ -26534,37 +26640,6 @@ } } }, - "AzureWriteAuthConfigRequest": { - "type": "object", - "properties": { - "client_id": { - "type": "string", - "description": "The OAuth2 client id to connection to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable.", - "x-vault-displayAttrs": { - "name": "Client ID" - } - }, - "client_secret": { - "type": "string", - "description": "The OAuth2 client secret to connection to Azure. This value can also be provided with the AZURE_CLIENT_SECRET environment variable." - }, - "environment": { - "type": "string", - "description": "The Azure environment name. If not provided, AzurePublicCloud is used. This value can also be provided with the AZURE_ENVIRONMENT environment variable." - }, - "resource": { - "type": "string", - "description": "The resource URL for the vault application in Azure Active Directory. This value can also be provided with the AZURE_AD_RESOURCE environment variable." - }, - "tenant_id": { - "type": "string", - "description": "The tenant id for the Azure Active Directory. This is sometimes referred to as Directory ID in AD. This value can also be provided with the AZURE_TENANT_ID environment variable.", - "x-vault-displayAttrs": { - "name": "Tenant ID" - } - } - } - }, "AzureWriteAuthRoleRequest": { "type": "object", "properties": { @@ -26726,41 +26801,6 @@ } } }, - "AzureWriteConfigRequest": { - "type": "object", - "properties": { - "client_id": { - "type": "string", - "description": "The OAuth2 client id to connect to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable." - }, - "client_secret": { - "type": "string", - "description": "The OAuth2 client secret to connect to Azure. This value can also be provided with the AZURE_CLIENT_SECRET environment variable." - }, - "environment": { - "type": "string", - "description": "The Azure environment name. If not provided, AzurePublicCloud is used. This value can also be provided with the AZURE_ENVIRONMENT environment variable." - }, - "password_policy": { - "type": "string", - "description": "Name of the password policy to use to generate passwords for dynamic credentials." - }, - "root_password_ttl": { - "type": "integer", - "description": "The TTL of the root password in Azure. This can be either a number of seconds or a time formatted duration (ex: 24h, 48ds)", - "format": "seconds", - "default": 15768000000000000 - }, - "subscription_id": { - "type": "string", - "description": "The subscription id for the Azure Active Directory. This value can also be provided with the AZURE_SUBSCRIPTION_ID environment variable." - }, - "tenant_id": { - "type": "string", - "description": "The tenant id for the Azure Active Directory. This value can also be provided with the AZURE_TENANT_ID environment variable." - } - } - }, "AzureWriteRoleRequest": { "type": "object", "properties": { @@ -26786,6 +26826,11 @@ "description": "Indicates whether new application objects should be permanently deleted. If not set, objects will not be permanently deleted.", "default": false }, + "persist_app": { + "type": "boolean", + "description": "Persist the app between generated credentials. Useful if the app needs to maintain owner ship of resources it creates", + "default": false + }, "ttl": { "type": "integer", "description": "Default lease for generated credentials. If not set or set to 0, will use system default.", @@ -26793,33 +26838,7 @@ } } }, - "CalculateAuditHashRequest": { - "type": "object", - "properties": { - "input": { - "type": "string" - } - } - }, - "CentrifyLoginRequest": { - "type": "object", - "properties": { - "mode": { - "type": "string", - "description": "Auth mode ('ro' for resource owner, 'cc' for credential client).", - "default": "ro" - }, - "password": { - "type": "string", - "description": "Password for this user." - }, - "username": { - "type": "string", - "description": "Username of the user." - } - } - }, - "CentrifyWriteConfigRequest": { + "CentrifyConfigureRequest": { "type": "object", "properties": { "app_id": { @@ -26910,29 +26929,25 @@ } } }, - "CertificatesLoginRequest": { + "CentrifyLogInRequest": { "type": "object", "properties": { - "name": { + "mode": { "type": "string", - "description": "The name of the certificate role to authenticate against." - } - } - }, - "CertificatesWriteCRLRequest": { - "type": "object", - "properties": { - "crl": { + "description": "Auth mode ('ro' for resource owner, 'cc' for credential client).", + "default": "ro" + }, + "password": { "type": "string", - "description": "The public CRL that should be trusted to attest to certificates' validity statuses. May be DER or PEM encoded. Note: the expiration time is ignored; if the CRL is no longer valid, delete it using the same name as specified here." + "description": "Password for this user." }, - "url": { + "username": { "type": "string", - "description": "The URL of a CRL distribution point. Only one of 'crl' or 'url' parameters should be specified." + "description": "Username of the user." } } }, - "CertificatesWriteConfigRequest": { + "CertConfigureRequest": { "type": "object", "properties": { "disable_binding": { @@ -26952,7 +26967,16 @@ } } }, - "CertificatesWriteRequest": { + "CertLogInRequest": { + "type": "object", + "properties": { + "name": { + "type": "string", + "description": "The name of the certificate role to authenticate against." + } + } + }, + "CertWriteCertificateRequest": { "type": "object", "properties": { "allowed_common_names": { @@ -27195,48 +27219,20 @@ } } }, - "CloudFoundryLoginRequest": { + "CertWriteCrlRequest": { "type": "object", "properties": { - "cf_instance_cert": { - "type": "string", - "description": "The full body of the file available at the CF_INSTANCE_CERT path on the CF instance.", - "x-vault-displayAttrs": { - "name": "CF_INSTANCE_CERT Contents" - } - }, - "role": { - "type": "string", - "description": "The name of the role to authenticate against.", - "x-vault-displayAttrs": { - "name": "Role Name", - "value": "internally-defined-role" - } - }, - "signature": { + "crl": { "type": "string", - "description": "The signature generated by the client certificate's private key.", - "x-vault-displayAttrs": { - "name": "Signature" - } + "description": "The public CRL that should be trusted to attest to certificates' validity statuses. May be DER or PEM encoded. Note: the expiration time is ignored; if the CRL is no longer valid, delete it using the same name as specified here." }, - "signing_time": { + "url": { "type": "string", - "description": "The date and time used to construct the signature.", - "x-vault-displayAttrs": { - "name": "Signing Time", - "value": "2006-01-02T15:04:05Z" - } + "description": "The URL of a CRL distribution point. Only one of 'crl' or 'url' parameters should be specified." } - }, - "required": [ - "role", - "cf_instance_cert", - "signing_time", - "signature" - ] + } }, - "CloudFoundryWriteConfigRequest": { + "CloudFoundryConfigureRequest": { "type": "object", "properties": { "cf_api_addr": { @@ -27377,6 +27373,47 @@ } } }, + "CloudFoundryLogInRequest": { + "type": "object", + "properties": { + "cf_instance_cert": { + "type": "string", + "description": "The full body of the file available at the CF_INSTANCE_CERT path on the CF instance.", + "x-vault-displayAttrs": { + "name": "CF_INSTANCE_CERT Contents" + } + }, + "role": { + "type": "string", + "description": "The name of the role to authenticate against.", + "x-vault-displayAttrs": { + "name": "Role Name", + "value": "internally-defined-role" + } + }, + "signature": { + "type": "string", + "description": "The signature generated by the client certificate's private key.", + "x-vault-displayAttrs": { + "name": "Signature" + } + }, + "signing_time": { + "type": "string", + "description": "The date and time used to construct the signature.", + "x-vault-displayAttrs": { + "name": "Signing Time", + "value": "2006-01-02T15:04:05Z" + } + } + }, + "required": [ + "cf_instance_cert", + "signing_time", + "signature", + "role" + ] + }, "CloudFoundryWriteRoleRequest": { "type": "object", "properties": { @@ -27552,7 +27589,42 @@ } } }, - "ConsulWriteAccessConfigRequest": { + "CollectHostInformationResponse": { + "type": "object", + "properties": { + "cpu": { + "type": "array", + "items": { + "type": "object" + } + }, + "cpu_times": { + "type": "array", + "items": { + "type": "object" + } + }, + "disk": { + "type": "array", + "items": { + "type": "object" + } + }, + "host": { + "type": "object", + "format": "map" + }, + "memory": { + "type": "object", + "format": "map" + }, + "timestamp": { + "type": "string", + "format": "date-time" + } + } + }, + "ConsulConfigureAccessRequest": { "type": "object", "properties": { "address": { @@ -27662,7 +27734,50 @@ } } }, - "DatabaseWriteConfigRequest": { + "CorsConfigureRequest": { + "type": "object", + "properties": { + "allowed_headers": { + "type": "array", + "description": "A comma-separated string or array of strings indicating headers that are allowed on cross-origin requests.", + "items": { + "type": "string" + } + }, + "allowed_origins": { + "type": "array", + "description": "A comma-separated string or array of strings indicating origins that may make cross-origin requests.", + "items": { + "type": "string" + } + }, + "enable": { + "type": "boolean", + "description": "Enables or disables CORS headers on requests." + } + } + }, + "CorsReadConfigurationResponse": { + "type": "object", + "properties": { + "allowed_headers": { + "type": "array", + "items": { + "type": "string" + } + }, + "allowed_origins": { + "type": "array", + "items": { + "type": "string" + } + }, + "enabled": { + "type": "boolean" + } + } + }, + "DatabaseConfigureConnectionRequest": { "type": "object", "properties": { "allowed_roles": { @@ -27790,6 +27905,41 @@ } } }, + "EncryptionKeyConfigureRotationRequest": { + "type": "object", + "properties": { + "enabled": { + "type": "boolean", + "description": "Whether automatic rotation is enabled." + }, + "interval": { + "type": "integer", + "description": "How long after installation of an active key term that the key will be automatically rotated.", + "format": "seconds" + }, + "max_operations": { + "type": "integer", + "description": "The number of encryption operations performed before the barrier key is automatically rotated.", + "format": "int64" + } + } + }, + "EncryptionKeyReadRotationConfigurationResponse": { + "type": "object", + "properties": { + "enabled": { + "type": "boolean" + }, + "interval": { + "type": "integer", + "format": "seconds" + }, + "max_operations": { + "type": "integer", + "format": "int64" + } + } + }, "EntityBatchDeleteRequest": { "type": "object", "properties": { @@ -27802,7 +27952,66 @@ } } }, - "EntityLookupRequest": { + "EntityCreateAliasRequest": { + "type": "object", + "properties": { + "canonical_id": { + "type": "string", + "description": "Entity ID to which this alias belongs" + }, + "custom_metadata": { + "type": "object", + "description": "User provided key-value pairs", + "format": "kvpairs" + }, + "entity_id": { + "type": "string", + "description": "Entity ID to which this alias belongs. This field is deprecated, use canonical_id." + }, + "id": { + "type": "string", + "description": "ID of the entity alias. If set, updates the corresponding entity alias." + }, + "mount_accessor": { + "type": "string", + "description": "Mount accessor to which this alias belongs to; unused for a modify" + }, + "name": { + "type": "string", + "description": "Name of the alias; unused for a modify" + } + } + }, + "EntityCreateRequest": { + "type": "object", + "properties": { + "disabled": { + "type": "boolean", + "description": "If set true, tokens tied to this identity will not be able to be used (but will not be revoked)." + }, + "id": { + "type": "string", + "description": "ID of the entity. If set, updates the corresponding existing entity." + }, + "metadata": { + "type": "object", + "description": "Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", + "format": "kvpairs" + }, + "name": { + "type": "string", + "description": "Name of the entity" + }, + "policies": { + "type": "array", + "description": "Policies to be tied to the entity.", + "items": { + "type": "string" + } + } + } + }, + "EntityLookUpRequest": { "type": "object", "properties": { "alias_id": { @@ -27854,7 +28063,7 @@ } } }, - "EntityWriteAliasByIDRequest": { + "EntityUpdateAliasByIdRequest": { "type": "object", "properties": { "canonical_id": { @@ -27880,37 +28089,7 @@ } } }, - "EntityWriteAliasRequest": { - "type": "object", - "properties": { - "canonical_id": { - "type": "string", - "description": "Entity ID to which this alias belongs" - }, - "custom_metadata": { - "type": "object", - "description": "User provided key-value pairs", - "format": "kvpairs" - }, - "entity_id": { - "type": "string", - "description": "Entity ID to which this alias belongs. This field is deprecated, use canonical_id." - }, - "id": { - "type": "string", - "description": "ID of the entity alias. If set, updates the corresponding entity alias." - }, - "mount_accessor": { - "type": "string", - "description": "Mount accessor to which this alias belongs to; unused for a modify" - }, - "name": { - "type": "string", - "description": "Name of the alias; unused for a modify" - } - } - }, - "EntityWriteByIDRequest": { + "EntityUpdateByIdRequest": { "type": "object", "properties": { "disabled": { @@ -27935,7 +28114,7 @@ } } }, - "EntityWriteByNameRequest": { + "EntityUpdateByNameRequest": { "type": "object", "properties": { "disabled": { @@ -27960,45 +28139,175 @@ } } }, - "EntityWriteRequest": { + "GenerateHashRequest": { "type": "object", "properties": { - "disabled": { - "type": "boolean", - "description": "If set true, tokens tied to this identity will not be able to be used (but will not be revoked)." + "algorithm": { + "type": "string", + "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\".", + "default": "sha2-256" }, - "id": { + "format": { "type": "string", - "description": "ID of the entity. If set, updates the corresponding existing entity." + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", + "default": "hex" }, - "metadata": { - "type": "object", - "description": "Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", - "format": "kvpairs" + "input": { + "type": "string", + "description": "The base64-encoded input data" }, - "name": { + "urlalgorithm": { "type": "string", - "description": "Name of the entity" + "description": "Algorithm to use (POST URL parameter)" + } + } + }, + "GenerateHashResponse": { + "type": "object", + "properties": { + "sum": { + "type": "string" + } + } + }, + "GenerateHashWithAlgorithmRequest": { + "type": "object", + "properties": { + "algorithm": { + "type": "string", + "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\".", + "default": "sha2-256" }, - "policies": { - "type": "array", - "description": "Policies to be tied to the entity.", - "items": { - "type": "string" - } + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", + "default": "hex" + }, + "input": { + "type": "string", + "description": "The base64-encoded input data" } } }, - "GitHubLoginRequest": { + "GenerateHashWithAlgorithmResponse": { "type": "object", "properties": { - "token": { + "sum": { + "type": "string" + } + } + }, + "GenerateRandomRequest": { + "type": "object", + "properties": { + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 + }, + "format": { "type": "string", - "description": "GitHub personal API token" + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" + }, + "source": { + "type": "string", + "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", + "default": "platform" + }, + "urlbytes": { + "type": "string", + "description": "The number of bytes to generate (POST URL parameter)" + } + } + }, + "GenerateRandomResponse": { + "type": "object", + "properties": { + "random_bytes": { + "type": "string" + } + } + }, + "GenerateRandomWithBytesRequest": { + "type": "object", + "properties": { + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 + }, + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" + }, + "source": { + "type": "string", + "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", + "default": "platform" + } + } + }, + "GenerateRandomWithBytesResponse": { + "type": "object", + "properties": { + "random_bytes": { + "type": "string" + } + } + }, + "GenerateRandomWithSourceAndBytesRequest": { + "type": "object", + "properties": { + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 + }, + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" + } + } + }, + "GenerateRandomWithSourceAndBytesResponse": { + "type": "object", + "properties": { + "random_bytes": { + "type": "string" + } + } + }, + "GenerateRandomWithSourceRequest": { + "type": "object", + "properties": { + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 + }, + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" + }, + "urlbytes": { + "type": "string", + "description": "The number of bytes to generate (POST URL parameter)" + } + } + }, + "GenerateRandomWithSourceResponse": { + "type": "object", + "properties": { + "random_bytes": { + "type": "string" } } }, - "GitHubWriteConfigRequest": { + "GithubConfigureRequest": { "type": "object", "properties": { "base_url": { @@ -28118,197 +28427,34 @@ "organization" ] }, - "GitHubWriteMapTeamRequest": { + "GithubLogInRequest": { "type": "object", "properties": { - "value": { + "token": { "type": "string", - "description": "Value for teams mapping" + "description": "GitHub personal API token" } } }, - "GitHubWriteMapUserRequest": { + "GithubWriteTeamMappingRequest": { "type": "object", "properties": { "value": { "type": "string", - "description": "Value for users mapping" - } - } - }, - "GoogleCloudKMSDecryptRequest": { - "type": "object", - "properties": { - "additional_authenticated_data": { - "type": "string", - "description": "Optional data that was specified during encryption of this payload." - }, - "ciphertext": { - "type": "string", - "description": "Ciphertext to decrypt as previously returned from an encrypt operation. This must be base64-encoded ciphertext as previously returned from an encrypt operation." - }, - "key_version": { - "type": "integer", - "description": "Integer version of the crypto key version to use for decryption. This is required for asymmetric keys. For symmetric keys, Cloud KMS will choose the correct version automatically." - } - } - }, - "GoogleCloudKMSEncryptRequest": { - "type": "object", - "properties": { - "additional_authenticated_data": { - "type": "string", - "description": "Optional base64-encoded data that, if specified, must also be provided to decrypt this payload." - }, - "key_version": { - "type": "integer", - "description": "Integer version of the crypto key version to use for encryption. If unspecified, this defaults to the latest active crypto key version." - }, - "plaintext": { - "type": "string", - "description": "Plaintext value to be encrypted. This can be a string or binary, but the size is limited. See the Google Cloud KMS documentation for information on size limitations by key types." - } - } - }, - "GoogleCloudKMSReencryptRequest": { - "type": "object", - "properties": { - "additional_authenticated_data": { - "type": "string", - "description": "Optional data that, if specified, must also be provided during decryption." - }, - "ciphertext": { - "type": "string", - "description": "Ciphertext to be re-encrypted to the latest key version. This must be ciphertext that Vault previously generated for this named key." - }, - "key_version": { - "type": "integer", - "description": "Integer version of the crypto key version to use for the new encryption. If unspecified, this defaults to the latest active crypto key version." - } - } - }, - "GoogleCloudKMSRegisterKeyRequest": { - "type": "object", - "properties": { - "crypto_key": { - "type": "string", - "description": "Full resource ID of the crypto key including the project, location, key ring, and crypto key like \"projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s\". This crypto key must already exist in Google Cloud KMS unless verify is set to \"false\"." - }, - "verify": { - "type": "boolean", - "description": "Verify that the given Google Cloud KMS crypto key exists and is accessible before creating the storage entry in Vault. Set this to \"false\" if the key will not exist at creation time.", - "default": true - } - } - }, - "GoogleCloudKMSSignRequest": { - "type": "object", - "properties": { - "digest": { - "type": "string", - "description": "Digest to sign. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required." - }, - "key_version": { - "type": "integer", - "description": "Integer version of the crypto key version to use for signing. This field is required." - } - } - }, - "GoogleCloudKMSVerifyRequest": { - "type": "object", - "properties": { - "digest": { - "type": "string", - "description": "Digest to verify. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required." - }, - "key_version": { - "type": "integer", - "description": "Integer version of the crypto key version to use for verification. This field is required." - }, - "signature": { - "type": "string", - "description": "Base64-encoded signature to use for verification. This field is required." - } - } - }, - "GoogleCloudKMSWriteConfigRequest": { - "type": "object", - "properties": { - "credentials": { - "type": "string", - "description": "The credentials to use for authenticating to Google Cloud. Leave this blank to use the Default Application Credentials or instance metadata authentication." - }, - "scopes": { - "type": "array", - "description": "The list of full-URL scopes to request when authenticating. By default, this requests https://www.googleapis.com/auth/cloudkms.", - "items": { - "type": "string" - } - } - } - }, - "GoogleCloudKMSWriteKeyConfigRequest": { - "type": "object", - "properties": { - "max_version": { - "type": "integer", - "description": "Maximum allowed crypto key version. If set to a positive value, key versions greater than the given value are not permitted to be used. If set to 0 or a negative value, there is no maximum key version." - }, - "min_version": { - "type": "integer", - "description": "Minimum allowed crypto key version. If set to a positive value, key versions less than the given value are not permitted to be used. If set to 0 or a negative value, there is no minimum key version. This value only affects encryption/re-encryption, not decryption. To restrict old values from being decrypted, increase this value and then perform a trim operation." - } - } - }, - "GoogleCloudKMSWriteKeyRequest": { - "type": "object", - "properties": { - "algorithm": { - "type": "string", - "description": "Algorithm to use for encryption, decryption, or signing. The value depends on the key purpose. The value cannot be changed after creation. For a key purpose of \"encrypt_decrypt\", the valid values are: - symmetric_encryption (default) For a key purpose of \"asymmetric_sign\", valid values are: - rsa_sign_pss_2048_sha256 - rsa_sign_pss_3072_sha256 - rsa_sign_pss_4096_sha256 - rsa_sign_pkcs1_2048_sha256 - rsa_sign_pkcs1_3072_sha256 - rsa_sign_pkcs1_4096_sha256 - ec_sign_p256_sha256 - ec_sign_p384_sha384 For a key purpose of \"asymmetric_decrypt\", valid values are: - rsa_decrypt_oaep_2048_sha256 - rsa_decrypt_oaep_3072_sha256 - rsa_decrypt_oaep_4096_sha256" - }, - "crypto_key": { - "type": "string", - "description": "Name of the crypto key to use. If the given crypto key does not exist, Vault will try to create it. This defaults to the name of the key given to Vault as the parameter if unspecified." - }, - "key_ring": { - "type": "string", - "description": "Full Google Cloud resource ID of the key ring with the project and location (e.g. projects/my-project/locations/global/keyRings/my-keyring). If the given key ring does not exist, Vault will try to create it during a create operation." - }, - "labels": { - "type": "object", - "description": "Arbitrary key=value label to apply to the crypto key. To specify multiple labels, specify this argument multiple times (e.g. labels=\"a=b\" labels=\"c=d\").", - "format": "kvpairs" - }, - "protection_level": { - "type": "string", - "description": "Level of protection to use for the key management. Valid values are \"software\" and \"hsm\". The default value is \"software\". The value cannot be changed after creation." - }, - "purpose": { - "type": "string", - "description": "Purpose of the key. Valid options are \"asymmetric_decrypt\", \"asymmetric_sign\", and \"encrypt_decrypt\". The default value is \"encrypt_decrypt\". The value cannot be changed after creation." - }, - "rotation_period": { - "type": "integer", - "description": "Amount of time between crypto key version rotations. This is specified as a time duration value like 72h (72 hours). The smallest possible value is 24h. This value only applies to keys with a purpose of \"encrypt_decrypt\".", - "format": "seconds" + "description": "Value for teams mapping" } } }, - "GoogleCloudLoginRequest": { + "GithubWriteUserMappingRequest": { "type": "object", "properties": { - "jwt": { - "type": "string", - "description": "A signed JWT. This is either a self-signed service account JWT ('iam' roles only) or a GCE identity metadata token ('iam', 'gce' roles)." - }, - "role": { + "value": { "type": "string", - "description": "Name of the role against which the login is being attempted. Required." + "description": "Value for users mapping" } } }, - "GoogleCloudWriteAuthConfigRequest": { + "GoogleCloudConfigureAuthRequest": { "type": "object", "properties": { "credentials": { @@ -28368,7 +28514,7 @@ } } }, - "GoogleCloudWriteConfigRequest": { + "GoogleCloudConfigureRequest": { "type": "object", "properties": { "credentials": { @@ -28387,16 +28533,54 @@ } } }, - "GoogleCloudWriteKeyRequest": { + "GoogleCloudEditLabelsForRoleRequest": { "type": "object", "properties": { - "key_algorithm": { - "type": "string", - "description": "Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\"", - "default": "KEY_ALG_RSA_2048" - }, - "key_type": { - "type": "string", + "add": { + "type": "array", + "description": "BoundLabels to add (in $key:$value)", + "items": { + "type": "string" + } + }, + "remove": { + "type": "array", + "description": "Label key values to remove", + "items": { + "type": "string" + } + } + } + }, + "GoogleCloudEditServiceAccountsForRoleRequest": { + "type": "object", + "properties": { + "add": { + "type": "array", + "description": "Service-account emails or IDs to add.", + "items": { + "type": "string" + } + }, + "remove": { + "type": "array", + "description": "Service-account emails or IDs to remove.", + "items": { + "type": "string" + } + } + } + }, + "GoogleCloudGenerateRolesetKeyWithParameters2Request": { + "type": "object", + "properties": { + "key_algorithm": { + "type": "string", + "description": "Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\"", + "default": "KEY_ALG_RSA_2048" + }, + "key_type": { + "type": "string", "description": "Private key type for service account key - defaults to TYPE_GOOGLE_CREDENTIALS_FILE\"", "default": "TYPE_GOOGLE_CREDENTIALS_FILE" }, @@ -28407,22 +28591,236 @@ } } }, - "GoogleCloudWriteRoleLabelsRequest": { + "GoogleCloudGenerateRolesetKeyWithParametersRequest": { "type": "object", "properties": { - "add": { + "key_algorithm": { + "type": "string", + "description": "Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\"", + "default": "KEY_ALG_RSA_2048" + }, + "key_type": { + "type": "string", + "description": "Private key type for service account key - defaults to TYPE_GOOGLE_CREDENTIALS_FILE\"", + "default": "TYPE_GOOGLE_CREDENTIALS_FILE" + }, + "ttl": { + "type": "integer", + "description": "Lifetime of the service account key", + "format": "seconds" + } + } + }, + "GoogleCloudGenerateStaticAccountKeyWithParametersRequest": { + "type": "object", + "properties": { + "key_algorithm": { + "type": "string", + "description": "Private key algorithm for service account key. Defaults to KEY_ALG_RSA_2048.\"", + "default": "KEY_ALG_RSA_2048" + }, + "key_type": { + "type": "string", + "description": "Private key type for service account key. Defaults to TYPE_GOOGLE_CREDENTIALS_FILE.\"", + "default": "TYPE_GOOGLE_CREDENTIALS_FILE" + }, + "ttl": { + "type": "integer", + "description": "Lifetime of the service account key", + "format": "seconds" + } + } + }, + "GoogleCloudKmsConfigureKeyRequest": { + "type": "object", + "properties": { + "max_version": { + "type": "integer", + "description": "Maximum allowed crypto key version. If set to a positive value, key versions greater than the given value are not permitted to be used. If set to 0 or a negative value, there is no maximum key version." + }, + "min_version": { + "type": "integer", + "description": "Minimum allowed crypto key version. If set to a positive value, key versions less than the given value are not permitted to be used. If set to 0 or a negative value, there is no minimum key version. This value only affects encryption/re-encryption, not decryption. To restrict old values from being decrypted, increase this value and then perform a trim operation." + } + } + }, + "GoogleCloudKmsConfigureRequest": { + "type": "object", + "properties": { + "credentials": { + "type": "string", + "description": "The credentials to use for authenticating to Google Cloud. Leave this blank to use the Default Application Credentials or instance metadata authentication." + }, + "scopes": { "type": "array", - "description": "BoundLabels to add (in $key:$value)", + "description": "The list of full-URL scopes to request when authenticating. By default, this requests https://www.googleapis.com/auth/cloudkms.", "items": { "type": "string" } + } + } + }, + "GoogleCloudKmsDecryptRequest": { + "type": "object", + "properties": { + "additional_authenticated_data": { + "type": "string", + "description": "Optional data that was specified during encryption of this payload." }, - "remove": { + "ciphertext": { + "type": "string", + "description": "Ciphertext to decrypt as previously returned from an encrypt operation. This must be base64-encoded ciphertext as previously returned from an encrypt operation." + }, + "key_version": { + "type": "integer", + "description": "Integer version of the crypto key version to use for decryption. This is required for asymmetric keys. For symmetric keys, Cloud KMS will choose the correct version automatically." + } + } + }, + "GoogleCloudKmsEncryptRequest": { + "type": "object", + "properties": { + "additional_authenticated_data": { + "type": "string", + "description": "Optional base64-encoded data that, if specified, must also be provided to decrypt this payload." + }, + "key_version": { + "type": "integer", + "description": "Integer version of the crypto key version to use for encryption. If unspecified, this defaults to the latest active crypto key version." + }, + "plaintext": { + "type": "string", + "description": "Plaintext value to be encrypted. This can be a string or binary, but the size is limited. See the Google Cloud KMS documentation for information on size limitations by key types." + } + } + }, + "GoogleCloudKmsReencryptRequest": { + "type": "object", + "properties": { + "additional_authenticated_data": { + "type": "string", + "description": "Optional data that, if specified, must also be provided during decryption." + }, + "ciphertext": { + "type": "string", + "description": "Ciphertext to be re-encrypted to the latest key version. This must be ciphertext that Vault previously generated for this named key." + }, + "key_version": { + "type": "integer", + "description": "Integer version of the crypto key version to use for the new encryption. If unspecified, this defaults to the latest active crypto key version." + } + } + }, + "GoogleCloudKmsRegisterKeyRequest": { + "type": "object", + "properties": { + "crypto_key": { + "type": "string", + "description": "Full resource ID of the crypto key including the project, location, key ring, and crypto key like \"projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s\". This crypto key must already exist in Google Cloud KMS unless verify is set to \"false\"." + }, + "verify": { + "type": "boolean", + "description": "Verify that the given Google Cloud KMS crypto key exists and is accessible before creating the storage entry in Vault. Set this to \"false\" if the key will not exist at creation time.", + "default": true + } + } + }, + "GoogleCloudKmsSignRequest": { + "type": "object", + "properties": { + "digest": { + "type": "string", + "description": "Digest to sign. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required." + }, + "key_version": { + "type": "integer", + "description": "Integer version of the crypto key version to use for signing. This field is required." + } + } + }, + "GoogleCloudKmsVerifyRequest": { + "type": "object", + "properties": { + "digest": { + "type": "string", + "description": "Digest to verify. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required." + }, + "key_version": { + "type": "integer", + "description": "Integer version of the crypto key version to use for verification. This field is required." + }, + "signature": { + "type": "string", + "description": "Base64-encoded signature to use for verification. This field is required." + } + } + }, + "GoogleCloudKmsWriteKeyRequest": { + "type": "object", + "properties": { + "algorithm": { + "type": "string", + "description": "Algorithm to use for encryption, decryption, or signing. The value depends on the key purpose. The value cannot be changed after creation. For a key purpose of \"encrypt_decrypt\", the valid values are: - symmetric_encryption (default) For a key purpose of \"asymmetric_sign\", valid values are: - rsa_sign_pss_2048_sha256 - rsa_sign_pss_3072_sha256 - rsa_sign_pss_4096_sha256 - rsa_sign_pkcs1_2048_sha256 - rsa_sign_pkcs1_3072_sha256 - rsa_sign_pkcs1_4096_sha256 - ec_sign_p256_sha256 - ec_sign_p384_sha384 For a key purpose of \"asymmetric_decrypt\", valid values are: - rsa_decrypt_oaep_2048_sha256 - rsa_decrypt_oaep_3072_sha256 - rsa_decrypt_oaep_4096_sha256" + }, + "crypto_key": { + "type": "string", + "description": "Name of the crypto key to use. If the given crypto key does not exist, Vault will try to create it. This defaults to the name of the key given to Vault as the parameter if unspecified." + }, + "key_ring": { + "type": "string", + "description": "Full Google Cloud resource ID of the key ring with the project and location (e.g. projects/my-project/locations/global/keyRings/my-keyring). If the given key ring does not exist, Vault will try to create it during a create operation." + }, + "labels": { + "type": "object", + "description": "Arbitrary key=value label to apply to the crypto key. To specify multiple labels, specify this argument multiple times (e.g. labels=\"a=b\" labels=\"c=d\").", + "format": "kvpairs" + }, + "protection_level": { + "type": "string", + "description": "Level of protection to use for the key management. Valid values are \"software\" and \"hsm\". The default value is \"software\". The value cannot be changed after creation." + }, + "purpose": { + "type": "string", + "description": "Purpose of the key. Valid options are \"asymmetric_decrypt\", \"asymmetric_sign\", and \"encrypt_decrypt\". The default value is \"encrypt_decrypt\". The value cannot be changed after creation." + }, + "rotation_period": { + "type": "integer", + "description": "Amount of time between crypto key version rotations. This is specified as a time duration value like 72h (72 hours). The smallest possible value is 24h. This value only applies to keys with a purpose of \"encrypt_decrypt\".", + "format": "seconds" + } + } + }, + "GoogleCloudLogInRequest": { + "type": "object", + "properties": { + "jwt": { + "type": "string", + "description": "A signed JWT. This is either a self-signed service account JWT ('iam' roles only) or a GCE identity metadata token ('iam', 'gce' roles)." + }, + "role": { + "type": "string", + "description": "Name of the role against which the login is being attempted. Required." + } + } + }, + "GoogleCloudWriteImpersonatedAccountRequest": { + "type": "object", + "properties": { + "service_account_email": { + "type": "string", + "description": "Required. Email of the GCP service account to manage. Cannot be updated." + }, + "token_scopes": { "type": "array", - "description": "Label key values to remove", + "description": "List of OAuth scopes to assign to access tokens generated under this account.", "items": { "type": "string" } + }, + "ttl": { + "type": "integer", + "description": "Lifetime of the token for the impersonated account.", + "format": "seconds" } } }, @@ -28625,45 +29023,6 @@ } } }, - "GoogleCloudWriteRoleServiceAccountsRequest": { - "type": "object", - "properties": { - "add": { - "type": "array", - "description": "Service-account emails or IDs to add.", - "items": { - "type": "string" - } - }, - "remove": { - "type": "array", - "description": "Service-account emails or IDs to remove.", - "items": { - "type": "string" - } - } - } - }, - "GoogleCloudWriteRolesetKeyRequest": { - "type": "object", - "properties": { - "key_algorithm": { - "type": "string", - "description": "Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\"", - "default": "KEY_ALG_RSA_2048" - }, - "key_type": { - "type": "string", - "description": "Private key type for service account key - defaults to TYPE_GOOGLE_CREDENTIALS_FILE\"", - "default": "TYPE_GOOGLE_CREDENTIALS_FILE" - }, - "ttl": { - "type": "integer", - "description": "Lifetime of the service account key", - "format": "seconds" - } - } - }, "GoogleCloudWriteRolesetRequest": { "type": "object", "properties": { @@ -28689,26 +29048,6 @@ } } }, - "GoogleCloudWriteStaticAccountKeyRequest": { - "type": "object", - "properties": { - "key_algorithm": { - "type": "string", - "description": "Private key algorithm for service account key. Defaults to KEY_ALG_RSA_2048.\"", - "default": "KEY_ALG_RSA_2048" - }, - "key_type": { - "type": "string", - "description": "Private key type for service account key. Defaults to TYPE_GOOGLE_CREDENTIALS_FILE.\"", - "default": "TYPE_GOOGLE_CREDENTIALS_FILE" - }, - "ttl": { - "type": "integer", - "description": "Lifetime of the service account key", - "format": "seconds" - } - } - }, "GoogleCloudWriteStaticAccountRequest": { "type": "object", "properties": { @@ -28734,49 +29073,7 @@ } } }, - "GroupLookupRequest": { - "type": "object", - "properties": { - "alias_id": { - "type": "string", - "description": "ID of the alias." - }, - "alias_mount_accessor": { - "type": "string", - "description": "Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with 'alias_name'." - }, - "alias_name": { - "type": "string", - "description": "Name of the alias. This should be supplied in conjunction with 'alias_mount_accessor'." - }, - "id": { - "type": "string", - "description": "ID of the group." - }, - "name": { - "type": "string", - "description": "Name of the group." - } - } - }, - "GroupWriteAliasByIDRequest": { - "type": "object", - "properties": { - "canonical_id": { - "type": "string", - "description": "ID of the group to which this is an alias." - }, - "mount_accessor": { - "type": "string", - "description": "Mount accessor to which this alias belongs to." - }, - "name": { - "type": "string", - "description": "Alias of the group." - } - } - }, - "GroupWriteAliasRequest": { + "GroupCreateAliasRequest": { "type": "object", "properties": { "canonical_id": { @@ -28797,9 +29094,13 @@ } } }, - "GroupWriteByIDRequest": { + "GroupCreateRequest": { "type": "object", "properties": { + "id": { + "type": "string", + "description": "ID of the group. If set, updates the corresponding existing group." + }, "member_entity_ids": { "type": "array", "description": "Entity IDs to be assigned as group members.", @@ -28836,13 +29137,51 @@ } } }, - "GroupWriteByNameRequest": { + "GroupLookUpRequest": { "type": "object", "properties": { + "alias_id": { + "type": "string", + "description": "ID of the alias." + }, + "alias_mount_accessor": { + "type": "string", + "description": "Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with 'alias_name'." + }, + "alias_name": { + "type": "string", + "description": "Name of the alias. This should be supplied in conjunction with 'alias_mount_accessor'." + }, "id": { "type": "string", - "description": "ID of the group. If set, updates the corresponding existing group." + "description": "ID of the group." + }, + "name": { + "type": "string", + "description": "Name of the group." + } + } + }, + "GroupUpdateAliasByIdRequest": { + "type": "object", + "properties": { + "canonical_id": { + "type": "string", + "description": "ID of the group to which this is an alias." + }, + "mount_accessor": { + "type": "string", + "description": "Mount accessor to which this alias belongs to." }, + "name": { + "type": "string", + "description": "Alias of the group." + } + } + }, + "GroupUpdateByIdRequest": { + "type": "object", + "properties": { "member_entity_ids": { "type": "array", "description": "Entity IDs to be assigned as group members.", @@ -28862,6 +29201,10 @@ "description": "Metadata to be associated with the group. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", "format": "kvpairs" }, + "name": { + "type": "string", + "description": "Name of the group." + }, "policies": { "type": "array", "description": "Policies to be tied to the group.", @@ -28875,7 +29218,7 @@ } } }, - "GroupWriteRequest": { + "GroupUpdateByNameRequest": { "type": "object", "properties": { "id": { @@ -28901,10 +29244,6 @@ "description": "Metadata to be associated with the group. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", "format": "kvpairs" }, - "name": { - "type": "string", - "description": "Name of the group." - }, "policies": { "type": "array", "description": "Policies to be tied to the group.", @@ -28918,125 +29257,308 @@ } } }, - "JWTLoginRequest": { + "HaStatusResponse": { "type": "object", "properties": { - "jwt": { - "type": "string", - "description": "The signed JWT to validate." - }, - "role": { - "type": "string", - "description": "The role to log in against.", - "format": "lowercase" + "nodes": { + "type": "array", + "items": { + "type": "object" + } } } }, - "JWTWriteConfigRequest": { + "InitializeRequest": { "type": "object", "properties": { - "bound_issuer": { - "type": "string", - "description": "The value against which to match the 'iss' claim in a JWT. Optional." - }, - "default_role": { - "type": "string", - "description": "The default role to use if none is provided during login. If not set, a role is required during login.", - "format": "lowercase" - }, - "jwks_ca_pem": { - "type": "string", - "description": "The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used." - }, - "jwks_url": { - "type": "string", - "description": "JWKS URL to use to authenticate signatures. Cannot be used with \"oidc_discovery_url\" or \"jwt_validation_pubkeys\"." - }, - "jwt_supported_algs": { + "pgp_keys": { "type": "array", - "description": "A list of supported signing algorithms. Defaults to RS256.", + "description": "Specifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as `secret_shares`.", "items": { "type": "string" } }, - "jwt_validation_pubkeys": { + "recovery_pgp_keys": { "type": "array", - "description": "A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with \"jwks_url\" or \"oidc_discovery_url\".", + "description": "Specifies an array of PGP public keys used to encrypt the output recovery keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as `recovery_shares`.", "items": { "type": "string" } }, - "namespace_in_state": { - "type": "boolean", - "description": "Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs.", - "x-vault-displayAttrs": { - "name": "Namespace in OIDC state", - "value": true - } - }, - "oidc_client_id": { - "type": "string", - "description": "The OAuth Client ID configured with your OIDC provider." - }, - "oidc_client_secret": { - "type": "string", - "description": "The OAuth Client Secret configured with your OIDC provider.", - "x-vault-displayAttrs": { - "sensitive": true - } + "recovery_shares": { + "type": "integer", + "description": "Specifies the number of shares to split the recovery key into." }, - "oidc_discovery_ca_pem": { - "type": "string", - "description": "The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used." + "recovery_threshold": { + "type": "integer", + "description": "Specifies the number of shares required to reconstruct the recovery key. This must be less than or equal to `recovery_shares`." }, - "oidc_discovery_url": { + "root_token_pgp_key": { "type": "string", - "description": "OIDC Discovery URL, without any .well-known component (base path). Cannot be used with \"jwks_url\" or \"jwt_validation_pubkeys\"." + "description": "Specifies a PGP public key used to encrypt the initial root token. The key must be base64-encoded from its original binary representation." }, - "oidc_response_mode": { - "type": "string", - "description": "The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'." + "secret_shares": { + "type": "integer", + "description": "Specifies the number of shares to split the unseal key into." }, - "oidc_response_types": { - "type": "array", - "description": "The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'.", - "items": { - "type": "string" - } + "secret_threshold": { + "type": "integer", + "description": "Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as `secret_shares`." }, - "provider_config": { - "type": "object", - "description": "Provider-specific configuration. Optional.", - "format": "map", - "x-vault-displayAttrs": { - "name": "Provider Config" - } + "stored_shares": { + "type": "integer", + "description": "Specifies the number of shares that should be encrypted by the HSM and stored for auto-unsealing. Currently must be the same as `secret_shares`." } } }, - "JWTWriteOIDCAuthURLRequest": { + "InternalClientActivityConfigureRequest": { "type": "object", "properties": { - "client_nonce": { - "type": "string", - "description": "Optional client-provided nonce that must match during callback, if present." + "default_report_months": { + "type": "integer", + "description": "Number of months to report if no start date specified.", + "default": 12 }, - "redirect_uri": { + "enabled": { "type": "string", - "description": "The OAuth redirect_uri to use in the authorization URL." + "description": "Enable or disable collection of client count: enable, disable, or default.", + "default": "default" }, - "role": { - "type": "string", - "description": "The role to issue an OIDC authorization URL against.", - "format": "lowercase" + "retention_months": { + "type": "integer", + "description": "Number of months of client data to retain. Setting to 0 will clear all existing data.", + "default": 24 } } }, - "JWTWriteOIDCCallbackRequest": { + "InternalCountEntitiesResponse": { "type": "object", "properties": { - "client_nonce": { - "type": "string" + "counters": { + "type": "object", + "format": "map" + } + } + }, + "InternalCountTokensResponse": { + "type": "object", + "properties": { + "counters": { + "type": "object", + "format": "map" + } + } + }, + "InternalGenerateOpenApiDocument2Request": { + "type": "object", + "properties": { + "context": { + "type": "string", + "description": "Context string appended to every operationId" + } + } + }, + "InternalUiListEnabledFeatureFlagsResponse": { + "type": "object", + "properties": { + "feature_flags": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "InternalUiListEnabledVisibleMountsResponse": { + "type": "object", + "properties": { + "auth": { + "type": "object", + "description": "auth mounts", + "format": "map" + }, + "secret": { + "type": "object", + "description": "secret mounts", + "format": "map" + } + } + }, + "InternalUiListNamespacesResponse": { + "type": "object", + "properties": { + "keys": { + "type": "array", + "description": "field is only returned if there are one or more namespaces", + "items": { + "type": "string" + } + } + } + }, + "InternalUiReadMountInformationResponse": { + "type": "object", + "properties": { + "accessor": { + "type": "string" + }, + "config": { + "type": "object", + "format": "map" + }, + "description": { + "type": "string" + }, + "external_entropy_access": { + "type": "boolean" + }, + "local": { + "type": "boolean" + }, + "options": { + "type": "object", + "format": "map" + }, + "path": { + "type": "string" + }, + "plugin_version": { + "type": "string" + }, + "running_plugin_version": { + "type": "string" + }, + "running_sha256": { + "type": "string" + }, + "seal_wrap": { + "type": "boolean" + }, + "type": { + "type": "string" + }, + "uuid": { + "type": "string" + } + } + }, + "InternalUiReadResultantAclResponse": { + "type": "object", + "properties": { + "exact_paths": { + "type": "object", + "format": "map" + }, + "glob_paths": { + "type": "object", + "format": "map" + }, + "root": { + "type": "boolean" + } + } + }, + "JwtConfigureRequest": { + "type": "object", + "properties": { + "bound_issuer": { + "type": "string", + "description": "The value against which to match the 'iss' claim in a JWT. Optional." + }, + "default_role": { + "type": "string", + "description": "The default role to use if none is provided during login. If not set, a role is required during login.", + "format": "lowercase" + }, + "jwks_ca_pem": { + "type": "string", + "description": "The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used." + }, + "jwks_url": { + "type": "string", + "description": "JWKS URL to use to authenticate signatures. Cannot be used with \"oidc_discovery_url\" or \"jwt_validation_pubkeys\"." + }, + "jwt_supported_algs": { + "type": "array", + "description": "A list of supported signing algorithms. Defaults to RS256.", + "items": { + "type": "string" + } + }, + "jwt_validation_pubkeys": { + "type": "array", + "description": "A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with \"jwks_url\" or \"oidc_discovery_url\".", + "items": { + "type": "string" + } + }, + "namespace_in_state": { + "type": "boolean", + "description": "Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs.", + "x-vault-displayAttrs": { + "name": "Namespace in OIDC state", + "value": true + } + }, + "oidc_client_id": { + "type": "string", + "description": "The OAuth Client ID configured with your OIDC provider." + }, + "oidc_client_secret": { + "type": "string", + "description": "The OAuth Client Secret configured with your OIDC provider.", + "x-vault-displayAttrs": { + "sensitive": true + } + }, + "oidc_discovery_ca_pem": { + "type": "string", + "description": "The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used." + }, + "oidc_discovery_url": { + "type": "string", + "description": "OIDC Discovery URL, without any .well-known component (base path). Cannot be used with \"jwks_url\" or \"jwt_validation_pubkeys\"." + }, + "oidc_response_mode": { + "type": "string", + "description": "The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'." + }, + "oidc_response_types": { + "type": "array", + "description": "The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'.", + "items": { + "type": "string" + } + }, + "provider_config": { + "type": "object", + "description": "Provider-specific configuration. Optional.", + "format": "map", + "x-vault-displayAttrs": { + "name": "Provider Config" + } + } + } + }, + "JwtLogInRequest": { + "type": "object", + "properties": { + "jwt": { + "type": "string", + "description": "The signed JWT to validate." + }, + "role": { + "type": "string", + "description": "The role to log in against.", + "format": "lowercase" + } + } + }, + "JwtOidcCallbackWithParametersRequest": { + "type": "object", + "properties": { + "client_nonce": { + "type": "string" }, "code": { "type": "string" @@ -29049,7 +29571,25 @@ } } }, - "JWTWriteRoleRequest": { + "JwtOidcRequestAuthorizationUrlRequest": { + "type": "object", + "properties": { + "client_nonce": { + "type": "string", + "description": "Optional client-provided nonce that must match during callback, if present." + }, + "redirect_uri": { + "type": "string", + "description": "The OAuth redirect_uri to use in the authorization URL." + }, + "role": { + "type": "string", + "description": "The role to issue an OIDC authorization URL against.", + "format": "lowercase" + } + } + }, + "JwtWriteRoleRequest": { "type": "object", "properties": { "allowed_redirect_uris": { @@ -29259,148 +29799,7 @@ } } }, - "KVv2DeleteVersionsRequest": { - "type": "object", - "properties": { - "versions": { - "type": "array", - "description": "The versions to be archived. The versioned data will not be deleted, but it will no longer be returned in normal get requests.", - "items": { - "type": "integer" - } - } - } - }, - "KVv2DestroyVersionsRequest": { - "type": "object", - "properties": { - "versions": { - "type": "array", - "description": "The versions to destroy. Their data will be permanently deleted.", - "items": { - "type": "integer" - } - } - } - }, - "KVv2UndeleteVersionsRequest": { - "type": "object", - "properties": { - "versions": { - "type": "array", - "description": "The versions to unarchive. The versions will be restored and their data will be returned on normal get requests.", - "items": { - "type": "integer" - } - } - } - }, - "KVv2WriteConfigRequest": { - "type": "object", - "properties": { - "cas_required": { - "type": "boolean", - "description": "If true, the backend will require the cas parameter to be set for each write" - }, - "delete_version_after": { - "type": "integer", - "description": "If set, the length of time before a version is deleted. A negative duration disables the use of delete_version_after on all keys. A zero duration clears the current setting. Accepts a Go duration format string.", - "format": "seconds" - }, - "max_versions": { - "type": "integer", - "description": "The number of versions to keep for each key. Defaults to 10" - } - } - }, - "KVv2WriteMetadataRequest": { - "type": "object", - "properties": { - "cas_required": { - "type": "boolean", - "description": "If true the key will require the cas parameter to be set on all write requests. If false, the backend’s configuration will be used." - }, - "custom_metadata": { - "type": "object", - "description": "User-provided key-value pairs that are used to describe arbitrary and version-agnostic information about a secret.", - "format": "map" - }, - "delete_version_after": { - "type": "integer", - "description": "The length of time before a version is deleted. If not set, the backend's configured delete_version_after is used. Cannot be greater than the backend's delete_version_after. A zero duration clears the current setting. A negative duration will cause an error.", - "format": "seconds" - }, - "max_versions": { - "type": "integer", - "description": "The number of versions to keep. If not set, the backend’s configured max version is used." - } - } - }, - "KVv2WriteRequest": { - "type": "object", - "properties": { - "data": { - "type": "object", - "description": "The contents of the data map will be stored and returned on read.", - "format": "map" - }, - "options": { - "type": "object", - "description": "Options for writing a KV entry. Set the \"cas\" value to use a Check-And-Set operation. If not set the write will be allowed. If set to 0 a write will only be allowed if the key doesn’t exist. If the index is non-zero the write will only be allowed if the key’s current version matches the version specified in the cas parameter.", - "format": "map" - }, - "version": { - "type": "integer", - "description": "If provided during a read, the value at the version number will be returned" - } - } - }, - "KerberosLoginRequest": { - "type": "object", - "properties": { - "authorization": { - "type": "string", - "description": "SPNEGO Authorization header. Required." - } - } - }, - "KerberosWriteConfigRequest": { - "type": "object", - "properties": { - "add_group_aliases": { - "type": "boolean", - "description": "If set to true, returns any groups found in LDAP as a group alias." - }, - "keytab": { - "type": "string", - "description": "Base64 encoded keytab", - "x-vault-displayAttrs": { - "sensitive": true - } - }, - "remove_instance_name": { - "type": "boolean", - "description": "Remove instance/FQDN from keytab principal names." - }, - "service_account": { - "type": "string", - "description": "Service Account" - } - } - }, - "KerberosWriteGroupRequest": { - "type": "object", - "properties": { - "policies": { - "type": "array", - "description": "Comma-separated list of policies associated to the group.", - "items": { - "type": "string" - } - } - } - }, - "KerberosWriteLDAPConfigRequest": { + "KerberosConfigureLdapRequest": { "type": "object", "properties": { "anonymous_group_search": { @@ -29458,6 +29857,17 @@ "description": "Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true", "default": true }, + "dereference_aliases": { + "type": "string", + "description": "When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'.", + "enum": [ + "never", + "finding", + "searching", + "always" + ], + "default": "never" + }, "discoverdn": { "type": "boolean", "description": "Use anonymous bind to discover the bind DN of a user (optional)", @@ -29675,20 +30085,52 @@ } } }, - "KubernetesLoginRequest": { + "KerberosConfigureRequest": { "type": "object", "properties": { - "jwt": { + "add_group_aliases": { + "type": "boolean", + "description": "If set to true, returns any groups found in LDAP as a group alias." + }, + "keytab": { "type": "string", - "description": "A signed JWT for authenticating a service account. This field is required." + "description": "Base64 encoded keytab", + "x-vault-displayAttrs": { + "sensitive": true + } }, - "role": { + "remove_instance_name": { + "type": "boolean", + "description": "Remove instance/FQDN from keytab principal names." + }, + "service_account": { "type": "string", - "description": "Name of the role against which the login is being attempted. This field is required" + "description": "Service Account" + } + } + }, + "KerberosLogInRequest": { + "type": "object", + "properties": { + "authorization": { + "type": "string", + "description": "SPNEGO Authorization header. Required." + } + } + }, + "KerberosWriteGroupRequest": { + "type": "object", + "properties": { + "policies": { + "type": "array", + "description": "Comma-separated list of policies associated to the group.", + "items": { + "type": "string" + } } } }, - "KubernetesWriteAuthConfigRequest": { + "KubernetesConfigureAuthRequest": { "type": "object", "properties": { "disable_iss_validation": { @@ -29746,6 +30188,81 @@ } } }, + "KubernetesConfigureRequest": { + "type": "object", + "properties": { + "disable_local_ca_jwt": { + "type": "boolean", + "description": "Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod.", + "default": false, + "x-vault-displayAttrs": { + "name": "Disable use of local CA and service account JWT" + } + }, + "kubernetes_ca_cert": { + "type": "string", + "description": "PEM encoded CA certificate to use to verify the Kubernetes API server certificate. Defaults to the local pod's CA if found.", + "x-vault-displayAttrs": { + "name": "Kubernetes CA Certificate" + } + }, + "kubernetes_host": { + "type": "string", + "description": "Kubernetes API URL to connect to. Defaults to https://$KUBERNETES_SERVICE_HOST:KUBERNETES_SERVICE_PORT if those environment variables are set.", + "x-vault-displayAttrs": { + "name": "Kubernetes API URL" + } + }, + "service_account_jwt": { + "type": "string", + "description": "The JSON web token of the service account used by the secret engine to manage Kubernetes credentials. Defaults to the local pod's JWT if found.", + "x-vault-displayAttrs": { + "name": "Kubernetes API JWT" + } + } + } + }, + "KubernetesGenerateCredentialsRequest": { + "type": "object", + "properties": { + "audiences": { + "type": "array", + "description": "The intended audiences of the generated credentials", + "items": { + "type": "string" + } + }, + "cluster_role_binding": { + "type": "boolean", + "description": "If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. Requires the Vault role to have kubernetes_role_type set to ClusterRole." + }, + "kubernetes_namespace": { + "type": "string", + "description": "The name of the Kubernetes namespace in which to generate the credentials" + }, + "ttl": { + "type": "integer", + "description": "The TTL of the generated credentials", + "format": "seconds" + } + }, + "required": [ + "kubernetes_namespace" + ] + }, + "KubernetesLogInRequest": { + "type": "object", + "properties": { + "jwt": { + "type": "string", + "description": "A signed JWT for authenticating a service account. This field is required." + }, + "role": { + "type": "string", + "description": "Name of the role against which the login is being attempted. This field is required" + } + } + }, "KubernetesWriteAuthRoleRequest": { "type": "object", "properties": { @@ -29896,162 +30413,300 @@ } } }, - "KubernetesWriteConfigRequest": { + "KubernetesWriteRoleRequest": { "type": "object", "properties": { - "disable_local_ca_jwt": { - "type": "boolean", - "description": "Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod.", - "default": false, - "x-vault-displayAttrs": { - "name": "Disable use of local CA and service account JWT" + "allowed_kubernetes_namespace_selector": { + "type": "string", + "description": "A label selector for Kubernetes namespaces in which credentials can be generated. Accepts either a JSON or YAML object. If set with allowed_kubernetes_namespaces, the conditions are conjuncted." + }, + "allowed_kubernetes_namespaces": { + "type": "array", + "description": "A list of the Kubernetes namespaces in which credentials can be generated. If set to \"*\" all namespaces are allowed.", + "items": { + "type": "string" } }, - "kubernetes_ca_cert": { + "extra_annotations": { + "type": "object", + "description": "Additional annotations to apply to all generated Kubernetes objects.", + "format": "kvpairs" + }, + "extra_labels": { + "type": "object", + "description": "Additional labels to apply to all generated Kubernetes objects.", + "format": "kvpairs" + }, + "generated_role_rules": { "type": "string", - "description": "PEM encoded CA certificate to use to verify the Kubernetes API server certificate. Defaults to the local pod's CA if found.", - "x-vault-displayAttrs": { - "name": "Kubernetes CA Certificate" - } + "description": "The Role or ClusterRole rules to use when generating a role. Accepts either a JSON or YAML object. If set, the entire chain of Kubernetes objects will be generated." }, - "kubernetes_host": { + "kubernetes_role_name": { "type": "string", - "description": "Kubernetes API URL to connect to. Defaults to https://$KUBERNETES_SERVICE_HOST:KUBERNETES_SERVICE_PORT if those environment variables are set.", - "x-vault-displayAttrs": { - "name": "Kubernetes API URL" - } + "description": "The pre-existing Role or ClusterRole to bind a generated service account to. If set, Kubernetes token, service account, and role binding objects will be created." }, - "service_account_jwt": { + "kubernetes_role_type": { "type": "string", - "description": "The JSON web token of the service account used by the secret engine to manage Kubernetes credentials. Defaults to the local pod's JWT if found.", - "x-vault-displayAttrs": { - "name": "Kubernetes API JWT" - } - } + "description": "Specifies whether the Kubernetes role is a Role or ClusterRole.", + "default": "Role" + }, + "name_template": { + "type": "string", + "description": "The name template to use when generating service accounts, roles and role bindings. If unset, a default template is used." + }, + "service_account_name": { + "type": "string", + "description": "The pre-existing service account to generate tokens for. Mutually exclusive with all role parameters. If set, only a Kubernetes service account token will be created." + }, + "token_default_audiences": { + "type": "array", + "description": "The default audiences for generated Kubernetes service account tokens. If not set or set to \"\", will use k8s cluster default.", + "items": { + "type": "string" + } + }, + "token_default_ttl": { + "type": "integer", + "description": "The default ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default.", + "format": "seconds" + }, + "token_max_ttl": { + "type": "integer", + "description": "The maximum ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default.", + "format": "seconds" + } } }, - "KubernetesWriteCredentialsRequest": { + "KvV2ConfigureRequest": { "type": "object", "properties": { - "cluster_role_binding": { + "cas_required": { "type": "boolean", - "description": "If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. Requires the Vault role to have kubernetes_role_type set to ClusterRole." - }, - "kubernetes_namespace": { - "type": "string", - "description": "The name of the Kubernetes namespace in which to generate the credentials" + "description": "If true, the backend will require the cas parameter to be set for each write" }, - "ttl": { + "delete_version_after": { "type": "integer", - "description": "The TTL of the generated credentials", + "description": "If set, the length of time before a version is deleted. A negative duration disables the use of delete_version_after on all keys. A zero duration clears the current setting. Accepts a Go duration format string.", "format": "seconds" + }, + "max_versions": { + "type": "integer", + "description": "The number of versions to keep for each key. Defaults to 10" } - }, - "required": [ - "kubernetes_namespace" - ] + } }, - "KubernetesWriteRoleRequest": { + "KvV2DeleteVersionsRequest": { "type": "object", "properties": { - "allowed_kubernetes_namespace_selector": { - "type": "string", - "description": "A label selector for Kubernetes namespaces in which credentials can be generated. Accepts either a JSON or YAML object. If set with allowed_kubernetes_namespaces, the conditions are conjuncted." - }, - "allowed_kubernetes_namespaces": { + "versions": { "type": "array", - "description": "A list of the Kubernetes namespaces in which credentials can be generated. If set to \"*\" all namespaces are allowed.", + "description": "The versions to be archived. The versioned data will not be deleted, but it will no longer be returned in normal get requests.", "items": { - "type": "string" + "type": "integer" + } + } + } + }, + "KvV2DestroyVersionsRequest": { + "type": "object", + "properties": { + "versions": { + "type": "array", + "description": "The versions to destroy. Their data will be permanently deleted.", + "items": { + "type": "integer" } + } + } + }, + "KvV2PatchResponse": { + "type": "object", + "properties": { + "created_time": { + "type": "string", + "format": "date-time" }, - "extra_annotations": { + "custom_metadata": { "type": "object", - "description": "Additional annotations to apply to all generated Kubernetes objects.", - "format": "kvpairs" + "format": "map" }, - "extra_labels": { - "type": "object", - "description": "Additional labels to apply to all generated Kubernetes objects.", - "format": "kvpairs" + "deletion_time": { + "type": "string" }, - "generated_role_rules": { - "type": "string", - "description": "The Role or ClusterRole rules to use when generating a role. Accepts either a JSON or YAML object. If set, the entire chain of Kubernetes objects will be generated." + "destroyed": { + "type": "boolean" }, - "kubernetes_role_name": { - "type": "string", - "description": "The pre-existing Role or ClusterRole to bind a generated service account to. If set, Kubernetes token, service account, and role binding objects will be created." + "version": { + "type": "integer", + "format": "int64" + } + } + }, + "KvV2ReadConfigurationResponse": { + "type": "object", + "properties": { + "cas_required": { + "type": "boolean", + "description": "If true, the backend will require the cas parameter to be set for each write" }, - "kubernetes_role_type": { - "type": "string", - "description": "Specifies whether the Kubernetes role is a Role or ClusterRole.", - "default": "Role" + "delete_version_after": { + "type": "integer", + "description": "The length of time before a version is deleted.", + "format": "seconds" }, - "name_template": { - "type": "string", - "description": "The name template to use when generating service accounts, roles and role bindings. If unset, a default template is used." + "max_versions": { + "type": "integer", + "description": "The number of versions to keep for each key." + } + } + }, + "KvV2ReadMetadataResponse": { + "type": "object", + "properties": { + "cas_required": { + "type": "boolean" }, - "service_account_name": { + "created_time": { "type": "string", - "description": "The pre-existing service account to generate tokens for. Mutually exclusive with all role parameters. If set, only a Kubernetes service account token will be created." + "format": "date-time" }, - "token_default_ttl": { + "current_version": { "type": "integer", - "description": "The default ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default.", - "format": "seconds" + "format": "int64" }, - "token_max_ttl": { + "custom_metadata": { + "type": "object", + "description": "User-provided key-value pairs that are used to describe arbitrary and version-agnostic information about a secret.", + "format": "map" + }, + "delete_version_after": { "type": "integer", - "description": "The maximum ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default.", + "description": "The length of time before a version is deleted.", "format": "seconds" + }, + "max_versions": { + "type": "integer", + "description": "The number of versions to keep", + "format": "int64" + }, + "oldest_version": { + "type": "integer", + "format": "int64" + }, + "updated_time": { + "type": "string", + "format": "date-time" + }, + "versions": { + "type": "object", + "format": "map" } } }, - "LDAPCheckInLibraryRequest": { + "KvV2ReadResponse": { "type": "object", "properties": { - "service_account_names": { - "type": "array", - "description": "The username/logon name for the service accounts to check in.", - "items": { - "type": "string" - } + "data": { + "type": "object", + "format": "map" + }, + "metadata": { + "type": "object", + "format": "map" } } }, - "LDAPCheckInManageLibraryRequest": { + "KvV2ReadSubkeysResponse": { "type": "object", "properties": { - "service_account_names": { + "metadata": { + "type": "object", + "format": "map" + }, + "subkeys": { + "type": "object", + "format": "map" + } + } + }, + "KvV2UndeleteVersionsRequest": { + "type": "object", + "properties": { + "versions": { "type": "array", - "description": "The username/logon name for the service accounts to check in.", + "description": "The versions to unarchive. The versions will be restored and their data will be returned on normal get requests.", "items": { - "type": "string" + "type": "integer" } } } }, - "LDAPCheckOutLibraryRequest": { + "KvV2WriteMetadataRequest": { "type": "object", "properties": { - "ttl": { + "cas_required": { + "type": "boolean", + "description": "If true the key will require the cas parameter to be set on all write requests. If false, the backend’s configuration will be used." + }, + "custom_metadata": { + "type": "object", + "description": "User-provided key-value pairs that are used to describe arbitrary and version-agnostic information about a secret.", + "format": "map" + }, + "delete_version_after": { "type": "integer", - "description": "The length of time before the check-out will expire, in seconds.", + "description": "The length of time before a version is deleted. If not set, the backend's configured delete_version_after is used. Cannot be greater than the backend's delete_version_after. A zero duration clears the current setting. A negative duration will cause an error.", "format": "seconds" + }, + "max_versions": { + "type": "integer", + "description": "The number of versions to keep. If not set, the backend’s configured max version is used." } } }, - "LDAPLoginRequest": { + "KvV2WriteRequest": { "type": "object", "properties": { - "password": { + "data": { + "type": "object", + "description": "The contents of the data map will be stored and returned on read.", + "format": "map" + }, + "options": { + "type": "object", + "description": "Options for writing a KV entry. Set the \"cas\" value to use a Check-And-Set operation. If not set the write will be allowed. If set to 0 a write will only be allowed if the key doesn’t exist. If the index is non-zero the write will only be allowed if the key’s current version matches the version specified in the cas parameter.", + "format": "map" + }, + "version": { + "type": "integer", + "description": "If provided during a read, the value at the version number will be returned" + } + } + }, + "KvV2WriteResponse": { + "type": "object", + "properties": { + "created_time": { "type": "string", - "description": "Password for this user." + "format": "date-time" + }, + "custom_metadata": { + "type": "object", + "format": "map" + }, + "deletion_time": { + "type": "string" + }, + "destroyed": { + "type": "boolean" + }, + "version": { + "type": "integer", + "format": "int64" } } }, - "LDAPWriteAuthConfigRequest": { + "LdapConfigureAuthRequest": { "type": "object", "properties": { "anonymous_group_search": { @@ -30104,11 +30759,28 @@ "editType": "file" } }, + "connection_timeout": { + "type": "integer", + "description": "Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration.", + "format": "seconds", + "default": "30s" + }, "deny_null_bind": { "type": "boolean", "description": "Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true", "default": true }, + "dereference_aliases": { + "type": "string", + "description": "When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'.", + "enum": [ + "never", + "finding", + "searching", + "always" + ], + "default": "never" + }, "discoverdn": { "type": "boolean", "description": "Use anonymous bind to discover the bind DN of a user (optional)", @@ -30326,7 +30998,7 @@ } } }, - "LDAPWriteConfigRequest": { + "LdapConfigureRequest": { "type": "object", "properties": { "anonymous_group_search": { @@ -30384,6 +31056,17 @@ "description": "Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true", "default": true }, + "dereference_aliases": { + "type": "string", + "description": "When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'.", + "enum": [ + "never", + "finding", + "searching", + "always" + ], + "default": "never" + }, "discoverdn": { "type": "boolean", "description": "Use anonymous bind to discover the bind DN of a user (optional)", @@ -30542,19 +31225,29 @@ } } }, - "LDAPWriteGroupRequest": { + "LdapLibraryCheckInRequest": { "type": "object", "properties": { - "policies": { + "service_account_names": { "type": "array", - "description": "Comma-separated list of policies associated to the group.", + "description": "The username/logon name for the service accounts to check in.", "items": { "type": "string" } } } }, - "LDAPWriteLibraryRequest": { + "LdapLibraryCheckOutRequest": { + "type": "object", + "properties": { + "ttl": { + "type": "integer", + "description": "The length of time before the check-out will expire, in seconds.", + "format": "seconds" + } + } + }, + "LdapLibraryConfigureRequest": { "type": "object", "properties": { "disable_check_in_enforcement": { @@ -30583,7 +31276,28 @@ } } }, - "LDAPWriteRoleRequest": { + "LdapLibraryForceCheckInRequest": { + "type": "object", + "properties": { + "service_account_names": { + "type": "array", + "description": "The username/logon name for the service accounts to check in.", + "items": { + "type": "string" + } + } + } + }, + "LdapLogInRequest": { + "type": "object", + "properties": { + "password": { + "type": "string", + "description": "Password for this user." + } + } + }, + "LdapWriteDynamicRoleRequest": { "type": "object", "properties": { "creation_ldif": { @@ -30618,7 +31332,19 @@ "deletion_ldif" ] }, - "LDAPWriteStaticRoleRequest": { + "LdapWriteGroupRequest": { + "type": "object", + "properties": { + "policies": { + "type": "array", + "description": "Comma-separated list of policies associated to the group.", + "items": { + "type": "string" + } + } + } + }, + "LdapWriteStaticRoleRequest": { "type": "object", "properties": { "dn": { @@ -30636,7 +31362,7 @@ } } }, - "LDAPWriteUserRequest": { + "LdapWriteUserRequest": { "type": "object", "properties": { "groups": { @@ -30655,29 +31381,309 @@ } } }, - "MFAMethodAdminDestroyTOTPRequest": { + "LeaderStatusResponse": { "type": "object", "properties": { - "entity_id": { + "active_time": { "type": "string", - "description": "Identifier of the entity from which the MFA method secret needs to be removed." + "format": "date-time" }, - "method_id": { + "ha_enabled": { + "type": "boolean" + }, + "is_self": { + "type": "boolean" + }, + "last_wal": { + "type": "integer", + "format": "int64" + }, + "leader_address": { + "type": "string" + }, + "leader_cluster_address": { + "type": "string" + }, + "performance_standby": { + "type": "boolean" + }, + "performance_standby_last_remote_wal": { + "type": "integer", + "format": "int64" + }, + "raft_applied_index": { + "type": "integer", + "format": "int64" + }, + "raft_committed_index": { + "type": "integer", + "format": "int64" + } + } + }, + "LeasesCountResponse": { + "type": "object", + "properties": { + "counts": { + "type": "integer", + "description": "Number of matching leases per mount" + }, + "lease_count": { + "type": "integer", + "description": "Number of matching leases" + } + } + }, + "LeasesListResponse": { + "type": "object", + "properties": { + "counts": { + "type": "integer", + "description": "Number of matching leases per mount" + }, + "lease_count": { + "type": "integer", + "description": "Number of matching leases" + } + } + }, + "LeasesLookUpResponse": { + "type": "object", + "properties": { + "keys": { + "type": "array", + "description": "A list of lease ids", + "items": { + "type": "string" + } + } + } + }, + "LeasesLookUpWithPrefixResponse": { + "type": "object", + "properties": { + "keys": { + "type": "array", + "description": "A list of lease ids", + "items": { + "type": "string" + } + } + } + }, + "LeasesReadLeaseRequest": { + "type": "object", + "properties": { + "lease_id": { "type": "string", - "description": "The unique identifier for this MFA method." + "description": "The lease identifier to renew. This is included with a lease." } - }, - "required": [ - "method_id", - "entity_id" - ] + } + }, + "LeasesReadLeaseResponse": { + "type": "object", + "properties": { + "expire_time": { + "type": "string", + "description": "Optional lease expiry time", + "format": "date-time" + }, + "id": { + "type": "string", + "description": "Lease id" + }, + "issue_time": { + "type": "string", + "description": "Timestamp for the lease's issue time", + "format": "date-time" + }, + "last_renewal": { + "type": "string", + "description": "Optional Timestamp of the last time the lease was renewed", + "format": "date-time" + }, + "renewable": { + "type": "boolean", + "description": "True if the lease is able to be renewed" + }, + "ttl": { + "type": "integer", + "description": "Time to Live set for the lease, returns 0 if unset" + } + } + }, + "LeasesRenewLease2Request": { + "type": "object", + "properties": { + "increment": { + "type": "integer", + "description": "The desired increment in seconds to the lease", + "format": "seconds" + }, + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + }, + "url_lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + } + } + }, + "LeasesRenewLeaseRequest": { + "type": "object", + "properties": { + "increment": { + "type": "integer", + "description": "The desired increment in seconds to the lease", + "format": "seconds" + }, + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + }, + "url_lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + } + } + }, + "LeasesRenewLeaseWithId2Request": { + "type": "object", + "properties": { + "increment": { + "type": "integer", + "description": "The desired increment in seconds to the lease", + "format": "seconds" + }, + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + } + } + }, + "LeasesRenewLeaseWithIdRequest": { + "type": "object", + "properties": { + "increment": { + "type": "integer", + "description": "The desired increment in seconds to the lease", + "format": "seconds" + }, + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + } + } + }, + "LeasesRevokeLease2Request": { + "type": "object", + "properties": { + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + }, + "sync": { + "type": "boolean", + "description": "Whether or not to perform the revocation synchronously", + "default": true + }, + "url_lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + } + } + }, + "LeasesRevokeLeaseRequest": { + "type": "object", + "properties": { + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + }, + "sync": { + "type": "boolean", + "description": "Whether or not to perform the revocation synchronously", + "default": true + }, + "url_lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + } + } + }, + "LeasesRevokeLeaseWithId2Request": { + "type": "object", + "properties": { + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + }, + "sync": { + "type": "boolean", + "description": "Whether or not to perform the revocation synchronously", + "default": true + } + } + }, + "LeasesRevokeLeaseWithIdRequest": { + "type": "object", + "properties": { + "lease_id": { + "type": "string", + "description": "The lease identifier to renew. This is included with a lease." + }, + "sync": { + "type": "boolean", + "description": "Whether or not to perform the revocation synchronously", + "default": true + } + } + }, + "LeasesRevokeLeaseWithPrefix2Request": { + "type": "object", + "properties": { + "sync": { + "type": "boolean", + "description": "Whether or not to perform the revocation synchronously", + "default": true + } + } + }, + "LeasesRevokeLeaseWithPrefixRequest": { + "type": "object", + "properties": { + "sync": { + "type": "boolean", + "description": "Whether or not to perform the revocation synchronously", + "default": true + } + } + }, + "LoggersUpdateVerbosityLevelForRequest": { + "type": "object", + "properties": { + "level": { + "type": "string", + "description": "Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\"." + } + } + }, + "LoggersUpdateVerbosityLevelRequest": { + "type": "object", + "properties": { + "level": { + "type": "string", + "description": "Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\"." + } + } }, - "MFAMethodAdminGenerateTOTPRequest": { + "MfaAdminDestroyTotpSecretRequest": { "type": "object", "properties": { "entity_id": { "type": "string", - "description": "Entity ID on which the generated secret needs to get stored." + "description": "Identifier of the entity from which the MFA method secret needs to be removed." }, "method_id": { "type": "string", @@ -30689,19 +31695,24 @@ "entity_id" ] }, - "MFAMethodGenerateTOTPRequest": { + "MfaAdminGenerateTotpSecretRequest": { "type": "object", "properties": { + "entity_id": { + "type": "string", + "description": "Entity ID on which the generated secret needs to get stored." + }, "method_id": { "type": "string", "description": "The unique identifier for this MFA method." } }, "required": [ - "method_id" + "method_id", + "entity_id" ] }, - "MFAMethodWriteDuoRequest": { + "MfaConfigureDuoMethodRequest": { "type": "object", "properties": { "api_hostname": { @@ -30712,9 +31723,9 @@ "type": "string", "description": "Integration key for Duo." }, - "method_id": { + "method_name": { "type": "string", - "description": "The unique identifier for this MFA method." + "description": "The unique name identifier for this MFA method." }, "push_info": { "type": "string", @@ -30734,7 +31745,7 @@ } } }, - "MFAMethodWriteOktaRequest": { + "MfaConfigureOktaMethodRequest": { "type": "object", "properties": { "api_token": { @@ -30745,9 +31756,9 @@ "type": "string", "description": "The base domain to use for the Okta API. When not specified in the configuration, \"okta.com\" is used." }, - "method_id": { + "method_name": { "type": "string", - "description": "The unique identifier for this MFA method." + "description": "The unique name identifier for this MFA method." }, "org_name": { "type": "string", @@ -30767,12 +31778,12 @@ } } }, - "MFAMethodWritePingIDRequest": { + "MfaConfigurePingIdMethodRequest": { "type": "object", "properties": { - "method_id": { + "method_name": { "type": "string", - "description": "The unique identifier for this MFA method." + "description": "The unique name identifier for this MFA method." }, "settings_file_base64": { "type": "string", @@ -30784,7 +31795,7 @@ } } }, - "MFAMethodWriteTOTPRequest": { + "MfaConfigureTotpMethodRequest": { "type": "object", "properties": { "algorithm": { @@ -30810,9 +31821,9 @@ "type": "integer", "description": "Max number of allowed validation attempts." }, - "method_id": { + "method_name": { "type": "string", - "description": "The unique identifier for this MFA method." + "description": "The unique name identifier for this MFA method." }, "period": { "type": "integer", @@ -30832,7 +31843,19 @@ } } }, - "MFAValidateRequest": { + "MfaGenerateTotpSecretRequest": { + "type": "object", + "properties": { + "method_id": { + "type": "string", + "description": "The unique identifier for this MFA method." + } + }, + "required": [ + "method_id" + ] + }, + "MfaValidateRequest": { "type": "object", "properties": { "mfa_payload": { @@ -30850,7 +31873,7 @@ "mfa_payload" ] }, - "MFAWriteLoginEnforcementRequest": { + "MfaWriteLoginEnforcementRequest": { "type": "object", "properties": { "auth_method_accessors": { @@ -30893,7 +31916,7 @@ "mfa_method_ids" ] }, - "MongoDBAtlasWriteConfigRequest": { + "MongoDbAtlasConfigureRequest": { "type": "object", "properties": { "private_key": { @@ -30913,7 +31936,7 @@ "private_key" ] }, - "MongoDBAtlasWriteRoleRequest": { + "MongoDbAtlasWriteRoleRequest": { "type": "object", "properties": { "cidr_blocks": { @@ -30967,428 +31990,357 @@ "roles" ] }, - "NomadWriteAccessConfigRequest": { + "MountsEnableSecretsEngineRequest": { "type": "object", "properties": { - "address": { - "type": "string", - "description": "Nomad server address" + "config": { + "type": "object", + "description": "Configuration for this mount, such as default_lease_ttl and max_lease_ttl.", + "format": "map" }, - "ca_cert": { + "description": { "type": "string", - "description": "CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded." + "description": "User-friendly description for this mount." }, - "client_cert": { + "external_entropy_access": { + "type": "boolean", + "description": "Whether to give the mount access to Vault's external entropy.", + "default": false + }, + "local": { + "type": "boolean", + "description": "Mark the mount as a local mount, which is not replicated and is unaffected by replication.", + "default": false + }, + "options": { + "type": "object", + "description": "The options to pass into the backend. Should be a json object with string keys and values.", + "format": "kvpairs" + }, + "plugin_name": { "type": "string", - "description": "Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key." + "description": "Name of the plugin to mount based from the name registered in the plugin catalog." }, - "client_key": { + "plugin_version": { "type": "string", - "description": "Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert." + "description": "The semantic version of the plugin to use." }, - "max_token_name_length": { - "type": "integer", - "description": "Max length for name of generated Nomad tokens" + "seal_wrap": { + "type": "boolean", + "description": "Whether to turn on seal wrapping for the mount.", + "default": false }, - "token": { + "type": { "type": "string", - "description": "Token for API calls" + "description": "The type of the backend. Example: \"passthrough\"" } } }, - "NomadWriteLeaseConfigRequest": { + "MountsReadConfigurationResponse": { "type": "object", "properties": { - "max_ttl": { - "type": "integer", - "description": "Duration after which the issued token should not be allowed to be renewed", - "format": "seconds" + "accessor": { + "type": "string" }, - "ttl": { - "type": "integer", - "description": "Duration before which the issued token needs renewal", - "format": "seconds" - } - } - }, - "NomadWriteRoleRequest": { - "type": "object", - "properties": { - "global": { - "type": "boolean", - "description": "Boolean value describing if the token should be global or not. Defaults to false." + "config": { + "type": "object", + "description": "Configuration for this mount, such as default_lease_ttl and max_lease_ttl.", + "format": "map" }, - "policies": { - "type": "array", - "description": "Comma-separated string or list of policies as previously created in Nomad. Required for 'client' token.", - "items": { - "type": "string" - } + "deprecation_status": { + "type": "string" }, - "type": { + "description": { "type": "string", - "description": "Which type of token to create: 'client' or 'management'. If a 'management' token, the \"policies\" parameter is not required. Defaults to 'client'.", - "default": "client" - } - } - }, - "OCILoginWithRoleRequest": { - "type": "object", - "properties": { - "request_headers": { + "description": "User-friendly description for this mount." + }, + "external_entropy_access": { + "type": "boolean" + }, + "local": { + "type": "boolean", + "description": "Mark the mount as a local mount, which is not replicated and is unaffected by replication.", + "default": false + }, + "options": { + "type": "object", + "description": "The options to pass into the backend. Should be a json object with string keys and values.", + "format": "kvpairs" + }, + "plugin_version": { "type": "string", - "description": "The signed headers of the client" - } - } - }, - "OCIWriteConfigRequest": { - "type": "object", - "properties": { - "home_tenancy_id": { + "description": "The semantic version of the plugin to use." + }, + "running_plugin_version": { + "type": "string" + }, + "running_sha256": { + "type": "string" + }, + "seal_wrap": { + "type": "boolean", + "description": "Whether to turn on seal wrapping for the mount.", + "default": false + }, + "type": { "type": "string", - "description": "The tenancy id of the account." + "description": "The type of the backend. Example: \"passthrough\"" + }, + "uuid": { + "type": "string" } } }, - "OCIWriteRoleRequest": { + "MountsReadTuningInformationResponse": { "type": "object", "properties": { - "ocid_list": { + "allowed_managed_keys": { "type": "array", - "description": "A comma separated list of Group or Dynamic Group OCIDs that are allowed to take this role.", "items": { "type": "string" } }, - "token_bound_cidrs": { + "allowed_response_headers": { "type": "array", - "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", + "description": "A list of headers to whitelist and allow a plugin to set on responses.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Bound CIDRs", - "group": "Tokens" - } - }, - "token_explicit_max_ttl": { - "type": "integer", - "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Explicit Maximum TTL", - "group": "Tokens" } }, - "token_max_ttl": { - "type": "integer", - "description": "The maximum lifetime of the generated token", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Maximum TTL", - "group": "Tokens" + "audit_non_hmac_request_keys": { + "type": "array", + "items": { + "type": "string" } }, - "token_no_default_policy": { - "type": "boolean", - "description": "If true, the 'default' policy will not automatically be added to generated tokens", - "x-vault-displayAttrs": { - "name": "Do Not Attach 'default' Policy To Generated Tokens", - "group": "Tokens" + "audit_non_hmac_response_keys": { + "type": "array", + "items": { + "type": "string" } }, - "token_num_uses": { + "default_lease_ttl": { "type": "integer", - "description": "The maximum number of times a token may be used, a value of zero means unlimited", - "x-vault-displayAttrs": { - "name": "Maximum Uses of Generated Tokens", - "group": "Tokens" - } + "description": "The default lease TTL for this mount." }, - "token_period": { + "description": { + "type": "string", + "description": "User-friendly description for this credential backend." + }, + "external_entropy_access": { + "type": "boolean" + }, + "force_no_cache": { + "type": "boolean" + }, + "listing_visibility": { + "type": "string" + }, + "max_lease_ttl": { "type": "integer", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Period", - "group": "Tokens" - } + "description": "The max lease TTL for this mount." }, - "token_policies": { + "options": { + "type": "object", + "description": "The options to pass into the backend. Should be a json object with string keys and values.", + "format": "kvpairs" + }, + "passthrough_request_headers": { "type": "array", - "description": "Comma-separated list of policies", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Policies", - "group": "Tokens" } }, - "token_ttl": { - "type": "integer", - "description": "The initial ttl of the token to generate", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Initial TTL", - "group": "Tokens" - } + "plugin_version": { + "type": "string", + "description": "The semantic version of the plugin to use." }, "token_type": { "type": "string", - "description": "The type of token to generate, service or batch", - "default": "default-service", - "x-vault-displayAttrs": { - "name": "Generated Token's Type", - "group": "Tokens" - } - } - } - }, - "OIDCIntrospectRequest": { - "type": "object", - "properties": { - "client_id": { - "type": "string", - "description": "Optional client_id to verify" + "description": "The type of token to issue (service or batch)." }, - "token": { - "type": "string", - "description": "Token to verify" - } - } - }, - "OIDCLoginRequest": { - "type": "object", - "properties": { - "jwt": { - "type": "string", - "description": "The signed JWT to validate." + "user_lockout_counter_reset_duration": { + "type": "integer", + "format": "int64" }, - "role": { - "type": "string", - "description": "The role to log in against.", - "format": "lowercase" - } - } - }, - "OIDCRotateKeyRequest": { - "type": "object", - "properties": { - "verification_ttl": { + "user_lockout_disable": { + "type": "boolean" + }, + "user_lockout_duration": { "type": "integer", - "description": "Controls how long the public portion of a key will be available for verification after being rotated. Setting verification_ttl here will override the verification_ttl set on the key.", - "format": "seconds" + "format": "int64" + }, + "user_lockout_threshold": { + "type": "integer", + "format": "int64" } } }, - "OIDCWriteAssignmentRequest": { + "MountsTuneConfigurationParametersRequest": { "type": "object", "properties": { - "entity_ids": { + "allowed_managed_keys": { "type": "array", - "description": "Comma separated string or array of identity entity IDs", "items": { "type": "string" } }, - "group_ids": { + "allowed_response_headers": { "type": "array", - "description": "Comma separated string or array of identity group IDs", + "description": "A list of headers to whitelist and allow a plugin to set on responses.", "items": { "type": "string" } - } - } - }, - "OIDCWriteAuthConfigRequest": { - "type": "object", - "properties": { - "bound_issuer": { - "type": "string", - "description": "The value against which to match the 'iss' claim in a JWT. Optional." - }, - "default_role": { - "type": "string", - "description": "The default role to use if none is provided during login. If not set, a role is required during login.", - "format": "lowercase" - }, - "jwks_ca_pem": { - "type": "string", - "description": "The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used." - }, - "jwks_url": { - "type": "string", - "description": "JWKS URL to use to authenticate signatures. Cannot be used with \"oidc_discovery_url\" or \"jwt_validation_pubkeys\"." }, - "jwt_supported_algs": { + "audit_non_hmac_request_keys": { "type": "array", - "description": "A list of supported signing algorithms. Defaults to RS256.", + "description": "The list of keys in the request data object that will not be HMAC'ed by audit devices.", "items": { "type": "string" } }, - "jwt_validation_pubkeys": { + "audit_non_hmac_response_keys": { "type": "array", - "description": "A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with \"jwks_url\" or \"oidc_discovery_url\".", + "description": "The list of keys in the response data object that will not be HMAC'ed by audit devices.", "items": { "type": "string" } }, - "namespace_in_state": { - "type": "boolean", - "description": "Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs.", - "x-vault-displayAttrs": { - "name": "Namespace in OIDC state", - "value": true - } - }, - "oidc_client_id": { + "default_lease_ttl": { "type": "string", - "description": "The OAuth Client ID configured with your OIDC provider." + "description": "The default lease TTL for this mount." }, - "oidc_client_secret": { + "description": { "type": "string", - "description": "The OAuth Client Secret configured with your OIDC provider.", - "x-vault-displayAttrs": { - "sensitive": true - } + "description": "User-friendly description for this credential backend." }, - "oidc_discovery_ca_pem": { + "listing_visibility": { "type": "string", - "description": "The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used." + "description": "Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are 'unauth' and 'hidden', with the empty default ('') behaving like 'hidden'." }, - "oidc_discovery_url": { + "max_lease_ttl": { "type": "string", - "description": "OIDC Discovery URL, without any .well-known component (base path). Cannot be used with \"jwks_url\" or \"jwt_validation_pubkeys\"." + "description": "The max lease TTL for this mount." }, - "oidc_response_mode": { - "type": "string", - "description": "The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'." + "options": { + "type": "object", + "description": "The options to pass into the backend. Should be a json object with string keys and values.", + "format": "kvpairs" }, - "oidc_response_types": { + "passthrough_request_headers": { "type": "array", - "description": "The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'.", + "description": "A list of headers to whitelist and pass from the request to the plugin.", "items": { "type": "string" } }, - "provider_config": { + "plugin_version": { + "type": "string", + "description": "The semantic version of the plugin to use." + }, + "token_type": { + "type": "string", + "description": "The type of token to issue (service or batch)." + }, + "user_lockout_config": { "type": "object", - "description": "Provider-specific configuration. Optional.", - "format": "map", - "x-vault-displayAttrs": { - "name": "Provider Config" - } + "description": "The user lockout configuration to pass into the backend. Should be a json object with string keys and values.", + "format": "map" } } }, - "OIDCWriteAuthRoleRequest": { + "NomadConfigureAccessRequest": { "type": "object", "properties": { - "allowed_redirect_uris": { - "type": "array", - "description": "Comma-separated list of allowed values for redirect_uri", - "items": { - "type": "string" - } - }, - "bound_audiences": { - "type": "array", - "description": "Comma-separated list of 'aud' claims that are valid for login; any match is sufficient", - "items": { - "type": "string" - } - }, - "bound_cidrs": { - "type": "array", - "description": "Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used.", - "items": { - "type": "string" - }, - "deprecated": true - }, - "bound_claims": { - "type": "object", - "description": "Map of claims/values which must match for login", - "format": "map" - }, - "bound_claims_type": { + "address": { "type": "string", - "description": "How to interpret values in the map of claims/values (which must match for login): allowed values are 'string' or 'glob'", - "default": "string" + "description": "Nomad server address" }, - "bound_subject": { + "ca_cert": { "type": "string", - "description": "The 'sub' claim that is valid for login. Optional." - }, - "claim_mappings": { - "type": "object", - "description": "Mappings of claims (key) that will be copied to a metadata field (value)", - "format": "kvpairs" - }, - "clock_skew_leeway": { - "type": "integer", - "description": "Duration in seconds of leeway when validating all claims to account for clock skew. Defaults to 60 (1 minute) if set to 0 and can be disabled if set to -1.", - "format": "seconds", - "default": 60000000000 + "description": "CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded." }, - "expiration_leeway": { - "type": "integer", - "description": "Duration in seconds of leeway when validating expiration of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1.", - "format": "seconds", - "default": 150 + "client_cert": { + "type": "string", + "description": "Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key." }, - "groups_claim": { + "client_key": { "type": "string", - "description": "The claim to use for the Identity group alias names" + "description": "Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert." }, - "max_age": { + "max_token_name_length": { "type": "integer", - "description": "Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated.", - "format": "seconds" + "description": "Max length for name of generated Nomad tokens" }, + "token": { + "type": "string", + "description": "Token for API calls" + } + } + }, + "NomadConfigureLeaseRequest": { + "type": "object", + "properties": { "max_ttl": { "type": "integer", - "description": "Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used.", - "format": "seconds", - "deprecated": true - }, - "not_before_leeway": { - "type": "integer", - "description": "Duration in seconds of leeway when validating not before values of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1.", - "format": "seconds", - "default": 150 + "description": "Duration after which the issued token should not be allowed to be renewed", + "format": "seconds" }, - "num_uses": { + "ttl": { "type": "integer", - "description": "Use \"token_num_uses\" instead. If this and \"token_num_uses\" are both specified, only \"token_num_uses\" will be used.", - "deprecated": true + "description": "Duration before which the issued token needs renewal", + "format": "seconds" + } + } + }, + "NomadWriteRoleRequest": { + "type": "object", + "properties": { + "global": { + "type": "boolean", + "description": "Boolean value describing if the token should be global or not. Defaults to false." }, - "oidc_scopes": { + "policies": { "type": "array", - "description": "Comma-separated list of OIDC scopes", + "description": "Comma-separated string or list of policies as previously created in Nomad. Required for 'client' token.", "items": { "type": "string" } }, - "period": { - "type": "integer", - "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "seconds", - "deprecated": true - }, - "policies": { + "type": { + "type": "string", + "description": "Which type of token to create: 'client' or 'management'. If a 'management' token, the \"policies\" parameter is not required. Defaults to 'client'.", + "default": "client" + } + } + }, + "OciConfigureRequest": { + "type": "object", + "properties": { + "home_tenancy_id": { + "type": "string", + "description": "The tenancy id of the account." + } + } + }, + "OciLogInRequest": { + "type": "object", + "properties": { + "request_headers": { + "type": "string", + "description": "The signed headers of the client" + } + } + }, + "OciWriteRoleRequest": { + "type": "object", + "properties": { + "ocid_list": { "type": "array", - "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", + "description": "A comma separated list of Group or Dynamic Group OCIDs that are allowed to take this role.", "items": { "type": "string" - }, - "deprecated": true - }, - "role_type": { - "type": "string", - "description": "Type of the role, either 'jwt' or 'oidc'." + } }, "token_bound_cidrs": { "type": "array", @@ -31472,63 +32424,143 @@ "name": "Generated Token's Type", "group": "Tokens" } - }, - "ttl": { - "type": "integer", - "description": "Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used.", - "format": "seconds", - "deprecated": true - }, - "user_claim": { + } + } + }, + "OidcConfigureRequest": { + "type": "object", + "properties": { + "issuer": { "type": "string", - "description": "The claim to use for the Identity entity alias name" - }, - "user_claim_json_pointer": { - "type": "boolean", - "description": "If true, the user_claim value will use JSON pointer syntax for referencing claims." + "description": "Issuer URL to be used in the iss claim of the token. If not set, Vault's app_addr will be used." + } + } + }, + "OidcIntrospectRequest": { + "type": "object", + "properties": { + "client_id": { + "type": "string", + "description": "Optional client_id to verify" }, - "verbose_oidc_logging": { - "type": "boolean", - "description": "Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses." + "token": { + "type": "string", + "description": "Token to verify" } } }, - "OIDCWriteAuthURLRequest": { + "OidcProviderAuthorize2Request": { "type": "object", "properties": { - "client_nonce": { + "client_id": { "type": "string", - "description": "Optional client-provided nonce that must match during callback, if present." + "description": "The ID of the requesting client." + }, + "code_challenge": { + "type": "string", + "description": "The code challenge derived from the code verifier." + }, + "code_challenge_method": { + "type": "string", + "description": "The method that was used to derive the code challenge. The following methods are supported: 'S256', 'plain'. Defaults to 'plain'.", + "default": "plain" + }, + "max_age": { + "type": "integer", + "description": "The allowable elapsed time in seconds since the last time the end-user was actively authenticated." + }, + "nonce": { + "type": "string", + "description": "The value that will be returned in the ID token nonce claim after a token exchange." }, "redirect_uri": { "type": "string", - "description": "The OAuth redirect_uri to use in the authorization URL." + "description": "The redirection URI to which the response will be sent." }, - "role": { + "response_type": { "type": "string", - "description": "The role to issue an OIDC authorization URL against.", - "format": "lowercase" + "description": "The OIDC authentication flow to be used. The following response types are supported: 'code'" + }, + "scope": { + "type": "string", + "description": "A space-delimited, case-sensitive list of scopes to be requested. The 'openid' scope is required." + }, + "state": { + "type": "string", + "description": "The value used to maintain state between the authentication request and client." } - } + }, + "required": [ + "scope", + "response_type", + "client_id", + "redirect_uri" + ] }, - "OIDCWriteCallbackRequest": { + "OidcProviderTokenRequest": { "type": "object", "properties": { - "client_nonce": { - "type": "string" + "client_id": { + "type": "string", + "description": "The ID of the requesting client." + }, + "client_secret": { + "type": "string", + "description": "The secret of the requesting client." }, "code": { - "type": "string" + "type": "string", + "description": "The authorization code received from the provider's authorization endpoint." }, - "id_token": { - "type": "string" + "code_verifier": { + "type": "string", + "description": "The code verifier associated with the authorization code." }, - "state": { - "type": "string" + "grant_type": { + "type": "string", + "description": "The authorization grant type. The following grant types are supported: 'authorization_code'." + }, + "redirect_uri": { + "type": "string", + "description": "The callback location where the authentication response was sent." + } + }, + "required": [ + "code", + "grant_type", + "redirect_uri" + ] + }, + "OidcRotateKeyRequest": { + "type": "object", + "properties": { + "verification_ttl": { + "type": "integer", + "description": "Controls how long the public portion of a key will be available for verification after being rotated. Setting verification_ttl here will override the verification_ttl set on the key.", + "format": "seconds" + } + } + }, + "OidcWriteAssignmentRequest": { + "type": "object", + "properties": { + "entity_ids": { + "type": "array", + "description": "Comma separated string or array of identity entity IDs", + "items": { + "type": "string" + } + }, + "group_ids": { + "type": "array", + "description": "Comma separated string or array of identity group IDs", + "items": { + "type": "string" + } } } }, - "OIDCWriteClientRequest": { + "OidcWriteClientRequest": { "type": "object", "properties": { "access_token_ttl": { @@ -31569,16 +32601,7 @@ } } }, - "OIDCWriteConfigRequest": { - "type": "object", - "properties": { - "issuer": { - "type": "string", - "description": "Issuer URL to be used in the iss claim of the token. If not set, Vault's app_addr will be used." - } - } - }, - "OIDCWriteKeyRequest": { + "OidcWriteKeyRequest": { "type": "object", "properties": { "algorithm": { @@ -31607,55 +32630,7 @@ } } }, - "OIDCWriteProviderAuthorizeRequest": { - "type": "object", - "properties": { - "client_id": { - "type": "string", - "description": "The ID of the requesting client." - }, - "code_challenge": { - "type": "string", - "description": "The code challenge derived from the code verifier." - }, - "code_challenge_method": { - "type": "string", - "description": "The method that was used to derive the code challenge. The following methods are supported: 'S256', 'plain'. Defaults to 'plain'.", - "default": "plain" - }, - "max_age": { - "type": "integer", - "description": "The allowable elapsed time in seconds since the last time the end-user was actively authenticated." - }, - "nonce": { - "type": "string", - "description": "The value that will be returned in the ID token nonce claim after a token exchange." - }, - "redirect_uri": { - "type": "string", - "description": "The redirection URI to which the response will be sent." - }, - "response_type": { - "type": "string", - "description": "The OIDC authentication flow to be used. The following response types are supported: 'code'" - }, - "scope": { - "type": "string", - "description": "A space-delimited, case-sensitive list of scopes to be requested. The 'openid' scope is required." - }, - "state": { - "type": "string", - "description": "The value used to maintain state between the authentication request and client." - } - }, - "required": [ - "response_type", - "client_id", - "redirect_uri", - "scope" - ] - }, - "OIDCWriteProviderRequest": { + "OidcWriteProviderRequest": { "type": "object", "properties": { "allowed_client_ids": { @@ -31678,41 +32653,7 @@ } } }, - "OIDCWriteProviderTokenRequest": { - "type": "object", - "properties": { - "client_id": { - "type": "string", - "description": "The ID of the requesting client." - }, - "client_secret": { - "type": "string", - "description": "The secret of the requesting client." - }, - "code": { - "type": "string", - "description": "The authorization code received from the provider's authorization endpoint." - }, - "code_verifier": { - "type": "string", - "description": "The code verifier associated with the authorization code." - }, - "grant_type": { - "type": "string", - "description": "The authorization grant type. The following grant types are supported: 'authorization_code'." - }, - "redirect_uri": { - "type": "string", - "description": "The callback location where the authentication response was sent." - } - }, - "required": [ - "redirect_uri", - "code", - "grant_type" - ] - }, - "OIDCWriteRoleRequest": { + "OidcWriteRoleRequest": { "type": "object", "properties": { "client_id": { @@ -31738,7 +32679,7 @@ "key" ] }, - "OIDCWriteScopeRequest": { + "OidcWriteScopeRequest": { "type": "object", "properties": { "description": { @@ -31751,28 +32692,7 @@ } } }, - "OktaLoginRequest": { - "type": "object", - "properties": { - "nonce": { - "type": "string", - "description": "Nonce provided if performing login that requires number verification challenge. Logins through the vault login CLI command will automatically generate a nonce." - }, - "password": { - "type": "string", - "description": "Password for this user." - }, - "provider": { - "type": "string", - "description": "Preferred factor provider." - }, - "totp": { - "type": "string", - "description": "TOTP passcode." - } - } - }, - "OktaWriteConfigRequest": { + "OktaConfigureRequest": { "type": "object", "properties": { "api_token": { @@ -31915,6 +32835,27 @@ } } }, + "OktaLogInRequest": { + "type": "object", + "properties": { + "nonce": { + "type": "string", + "description": "Nonce provided if performing login that requires number verification challenge. Logins through the vault login CLI command will automatically generate a nonce." + }, + "password": { + "type": "string", + "description": "Password for this user." + }, + "provider": { + "type": "string", + "description": "Preferred factor provider." + }, + "totp": { + "type": "string", + "description": "TOTP passcode." + } + } + }, "OktaWriteGroupRequest": { "type": "object", "properties": { @@ -31946,339 +32887,3244 @@ } } }, - "OpenLDAPCheckInLibraryRequest": { + "PersonaCreateRequest": { "type": "object", "properties": { - "service_account_names": { + "entity_id": { + "type": "string", + "description": "Entity ID to which this persona belongs to" + }, + "id": { + "type": "string", + "description": "ID of the persona" + }, + "metadata": { + "type": "object", + "description": "Metadata to be associated with the persona. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", + "format": "kvpairs" + }, + "mount_accessor": { + "type": "string", + "description": "Mount accessor to which this persona belongs to" + }, + "name": { + "type": "string", + "description": "Name of the persona" + } + } + }, + "PersonaUpdateByIdRequest": { + "type": "object", + "properties": { + "entity_id": { + "type": "string", + "description": "Entity ID to which this persona should be tied to" + }, + "metadata": { + "type": "object", + "description": "Metadata to be associated with the persona. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", + "format": "kvpairs" + }, + "mount_accessor": { + "type": "string", + "description": "Mount accessor to which this persona belongs to" + }, + "name": { + "type": "string", + "description": "Name of the persona" + } + } + }, + "PkiConfigureAutoTidyRequest": { + "type": "object", + "properties": { + "enabled": { + "type": "boolean", + "description": "Set to true to enable automatic tidy operations." + }, + "interval_duration": { + "type": "integer", + "description": "Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next). Running a manual tidy will reset this duration.", + "format": "seconds", + "default": 43200 + }, + "issuer_safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year).", + "format": "seconds", + "default": 31536000 + }, + "maintain_stored_certificate_counts": { + "type": "boolean", + "description": "This configures whether stored certificates are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.", + "default": false + }, + "pause_duration": { + "type": "string", + "description": "The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds.", + "default": "0s" + }, + "publish_stored_certificate_count_metrics": { + "type": "boolean", + "description": "This configures whether the stored certificate count is published to the metrics consumer. It does not affect if the stored certificate count is maintained, and if maintained, it will be available on the tidy-status endpoint.", + "default": false + }, + "revocation_queue_safety_buffer": { + "type": "integer", + "description": "The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal. Setting this too low may remove valid revocation requests before the owning cluster has a chance to process them, especially if the cluster is offline.", + "format": "seconds", + "default": 172800 + }, + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours.", + "format": "seconds", + "default": 259200 + }, + "tidy_cert_store": { + "type": "boolean", + "description": "Set to true to enable tidying up the certificate store" + }, + "tidy_cross_cluster_revoked_certs": { + "type": "boolean", + "description": "Set to true to enable tidying up the cross-cluster revoked certificate store. Only runs on the active primary node." + }, + "tidy_expired_issuers": { + "type": "boolean", + "description": "Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation." + }, + "tidy_move_legacy_ca_bundle": { + "type": "boolean", + "description": "Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak. This prevents downgrades to pre-Vault 1.11 versions (as older PKI engines do not know about the new multi-issuer storage layout), but improves the performance on seal wrapped PKI mounts. This will only occur if at least issuer_safety_buffer time has occurred after the initial storage migration. This backup is saved in case of an issue in future migrations. Operators may consider removing it via sys/raw if they desire. The backup will be removed via a DELETE /root call, but note that this removes ALL issuers within the mount (and is thus not desirable in most operational scenarios)." + }, + "tidy_revocation_list": { + "type": "boolean", + "description": "Deprecated; synonym for 'tidy_revoked_certs" + }, + "tidy_revocation_queue": { + "type": "boolean", + "description": "Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster. Only runs on the active primary node", + "default": false + }, + "tidy_revoked_cert_issuer_associations": { + "type": "boolean", + "description": "Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses." + }, + "tidy_revoked_certs": { + "type": "boolean", + "description": "Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed." + } + } + }, + "PkiConfigureAutoTidyResponse": { + "type": "object", + "properties": { + "enabled": { + "type": "boolean", + "description": "Specifies whether automatic tidy is enabled or not" + }, + "interval_duration": { + "type": "integer", + "description": "Specifies the duration between automatic tidy operation" + }, + "issuer_safety_buffer": { + "type": "integer", + "description": "Issuer safety buffer" + }, + "pause_duration": { + "type": "string", + "description": "Duration to pause between tidying certificates" + }, + "revocation_queue_safety_buffer": { + "type": "integer", + "format": "seconds" + }, + "safety_buffer": { + "type": "integer", + "description": "Safety buffer time duration" + }, + "tidy_cert_store": { + "type": "boolean", + "description": "Specifies whether to tidy up the certificate store" + }, + "tidy_cross_cluster_revoked_certs": { + "type": "boolean" + }, + "tidy_expired_issuers": { + "type": "boolean", + "description": "Specifies whether tidy expired issuers" + }, + "tidy_move_legacy_ca_bundle": { + "type": "boolean" + }, + "tidy_revocation_queue": { + "type": "boolean" + }, + "tidy_revoked_cert_issuer_associations": { + "type": "boolean", + "description": "Specifies whether to associate revoked certificates with their corresponding issuers" + }, + "tidy_revoked_certs": { + "type": "boolean", + "description": "Specifies whether to remove all invalid and expired certificates from storage" + } + } + }, + "PkiConfigureCaRequest": { + "type": "object", + "properties": { + "pem_bundle": { + "type": "string", + "description": "PEM-format, concatenated unencrypted secret key and certificate." + } + } + }, + "PkiConfigureCaResponse": { + "type": "object", + "properties": { + "imported_issuers": { "type": "array", - "description": "The username/logon name for the service accounts to check in.", + "description": "Net-new issuers imported as a part of this request", + "items": { + "type": "string" + } + }, + "imported_keys": { + "type": "array", + "description": "Net-new keys imported as a part of this request", "items": { "type": "string" } + }, + "mapping": { + "type": "object", + "description": "A mapping of issuer_id to key_id for all issuers included in this request", + "format": "map" } } }, - "OpenLDAPCheckInManageLibraryRequest": { + "PkiConfigureClusterRequest": { "type": "object", "properties": { - "service_account_names": { + "aia_path": { + "type": "string", + "description": "Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki" + }, + "path": { + "type": "string", + "description": "Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki" + } + } + }, + "PkiConfigureClusterResponse": { + "type": "object", + "properties": { + "aia_path": { + "type": "string", + "description": "Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki" + }, + "path": { + "type": "string", + "description": "Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki" + } + } + }, + "PkiConfigureCrlRequest": { + "type": "object", + "properties": { + "auto_rebuild": { + "type": "boolean", + "description": "If set to true, enables automatic rebuilding of the CRL" + }, + "auto_rebuild_grace_period": { + "type": "string", + "description": "The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h.", + "default": "12h" + }, + "cross_cluster_revocation": { + "type": "boolean", + "description": "Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true." + }, + "delta_rebuild_interval": { + "type": "string", + "description": "The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m.", + "default": "15m" + }, + "disable": { + "type": "boolean", + "description": "If set to true, disables generating the CRL entirely." + }, + "enable_delta": { + "type": "boolean", + "description": "Whether to enable delta CRLs between authoritative CRL rebuilds" + }, + "expiry": { + "type": "string", + "description": "The amount of time the generated CRL should be valid; defaults to 72 hours", + "default": "72h" + }, + "ocsp_disable": { + "type": "boolean", + "description": "If set to true, ocsp unauthorized responses will be returned." + }, + "ocsp_expiry": { + "type": "string", + "description": "The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours", + "default": "1h" + }, + "unified_crl": { + "type": "boolean", + "description": "If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP.", + "default": "false" + }, + "unified_crl_on_existing_paths": { + "type": "boolean", + "description": "If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data", + "default": "false" + } + } + }, + "PkiConfigureCrlResponse": { + "type": "object", + "properties": { + "auto_rebuild": { + "type": "boolean", + "description": "If set to true, enables automatic rebuilding of the CRL" + }, + "auto_rebuild_grace_period": { + "type": "string", + "description": "The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h.", + "default": "12h" + }, + "cross_cluster_revocation": { + "type": "boolean", + "description": "Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true." + }, + "delta_rebuild_interval": { + "type": "string", + "description": "The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m.", + "default": "15m" + }, + "disable": { + "type": "boolean", + "description": "If set to true, disables generating the CRL entirely." + }, + "enable_delta": { + "type": "boolean", + "description": "Whether to enable delta CRLs between authoritative CRL rebuilds" + }, + "expiry": { + "type": "string", + "description": "The amount of time the generated CRL should be valid; defaults to 72 hours", + "default": "72h" + }, + "ocsp_disable": { + "type": "boolean", + "description": "If set to true, ocsp unauthorized responses will be returned." + }, + "ocsp_expiry": { + "type": "string", + "description": "The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours", + "default": "1h" + }, + "unified_crl": { + "type": "boolean", + "description": "If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP." + }, + "unified_crl_on_existing_paths": { + "type": "boolean", + "description": "If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data" + } + } + }, + "PkiConfigureIssuersRequest": { + "type": "object", + "properties": { + "default": { + "type": "string", + "description": "Reference (name or identifier) to the default issuer." + }, + "default_follows_latest_issuer": { + "type": "boolean", + "description": "Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false.", + "default": false + } + } + }, + "PkiConfigureIssuersResponse": { + "type": "object", + "properties": { + "default": { + "type": "string", + "description": "Reference (name or identifier) to the default issuer." + }, + "default_follows_latest_issuer": { + "type": "boolean", + "description": "Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false." + } + } + }, + "PkiConfigureKeysRequest": { + "type": "object", + "properties": { + "default": { + "type": "string", + "description": "Reference (name or identifier) of the default key." + } + } + }, + "PkiConfigureKeysResponse": { + "type": "object", + "properties": { + "default": { + "type": "string", + "description": "Reference (name or identifier) to the default issuer." + } + } + }, + "PkiConfigureUrlsRequest": { + "type": "object", + "properties": { + "crl_distribution_points": { "type": "array", - "description": "The username/logon name for the service accounts to check in.", + "description": "Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13.", + "items": { + "type": "string" + } + }, + "enable_templating": { + "type": "boolean", + "description": "Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}', '{{cluster_path}}', and '{{cluster_aia_path}}' are available, but the addresses are not checked for URI validity until issuance time. Using '{{cluster_path}}' requires /config/cluster's 'path' member to be set on all PR Secondary clusters and using '{{cluster_aia_path}}' requires /config/cluster's 'aia_path' member to be set on all PR secondary clusters.", + "default": false + }, + "issuing_certificates": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1.", + "items": { + "type": "string" + } + }, + "ocsp_servers": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1.", "items": { "type": "string" } } } }, - "OpenLDAPCheckOutLibraryRequest": { + "PkiConfigureUrlsResponse": { "type": "object", "properties": { - "ttl": { - "type": "integer", - "description": "The length of time before the check-out will expire, in seconds.", - "format": "seconds" + "crl_distribution_points": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13.", + "items": { + "type": "string" + } + }, + "enable_templating": { + "type": "boolean", + "description": "Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URI validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters.", + "default": false + }, + "issuing_certificates": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1.", + "items": { + "type": "string" + } + }, + "ocsp_servers": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1.", + "items": { + "type": "string" + } } } }, - "OpenLDAPWriteConfigRequest": { + "PkiCrossSignIntermediateRequest": { "type": "object", "properties": { - "anonymous_group_search": { + "add_basic_constraints": { "type": "boolean", - "description": "Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test).", - "default": false, - "x-vault-displayAttrs": { - "name": "Anonymous group search" - } + "description": "Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services." }, - "binddn": { + "alt_names": { "type": "string", - "description": "LDAP DN for searching for the user DN (optional)", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", "x-vault-displayAttrs": { - "name": "Name of Object to bind (binddn)" + "name": "DNS/Email Subject Alternative Names (SANs)" } }, - "bindpass": { + "common_name": { "type": "string", - "description": "LDAP password for searching for the user DN (optional)", - "x-vault-displayAttrs": { - "sensitive": true + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + }, + "country": { + "type": "array", + "description": "If set, Country will be set to this value.", + "items": { + "type": "string" } }, - "case_sensitive_names": { + "exclude_cn_from_sans": { "type": "boolean", - "description": "If true, case sensitivity will be used when comparing usernames and groups for matching policies." - }, - "certificate": { - "type": "string", - "description": "CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional)", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, "x-vault-displayAttrs": { - "name": "CA certificate", - "editType": "file" + "name": "Exclude Common Name from Subject Alternative Names (SANs)" } }, - "client_tls_cert": { + "exported": { "type": "string", - "description": "Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional)", - "x-vault-displayAttrs": { - "name": "Client certificate", - "editType": "file" - } + "description": "Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key!", + "enum": [ + "internal", + "external", + "kms" + ] }, - "client_tls_key": { + "format": { "type": "string", - "description": "Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional)", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", "x-vault-displayAttrs": { - "name": "Client key", - "editType": "file" + "value": "pem" } }, - "deny_null_bind": { - "type": "boolean", - "description": "Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true", - "default": true - }, - "discoverdn": { - "type": "boolean", - "description": "Use anonymous bind to discover the bind DN of a user (optional)", + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "Discover DN" + "name": "IP Subject Alternative Names (SANs)" } }, - "groupattr": { - "type": "string", - "description": "LDAP attribute to follow on objects returned by in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn", - "default": "cn", + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0, "x-vault-displayAttrs": { - "name": "Group Attribute", - "value": "cn" + "value": 0 } }, - "groupdn": { + "key_name": { "type": "string", - "description": "LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org)", + "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" + }, + "key_ref": { + "type": "string", + "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "default": "default" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", "x-vault-displayAttrs": { - "name": "Group DN" + "value": "rsa" } }, - "groupfilter": { - "type": "string", - "description": "Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))", - "default": "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))", + "locality": { + "type": "array", + "description": "If set, Locality will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Locality/City" + } + }, + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "not_before_duration": { + "type": "integer", + "description": "The duration before now which the certificate needs to be backdated by.", + "format": "seconds", + "default": 30, + "x-vault-displayAttrs": { + "value": 30 + } + }, + "organization": { + "type": "array", + "description": "If set, O (Organization) will be set to this value.", + "items": { + "type": "string" + } + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "ou": { + "type": "array", + "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "OU (Organizational Unit)" + } + }, + "postal_code": { + "type": "array", + "description": "If set, Postal Code will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Postal Code" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "province": { + "type": "array", + "description": "If set, Province will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Province/State" + } + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "street_address": { + "type": "array", + "description": "If set, Street Address will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Street Address" + } + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + } + } + }, + "PkiCrossSignIntermediateResponse": { + "type": "object", + "properties": { + "csr": { + "type": "string", + "description": "Certificate signing request." + }, + "key_id": { + "type": "string", + "description": "Id of the key." + }, + "private_key": { + "type": "string", + "description": "Generated private key." + }, + "private_key_type": { + "type": "string", + "description": "Specifies the format used for marshaling the private key." + } + } + }, + "PkiGenerateExportedKeyRequest": { + "type": "object", + "properties": { + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0 + }, + "key_name": { + "type": "string", + "description": "Optional name to be used for this key" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", + "x-vault-displayAttrs": { + "value": "rsa" + } + }, + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + } + } + }, + "PkiGenerateExportedKeyResponse": { + "type": "object", + "properties": { + "key_id": { + "type": "string", + "description": "ID assigned to this key." + }, + "key_name": { + "type": "string", + "description": "Name assigned to this key." + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values." + }, + "private_key": { + "type": "string", + "description": "The private key string" + } + } + }, + "PkiGenerateIntermediateRequest": { + "type": "object", + "properties": { + "add_basic_constraints": { + "type": "boolean", + "description": "Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services." + }, + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + }, + "country": { + "type": "array", + "description": "If set, Country will be set to this value.", + "items": { + "type": "string" + } + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "key_name": { + "type": "string", + "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" + }, + "key_ref": { + "type": "string", + "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "default": "default" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", + "x-vault-displayAttrs": { + "value": "rsa" + } + }, + "locality": { + "type": "array", + "description": "If set, Locality will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Locality/City" + } + }, + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "not_before_duration": { + "type": "integer", + "description": "The duration before now which the certificate needs to be backdated by.", + "format": "seconds", + "default": 30, + "x-vault-displayAttrs": { + "value": 30 + } + }, + "organization": { + "type": "array", + "description": "If set, O (Organization) will be set to this value.", + "items": { + "type": "string" + } + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "ou": { + "type": "array", + "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "OU (Organizational Unit)" + } + }, + "postal_code": { + "type": "array", + "description": "If set, Postal Code will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Postal Code" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "province": { + "type": "array", + "description": "If set, Province will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Province/State" + } + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "street_address": { + "type": "array", + "description": "If set, Street Address will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Street Address" + } + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + } + } + }, + "PkiGenerateIntermediateResponse": { + "type": "object", + "properties": { + "csr": { + "type": "string", + "description": "Certificate signing request." + }, + "key_id": { + "type": "string", + "description": "Id of the key." + }, + "private_key": { + "type": "string", + "description": "Generated private key." + }, + "private_key_type": { + "type": "string", + "description": "Specifies the format used for marshaling the private key." + } + } + }, + "PkiGenerateInternalKeyRequest": { + "type": "object", + "properties": { + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0 + }, + "key_name": { + "type": "string", + "description": "Optional name to be used for this key" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", + "x-vault-displayAttrs": { + "value": "rsa" + } + }, + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + } + } + }, + "PkiGenerateInternalKeyResponse": { + "type": "object", + "properties": { + "key_id": { + "type": "string", + "description": "ID assigned to this key." + }, + "key_name": { + "type": "string", + "description": "Name assigned to this key." + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values." + }, + "private_key": { + "type": "string", + "description": "The private key string" + } + } + }, + "PkiGenerateKmsKeyRequest": { + "type": "object", + "properties": { + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0 + }, + "key_name": { + "type": "string", + "description": "Optional name to be used for this key" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", + "x-vault-displayAttrs": { + "value": "rsa" + } + }, + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + } + } + }, + "PkiGenerateKmsKeyResponse": { + "type": "object", + "properties": { + "key_id": { + "type": "string", + "description": "ID assigned to this key." + }, + "key_name": { + "type": "string", + "description": "Name assigned to this key." + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values." + }, + "private_key": { + "type": "string", + "description": "The private key string" + } + } + }, + "PkiGenerateRootRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + }, + "country": { + "type": "array", + "description": "If set, Country will be set to this value.", + "items": { + "type": "string" + } + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "issuer_name": { + "type": "string", + "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + }, + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "key_name": { + "type": "string", + "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" + }, + "key_ref": { + "type": "string", + "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "default": "default" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", + "x-vault-displayAttrs": { + "value": "rsa" + } + }, + "locality": { + "type": "array", + "description": "If set, Locality will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Locality/City" + } + }, + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + }, + "max_path_length": { + "type": "integer", + "description": "The maximum allowable path length", + "default": -1 + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "not_before_duration": { + "type": "integer", + "description": "The duration before now which the certificate needs to be backdated by.", + "format": "seconds", + "default": 30, + "x-vault-displayAttrs": { + "value": 30 + } + }, + "organization": { + "type": "array", + "description": "If set, O (Organization) will be set to this value.", + "items": { + "type": "string" + } + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "ou": { + "type": "array", + "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "OU (Organizational Unit)" + } + }, + "permitted_dns_domains": { + "type": "array", + "description": "Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Permitted DNS Domains" + } + }, + "postal_code": { + "type": "array", + "description": "If set, Postal Code will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Postal Code" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "province": { + "type": "array", + "description": "If set, Province will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Province/State" + } + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "street_address": { + "type": "array", + "description": "If set, Street Address will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Street Address" + } + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + }, + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", + "default": false + } + } + }, + "PkiGenerateRootResponse": { + "type": "object", + "properties": { + "certificate": { + "type": "string", + "description": "The generated self-signed CA certificate." + }, + "expiration": { + "type": "string", + "description": "The expiration of the given." + }, + "issuer_id": { + "type": "string", + "description": "The ID of the issuer" + }, + "issuer_name": { + "type": "string", + "description": "The name of the issuer." + }, + "issuing_ca": { + "type": "string", + "description": "The issuing certificate authority." + }, + "key_id": { + "type": "string", + "description": "The ID of the key." + }, + "key_name": { + "type": "string", + "description": "The key name if given." + }, + "private_key": { + "type": "string", + "description": "The private key if exported was specified." + }, + "serial_number": { + "type": "string", + "description": "The requested Subject's named serial number." + } + } + }, + "PkiImportKeyRequest": { + "type": "object", + "properties": { + "key_name": { + "type": "string", + "description": "Optional name to be used for this key" + }, + "pem_bundle": { + "type": "string", + "description": "PEM-format, unencrypted secret key" + } + } + }, + "PkiImportKeyResponse": { + "type": "object", + "properties": { + "key_id": { + "type": "string", + "description": "ID assigned to this key." + }, + "key_name": { + "type": "string", + "description": "Name assigned to this key." + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values." + } + } + }, + "PkiIssueWithRoleRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "issuer_ref": { + "type": "string", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", + "default": "default" + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "remove_roots_from_chain": { + "type": "boolean", + "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "default": false + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + }, + "user_ids": { + "type": "array", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "User ID(s)" + } + } + } + }, + "PkiIssueWithRoleResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "expiration": { + "type": "string", + "description": "Time of expiration" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing Certificate Authority" + }, + "private_key": { + "type": "string", + "description": "Private key" + }, + "private_key_type": { + "type": "string", + "description": "Private key type" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" + } + } + }, + "PkiIssuerIssueWithRoleRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "remove_roots_from_chain": { + "type": "boolean", + "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "default": false + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + }, + "user_ids": { + "type": "array", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "User ID(s)" + } + } + } + }, + "PkiIssuerIssueWithRoleResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "expiration": { + "type": "string", + "description": "Time of expiration" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing Certificate Authority" + }, + "private_key": { + "type": "string", + "description": "Private key" + }, + "private_key_type": { + "type": "string", + "description": "Private key type" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" + } + } + }, + "PkiIssuerReadCrlDeltaDerResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string" + } + } + }, + "PkiIssuerReadCrlDeltaPemResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string" + } + } + }, + "PkiIssuerReadCrlDeltaResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string" + } + } + }, + "PkiIssuerReadCrlDerResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string" + } + } + }, + "PkiIssuerReadCrlPemResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string" + } + } + }, + "PkiIssuerReadCrlResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string" + } + } + }, + "PkiIssuerResignCrlsRequest": { + "type": "object", + "properties": { + "crl_number": { + "type": "integer", + "description": "The sequence number to be written within the CRL Number extension." + }, + "crls": { + "type": "array", + "description": "A list of PEM encoded CRLs to combine, originally signed by the requested issuer.", + "items": { + "type": "string" + } + }, + "delta_crl_base_number": { + "type": "integer", + "description": "Using a zero or greater value specifies the base CRL revision number to encode within a Delta CRL indicator extension, otherwise the extension will not be added.", + "default": -1 + }, + "format": { + "type": "string", + "description": "The format of the combined CRL, can be \"pem\" or \"der\". If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "default": "pem" + }, + "next_update": { + "type": "string", + "description": "The amount of time the generated CRL should be valid; defaults to 72 hours.", + "default": "72h" + } + } + }, + "PkiIssuerResignCrlsResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string", + "description": "CRL" + } + } + }, + "PkiIssuerSignIntermediateRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + }, + "country": { + "type": "array", + "description": "If set, Country will be set to this value.", + "items": { + "type": "string" + } + }, + "csr": { + "type": "string", + "description": "PEM-format CSR to be signed.", + "default": "" + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "issuer_name": { + "type": "string", + "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + }, + "locality": { + "type": "array", + "description": "If set, Locality will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Locality/City" + } + }, + "max_path_length": { + "type": "integer", + "description": "The maximum allowable path length", + "default": -1 + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "not_before_duration": { + "type": "integer", + "description": "The duration before now which the certificate needs to be backdated by.", + "format": "seconds", + "default": 30, + "x-vault-displayAttrs": { + "value": 30 + } + }, + "organization": { + "type": "array", + "description": "If set, O (Organization) will be set to this value.", + "items": { + "type": "string" + } + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "ou": { + "type": "array", + "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "OU (Organizational Unit)" + } + }, + "permitted_dns_domains": { + "type": "array", + "description": "Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Permitted DNS Domains" + } + }, + "postal_code": { + "type": "array", + "description": "If set, Postal Code will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Postal Code" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "province": { + "type": "array", + "description": "If set, Province will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Province/State" + } + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "skid": { + "type": "string", + "description": "Value for the Subject Key Identifier field (RFC 5280 Section 4.2.1.2). This value should ONLY be used when cross-signing to mimic the existing certificate's SKID value; this is necessary to allow certain TLS implementations (such as OpenSSL) which use SKID/AKID matches in chain building to restrict possible valid chains. Specified as a string in hex format. Default is empty, allowing Vault to automatically calculate the SKID according to method one in the above RFC section.", + "default": "", + "x-vault-displayAttrs": { + "value": "" + } + }, + "street_address": { + "type": "array", + "description": "If set, Street Address will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Street Address" + } + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + }, + "use_csr_values": { + "type": "boolean", + "description": "If true, then: 1) Subject information, including names and alternate names, will be preserved from the CSR rather than using values provided in the other parameters to this path; 2) Any key usages requested in the CSR will be added to the basic set of key usages used for CA certs signed by this path; for instance, the non-repudiation flag; 3) Extensions requested in the CSR will be copied into the issued certificate.", + "default": false + }, + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", + "default": false + } + } + }, + "PkiIssuerSignIntermediateResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "CA Chain", + "items": { + "type": "string" + } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "expiration": { + "type": "integer", + "description": "Expiration Time", + "format": "int64" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing CA" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" + } + } + }, + "PkiIssuerSignRevocationListRequest": { + "type": "object", + "properties": { + "crl_number": { + "type": "integer", + "description": "The sequence number to be written within the CRL Number extension." + }, + "delta_crl_base_number": { + "type": "integer", + "description": "Using a zero or greater value specifies the base CRL revision number to encode within a Delta CRL indicator extension, otherwise the extension will not be added.", + "default": -1 + }, + "extensions": { + "type": "array", + "description": "A list of maps containing extensions with keys id (string), critical (bool), value (string)", + "items": { + "type": "object" + } + }, + "format": { + "type": "string", + "description": "The format of the combined CRL, can be \"pem\" or \"der\". If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "default": "pem" + }, + "next_update": { + "type": "string", + "description": "The amount of time the generated CRL should be valid; defaults to 72 hours.", + "default": "72h" + }, + "revoked_certs": { + "type": "array", + "description": "A list of maps containing the keys serial_number (string), revocation_time (string), and extensions (map with keys id (string), critical (bool), value (string))", + "items": { + "type": "object" + } + } + } + }, + "PkiIssuerSignRevocationListResponse": { + "type": "object", + "properties": { + "crl": { + "type": "string", + "description": "CRL" + } + } + }, + "PkiIssuerSignSelfIssuedRequest": { + "type": "object", + "properties": { + "certificate": { + "type": "string", + "description": "PEM-format self-issued certificate to be signed." + }, + "require_matching_certificate_algorithms": { + "type": "boolean", + "description": "If true, require the public key algorithm of the signer to match that of the self issued certificate.", + "default": false + } + } + }, + "PkiIssuerSignSelfIssuedResponse": { + "type": "object", + "properties": { + "certificate": { + "type": "string", + "description": "Certificate" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing CA" + } + } + }, + "PkiIssuerSignVerbatimRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + }, + "csr": { + "type": "string", + "description": "PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints.", + "default": "" + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "ext_key_usage": { + "type": "array", + "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", + "items": { + "type": "string" + }, + "default": [] + }, + "ext_key_usage_oids": { + "type": "array", + "description": "A comma-separated string or list of extended key usage oids.", + "items": { + "type": "string" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "key_usage": { + "type": "array", + "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", + "items": { + "type": "string" + }, + "default": [ + "DigitalSignature", + "KeyAgreement", + "KeyEncipherment" + ] + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "remove_roots_from_chain": { + "type": "boolean", + "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "default": false + }, + "role": { + "type": "string", + "description": "The desired role with configuration for this request" + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + }, + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", + "default": false + }, + "user_ids": { + "type": "array", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "User ID(s)" + } + } + } + }, + "PkiIssuerSignVerbatimResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "expiration": { + "type": "string", + "description": "Time of expiration" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing Certificate Authority" + }, + "private_key": { + "type": "string", + "description": "Private key" + }, + "private_key_type": { + "type": "string", + "description": "Private key type" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" + } + } + }, + "PkiIssuerSignVerbatimWithRoleRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + }, + "csr": { + "type": "string", + "description": "PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints.", + "default": "" + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "ext_key_usage": { + "type": "array", + "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", + "items": { + "type": "string" + }, + "default": [] + }, + "ext_key_usage_oids": { + "type": "array", + "description": "A comma-separated string or list of extended key usage oids.", + "items": { + "type": "string" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "key_usage": { + "type": "array", + "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", + "items": { + "type": "string" + }, + "default": [ + "DigitalSignature", + "KeyAgreement", + "KeyEncipherment" + ] + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "remove_roots_from_chain": { + "type": "boolean", + "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "default": false + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + }, + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", + "default": false + }, + "user_ids": { + "type": "array", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "User ID(s)" + } + } + } + }, + "PkiIssuerSignVerbatimWithRoleResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "expiration": { + "type": "string", + "description": "Time of expiration" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing Certificate Authority" + }, + "private_key": { + "type": "string", + "description": "Private key" + }, + "private_key_type": { + "type": "string", + "description": "Private key type" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" + } + } + }, + "PkiIssuerSignWithRoleRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + }, + "csr": { + "type": "string", + "description": "PEM-format CSR to be signed.", + "default": "" + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "remove_roots_from_chain": { + "type": "boolean", + "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "default": false + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + }, + "user_ids": { + "type": "array", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "User ID(s)" + } + } + } + }, + "PkiIssuerSignWithRoleResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "expiration": { + "type": "string", + "description": "Time of expiration" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing Certificate Authority" + }, + "private_key": { + "type": "string", + "description": "Private key" + }, + "private_key_type": { + "type": "string", + "description": "Private key type" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" + } + } + }, + "PkiIssuersGenerateIntermediateRequest": { + "type": "object", + "properties": { + "add_basic_constraints": { + "type": "boolean", + "description": "Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services." + }, + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + }, + "country": { + "type": "array", + "description": "If set, Country will be set to this value.", + "items": { + "type": "string" + } + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "key_name": { + "type": "string", + "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" + }, + "key_ref": { + "type": "string", + "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "default": "default" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", + "x-vault-displayAttrs": { + "value": "rsa" + } + }, + "locality": { + "type": "array", + "description": "If set, Locality will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Locality/City" + } + }, + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + }, + "not_after": { + "type": "string", + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + }, + "not_before_duration": { + "type": "integer", + "description": "The duration before now which the certificate needs to be backdated by.", + "format": "seconds", + "default": 30, + "x-vault-displayAttrs": { + "value": 30 + } + }, + "organization": { + "type": "array", + "description": "If set, O (Organization) will be set to this value.", + "items": { + "type": "string" + } + }, + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Other SANs" + } + }, + "ou": { + "type": "array", + "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "OU (Organizational Unit)" + } + }, + "postal_code": { + "type": "array", + "description": "If set, Postal Code will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Postal Code" + } + }, + "private_key_format": { + "type": "string", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", + "x-vault-displayAttrs": { + "value": "der" + } + }, + "province": { + "type": "array", + "description": "If set, Province will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Province/State" + } + }, + "serial_number": { + "type": "string", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "street_address": { + "type": "array", + "description": "If set, Street Address will be set to this value.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Street Address" + } + }, + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } + }, + "uri_sans": { + "type": "array", + "description": "The requested URI SANs, if any, in a comma-delimited list.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" + } + } + } + }, + "PkiIssuersGenerateIntermediateResponse": { + "type": "object", + "properties": { + "csr": { + "type": "string", + "description": "Certificate signing request." + }, + "key_id": { + "type": "string", + "description": "Id of the key." + }, + "private_key": { + "type": "string", + "description": "Generated private key." + }, + "private_key_type": { + "type": "string", + "description": "Specifies the format used for marshaling the private key." + } + } + }, + "PkiIssuersGenerateRootRequest": { + "type": "object", + "properties": { + "alt_names": { + "type": "string", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", + "x-vault-displayAttrs": { + "name": "DNS/Email Subject Alternative Names (SANs)" + } + }, + "common_name": { + "type": "string", + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + }, + "country": { + "type": "array", + "description": "If set, Country will be set to this value.", + "items": { + "type": "string" + } + }, + "exclude_cn_from_sans": { + "type": "boolean", + "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", + "default": false, + "x-vault-displayAttrs": { + "name": "Exclude Common Name from Subject Alternative Names (SANs)" + } + }, + "format": { + "type": "string", + "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", + "enum": [ + "pem", + "der", + "pem_bundle" + ], + "default": "pem", + "x-vault-displayAttrs": { + "value": "pem" + } + }, + "ip_sans": { + "type": "array", + "description": "The requested IP SANs, if any, in a comma-delimited list", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "IP Subject Alternative Names (SANs)" + } + }, + "issuer_name": { + "type": "string", + "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + }, + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", + "default": 0, + "x-vault-displayAttrs": { + "value": 0 + } + }, + "key_name": { + "type": "string", + "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" + }, + "key_ref": { + "type": "string", + "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "default": "default" + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", + "enum": [ + "rsa", + "ec", + "ed25519" + ], + "default": "rsa", "x-vault-displayAttrs": { - "name": "Group Filter" + "value": "rsa" } }, - "insecure_tls": { - "type": "boolean", - "description": "Skip LDAP server SSL Certificate verification - VERY insecure (optional)", + "locality": { + "type": "array", + "description": "If set, Locality will be set to this value.", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "Insecure TLS" + "name": "Locality/City" } }, - "length": { - "type": "integer", - "description": "The desired length of passwords that Vault generates.", - "deprecated": true + "managed_key_id": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." }, - "max_ttl": { + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + }, + "max_path_length": { "type": "integer", - "description": "The maximum password time-to-live.", - "format": "seconds" + "description": "The maximum allowable path length", + "default": -1 }, - "password_policy": { + "not_after": { "type": "string", - "description": "Password policy to use to generate passwords" + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" }, - "request_timeout": { + "not_before_duration": { "type": "integer", - "description": "Timeout, in seconds, for the connection when making requests against the server before returning back an error.", + "description": "The duration before now which the certificate needs to be backdated by.", "format": "seconds", - "default": "90s" + "default": 30, + "x-vault-displayAttrs": { + "value": 30 + } }, - "schema": { - "type": "string", - "description": "The desired LDAP schema used when modifying user account passwords.", - "default": "openldap" + "organization": { + "type": "array", + "description": "If set, O (Organization) will be set to this value.", + "items": { + "type": "string" + } }, - "starttls": { - "type": "boolean", - "description": "Issue a StartTLS command after establishing unencrypted connection (optional)", + "other_sans": { + "type": "array", + "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "Issue StartTLS" + "name": "Other SANs" } }, - "tls_max_version": { - "type": "string", - "description": "Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], - "default": "tls12", + "ou": { + "type": "array", + "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "Maximum TLS Version" + "name": "OU (Organizational Unit)" } }, - "tls_min_version": { - "type": "string", - "description": "Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'", - "enum": [ - "tls10", - "tls11", - "tls12", - "tls13" - ], - "default": "tls12", + "permitted_dns_domains": { + "type": "array", + "description": "Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "Minimum TLS Version" + "name": "Permitted DNS Domains" } }, - "ttl": { - "type": "integer", - "description": "The default password time-to-live.", - "format": "seconds" - }, - "upndomain": { - "type": "string", - "description": "Enables userPrincipalDomain login with [username]@UPNDomain (optional)", + "postal_code": { + "type": "array", + "description": "If set, Postal Code will be set to this value.", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "User Principal (UPN) Domain" + "name": "Postal Code" } }, - "url": { + "private_key_format": { "type": "string", - "description": "LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order.", - "default": "ldap://127.0.0.1", + "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", + "enum": [ + "", + "der", + "pem", + "pkcs8" + ], + "default": "der", "x-vault-displayAttrs": { - "name": "URL" + "value": "der" } }, - "use_pre111_group_cn_behavior": { - "type": "boolean", - "description": "In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations." - }, - "use_token_groups": { - "type": "boolean", - "description": "If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones.", - "default": false - }, - "userattr": { - "type": "string", - "description": "Attribute used for users (default: cn)", - "default": "cn", + "province": { + "type": "array", + "description": "If set, Province will be set to this value.", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "User Attribute", - "value": "cn" + "name": "Province/State" } }, - "userdn": { + "serial_number": { "type": "string", - "description": "LDAP domain to use for users (eg: ou=People,dc=example,dc=org)", + "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + }, + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", + "default": 0, "x-vault-displayAttrs": { - "name": "User DN" + "value": 0 } }, - "userfilter": { - "type": "string", - "description": "Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}})", - "default": "({{.UserAttr}}={{.Username}})", + "street_address": { + "type": "array", + "description": "If set, Street Address will be set to this value.", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "name": "User Search Filter" + "name": "Street Address" } }, - "username_as_alias": { - "type": "boolean", - "description": "If true, sets the alias name to the username", - "default": false - } - } - }, - "OpenLDAPWriteLibraryRequest": { - "type": "object", - "properties": { - "disable_check_in_enforcement": { - "type": "boolean", - "description": "Disable the default behavior of requiring that check-ins are performed by the entity that checked them out.", - "default": false - }, - "max_ttl": { + "ttl": { "type": "integer", - "description": "In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours.", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", "format": "seconds", - "default": 86400 + "x-vault-displayAttrs": { + "name": "TTL" + } }, - "service_account_names": { + "uri_sans": { "type": "array", - "description": "The username/logon name for the service accounts with which this set will be associated.", + "description": "The requested URI SANs, if any, in a comma-delimited list.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "name": "URI Subject Alternative Names (SANs)" } }, - "ttl": { - "type": "integer", - "description": "In seconds, the amount of time a check-out should last. Defaults to 24 hours.", - "format": "seconds", - "default": 86400 + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", + "default": false } } }, - "OpenLDAPWriteRoleRequest": { + "PkiIssuersGenerateRootResponse": { "type": "object", "properties": { - "creation_ldif": { + "certificate": { "type": "string", - "description": "LDIF string used to create new entities within the LDAP system. This LDIF can be templated." + "description": "The generated self-signed CA certificate." }, - "default_ttl": { - "type": "integer", - "description": "Default TTL for dynamic credentials", - "format": "seconds" + "expiration": { + "type": "string", + "description": "The expiration of the given." }, - "deletion_ldif": { + "issuer_id": { "type": "string", - "description": "LDIF string used to delete entities created within the LDAP system. This LDIF can be templated." + "description": "The ID of the issuer" }, - "max_ttl": { - "type": "integer", - "description": "Max TTL a dynamic credential can be extended to", - "format": "seconds" + "issuer_name": { + "type": "string", + "description": "The name of the issuer." }, - "rollback_ldif": { + "issuing_ca": { "type": "string", - "description": "LDIF string used to rollback changes in the event of a failure to create credentials. This LDIF can be templated." + "description": "The issuing certificate authority." }, - "username_template": { + "key_id": { "type": "string", - "description": "The template used to create a username" + "description": "The ID of the key." + }, + "key_name": { + "type": "string", + "description": "The key name if given." + }, + "private_key": { + "type": "string", + "description": "The private key if exported was specified." + }, + "serial_number": { + "type": "string", + "description": "The requested Subject's named serial number." } - }, - "required": [ - "creation_ldif", - "deletion_ldif" - ] + } }, - "OpenLDAPWriteStaticRoleRequest": { + "PkiIssuersImportBundleRequest": { "type": "object", "properties": { - "dn": { + "pem_bundle": { "type": "string", - "description": "The distinguished name of the entry to manage." + "description": "PEM-format, concatenated unencrypted secret-key (optional) and certificates." + } + } + }, + "PkiIssuersImportBundleResponse": { + "type": "object", + "properties": { + "imported_issuers": { + "type": "array", + "description": "Net-new issuers imported as a part of this request", + "items": { + "type": "string" + } }, - "rotation_period": { - "type": "integer", - "description": "Period for automatic credential rotation of the given entry.", - "format": "seconds" + "imported_keys": { + "type": "array", + "description": "Net-new keys imported as a part of this request", + "items": { + "type": "string" + } }, - "username": { - "type": "string", - "description": "The username/logon name for the entry with which this role will be associated." + "mapping": { + "type": "object", + "description": "A mapping of issuer_id to key_id for all issuers included in this request", + "format": "map" } } }, - "PKIBundleWriteRequest": { + "PkiIssuersImportCertRequest": { "type": "object", "properties": { "pem_bundle": { @@ -32287,7 +36133,31 @@ } } }, - "PKIGenerateRootRequest": { + "PkiIssuersImportCertResponse": { + "type": "object", + "properties": { + "imported_issuers": { + "type": "array", + "description": "Net-new issuers imported as a part of this request", + "items": { + "type": "string" + } + }, + "imported_keys": { + "type": "array", + "description": "Net-new keys imported as a part of this request", + "items": { + "type": "string" + } + }, + "mapping": { + "type": "object", + "description": "A mapping of issuer_id to key_id for all issuers included in this request", + "format": "map" + } + } + }, + "PkiIssuersRotateRootRequest": { "type": "object", "properties": { "alt_names": { @@ -32527,1290 +36397,1409 @@ } } }, - "PKIImportKeysRequest": { + "PkiIssuersRotateRootResponse": { "type": "object", "properties": { + "certificate": { + "type": "string", + "description": "The generated self-signed CA certificate." + }, + "expiration": { + "type": "string", + "description": "The expiration of the given." + }, + "issuer_id": { + "type": "string", + "description": "The ID of the issuer" + }, + "issuer_name": { + "type": "string", + "description": "The name of the issuer." + }, + "issuing_ca": { + "type": "string", + "description": "The issuing certificate authority." + }, + "key_id": { + "type": "string", + "description": "The ID of the key." + }, "key_name": { "type": "string", - "description": "Optional name to be used for this key" + "description": "The key name if given." }, - "pem_bundle": { + "private_key": { "type": "string", - "description": "PEM-format, unencrypted secret key" + "description": "The private key if exported was specified." + }, + "serial_number": { + "type": "string", + "description": "The requested Subject's named serial number." } } }, - "PKIIssuerIssueRoleRequest": { + "PkiListCertsResponse": { "type": "object", "properties": { - "alt_names": { + "keys": { + "type": "array", + "description": "A list of keys", + "items": { + "type": "string" + } + } + } + }, + "PkiListIssuersResponse": { + "type": "object", + "properties": { + "key_info": { + "type": "object", + "description": "Key info with issuer name", + "format": "map" + }, + "keys": { + "type": "array", + "description": "A list of keys", + "items": { + "type": "string" + } + } + } + }, + "PkiListKeysResponse": { + "type": "object", + "properties": { + "key_info": { + "type": "object", + "description": "Key info with issuer name", + "format": "map" + }, + "keys": { + "type": "array", + "description": "A list of keys", + "items": { + "type": "string" + } + } + } + }, + "PkiListRevokedCertsResponse": { + "type": "object", + "properties": { + "keys": { + "type": "array", + "description": "List of Keys", + "items": { + "type": "string" + } + } + } + }, + "PkiListRolesResponse": { + "type": "object", + "properties": { + "keys": { + "type": "object", + "description": "List of keys", + "format": "map" + } + } + }, + "PkiPatchIssuerResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "CA Chain", + "items": { + "type": "string" + } + }, + "certificate": { "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" + "description": "Certificate" + }, + "crl_distribution_points": { + "type": "array", + "description": "CRL Distribution Points", + "items": { + "type": "string" } }, - "common_name": { + "issuer_id": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + "description": "Issuer Id" }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" + "issuer_name": { + "type": "string", + "description": "Issuer Name" + }, + "issuing_certificates": { + "type": "array", + "description": "Issuing Certificates", + "items": { + "type": "string" } }, - "format": { + "key_id": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" + "description": "Key Id" + }, + "leaf_not_after_behavior": { + "type": "string", + "description": "Leaf Not After Behavior" + }, + "manual_chain": { + "type": "array", + "description": "Manual Chain", + "items": { + "type": "string" } }, - "ip_sans": { + "ocsp_servers": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "OSCP Servers", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "not_after": { + "revocation_signature_algorithm": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Revocation Signature Alogrithm" }, - "other_sans": { + "revocation_time": { + "type": "integer" + }, + "revocation_time_rfc3339": { + "type": "string" + }, + "revoked": { + "type": "boolean", + "description": "Revoked" + }, + "usage": { "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "Usage", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } + } + } + }, + "PkiPatchRoleResponse": { + "type": "object", + "properties": { + "allow_any_name": { + "type": "boolean", + "description": "If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information." }, - "private_key_format": { - "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" + "allow_bare_domains": { + "type": "boolean", + "description": "If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information." + }, + "allow_glob_domains": { + "type": "boolean", + "description": "If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information." + }, + "allow_ip_sans": { + "type": "boolean", + "description": "If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed." + }, + "allow_localhost": { + "type": "boolean", + "description": "Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value." + }, + "allow_subdomains": { + "type": "boolean", + "description": "If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information." + }, + "allow_token_displayname": { + "type": "boolean", + "description": "Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value." + }, + "allow_wildcard_certificates": { + "type": "boolean", + "description": "If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information." + }, + "allowed_domains": { + "type": "array", + "description": "Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains.", + "items": { + "type": "string" } }, - "remove_roots_from_chain": { + "allowed_domains_template": { "type": "boolean", - "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", - "default": false + "description": "If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted." }, - "serial_number": { - "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + "allowed_other_sans": { + "type": "array", + "description": "If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format ;:. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8).", + "items": { + "type": "string" + } }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" + "allowed_serial_numbers": { + "type": "array", + "description": "If set, an array of allowed serial numbers to put in Subject. These values support globbing.", + "items": { + "type": "string" } }, - "uri_sans": { + "allowed_uri_sans": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" } - } - } - }, - "PKIIssuerResignCRLsRequest": { - "type": "object", - "properties": { - "crl_number": { - "type": "integer", - "description": "The sequence number to be written within the CRL Number extension." }, - "crls": { + "allowed_uri_sans_template": { + "type": "boolean", + "description": "If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted." + }, + "allowed_user_ids": { "type": "array", - "description": "A list of PEM encoded CRLs to combine, originally signed by the requested issuer.", + "description": "If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1", "items": { "type": "string" } }, - "delta_crl_base_number": { - "type": "integer", - "description": "Using a zero or greater value specifies the base CRL revision number to encode within a Delta CRL indicator extension, otherwise the extension will not be added.", - "default": -1 + "basic_constraints_valid_for_non_ca": { + "type": "boolean", + "description": "Mark Basic Constraints valid when issuing non-CA certificates." }, - "format": { - "type": "string", - "description": "The format of the combined CRL, can be \"pem\" or \"der\". If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "default": "pem" + "client_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12." }, - "next_update": { - "type": "string", - "description": "The amount of time the generated CRL should be valid; defaults to 72 hours.", - "default": "72h" - } - } - }, - "PKIIssuerSignIntermediateRequest": { - "type": "object", - "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" + "cn_validations": { + "type": "array", + "description": "List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs.", + "items": { + "type": "string" } }, - "common_name": { - "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + "code_signing_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12." }, "country": { "type": "array", - "description": "If set, Country will be set to this value.", + "description": "If set, Country will be set to this value in certificates issued by this role.", "items": { "type": "string" } }, - "csr": { - "type": "string", - "description": "PEM-format CSR to be signed.", - "default": "" + "email_protection_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12." }, - "exclude_cn_from_sans": { + "enforce_hostnames": { "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } + "description": "If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true." }, - "format": { - "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" + "ext_key_usage": { + "type": "array", + "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12.", + "items": { + "type": "string" } }, - "ip_sans": { + "ext_key_usage_oids": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "A comma-separated string or list of extended key usage oids.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "issuer_name": { + "generate_lease": { + "type": "boolean", + "description": "If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke \" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault." + }, + "issuer_ref": { "type": "string", - "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + "description": "Reference to the issuer used to sign requests serviced by this role." + }, + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519." + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values." + }, + "key_usage": { + "type": "array", + "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3.", + "items": { + "type": "string" + } }, "locality": { "type": "array", - "description": "If set, Locality will be set to this value.", + "description": "If set, Locality will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Locality/City" } }, - "max_path_length": { + "max_ttl": { "type": "integer", - "description": "The maximum allowable path length", - "default": -1 + "description": "The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL.", + "format": "seconds" + }, + "no_store": { + "type": "boolean", + "description": "If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\"." }, "not_after": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ." }, "not_before_duration": { "type": "integer", "description": "The duration before now which the certificate needs to be backdated by.", - "format": "seconds", - "default": 30, - "x-vault-displayAttrs": { - "value": 30 - } + "format": "seconds" }, "organization": { "type": "array", - "description": "If set, O (Organization) will be set to this value.", - "items": { - "type": "string" - } - }, - "other_sans": { - "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "If set, O (Organization) will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } }, "ou": { "type": "array", - "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "description": "If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "OU (Organizational Unit)" } }, - "permitted_dns_domains": { + "policy_identifiers": { "type": "array", - "description": "Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).", + "description": "A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}].", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Permitted DNS Domains" } }, "postal_code": { "type": "array", - "description": "If set, Postal Code will be set to this value.", + "description": "If set, Postal Code will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Postal Code" - } - }, - "private_key_format": { - "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" } }, "province": { "type": "array", - "description": "If set, Province will be set to this value.", + "description": "If set, Province will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Province/State" } }, - "serial_number": { - "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + "require_cn": { + "type": "boolean", + "description": "If set to false, makes the 'common_name' field optional while generating a certificate." + }, + "server_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12.", + "default": true }, "signature_bits": { "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } - }, - "skid": { - "type": "string", - "description": "Value for the Subject Key Identifier field (RFC 5280 Section 4.2.1.2). This value should ONLY be used when cross-signing to mimic the existing certificate's SKID value; this is necessary to allow certain TLS implementations (such as OpenSSL) which use SKID/AKID matches in chain building to restrict possible valid chains. Specified as a string in hex format. Default is empty, allowing Vault to automatically calculate the SKID according to method one in the above RFC section.", - "default": "", - "x-vault-displayAttrs": { - "value": "" - } + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves)." }, "street_address": { "type": "array", - "description": "If set, Street Address will be set to this value.", + "description": "If set, Street Address will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Street Address" } }, "ttl": { "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } + "description": "The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter.", + "format": "seconds" }, - "uri_sans": { - "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" - } + "use_csr_common_name": { + "type": "boolean", + "description": "If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true." }, - "use_csr_values": { + "use_csr_sans": { "type": "boolean", - "description": "If true, then: 1) Subject information, including names and alternate names, will be preserved from the CSR rather than using values provided in the other parameters to this path; 2) Any key usages requested in the CSR will be added to the basic set of key usages used for CA certs signed by this path; for instance, the non-repudiation flag; 3) Extensions requested in the CSR will be copied into the issued certificate.", - "default": false + "description": "If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true." }, "use_pss": { "type": "boolean", - "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", - "default": false + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false." } } }, - "PKIIssuerSignRevocationListRequest": { + "PkiReadAutoTidyConfigurationResponse": { "type": "object", "properties": { - "crl_number": { + "enabled": { + "type": "boolean", + "description": "Specifies whether automatic tidy is enabled or not" + }, + "interval_duration": { "type": "integer", - "description": "The sequence number to be written within the CRL Number extension." + "description": "Specifies the duration between automatic tidy operation" }, - "delta_crl_base_number": { + "issuer_safety_buffer": { "type": "integer", - "description": "Using a zero or greater value specifies the base CRL revision number to encode within a Delta CRL indicator extension, otherwise the extension will not be added.", - "default": -1 + "description": "Issuer safety buffer" }, - "extensions": { + "maintain_stored_certificate_counts": { + "type": "boolean" + }, + "pause_duration": { + "type": "string", + "description": "Duration to pause between tidying certificates" + }, + "publish_stored_certificate_count_metrics": { + "type": "boolean" + }, + "revocation_queue_safety_buffer": { + "type": "integer", + "format": "seconds" + }, + "safety_buffer": { + "type": "integer", + "description": "Safety buffer time duration" + }, + "tidy_cert_store": { + "type": "boolean", + "description": "Specifies whether to tidy up the certificate store" + }, + "tidy_cross_cluster_revoked_certs": { + "type": "boolean" + }, + "tidy_expired_issuers": { + "type": "boolean", + "description": "Specifies whether tidy expired issuers" + }, + "tidy_move_legacy_ca_bundle": { + "type": "boolean" + }, + "tidy_revocation_queue": { + "type": "boolean" + }, + "tidy_revoked_cert_issuer_associations": { + "type": "boolean", + "description": "Specifies whether to associate revoked certificates with their corresponding issuers" + }, + "tidy_revoked_certs": { + "type": "boolean", + "description": "Specifies whether to remove all invalid and expired certificates from storage" + } + } + }, + "PkiReadCaChainPemResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "A list of maps containing extensions with keys id (string), critical (bool), value (string)", + "description": "Issuing CA Chain", "items": { - "type": "object" + "type": "string" } }, - "format": { + "certificate": { "type": "string", - "description": "The format of the combined CRL, can be \"pem\" or \"der\". If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "default": "pem" + "description": "Certificate" }, - "next_update": { + "issuer_id": { "type": "string", - "description": "The amount of time the generated CRL should be valid; defaults to 72 hours.", - "default": "72h" + "description": "ID of the issuer" }, - "revoked_certs": { + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCaDerResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "A list of maps containing the keys serial_number (string), revocation_time (string), and extensions (map with keys id (string), critical (bool), value (string))", + "description": "Issuing CA Chain", "items": { - "type": "object" + "type": "string" } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" } } }, - "PKIIssuerSignRoleRequest": { + "PkiReadCaPemResponse": { "type": "object", "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" + "ca_chain": { + "type": "array", + "description": "Issuing CA Chain", + "items": { + "type": "string" } }, - "common_name": { + "certificate": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + "description": "Certificate" }, - "csr": { + "issuer_id": { "type": "string", - "description": "PEM-format CSR to be signed.", - "default": "" + "description": "ID of the issuer" }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } + "revocation_time": { + "type": "string", + "description": "Revocation time" }, - "format": { + "revocation_time_rfc3339": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCertCaChainResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Issuing CA Chain", + "items": { + "type": "string" } }, - "ip_sans": { + "certificate": { + "type": "string", + "description": "Certificate" + }, + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCertCrlResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "Issuing CA Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "not_after": { + "certificate": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Certificate" }, - "other_sans": { + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCertDeltaCrlResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "Issuing CA Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } }, - "private_key_format": { + "certificate": { "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" + "description": "Certificate" + }, + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCertRawDerResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Issuing CA Chain", + "items": { + "type": "string" } }, - "remove_roots_from_chain": { - "type": "boolean", - "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", - "default": false + "certificate": { + "type": "string", + "description": "Certificate" }, - "serial_number": { + "issuer_id": { "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + "description": "ID of the issuer" }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCertRawPemResponse": { + "type": "object", + "properties": { + "ca_chain": { + "type": "array", + "description": "Issuing CA Chain", + "items": { + "type": "string" } }, - "uri_sans": { + "certificate": { + "type": "string", + "description": "Certificate" + }, + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCertResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "Issuing CA Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadClusterConfigurationResponse": { + "type": "object", + "properties": { + "aia_path": { + "type": "string", + "description": "Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki" + }, + "path": { + "type": "string", + "description": "Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki" + } + } + }, + "PkiReadCrlConfigurationResponse": { + "type": "object", + "properties": { + "auto_rebuild": { + "type": "boolean", + "description": "If set to true, enables automatic rebuilding of the CRL" + }, + "auto_rebuild_grace_period": { + "type": "string", + "description": "The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h." + }, + "cross_cluster_revocation": { + "type": "boolean", + "description": "Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true." + }, + "delta_rebuild_interval": { + "type": "string", + "description": "The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m." + }, + "disable": { + "type": "boolean", + "description": "If set to true, disables generating the CRL entirely." + }, + "enable_delta": { + "type": "boolean", + "description": "Whether to enable delta CRLs between authoritative CRL rebuilds" + }, + "expiry": { + "type": "string", + "description": "The amount of time the generated CRL should be valid; defaults to 72 hours" + }, + "ocsp_disable": { + "type": "boolean", + "description": "If set to true, ocsp unauthorized responses will be returned." + }, + "ocsp_expiry": { + "type": "string", + "description": "The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours" + }, + "unified_crl": { + "type": "boolean", + "description": "If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP." + }, + "unified_crl_on_existing_paths": { + "type": "boolean", + "description": "If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data" } } }, - "PKIIssuerSignSelfIssuedRequest": { + "PkiReadCrlDeltaPemResponse": { "type": "object", "properties": { + "ca_chain": { + "type": "array", + "description": "Issuing CA Chain", + "items": { + "type": "string" + } + }, "certificate": { "type": "string", - "description": "PEM-format self-issued certificate to be signed." + "description": "Certificate" }, - "require_matching_certificate_algorithms": { - "type": "boolean", - "description": "If true, require the public key algorithm of the signer to match that of the self issued certificate.", - "default": false + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" } } }, - "PKIIssuerSignVerbatimRequest": { + "PkiReadCrlDeltaResponse": { "type": "object", "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" + "ca_chain": { + "type": "array", + "description": "Issuing CA Chain", + "items": { + "type": "string" } }, - "common_name": { + "certificate": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + "description": "Certificate" }, - "csr": { + "issuer_id": { "type": "string", - "description": "PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints.", - "default": "" - }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } + "description": "ID of the issuer" }, - "ext_key_usage": { - "type": "array", - "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", - "items": { - "type": "string" - }, - "default": [] + "revocation_time": { + "type": "string", + "description": "Revocation time" }, - "ext_key_usage_oids": { + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCrlDerResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "A comma-separated string or list of extended key usage oids.", + "description": "Issuing CA Chain", "items": { "type": "string" } }, - "format": { + "certificate": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" - } + "description": "Certificate" }, - "ip_sans": { + "issuer_id": { + "type": "string", + "description": "ID of the issuer" + }, + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadCrlPemResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "Issuing CA Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "key_usage": { - "type": "array", - "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", - "items": { - "type": "string" - }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ] + "certificate": { + "type": "string", + "description": "Certificate" }, - "not_after": { + "issuer_id": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "ID of the issuer" }, - "other_sans": { + "revocation_time": { + "type": "string", + "description": "Revocation time" + }, + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation time RFC 3339 formatted" + } + } + }, + "PkiReadIssuerDerResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "CA Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } }, - "private_key_format": { + "certificate": { "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" - } - }, - "remove_roots_from_chain": { - "type": "boolean", - "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", - "default": false + "description": "Certificate" }, - "role": { + "issuer_id": { "type": "string", - "description": "The desired role with configuration for this request" + "description": "Issuer Id" }, - "serial_number": { + "issuer_name": { "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." - }, - "signature_bits": { - "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } - }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } - }, - "uri_sans": { + "description": "Issuer Name" + } + } + }, + "PkiReadIssuerJsonResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "CA Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" } }, - "use_pss": { - "type": "boolean", - "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", - "default": false + "certificate": { + "type": "string", + "description": "Certificate" + }, + "issuer_id": { + "type": "string", + "description": "Issuer Id" + }, + "issuer_name": { + "type": "string", + "description": "Issuer Name" } } }, - "PKIIssuerSignVerbatimRoleRequest": { + "PkiReadIssuerPemResponse": { "type": "object", "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" + "ca_chain": { + "type": "array", + "description": "CA Chain", + "items": { + "type": "string" } }, - "common_name": { + "certificate": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + "description": "Certificate" }, - "csr": { + "issuer_id": { "type": "string", - "description": "PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints.", - "default": "" - }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } + "description": "Issuer Id" }, - "ext_key_usage": { + "issuer_name": { + "type": "string", + "description": "Issuer Name" + } + } + }, + "PkiReadIssuerResponse": { + "type": "object", + "properties": { + "ca_chain": { "type": "array", - "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", + "description": "CA Chain", "items": { "type": "string" - }, - "default": [] + } }, - "ext_key_usage_oids": { + "certificate": { + "type": "string", + "description": "Certificate" + }, + "crl_distribution_points": { "type": "array", - "description": "A comma-separated string or list of extended key usage oids.", + "description": "CRL Distribution Points", "items": { "type": "string" } }, - "format": { + "issuer_id": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" - } + "description": "Issuer Id" }, - "ip_sans": { + "issuer_name": { + "type": "string", + "description": "Issuer Name" + }, + "issuing_certificates": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "Issuing Certificates", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "key_usage": { - "type": "array", - "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", - "items": { - "type": "string" - }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ] + "key_id": { + "type": "string", + "description": "Key Id" }, - "not_after": { + "leaf_not_after_behavior": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Leaf Not After Behavior" }, - "other_sans": { + "manual_chain": { "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "Manual Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } }, - "private_key_format": { - "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" + "ocsp_servers": { + "type": "array", + "description": "OSCP Servers", + "items": { + "type": "string" } }, - "remove_roots_from_chain": { - "type": "boolean", - "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", - "default": false - }, - "serial_number": { + "revocation_signature_algorithm": { "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + "description": "Revocation Signature Alogrithm" }, - "signature_bits": { - "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } + "revocation_time": { + "type": "integer" }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } + "revocation_time_rfc3339": { + "type": "string" }, - "uri_sans": { + "revoked": { + "type": "boolean", + "description": "Revoked" + }, + "usage": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "Usage", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" } - }, - "use_pss": { - "type": "boolean", - "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", - "default": false } } }, - "PKIIssuersGenerateIntermediateRequest": { + "PkiReadIssuersConfigurationResponse": { "type": "object", "properties": { - "add_basic_constraints": { - "type": "boolean", - "description": "Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services." - }, - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" - } - }, - "common_name": { + "default": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." - }, - "country": { - "type": "array", - "description": "If set, Country will be set to this value.", - "items": { - "type": "string" - } + "description": "Reference (name or identifier) to the default issuer." }, - "exclude_cn_from_sans": { + "default_follows_latest_issuer": { "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } - }, - "format": { + "description": "Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false." + } + } + }, + "PkiReadKeyResponse": { + "type": "object", + "properties": { + "key_id": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" - } - }, - "ip_sans": { - "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" - } - }, - "key_bits": { - "type": "integer", - "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } + "description": "Key Id" }, "key_name": { "type": "string", - "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" - }, - "key_ref": { - "type": "string", - "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", - "default": "default" + "description": "Key Name" }, "key_type": { "type": "string", - "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], - "default": "rsa", - "x-vault-displayAttrs": { - "value": "rsa" - } - }, - "locality": { - "type": "array", - "description": "If set, Locality will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Locality/City" - } + "description": "Key Type" }, "managed_key_id": { "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + "description": "Managed Key Id" }, "managed_key_name": { "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." - }, - "not_after": { + "description": "Managed Key Name" + } + } + }, + "PkiReadKeysConfigurationResponse": { + "type": "object", + "properties": { + "default": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Reference (name or identifier) to the default issuer." + } + } + }, + "PkiReadRoleResponse": { + "type": "object", + "properties": { + "allow_any_name": { + "type": "boolean", + "description": "If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information." }, - "not_before_duration": { - "type": "integer", - "description": "The duration before now which the certificate needs to be backdated by.", - "format": "seconds", - "default": 30, - "x-vault-displayAttrs": { - "value": 30 - } + "allow_bare_domains": { + "type": "boolean", + "description": "If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information." }, - "organization": { - "type": "array", - "description": "If set, O (Organization) will be set to this value.", - "items": { - "type": "string" - } + "allow_glob_domains": { + "type": "boolean", + "description": "If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information." }, - "other_sans": { + "allow_ip_sans": { + "type": "boolean", + "description": "If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed." + }, + "allow_localhost": { + "type": "boolean", + "description": "Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value." + }, + "allow_subdomains": { + "type": "boolean", + "description": "If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information." + }, + "allow_token_displayname": { + "type": "boolean", + "description": "Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value." + }, + "allow_wildcard_certificates": { + "type": "boolean", + "description": "If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information." + }, + "allowed_domains": { "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } }, - "ou": { + "allowed_domains_template": { + "type": "boolean", + "description": "If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted." + }, + "allowed_other_sans": { "type": "array", - "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "description": "If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format ;:. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8).", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "OU (Organizational Unit)" } }, - "postal_code": { + "allowed_serial_numbers": { "type": "array", - "description": "If set, Postal Code will be set to this value.", + "description": "If set, an array of allowed serial numbers to put in Subject. These values support globbing.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Postal Code" - } - }, - "private_key_format": { - "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" } }, - "province": { + "allowed_uri_sans": { "type": "array", - "description": "If set, Province will be set to this value.", + "description": "If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Province/State" - } - }, - "serial_number": { - "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." - }, - "signature_bits": { - "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 } }, - "street_address": { + "allowed_uri_sans_template": { + "type": "boolean", + "description": "If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted." + }, + "allowed_user_ids": { "type": "array", - "description": "If set, Street Address will be set to this value.", + "description": "If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Street Address" } }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } + "basic_constraints_valid_for_non_ca": { + "type": "boolean", + "description": "Mark Basic Constraints valid when issuing non-CA certificates." }, - "uri_sans": { + "client_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12." + }, + "cn_validations": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" - } - } - } - }, - "PKIIssuersGenerateRootRequest": { - "type": "object", - "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" } }, - "common_name": { - "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + "code_signing_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12." }, "country": { "type": "array", - "description": "If set, Country will be set to this value.", + "description": "If set, Country will be set to this value in certificates issued by this role.", "items": { "type": "string" } }, - "exclude_cn_from_sans": { + "email_protection_flag": { "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } + "description": "If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12." }, - "format": { - "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" + "enforce_hostnames": { + "type": "boolean", + "description": "If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true." + }, + "ext_key_usage": { + "type": "array", + "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12.", + "items": { + "type": "string" } }, - "ip_sans": { + "ext_key_usage_oids": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "A comma-separated string or list of extended key usage oids.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "issuer_name": { + "generate_lease": { + "type": "boolean", + "description": "If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke \" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault." + }, + "issuer_ref": { "type": "string", - "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + "description": "Reference to the issuer used to sign requests serviced by this role." }, "key_bits": { "type": "integer", - "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } - }, - "key_name": { - "type": "string", - "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" - }, - "key_ref": { - "type": "string", - "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", - "default": "default" + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519." }, "key_type": { "type": "string", - "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], - "default": "rsa", - "x-vault-displayAttrs": { - "value": "rsa" + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values." + }, + "key_usage": { + "type": "array", + "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3.", + "items": { + "type": "string" } }, "locality": { "type": "array", - "description": "If set, Locality will be set to this value.", + "description": "If set, Locality will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Locality/City" } }, - "managed_key_id": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." - }, - "managed_key_name": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." - }, - "max_path_length": { + "max_ttl": { "type": "integer", - "description": "The maximum allowable path length", - "default": -1 + "description": "The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL.", + "format": "seconds" + }, + "no_store": { + "type": "boolean", + "description": "If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\"." }, "not_after": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ." }, "not_before_duration": { "type": "integer", "description": "The duration before now which the certificate needs to be backdated by.", - "format": "seconds", - "default": 30, - "x-vault-displayAttrs": { - "value": 30 - } + "format": "seconds" }, "organization": { "type": "array", - "description": "If set, O (Organization) will be set to this value.", - "items": { - "type": "string" - } - }, - "other_sans": { - "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "If set, O (Organization) will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } }, "ou": { "type": "array", - "description": "If set, OU (OrganizationalUnit) will be set to this value.", + "description": "If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "OU (Organizational Unit)" } }, - "permitted_dns_domains": { + "policy_identifiers": { "type": "array", - "description": "Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).", + "description": "A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}].", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Permitted DNS Domains" } }, "postal_code": { "type": "array", - "description": "If set, Postal Code will be set to this value.", + "description": "If set, Postal Code will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Postal Code" - } - }, - "private_key_format": { - "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" } }, "province": { "type": "array", - "description": "If set, Province will be set to this value.", + "description": "If set, Province will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Province/State" } }, - "serial_number": { - "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + "require_cn": { + "type": "boolean", + "description": "If set to false, makes the 'common_name' field optional while generating a certificate." + }, + "server_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12.", + "default": true }, "signature_bits": { "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves)." }, "street_address": { "type": "array", - "description": "If set, Street Address will be set to this value.", + "description": "If set, Street Address will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Street Address" } }, "ttl": { "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } + "description": "The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter.", + "format": "seconds" }, - "uri_sans": { + "use_csr_common_name": { + "type": "boolean", + "description": "If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true." + }, + "use_csr_sans": { + "type": "boolean", + "description": "If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true." + }, + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false." + } + } + }, + "PkiReadUrlsConfigurationResponse": { + "type": "object", + "properties": { + "crl_distribution_points": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" } }, - "use_pss": { + "enable_templating": { "type": "boolean", - "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", - "default": false + "description": "Whether or not to enable templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URI validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters." + }, + "issuing_certificates": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1.", + "items": { + "type": "string" + } + }, + "ocsp_servers": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1.", + "items": { + "type": "string" + } } } }, - "PKIReplaceRootRequest": { + "PkiReplaceRootRequest": { "type": "object", "properties": { "default": { @@ -33820,281 +37809,169 @@ } } }, - "PKIRevokeRequest": { - "type": "object", - "properties": { - "certificate": { - "type": "string", - "description": "Certificate to revoke in PEM format; must be signed by an issuer in this mount." - }, - "serial_number": { - "type": "string", - "description": "Certificate serial number, in colon- or hyphen-separated octal" - } - } - }, - "PKIRevokeWithKeyRequest": { + "PkiReplaceRootResponse": { "type": "object", "properties": { - "certificate": { - "type": "string", - "description": "Certificate to revoke in PEM format; must be signed by an issuer in this mount." - }, - "private_key": { + "default": { "type": "string", - "description": "Key to use to verify revocation permission; must be in PEM format." + "description": "Reference (name or identifier) to the default issuer." }, - "serial_number": { - "type": "string", - "description": "Certificate serial number, in colon- or hyphen-separated octal" + "default_follows_latest_issuer": { + "type": "boolean", + "description": "Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false." } } }, - "PKIRootSignIntermediateRequest": { + "PkiRevokeIssuerResponse": { "type": "object", "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" - } - }, - "common_name": { - "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." - }, - "country": { + "ca_chain": { "type": "array", - "description": "If set, Country will be set to this value.", + "description": "Certificate Authority Chain", "items": { "type": "string" } }, - "csr": { - "type": "string", - "description": "PEM-format CSR to be signed.", - "default": "" - }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } - }, - "format": { + "certificate": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" - } + "description": "Certificate" }, - "ip_sans": { + "crl_distribution_points": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "Specifies the URL values for the CRL Distribution Points field", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "issuer_name": { + "issuer_id": { "type": "string", - "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + "description": "ID of the issuer" }, - "issuer_ref": { + "issuer_name": { "type": "string", - "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", - "default": "default" + "description": "Name of the issuer" }, - "locality": { + "issuing_certificates": { "type": "array", - "description": "If set, Locality will be set to this value.", + "description": "Specifies the URL values for the Issuing Certificate field", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Locality/City" } }, - "max_path_length": { - "type": "integer", - "description": "The maximum allowable path length", - "default": -1 - }, - "not_after": { + "key_id": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" - }, - "not_before_duration": { - "type": "integer", - "description": "The duration before now which the certificate needs to be backdated by.", - "format": "seconds", - "default": 30, - "x-vault-displayAttrs": { - "value": 30 - } - }, - "organization": { - "type": "array", - "description": "If set, O (Organization) will be set to this value.", - "items": { - "type": "string" - } - }, - "other_sans": { - "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" - } + "description": "ID of the Key" }, - "ou": { - "type": "array", - "description": "If set, OU (OrganizationalUnit) will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "OU (Organizational Unit)" - } + "leaf_not_after_behavior": { + "type": "string" }, - "permitted_dns_domains": { + "manual_chain": { "type": "array", - "description": "Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).", + "description": "Manual Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Permitted DNS Domains" } }, - "postal_code": { + "ocsp_servers": { "type": "array", - "description": "If set, Postal Code will be set to this value.", + "description": "Specifies the URL values for the OCSP Servers field", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Postal Code" } }, - "private_key_format": { + "revocation_signature_algorithm": { "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" - } + "description": "Which signature algorithm to use when building CRLs" }, - "province": { - "type": "array", - "description": "If set, Province will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Province/State" - } + "revocation_time": { + "type": "integer", + "description": "Time of revocation", + "format": "int64" }, - "serial_number": { + "revocation_time_rfc3339": { "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + "description": "RFC formatted time of revocation", + "format": "date-time" }, - "signature_bits": { - "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } + "revoked": { + "type": "boolean", + "description": "Whether the issuer was revoked" }, - "skid": { + "usage": { "type": "string", - "description": "Value for the Subject Key Identifier field (RFC 5280 Section 4.2.1.2). This value should ONLY be used when cross-signing to mimic the existing certificate's SKID value; this is necessary to allow certain TLS implementations (such as OpenSSL) which use SKID/AKID matches in chain building to restrict possible valid chains. Specified as a string in hex format. Default is empty, allowing Vault to automatically calculate the SKID according to method one in the above RFC section.", - "default": "", - "x-vault-displayAttrs": { - "value": "" - } - }, - "street_address": { - "type": "array", - "description": "If set, Street Address will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Street Address" - } + "description": "Allowed usage" + } + } + }, + "PkiRevokeRequest": { + "type": "object", + "properties": { + "certificate": { + "type": "string", + "description": "Certificate to revoke in PEM format; must be signed by an issuer in this mount." }, - "ttl": { + "serial_number": { + "type": "string", + "description": "Certificate serial number, in colon- or hyphen-separated octal" + } + } + }, + "PkiRevokeResponse": { + "type": "object", + "properties": { + "revocation_time": { "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } - }, - "uri_sans": { - "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" - } + "description": "Revocation Time", + "format": "seconds" }, - "use_csr_values": { - "type": "boolean", - "description": "If true, then: 1) Subject information, including names and alternate names, will be preserved from the CSR rather than using values provided in the other parameters to this path; 2) Any key usages requested in the CSR will be added to the basic set of key usages used for CA certs signed by this path; for instance, the non-repudiation flag; 3) Extensions requested in the CSR will be copied into the issued certificate.", - "default": false + "revocation_time_rfc3339": { + "type": "string", + "description": "Revocation Time", + "format": "date-time" }, - "use_pss": { - "type": "boolean", - "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", - "default": false + "state": { + "type": "string", + "description": "Revocation State" } } }, - "PKIRootSignSelfIssuedRequest": { + "PkiRevokeWithKeyRequest": { "type": "object", "properties": { "certificate": { "type": "string", - "description": "PEM-format self-issued certificate to be signed." + "description": "Certificate to revoke in PEM format; must be signed by an issuer in this mount." + }, + "private_key": { + "type": "string", + "description": "Key to use to verify revocation permission; must be in PEM format." + }, + "serial_number": { + "type": "string", + "description": "Certificate serial number, in colon- or hyphen-separated octal" + } + } + }, + "PkiRevokeWithKeyResponse": { + "type": "object", + "properties": { + "revocation_time": { + "type": "integer", + "description": "Revocation Time", + "format": "seconds" }, - "issuer_ref": { + "revocation_time_rfc3339": { "type": "string", - "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", - "default": "default" + "description": "Revocation Time", + "format": "date-time" }, - "require_matching_certificate_algorithms": { - "type": "boolean", - "description": "If true, require the public key algorithm of the signer to match that of the self issued certificate.", - "default": false + "state": { + "type": "string", + "description": "Revocation State" } } }, - "PKIRotateRootRequest": { + "PkiRootSignIntermediateRequest": { "type": "object", "properties": { "alt_names": { @@ -34115,6 +37992,11 @@ "type": "string" } }, + "csr": { + "type": "string", + "description": "PEM-format CSR to be signed.", + "default": "" + }, "exclude_cn_from_sans": { "type": "boolean", "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", @@ -34150,36 +38032,11 @@ "type": "string", "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" }, - "key_bits": { - "type": "integer", - "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } - }, - "key_name": { - "type": "string", - "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" - }, - "key_ref": { + "issuer_ref": { "type": "string", - "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "default": "default" }, - "key_type": { - "type": "string", - "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], - "default": "rsa", - "x-vault-displayAttrs": { - "value": "rsa" - } - }, "locality": { "type": "array", "description": "If set, Locality will be set to this value.", @@ -34190,14 +38047,6 @@ "name": "Locality/City" } }, - "managed_key_id": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." - }, - "managed_key_name": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." - }, "max_path_length": { "type": "integer", "description": "The maximum allowable path length", @@ -34299,6 +38148,14 @@ "value": 0 } }, + "skid": { + "type": "string", + "description": "Value for the Subject Key Identifier field (RFC 5280 Section 4.2.1.2). This value should ONLY be used when cross-signing to mimic the existing certificate's SKID value; this is necessary to allow certain TLS implementations (such as OpenSSL) which use SKID/AKID matches in chain building to restrict possible valid chains. Specified as a string in hex format. Default is empty, allowing Vault to automatically calculate the SKID according to method one in the above RFC section.", + "default": "", + "x-vault-displayAttrs": { + "value": "" + } + }, "street_address": { "type": "array", "description": "If set, Street Address will be set to this value.", @@ -34327,6 +38184,11 @@ "name": "URI Subject Alternative Names (SANs)" } }, + "use_csr_values": { + "type": "boolean", + "description": "If true, then: 1) Subject information, including names and alternate names, will be preserved from the CSR rather than using values provided in the other parameters to this path; 2) Any key usages requested in the CSR will be added to the basic set of key usages used for CA certs signed by this path; for instance, the non-repudiation flag; 3) Extensions requested in the CSR will be copied into the issued certificate.", + "default": false + }, "use_pss": { "type": "boolean", "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", @@ -34334,275 +38196,119 @@ } } }, - "PKISignRoleRequest": { + "PkiRootSignIntermediateResponse": { "type": "object", "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" - } - }, - "common_name": { - "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." - }, - "csr": { - "type": "string", - "description": "PEM-format CSR to be signed.", - "default": "" - }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } - }, - "format": { - "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" - } - }, - "ip_sans": { + "ca_chain": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "CA Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "issuer_ref": { - "type": "string", - "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", - "default": "default" - }, - "not_after": { + "certificate": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Certificate" }, - "other_sans": { - "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" - } + "expiration": { + "type": "integer", + "description": "Expiration Time", + "format": "int64" }, - "private_key_format": { + "issuing_ca": { "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" - } - }, - "remove_roots_from_chain": { - "type": "boolean", - "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", - "default": false + "description": "Issuing CA" }, "serial_number": { "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." - }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } - }, - "uri_sans": { - "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" - } + "description": "Serial Number" } } }, - "PKISignVerbatimRequest": { + "PkiRootSignSelfIssuedRequest": { "type": "object", "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" - } - }, - "common_name": { - "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." - }, - "csr": { - "type": "string", - "description": "PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints.", - "default": "" - }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" - } - }, - "ext_key_usage": { - "type": "array", - "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", - "items": { - "type": "string" - }, - "default": [] - }, - "ext_key_usage_oids": { - "type": "array", - "description": "A comma-separated string or list of extended key usage oids.", - "items": { - "type": "string" - } - }, - "format": { + "certificate": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" - } - }, - "ip_sans": { - "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" - } + "description": "PEM-format self-issued certificate to be signed." }, "issuer_ref": { "type": "string", "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "default": "default" }, - "key_usage": { - "type": "array", - "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", - "items": { - "type": "string" - }, - "default": [ - "DigitalSignature", - "KeyAgreement", - "KeyEncipherment" - ] - }, - "not_after": { - "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" - }, - "other_sans": { - "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" - } - }, - "private_key_format": { - "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" - } - }, - "remove_roots_from_chain": { + "require_matching_certificate_algorithms": { "type": "boolean", - "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "description": "If true, require the public key algorithm of the signer to match that of the self issued certificate.", "default": false - }, - "role": { + } + } + }, + "PkiRootSignSelfIssuedResponse": { + "type": "object", + "properties": { + "certificate": { "type": "string", - "description": "The desired role with configuration for this request" + "description": "Certificate" }, - "serial_number": { + "issuing_ca": { "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." - }, - "signature_bits": { - "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } - }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" + "description": "Issuing CA" + } + } + }, + "PkiRotateCrlResponse": { + "type": "object", + "properties": { + "success": { + "type": "boolean", + "description": "Whether rotation was successful" + } + } + }, + "PkiRotateDeltaCrlResponse": { + "type": "object", + "properties": { + "success": { + "type": "boolean", + "description": "Whether rotation was successful" + } + } + }, + "PkiSetSignedIntermediateRequest": { + "type": "object", + "properties": { + "certificate": { + "type": "string", + "description": "PEM-format certificate. This must be a CA certificate with a public key matching the previously-generated key from the generation endpoint. Additional parent CAs may be optionally appended to the bundle." + } + } + }, + "PkiSetSignedIntermediateResponse": { + "type": "object", + "properties": { + "imported_issuers": { + "type": "array", + "description": "Net-new issuers imported as a part of this request", + "items": { + "type": "string" } }, - "uri_sans": { + "imported_keys": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "Net-new keys imported as a part of this request", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" } }, - "use_pss": { - "type": "boolean", - "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", - "default": false + "mapping": { + "type": "object", + "description": "A mapping of issuer_id to key_id for all issuers included in this request", + "format": "map" } } }, - "PKISignVerbatimRoleRequest": { + "PkiSignVerbatimRequest": { "type": "object", "properties": { "alt_names": { @@ -34717,6 +38423,10 @@ "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", "default": false }, + "role": { + "type": "string", + "description": "The desired role with configuration for this request" + }, "serial_number": { "type": "string", "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." @@ -34751,195 +38461,73 @@ "type": "boolean", "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", "default": false - } - } - }, - "PKITidyRequest": { - "type": "object", - "properties": { - "issuer_safety_buffer": { - "type": "integer", - "description": "The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year).", - "format": "seconds", - "default": 31536000 - }, - "pause_duration": { - "type": "string", - "description": "The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds.", - "default": "0s" }, - "safety_buffer": { - "type": "integer", - "description": "The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours.", - "format": "seconds", - "default": 259200 - }, - "tidy_cert_store": { - "type": "boolean", - "description": "Set to true to enable tidying up the certificate store" - }, - "tidy_expired_issuers": { - "type": "boolean", - "description": "Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation." - }, - "tidy_revocation_list": { - "type": "boolean", - "description": "Deprecated; synonym for 'tidy_revoked_certs" - }, - "tidy_revoked_cert_issuer_associations": { - "type": "boolean", - "description": "Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses." - }, - "tidy_revoked_certs": { - "type": "boolean", - "description": "Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed." + "user_ids": { + "type": "array", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "User ID(s)" + } } } }, - "PKIWriteAutoTidyConfigRequest": { + "PkiSignVerbatimResponse": { "type": "object", "properties": { - "enabled": { - "type": "boolean", - "description": "Set to true to enable automatic tidy operations." - }, - "interval_duration": { - "type": "integer", - "description": "Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next). Running a manual tidy will reset this duration.", - "format": "seconds", - "default": 43200 - }, - "issuer_safety_buffer": { - "type": "integer", - "description": "The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year).", - "format": "seconds", - "default": 31536000 + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } }, - "pause_duration": { + "certificate": { "type": "string", - "description": "The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds.", - "default": "0s" - }, - "safety_buffer": { - "type": "integer", - "description": "The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours.", - "format": "seconds", - "default": 259200 - }, - "tidy_cert_store": { - "type": "boolean", - "description": "Set to true to enable tidying up the certificate store" + "description": "Certificate" }, - "tidy_expired_issuers": { - "type": "boolean", - "description": "Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation." - }, - "tidy_revocation_list": { - "type": "boolean", - "description": "Deprecated; synonym for 'tidy_revoked_certs" - }, - "tidy_revoked_cert_issuer_associations": { - "type": "boolean", - "description": "Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses." - }, - "tidy_revoked_certs": { - "type": "boolean", - "description": "Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed." - } - } - }, - "PKIWriteCAConfigRequest": { - "type": "object", - "properties": { - "pem_bundle": { + "expiration": { "type": "string", - "description": "PEM-format, concatenated unencrypted secret key and certificate." - } - } - }, - "PKIWriteCRLConfigRequest": { - "type": "object", - "properties": { - "auto_rebuild": { - "type": "boolean", - "description": "If set to true, enables automatic rebuilding of the CRL" + "description": "Time of expiration" }, - "auto_rebuild_grace_period": { + "issuing_ca": { "type": "string", - "description": "The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h.", - "default": "12h" + "description": "Issuing Certificate Authority" }, - "delta_rebuild_interval": { + "private_key": { "type": "string", - "description": "The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m.", - "default": "15m" - }, - "disable": { - "type": "boolean", - "description": "If set to true, disables generating the CRL entirely." - }, - "enable_delta": { - "type": "boolean", - "description": "Whether to enable delta CRLs between authoritative CRL rebuilds" + "description": "Private key" }, - "expiry": { + "private_key_type": { "type": "string", - "description": "The amount of time the generated CRL should be valid; defaults to 72 hours", - "default": "72h" + "description": "Private key type" }, - "ocsp_disable": { - "type": "boolean", - "description": "If set to true, ocsp unauthorized responses will be returned." - }, - "ocsp_expiry": { - "type": "string", - "description": "The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours", - "default": "1h" - } - } - }, - "PKIWriteCertsRequest": { - "type": "object", - "properties": { - "pem_bundle": { - "type": "string", - "description": "PEM-format, concatenated unencrypted secret-key (optional) and certificates." - } - } - }, - "PKIWriteClusterConfigRequest": { - "type": "object", - "properties": { - "path": { + "serial_number": { "type": "string", - "description": "Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki" + "description": "Serial Number" } } }, - "PKIWriteIntermediateCrossSignRequest": { + "PkiSignVerbatimWithRoleRequest": { "type": "object", "properties": { - "add_basic_constraints": { - "type": "boolean", - "description": "Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services." - }, "alt_names": { "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", "x-vault-displayAttrs": { "name": "DNS/Email Subject Alternative Names (SANs)" } }, "common_name": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." }, - "country": { - "type": "array", - "description": "If set, Country will be set to this value.", - "items": { - "type": "string" - } + "csr": { + "type": "string", + "description": "PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints.", + "default": "" }, "exclude_cn_from_sans": { "type": "boolean", @@ -34949,14 +38537,20 @@ "name": "Exclude Common Name from Subject Alternative Names (SANs)" } }, - "exported": { - "type": "string", - "description": "Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key!", - "enum": [ - "internal", - "external", - "kms" - ] + "ext_key_usage": { + "type": "array", + "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", + "items": { + "type": "string" + }, + "default": [] + }, + "ext_key_usage_oids": { + "type": "array", + "description": "A comma-separated string or list of extended key usage oids.", + "items": { + "type": "string" + } }, "format": { "type": "string", @@ -34981,74 +38575,27 @@ "name": "IP Subject Alternative Names (SANs)" } }, - "key_bits": { - "type": "integer", - "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } - }, - "key_name": { - "type": "string", - "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" - }, - "key_ref": { + "issuer_ref": { "type": "string", - "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "default": "default" }, - "key_type": { - "type": "string", - "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], - "default": "rsa", - "x-vault-displayAttrs": { - "value": "rsa" - } - }, - "locality": { + "key_usage": { "type": "array", - "description": "If set, Locality will be set to this value.", + "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list.", "items": { "type": "string" }, - "x-vault-displayAttrs": { - "name": "Locality/City" - } - }, - "managed_key_id": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." - }, - "managed_key_name": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + "default": [ + "DigitalSignature", + "KeyAgreement", + "KeyEncipherment" + ] }, "not_after": { "type": "string", "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" }, - "not_before_duration": { - "type": "integer", - "description": "The duration before now which the certificate needs to be backdated by.", - "format": "seconds", - "default": 30, - "x-vault-displayAttrs": { - "value": 30 - } - }, - "organization": { - "type": "array", - "description": "If set, O (Organization) will be set to this value.", - "items": { - "type": "string" - } - }, "other_sans": { "type": "array", "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", @@ -35059,26 +38606,6 @@ "name": "Other SANs" } }, - "ou": { - "type": "array", - "description": "If set, OU (OrganizationalUnit) will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "OU (Organizational Unit)" - } - }, - "postal_code": { - "type": "array", - "description": "If set, Postal Code will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Postal Code" - } - }, "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", @@ -35093,15 +38620,10 @@ "value": "der" } }, - "province": { - "type": "array", - "description": "If set, Province will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Province/State" - } + "remove_roots_from_chain": { + "type": "boolean", + "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "default": false }, "serial_number": { "type": "string", @@ -35115,19 +38637,9 @@ "value": 0 } }, - "street_address": { - "type": "array", - "description": "If set, Street Address will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Street Address" - } - }, "ttl": { "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", "format": "seconds", "x-vault-displayAttrs": { "name": "TTL" @@ -35142,33 +38654,78 @@ "x-vault-displayAttrs": { "name": "URI Subject Alternative Names (SANs)" } + }, + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.", + "default": false + }, + "user_ids": { + "type": "array", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "User ID(s)" + } } } }, - "PKIWriteIntermediateGenerateRequest": { + "PkiSignVerbatimWithRoleResponse": { "type": "object", "properties": { - "add_basic_constraints": { - "type": "boolean", - "description": "Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services." + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } + }, + "certificate": { + "type": "string", + "description": "Certificate" + }, + "expiration": { + "type": "string", + "description": "Time of expiration" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing Certificate Authority" }, + "private_key": { + "type": "string", + "description": "Private key" + }, + "private_key_type": { + "type": "string", + "description": "Private key type" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" + } + } + }, + "PkiSignWithRoleRequest": { + "type": "object", + "properties": { "alt_names": { "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.", + "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", "x-vault-displayAttrs": { "name": "DNS/Email Subject Alternative Names (SANs)" } }, "common_name": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans." + "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." }, - "country": { - "type": "array", - "description": "If set, Country will be set to this value.", - "items": { - "type": "string" - } + "csr": { + "type": "string", + "description": "PEM-format CSR to be signed.", + "default": "" }, "exclude_cn_from_sans": { "type": "boolean", @@ -35201,74 +38758,15 @@ "name": "IP Subject Alternative Names (SANs)" } }, - "key_bits": { - "type": "integer", - "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", - "default": 0, - "x-vault-displayAttrs": { - "value": 0 - } - }, - "key_name": { - "type": "string", - "description": "Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default'" - }, - "key_ref": { + "issuer_ref": { "type": "string", - "description": "Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key.", + "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", "default": "default" }, - "key_type": { - "type": "string", - "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], - "default": "rsa", - "x-vault-displayAttrs": { - "value": "rsa" - } - }, - "locality": { - "type": "array", - "description": "If set, Locality will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Locality/City" - } - }, - "managed_key_id": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." - }, - "managed_key_name": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." - }, "not_after": { "type": "string", "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" }, - "not_before_duration": { - "type": "integer", - "description": "The duration before now which the certificate needs to be backdated by.", - "format": "seconds", - "default": 30, - "x-vault-displayAttrs": { - "value": 30 - } - }, - "organization": { - "type": "array", - "description": "If set, O (Organization) will be set to this value.", - "items": { - "type": "string" - } - }, "other_sans": { "type": "array", "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", @@ -35279,26 +38777,6 @@ "name": "Other SANs" } }, - "ou": { - "type": "array", - "description": "If set, OU (OrganizationalUnit) will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "OU (Organizational Unit)" - } - }, - "postal_code": { - "type": "array", - "description": "If set, Postal Code will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Postal Code" - } - }, "private_key_format": { "type": "string", "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", @@ -35313,277 +38791,505 @@ "value": "der" } }, - "province": { - "type": "array", - "description": "If set, Province will be set to this value.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Province/State" - } + "remove_roots_from_chain": { + "type": "boolean", + "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", + "default": false }, "serial_number": { "type": "string", "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." }, - "signature_bits": { + "ttl": { "type": "integer", - "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).", - "default": 0, + "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", + "format": "seconds", "x-vault-displayAttrs": { - "value": 0 + "name": "TTL" } }, - "street_address": { + "uri_sans": { "type": "array", - "description": "If set, Street Address will be set to this value.", + "description": "The requested URI SANs, if any, in a comma-delimited list.", "items": { "type": "string" }, "x-vault-displayAttrs": { - "name": "Street Address" - } - }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" + "name": "URI Subject Alternative Names (SANs)" } }, - "uri_sans": { + "user_ids": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1.", "items": { "type": "string" }, "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" + "name": "User ID(s)" } } } }, - "PKIWriteIntermediateSetSignedRequest": { + "PkiSignWithRoleResponse": { "type": "object", "properties": { + "ca_chain": { + "type": "array", + "description": "Certificate Chain", + "items": { + "type": "string" + } + }, "certificate": { "type": "string", - "description": "PEM-format certificate. This must be a CA certificate with a public key matching the previously-generated key from the generation endpoint. Additional parent CAs may be optionally appended to the bundle." + "description": "Certificate" + }, + "expiration": { + "type": "string", + "description": "Time of expiration" + }, + "issuing_ca": { + "type": "string", + "description": "Issuing Certificate Authority" + }, + "private_key": { + "type": "string", + "description": "Private key" + }, + "private_key_type": { + "type": "string", + "description": "Private key type" + }, + "serial_number": { + "type": "string", + "description": "Serial Number" } } }, - "PKIWriteInternalExportedRequest": { + "PkiTidyCancelResponse": { "type": "object", "properties": { - "key_bits": { + "cert_store_deleted_count": { "type": "integer", - "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", - "default": 0 + "description": "The number of certificate storage entries deleted" }, - "key_name": { + "cross_revoked_cert_deleted_count": { + "type": "integer" + }, + "current_cert_store_count": { + "type": "integer", + "description": "The number of revoked certificate entries deleted" + }, + "current_revoked_cert_count": { + "type": "integer", + "description": "The number of revoked certificate entries deleted" + }, + "error": { "type": "string", - "description": "Optional name to be used for this key" + "description": "The error message" }, - "key_type": { + "internal_backend_uuid": { + "type": "string" + }, + "issuer_safety_buffer": { + "type": "integer", + "description": "Issuer safety buffer" + }, + "message": { "type": "string", - "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], - "default": "rsa", - "x-vault-displayAttrs": { - "value": "rsa" + "description": "Message of the operation" + }, + "missing_issuer_cert_count": { + "type": "integer" + }, + "pause_duration": { + "type": "string", + "description": "Duration to pause between tidying certificates" + }, + "revocation_queue_deleted_count": { + "type": "integer" + }, + "revoked_cert_deleted_count": { + "type": "integer", + "description": "The number of revoked certificate entries deleted" + }, + "safety_buffer": { + "type": "integer", + "description": "Safety buffer time duration" + }, + "state": { + "type": "string", + "description": "One of Inactive, Running, Finished, or Error" + }, + "tidy_cert_store": { + "type": "boolean", + "description": "Tidy certificate store" + }, + "tidy_cross_cluster_revoked_certs": { + "type": "boolean" + }, + "tidy_expired_issuers": { + "type": "boolean", + "description": "Tidy expired issuers" + }, + "tidy_move_legacy_ca_bundle": { + "type": "boolean" + }, + "tidy_revocation_queue": { + "type": "boolean" + }, + "tidy_revoked_cert_issuer_associations": { + "type": "boolean", + "description": "Tidy revoked certificate issuer associations" + }, + "tidy_revoked_certs": { + "type": "boolean", + "description": "Tidy revoked certificates" + }, + "time_finished": { + "type": "string", + "description": "Time the operation finished" + }, + "time_started": { + "type": "string", + "description": "Time the operation started" + } + } + }, + "PkiTidyRequest": { + "type": "object", + "properties": { + "issuer_safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year).", + "format": "seconds", + "default": 31536000 + }, + "maintain_stored_certificate_counts": { + "type": "boolean", + "description": "This configures whether stored certificates are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.", + "default": false + }, + "pause_duration": { + "type": "string", + "description": "The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds.", + "default": "0s" + }, + "publish_stored_certificate_count_metrics": { + "type": "boolean", + "description": "This configures whether the stored certificate count is published to the metrics consumer. It does not affect if the stored certificate count is maintained, and if maintained, it will be available on the tidy-status endpoint.", + "default": false + }, + "revocation_queue_safety_buffer": { + "type": "integer", + "description": "The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal. Setting this too low may remove valid revocation requests before the owning cluster has a chance to process them, especially if the cluster is offline.", + "format": "seconds", + "default": 172800 + }, + "safety_buffer": { + "type": "integer", + "description": "The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours.", + "format": "seconds", + "default": 259200 + }, + "tidy_cert_store": { + "type": "boolean", + "description": "Set to true to enable tidying up the certificate store" + }, + "tidy_cross_cluster_revoked_certs": { + "type": "boolean", + "description": "Set to true to enable tidying up the cross-cluster revoked certificate store. Only runs on the active primary node." + }, + "tidy_expired_issuers": { + "type": "boolean", + "description": "Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation." + }, + "tidy_move_legacy_ca_bundle": { + "type": "boolean", + "description": "Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak. This prevents downgrades to pre-Vault 1.11 versions (as older PKI engines do not know about the new multi-issuer storage layout), but improves the performance on seal wrapped PKI mounts. This will only occur if at least issuer_safety_buffer time has occurred after the initial storage migration. This backup is saved in case of an issue in future migrations. Operators may consider removing it via sys/raw if they desire. The backup will be removed via a DELETE /root call, but note that this removes ALL issuers within the mount (and is thus not desirable in most operational scenarios)." + }, + "tidy_revocation_list": { + "type": "boolean", + "description": "Deprecated; synonym for 'tidy_revoked_certs" + }, + "tidy_revocation_queue": { + "type": "boolean", + "description": "Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster. Only runs on the active primary node", + "default": false + }, + "tidy_revoked_cert_issuer_associations": { + "type": "boolean", + "description": "Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses." + }, + "tidy_revoked_certs": { + "type": "boolean", + "description": "Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed." + } + } + }, + "PkiTidyStatusResponse": { + "type": "object", + "properties": { + "cert_store_deleted_count": { + "type": "integer", + "description": "The number of certificate storage entries deleted" + }, + "cross_revoked_cert_deleted_count": { + "type": "integer" + }, + "current_cert_store_count": { + "type": "integer", + "description": "The number of revoked certificate entries deleted" + }, + "current_revoked_cert_count": { + "type": "integer", + "description": "The number of revoked certificate entries deleted" + }, + "error": { + "type": "string", + "description": "The error message" + }, + "internal_backend_uuid": { + "type": "string" + }, + "issuer_safety_buffer": { + "type": "integer", + "description": "Issuer safety buffer" + }, + "message": { + "type": "string", + "description": "Message of the operation" + }, + "missing_issuer_cert_count": { + "type": "integer" + }, + "pause_duration": { + "type": "string", + "description": "Duration to pause between tidying certificates" + }, + "revocation_queue_deleted_count": { + "type": "integer" + }, + "revoked_cert_deleted_count": { + "type": "integer", + "description": "The number of revoked certificate entries deleted" + }, + "safety_buffer": { + "type": "integer", + "description": "Safety buffer time duration" + }, + "state": { + "type": "string", + "description": "One of Inactive, Running, Finished, or Error" + }, + "tidy_cert_store": { + "type": "boolean", + "description": "Tidy certificate store" + }, + "tidy_cross_cluster_revoked_certs": { + "type": "string" + }, + "tidy_expired_issuers": { + "type": "boolean", + "description": "Tidy expired issuers" + }, + "tidy_move_legacy_ca_bundle": { + "type": "boolean" + }, + "tidy_revocation_queue": { + "type": "boolean" + }, + "tidy_revoked_cert_issuer_associations": { + "type": "boolean", + "description": "Tidy revoked certificate issuer associations" + }, + "tidy_revoked_certs": { + "type": "boolean", + "description": "Tidy revoked certificates" + }, + "time_finished": { + "type": "string", + "description": "Time the operation finished" + }, + "time_started": { + "type": "string", + "description": "Time the operation started" + } + } + }, + "PkiWriteIssuerRequest": { + "type": "object", + "properties": { + "crl_distribution_points": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13.", + "items": { + "type": "string" + } + }, + "enable_aia_url_templating": { + "type": "boolean", + "description": "Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}', '{{cluster_path}}', '{{cluster_aia_path}}' are available, but the addresses are not checked for URL validity until issuance time. Using '{{cluster_path}}' requires /config/cluster's 'path' member to be set on all PR Secondary clusters and using '{{cluster_aia_path}}' requires /config/cluster's 'aia_path' member to be set on all PR secondary clusters.", + "default": false + }, + "issuer_name": { + "type": "string", + "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + }, + "issuing_certificates": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1.", + "items": { + "type": "string" } }, - "managed_key_id": { + "leaf_not_after_behavior": { "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." + "description": "Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs.", + "default": "err" }, - "managed_key_name": { + "manual_chain": { + "type": "array", + "description": "Chain of issuer references to use to build this issuer's computed CAChain field, when non-empty.", + "items": { + "type": "string" + } + }, + "ocsp_servers": { + "type": "array", + "description": "Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1.", + "items": { + "type": "string" + } + }, + "revocation_signature_algorithm": { "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." + "description": "Which x509.SignatureAlgorithm name to use for signing CRLs. This parameter allows differentiation between PKCS#1v1.5 and PSS keys and choice of signature hash algorithm. The default (empty string) value is for Go to select the signature algorithm. This can fail if the underlying key does not support the requested signature algorithm, which may not be known at modification time (such as with PKCS#11 managed RSA keys).", + "default": "" + }, + "usage": { + "type": "array", + "description": "Comma-separated list (or string slice) of usages for this issuer; valid values are \"read-only\", \"issuing-certificates\", \"crl-signing\", and \"ocsp-signing\". Multiple values may be specified. Read-only is implicit and always set.", + "items": { + "type": "string" + }, + "default": [ + "read-only", + "issuing-certificates", + "crl-signing", + "ocsp-signing" + ] } } }, - "PKIWriteIssueRoleRequest": { + "PkiWriteIssuerResponse": { "type": "object", "properties": { - "alt_names": { - "type": "string", - "description": "The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses.", - "x-vault-displayAttrs": { - "name": "DNS/Email Subject Alternative Names (SANs)" + "ca_chain": { + "type": "array", + "description": "CA Chain", + "items": { + "type": "string" } }, - "common_name": { + "certificate": { "type": "string", - "description": "The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address." + "description": "Certificate" }, - "exclude_cn_from_sans": { - "type": "boolean", - "description": "If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).", - "default": false, - "x-vault-displayAttrs": { - "name": "Exclude Common Name from Subject Alternative Names (SANs)" + "crl_distribution_points": { + "type": "array", + "description": "CRL Distribution Points", + "items": { + "type": "string" } }, - "format": { + "issuer_id": { "type": "string", - "description": "Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".", - "enum": [ - "pem", - "der", - "pem_bundle" - ], - "default": "pem", - "x-vault-displayAttrs": { - "value": "pem" - } + "description": "Issuer Id" }, - "ip_sans": { + "issuer_name": { + "type": "string", + "description": "Issuer Name" + }, + "issuing_certificates": { "type": "array", - "description": "The requested IP SANs, if any, in a comma-delimited list", + "description": "Issuing Certificates", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "IP Subject Alternative Names (SANs)" } }, - "issuer_ref": { + "key_id": { "type": "string", - "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", - "default": "default" + "description": "Key Id" }, - "not_after": { + "leaf_not_after_behavior": { "type": "string", - "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ" + "description": "Leaf Not After Behavior" }, - "other_sans": { + "manual_chain": { "type": "array", - "description": "Requested other SANs, in an array with the format ;UTF8: for each entry.", + "description": "Manual Chain", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Other SANs" } }, - "private_key_format": { - "type": "string", - "description": "Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".", - "enum": [ - "", - "der", - "pem", - "pkcs8" - ], - "default": "der", - "x-vault-displayAttrs": { - "value": "der" + "ocsp_servers": { + "type": "array", + "description": "OSCP Servers", + "items": { + "type": "string" } }, - "remove_roots_from_chain": { - "type": "boolean", - "description": "Whether or not to remove self-signed CA certificates in the output of the ca_chain field.", - "default": false - }, - "serial_number": { + "revocation_signature_algorithm": { "type": "string", - "description": "The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field." + "description": "Revocation Signature Alogrithm" }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "TTL" - } + "revocation_time": { + "type": "integer" }, - "uri_sans": { + "revocation_time_rfc3339": { + "type": "string" + }, + "revoked": { + "type": "boolean", + "description": "Revoked" + }, + "usage": { "type": "array", - "description": "The requested URI SANs, if any, in a comma-delimited list.", + "description": "Usage", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "URI Subject Alternative Names (SANs)" } } } }, - "PKIWriteIssuersConfigRequest": { + "PkiWriteKeyRequest": { "type": "object", "properties": { - "default": { + "key_name": { "type": "string", - "description": "Reference (name or identifier) to the default issuer." - }, - "default_follows_latest_issuer": { - "type": "boolean", - "description": "Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false.", - "default": false + "description": "Human-readable name for this key." } } }, - "PKIWriteKMSRequest": { + "PkiWriteKeyResponse": { "type": "object", "properties": { - "key_bits": { - "type": "integer", - "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519.", - "default": 0 + "key_id": { + "type": "string", + "description": "Key Id" }, "key_name": { "type": "string", - "description": "Optional name to be used for this key" + "description": "Key Name" }, "key_type": { "type": "string", - "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values.", - "enum": [ - "rsa", - "ec", - "ed25519" - ], - "default": "rsa", - "x-vault-displayAttrs": { - "value": "rsa" - } - }, - "managed_key_id": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types." - }, - "managed_key_name": { - "type": "string", - "description": "The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types." - } - } - }, - "PKIWriteKeyRequest": { - "type": "object", - "properties": { - "key_name": { - "type": "string", - "description": "Human-readable name for this key." - } - } - }, - "PKIWriteKeysConfigRequest": { - "type": "object", - "properties": { - "default": { - "type": "string", - "description": "Reference (name or identifier) of the default key." + "description": "Key Type" } } }, - "PKIWriteRoleRequest": { + "PkiWriteRoleRequest": { "type": "object", "properties": { "allow_any_name": { @@ -35668,6 +39374,13 @@ "description": "If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted.", "default": false }, + "allowed_user_ids": { + "type": "array", + "description": "If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1", + "items": { + "type": "string" + } + }, "backend": { "type": "string", "description": "Backend Type" @@ -35922,2340 +39635,2326 @@ } } }, - "PKIWriteURLConfigRequest": { + "PkiWriteRoleResponse": { "type": "object", "properties": { - "crl_distribution_points": { + "allow_any_name": { + "type": "boolean", + "description": "If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information." + }, + "allow_bare_domains": { + "type": "boolean", + "description": "If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information." + }, + "allow_glob_domains": { + "type": "boolean", + "description": "If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information." + }, + "allow_ip_sans": { + "type": "boolean", + "description": "If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed." + }, + "allow_localhost": { + "type": "boolean", + "description": "Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value." + }, + "allow_subdomains": { + "type": "boolean", + "description": "If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information." + }, + "allow_token_displayname": { + "type": "boolean", + "description": "Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value." + }, + "allow_wildcard_certificates": { + "type": "boolean", + "description": "If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information." + }, + "allowed_domains": { "type": "array", - "description": "Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13.", + "description": "Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains.", "items": { "type": "string" } }, - "enable_templating": { + "allowed_domains_template": { "type": "boolean", - "description": "Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URI validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters.", - "default": false + "description": "If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted." }, - "issuing_certificates": { + "allowed_other_sans": { "type": "array", - "description": "Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1.", + "description": "If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format ;:. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8).", "items": { "type": "string" } }, - "ocsp_servers": { + "allowed_serial_numbers": { "type": "array", - "description": "Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1.", + "description": "If set, an array of allowed serial numbers to put in Subject. These values support globbing.", "items": { "type": "string" } - } - } - }, - "PersonaIDWriteByIDRequest": { - "type": "object", - "properties": { - "entity_id": { - "type": "string", - "description": "Entity ID to which this persona should be tied to" }, - "metadata": { - "type": "object", - "description": "Metadata to be associated with the persona. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", - "format": "kvpairs" - }, - "mount_accessor": { - "type": "string", - "description": "Mount accessor to which this persona belongs to" + "allowed_uri_sans": { + "type": "array", + "description": "If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing.", + "items": { + "type": "string" + } }, - "name": { - "type": "string", - "description": "Name of the persona" - } - } - }, - "PersonaWriteRequest": { - "type": "object", - "properties": { - "entity_id": { - "type": "string", - "description": "Entity ID to which this persona belongs to" + "allowed_uri_sans_template": { + "type": "boolean", + "description": "If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted." }, - "id": { - "type": "string", - "description": "ID of the persona" + "allowed_user_ids": { + "type": "array", + "description": "If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1", + "items": { + "type": "string" + } }, - "metadata": { - "type": "object", - "description": "Metadata to be associated with the persona. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault metadata=key1=value1 metadata=key2=value2", - "format": "kvpairs" + "basic_constraints_valid_for_non_ca": { + "type": "boolean", + "description": "Mark Basic Constraints valid when issuing non-CA certificates." }, - "mount_accessor": { - "type": "string", - "description": "Mount accessor to which this persona belongs to" + "client_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12." }, - "name": { - "type": "string", - "description": "Name of the persona" - } - } - }, - "PkiWriteIssuerRefDerPemRequest": { - "type": "object", - "properties": { - "crl_distribution_points": { + "cn_validations": { "type": "array", - "description": "Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13.", + "description": "List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs.", "items": { "type": "string" } }, - "enable_aia_url_templating": { + "code_signing_flag": { "type": "boolean", - "description": "Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters.", - "default": false - }, - "issuer_name": { - "type": "string", - "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + "description": "If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12." }, - "issuing_certificates": { + "country": { "type": "array", - "description": "Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1.", + "description": "If set, Country will be set to this value in certificates issued by this role.", "items": { "type": "string" } }, - "leaf_not_after_behavior": { - "type": "string", - "description": "Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs.", - "default": "err" + "email_protection_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12." }, - "manual_chain": { + "enforce_hostnames": { + "type": "boolean", + "description": "If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true." + }, + "ext_key_usage": { "type": "array", - "description": "Chain of issuer references to use to build this issuer's computed CAChain field, when non-empty.", + "description": "A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12.", "items": { "type": "string" } }, - "ocsp_servers": { + "ext_key_usage_oids": { "type": "array", - "description": "Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1.", + "description": "A comma-separated string or list of extended key usage oids.", "items": { "type": "string" } }, - "revocation_signature_algorithm": { + "generate_lease": { + "type": "boolean", + "description": "If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke \" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault." + }, + "issuer_ref": { "type": "string", - "description": "Which x509.SignatureAlgorithm name to use for signing CRLs. This parameter allows differentiation between PKCS#1v1.5 and PSS keys and choice of signature hash algorithm. The default (empty string) value is for Go to select the signature algorithm. This can fail if the underlying key does not support the requested signature algorithm, which may not be known at modification time (such as with PKCS#11 managed RSA keys).", - "default": "" + "description": "Reference to the issuer used to sign requests serviced by this role." }, - "usage": { + "key_bits": { + "type": "integer", + "description": "The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519." + }, + "key_type": { + "type": "string", + "description": "The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values." + }, + "key_usage": { "type": "array", - "description": "Comma-separated list (or string slice) of usages for this issuer; valid values are \"read-only\", \"issuing-certificates\", \"crl-signing\", and \"ocsp-signing\". Multiple values may be specified. Read-only is implicit and always set.", + "description": "A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3.", "items": { "type": "string" - }, - "default": [ - "read-only", - "issuing-certificates", - "crl-signing", - "ocsp-signing" - ] - } - } - }, - "PkiWriteJsonRequest": { - "type": "object", - "properties": { - "crl_distribution_points": { + } + }, + "locality": { "type": "array", - "description": "Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13.", + "description": "If set, Locality will be set to this value in certificates issued by this role.", "items": { "type": "string" } }, - "enable_aia_url_templating": { + "max_ttl": { + "type": "integer", + "description": "The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL.", + "format": "seconds" + }, + "no_store": { "type": "boolean", - "description": "Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters.", - "default": false + "description": "If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\"." }, - "issuer_name": { + "not_after": { "type": "string", - "description": "Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'" + "description": "Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ." }, - "issuer_ref": { - "type": "string", - "description": "Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.", - "default": "default" + "not_before_duration": { + "type": "integer", + "description": "The duration before now which the certificate needs to be backdated by.", + "format": "seconds" }, - "issuing_certificates": { + "organization": { "type": "array", - "description": "Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1.", + "description": "If set, O (Organization) will be set to this value in certificates issued by this role.", "items": { "type": "string" } }, - "leaf_not_after_behavior": { - "type": "string", - "description": "Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs.", - "default": "err" - }, - "manual_chain": { + "ou": { "type": "array", - "description": "Chain of issuer references to use to build this issuer's computed CAChain field, when non-empty.", + "description": "If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role.", "items": { "type": "string" } }, - "ocsp_servers": { + "policy_identifiers": { "type": "array", - "description": "Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1.", + "description": "A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}].", "items": { "type": "string" } }, - "revocation_signature_algorithm": { - "type": "string", - "description": "Which x509.SignatureAlgorithm name to use for signing CRLs. This parameter allows differentiation between PKCS#1v1.5 and PSS keys and choice of signature hash algorithm. The default (empty string) value is for Go to select the signature algorithm. This can fail if the underlying key does not support the requested signature algorithm, which may not be known at modification time (such as with PKCS#11 managed RSA keys).", - "default": "" + "postal_code": { + "type": "array", + "description": "If set, Postal Code will be set to this value in certificates issued by this role.", + "items": { + "type": "string" + } }, - "usage": { + "province": { "type": "array", - "description": "Comma-separated list (or string slice) of usages for this issuer; valid values are \"read-only\", \"issuing-certificates\", \"crl-signing\", and \"ocsp-signing\". Multiple values may be specified. Read-only is implicit and always set.", + "description": "If set, Province will be set to this value in certificates issued by this role.", "items": { "type": "string" - }, - "default": [ - "read-only", - "issuing-certificates", - "crl-signing", - "ocsp-signing" - ] - } - } - }, - "RabbitMQWriteConnectionConfigRequest": { - "type": "object", - "properties": { - "connection_uri": { - "type": "string", - "description": "RabbitMQ Management URI" + } }, - "password": { - "type": "string", - "description": "Password of the provided RabbitMQ management user" + "require_cn": { + "type": "boolean", + "description": "If set to false, makes the 'common_name' field optional while generating a certificate." }, - "password_policy": { - "type": "string", - "description": "Name of the password policy to use to generate passwords for dynamic credentials." + "server_flag": { + "type": "boolean", + "description": "If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12.", + "default": true }, - "username": { - "type": "string", - "description": "Username of a RabbitMQ management administrator" + "signature_bits": { + "type": "integer", + "description": "The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves)." }, - "username_template": { - "type": "string", - "description": "Template describing how dynamic usernames are generated." + "street_address": { + "type": "array", + "description": "If set, Street Address will be set to this value in certificates issued by this role.", + "items": { + "type": "string" + } }, - "verify_connection": { + "ttl": { + "type": "integer", + "description": "The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter.", + "format": "seconds" + }, + "use_csr_common_name": { "type": "boolean", - "description": "If set, connection_uri is verified by actually connecting to the RabbitMQ management API", - "default": true + "description": "If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true." + }, + "use_csr_sans": { + "type": "boolean", + "description": "If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true." + }, + "use_pss": { + "type": "boolean", + "description": "Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false." } } }, - "RabbitMQWriteLeaseConfigRequest": { + "PluginsCatalogListPluginsResponse": { "type": "object", "properties": { - "max_ttl": { - "type": "integer", - "description": "Duration after which the issued credentials should not be allowed to be renewed", - "format": "seconds", - "default": 0 - }, - "ttl": { - "type": "integer", - "description": "Duration before which the issued credentials needs renewal", - "format": "seconds", - "default": 0 + "detailed": { + "type": "object", + "format": "map" } } }, - "RabbitMQWriteRoleRequest": { + "PluginsCatalogListPluginsWithTypeResponse": { "type": "object", "properties": { - "tags": { + "keys": { + "type": "array", + "description": "List of plugin names in the catalog", + "items": { + "type": "string" + } + } + } + }, + "PluginsCatalogReadPluginConfigurationResponse": { + "type": "object", + "properties": { + "args": { + "type": "array", + "description": "The args passed to plugin command.", + "items": { + "type": "string" + } + }, + "builtin": { + "type": "boolean" + }, + "command": { + "type": "string", + "description": "The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory." + }, + "deprecation_status": { + "type": "string" + }, + "name": { "type": "string", - "description": "Comma-separated list of tags for this role." + "description": "The name of the plugin" }, - "vhost_topics": { + "sha256": { "type": "string", - "description": "A nested map of virtual hosts and exchanges to topic permissions." + "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." }, - "vhosts": { + "version": { "type": "string", - "description": "A map of virtual hosts to permissions." + "description": "The semantic version of the plugin to use." } } }, - "RadiusLoginRequest": { + "PluginsCatalogReadPluginConfigurationWithTypeResponse": { "type": "object", "properties": { - "password": { - "type": "string", - "description": "Password for this user." + "args": { + "type": "array", + "description": "The args passed to plugin command.", + "items": { + "type": "string" + } }, - "urlusername": { + "builtin": { + "type": "boolean" + }, + "command": { "type": "string", - "description": "Username to be used for login. (URL parameter)" + "description": "The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory." }, - "username": { + "deprecation_status": { + "type": "string" + }, + "name": { "type": "string", - "description": "Username to be used for login. (POST request body)" - } - } - }, - "RadiusLoginWithUsernameRequest": { - "type": "object", - "properties": { - "password": { + "description": "The name of the plugin" + }, + "sha256": { "type": "string", - "description": "Password for this user." + "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." }, - "username": { + "version": { "type": "string", - "description": "Username to be used for login. (POST request body)" + "description": "The semantic version of the plugin to use." } } }, - "RadiusWriteConfigRequest": { + "PluginsCatalogRegisterPluginRequest": { "type": "object", "properties": { - "dial_timeout": { - "type": "integer", - "description": "Number of seconds before connect times out (default: 10)", - "format": "seconds", - "default": 10, - "x-vault-displayAttrs": { - "value": 10 - } - }, - "host": { - "type": "string", - "description": "RADIUS server host", - "x-vault-displayAttrs": { - "name": "Host" + "args": { + "type": "array", + "description": "The args passed to plugin command.", + "items": { + "type": "string" } }, - "nas_identifier": { + "command": { "type": "string", - "description": "RADIUS NAS Identifier field (optional)", - "default": "", - "x-vault-displayAttrs": { - "name": "NAS Identifier" - } - }, - "nas_port": { - "type": "integer", - "description": "RADIUS NAS port field (default: 10)", - "default": 10, - "x-vault-displayAttrs": { - "name": "NAS Port", - "value": 10 - } + "description": "The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory." }, - "port": { - "type": "integer", - "description": "RADIUS server port (default: 1812)", - "default": 1812, - "x-vault-displayAttrs": { - "value": 1812 + "env": { + "type": "array", + "description": "The environment variables passed to plugin command. Each entry is of the form \"key=value\".", + "items": { + "type": "string" } }, - "read_timeout": { - "type": "integer", - "description": "Number of seconds before response times out (default: 10)", - "format": "seconds", - "default": 10, - "x-vault-displayAttrs": { - "value": 10 - } + "sha256": { + "type": "string", + "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." }, - "secret": { + "type": { "type": "string", - "description": "Secret shared with the RADIUS server" + "description": "The type of the plugin, may be auth, secret, or database" }, - "token_bound_cidrs": { + "version": { + "type": "string", + "description": "The semantic version of the plugin to use." + } + } + }, + "PluginsCatalogRegisterPluginWithTypeRequest": { + "type": "object", + "properties": { + "args": { "type": "array", - "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", + "description": "The args passed to plugin command.", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Bound CIDRs", - "group": "Tokens" - } - }, - "token_explicit_max_ttl": { - "type": "integer", - "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Explicit Maximum TTL", - "group": "Tokens" - } - }, - "token_max_ttl": { - "type": "integer", - "description": "The maximum lifetime of the generated token", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Maximum TTL", - "group": "Tokens" - } - }, - "token_no_default_policy": { - "type": "boolean", - "description": "If true, the 'default' policy will not automatically be added to generated tokens", - "x-vault-displayAttrs": { - "name": "Do Not Attach 'default' Policy To Generated Tokens", - "group": "Tokens" - } - }, - "token_num_uses": { - "type": "integer", - "description": "The maximum number of times a token may be used, a value of zero means unlimited", - "x-vault-displayAttrs": { - "name": "Maximum Uses of Generated Tokens", - "group": "Tokens" } }, - "token_period": { - "type": "integer", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Period", - "group": "Tokens" - } + "command": { + "type": "string", + "description": "The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory." }, - "token_policies": { + "env": { "type": "array", - "description": "Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any configured for specific users.", + "description": "The environment variables passed to plugin command. Each entry is of the form \"key=value\".", "items": { "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Policies", - "group": "Tokens" - } - }, - "token_ttl": { - "type": "integer", - "description": "The initial ttl of the token to generate", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Initial TTL", - "group": "Tokens" } }, - "token_type": { + "sha256": { "type": "string", - "description": "The type of token to generate, service or batch", - "default": "default-service", - "x-vault-displayAttrs": { - "name": "Generated Token's Type", - "group": "Tokens" - } + "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." }, - "unregistered_user_policies": { + "version": { "type": "string", - "description": "Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: empty)", - "default": "", - "x-vault-displayAttrs": { - "name": "Policies for unregistered users" - } + "description": "The semantic version of the plugin to use." } } }, - "RadiusWriteUserRequest": { + "PluginsReloadBackendsRequest": { "type": "object", "properties": { - "policies": { + "mounts": { "type": "array", - "description": "Comma-separated list of policies associated to the user.", + "description": "The mount paths of the plugin backends to reload.", "items": { "type": "string" } + }, + "plugin": { + "type": "string", + "description": "The name of the plugin to reload, as registered in the plugin catalog." + }, + "scope": { + "type": "string" } } }, - "RemountRequest": { + "PluginsReloadBackendsResponse": { "type": "object", "properties": { - "from": { - "type": "string", - "description": "The previous mount point." - }, - "to": { - "type": "string", - "description": "The new mount point." + "reload_id": { + "type": "string" } } }, - "RenewForRequest": { + "PoliciesGeneratePasswordFromPasswordPolicyResponse": { "type": "object", "properties": { - "increment": { - "type": "integer", - "description": "The desired increment in seconds to the lease", - "format": "seconds" - }, - "lease_id": { - "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "password": { + "type": "string" } } }, - "RenewRequest": { + "PoliciesListAclPoliciesResponse": { "type": "object", "properties": { - "increment": { - "type": "integer", - "description": "The desired increment in seconds to the lease", - "format": "seconds" - }, - "lease_id": { - "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "keys": { + "type": "array", + "items": { + "type": "string" + } }, - "url_lease_id": { - "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "policies": { + "type": "array", + "items": { + "type": "string" + } } } }, - "RevokeLeaseRequest": { + "PoliciesListPasswordPoliciesResponse": { "type": "object", "properties": { - "lease_id": { - "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "keys": { + "type": "array", + "items": { + "type": "string" + } + } + } + }, + "PoliciesListResponse": { + "type": "object", + "properties": { + "keys": { + "type": "array", + "items": { + "type": "string" + } }, - "sync": { - "type": "boolean", - "description": "Whether or not to perform the revocation synchronously", - "default": true + "policies": { + "type": "array", + "items": { + "type": "string" + } } } }, - "RevokePrefixRequest": { + "PoliciesReadAclPolicy2Response": { "type": "object", "properties": { - "sync": { - "type": "boolean", - "description": "Whether or not to perform the revocation synchronously", - "default": true + "name": { + "type": "string" + }, + "policy": { + "type": "string" + }, + "rules": { + "type": "string" } } }, - "RevokeRequest": { + "PoliciesReadAclPolicyResponse": { "type": "object", "properties": { - "lease_id": { - "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "name": { + "type": "string" }, - "sync": { - "type": "boolean", - "description": "Whether or not to perform the revocation synchronously", - "default": true + "policy": { + "type": "string" }, - "url_lease_id": { - "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "rules": { + "type": "string" } } }, - "SSHLookupRequest": { + "PoliciesReadPasswordPolicyResponse": { "type": "object", "properties": { - "ip": { - "type": "string", - "description": "[Required] IP address of remote host" + "policy": { + "type": "string" } } }, - "SSHSignRequest": { + "PoliciesWriteAclPolicy2Request": { "type": "object", "properties": { - "cert_type": { - "type": "string", - "description": "Type of certificate to be created; either \"user\" or \"host\".", - "default": "user" - }, - "critical_options": { - "type": "object", - "description": "Critical options that the certificate should be signed for.", - "format": "map" - }, - "extensions": { - "type": "object", - "description": "Extensions that the certificate should be signed for.", - "format": "map" - }, - "key_id": { - "type": "string", - "description": "Key id that the created certificate should have. If not specified, the display name of the token will be used." - }, - "public_key": { + "policy": { "type": "string", - "description": "SSH public key that should be signed." - }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the SSH certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be later than the role max TTL.", - "format": "seconds" + "description": "The rules of the policy." }, - "valid_principals": { + "rules": { "type": "string", - "description": "Valid principals, either usernames or hostnames, that the certificate should be signed for." + "description": "The rules of the policy.", + "deprecated": true } } }, - "SSHVerifyRequest": { + "PoliciesWriteAclPolicyRequest": { "type": "object", "properties": { - "otp": { + "policy": { "type": "string", - "description": "[Required] One-Time-Key that needs to be validated" + "description": "The rules of the policy." } } }, - "SSHWriteCAConfigRequest": { + "PoliciesWritePasswordPolicyRequest": { "type": "object", "properties": { - "generate_signing_key": { - "type": "boolean", - "description": "Generate SSH key pair internally rather than use the private_key and public_key fields.", - "default": true - }, - "key_bits": { - "type": "integer", - "description": "Specifies the desired key bits when generating variable-length keys (such as when key_type=\"ssh-rsa\") or which NIST P-curve to use when key_type=\"ec\" (256, 384, or 521).", - "default": 0 - }, - "key_type": { - "type": "string", - "description": "Specifies the desired key type when generating; could be a OpenSSH key type identifier (ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, or ssh-ed25519) or an algorithm (rsa, ec, ed25519).", - "default": "ssh-rsa" - }, - "private_key": { - "type": "string", - "description": "Private half of the SSH key that will be used to sign certificates." - }, - "public_key": { + "policy": { "type": "string", - "description": "Public half of the SSH key that will be used to sign certificates." + "description": "The password policy" } } }, - "SSHWriteCredentialsRequest": { + "QueryTokenAccessorCapabilitiesRequest": { "type": "object", "properties": { - "ip": { + "accessor": { "type": "string", - "description": "[Required] IP of the remote host" + "description": "Accessor of the token for which capabilities are being queried." }, - "username": { - "type": "string", - "description": "[Optional] Username in remote host" + "path": { + "type": "array", + "description": "Use 'paths' instead.", + "items": { + "type": "string" + }, + "deprecated": true + }, + "paths": { + "type": "array", + "description": "Paths on which capabilities are being queried.", + "items": { + "type": "string" + } } } }, - "SSHWriteIssueRequest": { + "QueryTokenCapabilitiesRequest": { "type": "object", "properties": { - "cert_type": { - "type": "string", - "description": "Type of certificate to be created; either \"user\" or \"host\".", - "default": "user" - }, - "critical_options": { - "type": "object", - "description": "Critical options that the certificate should be signed for.", - "format": "map" - }, - "extensions": { - "type": "object", - "description": "Extensions that the certificate should be signed for.", - "format": "map" - }, - "key_bits": { - "type": "integer", - "description": "Specifies the number of bits to use for the generated keys.", - "default": 0 - }, - "key_id": { - "type": "string", - "description": "Key id that the created certificate should have. If not specified, the display name of the token will be used." - }, - "key_type": { - "type": "string", - "description": "Specifies the desired key type; must be `rsa`, `ed25519` or `ec`", - "default": "rsa" + "path": { + "type": "array", + "description": "Use 'paths' instead.", + "items": { + "type": "string" + }, + "deprecated": true }, - "ttl": { - "type": "integer", - "description": "The requested Time To Live for the SSH certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be later than the role max TTL.", - "format": "seconds" + "paths": { + "type": "array", + "description": "Paths on which capabilities are being queried.", + "items": { + "type": "string" + } }, - "valid_principals": { + "token": { "type": "string", - "description": "Valid principals, either usernames or hostnames, that the certificate should be signed for." + "description": "Token for which capabilities are being queried." } } }, - "SSHWriteKeysRequest": { + "QueryTokenSelfCapabilitiesRequest": { "type": "object", "properties": { - "key": { + "path": { + "type": "array", + "description": "Use 'paths' instead.", + "items": { + "type": "string" + }, + "deprecated": true + }, + "paths": { + "type": "array", + "description": "Paths on which capabilities are being queried.", + "items": { + "type": "string" + } + }, + "token": { "type": "string", - "description": "[Required] SSH private key with super user privileges in host" + "description": "Token for which capabilities are being queried." } } }, - "SSHWriteRoleRequest": { + "RabbitMqConfigureConnectionRequest": { "type": "object", "properties": { - "admin_user": { - "type": "string", - "description": "[Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Admin user at remote host. The shared key being registered should be for this user and should have root privileges. Everytime a dynamic credential is being generated for other users, Vault uses this admin username to login to remote host and install the generated credential for the other user.", - "x-vault-displayAttrs": { - "name": "Admin Username" - } - }, - "algorithm_signer": { + "connection_uri": { "type": "string", - "description": "When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string.", - "enum": [ - "", - "ssh-rsa", - "rsa-sha2-256", - "rsa-sha2-512" - ], - "x-vault-displayAttrs": { - "name": "Signing Algorithm" - } - }, - "allow_bare_domains": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use the base domains listed in \"allowed_domains\", e.g. \"example.com\". This is a separate option as in some cases this can be considered a security threat." - }, - "allow_host_certificates": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'host'.", - "default": false - }, - "allow_subdomains": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use subdomains of those listed in \"allowed_domains\"." - }, - "allow_user_certificates": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'user'.", - "default": false - }, - "allow_user_key_ids": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If true, users can override the key ID for a signed certificate with the \"key_id\" field. When false, the key ID will always be the token display name. The key ID is logged by the SSH server and can be useful for auditing.", - "x-vault-displayAttrs": { - "name": "Allow User Key IDs" - } + "description": "RabbitMQ Management URI" }, - "allowed_critical_options": { + "password": { "type": "string", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of critical options that certificates can have when signed. To allow any critical options, set this to an empty string." + "description": "Password of the provided RabbitMQ management user" }, - "allowed_domains": { + "password_policy": { "type": "string", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If this option is not specified, client can request for a signed certificate for any valid host. If only certain domains are allowed, then this list enforces it." - }, - "allowed_domains_template": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted.", - "default": false + "description": "Name of the password policy to use to generate passwords for dynamic credentials." }, - "allowed_extensions": { + "username": { "type": "string", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of extensions that certificates can have when signed. An empty list means that no extension overrides are allowed by an end-user; explicitly specify '*' to allow any extensions to be set." - }, - "allowed_user_key_lengths": { - "type": "object", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, allows the enforcement of key types and minimum key sizes to be signed.", - "format": "map" + "description": "Username of a RabbitMQ management administrator" }, - "allowed_users": { + "username_template": { "type": "string", - "description": "[Optional for all types] [Works differently for CA type] If this option is not specified, or is '*', client can request a credential for any valid user at the remote host, including the admin user. If only certain usernames are to be allowed, then this list enforces it. If this field is set, then credentials can only be created for default_user and usernames present in this list. Setting this option will enable all the users with access to this role to fetch credentials for all other usernames in this list. Use with caution. N.B.: with the CA type, an empty list means that no users are allowed; explicitly specify '*' to allow any user." + "description": "Template describing how dynamic usernames are generated." }, - "allowed_users_template": { + "verify_connection": { "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed users can be specified using identity template policies. Non-templated users are also permitted.", - "default": false + "description": "If set, connection_uri is verified by actually connecting to the RabbitMQ management API", + "default": true + } + } + }, + "RabbitMqConfigureLeaseRequest": { + "type": "object", + "properties": { + "max_ttl": { + "type": "integer", + "description": "Duration after which the issued credentials should not be allowed to be renewed", + "format": "seconds", + "default": 0 }, - "cidr_list": { + "ttl": { + "type": "integer", + "description": "Duration before which the issued credentials needs renewal", + "format": "seconds", + "default": 0 + } + } + }, + "RabbitMqWriteRoleRequest": { + "type": "object", + "properties": { + "tags": { "type": "string", - "description": "[Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks for which the role is applicable for. CIDR blocks can belong to more than one role.", - "x-vault-displayAttrs": { - "name": "CIDR List" - } - }, - "default_critical_options": { - "type": "object", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Critical options certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_critical_options\". Defaults to none.", - "format": "map" - }, - "default_extensions": { - "type": "object", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Extensions certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_extensions\". Defaults to none.", - "format": "map" + "description": "Comma-separated list of tags for this role." }, - "default_extensions_template": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default extension values can be specified using identity template policies. Non-templated extension values are also permitted.", - "default": false + "vhost_topics": { + "type": "string", + "description": "A nested map of virtual hosts and exchanges to topic permissions." }, - "default_user": { + "vhosts": { "type": "string", - "description": "[Required for Dynamic type] [Required for OTP type] [Optional for CA type] Default username for which a credential will be generated. When the endpoint 'creds/' is used without a username, this value will be used as default username.", + "description": "A map of virtual hosts to permissions." + } + } + }, + "RadiusConfigureRequest": { + "type": "object", + "properties": { + "dial_timeout": { + "type": "integer", + "description": "Number of seconds before connect times out (default: 10)", + "format": "seconds", + "default": 10, "x-vault-displayAttrs": { - "name": "Default Username" + "value": 10 } }, - "default_user_template": { - "type": "boolean", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default user can be specified using identity template policies. Non-templated users are also permitted.", - "default": false - }, - "exclude_cidr_list": { + "host": { "type": "string", - "description": "[Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks. IP addresses belonging to these blocks are not accepted by the role. This is particularly useful when big CIDR blocks are being used by the role and certain parts of it needs to be kept out.", + "description": "RADIUS server host", "x-vault-displayAttrs": { - "name": "Exclude CIDR List" + "name": "Host" } }, - "install_script": { + "nas_identifier": { "type": "string", - "description": "[Optional for Dynamic type] [Not-applicable for OTP type] [Not applicable for CA type] Script used to install and uninstall public keys in the target machine. The inbuilt default install script will be for Linux hosts. For sample script, refer the project documentation website." + "description": "RADIUS NAS Identifier field (optional)", + "default": "", + "x-vault-displayAttrs": { + "name": "NAS Identifier" + } }, - "key": { - "type": "string", - "description": "[Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Name of the registered key in Vault. Before creating the role, use the 'keys/' endpoint to create a named key." + "nas_port": { + "type": "integer", + "description": "RADIUS NAS port field (default: 10)", + "default": 10, + "x-vault-displayAttrs": { + "name": "NAS Port", + "value": 10 + } }, - "key_bits": { + "port": { "type": "integer", - "description": "[Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Length of the RSA dynamic key in bits. It is 1024 by default or it can be 2048." + "description": "RADIUS server port (default: 1812)", + "default": 1812, + "x-vault-displayAttrs": { + "value": 1812 + } }, - "key_id_format": { - "type": "string", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a custom format for the key id of a signed certificate. The following variables are available for use: '{{token_display_name}}' - The display name of the token used to make the request. '{{role_name}}' - The name of the role signing the request. '{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed.", + "read_timeout": { + "type": "integer", + "description": "Number of seconds before response times out (default: 10)", + "format": "seconds", + "default": 10, "x-vault-displayAttrs": { - "name": "Key ID Format" + "value": 10 } }, - "key_option_specs": { + "secret": { "type": "string", - "description": "[Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Comma separated option specifications which will be prefixed to RSA key in authorized_keys file. Options should be valid and comply with authorized_keys file format and should not contain spaces." + "description": "Secret shared with the RADIUS server" }, - "key_type": { - "type": "string", - "description": "[Required for all types] Type of key used to login to hosts. It can be either 'otp', 'dynamic' or 'ca'. 'otp' type requires agent to be installed in remote hosts.", - "enum": [ - "otp", - "dynamic", - "ca" - ], + "token_bound_cidrs": { + "type": "array", + "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", + "items": { + "type": "string" + }, "x-vault-displayAttrs": { - "value": "ca" + "name": "Generated Token's Bound CIDRs", + "group": "Tokens" } }, - "max_ttl": { + "token_explicit_max_ttl": { "type": "integer", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The maximum allowed lease duration", + "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", "format": "seconds", "x-vault-displayAttrs": { - "name": "Max TTL" + "name": "Generated Token's Explicit Maximum TTL", + "group": "Tokens" } }, - "not_before_duration": { + "token_max_ttl": { "type": "integer", - "description": "The duration that the SSH certificate should be backdated by at issuance.", + "description": "The maximum lifetime of the generated token", "format": "seconds", - "default": 30, "x-vault-displayAttrs": { - "name": "Not before duration", - "value": 30 + "name": "Generated Token's Maximum TTL", + "group": "Tokens" } }, - "port": { + "token_no_default_policy": { + "type": "boolean", + "description": "If true, the 'default' policy will not automatically be added to generated tokens", + "x-vault-displayAttrs": { + "name": "Do Not Attach 'default' Policy To Generated Tokens", + "group": "Tokens" + } + }, + "token_num_uses": { "type": "integer", - "description": "[Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Port number for SSH connection. Default is '22'. Port number does not play any role in creation of OTP. For 'otp' type, this is just a way to inform client about the port number to use. Port number will be returned to client by Vault server along with OTP.", + "description": "The maximum number of times a token may be used, a value of zero means unlimited", "x-vault-displayAttrs": { - "value": 22 + "name": "Maximum Uses of Generated Tokens", + "group": "Tokens" } }, - "ttl": { + "token_period": { "type": "integer", - "description": "[Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The lease duration if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the value of max_ttl.", + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", "format": "seconds", "x-vault-displayAttrs": { - "name": "TTL" + "name": "Generated Token's Period", + "group": "Tokens" } - } - } - }, - "SSHWriteZeroAddressConfigRequest": { - "type": "object", - "properties": { - "roles": { + }, + "token_policies": { "type": "array", - "description": "[Required] Comma separated list of role names which allows credentials to be requested for any IP address. CIDR blocks previously registered under these roles will be ignored.", + "description": "Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any configured for specific users.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Generated Token's Policies", + "group": "Tokens" } - } - } - }, - "SysWritePluginsCatalogNameRequest": { - "type": "object", - "properties": { - "args": { - "type": "array", - "description": "The args passed to plugin command.", - "items": { - "type": "string" + }, + "token_ttl": { + "type": "integer", + "description": "The initial ttl of the token to generate", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Initial TTL", + "group": "Tokens" } }, - "command": { + "token_type": { "type": "string", - "description": "The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory." - }, - "env": { - "type": "array", - "description": "The environment variables passed to plugin command. Each entry is of the form \"key=value\".", - "items": { - "type": "string" + "description": "The type of token to generate, service or batch", + "default": "default-service", + "x-vault-displayAttrs": { + "name": "Generated Token's Type", + "group": "Tokens" } }, - "sha256": { + "unregistered_user_policies": { "type": "string", - "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." + "description": "Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: empty)", + "default": "", + "x-vault-displayAttrs": { + "name": "Policies for unregistered users" + } + } + } + }, + "RadiusLogInRequest": { + "type": "object", + "properties": { + "password": { + "type": "string", + "description": "Password for this user." }, - "type": { + "urlusername": { "type": "string", - "description": "The type of the plugin, may be auth, secret, or database" + "description": "Username to be used for login. (URL parameter)" }, - "version": { + "username": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "Username to be used for login. (POST request body)" } } }, - "SysWriteToolsRandomUrlbytesRequest": { + "RadiusLogInWithUsernameRequest": { "type": "object", "properties": { - "bytes": { - "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 - }, - "format": { + "password": { "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" + "description": "Password for this user." }, - "source": { + "username": { "type": "string", - "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", - "default": "platform" + "description": "Username to be used for login. (POST request body)" } } }, - "TOTPWriteCodeRequest": { + "RadiusWriteUserRequest": { "type": "object", "properties": { - "code": { - "type": "string", - "description": "TOTP code to be validated." + "policies": { + "type": "array", + "description": "Comma-separated list of policies associated to the user.", + "items": { + "type": "string" + } } } }, - "TOTPWriteKeyRequest": { + "RateLimitQuotasConfigureRequest": { "type": "object", "properties": { - "account_name": { - "type": "string", - "description": "The name of the account associated with the key. Required if generate is true." - }, - "algorithm": { - "type": "string", - "description": "The hashing algorithm used to generate the TOTP token. Options include SHA1, SHA256 and SHA512.", - "default": "SHA1" - }, - "digits": { - "type": "integer", - "description": "The number of digits in the generated TOTP token. This value can either be 6 or 8.", - "default": 6 - }, - "exported": { + "enable_rate_limit_audit_logging": { "type": "boolean", - "description": "Determines if a QR code and url are returned upon generating a key. Only used if generate is true.", - "default": true + "description": "If set, starts audit logging of requests that get rejected due to rate limit quota rule violations." }, - "generate": { + "enable_rate_limit_response_headers": { "type": "boolean", - "description": "Determines if a key should be generated by Vault or if a key is being passed from another service.", - "default": false - }, - "issuer": { - "type": "string", - "description": "The name of the key's issuing organization. Required if generate is true." - }, - "key": { - "type": "string", - "description": "The shared master key used to generate a TOTP token. Only used if generate is false." - }, - "key_size": { - "type": "integer", - "description": "Determines the size in bytes of the generated key. Only used if generate is true.", - "default": 20 - }, - "period": { - "type": "integer", - "description": "The length of time used to generate a counter for the TOTP token calculation.", - "format": "seconds", - "default": 30 - }, - "qr_size": { - "type": "integer", - "description": "The pixel size of the generated square QR code. Only used if generate is true and exported is true. If this value is 0, a QR code will not be returned.", - "default": 200 - }, - "skew": { - "type": "integer", - "description": "The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. Only used if generate is true.", - "default": 1 + "description": "If set, additional rate limit quota HTTP headers will be added to responses." }, - "url": { - "type": "string", - "description": "A TOTP url string containing all of the parameters for key setup. Only used if generate is false." + "rate_limit_exempt_paths": { + "type": "array", + "description": "Specifies the list of exempt paths from all rate limit quotas. If empty no paths will be exempt.", + "items": { + "type": "string" + } } } }, - "TerraformWriteConfigRequest": { + "RateLimitQuotasListResponse": { "type": "object", "properties": { - "address": { - "type": "string", - "description": "The address to access Terraform Cloud or Enterprise. Default is \"https://app.terraform.io\".", - "default": "https://app.terraform.io" - }, - "base_path": { - "type": "string", - "description": "The base path for the Terraform Cloud or Enterprise API. Default is \"/api/v2/\".", - "default": "/api/v2/" - }, - "token": { - "type": "string", - "description": "The token to access Terraform Cloud", - "x-vault-displayAttrs": { - "name": "Token", - "sensitive": true + "keys": { + "type": "array", + "items": { + "type": "string" } } - }, - "required": [ - "token" - ] + } }, - "TerraformWriteRoleRequest": { + "RateLimitQuotasReadConfigurationResponse": { "type": "object", "properties": { - "max_ttl": { - "type": "integer", - "description": "Maximum time for role. If not set or set to 0, will use system default.", - "format": "seconds" - }, - "organization": { - "type": "string", - "description": "Name of the Terraform Cloud or Enterprise organization" - }, - "team_id": { - "type": "string", - "description": "ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)" + "enable_rate_limit_audit_logging": { + "type": "boolean" }, - "ttl": { - "type": "integer", - "description": "Default lease for generated credentials. If not set or set to 0, will use system default.", - "format": "seconds" + "enable_rate_limit_response_headers": { + "type": "boolean" }, - "user_id": { - "type": "string", - "description": "ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)" + "rate_limit_exempt_paths": { + "type": "array", + "items": { + "type": "string" + } } } }, - "TokenRenewAccessorRequest": { + "RateLimitQuotasReadResponse": { "type": "object", "properties": { - "accessor": { - "type": "string", - "description": "Accessor of the token to renew (request body)" + "block_interval": { + "type": "integer" }, - "increment": { - "type": "integer", - "description": "The desired increment in seconds to the token expiration", - "format": "seconds", - "default": 0 + "interval": { + "type": "integer" + }, + "name": { + "type": "string" + }, + "path": { + "type": "string" + }, + "rate": { + "type": "number", + "format": "float" + }, + "role": { + "type": "string" + }, + "type": { + "type": "string" } } }, - "TokenRenewRequest": { + "RateLimitQuotasWriteRequest": { "type": "object", "properties": { - "increment": { + "block_interval": { "type": "integer", - "description": "The desired increment in seconds to the token expiration", - "format": "seconds", - "default": 0 + "description": "If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' has elapsed.", + "format": "seconds" }, - "token": { + "interval": { + "type": "integer", + "description": "The duration to enforce rate limiting for (default '1s').", + "format": "seconds" + }, + "path": { "type": "string", - "description": "Token to renew (request body)" + "description": "Path of the mount or namespace to apply the quota. A blank path configures a global quota. For example namespace1/ adds a quota to a full namespace, namespace1/auth/userpass adds a quota to userpass in namespace1." + }, + "rate": { + "type": "number", + "description": "The maximum number of requests in a given interval to be allowed by the quota rule. The 'rate' must be positive.", + "format": "float" + }, + "role": { + "type": "string", + "description": "Login role to apply this quota to. Note that when set, path must be configured to a valid auth method with a concept of roles." + }, + "type": { + "type": "string", + "description": "Type of the quota rule." } } }, - "TokenRenewSelfRequest": { + "ReadWrappingProperties2Response": { "type": "object", "properties": { - "increment": { - "type": "integer", - "description": "The desired increment in seconds to the token expiration", - "format": "seconds", - "default": 0 + "creation_path": { + "type": "string" }, - "token": { + "creation_time": { "type": "string", - "description": "Token to renew (unused, does not need to be set)" + "format": "date-time" + }, + "creation_ttl": { + "type": "integer", + "format": "seconds" } } }, - "TokenRevokeAccessorRequest": { + "ReadWrappingPropertiesRequest": { "type": "object", "properties": { - "accessor": { - "type": "string", - "description": "Accessor of the token (request body)" + "token": { + "type": "string" } } }, - "TokenRevokeOrphanRequest": { + "ReadWrappingPropertiesResponse": { "type": "object", "properties": { - "token": { + "creation_path": { + "type": "string" + }, + "creation_time": { "type": "string", - "description": "Token to revoke (request body)" + "format": "date-time" + }, + "creation_ttl": { + "type": "integer", + "format": "seconds" } } }, - "TokenRevokeRequest": { + "RekeyAttemptInitializeRequest": { "type": "object", "properties": { - "token": { - "type": "string", - "description": "Token to revoke (request body)" + "backup": { + "type": "boolean", + "description": "Specifies if using PGP-encrypted keys, whether Vault should also store a plaintext backup of the PGP-encrypted keys." + }, + "pgp_keys": { + "type": "array", + "description": "Specifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as secret_shares.", + "items": { + "type": "string" + } + }, + "require_verification": { + "type": "boolean", + "description": "Turns on verification functionality" + }, + "secret_shares": { + "type": "integer", + "description": "Specifies the number of shares to split the unseal key into." + }, + "secret_threshold": { + "type": "integer", + "description": "Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as secret_shares." } } }, - "TokenWriteCreateOrphanRequest": { + "RekeyAttemptInitializeResponse": { "type": "object", "properties": { - "display_name": { - "type": "string", - "description": "Name to associate with this token" + "backup": { + "type": "boolean" }, - "entity_alias": { - "type": "string", - "description": "Name of the entity alias to associate with this token" + "n": { + "type": "integer" }, - "explicit_max_ttl": { - "type": "string", - "description": "Explicit Max TTL of this token" + "nounce": { + "type": "string" }, - "id": { - "type": "string", - "description": "Value for the token" + "pgp_fingerprints": { + "type": "array", + "items": { + "type": "string" + } }, - "metadata": { - "type": "object", - "description": "Arbitrary key=value metadata to associate with the token", - "format": "map" + "progress": { + "type": "integer" }, - "no_default_policy": { - "type": "boolean", - "description": "Do not include default policy for this token" + "required": { + "type": "integer" }, - "no_parent": { - "type": "boolean", - "description": "Create the token with no parent" + "started": { + "type": "string" + }, + "t": { + "type": "integer" + }, + "verification_nonce": { + "type": "string" }, - "num_uses": { - "type": "integer", - "description": "Max number of uses for this token" + "verification_required": { + "type": "boolean" + } + } + }, + "RekeyAttemptReadProgressResponse": { + "type": "object", + "properties": { + "backup": { + "type": "boolean" }, - "period": { - "type": "string", - "description": "Renew period" + "n": { + "type": "integer" }, - "policies": { + "nounce": { + "type": "string" + }, + "pgp_fingerprints": { "type": "array", - "description": "List of policies for the token", "items": { "type": "string" } }, - "renewable": { - "type": "boolean", - "description": "Allow token to be renewed past its initial TTL up to system/mount maximum TTL" + "progress": { + "type": "integer" }, - "role_name": { - "type": "string", - "description": "Name of the role" + "required": { + "type": "integer" }, - "ttl": { - "type": "string", - "description": "Time to live for this token" + "started": { + "type": "string" }, - "type": { - "type": "string", - "description": "Token type" + "t": { + "type": "integer" + }, + "verification_nonce": { + "type": "string" + }, + "verification_required": { + "type": "boolean" } } }, - "TokenWriteCreateRequest": { + "RekeyAttemptUpdateRequest": { "type": "object", "properties": { - "display_name": { - "type": "string", - "description": "Name to associate with this token" - }, - "entity_alias": { - "type": "string", - "description": "Name of the entity alias to associate with this token" - }, - "explicit_max_ttl": { + "key": { "type": "string", - "description": "Explicit Max TTL of this token" + "description": "Specifies a single unseal key share." }, - "id": { + "nonce": { "type": "string", - "description": "Value for the token" + "description": "Specifies the nonce of the rekey attempt." + } + } + }, + "RekeyAttemptUpdateResponse": { + "type": "object", + "properties": { + "backup": { + "type": "boolean" }, - "metadata": { - "type": "object", - "description": "Arbitrary key=value metadata to associate with the token", - "format": "map" + "complete": { + "type": "boolean" }, - "no_default_policy": { - "type": "boolean", - "description": "Do not include default policy for this token" + "keys": { + "type": "array", + "items": { + "type": "string" + } }, - "no_parent": { - "type": "boolean", - "description": "Create the token with no parent" + "keys_base64": { + "type": "array", + "items": { + "type": "string" + } }, - "num_uses": { - "type": "integer", - "description": "Max number of uses for this token" + "n": { + "type": "integer" }, - "period": { - "type": "string", - "description": "Renew period" + "nounce": { + "type": "string" }, - "policies": { + "pgp_fingerprints": { "type": "array", - "description": "List of policies for the token", "items": { "type": "string" } }, - "renewable": { - "type": "boolean", - "description": "Allow token to be renewed past its initial TTL up to system/mount maximum TTL" + "progress": { + "type": "integer" }, - "ttl": { - "type": "string", - "description": "Time to live for this token" + "required": { + "type": "integer" }, - "type": { - "type": "string", - "description": "Token type" + "started": { + "type": "string" + }, + "t": { + "type": "integer" + }, + "verification_nonce": { + "type": "string" + }, + "verification_required": { + "type": "boolean" } } }, - "TokenWriteCreateWithRoleRequest": { + "RekeyReadBackupKeyResponse": { "type": "object", "properties": { - "display_name": { - "type": "string", - "description": "Name to associate with this token" - }, - "entity_alias": { - "type": "string", - "description": "Name of the entity alias to associate with this token" + "keys": { + "type": "object", + "format": "map" }, - "explicit_max_ttl": { - "type": "string", - "description": "Explicit Max TTL of this token" + "keys_base64": { + "type": "object", + "format": "map" }, - "id": { - "type": "string", - "description": "Value for the token" + "nonce": { + "type": "string" + } + } + }, + "RekeyReadBackupRecoveryKeyResponse": { + "type": "object", + "properties": { + "keys": { + "type": "object", + "format": "map" }, - "metadata": { + "keys_base64": { "type": "object", - "description": "Arbitrary key=value metadata to associate with the token", "format": "map" }, - "no_default_policy": { - "type": "boolean", - "description": "Do not include default policy for this token" + "nonce": { + "type": "string" + } + } + }, + "RekeyVerificationCancelResponse": { + "type": "object", + "properties": { + "n": { + "type": "integer" }, - "no_parent": { - "type": "boolean", - "description": "Create the token with no parent" + "nounce": { + "type": "string" }, - "num_uses": { - "type": "integer", - "description": "Max number of uses for this token" + "progress": { + "type": "integer" }, - "period": { - "type": "string", - "description": "Renew period" + "started": { + "type": "string" }, - "policies": { - "type": "array", - "description": "List of policies for the token", - "items": { - "type": "string" - } + "t": { + "type": "integer" + } + } + }, + "RekeyVerificationReadProgressResponse": { + "type": "object", + "properties": { + "n": { + "type": "integer" }, - "renewable": { - "type": "boolean", - "description": "Allow token to be renewed past its initial TTL up to system/mount maximum TTL" + "nounce": { + "type": "string" }, - "ttl": { + "progress": { + "type": "integer" + }, + "started": { + "type": "string" + }, + "t": { + "type": "integer" + } + } + }, + "RekeyVerificationUpdateRequest": { + "type": "object", + "properties": { + "key": { "type": "string", - "description": "Time to live for this token" + "description": "Specifies a single unseal share key from the new set of shares." }, - "type": { + "nonce": { "type": "string", - "description": "Token type" + "description": "Specifies the nonce of the rekey verification operation." } } }, - "TokenWriteLookupAccessorRequest": { + "RekeyVerificationUpdateResponse": { "type": "object", "properties": { - "accessor": { - "type": "string", - "description": "Accessor of the token to look up (request body)" + "complete": { + "type": "boolean" + }, + "nounce": { + "type": "string" } } }, - "TokenWriteLookupRequest": { + "RemountRequest": { "type": "object", "properties": { - "token": { + "from": { "type": "string", - "description": "Token to lookup (POST request body)" + "description": "The previous mount point." + }, + "to": { + "type": "string", + "description": "The new mount point." + } + } + }, + "RemountResponse": { + "type": "object", + "properties": { + "migration_id": { + "type": "string" + } + } + }, + "RemountStatusResponse": { + "type": "object", + "properties": { + "migration_id": { + "type": "string" + }, + "migration_info": { + "type": "object", + "format": "map" } } }, - "TokenWriteLookupSelfRequest": { + "RewrapRequest": { "type": "object", "properties": { "token": { + "type": "string" + } + } + }, + "RootTokenGenerationInitialize2Request": { + "type": "object", + "properties": { + "pgp_key": { "type": "string", - "description": "Token to look up (unused, does not need to be set)" + "description": "Specifies a base64-encoded PGP public key." } } }, - "TokenWriteRoleRequest": { + "RootTokenGenerationInitialize2Response": { "type": "object", "properties": { - "allowed_entity_aliases": { - "type": "array", - "description": "String or JSON list of allowed entity aliases. If set, specifies the entity aliases which are allowed to be used during token generation. This field supports globbing.", - "items": { - "type": "string" - } - }, - "allowed_policies": { - "type": "array", - "description": "If set, tokens can be created with any subset of the policies in this list, rather than the normal semantics of tokens being a subset of the calling token's policies. The parameter is a comma-delimited string of policy names.", - "items": { - "type": "string" - } - }, - "allowed_policies_glob": { - "type": "array", - "description": "If set, tokens can be created with any subset of glob matched policies in this list, rather than the normal semantics of tokens being a subset of the calling token's policies. The parameter is a comma-delimited string of policy name globs.", - "items": { - "type": "string" - } - }, - "bound_cidrs": { - "type": "array", - "description": "Use 'token_bound_cidrs' instead.", - "items": { - "type": "string" - }, - "deprecated": true - }, - "disallowed_policies": { - "type": "array", - "description": "If set, successful token creation via this role will require that no policies in the given list are requested. The parameter is a comma-delimited string of policy names.", - "items": { - "type": "string" - } - }, - "disallowed_policies_glob": { - "type": "array", - "description": "If set, successful token creation via this role will require that no requested policies glob match any of policies in this list. The parameter is a comma-delimited string of policy name globs.", - "items": { - "type": "string" - } - }, - "explicit_max_ttl": { - "type": "integer", - "description": "Use 'token_explicit_max_ttl' instead.", - "format": "seconds", - "deprecated": true - }, - "orphan": { - "type": "boolean", - "description": "If true, tokens created via this role will be orphan tokens (have no parent)" + "complete": { + "type": "boolean" }, - "path_suffix": { - "type": "string", - "description": "If set, tokens created via this role will contain the given suffix as a part of their path. This can be used to assist use of the 'revoke-prefix' endpoint later on. The given suffix must match the regular expression.\\w[\\w-.]+\\w" + "encoded_root_token": { + "type": "string" }, - "period": { - "type": "integer", - "description": "Use 'token_period' instead.", - "format": "seconds", - "deprecated": true + "encoded_token": { + "type": "string" }, - "renewable": { - "type": "boolean", - "description": "Tokens created via this role will be renewable or not according to this value. Defaults to \"true\".", - "default": true + "nonce": { + "type": "string" }, - "token_bound_cidrs": { - "type": "array", - "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Bound CIDRs", - "group": "Tokens" - } + "otp": { + "type": "string" }, - "token_explicit_max_ttl": { - "type": "integer", - "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Explicit Maximum TTL", - "group": "Tokens" - } + "otp_length": { + "type": "integer" }, - "token_no_default_policy": { - "type": "boolean", - "description": "If true, the 'default' policy will not automatically be added to generated tokens", - "x-vault-displayAttrs": { - "name": "Do Not Attach 'default' Policy To Generated Tokens", - "group": "Tokens" - } + "pgp_fingerprint": { + "type": "string" }, - "token_num_uses": { - "type": "integer", - "description": "The maximum number of times a token may be used, a value of zero means unlimited", - "x-vault-displayAttrs": { - "name": "Maximum Uses of Generated Tokens", - "group": "Tokens" - } + "progress": { + "type": "integer" }, - "token_period": { - "type": "integer", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Period", - "group": "Tokens" - } + "required": { + "type": "integer" }, - "token_type": { - "type": "string", - "description": "The type of token to generate, service or batch", - "default": "default-service", - "x-vault-displayAttrs": { - "name": "Generated Token's Type", - "group": "Tokens" - } + "started": { + "type": "boolean" } } }, - "ToolsGenerateRandomRequest": { + "RootTokenGenerationInitializeRequest": { "type": "object", "properties": { - "bytes": { - "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 - }, - "format": { - "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" - }, - "source": { - "type": "string", - "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", - "default": "platform" - }, - "urlbytes": { + "pgp_key": { "type": "string", - "description": "The number of bytes to generate (POST URL parameter)" + "description": "Specifies a base64-encoded PGP public key." } } }, - "ToolsGenerateRandomSourceBytesRequest": { + "RootTokenGenerationInitializeResponse": { "type": "object", "properties": { - "bytes": { - "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 + "complete": { + "type": "boolean" }, - "format": { - "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" + "encoded_root_token": { + "type": "string" + }, + "encoded_token": { + "type": "string" + }, + "nonce": { + "type": "string" + }, + "otp": { + "type": "string" + }, + "otp_length": { + "type": "integer" + }, + "pgp_fingerprint": { + "type": "string" + }, + "progress": { + "type": "integer" + }, + "required": { + "type": "integer" + }, + "started": { + "type": "boolean" } } }, - "ToolsGenerateRandomSourceRequest": { + "RootTokenGenerationReadProgress2Response": { "type": "object", "properties": { - "bytes": { - "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 + "complete": { + "type": "boolean" }, - "format": { - "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" + "encoded_root_token": { + "type": "string" }, - "urlbytes": { - "type": "string", - "description": "The number of bytes to generate (POST URL parameter)" + "encoded_token": { + "type": "string" + }, + "nonce": { + "type": "string" + }, + "otp": { + "type": "string" + }, + "otp_length": { + "type": "integer" + }, + "pgp_fingerprint": { + "type": "string" + }, + "progress": { + "type": "integer" + }, + "required": { + "type": "integer" + }, + "started": { + "type": "boolean" } } }, - "ToolsHashRequest": { + "RootTokenGenerationReadProgressResponse": { "type": "object", "properties": { - "algorithm": { - "type": "string", - "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\".", - "default": "sha2-256" + "complete": { + "type": "boolean" }, - "format": { - "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", - "default": "hex" + "encoded_root_token": { + "type": "string" }, - "input": { - "type": "string", - "description": "The base64-encoded input data" + "encoded_token": { + "type": "string" }, - "urlalgorithm": { - "type": "string", - "description": "Algorithm to use (POST URL parameter)" + "nonce": { + "type": "string" + }, + "otp": { + "type": "string" + }, + "otp_length": { + "type": "integer" + }, + "pgp_fingerprint": { + "type": "string" + }, + "progress": { + "type": "integer" + }, + "required": { + "type": "integer" + }, + "started": { + "type": "boolean" } } }, - "ToolsHashWithRequest": { + "RootTokenGenerationUpdateRequest": { "type": "object", "properties": { - "algorithm": { - "type": "string", - "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\".", - "default": "sha2-256" - }, - "format": { + "key": { "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", - "default": "hex" + "description": "Specifies a single unseal key share." }, - "input": { + "nonce": { "type": "string", - "description": "The base64-encoded input data" + "description": "Specifies the nonce of the attempt." } } }, - "TransitDecryptRequest": { + "RootTokenGenerationUpdateResponse": { "type": "object", "properties": { - "associated_data": { - "type": "string", - "description": "When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with." + "complete": { + "type": "boolean" }, - "ciphertext": { - "type": "string", - "description": "The ciphertext to decrypt, provided as returned by encrypt." + "encoded_root_token": { + "type": "string" }, - "context": { - "type": "string", - "description": "Base64 encoded context for key derivation. Required if key derivation is enabled." + "encoded_token": { + "type": "string" }, "nonce": { - "type": "string", - "description": "Base64 encoded nonce value used during encryption. Must be provided if convergent encryption is enabled for this key and the key was generated with Vault 0.6.1. Not required for keys created in 0.6.2+." + "type": "string" }, - "partial_failure_response_code": { - "type": "integer", - "description": "Ordinarily, if a batch item fails to decrypt due to a bad input, but other batch items succeed, the HTTP response code is 400 (Bad Request). Some applications may want to treat partial failures differently. Providing the parameter returns the given response code integer instead of a 400 in this case. If all values fail HTTP 400 is still returned." + "otp": { + "type": "string" + }, + "otp_length": { + "type": "integer" + }, + "pgp_fingerprint": { + "type": "string" + }, + "progress": { + "type": "integer" + }, + "required": { + "type": "integer" + }, + "started": { + "type": "boolean" } } }, - "TransitEncryptRequest": { + "SealStatusResponse": { "type": "object", "properties": { - "associated_data": { - "type": "string", - "description": "When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with." + "build_date": { + "type": "string" }, - "context": { - "type": "string", - "description": "Base64 encoded context for key derivation. Required if key derivation is enabled" + "cluster_id": { + "type": "string" }, - "convergent_encryption": { - "type": "boolean", - "description": "This parameter will only be used when a key is expected to be created. Whether to support convergent encryption. This is only supported when using a key with key derivation enabled and will require all requests to carry both a context and 96-bit (12-byte) nonce. The given nonce will be used in place of a randomly generated nonce. As a result, when the same context and nonce are supplied, the same ciphertext is generated. It is *very important* when using this mode that you ensure that all nonces are unique for a given context. Failing to do so will severely impact the ciphertext's security." + "cluster_name": { + "type": "string" }, - "key_version": { - "type": "integer", - "description": "The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + "hcp_link_resource_ID": { + "type": "string" + }, + "hcp_link_status": { + "type": "string" + }, + "initialized": { + "type": "boolean" + }, + "migration": { + "type": "boolean" + }, + "n": { + "type": "integer" }, "nonce": { - "type": "string", - "description": "Base64 encoded nonce value. Must be provided if convergent encryption is enabled for this key and the key was generated with Vault 0.6.1. Not required for keys created in 0.6.2+. The value must be exactly 96 bits (12 bytes) long and the user must ensure that for any given context (and thus, any given encryption key) this nonce value is **never reused**." + "type": "string" }, - "partial_failure_response_code": { - "type": "integer", - "description": "Ordinarily, if a batch item fails to encrypt due to a bad input, but other batch items succeed, the HTTP response code is 400 (Bad Request). Some applications may want to treat partial failures differently. Providing the parameter returns the given response code integer instead of a 400 in this case. If all values fail HTTP 400 is still returned." + "progress": { + "type": "integer" }, - "plaintext": { - "type": "string", - "description": "Base64 encoded plaintext value to be encrypted" + "recovery_seal": { + "type": "boolean" + }, + "sealed": { + "type": "boolean" + }, + "storage_type": { + "type": "string" + }, + "t": { + "type": "integer" }, "type": { - "type": "string", - "description": "This parameter is required when encryption key is expected to be created. When performing an upsert operation, the type of key to create. Currently, \"aes128-gcm96\" (symmetric) and \"aes256-gcm96\" (symmetric) are the only types supported. Defaults to \"aes256-gcm96\".", - "default": "aes256-gcm96" + "type": "string" + }, + "version": { + "type": "string" } } }, - "TransitGenerateDataKeyRequest": { + "SshConfigureCaRequest": { "type": "object", "properties": { - "bits": { + "generate_signing_key": { + "type": "boolean", + "description": "Generate SSH key pair internally rather than use the private_key and public_key fields.", + "default": true + }, + "key_bits": { "type": "integer", - "description": "Number of bits for the key; currently 128, 256, and 512 bits are supported. Defaults to 256.", - "default": 256 + "description": "Specifies the desired key bits when generating variable-length keys (such as when key_type=\"ssh-rsa\") or which NIST P-curve to use when key_type=\"ec\" (256, 384, or 521).", + "default": 0 }, - "context": { + "key_type": { "type": "string", - "description": "Context for key derivation. Required for derived keys." + "description": "Specifies the desired key type when generating; could be a OpenSSH key type identifier (ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, or ssh-ed25519) or an algorithm (rsa, ec, ed25519).", + "default": "ssh-rsa" }, - "key_version": { - "type": "integer", - "description": "The version of the Vault key to use for encryption of the data key. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + "private_key": { + "type": "string", + "description": "Private half of the SSH key that will be used to sign certificates." }, - "nonce": { + "public_key": { "type": "string", - "description": "Nonce for when convergent encryption v1 is used (only in Vault 0.6.1)" + "description": "Public half of the SSH key that will be used to sign certificates." } } }, - "TransitGenerateHMACRequest": { + "SshConfigureZeroAddressRequest": { "type": "object", "properties": { - "algorithm": { - "type": "string", - "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", - "default": "sha2-256" - }, - "input": { - "type": "string", - "description": "The base64-encoded input data" - }, - "key_version": { - "type": "integer", - "description": "The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." - }, - "urlalgorithm": { - "type": "string", - "description": "Algorithm to use (POST URL parameter)" + "roles": { + "type": "array", + "description": "[Required] Comma separated list of role names which allows credentials to be requested for any IP address. CIDR blocks previously registered under these roles will be ignored.", + "items": { + "type": "string" + } } } }, - "TransitGenerateHMACWithAlgorithmRequest": { + "SshGenerateCredentialsRequest": { "type": "object", "properties": { - "algorithm": { + "ip": { "type": "string", - "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", - "default": "sha2-256" + "description": "[Required] IP of the remote host" }, - "input": { + "username": { "type": "string", - "description": "The base64-encoded input data" - }, - "key_version": { - "type": "integer", - "description": "The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + "description": "[Optional] Username in remote host" } } }, - "TransitGenerateRandomRequest": { + "SshIssueCertificateRequest": { "type": "object", "properties": { - "bytes": { + "cert_type": { + "type": "string", + "description": "Type of certificate to be created; either \"user\" or \"host\".", + "default": "user" + }, + "critical_options": { + "type": "object", + "description": "Critical options that the certificate should be signed for.", + "format": "map" + }, + "extensions": { + "type": "object", + "description": "Extensions that the certificate should be signed for.", + "format": "map" + }, + "key_bits": { "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 + "description": "Specifies the number of bits to use for the generated keys.", + "default": 0 }, - "format": { + "key_id": { "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" + "description": "Key id that the created certificate should have. If not specified, the display name of the token will be used." }, - "source": { + "key_type": { "type": "string", - "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", - "default": "platform" + "description": "Specifies the desired key type; must be `rsa`, `ed25519` or `ec`", + "default": "rsa" }, - "urlbytes": { - "type": "string", - "description": "The number of bytes to generate (POST URL parameter)" - } - } - }, - "TransitGenerateRandomSourceBytesRequest": { - "type": "object", - "properties": { - "bytes": { + "ttl": { "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 + "description": "The requested Time To Live for the SSH certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be later than the role max TTL.", + "format": "seconds" }, - "format": { + "valid_principals": { "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" + "description": "Valid principals, either usernames or hostnames, that the certificate should be signed for." } } }, - "TransitGenerateRandomSourceRequest": { + "SshListRolesByIpRequest": { "type": "object", "properties": { - "bytes": { - "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 - }, - "format": { - "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" - }, - "urlbytes": { + "ip": { "type": "string", - "description": "The number of bytes to generate (POST URL parameter)" + "description": "[Required] IP address of remote host" } } }, - "TransitHashRequest": { + "SshSignCertificateRequest": { "type": "object", "properties": { - "algorithm": { + "cert_type": { "type": "string", - "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", - "default": "sha2-256" + "description": "Type of certificate to be created; either \"user\" or \"host\".", + "default": "user" }, - "format": { + "critical_options": { + "type": "object", + "description": "Critical options that the certificate should be signed for.", + "format": "map" + }, + "extensions": { + "type": "object", + "description": "Extensions that the certificate should be signed for.", + "format": "map" + }, + "key_id": { "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", - "default": "hex" + "description": "Key id that the created certificate should have. If not specified, the display name of the token will be used." }, - "input": { + "public_key": { "type": "string", - "description": "The base64-encoded input data" + "description": "SSH public key that should be signed." }, - "urlalgorithm": { + "ttl": { + "type": "integer", + "description": "The requested Time To Live for the SSH certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be later than the role max TTL.", + "format": "seconds" + }, + "valid_principals": { "type": "string", - "description": "Algorithm to use (POST URL parameter)" + "description": "Valid principals, either usernames or hostnames, that the certificate should be signed for." } } }, - "TransitHashWithAlgorithmRequest": { + "SshVerifyOtpRequest": { "type": "object", "properties": { - "algorithm": { - "type": "string", - "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", - "default": "sha2-256" - }, - "format": { - "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", - "default": "hex" - }, - "input": { + "otp": { "type": "string", - "description": "The base64-encoded input data" + "description": "[Required] One-Time-Key that needs to be validated" } } }, - "TransitImportKeyRequest": { + "SshWriteRoleRequest": { "type": "object", "properties": { - "allow_plaintext_backup": { - "type": "boolean", - "description": "Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled." + "algorithm_signer": { + "type": "string", + "description": "[Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string.", + "enum": [ + "", + "default", + "ssh-rsa", + "rsa-sha2-256", + "rsa-sha2-512" + ], + "x-vault-displayAttrs": { + "name": "Signing Algorithm" + } }, - "allow_rotation": { + "allow_bare_domains": { "type": "boolean", - "description": "True if the imported key may be rotated within Vault; false otherwise." - }, - "auto_rotate_period": { - "type": "integer", - "description": "Amount of time the key should live before being automatically rotated. A value of 0 (default) disables automatic rotation for the key.", - "format": "seconds", - "default": 0 + "description": "[Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use the base domains listed in \"allowed_domains\", e.g. \"example.com\". This is a separate option as in some cases this can be considered a security threat." }, - "ciphertext": { - "type": "string", - "description": "The base64-encoded ciphertext of the keys. The AES key should be encrypted using OAEP with the wrapping key and then concatenated with the import key, wrapped by the AES key." + "allow_host_certificates": { + "type": "boolean", + "description": "[Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'host'.", + "default": false }, - "context": { - "type": "string", - "description": "Base64 encoded context for key derivation. When reading a key with key derivation enabled, if the key type supports public keys, this will return the public key for the given context." + "allow_subdomains": { + "type": "boolean", + "description": "[Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use subdomains of those listed in \"allowed_domains\"." }, - "derived": { + "allow_user_certificates": { "type": "boolean", - "description": "Enables key derivation mode. This allows for per-transaction unique keys for encryption operations." + "description": "[Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'user'.", + "default": false }, - "exportable": { + "allow_user_key_ids": { "type": "boolean", - "description": "Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported." + "description": "[Not applicable for OTP type] [Optional for CA type] If true, users can override the key ID for a signed certificate with the \"key_id\" field. When false, the key ID will always be the token display name. The key ID is logged by the SSH server and can be useful for auditing.", + "x-vault-displayAttrs": { + "name": "Allow User Key IDs" + } }, - "hash_function": { + "allowed_critical_options": { "type": "string", - "description": "The hash function used as a random oracle in the OAEP wrapping of the user-generated, ephemeral AES key. Can be one of \"SHA1\", \"SHA224\", \"SHA256\" (default), \"SHA384\", or \"SHA512\"", - "default": "SHA256" + "description": "[Not applicable for OTP type] [Optional for CA type] A comma-separated list of critical options that certificates can have when signed. To allow any critical options, set this to an empty string." }, - "type": { + "allowed_domains": { "type": "string", - "description": "The type of key being imported. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\".", - "default": "aes256-gcm96" - } - } - }, - "TransitImportKeyVersionRequest": { - "type": "object", - "properties": { - "ciphertext": { + "description": "[Not applicable for OTP type] [Optional for CA type] If this option is not specified, client can request for a signed certificate for any valid host. If only certain domains are allowed, then this list enforces it." + }, + "allowed_domains_template": { + "type": "boolean", + "description": "[Not applicable for OTP type] [Optional for CA type] If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted.", + "default": false + }, + "allowed_extensions": { "type": "string", - "description": "The base64-encoded ciphertext of the keys. The AES key should be encrypted using OAEP with the wrapping key and then concatenated with the import key, wrapped by the AES key." + "description": "[Not applicable for OTP type] [Optional for CA type] A comma-separated list of extensions that certificates can have when signed. An empty list means that no extension overrides are allowed by an end-user; explicitly specify '*' to allow any extensions to be set." }, - "hash_function": { + "allowed_user_key_lengths": { + "type": "object", + "description": "[Not applicable for OTP type] [Optional for CA type] If set, allows the enforcement of key types and minimum key sizes to be signed.", + "format": "map" + }, + "allowed_users": { "type": "string", - "description": "The hash function used as a random oracle in the OAEP wrapping of the user-generated, ephemeral AES key. Can be one of \"SHA1\", \"SHA224\", \"SHA256\" (default), \"SHA384\", or \"SHA512\"", - "default": "SHA256" - } - } - }, - "TransitRestoreKeyRequest": { - "type": "object", - "properties": { - "backup": { + "description": "[Optional for all types] [Works differently for CA type] If this option is not specified, or is '*', client can request a credential for any valid user at the remote host, including the admin user. If only certain usernames are to be allowed, then this list enforces it. If this field is set, then credentials can only be created for default_user and usernames present in this list. Setting this option will enable all the users with access to this role to fetch credentials for all other usernames in this list. Use with caution. N.B.: with the CA type, an empty list means that no users are allowed; explicitly specify '*' to allow any user." + }, + "allowed_users_template": { + "type": "boolean", + "description": "[Not applicable for OTP type] [Optional for CA type] If set, Allowed users can be specified using identity template policies. Non-templated users are also permitted.", + "default": false + }, + "cidr_list": { "type": "string", - "description": "Backed up key data to be restored. This should be the output from the 'backup/' endpoint." + "description": "[Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks for which the role is applicable for. CIDR blocks can belong to more than one role.", + "x-vault-displayAttrs": { + "name": "CIDR List" + } }, - "force": { + "default_critical_options": { + "type": "object", + "description": "[Not applicable for OTP type] [Optional for CA type] Critical options certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_critical_options\". Defaults to none.", + "format": "map" + }, + "default_extensions": { + "type": "object", + "description": "[Not applicable for OTP type] [Optional for CA type] Extensions certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_extensions\". Defaults to none.", + "format": "map" + }, + "default_extensions_template": { "type": "boolean", - "description": "If set and a key by the given name exists, force the restore operation and override the key.", + "description": "[Not applicable for OTP type] [Optional for CA type] If set, Default extension values can be specified using identity template policies. Non-templated extension values are also permitted.", "default": false - } - } - }, - "TransitRestoreRequest": { - "type": "object", - "properties": { - "backup": { + }, + "default_user": { "type": "string", - "description": "Backed up key data to be restored. This should be the output from the 'backup/' endpoint." + "description": "[Required for OTP type] [Optional for CA type] Default username for which a credential will be generated. When the endpoint 'creds/' is used without a username, this value will be used as default username.", + "x-vault-displayAttrs": { + "name": "Default Username" + } }, - "force": { + "default_user_template": { "type": "boolean", - "description": "If set and a key by the given name exists, force the restore operation and override the key.", + "description": "[Not applicable for OTP type] [Optional for CA type] If set, Default user can be specified using identity template policies. Non-templated users are also permitted.", "default": false }, - "name": { + "exclude_cidr_list": { "type": "string", - "description": "If set, this will be the name of the restored key." - } - } - }, - "TransitRewrapRequest": { - "type": "object", - "properties": { - "ciphertext": { + "description": "[Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks. IP addresses belonging to these blocks are not accepted by the role. This is particularly useful when big CIDR blocks are being used by the role and certain parts of it needs to be kept out.", + "x-vault-displayAttrs": { + "name": "Exclude CIDR List" + } + }, + "key_id_format": { "type": "string", - "description": "Ciphertext value to rewrap" + "description": "[Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a custom format for the key id of a signed certificate. The following variables are available for use: '{{token_display_name}}' - The display name of the token used to make the request. '{{role_name}}' - The name of the role signing the request. '{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed.", + "x-vault-displayAttrs": { + "name": "Key ID Format" + } }, - "context": { + "key_type": { "type": "string", - "description": "Base64 encoded context for key derivation. Required for derived keys." + "description": "[Required for all types] Type of key used to login to hosts. It can be either 'otp' or 'ca'. 'otp' type requires agent to be installed in remote hosts.", + "enum": [ + "otp", + "ca" + ], + "x-vault-displayAttrs": { + "value": "ca" + } }, - "key_version": { + "max_ttl": { "type": "integer", - "description": "The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + "description": "[Not applicable for OTP type] [Optional for CA type] The maximum allowed lease duration", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Max TTL" + } }, - "nonce": { - "type": "string", - "description": "Nonce for when convergent encryption is used" + "not_before_duration": { + "type": "integer", + "description": "[Not applicable for OTP type] [Optional for CA type] The duration that the SSH certificate should be backdated by at issuance.", + "format": "seconds", + "default": 30, + "x-vault-displayAttrs": { + "name": "Not before duration", + "value": 30 + } + }, + "port": { + "type": "integer", + "description": "[Optional for OTP type] [Not applicable for CA type] Port number for SSH connection. Default is '22'. Port number does not play any role in creation of OTP. For 'otp' type, this is just a way to inform client about the port number to use. Port number will be returned to client by Vault server along with OTP.", + "x-vault-displayAttrs": { + "value": 22 + } + }, + "ttl": { + "type": "integer", + "description": "[Not applicable for OTP type] [Optional for CA type] The lease duration if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the value of max_ttl.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "TTL" + } } } }, - "TransitSignRequest": { + "TerraformCloudConfigureRequest": { "type": "object", "properties": { - "algorithm": { - "type": "string", - "description": "Deprecated: use \"hash_algorithm\" instead.", - "default": "sha2-256" - }, - "context": { + "address": { "type": "string", - "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." + "description": "The address to access Terraform Cloud or Enterprise. Default is \"https://app.terraform.io\".", + "default": "https://app.terraform.io" }, - "hash_algorithm": { + "base_path": { "type": "string", - "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature.", - "default": "sha2-256" + "description": "The base path for the Terraform Cloud or Enterprise API. Default is \"/api/v2/\".", + "default": "/api/v2/" }, - "input": { + "token": { "type": "string", - "description": "The base64-encoded input data" - }, - "key_version": { + "description": "The token to access Terraform Cloud", + "x-vault-displayAttrs": { + "name": "Token", + "sensitive": true + } + } + }, + "required": [ + "token" + ] + }, + "TerraformCloudWriteRoleRequest": { + "type": "object", + "properties": { + "max_ttl": { "type": "integer", - "description": "The version of the key to use for signing. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + "description": "Maximum time for role. If not set or set to 0, will use system default.", + "format": "seconds" }, - "marshaling_algorithm": { + "organization": { "type": "string", - "description": "The method by which to marshal the signature. The default is 'asn1' which is used by openssl and X.509. It can also be set to 'jws' which is used for JWT signatures; setting it to this will also cause the encoding of the signature to be url-safe base64 instead of using standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", - "default": "asn1" - }, - "prehashed": { - "type": "boolean", - "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." + "description": "Name of the Terraform Cloud or Enterprise organization" }, - "salt_length": { + "team_id": { "type": "string", - "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", - "default": "auto" + "description": "ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)" }, - "signature_algorithm": { - "type": "string", - "description": "The signature algorithm to use for signing. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" + "ttl": { + "type": "integer", + "description": "Default lease for generated credentials. If not set or set to 0, will use system default.", + "format": "seconds" }, - "urlalgorithm": { + "user_id": { "type": "string", - "description": "Hash algorithm to use (POST URL parameter)" + "description": "ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)" } } }, - "TransitSignWithAlgorithmRequest": { + "TokenCreateAgainstRoleRequest": { "type": "object", "properties": { - "algorithm": { + "display_name": { "type": "string", - "description": "Deprecated: use \"hash_algorithm\" instead.", - "default": "sha2-256" + "description": "Name to associate with this token" }, - "context": { + "entity_alias": { "type": "string", - "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." + "description": "Name of the entity alias to associate with this token" }, - "hash_algorithm": { + "explicit_max_ttl": { "type": "string", - "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature.", - "default": "sha2-256" + "description": "Explicit Max TTL of this token" }, - "input": { + "id": { "type": "string", - "description": "The base64-encoded input data" + "description": "Value for the token" }, - "key_version": { + "metadata": { + "type": "object", + "description": "Arbitrary key=value metadata to associate with the token", + "format": "map" + }, + "no_default_policy": { + "type": "boolean", + "description": "Do not include default policy for this token" + }, + "no_parent": { + "type": "boolean", + "description": "Create the token with no parent" + }, + "num_uses": { "type": "integer", - "description": "The version of the key to use for signing. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + "description": "Max number of uses for this token" }, - "marshaling_algorithm": { + "period": { "type": "string", - "description": "The method by which to marshal the signature. The default is 'asn1' which is used by openssl and X.509. It can also be set to 'jws' which is used for JWT signatures; setting it to this will also cause the encoding of the signature to be url-safe base64 instead of using standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", - "default": "asn1" + "description": "Renew period" }, - "prehashed": { + "policies": { + "type": "array", + "description": "List of policies for the token", + "items": { + "type": "string" + } + }, + "renewable": { "type": "boolean", - "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." + "description": "Allow token to be renewed past its initial TTL up to system/mount maximum TTL" }, - "salt_length": { + "ttl": { "type": "string", - "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", - "default": "auto" + "description": "Time to live for this token" }, - "signature_algorithm": { - "type": "string", - "description": "The signature algorithm to use for signing. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" - } - } - }, - "TransitTrimKeyRequest": { - "type": "object", - "properties": { - "min_available_version": { - "type": "integer", - "description": "The minimum available version for the key ring. All versions before this version will be permanently deleted. This value can at most be equal to the lesser of 'min_decryption_version' and 'min_encryption_version'. This is not allowed to be set when either 'min_encryption_version' or 'min_decryption_version' is set to zero." + "type": { + "type": "string", + "description": "Token type" } } }, - "TransitVerifyRequest": { + "TokenCreateOrphanRequest": { "type": "object", "properties": { - "algorithm": { + "display_name": { "type": "string", - "description": "Deprecated: use \"hash_algorithm\" instead.", - "default": "sha2-256" + "description": "Name to associate with this token" }, - "context": { + "entity_alias": { "type": "string", - "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." + "description": "Name of the entity alias to associate with this token" }, - "hash_algorithm": { + "explicit_max_ttl": { "type": "string", - "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path.", - "default": "sha2-256" + "description": "Explicit Max TTL of this token" }, - "hmac": { + "id": { "type": "string", - "description": "The HMAC, including vault header/key version" + "description": "Value for the token" }, - "input": { - "type": "string", - "description": "The base64-encoded input data to verify" + "metadata": { + "type": "object", + "description": "Arbitrary key=value metadata to associate with the token", + "format": "map" }, - "marshaling_algorithm": { - "type": "string", - "description": "The method by which to unmarshal the signature when verifying. The default is 'asn1' which is used by openssl and X.509; can also be set to 'jws' which is used for JWT signatures in which case the signature is also expected to be url-safe base64 encoding instead of standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", - "default": "asn1" + "no_default_policy": { + "type": "boolean", + "description": "Do not include default policy for this token" }, - "prehashed": { + "no_parent": { "type": "boolean", - "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." + "description": "Create the token with no parent" }, - "salt_length": { + "num_uses": { + "type": "integer", + "description": "Max number of uses for this token" + }, + "period": { "type": "string", - "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", - "default": "auto" + "description": "Renew period" }, - "signature": { + "policies": { + "type": "array", + "description": "List of policies for the token", + "items": { + "type": "string" + } + }, + "renewable": { + "type": "boolean", + "description": "Allow token to be renewed past its initial TTL up to system/mount maximum TTL" + }, + "role_name": { "type": "string", - "description": "The signature, including vault header/key version" + "description": "Name of the role" }, - "signature_algorithm": { + "ttl": { "type": "string", - "description": "The signature algorithm to use for signature verification. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" + "description": "Time to live for this token" }, - "urlalgorithm": { + "type": { "type": "string", - "description": "Hash algorithm to use (POST URL parameter)" + "description": "Token type" } } }, - "TransitVerifyWithAlgorithmRequest": { + "TokenCreateRequest": { "type": "object", "properties": { - "algorithm": { + "display_name": { "type": "string", - "description": "Deprecated: use \"hash_algorithm\" instead.", - "default": "sha2-256" + "description": "Name to associate with this token" }, - "context": { + "entity_alias": { "type": "string", - "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." + "description": "Name of the entity alias to associate with this token" }, - "hash_algorithm": { + "explicit_max_ttl": { "type": "string", - "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path.", - "default": "sha2-256" + "description": "Explicit Max TTL of this token" }, - "hmac": { + "id": { "type": "string", - "description": "The HMAC, including vault header/key version" + "description": "Value for the token" }, - "input": { - "type": "string", - "description": "The base64-encoded input data to verify" + "metadata": { + "type": "object", + "description": "Arbitrary key=value metadata to associate with the token", + "format": "map" }, - "marshaling_algorithm": { - "type": "string", - "description": "The method by which to unmarshal the signature when verifying. The default is 'asn1' which is used by openssl and X.509; can also be set to 'jws' which is used for JWT signatures in which case the signature is also expected to be url-safe base64 encoding instead of standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", - "default": "asn1" + "no_default_policy": { + "type": "boolean", + "description": "Do not include default policy for this token" }, - "prehashed": { + "no_parent": { "type": "boolean", - "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." + "description": "Create the token with no parent" }, - "salt_length": { + "num_uses": { + "type": "integer", + "description": "Max number of uses for this token" + }, + "period": { "type": "string", - "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", - "default": "auto" + "description": "Renew period" }, - "signature": { + "policies": { + "type": "array", + "description": "List of policies for the token", + "items": { + "type": "string" + } + }, + "renewable": { + "type": "boolean", + "description": "Allow token to be renewed past its initial TTL up to system/mount maximum TTL" + }, + "ttl": { "type": "string", - "description": "The signature, including vault header/key version" + "description": "Time to live for this token" }, - "signature_algorithm": { + "type": { "type": "string", - "description": "The signature algorithm to use for signature verification. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" + "description": "Token type" } } }, - "TransitWriteCacheConfigRequest": { + "TokenLookUpAccessorRequest": { "type": "object", "properties": { - "size": { - "type": "integer", - "description": "Size of cache, use 0 for an unlimited cache size, defaults to 0", - "default": 0 + "accessor": { + "type": "string", + "description": "Accessor of the token to look up (request body)" } } }, - "TransitWriteConfigKeysRequest": { + "TokenLookUpRequest": { "type": "object", "properties": { - "disable_upsert": { - "type": "boolean", - "description": "Whether to allow automatic upserting (creation) of keys on the encrypt endpoint." + "token": { + "type": "string", + "description": "Token to lookup (POST request body)" } } }, - "TransitWriteKeyConfigRequest": { + "TokenLookUpSelf2Request": { "type": "object", "properties": { - "allow_plaintext_backup": { - "type": "boolean", - "description": "Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled." - }, - "auto_rotate_period": { - "type": "integer", - "description": "Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.", - "format": "seconds" - }, - "deletion_allowed": { - "type": "boolean", - "description": "Whether to allow deletion of the key" - }, - "exportable": { - "type": "boolean", - "description": "Enables export of the key. Once set, this cannot be disabled." - }, - "min_decryption_version": { - "type": "integer", - "description": "If set, the minimum version of the key allowed to be decrypted. For signing keys, the minimum version allowed to be used for verification." - }, - "min_encryption_version": { - "type": "integer", - "description": "If set, the minimum version of the key allowed to be used for encryption; or for signing keys, to be used for signing. If set to zero, only the latest version of the key is allowed." + "token": { + "type": "string", + "description": "Token to look up (unused, does not need to be set)" } } }, - "TransitWriteKeyRequest": { + "TokenRenewAccessorRequest": { "type": "object", "properties": { - "allow_plaintext_backup": { - "type": "boolean", - "description": "Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled." + "accessor": { + "type": "string", + "description": "Accessor of the token to renew (request body)" }, - "auto_rotate_period": { + "increment": { "type": "integer", - "description": "Amount of time the key should live before being automatically rotated. A value of 0 (default) disables automatic rotation for the key.", + "description": "The desired increment in seconds to the token expiration", "format": "seconds", "default": 0 - }, - "context": { - "type": "string", - "description": "Base64 encoded context for key derivation. When reading a key with key derivation enabled, if the key type supports public keys, this will return the public key for the given context." - }, - "convergent_encryption": { - "type": "boolean", - "description": "Whether to support convergent encryption. This is only supported when using a key with key derivation enabled and will require all requests to carry both a context and 96-bit (12-byte) nonce. The given nonce will be used in place of a randomly generated nonce. As a result, when the same context and nonce are supplied, the same ciphertext is generated. It is *very important* when using this mode that you ensure that all nonces are unique for a given context. Failing to do so will severely impact the ciphertext's security." - }, - "derived": { - "type": "boolean", - "description": "Enables key derivation mode. This allows for per-transaction unique keys for encryption operations." - }, - "exportable": { - "type": "boolean", - "description": "Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported." - }, - "key_size": { + } + } + }, + "TokenRenewRequest": { + "type": "object", + "properties": { + "increment": { "type": "integer", - "description": "The key size in bytes for the algorithm. Only applies to HMAC and must be no fewer than 32 bytes and no more than 512", + "description": "The desired increment in seconds to the token expiration", + "format": "seconds", "default": 0 }, - "type": { + "token": { "type": "string", - "description": "The type of key to create. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\".", - "default": "aes256-gcm96" + "description": "Token to renew (request body)" } } }, - "TransitWriteRandomUrlbytesRequest": { + "TokenRenewSelfRequest": { "type": "object", "properties": { - "bytes": { + "increment": { "type": "integer", - "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", - "default": 32 - }, - "format": { - "type": "string", - "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", - "default": "base64" + "description": "The desired increment in seconds to the token expiration", + "format": "seconds", + "default": 0 }, - "source": { + "token": { "type": "string", - "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", - "default": "platform" + "description": "Token to renew (unused, does not need to be set)" } } }, - "UnsealRequest": { + "TokenRevokeAccessorRequest": { "type": "object", "properties": { - "key": { + "accessor": { "type": "string", - "description": "Specifies a single unseal key share. This is required unless reset is true." - }, - "reset": { - "type": "boolean", - "description": "Specifies if previously-provided unseal keys are discarded and the unseal process is reset." + "description": "Accessor of the token (request body)" } } }, - "UserpassLoginRequest": { + "TokenRevokeOrphanRequest": { "type": "object", "properties": { - "password": { + "token": { "type": "string", - "description": "Password for this user." + "description": "Token to revoke (request body)" } } }, - "UserpassWriteUserPasswordRequest": { + "TokenRevokeRequest": { "type": "object", "properties": { - "password": { + "token": { "type": "string", - "description": "Password for this user." + "description": "Token to revoke (request body)" } } }, - "UserpassWriteUserPoliciesRequest": { + "TokenWriteRoleRequest": { "type": "object", "properties": { - "policies": { + "allowed_entity_aliases": { "type": "array", - "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", + "description": "String or JSON list of allowed entity aliases. If set, specifies the entity aliases which are allowed to be used during token generation. This field supports globbing.", "items": { "type": "string" - }, - "deprecated": true + } }, - "token_policies": { + "allowed_policies": { "type": "array", - "description": "Comma-separated list of policies", + "description": "If set, tokens can be created with any subset of the policies in this list, rather than the normal semantics of tokens being a subset of the calling token's policies. The parameter is a comma-delimited string of policy names.", "items": { "type": "string" } - } - } - }, - "UserpassWriteUserRequest": { - "type": "object", - "properties": { + }, + "allowed_policies_glob": { + "type": "array", + "description": "If set, tokens can be created with any subset of glob matched policies in this list, rather than the normal semantics of tokens being a subset of the calling token's policies. The parameter is a comma-delimited string of policy name globs.", + "items": { + "type": "string" + } + }, "bound_cidrs": { "type": "array", - "description": "Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used.", + "description": "Use 'token_bound_cidrs' instead.", "items": { "type": "string" }, "deprecated": true }, - "max_ttl": { + "disallowed_policies": { + "type": "array", + "description": "If set, successful token creation via this role will require that no policies in the given list are requested. The parameter is a comma-delimited string of policy names.", + "items": { + "type": "string" + } + }, + "disallowed_policies_glob": { + "type": "array", + "description": "If set, successful token creation via this role will require that no requested policies glob match any of policies in this list. The parameter is a comma-delimited string of policy name globs.", + "items": { + "type": "string" + } + }, + "explicit_max_ttl": { "type": "integer", - "description": "Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used.", + "description": "Use 'token_explicit_max_ttl' instead.", "format": "seconds", "deprecated": true }, - "password": { + "orphan": { + "type": "boolean", + "description": "If true, tokens created via this role will be orphan tokens (have no parent)" + }, + "path_suffix": { "type": "string", - "description": "Password for this user.", - "x-vault-displayAttrs": { - "sensitive": true - } + "description": "If set, tokens created via this role will contain the given suffix as a part of their path. This can be used to assist use of the 'revoke-prefix' endpoint later on. The given suffix must match the regular expression.\\w[\\w-.]+\\w" }, - "policies": { - "type": "array", - "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", - "items": { - "type": "string" - }, + "period": { + "type": "integer", + "description": "Use 'token_period' instead.", + "format": "seconds", "deprecated": true }, + "renewable": { + "type": "boolean", + "description": "Tokens created via this role will be renewable or not according to this value. Defaults to \"true\".", + "default": true + }, "token_bound_cidrs": { "type": "array", "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", @@ -38276,15 +41975,6 @@ "group": "Tokens" } }, - "token_max_ttl": { - "type": "integer", - "description": "The maximum lifetime of the generated token", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Maximum TTL", - "group": "Tokens" - } - }, "token_no_default_policy": { "type": "boolean", "description": "If true, the 'default' policy will not automatically be added to generated tokens", @@ -38310,26 +42000,6 @@ "group": "Tokens" } }, - "token_policies": { - "type": "array", - "description": "Comma-separated list of policies", - "items": { - "type": "string" - }, - "x-vault-displayAttrs": { - "name": "Generated Token's Policies", - "group": "Tokens" - } - }, - "token_ttl": { - "type": "integer", - "description": "The initial ttl of the token to generate", - "format": "seconds", - "x-vault-displayAttrs": { - "name": "Generated Token's Initial TTL", - "group": "Tokens" - } - }, "token_type": { "type": "string", "description": "The type of token to generate, service or batch", @@ -38338,858 +42008,1107 @@ "name": "Generated Token's Type", "group": "Tokens" } - }, - "ttl": { - "type": "integer", - "description": "Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used.", - "format": "seconds", - "deprecated": true } } }, - "WrappingRewrapRequest": { + "TotpCreateKeyRequest": { "type": "object", "properties": { - "token": { - "type": "string" + "account_name": { + "type": "string", + "description": "The name of the account associated with the key. Required if generate is true." + }, + "algorithm": { + "type": "string", + "description": "The hashing algorithm used to generate the TOTP token. Options include SHA1, SHA256 and SHA512.", + "default": "SHA1" + }, + "digits": { + "type": "integer", + "description": "The number of digits in the generated TOTP token. This value can either be 6 or 8.", + "default": 6 + }, + "exported": { + "type": "boolean", + "description": "Determines if a QR code and url are returned upon generating a key. Only used if generate is true.", + "default": true + }, + "generate": { + "type": "boolean", + "description": "Determines if a key should be generated by Vault or if a key is being passed from another service.", + "default": false + }, + "issuer": { + "type": "string", + "description": "The name of the key's issuing organization. Required if generate is true." + }, + "key": { + "type": "string", + "description": "The shared master key used to generate a TOTP token. Only used if generate is false." + }, + "key_size": { + "type": "integer", + "description": "Determines the size in bytes of the generated key. Only used if generate is true.", + "default": 20 + }, + "period": { + "type": "integer", + "description": "The length of time used to generate a counter for the TOTP token calculation.", + "format": "seconds", + "default": 30 + }, + "qr_size": { + "type": "integer", + "description": "The pixel size of the generated square QR code. Only used if generate is true and exported is true. If this value is 0, a QR code will not be returned.", + "default": 200 + }, + "skew": { + "type": "integer", + "description": "The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. Only used if generate is true.", + "default": 1 + }, + "url": { + "type": "string", + "description": "A TOTP url string containing all of the parameters for key setup. Only used if generate is false." } } }, - "WrappingUnwrapRequest": { + "TotpValidateCodeRequest": { "type": "object", "properties": { - "token": { - "type": "string" + "code": { + "type": "string", + "description": "TOTP code to be validated." } } }, - "WrappingWriteLookupRequest": { + "TransitConfigureCacheRequest": { "type": "object", "properties": { - "token": { - "type": "string" + "size": { + "type": "integer", + "description": "Size of cache, use 0 for an unlimited cache size, defaults to 0", + "default": 0 } } }, - "WriteAuditDeviceRequest": { + "TransitConfigureKeyRequest": { "type": "object", "properties": { - "description": { - "type": "string", - "description": "User-friendly description for this audit backend." + "allow_plaintext_backup": { + "type": "boolean", + "description": "Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled." }, - "local": { + "auto_rotate_period": { + "type": "integer", + "description": "Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.", + "format": "seconds" + }, + "deletion_allowed": { "type": "boolean", - "description": "Mark the mount as a local mount, which is not replicated and is unaffected by replication.", - "default": false + "description": "Whether to allow deletion of the key" }, - "options": { - "type": "object", - "description": "Configuration options for the audit backend.", - "format": "kvpairs" + "exportable": { + "type": "boolean", + "description": "Enables export of the key. Once set, this cannot be disabled." }, - "type": { - "type": "string", - "description": "The type of the backend. Example: \"mysql\"" + "min_decryption_version": { + "type": "integer", + "description": "If set, the minimum version of the key allowed to be decrypted. For signing keys, the minimum version allowed to be used for verification." + }, + "min_encryption_version": { + "type": "integer", + "description": "If set, the minimum version of the key allowed to be used for encryption; or for signing keys, to be used for signing. If set to zero, only the latest version of the key is allowed." } } }, - "WriteAuthMethodRequest": { + "TransitConfigureKeysRequest": { "type": "object", "properties": { - "config": { - "type": "object", - "description": "Configuration for this mount, such as plugin_name.", - "format": "map" + "disable_upsert": { + "type": "boolean", + "description": "Whether to allow automatic upserting (creation) of keys on the encrypt endpoint." + } + } + }, + "TransitCreateKeyRequest": { + "type": "object", + "properties": { + "allow_plaintext_backup": { + "type": "boolean", + "description": "Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled." }, - "description": { + "auto_rotate_period": { + "type": "integer", + "description": "Amount of time the key should live before being automatically rotated. A value of 0 (default) disables automatic rotation for the key.", + "format": "seconds", + "default": 0 + }, + "context": { "type": "string", - "description": "User-friendly description for this credential backend." + "description": "Base64 encoded context for key derivation. When reading a key with key derivation enabled, if the key type supports public keys, this will return the public key for the given context." }, - "external_entropy_access": { + "convergent_encryption": { "type": "boolean", - "description": "Whether to give the mount access to Vault's external entropy.", - "default": false + "description": "Whether to support convergent encryption. This is only supported when using a key with key derivation enabled and will require all requests to carry both a context and 96-bit (12-byte) nonce. The given nonce will be used in place of a randomly generated nonce. As a result, when the same context and nonce are supplied, the same ciphertext is generated. It is *very important* when using this mode that you ensure that all nonces are unique for a given context. Failing to do so will severely impact the ciphertext's security." }, - "local": { + "derived": { "type": "boolean", - "description": "Mark the mount as a local mount, which is not replicated and is unaffected by replication.", - "default": false + "description": "Enables key derivation mode. This allows for per-transaction unique keys for encryption operations." }, - "options": { - "type": "object", - "description": "The options to pass into the backend. Should be a json object with string keys and values.", - "format": "kvpairs" + "exportable": { + "type": "boolean", + "description": "Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported." + }, + "key_size": { + "type": "integer", + "description": "The key size in bytes for the algorithm. Only applies to HMAC and must be no fewer than 32 bytes and no more than 512", + "default": 0 }, - "plugin_name": { + "managed_key_id": { "type": "string", - "description": "Name of the auth plugin to use based from the name in the plugin catalog." + "description": "The UUID of the managed key to use for this transit key" }, - "plugin_version": { + "managed_key_name": { "type": "string", - "description": "The semantic version of the plugin to use." - }, - "seal_wrap": { - "type": "boolean", - "description": "Whether to turn on seal wrapping for the mount.", - "default": false + "description": "The name of the managed key to use for this transit key" }, "type": { "type": "string", - "description": "The type of the backend. Example: \"userpass\"" + "description": "The type of key to create. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\".", + "default": "aes256-gcm96" } } }, - "WriteAuthMethodTuneRequest": { + "TransitDecryptRequest": { "type": "object", "properties": { - "allowed_response_headers": { - "type": "array", - "description": "A list of headers to whitelist and allow a plugin to set on responses.", - "items": { - "type": "string" - } - }, - "audit_non_hmac_request_keys": { - "type": "array", - "description": "The list of keys in the request data object that will not be HMAC'ed by audit devices.", - "items": { - "type": "string" - } + "associated_data": { + "type": "string", + "description": "When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with." }, - "audit_non_hmac_response_keys": { + "batch_input": { "type": "array", - "description": "The list of keys in the response data object that will not be HMAC'ed by audit devices.", + "description": "Specifies a list of items to be decrypted in a single batch. When this parameter is set, if the parameters 'ciphertext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input.", "items": { - "type": "string" + "type": "object" } }, - "default_lease_ttl": { + "ciphertext": { "type": "string", - "description": "The default lease TTL for this mount." + "description": "The ciphertext to decrypt, provided as returned by encrypt." }, - "description": { + "context": { "type": "string", - "description": "User-friendly description for this credential backend." + "description": "Base64 encoded context for key derivation. Required if key derivation is enabled." }, - "listing_visibility": { + "nonce": { "type": "string", - "description": "Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are 'unauth' and 'hidden', with the empty default ('') behaving like 'hidden'." + "description": "Base64 encoded nonce value used during encryption. Must be provided if convergent encryption is enabled for this key and the key was generated with Vault 0.6.1. Not required for keys created in 0.6.2+." }, - "max_lease_ttl": { + "partial_failure_response_code": { + "type": "integer", + "description": "Ordinarily, if a batch item fails to decrypt due to a bad input, but other batch items succeed, the HTTP response code is 400 (Bad Request). Some applications may want to treat partial failures differently. Providing the parameter returns the given response code integer instead of a 400 in this case. If all values fail HTTP 400 is still returned." + } + } + }, + "TransitEncryptRequest": { + "type": "object", + "properties": { + "associated_data": { "type": "string", - "description": "The max lease TTL for this mount." - }, - "options": { - "type": "object", - "description": "The options to pass into the backend. Should be a json object with string keys and values.", - "format": "kvpairs" + "description": "When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with." }, - "passthrough_request_headers": { + "batch_input": { "type": "array", - "description": "A list of headers to whitelist and pass from the request to the plugin.", + "description": "Specifies a list of items to be encrypted in a single batch. When this parameter is set, if the parameters 'plaintext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input.", "items": { - "type": "string" + "type": "object" } }, - "plugin_version": { + "context": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "Base64 encoded context for key derivation. Required if key derivation is enabled" }, - "token_type": { + "convergent_encryption": { + "type": "boolean", + "description": "This parameter will only be used when a key is expected to be created. Whether to support convergent encryption. This is only supported when using a key with key derivation enabled and will require all requests to carry both a context and 96-bit (12-byte) nonce. The given nonce will be used in place of a randomly generated nonce. As a result, when the same context and nonce are supplied, the same ciphertext is generated. It is *very important* when using this mode that you ensure that all nonces are unique for a given context. Failing to do so will severely impact the ciphertext's security." + }, + "key_version": { + "type": "integer", + "description": "The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + }, + "nonce": { "type": "string", - "description": "The type of token to issue (service or batch)." + "description": "Base64 encoded nonce value. Must be provided if convergent encryption is enabled for this key and the key was generated with Vault 0.6.1. Not required for keys created in 0.6.2+. The value must be exactly 96 bits (12 bytes) long and the user must ensure that for any given context (and thus, any given encryption key) this nonce value is **never reused**." }, - "user_lockout_config": { - "type": "object", - "description": "The user lockout configuration to pass into the backend. Should be a json object with string keys and values.", - "format": "map" + "partial_failure_response_code": { + "type": "integer", + "description": "Ordinarily, if a batch item fails to encrypt due to a bad input, but other batch items succeed, the HTTP response code is 400 (Bad Request). Some applications may want to treat partial failures differently. Providing the parameter returns the given response code integer instead of a 400 in this case. If all values fail HTTP 400 is still returned." + }, + "plaintext": { + "type": "string", + "description": "Base64 encoded plaintext value to be encrypted" + }, + "type": { + "type": "string", + "description": "This parameter is required when encryption key is expected to be created. When performing an upsert operation, the type of key to create. Currently, \"aes128-gcm96\" (symmetric) and \"aes256-gcm96\" (symmetric) are the only types supported. Defaults to \"aes256-gcm96\".", + "default": "aes256-gcm96" } } }, - "WriteCapabilitiesAccessorRequest": { + "TransitGenerateDataKeyRequest": { "type": "object", "properties": { - "accessor": { + "bits": { + "type": "integer", + "description": "Number of bits for the key; currently 128, 256, and 512 bits are supported. Defaults to 256.", + "default": 256 + }, + "context": { "type": "string", - "description": "Accessor of the token for which capabilities are being queried." + "description": "Context for key derivation. Required for derived keys." }, - "path": { - "type": "array", - "description": "Use 'paths' instead.", - "items": { - "type": "string" - }, - "deprecated": true + "key_version": { + "type": "integer", + "description": "The version of the Vault key to use for encryption of the data key. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." }, - "paths": { - "type": "array", - "description": "Paths on which capabilities are being queried.", - "items": { - "type": "string" - } + "nonce": { + "type": "string", + "description": "Nonce for when convergent encryption v1 is used (only in Vault 0.6.1)" } } }, - "WriteCapabilitiesRequest": { + "TransitGenerateHmacRequest": { "type": "object", "properties": { - "path": { - "type": "array", - "description": "Use 'paths' instead.", - "items": { - "type": "string" - }, - "deprecated": true + "algorithm": { + "type": "string", + "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", + "default": "sha2-256" }, - "paths": { + "batch_input": { "type": "array", - "description": "Paths on which capabilities are being queried.", + "description": "Specifies a list of items to be processed in a single batch. When this parameter is set, if the parameter 'input' is also set, it will be ignored. Any batch output will preserve the order of the batch input.", "items": { - "type": "string" + "type": "object" } }, - "token": { + "input": { "type": "string", - "description": "Token for which capabilities are being queried." + "description": "The base64-encoded input data" + }, + "key_version": { + "type": "integer", + "description": "The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + }, + "urlalgorithm": { + "type": "string", + "description": "Algorithm to use (POST URL parameter)" } } }, - "WriteCapabilitiesSelfRequest": { + "TransitGenerateHmacWithAlgorithmRequest": { "type": "object", "properties": { - "path": { - "type": "array", - "description": "Use 'paths' instead.", - "items": { - "type": "string" - }, - "deprecated": true + "algorithm": { + "type": "string", + "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", + "default": "sha2-256" }, - "paths": { + "batch_input": { "type": "array", - "description": "Paths on which capabilities are being queried.", + "description": "Specifies a list of items to be processed in a single batch. When this parameter is set, if the parameter 'input' is also set, it will be ignored. Any batch output will preserve the order of the batch input.", "items": { - "type": "string" + "type": "object" } }, - "token": { + "input": { "type": "string", - "description": "Token for which capabilities are being queried." + "description": "The base64-encoded input data" + }, + "key_version": { + "type": "integer", + "description": "The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." } } }, - "WriteConfigAuditingRequestHeaderRequest": { + "TransitGenerateRandomRequest": { "type": "object", "properties": { - "hmac": { - "type": "boolean" + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 + }, + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" + }, + "source": { + "type": "string", + "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", + "default": "platform" + }, + "urlbytes": { + "type": "string", + "description": "The number of bytes to generate (POST URL parameter)" } } }, - "WriteConfigCORSRequest": { + "TransitGenerateRandomWithBytesRequest": { "type": "object", "properties": { - "allowed_headers": { - "type": "array", - "description": "A comma-separated string or array of strings indicating headers that are allowed on cross-origin requests.", - "items": { - "type": "string" - } + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 }, - "allowed_origins": { - "type": "array", - "description": "A comma-separated string or array of strings indicating origins that may make cross-origin requests.", - "items": { - "type": "string" - } + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" }, - "enable": { - "type": "boolean", - "description": "Enables or disables CORS headers on requests." + "source": { + "type": "string", + "description": "Which system to source random data from, ether \"platform\", \"seal\", or \"all\".", + "default": "platform" } } }, - "WriteConfigUIHeaderRequest": { + "TransitGenerateRandomWithSourceAndBytesRequest": { "type": "object", "properties": { - "multivalue": { - "type": "boolean", - "description": "Returns multiple values if true" + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 }, - "values": { - "type": "array", - "description": "The values to set the header.", - "items": { - "type": "string" - } + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" } } }, - "WriteGenerateRootAttemptRequest": { + "TransitGenerateRandomWithSourceRequest": { "type": "object", "properties": { - "pgp_key": { + "bytes": { + "type": "integer", + "description": "The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).", + "default": 32 + }, + "format": { "type": "string", - "description": "Specifies a base64-encoded PGP public key." + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\".", + "default": "base64" + }, + "urlbytes": { + "type": "string", + "description": "The number of bytes to generate (POST URL parameter)" } } }, - "WriteGenerateRootRequest": { + "TransitHashRequest": { "type": "object", "properties": { - "pgp_key": { + "algorithm": { "type": "string", - "description": "Specifies a base64-encoded PGP public key." + "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", + "default": "sha2-256" + }, + "format": { + "type": "string", + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", + "default": "hex" + }, + "input": { + "type": "string", + "description": "The base64-encoded input data" + }, + "urlalgorithm": { + "type": "string", + "description": "Algorithm to use (POST URL parameter)" } } }, - "WriteGenerateRootUpdateRequest": { + "TransitHashWithAlgorithmRequest": { "type": "object", "properties": { - "key": { + "algorithm": { "type": "string", - "description": "Specifies a single unseal key share." + "description": "Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\".", + "default": "sha2-256" }, - "nonce": { + "format": { "type": "string", - "description": "Specifies the nonce of the attempt." + "description": "Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\".", + "default": "hex" + }, + "input": { + "type": "string", + "description": "The base64-encoded input data" } } }, - "WriteInitRequest": { + "TransitImportKeyRequest": { "type": "object", "properties": { - "pgp_keys": { - "type": "array", - "description": "Specifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as `secret_shares`.", - "items": { - "type": "string" - } + "allow_plaintext_backup": { + "type": "boolean", + "description": "Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled." }, - "recovery_pgp_keys": { - "type": "array", - "description": "Specifies an array of PGP public keys used to encrypt the output recovery keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as `recovery_shares`.", - "items": { - "type": "string" - } + "allow_rotation": { + "type": "boolean", + "description": "True if the imported key may be rotated within Vault; false otherwise." }, - "recovery_shares": { + "auto_rotate_period": { "type": "integer", - "description": "Specifies the number of shares to split the recovery key into." + "description": "Amount of time the key should live before being automatically rotated. A value of 0 (default) disables automatic rotation for the key.", + "format": "seconds", + "default": 0 }, - "recovery_threshold": { - "type": "integer", - "description": "Specifies the number of shares required to reconstruct the recovery key. This must be less than or equal to `recovery_shares`." + "ciphertext": { + "type": "string", + "description": "The base64-encoded ciphertext of the keys. The AES key should be encrypted using OAEP with the wrapping key and then concatenated with the import key, wrapped by the AES key." }, - "root_token_pgp_key": { + "context": { "type": "string", - "description": "Specifies a PGP public key used to encrypt the initial root token. The key must be base64-encoded from its original binary representation." + "description": "Base64 encoded context for key derivation. When reading a key with key derivation enabled, if the key type supports public keys, this will return the public key for the given context." }, - "secret_shares": { - "type": "integer", - "description": "Specifies the number of shares to split the unseal key into." + "derived": { + "type": "boolean", + "description": "Enables key derivation mode. This allows for per-transaction unique keys for encryption operations." }, - "secret_threshold": { - "type": "integer", - "description": "Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as `secret_shares`." + "exportable": { + "type": "boolean", + "description": "Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported." }, - "stored_shares": { - "type": "integer", - "description": "Specifies the number of shares that should be encrypted by the HSM and stored for auto-unsealing. Currently must be the same as `secret_shares`." + "hash_function": { + "type": "string", + "description": "The hash function used as a random oracle in the OAEP wrapping of the user-generated, ephemeral AES key. Can be one of \"SHA1\", \"SHA224\", \"SHA256\" (default), \"SHA384\", or \"SHA512\"", + "default": "SHA256" + }, + "type": { + "type": "string", + "description": "The type of key being imported. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\".", + "default": "aes256-gcm96" } } }, - "WriteInternalCountersConfigRequest": { + "TransitImportKeyVersionRequest": { "type": "object", "properties": { - "default_report_months": { - "type": "integer", - "description": "Number of months to report if no start date specified.", - "default": 12 - }, - "enabled": { + "ciphertext": { "type": "string", - "description": "Enable or disable collection of client count: enable, disable, or default.", - "default": "default" + "description": "The base64-encoded ciphertext of the keys. The AES key should be encrypted using OAEP with the wrapping key and then concatenated with the import key, wrapped by the AES key." }, - "retention_months": { - "type": "integer", - "description": "Number of months of client data to retain. Setting to 0 will clear all existing data.", - "default": 24 + "hash_function": { + "type": "string", + "description": "The hash function used as a random oracle in the OAEP wrapping of the user-generated, ephemeral AES key. Can be one of \"SHA1\", \"SHA224\", \"SHA256\" (default), \"SHA384\", or \"SHA512\"", + "default": "SHA256" } } }, - "WriteInternalSpecsOpenAPIRequest": { + "TransitRestoreAndRenameKeyRequest": { "type": "object", "properties": { - "context": { + "backup": { "type": "string", - "description": "Context string appended to every operationId" + "description": "Backed up key data to be restored. This should be the output from the 'backup/' endpoint." + }, + "force": { + "type": "boolean", + "description": "If set and a key by the given name exists, force the restore operation and override the key.", + "default": false } } }, - "WriteLeasesLookupRequest": { + "TransitRestoreKeyRequest": { "type": "object", "properties": { - "lease_id": { + "backup": { "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "description": "Backed up key data to be restored. This should be the output from the 'backup/' endpoint." + }, + "force": { + "type": "boolean", + "description": "If set and a key by the given name exists, force the restore operation and override the key.", + "default": false + }, + "name": { + "type": "string", + "description": "If set, this will be the name of the restored key." } } }, - "WriteLeasesRenew2Request": { + "TransitRewrapRequest": { "type": "object", "properties": { - "increment": { + "batch_input": { + "type": "array", + "description": "Specifies a list of items to be re-encrypted in a single batch. When this parameter is set, if the parameters 'ciphertext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input.", + "items": { + "type": "object" + } + }, + "ciphertext": { + "type": "string", + "description": "Ciphertext value to rewrap" + }, + "context": { + "type": "string", + "description": "Base64 encoded context for key derivation. Required for derived keys." + }, + "key_version": { "type": "integer", - "description": "The desired increment in seconds to the lease", - "format": "seconds" + "description": "The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." }, - "lease_id": { + "nonce": { "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "description": "Nonce for when convergent encryption is used" } } }, - "WriteLeasesRenewRequest": { + "TransitRotateKeyRequest": { "type": "object", "properties": { - "increment": { + "managed_key_id": { + "type": "string", + "description": "The UUID of the managed key to use for the new version of this transit key" + }, + "managed_key_name": { + "type": "string", + "description": "The name of the managed key to use for the new version of this transit key" + } + } + }, + "TransitSignRequest": { + "type": "object", + "properties": { + "algorithm": { + "type": "string", + "description": "Deprecated: use \"hash_algorithm\" instead.", + "default": "sha2-256" + }, + "batch_input": { + "type": "array", + "description": "Specifies a list of items for processing. When this parameter is set, any supplied 'input' or 'context' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input", + "items": { + "type": "object" + } + }, + "context": { + "type": "string", + "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." + }, + "hash_algorithm": { + "type": "string", + "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature.", + "default": "sha2-256" + }, + "input": { + "type": "string", + "description": "The base64-encoded input data" + }, + "key_version": { "type": "integer", - "description": "The desired increment in seconds to the lease", - "format": "seconds" + "description": "The version of the key to use for signing. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." }, - "lease_id": { + "marshaling_algorithm": { "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "description": "The method by which to marshal the signature. The default is 'asn1' which is used by openssl and X.509. It can also be set to 'jws' which is used for JWT signatures; setting it to this will also cause the encoding of the signature to be url-safe base64 instead of using standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", + "default": "asn1" }, - "url_lease_id": { + "prehashed": { + "type": "boolean", + "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." + }, + "salt_length": { "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", + "default": "auto" + }, + "signature_algorithm": { + "type": "string", + "description": "The signature algorithm to use for signing. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" + }, + "urlalgorithm": { + "type": "string", + "description": "Hash algorithm to use (POST URL parameter)" } } }, - "WriteLeasesRevoke2Request": { + "TransitSignWithAlgorithmRequest": { "type": "object", "properties": { - "lease_id": { + "algorithm": { "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "description": "Deprecated: use \"hash_algorithm\" instead.", + "default": "sha2-256" + }, + "batch_input": { + "type": "array", + "description": "Specifies a list of items for processing. When this parameter is set, any supplied 'input' or 'context' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input", + "items": { + "type": "object" + } + }, + "context": { + "type": "string", + "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." + }, + "hash_algorithm": { + "type": "string", + "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature.", + "default": "sha2-256" + }, + "input": { + "type": "string", + "description": "The base64-encoded input data" + }, + "key_version": { + "type": "integer", + "description": "The version of the key to use for signing. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key." + }, + "marshaling_algorithm": { + "type": "string", + "description": "The method by which to marshal the signature. The default is 'asn1' which is used by openssl and X.509. It can also be set to 'jws' which is used for JWT signatures; setting it to this will also cause the encoding of the signature to be url-safe base64 instead of using standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", + "default": "asn1" }, - "sync": { + "prehashed": { "type": "boolean", - "description": "Whether or not to perform the revocation synchronously", - "default": true + "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." + }, + "salt_length": { + "type": "string", + "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", + "default": "auto" + }, + "signature_algorithm": { + "type": "string", + "description": "The signature algorithm to use for signing. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" } } }, - "WriteLeasesRevokePrefixRequest": { + "TransitTrimKeyRequest": { "type": "object", "properties": { - "sync": { - "type": "boolean", - "description": "Whether or not to perform the revocation synchronously", - "default": true + "min_available_version": { + "type": "integer", + "description": "The minimum available version for the key ring. All versions before this version will be permanently deleted. This value can at most be equal to the lesser of 'min_decryption_version' and 'min_encryption_version'. This is not allowed to be set when either 'min_encryption_version' or 'min_decryption_version' is set to zero." } } }, - "WriteLeasesRevokeRequest": { + "TransitVerifyRequest": { "type": "object", "properties": { - "lease_id": { + "algorithm": { "type": "string", - "description": "The lease identifier to renew. This is included with a lease." + "description": "Deprecated: use \"hash_algorithm\" instead.", + "default": "sha2-256" }, - "sync": { - "type": "boolean", - "description": "Whether or not to perform the revocation synchronously", - "default": true + "batch_input": { + "type": "array", + "description": "Specifies a list of items for processing. When this parameter is set, any supplied 'input', 'hmac' or 'signature' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input", + "items": { + "type": "object" + } }, - "url_lease_id": { + "context": { "type": "string", - "description": "The lease identifier to renew. This is included with a lease." - } - } - }, - "WriteLoggerRequest": { - "type": "object", - "properties": { - "level": { + "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." + }, + "hash_algorithm": { "type": "string", - "description": "Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\"." - } - } - }, - "WriteLoggersRequest": { - "type": "object", - "properties": { - "level": { + "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path.", + "default": "sha2-256" + }, + "hmac": { "type": "string", - "description": "Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\"." - } - } - }, - "WriteMountRequest": { - "type": "object", - "properties": { - "config": { - "type": "object", - "description": "Configuration for this mount, such as default_lease_ttl and max_lease_ttl.", - "format": "map" + "description": "The HMAC, including vault header/key version" }, - "description": { + "input": { "type": "string", - "description": "User-friendly description for this mount." + "description": "The base64-encoded input data to verify" }, - "external_entropy_access": { - "type": "boolean", - "description": "Whether to give the mount access to Vault's external entropy.", - "default": false + "marshaling_algorithm": { + "type": "string", + "description": "The method by which to unmarshal the signature when verifying. The default is 'asn1' which is used by openssl and X.509; can also be set to 'jws' which is used for JWT signatures in which case the signature is also expected to be url-safe base64 encoding instead of standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", + "default": "asn1" }, - "local": { + "prehashed": { "type": "boolean", - "description": "Mark the mount as a local mount, which is not replicated and is unaffected by replication.", - "default": false - }, - "options": { - "type": "object", - "description": "The options to pass into the backend. Should be a json object with string keys and values.", - "format": "kvpairs" + "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." }, - "plugin_name": { + "salt_length": { "type": "string", - "description": "Name of the plugin to mount based from the name registered in the plugin catalog." + "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", + "default": "auto" }, - "plugin_version": { + "signature": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The signature, including vault header/key version" }, - "seal_wrap": { - "type": "boolean", - "description": "Whether to turn on seal wrapping for the mount.", - "default": false + "signature_algorithm": { + "type": "string", + "description": "The signature algorithm to use for signature verification. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" }, - "type": { + "urlalgorithm": { "type": "string", - "description": "The type of the backend. Example: \"passthrough\"" + "description": "Hash algorithm to use (POST URL parameter)" } } }, - "WriteMountsConfigRequest": { + "TransitVerifyWithAlgorithmRequest": { "type": "object", "properties": { - "allowed_managed_keys": { - "type": "array", - "items": { - "type": "string" - } - }, - "allowed_response_headers": { - "type": "array", - "description": "A list of headers to whitelist and allow a plugin to set on responses.", - "items": { - "type": "string" - } - }, - "audit_non_hmac_request_keys": { - "type": "array", - "description": "The list of keys in the request data object that will not be HMAC'ed by audit devices.", - "items": { - "type": "string" - } + "algorithm": { + "type": "string", + "description": "Deprecated: use \"hash_algorithm\" instead.", + "default": "sha2-256" }, - "audit_non_hmac_response_keys": { + "batch_input": { "type": "array", - "description": "The list of keys in the response data object that will not be HMAC'ed by audit devices.", + "description": "Specifies a list of items for processing. When this parameter is set, any supplied 'input', 'hmac' or 'signature' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input", "items": { - "type": "string" + "type": "object" } }, - "default_lease_ttl": { + "context": { "type": "string", - "description": "The default lease TTL for this mount." + "description": "Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys." }, - "description": { + "hash_algorithm": { "type": "string", - "description": "User-friendly description for this credential backend." + "description": "Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path.", + "default": "sha2-256" }, - "listing_visibility": { + "hmac": { "type": "string", - "description": "Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are 'unauth' and 'hidden', with the empty default ('') behaving like 'hidden'." + "description": "The HMAC, including vault header/key version" }, - "max_lease_ttl": { + "input": { "type": "string", - "description": "The max lease TTL for this mount." + "description": "The base64-encoded input data to verify" }, - "options": { - "type": "object", - "description": "The options to pass into the backend. Should be a json object with string keys and values.", - "format": "kvpairs" + "marshaling_algorithm": { + "type": "string", + "description": "The method by which to unmarshal the signature when verifying. The default is 'asn1' which is used by openssl and X.509; can also be set to 'jws' which is used for JWT signatures in which case the signature is also expected to be url-safe base64 encoding instead of standard base64 encoding. Currently only valid for ECDSA P-256 key types\".", + "default": "asn1" }, - "passthrough_request_headers": { - "type": "array", - "description": "A list of headers to whitelist and pass from the request to the plugin.", - "items": { - "type": "string" - } + "prehashed": { + "type": "boolean", + "description": "Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter." }, - "plugin_version": { + "salt_length": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'.", + "default": "auto" }, - "token_type": { + "signature": { "type": "string", - "description": "The type of token to issue (service or batch)." + "description": "The signature, including vault header/key version" }, - "user_lockout_config": { - "type": "object", - "description": "The user lockout configuration to pass into the backend. Should be a json object with string keys and values.", - "format": "map" + "signature_algorithm": { + "type": "string", + "description": "The signature algorithm to use for signature verification. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss'" } } }, - "WritePluginsCatalogByTypeByNameRequest": { + "UiHeadersConfigureRequest": { "type": "object", "properties": { - "args": { - "type": "array", - "description": "The args passed to plugin command.", - "items": { - "type": "string" - } - }, - "command": { - "type": "string", - "description": "The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory." + "multivalue": { + "type": "boolean", + "description": "Returns multiple values if true" }, - "env": { + "values": { "type": "array", - "description": "The environment variables passed to plugin command. Each entry is of the form \"key=value\".", + "description": "The values to set the header.", "items": { "type": "string" } - }, - "sha256": { - "type": "string", - "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." - }, - "version": { - "type": "string", - "description": "The semantic version of the plugin to use." } } }, - "WritePluginsReloadBackendRequest": { + "UiHeadersListResponse": { "type": "object", "properties": { - "mounts": { + "keys": { "type": "array", - "description": "The mount paths of the plugin backends to reload.", + "description": "Lists of configured UI headers. Omitted if list is empty", "items": { "type": "string" } - }, - "plugin": { - "type": "string", - "description": "The name of the plugin to reload, as registered in the plugin catalog." - }, - "scope": { - "type": "string" - } - } - }, - "WritePoliciesACLRequest": { - "type": "object", - "properties": { - "policy": { - "type": "string", - "description": "The rules of the policy." - } - } - }, - "WritePoliciesPasswordRequest": { - "type": "object", - "properties": { - "policy": { - "type": "string", - "description": "The password policy" } } }, - "WritePolicyRequest": { + "UiHeadersReadConfigurationResponse": { "type": "object", "properties": { - "policy": { - "type": "string", - "description": "The rules of the policy." - }, - "rules": { + "value": { "type": "string", - "description": "The rules of the policy.", - "deprecated": true - } - } - }, - "WriteQuotasConfigRequest": { - "type": "object", - "properties": { - "enable_rate_limit_audit_logging": { - "type": "boolean", - "description": "If set, starts audit logging of requests that get rejected due to rate limit quota rule violations." - }, - "enable_rate_limit_response_headers": { - "type": "boolean", - "description": "If set, additional rate limit quota HTTP headers will be added to responses." + "description": "returns the first header value when `multivalue` request parameter is false" }, - "rate_limit_exempt_paths": { + "values": { "type": "array", - "description": "Specifies the list of exempt paths from all rate limit quotas. If empty no paths will be exempt.", + "description": "returns all header values when `multivalue` request parameter is true", "items": { "type": "string" } } } }, - "WriteQuotasRateLimitRequest": { + "UnsealRequest": { "type": "object", "properties": { - "block_interval": { - "type": "integer", - "description": "If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' has elapsed.", - "format": "seconds" - }, - "interval": { - "type": "integer", - "description": "The duration to enforce rate limiting for (default '1s').", - "format": "seconds" - }, - "path": { - "type": "string", - "description": "Path of the mount or namespace to apply the quota. A blank path configures a global quota. For example namespace1/ adds a quota to a full namespace, namespace1/auth/userpass adds a quota to userpass in namespace1." - }, - "rate": { - "type": "number", - "description": "The maximum number of requests in a given interval to be allowed by the quota rule. The 'rate' must be positive.", - "format": "float" - }, - "role": { + "key": { "type": "string", - "description": "Login role to apply this quota to. Note that when set, path must be configured to a valid auth method with a concept of roles." + "description": "Specifies a single unseal key share. This is required unless reset is true." }, - "type": { - "type": "string", - "description": "Type of the quota rule." + "reset": { + "type": "boolean", + "description": "Specifies if previously-provided unseal keys are discarded and the unseal process is reset." } } }, - "WriteRawPathRequest": { + "UnsealResponse": { "type": "object", "properties": { - "compressed": { - "type": "boolean" + "build_date": { + "type": "string" }, - "compression_type": { + "cluster_id": { "type": "string" }, - "encoding": { + "cluster_name": { "type": "string" }, - "value": { + "hcp_link_resource_ID": { "type": "string" - } - } - }, - "WriteRawRequest": { - "type": "object", - "properties": { - "compressed": { + }, + "hcp_link_status": { + "type": "string" + }, + "initialized": { + "type": "boolean" + }, + "migration": { "type": "boolean" }, - "compression_type": { + "n": { + "type": "integer" + }, + "nonce": { "type": "string" }, - "encoding": { + "progress": { + "type": "integer" + }, + "recovery_seal": { + "type": "boolean" + }, + "sealed": { + "type": "boolean" + }, + "storage_type": { "type": "string" }, - "path": { + "t": { + "type": "integer" + }, + "type": { "type": "string" }, - "value": { + "version": { "type": "string" } } }, - "WriteRekeyInitRequest": { + "UnwrapRequest": { "type": "object", "properties": { - "backup": { - "type": "boolean", - "description": "Specifies if using PGP-encrypted keys, whether Vault should also store a plaintext backup of the PGP-encrypted keys." - }, - "pgp_keys": { - "type": "array", - "description": "Specifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as secret_shares.", - "items": { - "type": "string" - } - }, - "require_verification": { - "type": "boolean", - "description": "Turns on verification functionality" - }, - "secret_shares": { - "type": "integer", - "description": "Specifies the number of shares to split the unseal key into." - }, - "secret_threshold": { - "type": "integer", - "description": "Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as secret_shares." + "token": { + "type": "string" } } }, - "WriteRekeyUpdateRequest": { + "UserpassLogInRequest": { "type": "object", "properties": { - "key": { - "type": "string", - "description": "Specifies a single unseal key share." - }, - "nonce": { + "password": { "type": "string", - "description": "Specifies the nonce of the rekey attempt." + "description": "Password for this user." } } }, - "WriteRekeyVerifyRequest": { + "UserpassResetPasswordRequest": { "type": "object", "properties": { - "key": { + "password": { "type": "string", - "description": "Specifies a single unseal share key from the new set of shares." + "description": "Password for this user." + } + } + }, + "UserpassUpdatePoliciesRequest": { + "type": "object", + "properties": { + "policies": { + "type": "array", + "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", + "items": { + "type": "string" + }, + "deprecated": true }, - "nonce": { - "type": "string", - "description": "Specifies the nonce of the rekey verification operation." + "token_policies": { + "type": "array", + "description": "Comma-separated list of policies", + "items": { + "type": "string" + } } } }, - "WriteRotateConfigRequest": { + "UserpassWriteUserRequest": { "type": "object", "properties": { - "enabled": { + "bound_cidrs": { + "type": "array", + "description": "Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used.", + "items": { + "type": "string" + }, + "deprecated": true + }, + "max_ttl": { + "type": "integer", + "description": "Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used.", + "format": "seconds", + "deprecated": true + }, + "password": { + "type": "string", + "description": "Password for this user.", + "x-vault-displayAttrs": { + "sensitive": true + } + }, + "policies": { + "type": "array", + "description": "Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used.", + "items": { + "type": "string" + }, + "deprecated": true + }, + "token_bound_cidrs": { + "type": "array", + "description": "Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Generated Token's Bound CIDRs", + "group": "Tokens" + } + }, + "token_explicit_max_ttl": { + "type": "integer", + "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Explicit Maximum TTL", + "group": "Tokens" + } + }, + "token_max_ttl": { + "type": "integer", + "description": "The maximum lifetime of the generated token", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Maximum TTL", + "group": "Tokens" + } + }, + "token_no_default_policy": { "type": "boolean", - "description": "Whether automatic rotation is enabled." + "description": "If true, the 'default' policy will not automatically be added to generated tokens", + "x-vault-displayAttrs": { + "name": "Do Not Attach 'default' Policy To Generated Tokens", + "group": "Tokens" + } }, - "interval": { + "token_num_uses": { "type": "integer", - "description": "How long after installation of an active key term that the key will be automatically rotated.", - "format": "seconds" + "description": "The maximum number of times a token may be used, a value of zero means unlimited", + "x-vault-displayAttrs": { + "name": "Maximum Uses of Generated Tokens", + "group": "Tokens" + } }, - "max_operations": { + "token_period": { "type": "integer", - "description": "The number of encryption operations performed before the barrier key is automatically rotated.", - "format": "int64" + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Period", + "group": "Tokens" + } + }, + "token_policies": { + "type": "array", + "description": "Comma-separated list of policies", + "items": { + "type": "string" + }, + "x-vault-displayAttrs": { + "name": "Generated Token's Policies", + "group": "Tokens" + } + }, + "token_ttl": { + "type": "integer", + "description": "The initial ttl of the token to generate", + "format": "seconds", + "x-vault-displayAttrs": { + "name": "Generated Token's Initial TTL", + "group": "Tokens" + } + }, + "token_type": { + "type": "string", + "description": "The type of token to generate, service or batch", + "default": "default-service", + "x-vault-displayAttrs": { + "name": "Generated Token's Type", + "group": "Tokens" + } + }, + "ttl": { + "type": "integer", + "description": "Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used.", + "format": "seconds", + "deprecated": true + } + } + }, + "VersionHistoryResponse": { + "type": "object", + "properties": { + "key_info": { + "type": "object", + "format": "kvpairs" + }, + "keys": { + "type": "array", + "items": { + "type": "string" + } } } } From 84d346151258d5650ae26db36e54815dd1fdd0b5 Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Thu, 20 Apr 2023 17:58:20 -0400 Subject: [PATCH 2/3] regen --- api_auth.go | 3234 ++++---- api_identity.go | 816 +- api_secrets.go | 4908 ++++++------ api_system.go | 1920 +++-- docs/AWSLoginRequest.md | 86 +- docs/AWSWriteAuthRoleRequest.md | 246 +- docs/AWSWriteRoleRequest.md | 110 +- docs/ActiveDirectoryCheckInLibraryRequest.md | 69 - ...iveDirectoryCheckInManageLibraryRequest.md | 69 - docs/ActiveDirectoryCheckOutLibraryRequest.md | 69 - docs/ActiveDirectoryWriteConfigRequest.md | 969 --- docs/ActiveDirectoryWriteLibraryRequest.md | 159 - docs/ActiveDirectoryWriteRoleRequest.md | 99 - ...Request.md => AliCloudConfigureRequest.md} | 30 +- ...sWriteRequest.md => AliasCreateRequest.md} | 54 +- ...IDRequest.md => AliasUpdateByIdRequest.md} | 46 +- ...ppRoleDestroySecretIdByAccessorRequest.md} | 22 +- ...st.md => AppRoleDestroySecretIdRequest.md} | 22 +- docs/AppRoleListSecretIdsResponse.md | 69 + docs/AppRoleLoginResponse.md | 69 + ...AppRoleLookUpSecretIdByAccessorRequest.md} | 22 +- ...ppRoleLookUpSecretIdByAccessorResponse.md} | 86 +- ...est.md => AppRoleLookUpSecretIdRequest.md} | 22 +- ...se.md => AppRoleLookUpSecretIdResponse.md} | 86 +- docs/AppRoleReadBindSecretIDResponse.md | 22 +- docs/AppRoleReadBoundCIDRListResponse.md | 22 +- docs/AppRoleReadLocalSecretIDsResponse.md | 22 +- docs/AppRoleReadRoleIDResponse.md | 22 +- docs/AppRoleReadSecretIDBoundCIDRsResponse.md | 22 +- docs/AppRoleReadSecretIDNumUsesResponse.md | 22 +- docs/AppRoleReadSecretIDTTLResponse.md | 22 +- docs/AppRoleReadTokenBoundCIDRsResponse.md | 22 +- docs/AppRoleReadTokenMaxTTLResponse.md | 22 +- docs/AppRoleReadTokenTTLResponse.md | 22 +- docs/AppRoleWriteBindSecretIDRequest.md | 22 +- docs/AppRoleWriteBoundCIDRListRequest.md | 22 +- docs/AppRoleWriteCustomSecretIDRequest.md | 62 +- docs/AppRoleWriteCustomSecretIDResponse.md | 46 +- docs/AppRoleWriteRoleIDRequest.md | 22 +- docs/AppRoleWriteSecretIDBoundCIDRsRequest.md | 22 +- docs/AppRoleWriteSecretIDNumUsesRequest.md | 22 +- docs/AppRoleWriteSecretIDRequest.md | 54 +- docs/AppRoleWriteSecretIDResponse.md | 46 +- docs/AppRoleWriteSecretIDTTLRequest.md | 22 +- docs/AppRoleWriteTokenBoundCIDRsRequest.md | 22 +- docs/AppRoleWriteTokenMaxTTLRequest.md | 22 +- docs/AppRoleWriteTokenTTLRequest.md | 22 +- ...est.md => AuditingCalculateHashRequest.md} | 22 +- docs/AuditingCalculateHashResponse.md | 69 + ...uest.md => AuditingEnableDeviceRequest.md} | 46 +- ... => AuditingEnableRequestHeaderRequest.md} | 22 +- docs/AuditingListRequestHeadersResponse.md | 69 + docs/AuthApi.md | 4382 +++++----- ...dRequest.md => AuthEnableMethodRequest.md} | 86 +- docs/AuthReadConfigurationResponse.md | 429 + docs/AuthReadTuningInformationResponse.md | 579 ++ ...AuthTuneConfigurationParametersRequest.md} | 110 +- ...t.md => AwsConfigureCertificateRequest.md} | 30 +- ...equest.md => AwsConfigureClientRequest.md} | 86 +- ...IdentityAccessListTidyOperationRequest.md} | 30 +- ...AwsConfigureIdentityIntegrationRequest.md} | 46 +- ...eIdentityWhitelistTidyOperationRequest.md} | 30 +- ...Request.md => AwsConfigureLeaseRequest.md} | 30 +- ...reRoleTagBlacklistTidyOperationRequest.md} | 30 +- ...ureRoleTagDenyListTidyOperationRequest.md} | 30 +- ... AwsConfigureRootIamCredentialsRequest.md} | 70 +- ...t.md => AwsGenerateCredentials2Request.md} | 68 +- ...d => AwsGenerateStsCredentials2Request.md} | 38 +- ...md => AwsTidyIdentityAccessListRequest.md} | 22 +- ....md => AwsTidyIdentityWhitelistRequest.md} | 22 +- ...t.md => AwsTidyRoleTagBlacklistRequest.md} | 22 +- ...st.md => AwsTidyRoleTagDenyListRequest.md} | 22 +- ...agRequest.md => AwsWriteRoleTagRequest.md} | 54 +- ...ntRequest.md => AwsWriteStsRoleRequest.md} | 22 +- ...equest.md => AzureConfigureAuthRequest.md} | 84 +- ...figRequest.md => AzureConfigureRequest.md} | 70 +- docs/AzureLoginRequest.md | 30 + docs/AzureWriteRoleRequest.md | 30 + ...Request.md => CentrifyConfigureRequest.md} | 110 +- ...nfigRequest.md => CertConfigureRequest.md} | 38 +- ...tesLoginRequest.md => CertLoginRequest.md} | 22 +- ...uest.md => CertWriteCertificateRequest.md} | 254 +- ...teCRLRequest.md => CertWriteCrlRequest.md} | 30 +- ...est.md => CloudFoundryConfigureRequest.md} | 134 +- docs/CollectHostInformationResponse.md | 219 + ...est.md => ConsulConfigureAccessRequest.md} | 62 +- ...CORSRequest.md => CorsConfigureRequest.md} | 38 +- docs/CorsReadConfigurationResponse.md | 129 + ... => DatabaseConfigureConnectionRequest.md} | 62 +- ... EncryptionKeyConfigureRotationRequest.md} | 38 +- ...ionKeyReadRotationConfigurationResponse.md | 129 + ...Request.md => EntityCreateAliasRequest.md} | 62 +- ...WriteRequest.md => EntityCreateRequest.md} | 54 +- docs/EntityLookupRequest.md | 54 +- ...est.md => EntityUpdateAliasByIdRequest.md} | 54 +- ...DRequest.md => EntityUpdateByIdRequest.md} | 46 +- ...equest.md => EntityUpdateByNameRequest.md} | 46 +- ...sHashRequest.md => GenerateHashRequest.md} | 46 +- docs/GenerateHashResponse.md | 69 + ...md => GenerateHashWithAlgorithmRequest.md} | 38 +- docs/GenerateHashWithAlgorithmResponse.md | 69 + ...domRequest.md => GenerateRandomRequest.md} | 46 +- docs/GenerateRandomResponse.md | 69 + ...t.md => GenerateRandomWithBytesRequest.md} | 38 +- docs/GenerateRandomWithBytesResponse.md | 69 + ...enerateRandomWithSourceAndBytesRequest.md} | 30 +- ...enerateRandomWithSourceAndBytesResponse.md | 69 + ....md => GenerateRandomWithSourceRequest.md} | 38 +- docs/GenerateRandomWithSourceResponse.md | 69 + ...igRequest.md => GithubConfigureRequest.md} | 124 +- docs/GithubLoginRequest.md | 22 +- ...st.md => GithubWriteTeamMappingRequest.md} | 22 +- ...st.md => GithubWriteUserMappingRequest.md} | 22 +- ....md => GoogleCloudConfigureAuthRequest.md} | 70 +- ...uest.md => GoogleCloudConfigureRequest.md} | 38 +- ...=> GoogleCloudEditLabelsForRoleRequest.md} | 30 +- ...CloudEditServiceAccountsForRoleRequest.md} | 30 +- ...nerateRolesetKeyWithParameters2Request.md} | 38 +- ...enerateRolesetKeyWithParametersRequest.md} | 38 +- ...eStaticAccountKeyWithParametersRequest.md} | 38 +- docs/GoogleCloudKMSDecryptRequest.md | 38 +- docs/GoogleCloudKMSEncryptRequest.md | 38 +- docs/GoogleCloudKMSReencryptRequest.md | 38 +- docs/GoogleCloudKMSRegisterKeyRequest.md | 30 +- docs/GoogleCloudKMSSignRequest.md | 30 +- docs/GoogleCloudKMSVerifyRequest.md | 38 +- docs/GoogleCloudKMSWriteKeyRequest.md | 70 +- ...d => GoogleCloudKmsConfigureKeyRequest.md} | 30 +- ...t.md => GoogleCloudKmsConfigureRequest.md} | 30 +- ...gleCloudWriteImpersonatedAccountRequest.md | 129 + ...sRequest.md => GroupCreateAliasRequest.md} | 46 +- ...pWriteRequest.md => GroupCreateRequest.md} | 70 +- docs/GroupLookupRequest.md | 54 +- ...uest.md => GroupUpdateAliasByIdRequest.md} | 38 +- ...IDRequest.md => GroupUpdateByIdRequest.md} | 62 +- ...Request.md => GroupUpdateByNameRequest.md} | 62 +- docs/HaStatusResponse.md | 69 + docs/IdentityApi.md | 1422 ++-- ...iteInitRequest.md => InitializeRequest.md} | 78 +- ...InternalClientActivityConfigureRequest.md} | 38 +- docs/InternalCountEntitiesResponse.md | 69 + docs/InternalCountTokensResponse.md | 69 + ...nternalGenerateOpenApiDocument2Request.md} | 22 +- ...ternalUiListEnabledFeatureFlagsResponse.md | 69 + ...ernalUiListEnabledVisibleMountsResponse.md | 99 + docs/InternalUiListNamespacesResponse.md | 69 + .../InternalUiReadMountInformationResponse.md | 429 + docs/InternalUiReadResultantAclResponse.md | 129 + docs/JWTWriteOIDCCallbackRequest.md | 159 - docs/JWTWriteRoleRequest.md | 262 +- ...onfigRequest.md => JwtConfigureRequest.md} | 126 +- docs/JwtLoginRequest.md | 30 +- ...> JwtOidcCallbackWithParametersRequest.md} | 46 +- ... JwtOidcRequestAuthorizationUrlRequest.md} | 38 +- docs/KVv2DeleteVersionsRequest.md | 22 +- docs/KVv2DestroyVersionsRequest.md | 22 +- docs/KVv2UndeleteVersionsRequest.md | 22 +- docs/KVv2WriteMetadataRequest.md | 46 +- docs/KVv2WriteRequest.md | 38 +- ...est.md => KerberosConfigureLdapRequest.md} | 376 +- ...Request.md => KerberosConfigureRequest.md} | 46 +- ...t.md => KubernetesConfigureAuthRequest.md} | 70 +- ...quest.md => KubernetesConfigureRequest.md} | 46 +- ...> KubernetesGenerateCredentialsRequest.md} | 66 +- docs/KubernetesWriteRoleRequest.md | 30 + ...nfigRequest.md => KvV2ConfigureRequest.md} | 38 +- docs/KvV2PatchResponse.md | 189 + docs/KvV2ReadConfigurationResponse.md | 129 + docs/KvV2ReadMetadataResponse.md | 309 + docs/KvV2ReadResponse.md | 99 + docs/KvV2ReadSubkeysResponse.md | 99 + docs/KvV2WriteResponse.md | 189 + docs/LDAPCheckInManageLibraryRequest.md | 69 - docs/LDAPWriteConfigRequest.md | 939 --- docs/LDAPWriteGroupRequest.md | 22 +- docs/LDAPWriteLibraryRequest.md | 159 - docs/LDAPWriteStaticRoleRequest.md | 38 +- docs/LDAPWriteUserRequest.md | 30 +- ...Request.md => LdapConfigureAuthRequest.md} | 376 +- ...nfigRequest.md => LdapConfigureRequest.md} | 344 +- ...equest.md => LdapLibraryCheckInRequest.md} | 22 +- ...quest.md => LdapLibraryCheckOutRequest.md} | 22 +- ...uest.md => LdapLibraryConfigureRequest.md} | 46 +- ...t.md => LdapLibraryForceCheckInRequest.md} | 22 +- docs/LdapLoginRequest.md | 22 +- ...uest.md => LdapWriteDynamicRoleRequest.md} | 58 +- docs/LeaderStatusResponse.md | 339 + docs/LeasesCountResponse.md | 99 + docs/LeasesListResponse.md | 99 + docs/LeasesLookUpResponse.md | 69 + docs/LeasesLookUpWithPrefixResponse.md | 69 + ...upRequest.md => LeasesReadLeaseRequest.md} | 22 +- docs/LeasesReadLeaseResponse.md | 219 + ...Request.md => LeasesRenewLease2Request.md} | 38 +- ...wRequest.md => LeasesRenewLeaseRequest.md} | 38 +- ...t.md => LeasesRenewLeaseWithId2Request.md} | 30 +- ...st.md => LeasesRenewLeaseWithIdRequest.md} | 30 +- ...equest.md => LeasesRevokeLease2Request.md} | 38 +- ...Request.md => LeasesRevokeLeaseRequest.md} | 38 +- ....md => LeasesRevokeLeaseWithId2Request.md} | 30 +- ...t.md => LeasesRevokeLeaseWithIdRequest.md} | 30 +- ...=> LeasesRevokeLeaseWithPrefix2Request.md} | 22 +- ... => LeasesRevokeLeaseWithPrefixRequest.md} | 22 +- ... LoggersUpdateVerbosityLevelForRequest.md} | 22 +- ... => LoggersUpdateVerbosityLevelRequest.md} | 22 +- docs/MFAValidateRequest.md | 26 +- docs/MFAWriteLoginEnforcementRequest.md | 52 +- ...md => MfaAdminDestroyTotpSecretRequest.md} | 26 +- ...d => MfaAdminGenerateTotpSecretRequest.md} | 26 +- ...est.md => MfaConfigureDuoMethodRequest.md} | 88 +- ...st.md => MfaConfigureOktaMethodRequest.md} | 88 +- ....md => MfaConfigurePingIdMethodRequest.md} | 56 +- ...st.md => MfaConfigureTotpMethodRequest.md} | 104 +- ...est.md => MfaGenerateTotpSecretRequest.md} | 20 +- docs/MongoDBAtlasWriteRoleRequest.md | 76 +- ...est.md => MongoDbAtlasConfigureRequest.md} | 26 +- ...md => MountsEnableSecretsEngineRequest.md} | 86 +- docs/MountsReadConfigurationResponse.md | 429 + docs/MountsReadTuningInformationResponse.md | 579 ++ ...untsTuneConfigurationParametersRequest.md} | 118 +- ...uest.md => NomadConfigureAccessRequest.md} | 62 +- ...quest.md => NomadConfigureLeaseRequest.md} | 30 +- docs/OCIWriteRoleRequest.md | 94 +- docs/OIDCIntrospectRequest.md | 30 +- docs/OIDCLoginRequest.md | 99 - docs/OIDCRotateKeyRequest.md | 22 +- docs/OIDCWriteAssignmentRequest.md | 30 +- docs/OIDCWriteAuthConfigRequest.md | 459 -- docs/OIDCWriteAuthRoleRequest.md | 969 --- docs/OIDCWriteAuthURLRequest.md | 129 - docs/OIDCWriteClientRequest.md | 62 +- docs/OIDCWriteKeyRequest.md | 46 +- docs/OIDCWriteProviderRequest.md | 38 +- docs/OIDCWriteRoleRequest.md | 44 +- docs/OIDCWriteScopeRequest.md | 30 +- ...onfigRequest.md => OciConfigureRequest.md} | 22 +- ...nWithRoleRequest.md => OciLoginRequest.md} | 22 +- ...nfigRequest.md => OidcConfigureRequest.md} | 22 +- ...st.md => OidcProviderAuthorize2Request.md} | 78 +- ...Request.md => OidcProviderTokenRequest.md} | 56 +- ...nfigRequest.md => OktaConfigureRequest.md} | 158 +- docs/OpenLDAPCheckInManageLibraryRequest.md | 69 - docs/OpenLDAPCheckOutLibraryRequest.md | 69 - docs/OpenLDAPWriteRoleRequest.md | 207 - docs/OpenLDAPWriteStaticRoleRequest.md | 129 - docs/PKIGenerateRootRequest.md | 254 +- docs/PKIReplaceRootRequest.md | 22 +- docs/PKIWriteAutoTidyConfigRequest.md | 339 - docs/PKIWriteClusterConfigRequest.md | 69 - docs/PKIWriteKeyRequest.md | 22 +- docs/PKIWriteRoleRequest.md | 412 +- ...riteRequest.md => PersonaCreateRequest.md} | 54 +- ...Request.md => PersonaUpdateByIdRequest.md} | 46 +- docs/PkiConfigureAutoTidyRequest.md | 519 ++ docs/PkiConfigureAutoTidyResponse.md | 429 + ...figRequest.md => PkiConfigureCaRequest.md} | 22 +- docs/PkiConfigureCaResponse.md | 129 + docs/PkiConfigureClusterRequest.md | 99 + docs/PkiConfigureClusterResponse.md | 99 + ...igRequest.md => PkiConfigureCrlRequest.md} | 168 +- docs/PkiConfigureCrlResponse.md | 369 + ...quest.md => PkiConfigureIssuersRequest.md} | 30 +- docs/PkiConfigureIssuersResponse.md | 99 + ...gRequest.md => PkiConfigureKeysRequest.md} | 22 +- docs/PkiConfigureKeysResponse.md | 69 + docs/PkiConfigureUrlsRequest.md | 159 + ...Request.md => PkiConfigureUrlsResponse.md} | 46 +- ....md => PkiCrossSignIntermediateRequest.md} | 238 +- docs/PkiCrossSignIntermediateResponse.md | 159 + docs/PkiGenerateExportedKeyRequest.md | 189 + docs/PkiGenerateExportedKeyResponse.md | 159 + ...t.md => PkiGenerateIntermediateRequest.md} | 230 +- docs/PkiGenerateIntermediateResponse.md | 159 + ...st.md => PkiGenerateInternalKeyRequest.md} | 54 +- docs/PkiGenerateInternalKeyResponse.md | 159 + ...Request.md => PkiGenerateKmsKeyRequest.md} | 54 +- docs/PkiGenerateKmsKeyResponse.md | 159 + docs/PkiGenerateRootResponse.md | 309 + ...tKeysRequest.md => PkiImportKeyRequest.md} | 30 +- docs/PkiImportKeyResponse.md | 129 + ...eRequest.md => PkiIssueWithRoleRequest.md} | 178 +- docs/PkiIssueWithRoleResponse.md | 249 + ...st.md => PkiIssuerIssueWithRoleRequest.md} | 170 +- docs/PkiIssuerIssueWithRoleResponse.md | 249 + docs/PkiIssuerReadCrlDeltaDerResponse.md | 69 + docs/PkiIssuerReadCrlDeltaPemResponse.md | 69 + docs/PkiIssuerReadCrlDeltaResponse.md | 69 + docs/PkiIssuerReadCrlDerResponse.md | 69 + docs/PkiIssuerReadCrlPemResponse.md | 69 + docs/PkiIssuerReadCrlResponse.md | 69 + docs/PkiIssuerResignCrlsRequest.md | 54 +- docs/PkiIssuerResignCrlsResponse.md | 69 + docs/PkiIssuerSignIntermediateRequest.md | 230 +- docs/PkiIssuerSignIntermediateResponse.md | 189 + docs/PkiIssuerSignRevocationListRequest.md | 62 +- docs/PkiIssuerSignRevocationListResponse.md | 69 + docs/PkiIssuerSignSelfIssuedRequest.md | 30 +- docs/PkiIssuerSignSelfIssuedResponse.md | 99 + docs/PkiIssuerSignVerbatimRequest.md | 196 +- docs/PkiIssuerSignVerbatimResponse.md | 249 + ...> PkiIssuerSignVerbatimWithRoleRequest.md} | 188 +- docs/PkiIssuerSignVerbatimWithRoleResponse.md | 249 + ...est.md => PkiIssuerSignWithRoleRequest.md} | 148 +- docs/PkiIssuerSignWithRoleResponse.md | 249 + docs/PkiIssuersGenerateIntermediateRequest.md | 230 +- .../PkiIssuersGenerateIntermediateResponse.md | 159 + docs/PkiIssuersGenerateRootRequest.md | 254 +- docs/PkiIssuersGenerateRootResponse.md | 309 + ...st.md => PkiIssuersImportBundleRequest.md} | 22 +- docs/PkiIssuersImportBundleResponse.md | 129 + ...uest.md => PkiIssuersImportCertRequest.md} | 22 +- docs/PkiIssuersImportCertResponse.md | 129 + ...uest.md => PkiIssuersRotateRootRequest.md} | 254 +- docs/PkiIssuersRotateRootResponse.md | 309 + docs/PkiListCertsResponse.md | 69 + docs/PkiListIssuersResponse.md | 99 + docs/PkiListKeysResponse.md | 99 + docs/PkiListRevokedCertsResponse.md | 69 + docs/PkiListRolesResponse.md | 69 + docs/PkiPatchIssuerResponse.md | 489 ++ docs/PkiPatchRoleResponse.md | 1449 ++++ docs/PkiReadAutoTidyConfigurationResponse.md | 489 ++ docs/PkiReadCaChainPemResponse.md | 189 + docs/PkiReadCaDerResponse.md | 189 + docs/PkiReadCaPemResponse.md | 189 + docs/PkiReadCertCaChainResponse.md | 189 + docs/PkiReadCertCrlResponse.md | 189 + docs/PkiReadCertDeltaCrlResponse.md | 189 + docs/PkiReadCertRawDerResponse.md | 189 + docs/PkiReadCertRawPemResponse.md | 189 + docs/PkiReadCertResponse.md | 189 + docs/PkiReadClusterConfigurationResponse.md | 99 + docs/PkiReadCrlConfigurationResponse.md | 369 + docs/PkiReadCrlDeltaPemResponse.md | 189 + docs/PkiReadCrlDeltaResponse.md | 189 + docs/PkiReadCrlDerResponse.md | 189 + docs/PkiReadCrlPemResponse.md | 189 + docs/PkiReadIssuerDerResponse.md | 159 + docs/PkiReadIssuerJsonResponse.md | 159 + docs/PkiReadIssuerPemResponse.md | 159 + docs/PkiReadIssuerResponse.md | 489 ++ docs/PkiReadIssuersConfigurationResponse.md | 99 + docs/PkiReadKeyResponse.md | 189 + docs/PkiReadKeysConfigurationResponse.md | 69 + docs/PkiReadRoleResponse.md | 1449 ++++ docs/PkiReadUrlsConfigurationResponse.md | 159 + docs/PkiReplaceRootResponse.md | 99 + docs/PkiRevokeIssuerResponse.md | 489 ++ docs/PkiRevokeRequest.md | 30 +- docs/PkiRevokeResponse.md | 129 + docs/PkiRevokeWithKeyRequest.md | 38 +- docs/PkiRevokeWithKeyResponse.md | 129 + docs/PkiRootSignIntermediateRequest.md | 238 +- docs/PkiRootSignIntermediateResponse.md | 189 + docs/PkiRootSignSelfIssuedRequest.md | 38 +- docs/PkiRootSignSelfIssuedResponse.md | 99 + docs/PkiRotateCrlResponse.md | 69 + docs/PkiRotateDeltaCrlResponse.md | 69 + ....md => PkiSetSignedIntermediateRequest.md} | 22 +- docs/PkiSetSignedIntermediateResponse.md | 129 + docs/PkiSignVerbatimRequest.md | 204 +- docs/PkiSignVerbatimResponse.md | 249 + ...t.md => PkiSignVerbatimWithRoleRequest.md} | 196 +- docs/PkiSignVerbatimWithRoleResponse.md | 249 + ...leRequest.md => PkiSignWithRoleRequest.md} | 200 +- docs/PkiSignWithRoleResponse.md | 249 + docs/PkiTidyCancelResponse.md | 729 ++ docs/PkiTidyRequest.md | 258 +- docs/PkiTidyStatusResponse.md | 729 ++ ...PemRequest.md => PkiWriteIssuerRequest.md} | 88 +- docs/PkiWriteIssuerResponse.md | 489 ++ docs/PkiWriteJsonRequest.md | 339 - docs/PkiWriteKeyResponse.md | 129 + docs/PkiWriteRoleResponse.md | 1449 ++++ docs/PluginsCatalogListPluginsResponse.md | 69 + ...uginsCatalogListPluginsWithTypeResponse.md | 69 + ...sCatalogReadPluginConfigurationResponse.md | 249 + ...ReadPluginConfigurationWithTypeResponse.md | 249 + ...=> PluginsCatalogRegisterPluginRequest.md} | 62 +- ...nsCatalogRegisterPluginWithTypeRequest.md} | 54 +- ...est.md => PluginsReloadBackendsRequest.md} | 38 +- docs/PluginsReloadBackendsResponse.md | 69 + ...eratePasswordFromPasswordPolicyResponse.md | 69 + docs/PoliciesListAclPoliciesResponse.md | 99 + docs/PoliciesListPasswordPoliciesResponse.md | 69 + docs/PoliciesListResponse.md | 99 + docs/PoliciesReadAclPolicy2Response.md | 129 + docs/PoliciesReadAclPolicyResponse.md | 129 + docs/PoliciesReadPasswordPolicyResponse.md | 69 + ...t.md => PoliciesWriteAclPolicy2Request.md} | 30 +- ...st.md => PoliciesWriteAclPolicyRequest.md} | 22 +- ... => PoliciesWritePasswordPolicyRequest.md} | 22 +- ... QueryTokenAccessorCapabilitiesRequest.md} | 38 +- ...st.md => QueryTokenCapabilitiesRequest.md} | 38 +- ...d => QueryTokenSelfCapabilitiesRequest.md} | 38 +- docs/RabbitMQWriteRoleRequest.md | 38 +- ... => RabbitMqConfigureConnectionRequest.md} | 62 +- ...st.md => RabbitMqConfigureLeaseRequest.md} | 30 +- ...igRequest.md => RadiusConfigureRequest.md} | 152 +- ....md => RateLimitQuotasConfigureRequest.md} | 38 +- ...onse.md => RateLimitQuotasListResponse.md} | 22 +- ...ateLimitQuotasReadConfigurationResponse.md | 129 + docs/RateLimitQuotasReadResponse.md | 249 + ...uest.md => RateLimitQuotasWriteRequest.md} | 62 +- docs/ReadWrappingProperties2Response.md | 129 + ...st.md => ReadWrappingPropertiesRequest.md} | 22 +- docs/ReadWrappingPropertiesResponse.md | 129 + ...st.md => RekeyAttemptInitializeRequest.md} | 54 +- docs/RekeyAttemptInitializeResponse.md | 339 + docs/RekeyAttemptReadProgressResponse.md | 339 + ...equest.md => RekeyAttemptUpdateRequest.md} | 30 +- docs/RekeyAttemptUpdateResponse.md | 429 + docs/RekeyReadBackupKeyResponse.md | 129 + docs/RekeyReadBackupRecoveryKeyResponse.md | 129 + docs/RekeyVerificationCancelResponse.md | 189 + docs/RekeyVerificationReadProgressResponse.md | 189 + ...t.md => RekeyVerificationUpdateRequest.md} | 30 +- docs/RekeyVerificationUpdateResponse.md | 99 + docs/RemountResponse.md | 69 + docs/RemountStatusResponse.md | 99 + ...ppingRewrapRequest.md => RewrapRequest.md} | 22 +- ... RootTokenGenerationInitialize2Request.md} | 22 +- .../RootTokenGenerationInitialize2Response.md | 339 + ...> RootTokenGenerationInitializeRequest.md} | 22 +- docs/RootTokenGenerationInitializeResponse.md | 339 + ...ootTokenGenerationReadProgress2Response.md | 339 + ...RootTokenGenerationReadProgressResponse.md | 339 + ...md => RootTokenGenerationUpdateRequest.md} | 30 +- docs/RootTokenGenerationUpdateResponse.md | 339 + docs/SSHWriteKeysRequest.md | 69 - docs/SSHWriteRoleRequest.md | 422 +- docs/SealStatusResponse.md | 519 ++ docs/SecretsApi.md | 7094 ++++++++--------- ...figRequest.md => SshConfigureCaRequest.md} | 54 +- ...t.md => SshConfigureZeroAddressRequest.md} | 22 +- ...st.md => SshGenerateCredentialsRequest.md} | 30 +- ...quest.md => SshIssueCertificateRequest.md} | 78 +- ...pRequest.md => SshListRolesByIpRequest.md} | 22 +- ...equest.md => SshSignCertificateRequest.md} | 70 +- ...erifyRequest.md => SshVerifyOtpRequest.md} | 22 +- docs/SystemApi.md | 3030 ++++--- ...t.md => TerraformCloudConfigureRequest.md} | 36 +- ...t.md => TerraformCloudWriteRoleRequest.md} | 54 +- ...st.md => TokenCreateAgainstRoleRequest.md} | 118 +- ...Request.md => TokenCreateOrphanRequest.md} | 126 +- ...CreateRequest.md => TokenCreateRequest.md} | 118 +- ...quest.md => TokenLookUpAccessorRequest.md} | 22 +- ...LookupRequest.md => TokenLookUpRequest.md} | 22 +- ...fRequest.md => TokenLookUpSelf2Request.md} | 22 +- ...eKeyRequest.md => TotpCreateKeyRequest.md} | 110 +- ...eRequest.md => TotpValidateCodeRequest.md} | 22 +- ...est.md => TransitConfigureCacheRequest.md} | 22 +- ...quest.md => TransitConfigureKeyRequest.md} | 62 +- ...uest.md => TransitConfigureKeysRequest.md} | 22 +- ...yRequest.md => TransitCreateKeyRequest.md} | 138 +- docs/TransitDecryptRequest.md | 30 + docs/TransitEncryptRequest.md | 30 + docs/TransitGenerateHMACRequest.md | 76 +- ...TransitGenerateHMACWithAlgorithmRequest.md | 68 +- ... TransitGenerateRandomWithBytesRequest.md} | 38 +- ...enerateRandomWithSourceAndBytesRequest.md} | 30 +- ...TransitGenerateRandomWithSourceRequest.md} | 38 +- ...d => TransitRestoreAndRenameKeyRequest.md} | 60 +- docs/TransitRestoreKeyRequest.md | 30 + docs/TransitRewrapRequest.md | 30 + docs/TransitRotateKeyRequest.md | 99 + docs/TransitSignRequest.md | 30 + docs/TransitSignWithAlgorithmRequest.md | 30 + docs/TransitVerifyRequest.md | 30 + docs/TransitVerifyWithAlgorithmRequest.md | 30 + ...equest.md => UiHeadersConfigureRequest.md} | 30 +- docs/UiHeadersListResponse.md | 69 + docs/UiHeadersReadConfigurationResponse.md | 99 + docs/UnsealResponse.md | 519 ++ ...ppingUnwrapRequest.md => UnwrapRequest.md} | 22 +- ...est.md => UserpassResetPasswordRequest.md} | 22 +- ...st.md => UserpassUpdatePoliciesRequest.md} | 30 +- docs/VersionHistoryResponse.md | 99 + docs/WriteRawPathRequest.md | 159 - docs/WriteRawRequest.md | 189 - openapi.json | 475 +- ...tive_directory_check_in_library_request.go | 33 - ...rectory_check_in_manage_library_request.go | 33 - ...ive_directory_check_out_library_request.go | 33 - ...l_active_directory_write_config_request.go | 169 - ..._active_directory_write_library_request.go | 49 - ...del_active_directory_write_role_request.go | 37 - ...o => model_ali_cloud_configure_request.go} | 12 +- ...quest.go => model_alias_create_request.go} | 12 +- ...go => model_alias_update_by_id_request.go} | 12 +- ..._destroy_secret_id_by_accessor_request.go} | 12 +- ...del_app_role_destroy_secret_id_request.go} | 12 +- ...model_app_role_list_secret_ids_response.go | 32 + ...st.go => model_app_role_login_response.go} | 17 +- ..._look_up_secret_id_by_accessor_request.go} | 12 +- ...look_up_secret_id_by_accessor_response.go} | 12 +- ...del_app_role_look_up_secret_id_request.go} | 12 +- ...el_app_role_look_up_secret_id_response.go} | 12 +- ...l_app_role_read_bind_secret_id_response.go | 12 +- ..._app_role_read_bound_cidr_list_response.go | 12 +- ...app_role_read_local_secret_ids_response.go | 12 +- .../model_app_role_read_role_id_response.go | 12 +- ...ole_read_secret_id_bound_cidrs_response.go | 12 +- ...p_role_read_secret_id_num_uses_response.go | 12 +- ...l_app_role_read_secret_id_ttl_response.go} | 12 +- ...pp_role_read_token_bound_cidrs_response.go | 12 +- ...el_app_role_read_token_max_ttl_response.go | 12 +- .../model_app_role_read_token_ttl_response.go | 12 +- ...l_app_role_write_bind_secret_id_request.go | 12 +- ..._app_role_write_bound_cidr_list_request.go | 12 +- ...app_role_write_custom_secret_id_request.go | 12 +- ...pp_role_write_custom_secret_id_response.go | 12 +- .../model_app_role_write_role_id_request.go | 12 +- ...ole_write_secret_id_bound_cidrs_request.go | 12 +- ...p_role_write_secret_id_num_uses_request.go | 12 +- .../model_app_role_write_secret_id_request.go | 12 +- ...model_app_role_write_secret_id_response.go | 12 +- ...l_app_role_write_secret_id_ttl_request.go} | 12 +- ...pp_role_write_token_bound_cidrs_request.go | 12 +- ...el_app_role_write_token_max_ttl_request.go | 12 +- .../model_app_role_write_token_ttl_request.go | 12 +- ... model_auditing_calculate_hash_request.go} | 12 +- .../model_auditing_calculate_hash_response.go | 32 + ...> model_auditing_enable_device_request.go} | 12 +- ...auditing_enable_request_header_request.go} | 12 +- ..._auditing_list_request_headers_response.go | 32 + ...go => model_auth_enable_method_request.go} | 12 +- .../model_auth_read_configuration_response.go | 68 + ...l_auth_read_tuning_information_response.go | 83 + ..._tune_configuration_parameters_request.go} | 12 +- ...odel_aws_configure_certificate_request.go} | 12 +- ... => model_aws_configure_client_request.go} | 12 +- ...ity_access_list_tidy_operation_request.go} | 12 +- ...configure_identity_integration_request.go} | 12 +- ...ntity_whitelist_tidy_operation_request.go} | 12 +- ...o => model_aws_configure_lease_request.go} | 12 +- ...e_tag_blacklist_tidy_operation_request.go} | 12 +- ...e_tag_deny_list_tidy_operation_request.go} | 12 +- ...configure_root_iam_credentials_request.go} | 12 +- ...odel_aws_generate_credentials2_request.go} | 16 +- ..._aws_generate_sts_credentials2_request.go} | 12 +- schema/model_aws_login_request.go | 12 +- ..._aws_tidy_identity_access_list_request.go} | 12 +- ...el_aws_tidy_identity_whitelist_request.go} | 12 +- ...el_aws_tidy_role_tag_blacklist_request.go} | 12 +- ...el_aws_tidy_role_tag_deny_list_request.go} | 12 +- schema/model_aws_write_auth_role_request.go | 12 +- schema/model_aws_write_role_request.go | 12 +- ...go => model_aws_write_role_tag_request.go} | 12 +- ...go => model_aws_write_sts_role_request.go} | 12 +- ... => model_azure_configure_auth_request.go} | 16 +- ...st.go => model_azure_configure_request.go} | 12 +- schema/model_azure_login_request.go | 4 + schema/model_azure_write_role_request.go | 5 + ...go => model_centrify_configure_request.go} | 12 +- ...est.go => model_cert_configure_request.go} | 12 +- ...request.go => model_cert_login_request.go} | 12 +- ...> model_cert_write_certificate_request.go} | 12 +- ...est.go => model_cert_write_crl_request.go} | 12 +- ... model_cloud_foundry_configure_request.go} | 12 +- ...model_collect_host_information_response.go | 48 + ... model_consul_configure_access_request.go} | 12 +- ...est.go => model_cors_configure_request.go} | 12 +- .../model_cors_read_configuration_response.go | 38 + ..._database_configure_connection_request.go} | 12 +- ...ryption_key_configure_rotation_request.go} | 12 +- ...ey_read_rotation_configuration_response.go | 38 + ...o => model_entity_create_alias_request.go} | 12 +- ...uest.go => model_entity_create_request.go} | 12 +- ...est.go => model_entity_look_up_request.go} | 12 +- ...odel_entity_update_alias_by_id_request.go} | 12 +- ...o => model_entity_update_by_id_request.go} | 12 +- ...=> model_entity_update_by_name_request.go} | 12 +- ...uest.go => model_generate_hash_request.go} | 12 +- schema/model_generate_hash_response.go | 32 + ...l_generate_hash_with_algorithm_request.go} | 12 +- ...l_generate_hash_with_algorithm_response.go | 32 + ...st.go => model_generate_random_request.go} | 12 +- schema/model_generate_random_response.go | 32 + ...del_generate_random_with_bytes_request.go} | 12 +- ...del_generate_random_with_bytes_response.go | 32 + ...e_random_with_source_and_bytes_request.go} | 12 +- ...e_random_with_source_and_bytes_response.go | 32 + ...el_generate_random_with_source_request.go} | 12 +- ...el_generate_random_with_source_response.go | 32 + ...t.go => model_github_configure_request.go} | 12 +- ...quest.go => model_github_login_request.go} | 12 +- ...odel_github_write_team_mapping_request.go} | 12 +- ...odel_github_write_user_mapping_request.go} | 12 +- ...el_google_cloud_configure_auth_request.go} | 12 +- ...> model_google_cloud_configure_request.go} | 12 +- ...gle_cloud_edit_labels_for_role_request.go} | 12 +- ...edit_service_accounts_for_role_request.go} | 12 +- ...e_roleset_key_with_parameters2_request.go} | 12 +- ...te_roleset_key_with_parameters_request.go} | 12 +- ...ic_account_key_with_parameters_request.go} | 12 +- ...google_cloud_kms_configure_key_request.go} | 12 +- ...del_google_cloud_kms_configure_request.go} | 12 +- .../model_google_cloud_kms_decrypt_request.go | 12 +- .../model_google_cloud_kms_encrypt_request.go | 12 +- ...odel_google_cloud_kms_reencrypt_request.go | 12 +- ...l_google_cloud_kms_register_key_request.go | 12 +- schema/model_google_cloud_kms_sign_request.go | 12 +- .../model_google_cloud_kms_verify_request.go | 12 +- ...odel_google_cloud_kms_write_key_request.go | 12 +- ...loud_write_impersonated_account_request.go | 41 + ...go => model_group_create_alias_request.go} | 12 +- ...quest.go => model_group_create_request.go} | 12 +- ...uest.go => model_group_look_up_request.go} | 12 +- ...model_group_update_alias_by_id_request.go} | 12 +- ...go => model_group_update_by_id_request.go} | 12 +- ... => model_group_update_by_name_request.go} | 12 +- schema/model_ha_status_response.go | 32 + ...request.go => model_initialize_request.go} | 12 +- ...rnal_client_activity_configure_request.go} | 12 +- .../model_internal_count_entities_response.go | 32 + .../model_internal_count_tokens_response.go | 32 + ...al_generate_open_api_document2_request.go} | 12 +- ..._ui_list_enabled_feature_flags_response.go | 32 + ...ui_list_enabled_visible_mounts_response.go | 37 + ...el_internal_ui_list_namespaces_response.go | 33 + ...rnal_ui_read_mount_information_response.go | 68 + ...internal_ui_read_resultant_acl_response.go | 38 + ...uest.go => model_jwt_configure_request.go} | 12 +- schema/model_jwt_login_request.go | 12 +- ..._oidc_callback_with_parameters_request.go} | 12 +- ...oidc_request_authorization_url_request.go} | 12 +- .../model_jwt_write_oidc_auth_url_request.go | 41 - schema/model_jwt_write_role_request.go | 12 +- ... model_kerberos_configure_ldap_request.go} | 26 +- ...go => model_kerberos_configure_request.go} | 12 +- ...odel_kubernetes_configure_auth_request.go} | 12 +- ... => model_kubernetes_configure_request.go} | 12 +- ...ubernetes_generate_credentials_request.go} | 16 +- schema/model_kubernetes_write_role_request.go | 4 + ...st.go => model_kv_v2_configure_request.go} | 12 +- ...=> model_kv_v2_delete_versions_request.go} | 12 +- ...> model_kv_v2_destroy_versions_request.go} | 12 +- schema/model_kv_v2_patch_response.go | 45 + ...model_kv_v2_read_configuration_response.go | 41 + schema/model_kv_v2_read_metadata_response.go | 60 + ...equest.go => model_kv_v2_read_response.go} | 20 +- schema/model_kv_v2_read_subkeys_response.go | 35 + ... model_kv_v2_undelete_versions_request.go} | 12 +- ... => model_kv_v2_write_metadata_request.go} | 12 +- ...equest.go => model_kv_v2_write_request.go} | 12 +- schema/model_kv_v2_write_response.go | 45 + ...el_ldap_check_in_manage_library_request.go | 33 - ...o => model_ldap_configure_auth_request.go} | 26 +- ...est.go => model_ldap_configure_request.go} | 26 +- ...=> model_ldap_library_check_in_request.go} | 12 +- ...> model_ldap_library_check_out_request.go} | 12 +- ...> model_ldap_library_configure_request.go} | 12 +- ...el_ldap_library_force_check_in_request.go} | 12 +- schema/model_ldap_login_request.go | 12 +- schema/model_ldap_write_config_request.go | 163 - ... model_ldap_write_dynamic_role_request.go} | 12 +- schema/model_ldap_write_group_request.go | 12 +- schema/model_ldap_write_library_request.go | 49 - schema/model_ldap_write_role_request.go | 53 - .../model_ldap_write_static_role_request.go | 12 +- schema/model_ldap_write_user_request.go | 12 +- schema/model_leader_status_response.go | 60 + schema/model_leases_count_response.go | 37 + schema/model_leases_list_response.go | 37 + schema/model_leases_look_up_response.go | 33 + ...del_leases_look_up_with_prefix_response.go | 33 + ....go => model_leases_read_lease_request.go} | 12 +- schema/model_leases_read_lease_response.go | 54 + ...o => model_leases_renew_lease2_request.go} | 12 +- ...go => model_leases_renew_lease_request.go} | 12 +- ...el_leases_renew_lease_with_id2_request.go} | 12 +- ...del_leases_renew_lease_with_id_request.go} | 12 +- ... => model_leases_revoke_lease2_request.go} | 12 +- ...o => model_leases_revoke_lease_request.go} | 12 +- ...l_leases_revoke_lease_with_id2_request.go} | 12 +- ...el_leases_revoke_lease_with_id_request.go} | 12 +- ...ases_revoke_lease_with_prefix2_request.go} | 12 +- ...eases_revoke_lease_with_prefix_request.go} | 12 +- ...ers_update_verbosity_level_for_request.go} | 12 +- ...loggers_update_verbosity_level_request.go} | 12 +- ..._mfa_admin_destroy_totp_secret_request.go} | 12 +- ...mfa_admin_generate_totp_secret_request.go} | 12 +- ...model_mfa_configure_duo_method_request.go} | 18 +- ...odel_mfa_configure_okta_method_request.go} | 18 +- ...l_mfa_configure_ping_id_method_request.go} | 18 +- ...odel_mfa_configure_totp_method_request.go} | 18 +- ...model_mfa_generate_totp_secret_request.go} | 12 +- schema/model_mfa_validate_request.go | 12 +- ...del_mfa_write_login_enforcement_request.go | 12 +- ...model_mongo_db_atlas_configure_request.go} | 12 +- ...model_mongo_db_atlas_write_role_request.go | 12 +- ...l_mounts_enable_secrets_engine_request.go} | 12 +- ...odel_mounts_read_configuration_response.go | 78 + ...mounts_read_tuning_information_response.go | 90 + ..._tune_configuration_parameters_request.go} | 12 +- ...> model_nomad_configure_access_request.go} | 12 +- ...=> model_nomad_configure_lease_request.go} | 12 +- ...uest.go => model_oci_configure_request.go} | 12 +- ..._request.go => model_oci_login_request.go} | 12 +- schema/model_oci_write_role_request.go | 12 +- ...est.go => model_oidc_configure_request.go} | 12 +- schema/model_oidc_introspect_request.go | 12 +- ...model_oidc_provider_authorize2_request.go} | 12 +- ...o => model_oidc_provider_token_request.go} | 12 +- schema/model_oidc_rotate_key_request.go | 12 +- schema/model_oidc_write_assignment_request.go | 12 +- .../model_oidc_write_auth_config_request.go | 85 - schema/model_oidc_write_auth_role_request.go | 164 - schema/model_oidc_write_callback_request.go | 41 - schema/model_oidc_write_client_request.go | 12 +- schema/model_oidc_write_key_request.go | 12 +- schema/model_oidc_write_provider_request.go | 12 +- schema/model_oidc_write_role_request.go | 12 +- schema/model_oidc_write_scope_request.go | 12 +- ...est.go => model_okta_configure_request.go} | 12 +- ...en_ldap_check_in_manage_library_request.go | 33 - ...del_open_ldap_check_out_library_request.go | 33 - ...del_open_ldap_write_static_role_request.go | 41 - ...est.go => model_persona_create_request.go} | 12 +- ... => model_persona_update_by_id_request.go} | 12 +- ... model_pki_configure_auto_tidy_request.go} | 40 +- .../model_pki_configure_auto_tidy_response.go | 77 + ...t.go => model_pki_configure_ca_request.go} | 12 +- schema/model_pki_configure_ca_response.go | 41 + ...=> model_pki_configure_cluster_request.go} | 16 +- .../model_pki_configure_cluster_response.go | 37 + schema/model_pki_configure_crl_request.go | 80 + ...go => model_pki_configure_crl_response.go} | 24 +- ...=> model_pki_configure_issuers_request.go} | 12 +- .../model_pki_configure_issuers_response.go | 37 + ...go => model_pki_configure_keys_request.go} | 12 +- schema/model_pki_configure_keys_response.go | 33 + schema/model_pki_configure_urls_request.go | 47 + ...o => model_pki_configure_urls_response.go} | 12 +- ...el_pki_cross_sign_intermediate_request.go} | 12 +- ...el_pki_cross_sign_intermediate_response.go | 45 + ...odel_pki_generate_exported_key_request.go} | 12 +- ...odel_pki_generate_exported_key_response.go | 45 + ...odel_pki_generate_intermediate_request.go} | 12 +- ...odel_pki_generate_intermediate_response.go | 45 + ...model_pki_generate_internal_key_request.go | 52 + ...odel_pki_generate_internal_key_response.go | 45 + ... => model_pki_generate_kms_key_request.go} | 12 +- schema/model_pki_generate_kms_key_response.go | 45 + schema/model_pki_generate_root_request.go | 12 +- schema/model_pki_generate_root_response.go | 65 + ...est.go => model_pki_import_key_request.go} | 12 +- schema/model_pki_import_key_response.go | 41 + ...o => model_pki_issue_with_role_request.go} | 16 +- schema/model_pki_issue_with_role_response.go | 57 + ...del_pki_issuer_issue_with_role_request.go} | 16 +- ...del_pki_issuer_issue_with_role_response.go | 57 + ..._pki_issuer_read_crl_delta_der_response.go | 32 + ..._pki_issuer_read_crl_delta_pem_response.go | 32 + ...odel_pki_issuer_read_crl_delta_response.go | 32 + .../model_pki_issuer_read_crl_der_response.go | 32 + .../model_pki_issuer_read_crl_pem_response.go | 32 + schema/model_pki_issuer_read_crl_response.go | 32 + .../model_pki_issuer_resign_crls_request.go | 12 +- .../model_pki_issuer_resign_crls_response.go | 33 + ...el_pki_issuer_sign_intermediate_request.go | 12 +- ...l_pki_issuer_sign_intermediate_response.go | 49 + ...pki_issuer_sign_revocation_list_request.go | 12 +- ...ki_issuer_sign_revocation_list_response.go | 33 + ...del_pki_issuer_sign_self_issued_request.go | 12 +- ...el_pki_issuer_sign_self_issued_response.go | 37 + .../model_pki_issuer_sign_verbatim_request.go | 16 +- ...model_pki_issuer_sign_verbatim_response.go | 57 + ...issuer_sign_verbatim_with_role_request.go} | 16 +- ...issuer_sign_verbatim_with_role_response.go | 57 + ...odel_pki_issuer_sign_with_role_request.go} | 16 +- ...odel_pki_issuer_sign_with_role_response.go | 57 + ...i_issuers_generate_intermediate_request.go | 12 +- ..._issuers_generate_intermediate_response.go | 45 + ...model_pki_issuers_generate_root_request.go | 12 +- ...odel_pki_issuers_generate_root_response.go | 65 + ...odel_pki_issuers_import_bundle_request.go} | 12 +- ...odel_pki_issuers_import_bundle_response.go | 41 + ... model_pki_issuers_import_cert_request.go} | 12 +- .../model_pki_issuers_import_cert_response.go | 41 + ... model_pki_issuers_rotate_root_request.go} | 12 +- .../model_pki_issuers_rotate_root_response.go | 65 + schema/model_pki_list_certs_response.go | 33 + schema/model_pki_list_issuers_response.go | 37 + schema/model_pki_list_keys_response.go | 37 + .../model_pki_list_revoked_certs_response.go | 33 + schema/model_pki_list_roles_response.go | 33 + schema/model_pki_patch_issuer_response.go | 87 + schema/model_pki_patch_role_response.go | 219 + ...i_read_auto_tidy_configuration_response.go | 83 + .../model_pki_read_ca_chain_pem_response.go | 49 + schema/model_pki_read_ca_der_response.go | 49 + schema/model_pki_read_ca_pem_response.go | 49 + .../model_pki_read_cert_ca_chain_response.go | 49 + schema/model_pki_read_cert_crl_response.go | 49 + .../model_pki_read_cert_delta_crl_response.go | 49 + .../model_pki_read_cert_raw_der_response.go | 49 + .../model_pki_read_cert_raw_pem_response.go | 49 + schema/model_pki_read_cert_response.go | 49 + ...pki_read_cluster_configuration_response.go | 37 + ...del_pki_read_crl_configuration_response.go | 73 + .../model_pki_read_crl_delta_pem_response.go | 49 + schema/model_pki_read_crl_delta_response.go | 49 + schema/model_pki_read_crl_der_response.go | 49 + schema/model_pki_read_crl_pem_response.go | 49 + schema/model_pki_read_issuer_der_response.go | 45 + schema/model_pki_read_issuer_json_response.go | 45 + schema/model_pki_read_issuer_pem_response.go | 45 + schema/model_pki_read_issuer_response.go | 87 + ...pki_read_issuers_configuration_response.go | 37 + schema/model_pki_read_key_response.go | 49 + ...el_pki_read_keys_configuration_response.go | 33 + schema/model_pki_read_role_response.go | 219 + ...el_pki_read_urls_configuration_response.go | 45 + schema/model_pki_replace_root_request.go | 12 +- schema/model_pki_replace_root_response.go | 37 + schema/model_pki_revoke_issuer_response.go | 89 + schema/model_pki_revoke_request.go | 12 +- schema/model_pki_revoke_response.go | 42 + schema/model_pki_revoke_with_key_request.go | 12 +- schema/model_pki_revoke_with_key_response.go | 42 + ...odel_pki_root_sign_intermediate_request.go | 12 +- ...del_pki_root_sign_intermediate_response.go | 49 + ...model_pki_root_sign_self_issued_request.go | 12 +- ...odel_pki_root_sign_self_issued_response.go | 37 + schema/model_pki_rotate_crl_response.go | 33 + schema/model_pki_rotate_delta_crl_response.go | 33 + ...el_pki_set_signed_intermediate_request.go} | 12 +- ...el_pki_set_signed_intermediate_response.go | 41 + schema/model_pki_sign_verbatim_request.go | 16 +- schema/model_pki_sign_verbatim_response.go | 57 + ...el_pki_sign_verbatim_with_role_request.go} | 16 +- ...el_pki_sign_verbatim_with_role_response.go | 57 + ...go => model_pki_sign_with_role_request.go} | 16 +- schema/model_pki_sign_with_role_response.go | 57 + schema/model_pki_tidy_cancel_response.go | 114 + schema/model_pki_tidy_request.go | 40 +- schema/model_pki_tidy_status_response.go | 114 + ...t.go => model_pki_write_issuer_request.go} | 14 +- schema/model_pki_write_issuer_response.go | 87 + schema/model_pki_write_json_request.go | 74 - schema/model_pki_write_key_request.go | 12 +- schema/model_pki_write_key_response.go | 41 + schema/model_pki_write_role_request.go | 16 +- schema/model_pki_write_role_response.go | 219 + ...l_plugins_catalog_list_plugins_response.go | 32 + ...catalog_list_plugins_with_type_response.go | 33 + ...alog_read_plugin_configuration_response.go | 55 + ...plugin_configuration_with_type_response.go | 55 + ...lugins_catalog_register_plugin_request.go} | 12 +- ...alog_register_plugin_with_type_request.go} | 12 +- ... model_plugins_reload_backends_request.go} | 12 +- .../model_plugins_reload_backends_response.go | 32 + ..._password_from_password_policy_response.go | 32 + ...del_policies_list_acl_policies_response.go | 35 + ...olicies_list_password_policies_response.go | 32 + schema/model_policies_list_response.go | 35 + ...odel_policies_read_acl_policy2_response.go | 38 + ...model_policies_read_acl_policy_response.go | 38 + ..._policies_read_password_policy_response.go | 32 + ...del_policies_write_acl_policy2_request.go} | 12 +- ...odel_policies_write_acl_policy_request.go} | 12 +- ...policies_write_password_policy_request.go} | 12 +- ...ry_token_accessor_capabilities_request.go} | 12 +- ...model_query_token_capabilities_request.go} | 12 +- ..._query_token_self_capabilities_request.go} | 12 +- ...rabbit_mq_configure_connection_request.go} | 12 +- ...odel_rabbit_mq_configure_lease_request.go} | 12 +- schema/model_rabbit_mq_write_role_request.go | 12 +- ...t.go => model_radius_configure_request.go} | 14 +- ...el_rate_limit_quotas_configure_request.go} | 12 +- ... model_rate_limit_quotas_list_response.go} | 12 +- ...imit_quotas_read_configuration_response.go | 38 + .../model_rate_limit_quotas_read_response.go | 50 + ... model_rate_limit_quotas_write_request.go} | 12 +- ...odel_read_wrapping_properties2_response.go | 39 + .../model_read_wrapping_properties_request.go | 32 + ...model_read_wrapping_properties_response.go | 39 + ...model_rekey_attempt_initialize_request.go} | 12 +- ...model_rekey_attempt_initialize_response.go | 59 + ...el_rekey_attempt_read_progress_response.go | 59 + ... => model_rekey_attempt_update_request.go} | 12 +- schema/model_rekey_attempt_update_response.go | 68 + .../model_rekey_read_backup_key_response.go | 38 + ...rekey_read_backup_recovery_key_response.go | 38 + ...odel_rekey_verification_cancel_response.go | 44 + ...key_verification_read_progress_response.go | 44 + ...odel_rekey_verification_update_request.go} | 12 +- ...odel_rekey_verification_update_response.go | 35 + schema/model_remount_response.go | 32 + schema/model_remount_status_response.go | 35 + ...rap_request.go => model_rewrap_request.go} | 12 +- ...t_token_generation_initialize2_request.go} | 12 +- ...t_token_generation_initialize2_response.go | 59 + ...ot_token_generation_initialize_request.go} | 12 +- ...ot_token_generation_initialize_response.go | 59 + ...oken_generation_read_progress2_response.go | 59 + ...token_generation_read_progress_response.go | 59 + ...l_root_token_generation_update_request.go} | 12 +- ...l_root_token_generation_update_response.go | 59 + schema/model_seal_status_response.go | 77 + ...t.go => model_ssh_configure_ca_request.go} | 12 +- ...del_ssh_configure_zero_address_request.go} | 12 +- ...model_ssh_generate_credentials_request.go} | 12 +- ...=> model_ssh_issue_certificate_request.go} | 12 +- ... => model_ssh_list_roles_by_ip_request.go} | 12 +- ... => model_ssh_sign_certificate_request.go} | 12 +- ...est.go => model_ssh_verify_otp_request.go} | 12 +- schema/model_ssh_write_role_request.go | 82 +- ...odel_terraform_cloud_configure_request.go} | 12 +- ...del_terraform_cloud_write_role_request.go} | 12 +- ...odel_token_create_against_role_request.go} | 12 +- ...o => model_token_create_orphan_request.go} | 12 +- ...quest.go => model_token_create_request.go} | 12 +- ...> model_token_look_up_accessor_request.go} | 12 +- ...uest.go => model_token_look_up_request.go} | 12 +- ...o => model_token_look_up_self2_request.go} | 12 +- ...st.go => model_totp_create_key_request.go} | 12 +- ...go => model_totp_validate_code_request.go} | 12 +- ... model_transit_configure_cache_request.go} | 12 +- ...=> model_transit_configure_key_request.go} | 12 +- ...> model_transit_configure_keys_request.go} | 12 +- ...go => model_transit_create_key_request.go} | 20 +- schema/model_transit_decrypt_request.go | 4 + schema/model_transit_encrypt_request.go | 4 + schema/model_transit_generate_hmac_request.go | 16 +- ...it_generate_hmac_with_algorithm_request.go | 16 +- ...sit_generate_random_with_bytes_request.go} | 12 +- ...e_random_with_source_and_bytes_request.go} | 12 +- ...it_generate_random_with_source_request.go} | 12 +- ...transit_restore_and_rename_key_request.go} | 16 +- schema/model_transit_restore_key_request.go | 4 + schema/model_transit_rewrap_request.go | 4 + schema/model_transit_rotate_key_request.go | 37 + schema/model_transit_sign_request.go | 4 + ...del_transit_sign_with_algorithm_request.go | 4 + schema/model_transit_verify_request.go | 4 + ...l_transit_verify_with_algorithm_request.go | 4 + ... => model_ui_headers_configure_request.go} | 12 +- schema/model_ui_headers_list_response.go | 33 + ..._ui_headers_read_configuration_response.go | 37 + schema/model_unseal_response.go | 77 + ...rap_request.go => model_unwrap_request.go} | 12 +- ... model_userpass_reset_password_request.go} | 12 +- ...model_userpass_update_policies_request.go} | 12 +- schema/model_version_history_response.go | 35 + schema/model_wrapping_write_lookup_request.go | 32 - schema/model_write_raw_path_request.go | 41 - schema/model_write_raw_request.go | 44 - 950 files changed, 66891 insertions(+), 31430 deletions(-) delete mode 100644 docs/ActiveDirectoryCheckInLibraryRequest.md delete mode 100644 docs/ActiveDirectoryCheckInManageLibraryRequest.md delete mode 100644 docs/ActiveDirectoryCheckOutLibraryRequest.md delete mode 100644 docs/ActiveDirectoryWriteConfigRequest.md delete mode 100644 docs/ActiveDirectoryWriteLibraryRequest.md delete mode 100644 docs/ActiveDirectoryWriteRoleRequest.md rename docs/{AliCloudWriteConfigRequest.md => AliCloudConfigureRequest.md} (64%) rename docs/{AliasWriteRequest.md => AliasCreateRequest.md} (68%) rename docs/{AliasWriteByIDRequest.md => AliasUpdateByIdRequest.md} (67%) rename docs/{AppRoleWriteSecretIDAccessorLookupRequest.md => AppRoleDestroySecretIdByAccessorRequest.md} (56%) rename docs/{AppRoleWriteSecretIDLookupRequest.md => AppRoleDestroySecretIdRequest.md} (59%) create mode 100644 docs/AppRoleListSecretIdsResponse.md create mode 100644 docs/AppRoleLoginResponse.md rename docs/{AppRoleWriteSecretIDAccessorDestroyRequest.md => AppRoleLookUpSecretIdByAccessorRequest.md} (56%) rename docs/{AppRoleWriteSecretIDAccessorLookupResponse.md => AppRoleLookUpSecretIdByAccessorResponse.md} (61%) rename docs/{AppRoleWriteSecretIDDestroyRequest.md => AppRoleLookUpSecretIdRequest.md} (58%) rename docs/{AppRoleWriteSecretIDLookupResponse.md => AppRoleLookUpSecretIdResponse.md} (64%) rename docs/{CalculateAuditHashRequest.md => AuditingCalculateHashRequest.md} (60%) create mode 100644 docs/AuditingCalculateHashResponse.md rename docs/{WriteAuditDeviceRequest.md => AuditingEnableDeviceRequest.md} (64%) rename docs/{WriteConfigAuditingRequestHeaderRequest.md => AuditingEnableRequestHeaderRequest.md} (55%) create mode 100644 docs/AuditingListRequestHeadersResponse.md rename docs/{WriteAuthMethodRequest.md => AuthEnableMethodRequest.md} (68%) create mode 100644 docs/AuthReadConfigurationResponse.md create mode 100644 docs/AuthReadTuningInformationResponse.md rename docs/{WriteAuthMethodTuneRequest.md => AuthTuneConfigurationParametersRequest.md} (64%) rename docs/{AWSConfigWriteCertificateRequest.md => AwsConfigureCertificateRequest.md} (66%) rename docs/{AWSConfigWriteClientRequest.md => AwsConfigureClientRequest.md} (67%) rename docs/{AWSConfigWriteIdentityAccessListRequest.md => AwsConfigureIdentityAccessListTidyOperationRequest.md} (58%) rename docs/{AWSConfigWriteIdentityRequest.md => AwsConfigureIdentityIntegrationRequest.md} (69%) rename docs/{AWSConfigWriteIdentityWhiteListRequest.md => AwsConfigureIdentityWhitelistTidyOperationRequest.md} (59%) rename docs/{AWSConfigWriteLeaseRequest.md => AwsConfigureLeaseRequest.md} (63%) rename docs/{AWSConfigWriteRoleTagDenyListRequest.md => AwsConfigureRoleTagBlacklistTidyOperationRequest.md} (59%) rename docs/{AWSConfigWriteRoleTagBlackListRequest.md => AwsConfigureRoleTagDenyListTidyOperationRequest.md} (59%) rename docs/{AWSConfigWriteRootIAMCredentialsRequest.md => AwsConfigureRootIamCredentialsRequest.md} (62%) rename docs/{AWSWriteCredentialsRequest.md => AwsGenerateCredentials2Request.md} (54%) rename docs/{AWSWriteSecurityTokenServiceRequest.md => AwsGenerateStsCredentials2Request.md} (61%) rename docs/{AWSWriteIdentityWhiteListTidySettingsRequest.md => AwsTidyIdentityAccessListRequest.md} (57%) rename docs/{AWSWriteIdentityAccessListTidySettingsRequest.md => AwsTidyIdentityWhitelistRequest.md} (57%) rename docs/{AWSWriteRoleTagDenyListTidySettingsRequest.md => AwsTidyRoleTagBlacklistRequest.md} (58%) rename docs/{AWSWriteRoleTagBlackListTidySettingsRequest.md => AwsTidyRoleTagDenyListRequest.md} (58%) rename docs/{AWSWriteAuthRoleTagRequest.md => AwsWriteRoleTagRequest.md} (70%) rename docs/{AWSConfigWriteSecurityTokenServiceAccountRequest.md => AwsWriteStsRoleRequest.md} (55%) rename docs/{AzureWriteAuthConfigRequest.md => AzureConfigureAuthRequest.md} (59%) rename docs/{AzureWriteConfigRequest.md => AzureConfigureRequest.md} (69%) rename docs/{CentrifyWriteConfigRequest.md => CentrifyConfigureRequest.md} (67%) rename docs/{CertificatesWriteConfigRequest.md => CertConfigureRequest.md} (67%) rename docs/{CertificatesLoginRequest.md => CertLoginRequest.md} (63%) rename docs/{CertificatesWriteRequest.md => CertWriteCertificateRequest.md} (70%) rename docs/{CertificatesWriteCRLRequest.md => CertWriteCrlRequest.md} (66%) rename docs/{CloudFoundryWriteConfigRequest.md => CloudFoundryConfigureRequest.md} (67%) create mode 100644 docs/CollectHostInformationResponse.md rename docs/{ConsulWriteAccessConfigRequest.md => ConsulConfigureAccessRequest.md} (65%) rename docs/{WriteConfigCORSRequest.md => CorsConfigureRequest.md} (67%) create mode 100644 docs/CorsReadConfigurationResponse.md rename docs/{DatabaseWriteConfigRequest.md => DatabaseConfigureConnectionRequest.md} (65%) rename docs/{WriteRotateConfigRequest.md => EncryptionKeyConfigureRotationRequest.md} (61%) create mode 100644 docs/EncryptionKeyReadRotationConfigurationResponse.md rename docs/{EntityWriteAliasRequest.md => EntityCreateAliasRequest.md} (66%) rename docs/{EntityWriteRequest.md => EntityCreateRequest.md} (69%) rename docs/{EntityWriteAliasByIDRequest.md => EntityUpdateAliasByIdRequest.md} (64%) rename docs/{EntityWriteByIDRequest.md => EntityUpdateByIdRequest.md} (67%) rename docs/{EntityWriteByNameRequest.md => EntityUpdateByNameRequest.md} (66%) rename docs/{ToolsHashRequest.md => GenerateHashRequest.md} (69%) create mode 100644 docs/GenerateHashResponse.md rename docs/{ToolsHashWithRequest.md => GenerateHashWithAlgorithmRequest.md} (63%) create mode 100644 docs/GenerateHashWithAlgorithmResponse.md rename docs/{ToolsGenerateRandomRequest.md => GenerateRandomRequest.md} (66%) create mode 100644 docs/GenerateRandomResponse.md rename docs/{SysWriteToolsRandomUrlbytesRequest.md => GenerateRandomWithBytesRequest.md} (65%) create mode 100644 docs/GenerateRandomWithBytesResponse.md rename docs/{TransitGenerateRandomSourceBytesRequest.md => GenerateRandomWithSourceAndBytesRequest.md} (62%) create mode 100644 docs/GenerateRandomWithSourceAndBytesResponse.md rename docs/{ToolsGenerateRandomSourceRequest.md => GenerateRandomWithSourceRequest.md} (63%) create mode 100644 docs/GenerateRandomWithSourceResponse.md rename docs/{GitHubWriteConfigRequest.md => GithubConfigureRequest.md} (70%) rename docs/{GitHubWriteMapTeamRequest.md => GithubWriteTeamMappingRequest.md} (60%) rename docs/{GitHubWriteMapUserRequest.md => GithubWriteUserMappingRequest.md} (60%) rename docs/{GoogleCloudWriteAuthConfigRequest.md => GoogleCloudConfigureAuthRequest.md} (68%) rename docs/{GoogleCloudWriteConfigRequest.md => GoogleCloudConfigureRequest.md} (64%) rename docs/{GoogleCloudWriteRoleLabelsRequest.md => GoogleCloudEditLabelsForRoleRequest.md} (58%) rename docs/{GoogleCloudWriteRoleServiceAccountsRequest.md => GoogleCloudEditServiceAccountsForRoleRequest.md} (55%) rename docs/{GoogleCloudWriteKeyRequest.md => GoogleCloudGenerateRolesetKeyWithParameters2Request.md} (56%) rename docs/{GoogleCloudWriteRolesetKeyRequest.md => GoogleCloudGenerateRolesetKeyWithParametersRequest.md} (57%) rename docs/{GoogleCloudWriteStaticAccountKeyRequest.md => GoogleCloudGenerateStaticAccountKeyWithParametersRequest.md} (55%) rename docs/{GoogleCloudKMSWriteKeyConfigRequest.md => GoogleCloudKmsConfigureKeyRequest.md} (66%) rename docs/{GoogleCloudKMSWriteConfigRequest.md => GoogleCloudKmsConfigureRequest.md} (63%) create mode 100644 docs/GoogleCloudWriteImpersonatedAccountRequest.md rename docs/{GroupWriteAliasRequest.md => GroupCreateAliasRequest.md} (65%) rename docs/{GroupWriteRequest.md => GroupCreateRequest.md} (69%) rename docs/{GroupWriteAliasByIDRequest.md => GroupUpdateAliasByIdRequest.md} (64%) rename docs/{GroupWriteByIDRequest.md => GroupUpdateByIdRequest.md} (67%) rename docs/{GroupWriteByNameRequest.md => GroupUpdateByNameRequest.md} (67%) create mode 100644 docs/HaStatusResponse.md rename docs/{WriteInitRequest.md => InitializeRequest.md} (73%) rename docs/{WriteInternalCountersConfigRequest.md => InternalClientActivityConfigureRequest.md} (63%) create mode 100644 docs/InternalCountEntitiesResponse.md create mode 100644 docs/InternalCountTokensResponse.md rename docs/{WriteInternalSpecsOpenAPIRequest.md => InternalGenerateOpenApiDocument2Request.md} (56%) create mode 100644 docs/InternalUiListEnabledFeatureFlagsResponse.md create mode 100644 docs/InternalUiListEnabledVisibleMountsResponse.md create mode 100644 docs/InternalUiListNamespacesResponse.md create mode 100644 docs/InternalUiReadMountInformationResponse.md create mode 100644 docs/InternalUiReadResultantAclResponse.md delete mode 100644 docs/JWTWriteOIDCCallbackRequest.md rename docs/{JWTWriteConfigRequest.md => JwtConfigureRequest.md} (71%) rename docs/{OIDCWriteCallbackRequest.md => JwtOidcCallbackWithParametersRequest.md} (59%) rename docs/{JWTWriteOIDCAuthURLRequest.md => JwtOidcRequestAuthorizationUrlRequest.md} (60%) rename docs/{KerberosWriteLDAPConfigRequest.md => KerberosConfigureLdapRequest.md} (64%) rename docs/{KerberosWriteConfigRequest.md => KerberosConfigureRequest.md} (65%) rename docs/{KubernetesWriteAuthConfigRequest.md => KubernetesConfigureAuthRequest.md} (67%) rename docs/{KubernetesWriteConfigRequest.md => KubernetesConfigureRequest.md} (68%) rename docs/{KubernetesWriteCredentialsRequest.md => KubernetesGenerateCredentialsRequest.md} (51%) rename docs/{KVv2WriteConfigRequest.md => KvV2ConfigureRequest.md} (69%) create mode 100644 docs/KvV2PatchResponse.md create mode 100644 docs/KvV2ReadConfigurationResponse.md create mode 100644 docs/KvV2ReadMetadataResponse.md create mode 100644 docs/KvV2ReadResponse.md create mode 100644 docs/KvV2ReadSubkeysResponse.md create mode 100644 docs/KvV2WriteResponse.md delete mode 100644 docs/LDAPCheckInManageLibraryRequest.md delete mode 100644 docs/LDAPWriteConfigRequest.md delete mode 100644 docs/LDAPWriteLibraryRequest.md rename docs/{LDAPWriteAuthConfigRequest.md => LdapConfigureAuthRequest.md} (65%) rename docs/{OpenLDAPWriteConfigRequest.md => LdapConfigureRequest.md} (64%) rename docs/{LDAPCheckInLibraryRequest.md => LdapLibraryCheckInRequest.md} (66%) rename docs/{LDAPCheckOutLibraryRequest.md => LdapLibraryCheckOutRequest.md} (63%) rename docs/{OpenLDAPWriteLibraryRequest.md => LdapLibraryConfigureRequest.md} (69%) rename docs/{OpenLDAPCheckInLibraryRequest.md => LdapLibraryForceCheckInRequest.md} (62%) rename docs/{LDAPWriteRoleRequest.md => LdapWriteDynamicRoleRequest.md} (66%) create mode 100644 docs/LeaderStatusResponse.md create mode 100644 docs/LeasesCountResponse.md create mode 100644 docs/LeasesListResponse.md create mode 100644 docs/LeasesLookUpResponse.md create mode 100644 docs/LeasesLookUpWithPrefixResponse.md rename docs/{WriteLeasesLookupRequest.md => LeasesReadLeaseRequest.md} (64%) create mode 100644 docs/LeasesReadLeaseResponse.md rename docs/{RenewRequest.md => LeasesRenewLease2Request.md} (66%) rename docs/{WriteLeasesRenewRequest.md => LeasesRenewLeaseRequest.md} (67%) rename docs/{RenewForRequest.md => LeasesRenewLeaseWithId2Request.md} (62%) rename docs/{WriteLeasesRenew2Request.md => LeasesRenewLeaseWithIdRequest.md} (63%) rename docs/{RevokeRequest.md => LeasesRevokeLease2Request.md} (65%) rename docs/{WriteLeasesRevokeRequest.md => LeasesRevokeLeaseRequest.md} (66%) rename docs/{RevokeLeaseRequest.md => LeasesRevokeLeaseWithId2Request.md} (62%) rename docs/{WriteLeasesRevoke2Request.md => LeasesRevokeLeaseWithIdRequest.md} (62%) rename docs/{WriteLeasesRevokePrefixRequest.md => LeasesRevokeLeaseWithPrefix2Request.md} (58%) rename docs/{RevokePrefixRequest.md => LeasesRevokeLeaseWithPrefixRequest.md} (59%) rename docs/{WriteLoggerRequest.md => LoggersUpdateVerbosityLevelForRequest.md} (60%) rename docs/{WriteLoggersRequest.md => LoggersUpdateVerbosityLevelRequest.md} (61%) rename docs/{MFAMethodAdminDestroyTOTPRequest.md => MfaAdminDestroyTotpSecretRequest.md} (62%) rename docs/{MFAMethodAdminGenerateTOTPRequest.md => MfaAdminGenerateTotpSecretRequest.md} (62%) rename docs/{MFAMethodWriteDuoRequest.md => MfaConfigureDuoMethodRequest.md} (60%) rename docs/{MFAMethodWriteOktaRequest.md => MfaConfigureOktaMethodRequest.md} (59%) rename docs/{MFAMethodWritePingIDRequest.md => MfaConfigurePingIdMethodRequest.md} (57%) rename docs/{MFAMethodWriteTOTPRequest.md => MfaConfigureTotpMethodRequest.md} (60%) rename docs/{MFAMethodGenerateTOTPRequest.md => MfaGenerateTotpSecretRequest.md} (61%) rename docs/{MongoDBAtlasWriteConfigRequest.md => MongoDbAtlasConfigureRequest.md} (61%) rename docs/{WriteMountRequest.md => MountsEnableSecretsEngineRequest.md} (64%) create mode 100644 docs/MountsReadConfigurationResponse.md create mode 100644 docs/MountsReadTuningInformationResponse.md rename docs/{WriteMountsConfigRequest.md => MountsTuneConfigurationParametersRequest.md} (63%) rename docs/{NomadWriteAccessConfigRequest.md => NomadConfigureAccessRequest.md} (65%) rename docs/{NomadWriteLeaseConfigRequest.md => NomadConfigureLeaseRequest.md} (63%) delete mode 100644 docs/OIDCLoginRequest.md delete mode 100644 docs/OIDCWriteAuthConfigRequest.md delete mode 100644 docs/OIDCWriteAuthRoleRequest.md delete mode 100644 docs/OIDCWriteAuthURLRequest.md rename docs/{OCIWriteConfigRequest.md => OciConfigureRequest.md} (65%) rename docs/{OCILoginWithRoleRequest.md => OciLoginRequest.md} (64%) rename docs/{OIDCWriteConfigRequest.md => OidcConfigureRequest.md} (66%) rename docs/{OIDCWriteProviderAuthorizeRequest.md => OidcProviderAuthorize2Request.md} (65%) rename docs/{OIDCWriteProviderTokenRequest.md => OidcProviderTokenRequest.md} (64%) rename docs/{OktaWriteConfigRequest.md => OktaConfigureRequest.md} (70%) delete mode 100644 docs/OpenLDAPCheckInManageLibraryRequest.md delete mode 100644 docs/OpenLDAPCheckOutLibraryRequest.md delete mode 100644 docs/OpenLDAPWriteRoleRequest.md delete mode 100644 docs/OpenLDAPWriteStaticRoleRequest.md delete mode 100644 docs/PKIWriteAutoTidyConfigRequest.md delete mode 100644 docs/PKIWriteClusterConfigRequest.md rename docs/{PersonaWriteRequest.md => PersonaCreateRequest.md} (68%) rename docs/{PersonaIDWriteByIDRequest.md => PersonaUpdateByIdRequest.md} (66%) create mode 100644 docs/PkiConfigureAutoTidyRequest.md create mode 100644 docs/PkiConfigureAutoTidyResponse.md rename docs/{PKIWriteCAConfigRequest.md => PkiConfigureCaRequest.md} (65%) create mode 100644 docs/PkiConfigureCaResponse.md create mode 100644 docs/PkiConfigureClusterRequest.md create mode 100644 docs/PkiConfigureClusterResponse.md rename docs/{PKIWriteCRLConfigRequest.md => PkiConfigureCrlRequest.md} (50%) create mode 100644 docs/PkiConfigureCrlResponse.md rename docs/{PKIWriteIssuersConfigRequest.md => PkiConfigureIssuersRequest.md} (65%) create mode 100644 docs/PkiConfigureIssuersResponse.md rename docs/{PKIWriteKeysConfigRequest.md => PkiConfigureKeysRequest.md} (63%) create mode 100644 docs/PkiConfigureKeysResponse.md create mode 100644 docs/PkiConfigureUrlsRequest.md rename docs/{PKIWriteURLConfigRequest.md => PkiConfigureUrlsResponse.md} (72%) rename docs/{PKIWriteIntermediateCrossSignRequest.md => PkiCrossSignIntermediateRequest.md} (67%) create mode 100644 docs/PkiCrossSignIntermediateResponse.md create mode 100644 docs/PkiGenerateExportedKeyRequest.md create mode 100644 docs/PkiGenerateExportedKeyResponse.md rename docs/{PKIWriteIntermediateGenerateRequest.md => PkiGenerateIntermediateRequest.md} (68%) create mode 100644 docs/PkiGenerateIntermediateResponse.md rename docs/{PKIWriteInternalExportedRequest.md => PkiGenerateInternalKeyRequest.md} (68%) create mode 100644 docs/PkiGenerateInternalKeyResponse.md rename docs/{PKIWriteKMSRequest.md => PkiGenerateKmsKeyRequest.md} (69%) create mode 100644 docs/PkiGenerateKmsKeyResponse.md create mode 100644 docs/PkiGenerateRootResponse.md rename docs/{PKIImportKeysRequest.md => PkiImportKeyRequest.md} (66%) create mode 100644 docs/PkiImportKeyResponse.md rename docs/{PKISignRoleRequest.md => PkiIssueWithRoleRequest.md} (67%) create mode 100644 docs/PkiIssueWithRoleResponse.md rename docs/{PKIWriteIssueRoleRequest.md => PkiIssuerIssueWithRoleRequest.md} (66%) create mode 100644 docs/PkiIssuerIssueWithRoleResponse.md create mode 100644 docs/PkiIssuerReadCrlDeltaDerResponse.md create mode 100644 docs/PkiIssuerReadCrlDeltaPemResponse.md create mode 100644 docs/PkiIssuerReadCrlDeltaResponse.md create mode 100644 docs/PkiIssuerReadCrlDerResponse.md create mode 100644 docs/PkiIssuerReadCrlPemResponse.md create mode 100644 docs/PkiIssuerReadCrlResponse.md create mode 100644 docs/PkiIssuerResignCrlsResponse.md create mode 100644 docs/PkiIssuerSignIntermediateResponse.md create mode 100644 docs/PkiIssuerSignRevocationListResponse.md create mode 100644 docs/PkiIssuerSignSelfIssuedResponse.md create mode 100644 docs/PkiIssuerSignVerbatimResponse.md rename docs/{PKIIssuerSignVerbatimRoleRequest.md => PkiIssuerSignVerbatimWithRoleRequest.md} (65%) create mode 100644 docs/PkiIssuerSignVerbatimWithRoleResponse.md rename docs/{PKIIssuerSignRoleRequest.md => PkiIssuerSignWithRoleRequest.md} (65%) create mode 100644 docs/PkiIssuerSignWithRoleResponse.md create mode 100644 docs/PkiIssuersGenerateIntermediateResponse.md create mode 100644 docs/PkiIssuersGenerateRootResponse.md rename docs/{PKIWriteCertsRequest.md => PkiIssuersImportBundleRequest.md} (62%) create mode 100644 docs/PkiIssuersImportBundleResponse.md rename docs/{PKIBundleWriteRequest.md => PkiIssuersImportCertRequest.md} (63%) create mode 100644 docs/PkiIssuersImportCertResponse.md rename docs/{PKIRotateRootRequest.md => PkiIssuersRotateRootRequest.md} (70%) create mode 100644 docs/PkiIssuersRotateRootResponse.md create mode 100644 docs/PkiListCertsResponse.md create mode 100644 docs/PkiListIssuersResponse.md create mode 100644 docs/PkiListKeysResponse.md create mode 100644 docs/PkiListRevokedCertsResponse.md create mode 100644 docs/PkiListRolesResponse.md create mode 100644 docs/PkiPatchIssuerResponse.md create mode 100644 docs/PkiPatchRoleResponse.md create mode 100644 docs/PkiReadAutoTidyConfigurationResponse.md create mode 100644 docs/PkiReadCaChainPemResponse.md create mode 100644 docs/PkiReadCaDerResponse.md create mode 100644 docs/PkiReadCaPemResponse.md create mode 100644 docs/PkiReadCertCaChainResponse.md create mode 100644 docs/PkiReadCertCrlResponse.md create mode 100644 docs/PkiReadCertDeltaCrlResponse.md create mode 100644 docs/PkiReadCertRawDerResponse.md create mode 100644 docs/PkiReadCertRawPemResponse.md create mode 100644 docs/PkiReadCertResponse.md create mode 100644 docs/PkiReadClusterConfigurationResponse.md create mode 100644 docs/PkiReadCrlConfigurationResponse.md create mode 100644 docs/PkiReadCrlDeltaPemResponse.md create mode 100644 docs/PkiReadCrlDeltaResponse.md create mode 100644 docs/PkiReadCrlDerResponse.md create mode 100644 docs/PkiReadCrlPemResponse.md create mode 100644 docs/PkiReadIssuerDerResponse.md create mode 100644 docs/PkiReadIssuerJsonResponse.md create mode 100644 docs/PkiReadIssuerPemResponse.md create mode 100644 docs/PkiReadIssuerResponse.md create mode 100644 docs/PkiReadIssuersConfigurationResponse.md create mode 100644 docs/PkiReadKeyResponse.md create mode 100644 docs/PkiReadKeysConfigurationResponse.md create mode 100644 docs/PkiReadRoleResponse.md create mode 100644 docs/PkiReadUrlsConfigurationResponse.md create mode 100644 docs/PkiReplaceRootResponse.md create mode 100644 docs/PkiRevokeIssuerResponse.md create mode 100644 docs/PkiRevokeResponse.md create mode 100644 docs/PkiRevokeWithKeyResponse.md create mode 100644 docs/PkiRootSignIntermediateResponse.md create mode 100644 docs/PkiRootSignSelfIssuedResponse.md create mode 100644 docs/PkiRotateCrlResponse.md create mode 100644 docs/PkiRotateDeltaCrlResponse.md rename docs/{PKIWriteIntermediateSetSignedRequest.md => PkiSetSignedIntermediateRequest.md} (61%) create mode 100644 docs/PkiSetSignedIntermediateResponse.md create mode 100644 docs/PkiSignVerbatimResponse.md rename docs/{PKISignVerbatimRoleRequest.md => PkiSignVerbatimWithRoleRequest.md} (67%) create mode 100644 docs/PkiSignVerbatimWithRoleResponse.md rename docs/{PKIIssuerIssueRoleRequest.md => PkiSignWithRoleRequest.md} (60%) create mode 100644 docs/PkiSignWithRoleResponse.md create mode 100644 docs/PkiTidyCancelResponse.md create mode 100644 docs/PkiTidyStatusResponse.md rename docs/{PkiWriteIssuerRefDerPemRequest.md => PkiWriteIssuerRequest.md} (68%) create mode 100644 docs/PkiWriteIssuerResponse.md delete mode 100644 docs/PkiWriteJsonRequest.md create mode 100644 docs/PkiWriteKeyResponse.md create mode 100644 docs/PkiWriteRoleResponse.md create mode 100644 docs/PluginsCatalogListPluginsResponse.md create mode 100644 docs/PluginsCatalogListPluginsWithTypeResponse.md create mode 100644 docs/PluginsCatalogReadPluginConfigurationResponse.md create mode 100644 docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md rename docs/{SysWritePluginsCatalogNameRequest.md => PluginsCatalogRegisterPluginRequest.md} (63%) rename docs/{WritePluginsCatalogByTypeByNameRequest.md => PluginsCatalogRegisterPluginWithTypeRequest.md} (59%) rename docs/{WritePluginsReloadBackendRequest.md => PluginsReloadBackendsRequest.md} (61%) create mode 100644 docs/PluginsReloadBackendsResponse.md create mode 100644 docs/PoliciesGeneratePasswordFromPasswordPolicyResponse.md create mode 100644 docs/PoliciesListAclPoliciesResponse.md create mode 100644 docs/PoliciesListPasswordPoliciesResponse.md create mode 100644 docs/PoliciesListResponse.md create mode 100644 docs/PoliciesReadAclPolicy2Response.md create mode 100644 docs/PoliciesReadAclPolicyResponse.md create mode 100644 docs/PoliciesReadPasswordPolicyResponse.md rename docs/{WritePolicyRequest.md => PoliciesWriteAclPolicy2Request.md} (61%) rename docs/{WritePoliciesACLRequest.md => PoliciesWriteAclPolicyRequest.md} (61%) rename docs/{WritePoliciesPasswordRequest.md => PoliciesWritePasswordPolicyRequest.md} (58%) rename docs/{WriteCapabilitiesAccessorRequest.md => QueryTokenAccessorCapabilitiesRequest.md} (59%) rename docs/{WriteCapabilitiesSelfRequest.md => QueryTokenCapabilitiesRequest.md} (62%) rename docs/{WriteCapabilitiesRequest.md => QueryTokenSelfCapabilitiesRequest.md} (60%) rename docs/{RabbitMQWriteConnectionConfigRequest.md => RabbitMqConfigureConnectionRequest.md} (63%) rename docs/{RabbitMQWriteLeaseConfigRequest.md => RabbitMqConfigureLeaseRequest.md} (62%) rename docs/{RadiusWriteConfigRequest.md => RadiusConfigureRequest.md} (69%) rename docs/{WriteQuotasConfigRequest.md => RateLimitQuotasConfigureRequest.md} (66%) rename docs/{AppRoleListSecretIDResponse.md => RateLimitQuotasListResponse.md} (61%) create mode 100644 docs/RateLimitQuotasReadConfigurationResponse.md create mode 100644 docs/RateLimitQuotasReadResponse.md rename docs/{WriteQuotasRateLimitRequest.md => RateLimitQuotasWriteRequest.md} (68%) create mode 100644 docs/ReadWrappingProperties2Response.md rename docs/{WrappingWriteLookupRequest.md => ReadWrappingPropertiesRequest.md} (60%) create mode 100644 docs/ReadWrappingPropertiesResponse.md rename docs/{WriteRekeyInitRequest.md => RekeyAttemptInitializeRequest.md} (67%) create mode 100644 docs/RekeyAttemptInitializeResponse.md create mode 100644 docs/RekeyAttemptReadProgressResponse.md rename docs/{WriteRekeyUpdateRequest.md => RekeyAttemptUpdateRequest.md} (63%) create mode 100644 docs/RekeyAttemptUpdateResponse.md create mode 100644 docs/RekeyReadBackupKeyResponse.md create mode 100644 docs/RekeyReadBackupRecoveryKeyResponse.md create mode 100644 docs/RekeyVerificationCancelResponse.md create mode 100644 docs/RekeyVerificationReadProgressResponse.md rename docs/{WriteRekeyVerifyRequest.md => RekeyVerificationUpdateRequest.md} (62%) create mode 100644 docs/RekeyVerificationUpdateResponse.md create mode 100644 docs/RemountResponse.md create mode 100644 docs/RemountStatusResponse.md rename docs/{WrappingRewrapRequest.md => RewrapRequest.md} (64%) rename docs/{WriteGenerateRootRequest.md => RootTokenGenerationInitialize2Request.md} (57%) create mode 100644 docs/RootTokenGenerationInitialize2Response.md rename docs/{WriteGenerateRootAttemptRequest.md => RootTokenGenerationInitializeRequest.md} (58%) create mode 100644 docs/RootTokenGenerationInitializeResponse.md create mode 100644 docs/RootTokenGenerationReadProgress2Response.md create mode 100644 docs/RootTokenGenerationReadProgressResponse.md rename docs/{WriteGenerateRootUpdateRequest.md => RootTokenGenerationUpdateRequest.md} (60%) create mode 100644 docs/RootTokenGenerationUpdateResponse.md delete mode 100644 docs/SSHWriteKeysRequest.md create mode 100644 docs/SealStatusResponse.md rename docs/{SSHWriteCAConfigRequest.md => SshConfigureCaRequest.md} (69%) rename docs/{SSHWriteZeroAddressConfigRequest.md => SshConfigureZeroAddressRequest.md} (62%) rename docs/{SSHWriteCredentialsRequest.md => SshGenerateCredentialsRequest.md} (61%) rename docs/{SSHWriteIssueRequest.md => SshIssueCertificateRequest.md} (67%) rename docs/{SshLookupRequest.md => SshListRolesByIpRequest.md} (63%) rename docs/{SshSignRequest.md => SshSignCertificateRequest.md} (67%) rename docs/{SshVerifyRequest.md => SshVerifyOtpRequest.md} (66%) rename docs/{TerraformWriteConfigRequest.md => TerraformCloudConfigureRequest.md} (64%) rename docs/{TerraformWriteRoleRequest.md => TerraformCloudWriteRoleRequest.md} (64%) rename docs/{TokenWriteCreateWithRoleRequest.md => TokenCreateAgainstRoleRequest.md} (63%) rename docs/{TokenWriteCreateOrphanRequest.md => TokenCreateOrphanRequest.md} (64%) rename docs/{TokenWriteCreateRequest.md => TokenCreateRequest.md} (66%) rename docs/{TokenWriteLookupAccessorRequest.md => TokenLookUpAccessorRequest.md} (60%) rename docs/{TokenWriteLookupRequest.md => TokenLookUpRequest.md} (64%) rename docs/{TokenWriteLookupSelfRequest.md => TokenLookUpSelf2Request.md} (62%) rename docs/{TOTPWriteKeyRequest.md => TotpCreateKeyRequest.md} (70%) rename docs/{TOTPWriteCodeRequest.md => TotpValidateCodeRequest.md} (63%) rename docs/{TransitWriteCacheConfigRequest.md => TransitConfigureCacheRequest.md} (61%) rename docs/{TransitWriteKeyConfigRequest.md => TransitConfigureKeyRequest.md} (68%) rename docs/{TransitWriteConfigKeysRequest.md => TransitConfigureKeysRequest.md} (62%) rename docs/{TransitWriteKeyRequest.md => TransitCreateKeyRequest.md} (61%) rename docs/{TransitWriteRandomUrlbytesRequest.md => TransitGenerateRandomWithBytesRequest.md} (62%) rename docs/{ToolsGenerateRandomSourceBytesRequest.md => TransitGenerateRandomWithSourceAndBytesRequest.md} (57%) rename docs/{TransitGenerateRandomSourceRequest.md => TransitGenerateRandomWithSourceRequest.md} (60%) rename docs/{TransitRestoreRequest.md => TransitRestoreAndRenameKeyRequest.md} (53%) create mode 100644 docs/TransitRotateKeyRequest.md rename docs/{WriteConfigUIHeaderRequest.md => UiHeadersConfigureRequest.md} (63%) create mode 100644 docs/UiHeadersListResponse.md create mode 100644 docs/UiHeadersReadConfigurationResponse.md create mode 100644 docs/UnsealResponse.md rename docs/{WrappingUnwrapRequest.md => UnwrapRequest.md} (64%) rename docs/{UserpassWriteUserPasswordRequest.md => UserpassResetPasswordRequest.md} (59%) rename docs/{UserpassWriteUserPoliciesRequest.md => UserpassUpdatePoliciesRequest.md} (62%) create mode 100644 docs/VersionHistoryResponse.md delete mode 100644 docs/WriteRawPathRequest.md delete mode 100644 docs/WriteRawRequest.md delete mode 100644 schema/model_active_directory_check_in_library_request.go delete mode 100644 schema/model_active_directory_check_in_manage_library_request.go delete mode 100644 schema/model_active_directory_check_out_library_request.go delete mode 100644 schema/model_active_directory_write_config_request.go delete mode 100644 schema/model_active_directory_write_library_request.go delete mode 100644 schema/model_active_directory_write_role_request.go rename schema/{model_ali_cloud_write_config_request.go => model_ali_cloud_configure_request.go} (64%) rename schema/{model_alias_write_request.go => model_alias_create_request.go} (77%) rename schema/{model_alias_write_by_id_request.go => model_alias_update_by_id_request.go} (74%) rename schema/{model_app_role_write_secret_id_accessor_lookup_request.go => model_app_role_destroy_secret_id_by_accessor_request.go} (53%) rename schema/{model_app_role_write_secret_id_lookup_request.go => model_app_role_destroy_secret_id_request.go} (55%) create mode 100644 schema/model_app_role_list_secret_ids_response.go rename schema/{model_oidc_login_request.go => model_app_role_login_response.go} (55%) rename schema/{model_app_role_write_secret_id_accessor_destroy_request.go => model_app_role_look_up_secret_id_by_accessor_request.go} (53%) rename schema/{model_app_role_write_secret_id_accessor_lookup_response.go => model_app_role_look_up_secret_id_by_accessor_response.go} (78%) rename schema/{model_app_role_write_secret_id_destroy_request.go => model_app_role_look_up_secret_id_request.go} (55%) rename schema/{model_app_role_write_secret_id_lookup_response.go => model_app_role_look_up_secret_id_response.go} (80%) rename schema/{model_app_role_read_secret_idttl_response.go => model_app_role_read_secret_id_ttl_response.go} (61%) rename schema/{model_app_role_write_secret_idttl_request.go => model_app_role_write_secret_id_ttl_request.go} (61%) rename schema/{model_calculate_audit_hash_request.go => model_auditing_calculate_hash_request.go} (56%) create mode 100644 schema/model_auditing_calculate_hash_response.go rename schema/{model_write_audit_device_request.go => model_auditing_enable_device_request.go} (71%) rename schema/{model_write_config_auditing_request_header_request.go => model_auditing_enable_request_header_request.go} (50%) create mode 100644 schema/model_auditing_list_request_headers_response.go rename schema/{model_write_auth_method_request.go => model_auth_enable_method_request.go} (83%) create mode 100644 schema/model_auth_read_configuration_response.go create mode 100644 schema/model_auth_read_tuning_information_response.go rename schema/{model_write_auth_method_tune_request.go => model_auth_tune_configuration_parameters_request.go} (84%) rename schema/{model_aws_config_write_certificate_request.go => model_aws_configure_certificate_request.go} (71%) rename schema/{model_aws_config_write_client_request.go => model_aws_configure_client_request.go} (84%) rename schema/{model_aws_config_write_identity_access_list_request.go => model_aws_configure_identity_access_list_tidy_operation_request.go} (61%) rename schema/{model_aws_config_write_identity_request.go => model_aws_configure_identity_integration_request.go} (81%) rename schema/{model_aws_config_write_identity_white_list_request.go => model_aws_configure_identity_whitelist_tidy_operation_request.go} (61%) rename schema/{model_aws_config_write_lease_request.go => model_aws_configure_lease_request.go} (63%) rename schema/{model_aws_config_write_role_tag_deny_list_request.go => model_aws_configure_role_tag_blacklist_tidy_operation_request.go} (62%) rename schema/{model_aws_config_write_role_tag_black_list_request.go => model_aws_configure_role_tag_deny_list_tidy_operation_request.go} (62%) rename schema/{model_aws_config_write_root_iam_credentials_request.go => model_aws_configure_root_iam_credentials_request.go} (73%) rename schema/{model_aws_write_credentials_request.go => model_aws_generate_credentials2_request.go} (65%) rename schema/{model_aws_write_security_token_service_request.go => model_aws_generate_sts_credentials2_request.go} (65%) rename schema/{model_aws_write_identity_white_list_tidy_settings_request.go => model_aws_tidy_identity_access_list_request.go} (56%) rename schema/{model_aws_write_identity_access_list_tidy_settings_request.go => model_aws_tidy_identity_whitelist_request.go} (56%) rename schema/{model_aws_write_role_tag_deny_list_tidy_settings_request.go => model_aws_tidy_role_tag_blacklist_request.go} (57%) rename schema/{model_aws_write_role_tag_black_list_tidy_settings_request.go => model_aws_tidy_role_tag_deny_list_request.go} (56%) rename schema/{model_aws_write_auth_role_tag_request.go => model_aws_write_role_tag_request.go} (83%) rename schema/{model_aws_config_write_security_token_service_account_request.go => model_aws_write_sts_role_request.go} (53%) rename schema/{model_azure_write_auth_config_request.go => model_azure_configure_auth_request.go} (72%) rename schema/{model_azure_write_config_request.go => model_azure_configure_request.go} (84%) rename schema/{model_centrify_write_config_request.go => model_centrify_configure_request.go} (85%) rename schema/{model_certificates_write_config_request.go => model_cert_configure_request.go} (75%) rename schema/{model_certificates_login_request.go => model_cert_login_request.go} (61%) rename schema/{model_certificates_write_request.go => model_cert_write_certificate_request.go} (94%) rename schema/{model_certificates_write_crl_request.go => model_cert_write_crl_request.go} (69%) rename schema/{model_cloud_foundry_write_config_request.go => model_cloud_foundry_configure_request.go} (88%) create mode 100644 schema/model_collect_host_information_response.go rename schema/{model_consul_write_access_config_request.go => model_consul_configure_access_request.go} (76%) rename schema/{model_write_config_cors_request.go => model_cors_configure_request.go} (73%) create mode 100644 schema/model_cors_read_configuration_response.go rename schema/{model_database_write_config_request.go => model_database_configure_connection_request.go} (79%) rename schema/{model_write_rotate_config_request.go => model_encryption_key_configure_rotation_request.go} (65%) create mode 100644 schema/model_encryption_key_read_rotation_configuration_response.go rename schema/{model_entity_write_alias_request.go => model_entity_create_alias_request.go} (77%) rename schema/{model_entity_write_request.go => model_entity_create_request.go} (79%) rename schema/{model_entity_lookup_request.go => model_entity_look_up_request.go} (77%) rename schema/{model_entity_write_alias_by_id_request.go => model_entity_update_alias_by_id_request.go} (72%) rename schema/{model_entity_write_by_id_request.go => model_entity_update_by_id_request.go} (75%) rename schema/{model_entity_write_by_name_request.go => model_entity_update_by_name_request.go} (75%) rename schema/{model_tools_hash_request.go => model_generate_hash_request.go} (77%) create mode 100644 schema/model_generate_hash_response.go rename schema/{model_tools_hash_with_request.go => model_generate_hash_with_algorithm_request.go} (68%) create mode 100644 schema/model_generate_hash_with_algorithm_response.go rename schema/{model_tools_generate_random_request.go => model_generate_random_request.go} (73%) create mode 100644 schema/model_generate_random_response.go rename schema/{model_transit_write_random_urlbytes_request.go => model_generate_random_with_bytes_request.go} (68%) create mode 100644 schema/model_generate_random_with_bytes_response.go rename schema/{model_transit_generate_random_source_bytes_request.go => model_generate_random_with_source_and_bytes_request.go} (62%) create mode 100644 schema/model_generate_random_with_source_and_bytes_response.go rename schema/{model_tools_generate_random_source_request.go => model_generate_random_with_source_request.go} (67%) create mode 100644 schema/model_generate_random_with_source_response.go rename schema/{model_git_hub_write_config_request.go => model_github_configure_request.go} (89%) rename schema/{model_git_hub_login_request.go => model_github_login_request.go} (65%) rename schema/{model_git_hub_write_map_team_request.go => model_github_write_team_mapping_request.go} (57%) rename schema/{model_git_hub_write_map_user_request.go => model_github_write_user_mapping_request.go} (57%) rename schema/{model_google_cloud_write_auth_config_request.go => model_google_cloud_configure_auth_request.go} (85%) rename schema/{model_google_cloud_write_config_request.go => model_google_cloud_configure_request.go} (69%) rename schema/{model_google_cloud_write_role_labels_request.go => model_google_cloud_edit_labels_for_role_request.go} (58%) rename schema/{model_google_cloud_write_role_service_accounts_request.go => model_google_cloud_edit_service_accounts_for_role_request.go} (55%) rename schema/{model_google_cloud_write_key_request.go => model_google_cloud_generate_roleset_key_with_parameters2_request.go} (61%) rename schema/{model_google_cloud_write_roleset_key_request.go => model_google_cloud_generate_roleset_key_with_parameters_request.go} (61%) rename schema/{model_google_cloud_write_static_account_key_request.go => model_google_cloud_generate_static_account_key_with_parameters_request.go} (59%) rename schema/{model_google_cloud_kms_write_key_config_request.go => model_google_cloud_kms_configure_key_request.go} (71%) rename schema/{model_google_cloud_kms_write_config_request.go => model_google_cloud_kms_configure_request.go} (67%) create mode 100644 schema/model_google_cloud_write_impersonated_account_request.go rename schema/{model_group_write_alias_request.go => model_group_create_alias_request.go} (71%) rename schema/{model_group_write_request.go => model_group_create_request.go} (82%) rename schema/{model_group_lookup_request.go => model_group_look_up_request.go} (77%) rename schema/{model_group_write_alias_by_id_request.go => model_group_update_alias_by_id_request.go} (67%) rename schema/{model_group_write_by_id_request.go => model_group_update_by_id_request.go} (79%) rename schema/{model_group_write_by_name_request.go => model_group_update_by_name_request.go} (79%) create mode 100644 schema/model_ha_status_response.go rename schema/{model_write_init_request.go => model_initialize_request.go} (88%) rename schema/{model_write_internal_counters_config_request.go => model_internal_client_activity_configure_request.go} (68%) create mode 100644 schema/model_internal_count_entities_response.go create mode 100644 schema/model_internal_count_tokens_response.go rename schema/{model_write_internal_specs_open_api_request.go => model_internal_generate_open_api_document2_request.go} (53%) create mode 100644 schema/model_internal_ui_list_enabled_feature_flags_response.go create mode 100644 schema/model_internal_ui_list_enabled_visible_mounts_response.go create mode 100644 schema/model_internal_ui_list_namespaces_response.go create mode 100644 schema/model_internal_ui_read_mount_information_response.go create mode 100644 schema/model_internal_ui_read_resultant_acl_response.go rename schema/{model_jwt_write_config_request.go => model_jwt_configure_request.go} (91%) rename schema/{model_jwt_write_oidc_callback_request.go => model_jwt_oidc_callback_with_parameters_request.go} (60%) rename schema/{model_oidc_write_auth_url_request.go => model_jwt_oidc_request_authorization_url_request.go} (64%) delete mode 100644 schema/model_jwt_write_oidc_auth_url_request.go rename schema/{model_ldap_write_auth_config_request.go => model_kerberos_configure_ldap_request.go} (85%) rename schema/{model_kerberos_write_config_request.go => model_kerberos_configure_request.go} (72%) rename schema/{model_kubernetes_write_auth_config_request.go => model_kubernetes_configure_auth_request.go} (83%) rename schema/{model_kubernetes_write_config_request.go => model_kubernetes_configure_request.go} (78%) rename schema/{model_kubernetes_write_credentials_request.go => model_kubernetes_generate_credentials_request.go} (63%) rename schema/{model_kvv2_write_config_request.go => model_kv_v2_configure_request.go} (75%) rename schema/{model_kvv2_delete_versions_request.go => model_kv_v2_delete_versions_request.go} (65%) rename schema/{model_kvv2_destroy_versions_request.go => model_kv_v2_destroy_versions_request.go} (63%) create mode 100644 schema/model_kv_v2_patch_response.go create mode 100644 schema/model_kv_v2_read_configuration_response.go create mode 100644 schema/model_kv_v2_read_metadata_response.go rename schema/{model_ssh_write_keys_request.go => model_kv_v2_read_response.go} (50%) create mode 100644 schema/model_kv_v2_read_subkeys_response.go rename schema/{model_kvv2_undelete_versions_request.go => model_kv_v2_undelete_versions_request.go} (64%) rename schema/{model_kvv2_write_metadata_request.go => model_kv_v2_write_metadata_request.go} (80%) rename schema/{model_kvv2_write_request.go => model_kv_v2_write_request.go} (80%) create mode 100644 schema/model_kv_v2_write_response.go delete mode 100644 schema/model_ldap_check_in_manage_library_request.go rename schema/{model_kerberos_write_ldap_config_request.go => model_ldap_configure_auth_request.go} (86%) rename schema/{model_open_ldap_write_config_request.go => model_ldap_configure_request.go} (84%) rename schema/{model_ldap_check_in_library_request.go => model_ldap_library_check_in_request.go} (63%) rename schema/{model_ldap_check_out_library_request.go => model_ldap_library_check_out_request.go} (60%) rename schema/{model_open_ldap_write_library_request.go => model_ldap_library_configure_request.go} (77%) rename schema/{model_open_ldap_check_in_library_request.go => model_ldap_library_force_check_in_request.go} (60%) delete mode 100644 schema/model_ldap_write_config_request.go rename schema/{model_open_ldap_write_role_request.go => model_ldap_write_dynamic_role_request.go} (78%) delete mode 100644 schema/model_ldap_write_library_request.go delete mode 100644 schema/model_ldap_write_role_request.go create mode 100644 schema/model_leader_status_response.go create mode 100644 schema/model_leases_count_response.go create mode 100644 schema/model_leases_list_response.go create mode 100644 schema/model_leases_look_up_response.go create mode 100644 schema/model_leases_look_up_with_prefix_response.go rename schema/{model_write_leases_lookup_request.go => model_leases_read_lease_request.go} (61%) create mode 100644 schema/model_leases_read_lease_response.go rename schema/{model_renew_request.go => model_leases_renew_lease2_request.go} (70%) rename schema/{model_write_leases_renew_request.go => model_leases_renew_lease_request.go} (71%) rename schema/{model_write_leases_renew2_request.go => model_leases_renew_lease_with_id2_request.go} (63%) rename schema/{model_renew_for_request.go => model_leases_renew_lease_with_id_request.go} (63%) rename schema/{model_revoke_request.go => model_leases_revoke_lease2_request.go} (69%) rename schema/{model_write_leases_revoke_request.go => model_leases_revoke_lease_request.go} (71%) rename schema/{model_revoke_lease_request.go => model_leases_revoke_lease_with_id2_request.go} (62%) rename schema/{model_write_leases_revoke2_request.go => model_leases_revoke_lease_with_id_request.go} (63%) rename schema/{model_write_leases_revoke_prefix_request.go => model_leases_revoke_lease_with_prefix2_request.go} (55%) rename schema/{model_revoke_prefix_request.go => model_leases_revoke_lease_with_prefix_request.go} (56%) rename schema/{model_write_loggers_request.go => model_loggers_update_verbosity_level_for_request.go} (57%) rename schema/{model_write_logger_request.go => model_loggers_update_verbosity_level_request.go} (58%) rename schema/{model_mfa_method_admin_destroy_totp_request.go => model_mfa_admin_destroy_totp_secret_request.go} (63%) rename schema/{model_mfa_method_admin_generate_totp_request.go => model_mfa_admin_generate_totp_secret_request.go} (62%) rename schema/{model_mfa_method_write_duo_request.go => model_mfa_configure_duo_method_request.go} (74%) rename schema/{model_mfa_method_write_okta_request.go => model_mfa_configure_okta_method_request.go} (72%) rename schema/{model_mfa_method_write_ping_id_request.go => model_mfa_configure_ping_id_method_request.go} (67%) rename schema/{model_mfa_method_write_totp_request.go => model_mfa_configure_totp_method_request.go} (76%) rename schema/{model_mfa_method_generate_totp_request.go => model_mfa_generate_totp_secret_request.go} (60%) rename schema/{model_mongo_db_atlas_write_config_request.go => model_mongo_db_atlas_configure_request.go} (62%) rename schema/{model_write_mount_request.go => model_mounts_enable_secrets_engine_request.go} (81%) create mode 100644 schema/model_mounts_read_configuration_response.go create mode 100644 schema/model_mounts_read_tuning_information_response.go rename schema/{model_write_mounts_config_request.go => model_mounts_tune_configuration_parameters_request.go} (84%) rename schema/{model_nomad_write_access_config_request.go => model_nomad_configure_access_request.go} (77%) rename schema/{model_nomad_write_lease_config_request.go => model_nomad_configure_lease_request.go} (63%) rename schema/{model_oci_write_config_request.go => model_oci_configure_request.go} (63%) rename schema/{model_oci_login_with_role_request.go => model_oci_login_request.go} (62%) rename schema/{model_oidc_write_config_request.go => model_oidc_configure_request.go} (63%) rename schema/{model_oidc_write_provider_authorize_request.go => model_oidc_provider_authorize2_request.go} (81%) rename schema/{model_oidc_write_provider_token_request.go => model_oidc_provider_token_request.go} (76%) delete mode 100644 schema/model_oidc_write_auth_config_request.go delete mode 100644 schema/model_oidc_write_auth_role_request.go delete mode 100644 schema/model_oidc_write_callback_request.go rename schema/{model_okta_write_config_request.go => model_okta_configure_request.go} (91%) delete mode 100644 schema/model_open_ldap_check_in_manage_library_request.go delete mode 100644 schema/model_open_ldap_check_out_library_request.go delete mode 100644 schema/model_open_ldap_write_static_role_request.go rename schema/{model_persona_write_request.go => model_persona_create_request.go} (77%) rename schema/{model_persona_id_write_by_id_request.go => model_persona_update_by_id_request.go} (74%) rename schema/{model_pki_write_auto_tidy_config_request.go => model_pki_configure_auto_tidy_request.go} (50%) create mode 100644 schema/model_pki_configure_auto_tidy_response.go rename schema/{model_pki_write_ca_config_request.go => model_pki_configure_ca_request.go} (62%) create mode 100644 schema/model_pki_configure_ca_response.go rename schema/{model_pki_write_cluster_config_request.go => model_pki_configure_cluster_request.go} (54%) create mode 100644 schema/model_pki_configure_cluster_response.go create mode 100644 schema/model_pki_configure_crl_request.go rename schema/{model_pki_write_crl_config_request.go => model_pki_configure_crl_response.go} (63%) rename schema/{model_pki_write_issuers_config_request.go => model_pki_configure_issuers_request.go} (68%) create mode 100644 schema/model_pki_configure_issuers_response.go rename schema/{model_pki_write_keys_config_request.go => model_pki_configure_keys_request.go} (60%) create mode 100644 schema/model_pki_configure_keys_response.go create mode 100644 schema/model_pki_configure_urls_request.go rename schema/{model_pki_write_url_config_request.go => model_pki_configure_urls_response.go} (81%) rename schema/{model_pki_write_intermediate_cross_sign_request.go => model_pki_cross_sign_intermediate_request.go} (93%) create mode 100644 schema/model_pki_cross_sign_intermediate_response.go rename schema/{model_pki_write_internal_exported_request.go => model_pki_generate_exported_key_request.go} (78%) create mode 100644 schema/model_pki_generate_exported_key_response.go rename schema/{model_pki_write_intermediate_generate_request.go => model_pki_generate_intermediate_request.go} (93%) create mode 100644 schema/model_pki_generate_intermediate_response.go create mode 100644 schema/model_pki_generate_internal_key_request.go create mode 100644 schema/model_pki_generate_internal_key_response.go rename schema/{model_pki_write_kms_request.go => model_pki_generate_kms_key_request.go} (81%) create mode 100644 schema/model_pki_generate_kms_key_response.go create mode 100644 schema/model_pki_generate_root_response.go rename schema/{model_pki_import_keys_request.go => model_pki_import_key_request.go} (67%) create mode 100644 schema/model_pki_import_key_response.go rename schema/{model_pki_write_issue_role_request.go => model_pki_issue_with_role_request.go} (86%) create mode 100644 schema/model_pki_issue_with_role_response.go rename schema/{model_pki_issuer_issue_role_request.go => model_pki_issuer_issue_with_role_request.go} (84%) create mode 100644 schema/model_pki_issuer_issue_with_role_response.go create mode 100644 schema/model_pki_issuer_read_crl_delta_der_response.go create mode 100644 schema/model_pki_issuer_read_crl_delta_pem_response.go create mode 100644 schema/model_pki_issuer_read_crl_delta_response.go create mode 100644 schema/model_pki_issuer_read_crl_der_response.go create mode 100644 schema/model_pki_issuer_read_crl_pem_response.go create mode 100644 schema/model_pki_issuer_read_crl_response.go create mode 100644 schema/model_pki_issuer_resign_crls_response.go create mode 100644 schema/model_pki_issuer_sign_intermediate_response.go create mode 100644 schema/model_pki_issuer_sign_revocation_list_response.go create mode 100644 schema/model_pki_issuer_sign_self_issued_response.go create mode 100644 schema/model_pki_issuer_sign_verbatim_response.go rename schema/{model_pki_issuer_sign_verbatim_role_request.go => model_pki_issuer_sign_verbatim_with_role_request.go} (87%) create mode 100644 schema/model_pki_issuer_sign_verbatim_with_role_response.go rename schema/{model_pki_issuer_sign_role_request.go => model_pki_issuer_sign_with_role_request.go} (84%) create mode 100644 schema/model_pki_issuer_sign_with_role_response.go create mode 100644 schema/model_pki_issuers_generate_intermediate_response.go create mode 100644 schema/model_pki_issuers_generate_root_response.go rename schema/{model_pki_write_certs_request.go => model_pki_issuers_import_bundle_request.go} (59%) create mode 100644 schema/model_pki_issuers_import_bundle_response.go rename schema/{model_pki_bundle_write_request.go => model_pki_issuers_import_cert_request.go} (61%) create mode 100644 schema/model_pki_issuers_import_cert_response.go rename schema/{model_pki_rotate_root_request.go => model_pki_issuers_rotate_root_request.go} (94%) create mode 100644 schema/model_pki_issuers_rotate_root_response.go create mode 100644 schema/model_pki_list_certs_response.go create mode 100644 schema/model_pki_list_issuers_response.go create mode 100644 schema/model_pki_list_keys_response.go create mode 100644 schema/model_pki_list_revoked_certs_response.go create mode 100644 schema/model_pki_list_roles_response.go create mode 100644 schema/model_pki_patch_issuer_response.go create mode 100644 schema/model_pki_patch_role_response.go create mode 100644 schema/model_pki_read_auto_tidy_configuration_response.go create mode 100644 schema/model_pki_read_ca_chain_pem_response.go create mode 100644 schema/model_pki_read_ca_der_response.go create mode 100644 schema/model_pki_read_ca_pem_response.go create mode 100644 schema/model_pki_read_cert_ca_chain_response.go create mode 100644 schema/model_pki_read_cert_crl_response.go create mode 100644 schema/model_pki_read_cert_delta_crl_response.go create mode 100644 schema/model_pki_read_cert_raw_der_response.go create mode 100644 schema/model_pki_read_cert_raw_pem_response.go create mode 100644 schema/model_pki_read_cert_response.go create mode 100644 schema/model_pki_read_cluster_configuration_response.go create mode 100644 schema/model_pki_read_crl_configuration_response.go create mode 100644 schema/model_pki_read_crl_delta_pem_response.go create mode 100644 schema/model_pki_read_crl_delta_response.go create mode 100644 schema/model_pki_read_crl_der_response.go create mode 100644 schema/model_pki_read_crl_pem_response.go create mode 100644 schema/model_pki_read_issuer_der_response.go create mode 100644 schema/model_pki_read_issuer_json_response.go create mode 100644 schema/model_pki_read_issuer_pem_response.go create mode 100644 schema/model_pki_read_issuer_response.go create mode 100644 schema/model_pki_read_issuers_configuration_response.go create mode 100644 schema/model_pki_read_key_response.go create mode 100644 schema/model_pki_read_keys_configuration_response.go create mode 100644 schema/model_pki_read_role_response.go create mode 100644 schema/model_pki_read_urls_configuration_response.go create mode 100644 schema/model_pki_replace_root_response.go create mode 100644 schema/model_pki_revoke_issuer_response.go create mode 100644 schema/model_pki_revoke_response.go create mode 100644 schema/model_pki_revoke_with_key_response.go create mode 100644 schema/model_pki_root_sign_intermediate_response.go create mode 100644 schema/model_pki_root_sign_self_issued_response.go create mode 100644 schema/model_pki_rotate_crl_response.go create mode 100644 schema/model_pki_rotate_delta_crl_response.go rename schema/{model_pki_write_intermediate_set_signed_request.go => model_pki_set_signed_intermediate_request.go} (61%) create mode 100644 schema/model_pki_set_signed_intermediate_response.go create mode 100644 schema/model_pki_sign_verbatim_response.go rename schema/{model_pki_sign_verbatim_role_request.go => model_pki_sign_verbatim_with_role_request.go} (88%) create mode 100644 schema/model_pki_sign_verbatim_with_role_response.go rename schema/{model_pki_sign_role_request.go => model_pki_sign_with_role_request.go} (86%) create mode 100644 schema/model_pki_sign_with_role_response.go create mode 100644 schema/model_pki_tidy_cancel_response.go create mode 100644 schema/model_pki_tidy_status_response.go rename schema/{model_pki_write_issuer_ref_der_pem_request.go => model_pki_write_issuer_request.go} (83%) create mode 100644 schema/model_pki_write_issuer_response.go delete mode 100644 schema/model_pki_write_json_request.go create mode 100644 schema/model_pki_write_key_response.go create mode 100644 schema/model_pki_write_role_response.go create mode 100644 schema/model_plugins_catalog_list_plugins_response.go create mode 100644 schema/model_plugins_catalog_list_plugins_with_type_response.go create mode 100644 schema/model_plugins_catalog_read_plugin_configuration_response.go create mode 100644 schema/model_plugins_catalog_read_plugin_configuration_with_type_response.go rename schema/{model_sys_write_plugins_catalog_name_request.go => model_plugins_catalog_register_plugin_request.go} (73%) rename schema/{model_write_plugins_catalog_by_type_by_name_request.go => model_plugins_catalog_register_plugin_with_type_request.go} (68%) rename schema/{model_write_plugins_reload_backend_request.go => model_plugins_reload_backends_request.go} (63%) create mode 100644 schema/model_plugins_reload_backends_response.go create mode 100644 schema/model_policies_generate_password_from_password_policy_response.go create mode 100644 schema/model_policies_list_acl_policies_response.go create mode 100644 schema/model_policies_list_password_policies_response.go create mode 100644 schema/model_policies_list_response.go create mode 100644 schema/model_policies_read_acl_policy2_response.go create mode 100644 schema/model_policies_read_acl_policy_response.go create mode 100644 schema/model_policies_read_password_policy_response.go rename schema/{model_write_policy_request.go => model_policies_write_acl_policy2_request.go} (60%) rename schema/{model_write_policies_acl_request.go => model_policies_write_acl_policy_request.go} (57%) rename schema/{model_write_policies_password_request.go => model_policies_write_password_policy_request.go} (54%) rename schema/{model_write_capabilities_accessor_request.go => model_query_token_accessor_capabilities_request.go} (62%) rename schema/{model_write_capabilities_request.go => model_query_token_capabilities_request.go} (65%) rename schema/{model_write_capabilities_self_request.go => model_query_token_self_capabilities_request.go} (63%) rename schema/{model_rabbit_mq_write_connection_config_request.go => model_rabbit_mq_configure_connection_request.go} (74%) rename schema/{model_rabbit_mq_write_lease_config_request.go => model_rabbit_mq_configure_lease_request.go} (63%) rename schema/{model_radius_write_config_request.go => model_radius_configure_request.go} (89%) rename schema/{model_write_quotas_config_request.go => model_rate_limit_quotas_configure_request.go} (73%) rename schema/{model_app_role_list_secret_id_response.go => model_rate_limit_quotas_list_response.go} (57%) create mode 100644 schema/model_rate_limit_quotas_read_configuration_response.go create mode 100644 schema/model_rate_limit_quotas_read_response.go rename schema/{model_write_quotas_rate_limit_request.go => model_rate_limit_quotas_write_request.go} (80%) create mode 100644 schema/model_read_wrapping_properties2_response.go create mode 100644 schema/model_read_wrapping_properties_request.go create mode 100644 schema/model_read_wrapping_properties_response.go rename schema/{model_write_rekey_init_request.go => model_rekey_attempt_initialize_request.go} (79%) create mode 100644 schema/model_rekey_attempt_initialize_response.go create mode 100644 schema/model_rekey_attempt_read_progress_response.go rename schema/{model_write_rekey_update_request.go => model_rekey_attempt_update_request.go} (63%) create mode 100644 schema/model_rekey_attempt_update_response.go create mode 100644 schema/model_rekey_read_backup_key_response.go create mode 100644 schema/model_rekey_read_backup_recovery_key_response.go create mode 100644 schema/model_rekey_verification_cancel_response.go create mode 100644 schema/model_rekey_verification_read_progress_response.go rename schema/{model_write_rekey_verify_request.go => model_rekey_verification_update_request.go} (62%) create mode 100644 schema/model_rekey_verification_update_response.go create mode 100644 schema/model_remount_response.go create mode 100644 schema/model_remount_status_response.go rename schema/{model_wrapping_unwrap_request.go => model_rewrap_request.go} (60%) rename schema/{model_write_generate_root_request.go => model_root_token_generation_initialize2_request.go} (54%) create mode 100644 schema/model_root_token_generation_initialize2_response.go rename schema/{model_write_generate_root_attempt_request.go => model_root_token_generation_initialize_request.go} (54%) create mode 100644 schema/model_root_token_generation_initialize_response.go create mode 100644 schema/model_root_token_generation_read_progress2_response.go create mode 100644 schema/model_root_token_generation_read_progress_response.go rename schema/{model_write_generate_root_update_request.go => model_root_token_generation_update_request.go} (59%) create mode 100644 schema/model_root_token_generation_update_response.go create mode 100644 schema/model_seal_status_response.go rename schema/{model_ssh_write_ca_config_request.go => model_ssh_configure_ca_request.go} (81%) rename schema/{model_ssh_write_zero_address_config_request.go => model_ssh_configure_zero_address_request.go} (61%) rename schema/{model_ssh_write_credentials_request.go => model_ssh_generate_credentials_request.go} (61%) rename schema/{model_ssh_write_issue_request.go => model_ssh_issue_certificate_request.go} (83%) rename schema/{model_ssh_lookup_request.go => model_ssh_list_roles_by_ip_request.go} (60%) rename schema/{model_ssh_sign_request.go => model_ssh_sign_certificate_request.go} (82%) rename schema/{model_ssh_verify_request.go => model_ssh_verify_otp_request.go} (63%) rename schema/{model_terraform_write_config_request.go => model_terraform_cloud_configure_request.go} (69%) rename schema/{model_terraform_write_role_request.go => model_terraform_cloud_write_role_request.go} (74%) rename schema/{model_token_write_create_with_role_request.go => model_token_create_against_role_request.go} (81%) rename schema/{model_token_write_create_orphan_request.go => model_token_create_orphan_request.go} (83%) rename schema/{model_token_write_create_request.go => model_token_create_request.go} (84%) rename schema/{model_token_write_lookup_accessor_request.go => model_token_look_up_accessor_request.go} (57%) rename schema/{model_token_write_lookup_request.go => model_token_look_up_request.go} (60%) rename schema/{model_token_write_lookup_self_request.go => model_token_look_up_self2_request.go} (59%) rename schema/{model_totp_write_key_request.go => model_totp_create_key_request.go} (88%) rename schema/{model_totp_write_code_request.go => model_totp_validate_code_request.go} (60%) rename schema/{model_transit_write_cache_config_request.go => model_transit_configure_cache_request.go} (58%) rename schema/{model_transit_write_key_config_request.go => model_transit_configure_key_request.go} (81%) rename schema/{model_transit_write_config_keys_request.go => model_transit_configure_keys_request.go} (60%) rename schema/{model_transit_write_key_request.go => model_transit_create_key_request.go} (80%) rename schema/{model_sys_write_tools_random_urlbytes_request.go => model_transit_generate_random_with_bytes_request.go} (66%) rename schema/{model_tools_generate_random_source_bytes_request.go => model_transit_generate_random_with_source_and_bytes_request.go} (58%) rename schema/{model_transit_generate_random_source_request.go => model_transit_generate_random_with_source_request.go} (65%) rename schema/{model_transit_restore_request.go => model_transit_restore_and_rename_key_request.go} (63%) create mode 100644 schema/model_transit_rotate_key_request.go rename schema/{model_write_config_ui_header_request.go => model_ui_headers_configure_request.go} (63%) create mode 100644 schema/model_ui_headers_list_response.go create mode 100644 schema/model_ui_headers_read_configuration_response.go create mode 100644 schema/model_unseal_response.go rename schema/{model_wrapping_rewrap_request.go => model_unwrap_request.go} (60%) rename schema/{model_userpass_write_user_password_request.go => model_userpass_reset_password_request.go} (56%) rename schema/{model_userpass_write_user_policies_request.go => model_userpass_update_policies_request.go} (64%) create mode 100644 schema/model_version_history_response.go delete mode 100644 schema/model_wrapping_write_lookup_request.go delete mode 100644 schema/model_write_raw_path_request.go delete mode 100644 schema/model_write_raw_request.go diff --git a/api_auth.go b/api_auth.go index 6e8b3e0c..82d7ba08 100644 --- a/api_auth.go +++ b/api_auth.go @@ -19,17 +19,18 @@ type Auth struct { client *Client } -// AWSConfigDeleteCertificate -// certName: Name of the certificate. -func (a *Auth) AWSConfigDeleteCertificate(ctx context.Context, certName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudDeleteAuthRole Create a role and associate policies to it. +// role: The name of the role as it should appear in Vault. +// alicloudMountPath: Path that the backend was mounted at +func (a *Auth) AliCloudDeleteAuthRole(ctx context.Context, role string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/certificate/{cert_name}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"cert_name"+"}", url.PathEscape(certName), -1) + requestPath := "/v1/auth/{alicloud_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -44,22 +45,24 @@ func (a *Auth) AWSConfigDeleteCertificate(ctx context.Context, certName string, ) } -// AWSConfigDeleteClient -func (a *Auth) AWSConfigDeleteClient(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudListAuthRoles Lists all the roles that are registered with Vault. +// alicloudMountPath: Path that the backend was mounted at +func (a *Auth) AliCloudListAuthRoles(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/client" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{alicloud_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -67,22 +70,24 @@ func (a *Auth) AWSConfigDeleteClient(ctx context.Context, options ...RequestOpti ) } -// AWSConfigDeleteIdentityAccessList -func (a *Auth) AWSConfigDeleteIdentityAccessList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudListAuthRoles2 Lists all the roles that are registered with Vault. +// alicloudMountPath: Path that the backend was mounted at +func (a *Auth) AliCloudListAuthRoles2(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-accesslist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{alicloud_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -90,45 +95,49 @@ func (a *Auth) AWSConfigDeleteIdentityAccessList(ctx context.Context, options .. ) } -// AWSConfigDeleteIdentityWhiteList -func (a *Auth) AWSConfigDeleteIdentityWhiteList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudLogin Authenticates an RAM entity with Vault. +// alicloudMountPath: Path that the backend was mounted at +func (a *Auth) AliCloudLogin(ctx context.Context, alicloudMountPath string, request schema.AliCloudLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-whitelist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{alicloud_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSConfigDeleteRoleTagBlackList -func (a *Auth) AWSConfigDeleteRoleTagBlackList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudReadAuthRole Create a role and associate policies to it. +// role: The name of the role as it should appear in Vault. +// alicloudMountPath: Path that the backend was mounted at +func (a *Auth) AliCloudReadAuthRole(ctx context.Context, role string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-blacklist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{alicloud_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -136,40 +145,44 @@ func (a *Auth) AWSConfigDeleteRoleTagBlackList(ctx context.Context, options ...R ) } -// AWSConfigDeleteRoleTagDenyList -func (a *Auth) AWSConfigDeleteRoleTagDenyList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudWriteAuthRole Create a role and associate policies to it. +// role: The name of the role as it should appear in Vault. +// alicloudMountPath: Path that the backend was mounted at +func (a *Auth) AliCloudWriteAuthRole(ctx context.Context, role string, alicloudMountPath string, request schema.AliCloudWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-denylist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{alicloud_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSConfigDeleteSecurityTokenServiceAccount -// accountId: AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. -func (a *Auth) AWSConfigDeleteSecurityTokenServiceAccount(ctx context.Context, accountId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteBindSecretId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteBindSecretId(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/sts/{account_id}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"account_id"+"}", url.PathEscape(accountId), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bind-secret-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -184,23 +197,25 @@ func (a *Auth) AWSConfigDeleteSecurityTokenServiceAccount(ctx context.Context, a ) } -// AWSConfigListCertificates -func (a *Auth) AWSConfigListCertificates(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteBoundCidrList +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteBoundCidrList(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/certificates" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bound-cidr-list" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -208,23 +223,25 @@ func (a *Auth) AWSConfigListCertificates(ctx context.Context, options ...Request ) } -// AWSConfigListSecurityTokenService -func (a *Auth) AWSConfigListSecurityTokenService(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeletePeriod +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeletePeriod(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/sts" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/period" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -232,24 +249,25 @@ func (a *Auth) AWSConfigListSecurityTokenService(ctx context.Context, options .. ) } -// AWSConfigReadCertificate -// certName: Name of the certificate. -func (a *Auth) AWSConfigReadCertificate(ctx context.Context, certName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeletePolicies +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeletePolicies(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/certificate/{cert_name}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"cert_name"+"}", url.PathEscape(certName), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/policies" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -257,22 +275,25 @@ func (a *Auth) AWSConfigReadCertificate(ctx context.Context, certName string, op ) } -// AWSConfigReadClient -func (a *Auth) AWSConfigReadClient(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteRole +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteRole(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/client" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -280,22 +301,25 @@ func (a *Auth) AWSConfigReadClient(ctx context.Context, options ...RequestOption ) } -// AWSConfigReadIdentity -func (a *Auth) AWSConfigReadIdentity(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteSecretIdBoundCidrs +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteSecretIdBoundCidrs(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/identity" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -303,22 +327,25 @@ func (a *Auth) AWSConfigReadIdentity(ctx context.Context, options ...RequestOpti ) } -// AWSConfigReadIdentityAccessList -func (a *Auth) AWSConfigReadIdentityAccessList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteSecretIdNumUses +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteSecretIdNumUses(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-accesslist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -326,22 +353,25 @@ func (a *Auth) AWSConfigReadIdentityAccessList(ctx context.Context, options ...R ) } -// AWSConfigReadIdentityWhiteList -func (a *Auth) AWSConfigReadIdentityWhiteList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteSecretIdTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteSecretIdTtl(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-whitelist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -349,22 +379,25 @@ func (a *Auth) AWSConfigReadIdentityWhiteList(ctx context.Context, options ...Re ) } -// AWSConfigReadRoleTagBlackList -func (a *Auth) AWSConfigReadRoleTagBlackList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteTokenBoundCidrs +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteTokenBoundCidrs(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-blacklist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -372,22 +405,25 @@ func (a *Auth) AWSConfigReadRoleTagBlackList(ctx context.Context, options ...Req ) } -// AWSConfigReadRoleTagDenyList -func (a *Auth) AWSConfigReadRoleTagDenyList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteTokenMaxTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteTokenMaxTtl(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-denylist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-max-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -395,24 +431,25 @@ func (a *Auth) AWSConfigReadRoleTagDenyList(ctx context.Context, options ...Requ ) } -// AWSConfigReadSecurityTokenServiceAccount -// accountId: AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. -func (a *Auth) AWSConfigReadSecurityTokenServiceAccount(ctx context.Context, accountId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteTokenNumUses +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteTokenNumUses(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/sts/{account_id}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"account_id"+"}", url.PathEscape(accountId), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-num-uses" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -420,22 +457,25 @@ func (a *Auth) AWSConfigReadSecurityTokenServiceAccount(ctx context.Context, acc ) } -// AWSConfigRotateRoot -func (a *Auth) AWSConfigRotateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDeleteTokenTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDeleteTokenTtl(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/rotate-root" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -443,17 +483,18 @@ func (a *Auth) AWSConfigRotateRoot(ctx context.Context, options ...RequestOption ) } -// AWSConfigWriteCertificate -// certName: Name of the certificate. -func (a *Auth) AWSConfigWriteCertificate(ctx context.Context, certName string, request schema.AWSConfigWriteCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDestroySecretId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDestroySecretId(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleDestroySecretIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/certificate/{cert_name}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"cert_name"+"}", url.PathEscape(certName), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id/destroy" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -468,38 +509,44 @@ func (a *Auth) AWSConfigWriteCertificate(ctx context.Context, certName string, r ) } -// AWSConfigWriteClient -func (a *Auth) AWSConfigWriteClient(ctx context.Context, request schema.AWSConfigWriteClientRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDestroySecretId2 +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDestroySecretId2(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/client" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id/destroy" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSConfigWriteIdentity -func (a *Auth) AWSConfigWriteIdentity(ctx context.Context, request schema.AWSConfigWriteIdentityRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDestroySecretIdByAccessor +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDestroySecretIdByAccessor(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleDestroySecretIdByAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/identity" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -514,84 +561,94 @@ func (a *Auth) AWSConfigWriteIdentity(ctx context.Context, request schema.AWSCon ) } -// AWSConfigWriteIdentityAccessList -func (a *Auth) AWSConfigWriteIdentityAccessList(ctx context.Context, request schema.AWSConfigWriteIdentityAccessListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleDestroySecretIdByAccessor2 +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleDestroySecretIdByAccessor2(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-accesslist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSConfigWriteIdentityWhiteList -func (a *Auth) AWSConfigWriteIdentityWhiteList(ctx context.Context, request schema.AWSConfigWriteIdentityWhiteListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleListRoles +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleListRoles(ctx context.Context, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleListRolesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-whitelist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleListRolesResponse]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSConfigWriteRoleTagBlackList -func (a *Auth) AWSConfigWriteRoleTagBlackList(ctx context.Context, request schema.AWSConfigWriteRoleTagBlackListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleListSecretIds +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleListSecretIds(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleListSecretIdsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-blacklist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleListSecretIdsResponse]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSConfigWriteRoleTagDenyList -func (a *Auth) AWSConfigWriteRoleTagDenyList(ctx context.Context, request schema.AWSConfigWriteRoleTagDenyListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleLogin +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleLogin(ctx context.Context, approleMountPath string, request schema.AppRoleLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-denylist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) requestQueryParameters := make(url.Values) @@ -606,21 +663,22 @@ func (a *Auth) AWSConfigWriteRoleTagDenyList(ctx context.Context, request schema ) } -// AWSConfigWriteSecurityTokenServiceAccount -// accountId: AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. -func (a *Auth) AWSConfigWriteSecurityTokenServiceAccount(ctx context.Context, accountId string, request schema.AWSConfigWriteSecurityTokenServiceAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleLookUpSecretId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleLookUpSecretId(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleLookUpSecretIdRequest, options ...RequestOption) (*Response[schema.AppRoleLookUpSecretIdResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/config/sts/{account_id}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"account_id"+"}", url.PathEscape(accountId), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id/lookup" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.AppRoleLookUpSecretIdResponse]( ctx, a.client, http.MethodPost, @@ -631,49 +689,51 @@ func (a *Auth) AWSConfigWriteSecurityTokenServiceAccount(ctx context.Context, ac ) } -// AWSDeleteAuthRole -// role: Name of the role. -func (a *Auth) AWSDeleteAuthRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleLookUpSecretIdByAccessor +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleLookUpSecretIdByAccessor(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleLookUpSecretIdByAccessorRequest, options ...RequestOption) (*Response[schema.AppRoleLookUpSecretIdByAccessorResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/lookup" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.AppRoleLookUpSecretIdByAccessorResponse]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSDeleteIdentityAccessListFor -// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. -func (a *Auth) AWSDeleteIdentityAccessListFor(ctx context.Context, instanceId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadBindSecretId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadBindSecretId(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadBindSecretIdResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/identity-accesslist/{instance_id}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bind-secret-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadBindSecretIdResponse]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -681,24 +741,25 @@ func (a *Auth) AWSDeleteIdentityAccessListFor(ctx context.Context, instanceId st ) } -// AWSDeleteIdentityWhiteListFor -// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. -func (a *Auth) AWSDeleteIdentityWhiteListFor(ctx context.Context, instanceId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadBoundCidrList +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadBoundCidrList(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadBoundCidrListResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/identity-whitelist/{instance_id}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bound-cidr-list" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadBoundCidrListResponse]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -706,24 +767,25 @@ func (a *Auth) AWSDeleteIdentityWhiteListFor(ctx context.Context, instanceId str ) } -// AWSDeleteRoleTagBlackListFor -// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. -func (a *Auth) AWSDeleteRoleTagBlackListFor(ctx context.Context, roleTag string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadLocalSecretIds +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadLocalSecretIds(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadLocalSecretIdsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist/{role_tag}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/local-secret-ids" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadLocalSecretIdsResponse]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -731,24 +793,25 @@ func (a *Auth) AWSDeleteRoleTagBlackListFor(ctx context.Context, roleTag string, ) } -// AWSDeleteRoleTagDenyListFor -// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. -func (a *Auth) AWSDeleteRoleTagDenyListFor(ctx context.Context, roleTag string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadPeriod +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadPeriod(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadPeriodResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist/{role_tag}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/period" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadPeriodResponse]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -756,20 +819,22 @@ func (a *Auth) AWSDeleteRoleTagDenyListFor(ctx context.Context, roleTag string, ) } -// AWSListAuthRoles -func (a *Auth) AWSListAuthRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadPolicies +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadPolicies(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadPoliciesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/policies" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadPoliciesResponse]( ctx, a.client, http.MethodGet, @@ -780,20 +845,22 @@ func (a *Auth) AWSListAuthRoles(ctx context.Context, options ...RequestOption) ( ) } -// AWSListAuthRoles2 -func (a *Auth) AWSListAuthRoles2(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadRole +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadRole(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadRoleResponse]( ctx, a.client, http.MethodGet, @@ -804,20 +871,22 @@ func (a *Auth) AWSListAuthRoles2(ctx context.Context, options ...RequestOption) ) } -// AWSListIdentityAccessList -func (a *Auth) AWSListIdentityAccessList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadRoleId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadRoleId(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadRoleIdResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/identity-accesslist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/role-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadRoleIdResponse]( ctx, a.client, http.MethodGet, @@ -828,20 +897,22 @@ func (a *Auth) AWSListIdentityAccessList(ctx context.Context, options ...Request ) } -// AWSListIdentityWhiteList -func (a *Auth) AWSListIdentityWhiteList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadSecretIdBoundCidrs +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadSecretIdBoundCidrs(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadSecretIdBoundCidrsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/identity-whitelist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadSecretIdBoundCidrsResponse]( ctx, a.client, http.MethodGet, @@ -852,20 +923,22 @@ func (a *Auth) AWSListIdentityWhiteList(ctx context.Context, options ...RequestO ) } -// AWSListRoleTagBlackList -func (a *Auth) AWSListRoleTagBlackList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadSecretIdNumUses +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadSecretIdNumUses(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadSecretIdNumUsesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadSecretIdNumUsesResponse]( ctx, a.client, http.MethodGet, @@ -876,20 +949,22 @@ func (a *Auth) AWSListRoleTagBlackList(ctx context.Context, options ...RequestOp ) } -// AWSListRoleTagDenyList -func (a *Auth) AWSListRoleTagDenyList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadSecretIdTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadSecretIdTtl(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadSecretIdTtlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadSecretIdTtlResponse]( ctx, a.client, http.MethodGet, @@ -900,44 +975,48 @@ func (a *Auth) AWSListRoleTagDenyList(ctx context.Context, options ...RequestOpt ) } -// AWSLogin -func (a *Auth) AWSLogin(ctx context.Context, request schema.AWSLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadTokenBoundCidrs +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadTokenBoundCidrs(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadTokenBoundCidrsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadTokenBoundCidrsResponse]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSReadAuthRole -// role: Name of the role. -func (a *Auth) AWSReadAuthRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadTokenMaxTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadTokenMaxTtl(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadTokenMaxTtlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-max-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadTokenMaxTtlResponse]( ctx, a.client, http.MethodGet, @@ -948,21 +1027,22 @@ func (a *Auth) AWSReadAuthRole(ctx context.Context, role string, options ...Requ ) } -// AWSReadIdentityAccessListFor -// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. -func (a *Auth) AWSReadIdentityAccessListFor(ctx context.Context, instanceId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadTokenNumUses +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadTokenNumUses(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadTokenNumUsesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/identity-accesslist/{instance_id}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-num-uses" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadTokenNumUsesResponse]( ctx, a.client, http.MethodGet, @@ -973,21 +1053,22 @@ func (a *Auth) AWSReadIdentityAccessListFor(ctx context.Context, instanceId stri ) } -// AWSReadIdentityWhiteListFor -// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. -func (a *Auth) AWSReadIdentityWhiteListFor(ctx context.Context, instanceId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleReadTokenTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleReadTokenTtl(ctx context.Context, roleName string, approleMountPath string, options ...RequestOption) (*Response[schema.AppRoleReadTokenTtlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/identity-whitelist/{instance_id}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AppRoleReadTokenTtlResponse]( ctx, a.client, http.MethodGet, @@ -998,24 +1079,23 @@ func (a *Auth) AWSReadIdentityWhiteListFor(ctx context.Context, instanceId strin ) } -// AWSReadRoleTagBlackListFor -// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. -func (a *Auth) AWSReadRoleTagBlackListFor(ctx context.Context, roleTag string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleTidySecretId +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleTidySecretId(ctx context.Context, approleMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist/{role_tag}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) + requestPath := "/v1/auth/{approle_mount_path}/tidy/secret-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1023,42 +1103,44 @@ func (a *Auth) AWSReadRoleTagBlackListFor(ctx context.Context, roleTag string, o ) } -// AWSReadRoleTagDenyListFor -// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. -func (a *Auth) AWSReadRoleTagDenyListFor(ctx context.Context, roleTag string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteBindSecretId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteBindSecretId(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteBindSecretIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist/{role_tag}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bind-secret-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSWriteAuthRole -// role: Name of the role. -func (a *Auth) AWSWriteAuthRole(ctx context.Context, role string, request schema.AWSWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteBoundCidrList +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteBoundCidrList(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteBoundCidrListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bound-cidr-list" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -1073,21 +1155,22 @@ func (a *Auth) AWSWriteAuthRole(ctx context.Context, role string, request schema ) } -// AWSWriteAuthRoleTag -// role: Name of the role. -func (a *Auth) AWSWriteAuthRoleTag(ctx context.Context, role string, request schema.AWSWriteAuthRoleTagRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteCustomSecretId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteCustomSecretId(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteCustomSecretIdRequest, options ...RequestOption) (*Response[schema.AppRoleWriteCustomSecretIdResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/role/{role}/tag" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/custom-secret-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.AppRoleWriteCustomSecretIdResponse]( ctx, a.client, http.MethodPost, @@ -1098,15 +1181,18 @@ func (a *Auth) AWSWriteAuthRoleTag(ctx context.Context, role string, request sch ) } -// AWSWriteIdentityAccessListTidySettings -func (a *Auth) AWSWriteIdentityAccessListTidySettings(ctx context.Context, request schema.AWSWriteIdentityAccessListTidySettingsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWritePeriod +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWritePeriod(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWritePeriodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/tidy/identity-accesslist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/period" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -1121,15 +1207,18 @@ func (a *Auth) AWSWriteIdentityAccessListTidySettings(ctx context.Context, reque ) } -// AWSWriteIdentityWhiteListTidySettings -func (a *Auth) AWSWriteIdentityWhiteListTidySettings(ctx context.Context, request schema.AWSWriteIdentityWhiteListTidySettingsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWritePolicies +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWritePolicies(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWritePoliciesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/tidy/identity-whitelist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/policies" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -1144,40 +1233,44 @@ func (a *Auth) AWSWriteIdentityWhiteListTidySettings(ctx context.Context, reques ) } -// AWSWriteRoleTagBlackListFor -// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. -func (a *Auth) AWSWriteRoleTagBlackListFor(ctx context.Context, roleTag string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteRole +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteRole(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist/{role_tag}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSWriteRoleTagBlackListTidySettings -func (a *Auth) AWSWriteRoleTagBlackListTidySettings(ctx context.Context, request schema.AWSWriteRoleTagBlackListTidySettingsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteRoleId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteRoleId(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteRoleIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/tidy/roletag-blacklist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/role-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -1192,40 +1285,44 @@ func (a *Auth) AWSWriteRoleTagBlackListTidySettings(ctx context.Context, request ) } -// AWSWriteRoleTagDenyListFor -// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. -func (a *Auth) AWSWriteRoleTagDenyListFor(ctx context.Context, roleTag string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteSecretId +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteSecretId(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteSecretIdRequest, options ...RequestOption) (*Response[schema.AppRoleWriteSecretIdResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist/{role_tag}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.AppRoleWriteSecretIdResponse]( ctx, a.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSWriteRoleTagDenyListTidySettings -func (a *Auth) AWSWriteRoleTagDenyListTidySettings(ctx context.Context, request schema.AWSWriteRoleTagDenyListTidySettingsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteSecretIdBoundCidrs +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteSecretIdBoundCidrs(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteSecretIdBoundCidrsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{aws_mount_path}/tidy/roletag-denylist" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -1240,88 +1337,96 @@ func (a *Auth) AWSWriteRoleTagDenyListTidySettings(ctx context.Context, request ) } -// AliCloudDeleteAuthRole Create a role and associate policies to it. -// role: The name of the role as it should appear in Vault. -func (a *Auth) AliCloudDeleteAuthRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteSecretIdNumUses +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteSecretIdNumUses(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteSecretIdNumUsesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{alicloud_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AliCloudListAuthRoles Lists all the roles that are registered with Vault. -func (a *Auth) AliCloudListAuthRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteSecretIdTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteSecretIdTtl(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteSecretIdTtlRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{alicloud_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AliCloudListAuthRoles2 Lists all the roles that are registered with Vault. -func (a *Auth) AliCloudListAuthRoles2(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteTokenBoundCidrs +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteTokenBoundCidrs(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteTokenBoundCidrsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{alicloud_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AliCloudLogin Authenticates an RAM entity with Vault. -func (a *Auth) AliCloudLogin(ctx context.Context, request schema.AliCloudLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteTokenMaxTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteTokenMaxTtl(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteTokenMaxTtlRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{alicloud_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-max-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -1336,42 +1441,44 @@ func (a *Auth) AliCloudLogin(ctx context.Context, request schema.AliCloudLoginRe ) } -// AliCloudReadAuthRole Create a role and associate policies to it. -// role: The name of the role as it should appear in Vault. -func (a *Auth) AliCloudReadAuthRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteTokenNumUses +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteTokenNumUses(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteTokenNumUsesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{alicloud_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-num-uses" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AliCloudWriteAuthRole Create a role and associate policies to it. -// role: The name of the role as it should appear in Vault. -func (a *Auth) AliCloudWriteAuthRole(ctx context.Context, role string, request schema.AliCloudWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AppRoleWriteTokenTtl +// roleName: Name of the role. Must be less than 4096 bytes. +// approleMountPath: Path that the backend was mounted at +func (a *Auth) AppRoleWriteTokenTtl(ctx context.Context, roleName string, approleMountPath string, request schema.AppRoleWriteTokenTtlRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{alicloud_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-ttl" + requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -1386,167 +1493,188 @@ func (a *Auth) AliCloudWriteAuthRole(ctx context.Context, role string, request s ) } -// AppRoleDeleteBindSecretID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteBindSecretID(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureCertificate +// certName: Name of the certificate. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsConfigureCertificate(ctx context.Context, certName string, awsMountPath string, request schema.AwsConfigureCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bind-secret-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/certificate/{cert_name}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"cert_name"+"}", url.PathEscape(certName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AppRoleDeleteBoundCIDRList -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteBoundCIDRList(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureClient +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsConfigureClient(ctx context.Context, awsMountPath string, request schema.AwsConfigureClientRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bound-cidr-list" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/client" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AppRoleDeletePeriod -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeletePeriod(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureIdentityAccessListTidyOperation +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsConfigureIdentityAccessListTidyOperation(ctx context.Context, awsMountPath string, request schema.AwsConfigureIdentityAccessListTidyOperationRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/period" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-accesslist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AppRoleDeletePolicies -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeletePolicies(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureIdentityIntegration +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsConfigureIdentityIntegration(ctx context.Context, awsMountPath string, request schema.AwsConfigureIdentityIntegrationRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/policies" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/identity" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AppRoleDeleteRole -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteRole(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureIdentityWhitelistTidyOperation +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsConfigureIdentityWhitelistTidyOperation(ctx context.Context, awsMountPath string, request schema.AwsConfigureIdentityWhitelistTidyOperationRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-whitelist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AppRoleDeleteSecretIDAccessorDestroy -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteSecretIDAccessorDestroy(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureRoleTagBlacklistTidyOperation +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsConfigureRoleTagBlacklistTidyOperation(ctx context.Context, awsMountPath string, request schema.AwsConfigureRoleTagBlacklistTidyOperationRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-blacklist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AppRoleDeleteSecretIDBoundCIDRs -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteSecretIDBoundCIDRs(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureRoleTagDenyListTidyOperation +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsConfigureRoleTagDenyListTidyOperation(ctx context.Context, awsMountPath string, request schema.AwsConfigureRoleTagDenyListTidyOperationRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-denylist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + + requestQueryParameters := make(url.Values) + + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + a.client, + http.MethodPost, + requestPath, + request, + requestQueryParameters, + requestModifiers, + ) +} + +// AwsDeleteAuthRole +// role: Name of the role. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteAuthRole(ctx context.Context, role string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/auth/{aws_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -1561,17 +1689,18 @@ func (a *Auth) AppRoleDeleteSecretIDBoundCIDRs(ctx context.Context, roleName str ) } -// AppRoleDeleteSecretIDDestroy -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteSecretIDDestroy(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteCertificateConfiguration +// certName: Name of the certificate. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteCertificateConfiguration(ctx context.Context, certName string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id/destroy" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/certificate/{cert_name}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"cert_name"+"}", url.PathEscape(certName), -1) requestQueryParameters := make(url.Values) @@ -1586,17 +1715,16 @@ func (a *Auth) AppRoleDeleteSecretIDDestroy(ctx context.Context, roleName string ) } -// AppRoleDeleteSecretIDNumUses -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteSecretIDNumUses(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteClientConfiguration +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteClientConfiguration(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/client" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) @@ -1611,17 +1739,18 @@ func (a *Auth) AppRoleDeleteSecretIDNumUses(ctx context.Context, roleName string ) } -// AppRoleDeleteSecretIDTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteSecretIDTTL(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteIdentityAccessList +// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteIdentityAccessList(ctx context.Context, instanceId string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/identity-accesslist/{instance_id}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) requestQueryParameters := make(url.Values) @@ -1636,17 +1765,16 @@ func (a *Auth) AppRoleDeleteSecretIDTTL(ctx context.Context, roleName string, op ) } -// AppRoleDeleteTokenBoundCIDRs -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteTokenBoundCIDRs(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteIdentityAccessListTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteIdentityAccessListTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-accesslist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) @@ -1661,17 +1789,18 @@ func (a *Auth) AppRoleDeleteTokenBoundCIDRs(ctx context.Context, roleName string ) } -// AppRoleDeleteTokenMaxTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteTokenMaxTTL(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteIdentityWhitelist +// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteIdentityWhitelist(ctx context.Context, instanceId string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-max-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/identity-whitelist/{instance_id}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) requestQueryParameters := make(url.Values) @@ -1686,17 +1815,16 @@ func (a *Auth) AppRoleDeleteTokenMaxTTL(ctx context.Context, roleName string, op ) } -// AppRoleDeleteTokenNumUses -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteTokenNumUses(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteIdentityWhitelistTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteIdentityWhitelistTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-num-uses" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-whitelist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) @@ -1711,17 +1839,18 @@ func (a *Auth) AppRoleDeleteTokenNumUses(ctx context.Context, roleName string, o ) } -// AppRoleDeleteTokenTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleDeleteTokenTTL(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteRoleTagBlacklist +// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteRoleTagBlacklist(ctx context.Context, roleTag string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist/{role_tag}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) requestQueryParameters := make(url.Values) @@ -1736,23 +1865,23 @@ func (a *Auth) AppRoleDeleteTokenTTL(ctx context.Context, roleName string, optio ) } -// AppRoleListRoles -func (a *Auth) AppRoleListRoles(ctx context.Context, options ...RequestOption) (*Response[schema.AppRoleListRolesResponse], error) { +// AwsDeleteRoleTagBlacklistTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteRoleTagBlacklistTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-blacklist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleListRolesResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1760,25 +1889,25 @@ func (a *Auth) AppRoleListRoles(ctx context.Context, options ...RequestOption) ( ) } -// AppRoleListSecretID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleListSecretID(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleListSecretIDResponse], error) { +// AwsDeleteRoleTagDenyList +// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteRoleTagDenyList(ctx context.Context, roleTag string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist/{role_tag}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleListSecretIDResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1786,47 +1915,49 @@ func (a *Auth) AppRoleListSecretID(ctx context.Context, roleName string, options ) } -// AppRoleLogin -func (a *Auth) AppRoleLogin(ctx context.Context, request schema.AppRoleLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteRoleTagDenyListTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteRoleTagDenyListTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-denylist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleReadBindSecretID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadBindSecretID(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadBindSecretIDResponse], error) { +// AwsDeleteStsRole +// accountId: AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsDeleteStsRole(ctx context.Context, accountId string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bind-secret-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/sts/{account_id}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"account_id"+"}", url.PathEscape(accountId), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[schema.AppRoleReadBindSecretIDResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1834,21 +1965,21 @@ func (a *Auth) AppRoleReadBindSecretID(ctx context.Context, roleName string, opt ) } -// AppRoleReadBoundCIDRList -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadBoundCIDRList(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadBoundCIDRListResponse], error) { +// AwsListAuthRoles +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListAuthRoles(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bound-cidr-list" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadBoundCIDRListResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -1859,21 +1990,21 @@ func (a *Auth) AppRoleReadBoundCIDRList(ctx context.Context, roleName string, op ) } -// AppRoleReadLocalSecretIDs -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadLocalSecretIDs(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadLocalSecretIDsResponse], error) { +// AwsListCertificateConfigurations +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListCertificateConfigurations(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/local-secret-ids" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/certificates" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadLocalSecretIDsResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -1884,21 +2015,21 @@ func (a *Auth) AppRoleReadLocalSecretIDs(ctx context.Context, roleName string, o ) } -// AppRoleReadPeriod -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadPeriod(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadPeriodResponse], error) { +// AwsListIdentityAccessList +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListIdentityAccessList(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/period" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/identity-accesslist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadPeriodResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -1909,21 +2040,21 @@ func (a *Auth) AppRoleReadPeriod(ctx context.Context, roleName string, options . ) } -// AppRoleReadPolicies -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadPolicies(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadPoliciesResponse], error) { +// AwsListIdentityWhitelist +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListIdentityWhitelist(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/policies" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/identity-whitelist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadPoliciesResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -1934,21 +2065,21 @@ func (a *Auth) AppRoleReadPolicies(ctx context.Context, roleName string, options ) } -// AppRoleReadRole -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadRole(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadRoleResponse], error) { +// AwsListRoleTagBlacklists +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListRoleTagBlacklists(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadRoleResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -1959,21 +2090,21 @@ func (a *Auth) AppRoleReadRole(ctx context.Context, roleName string, options ... ) } -// AppRoleReadRoleID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadRoleID(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadRoleIDResponse], error) { +// AwsListRoleTagDenyLists +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListRoleTagDenyLists(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/role-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadRoleIDResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -1984,21 +2115,21 @@ func (a *Auth) AppRoleReadRoleID(ctx context.Context, roleName string, options . ) } -// AppRoleReadSecretIDBoundCIDRs -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadSecretIDBoundCIDRs(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadSecretIDBoundCIDRsResponse], error) { +// AwsListRoles2 +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListRoles2(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadSecretIDBoundCIDRsResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -2009,21 +2140,21 @@ func (a *Auth) AppRoleReadSecretIDBoundCIDRs(ctx context.Context, roleName strin ) } -// AppRoleReadSecretIDNumUses -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadSecretIDNumUses(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadSecretIDNumUsesResponse], error) { +// AwsListStsRoleRelationships +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsListStsRoleRelationships(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/sts" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[schema.AppRoleReadSecretIDNumUsesResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -2034,46 +2165,46 @@ func (a *Auth) AppRoleReadSecretIDNumUses(ctx context.Context, roleName string, ) } -// AppRoleReadSecretIDTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadSecretIDTTL(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadSecretIDTTLResponse], error) { +// AwsLogin +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsLogin(ctx context.Context, awsMountPath string, request schema.AwsLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[schema.AppRoleReadSecretIDTTLResponse]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AppRoleReadTokenBoundCIDRs -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadTokenBoundCIDRs(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadTokenBoundCIDRsResponse], error) { +// AwsReadAuthRole +// role: Name of the role. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadAuthRole(ctx context.Context, role string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[schema.AppRoleReadTokenBoundCIDRsResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -2084,21 +2215,22 @@ func (a *Auth) AppRoleReadTokenBoundCIDRs(ctx context.Context, roleName string, ) } -// AppRoleReadTokenMaxTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadTokenMaxTTL(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadTokenMaxTTLResponse], error) { +// AwsReadCertificateConfiguration +// certName: Name of the certificate. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadCertificateConfiguration(ctx context.Context, certName string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-max-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/certificate/{cert_name}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"cert_name"+"}", url.PathEscape(certName), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[schema.AppRoleReadTokenMaxTTLResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -2109,21 +2241,20 @@ func (a *Auth) AppRoleReadTokenMaxTTL(ctx context.Context, roleName string, opti ) } -// AppRoleReadTokenNumUses -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadTokenNumUses(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadTokenNumUsesResponse], error) { +// AwsReadClientConfiguration +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadClientConfiguration(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-num-uses" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/client" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[schema.AppRoleReadTokenNumUsesResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -2134,21 +2265,22 @@ func (a *Auth) AppRoleReadTokenNumUses(ctx context.Context, roleName string, opt ) } -// AppRoleReadTokenTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleReadTokenTTL(ctx context.Context, roleName string, options ...RequestOption) (*Response[schema.AppRoleReadTokenTTLResponse], error) { +// AwsReadIdentityAccessList +// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadIdentityAccessList(ctx context.Context, instanceId string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/identity-accesslist/{instance_id}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[schema.AppRoleReadTokenTTLResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodGet, @@ -2159,22 +2291,23 @@ func (a *Auth) AppRoleReadTokenTTL(ctx context.Context, roleName string, options ) } -// AppRoleTidySecretID Trigger the clean-up of expired SecretID entries. -func (a *Auth) AppRoleTidySecretID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadIdentityAccessListTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadIdentityAccessListTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/tidy/secret-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-accesslist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2182,246 +2315,244 @@ func (a *Auth) AppRoleTidySecretID(ctx context.Context, options ...RequestOption ) } -// AppRoleWriteBindSecretID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteBindSecretID(ctx context.Context, roleName string, request schema.AppRoleWriteBindSecretIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadIdentityIntegrationConfiguration +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadIdentityIntegrationConfiguration(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bind-secret-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/identity" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteBoundCIDRList -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteBoundCIDRList(ctx context.Context, roleName string, request schema.AppRoleWriteBoundCIDRListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadIdentityWhitelist +// instanceId: EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadIdentityWhitelist(ctx context.Context, instanceId string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/bound-cidr-list" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/identity-whitelist/{instance_id}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"instance_id"+"}", url.PathEscape(instanceId), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteCustomSecretID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteCustomSecretID(ctx context.Context, roleName string, request schema.AppRoleWriteCustomSecretIDRequest, options ...RequestOption) (*Response[schema.AppRoleWriteCustomSecretIDResponse], error) { +// AwsReadIdentityWhitelistTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadIdentityWhitelistTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/custom-secret-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/identity-whitelist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[schema.AppRoleWriteCustomSecretIDResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWritePeriod -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWritePeriod(ctx context.Context, roleName string, request schema.AppRoleWritePeriodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadRoleTagBlacklist +// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadRoleTagBlacklist(ctx context.Context, roleTag string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/period" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist/{role_tag}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWritePolicies -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWritePolicies(ctx context.Context, roleName string, request schema.AppRoleWritePoliciesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadRoleTagBlacklistTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadRoleTagBlacklistTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/policies" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-blacklist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteRole -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteRole(ctx context.Context, roleName string, request schema.AppRoleWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadRoleTagDenyList +// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadRoleTagDenyList(ctx context.Context, roleTag string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist/{role_tag}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteRoleID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteRoleID(ctx context.Context, roleName string, request schema.AppRoleWriteRoleIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadRoleTagDenyListTidySettings +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadRoleTagDenyListTidySettings(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/role-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/tidy/roletag-denylist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteSecretID -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretID(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDRequest, options ...RequestOption) (*Response[schema.AppRoleWriteSecretIDResponse], error) { +// AwsReadStsRole +// accountId: AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsReadStsRole(ctx context.Context, accountId string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/sts/{account_id}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"account_id"+"}", url.PathEscape(accountId), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[schema.AppRoleWriteSecretIDResponse]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteSecretIDAccessorDestroy -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretIDAccessorDestroy(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDAccessorDestroyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsRotateRootCredentials +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsRotateRootCredentials(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/rotate-root" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteSecretIDAccessorLookup -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretIDAccessorLookup(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDAccessorLookupRequest, options ...RequestOption) (*Response[schema.AppRoleWriteSecretIDAccessorLookupResponse], error) { +// AwsTidyIdentityAccessList +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsTidyIdentityAccessList(ctx context.Context, awsMountPath string, request schema.AwsTidyIdentityAccessListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/lookup" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/tidy/identity-accesslist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[schema.AppRoleWriteSecretIDAccessorLookupResponse]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, @@ -2432,17 +2563,16 @@ func (a *Auth) AppRoleWriteSecretIDAccessorLookup(ctx context.Context, roleName ) } -// AppRoleWriteSecretIDBoundCIDRs -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretIDBoundCIDRs(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDBoundCIDRsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsTidyIdentityWhitelist +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsTidyIdentityWhitelist(ctx context.Context, awsMountPath string, request schema.AwsTidyIdentityWhitelistRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/tidy/identity-whitelist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) @@ -2457,17 +2587,16 @@ func (a *Auth) AppRoleWriteSecretIDBoundCIDRs(ctx context.Context, roleName stri ) } -// AppRoleWriteSecretIDDestroy -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretIDDestroy(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDDestroyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsTidyRoleTagBlacklist +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsTidyRoleTagBlacklist(ctx context.Context, awsMountPath string, request schema.AwsTidyRoleTagBlacklistRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id/destroy" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/tidy/roletag-blacklist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) @@ -2482,21 +2611,20 @@ func (a *Auth) AppRoleWriteSecretIDDestroy(ctx context.Context, roleName string, ) } -// AppRoleWriteSecretIDLookup -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretIDLookup(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDLookupRequest, options ...RequestOption) (*Response[schema.AppRoleWriteSecretIDLookupResponse], error) { +// AwsTidyRoleTagDenyList +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsTidyRoleTagDenyList(ctx context.Context, awsMountPath string, request schema.AwsTidyRoleTagDenyListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id/lookup" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/tidy/roletag-denylist" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[schema.AppRoleWriteSecretIDLookupResponse]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, @@ -2507,17 +2635,18 @@ func (a *Auth) AppRoleWriteSecretIDLookup(ctx context.Context, roleName string, ) } -// AppRoleWriteSecretIDNumUses -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretIDNumUses(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDNumUsesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsWriteAuthRole +// role: Name of the role. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsWriteAuthRole(ctx context.Context, role string, awsMountPath string, request schema.AwsWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -2532,17 +2661,18 @@ func (a *Auth) AppRoleWriteSecretIDNumUses(ctx context.Context, roleName string, ) } -// AppRoleWriteSecretIDTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteSecretIDTTL(ctx context.Context, roleName string, request schema.AppRoleWriteSecretIDTTLRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsWriteRoleTag +// role: Name of the role. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsWriteRoleTag(ctx context.Context, role string, awsMountPath string, request schema.AwsWriteRoleTagRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/secret-id-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/role/{role}/tag" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -2557,67 +2687,70 @@ func (a *Auth) AppRoleWriteSecretIDTTL(ctx context.Context, roleName string, req ) } -// AppRoleWriteTokenBoundCIDRs -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteTokenBoundCIDRs(ctx context.Context, roleName string, request schema.AppRoleWriteTokenBoundCIDRsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsWriteRoleTagBlacklist +// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsWriteRoleTagBlacklist(ctx context.Context, roleTag string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-blacklist/{role_tag}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteTokenMaxTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteTokenMaxTTL(ctx context.Context, roleName string, request schema.AppRoleWriteTokenMaxTTLRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsWriteRoleTagDenyList +// roleTag: Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsWriteRoleTagDenyList(ctx context.Context, roleTag string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-max-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/roletag-denylist/{role_tag}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"role_tag"+"}", url.PathEscape(roleTag), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AppRoleWriteTokenNumUses -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteTokenNumUses(ctx context.Context, roleName string, request schema.AppRoleWriteTokenNumUsesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsWriteStsRole +// accountId: AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. +// awsMountPath: Path that the backend was mounted at +func (a *Auth) AwsWriteStsRole(ctx context.Context, accountId string, awsMountPath string, request schema.AwsWriteStsRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-num-uses" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{aws_mount_path}/config/sts/{account_id}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"account_id"+"}", url.PathEscape(accountId), -1) requestQueryParameters := make(url.Values) @@ -2632,17 +2765,16 @@ func (a *Auth) AppRoleWriteTokenNumUses(ctx context.Context, roleName string, re ) } -// AppRoleWriteTokenTTL -// roleName: Name of the role. Must be less than 4096 bytes. -func (a *Auth) AppRoleWriteTokenTTL(ctx context.Context, roleName string, request schema.AppRoleWriteTokenTTLRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureConfigureAuth +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureConfigureAuth(ctx context.Context, azureMountPath string, request schema.AzureConfigureAuthRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{approle_mount_path}/role/{role_name}/token-ttl" - requestPath = strings.Replace(requestPath, "{"+"approle_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("approle")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/{azure_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestQueryParameters := make(url.Values) @@ -2657,8 +2789,9 @@ func (a *Auth) AppRoleWriteTokenTTL(ctx context.Context, roleName string, reques ) } -// AzureDeleteAuthConfig -func (a *Auth) AzureDeleteAuthConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureDeleteAuthConfiguration +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureDeleteAuthConfiguration(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2682,7 +2815,8 @@ func (a *Auth) AzureDeleteAuthConfig(ctx context.Context, options ...RequestOpti // AzureDeleteAuthRole // name: Name of the role. -func (a *Auth) AzureDeleteAuthRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureDeleteAuthRole(ctx context.Context, name string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2706,7 +2840,8 @@ func (a *Auth) AzureDeleteAuthRole(ctx context.Context, name string, options ... } // AzureListAuthRoles -func (a *Auth) AzureListAuthRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureListAuthRoles(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2730,7 +2865,8 @@ func (a *Auth) AzureListAuthRoles(ctx context.Context, options ...RequestOption) } // AzureLogin -func (a *Auth) AzureLogin(ctx context.Context, request schema.AzureLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureLogin(ctx context.Context, azureMountPath string, request schema.AzureLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2752,8 +2888,9 @@ func (a *Auth) AzureLogin(ctx context.Context, request schema.AzureLoginRequest, ) } -// AzureReadAuthConfig -func (a *Auth) AzureReadAuthConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureReadAuthConfiguration +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureReadAuthConfiguration(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2777,7 +2914,8 @@ func (a *Auth) AzureReadAuthConfig(ctx context.Context, options ...RequestOption // AzureReadAuthRole // name: Name of the role. -func (a *Auth) AzureReadAuthRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureReadAuthRole(ctx context.Context, name string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2800,24 +2938,25 @@ func (a *Auth) AzureReadAuthRole(ctx context.Context, name string, options ...Re ) } -// AzureWriteAuthConfig -func (a *Auth) AzureWriteAuthConfig(ctx context.Context, request schema.AzureWriteAuthConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureRotateRootCredentials +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureRotateRootCredentials(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{azure_mount_path}/config" + requestPath := "/v1/auth/{azure_mount_path}/rotate-root" requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) @@ -2825,7 +2964,8 @@ func (a *Auth) AzureWriteAuthConfig(ctx context.Context, request schema.AzureWri // AzureWriteAuthRole // name: Name of the role. -func (a *Auth) AzureWriteAuthRole(ctx context.Context, name string, request schema.AzureWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// azureMountPath: Path that the backend was mounted at +func (a *Auth) AzureWriteAuthRole(ctx context.Context, name string, azureMountPath string, request schema.AzureWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2848,8 +2988,33 @@ func (a *Auth) AzureWriteAuthRole(ctx context.Context, name string, request sche ) } +// CentrifyConfigure +// centrifyMountPath: Path that the backend was mounted at +func (a *Auth) CentrifyConfigure(ctx context.Context, centrifyMountPath string, request schema.CentrifyConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/auth/{centrify_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"centrify_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("centrify")), -1) + + requestQueryParameters := make(url.Values) + + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + a.client, + http.MethodPost, + requestPath, + request, + requestQueryParameters, + requestModifiers, + ) +} + // CentrifyLogin Log in with a username and password. -func (a *Auth) CentrifyLogin(ctx context.Context, request schema.CentrifyLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// centrifyMountPath: Path that the backend was mounted at +func (a *Auth) CentrifyLogin(ctx context.Context, centrifyMountPath string, request schema.CentrifyLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2871,8 +3036,9 @@ func (a *Auth) CentrifyLogin(ctx context.Context, request schema.CentrifyLoginRe ) } -// CentrifyReadConfig This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users. -func (a *Auth) CentrifyReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CentrifyReadConfiguration +// centrifyMountPath: Path that the backend was mounted at +func (a *Auth) CentrifyReadConfiguration(ctx context.Context, centrifyMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2894,15 +3060,16 @@ func (a *Auth) CentrifyReadConfig(ctx context.Context, options ...RequestOption) ) } -// CentrifyWriteConfig This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users. -func (a *Auth) CentrifyWriteConfig(ctx context.Context, request schema.CentrifyWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CertConfigure +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertConfigure(ctx context.Context, certMountPath string, request schema.CertConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{centrify_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"centrify_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("centrify")), -1) + requestPath := "/v1/auth/{cert_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"cert_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cert")), -1) requestQueryParameters := make(url.Values) @@ -2917,9 +3084,10 @@ func (a *Auth) CentrifyWriteConfig(ctx context.Context, request schema.CentrifyW ) } -// CertificatesDelete Manage trusted certificates used for authentication. +// CertDeleteCertificate Manage trusted certificates used for authentication. // name: The name of the certificate -func (a *Auth) CertificatesDelete(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertDeleteCertificate(ctx context.Context, name string, certMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2942,9 +3110,10 @@ func (a *Auth) CertificatesDelete(ctx context.Context, name string, options ...R ) } -// CertificatesDeleteCRL Manage Certificate Revocation Lists checked during authentication. +// CertDeleteCrl Manage Certificate Revocation Lists checked during authentication. // name: The name of the certificate -func (a *Auth) CertificatesDeleteCRL(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertDeleteCrl(ctx context.Context, name string, certMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2967,8 +3136,9 @@ func (a *Auth) CertificatesDeleteCRL(ctx context.Context, name string, options . ) } -// CertificatesList Manage trusted certificates used for authentication. -func (a *Auth) CertificatesList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CertListCertificates Manage trusted certificates used for authentication. +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertListCertificates(ctx context.Context, certMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2991,8 +3161,9 @@ func (a *Auth) CertificatesList(ctx context.Context, options ...RequestOption) ( ) } -// CertificatesListCRLs -func (a *Auth) CertificatesListCRLs(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CertListCrls +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertListCrls(ctx context.Context, certMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3015,8 +3186,9 @@ func (a *Auth) CertificatesListCRLs(ctx context.Context, options ...RequestOptio ) } -// CertificatesLogin -func (a *Auth) CertificatesLogin(ctx context.Context, request schema.CertificatesLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CertLogin +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertLogin(ctx context.Context, certMountPath string, request schema.CertLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3038,9 +3210,10 @@ func (a *Auth) CertificatesLogin(ctx context.Context, request schema.Certificate ) } -// CertificatesRead Manage trusted certificates used for authentication. +// CertReadCertificate Manage trusted certificates used for authentication. // name: The name of the certificate -func (a *Auth) CertificatesRead(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertReadCertificate(ctx context.Context, name string, certMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3063,17 +3236,16 @@ func (a *Auth) CertificatesRead(ctx context.Context, name string, options ...Req ) } -// CertificatesReadCRL Manage Certificate Revocation Lists checked during authentication. -// name: The name of the certificate -func (a *Auth) CertificatesReadCRL(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CertReadConfiguration +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertReadConfiguration(ctx context.Context, certMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{cert_mount_path}/crls/{name}" + requestPath := "/v1/auth/{cert_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"cert_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cert")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -3088,15 +3260,18 @@ func (a *Auth) CertificatesReadCRL(ctx context.Context, name string, options ... ) } -// CertificatesReadConfig -func (a *Auth) CertificatesReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CertReadCrl Manage Certificate Revocation Lists checked during authentication. +// name: The name of the certificate +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertReadCrl(ctx context.Context, name string, certMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{cert_mount_path}/config" + requestPath := "/v1/auth/{cert_mount_path}/crls/{name}" requestPath = strings.Replace(requestPath, "{"+"cert_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cert")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -3111,9 +3286,10 @@ func (a *Auth) CertificatesReadConfig(ctx context.Context, options ...RequestOpt ) } -// CertificatesWrite Manage trusted certificates used for authentication. +// CertWriteCertificate Manage trusted certificates used for authentication. // name: The name of the certificate -func (a *Auth) CertificatesWrite(ctx context.Context, name string, request schema.CertificatesWriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertWriteCertificate(ctx context.Context, name string, certMountPath string, request schema.CertWriteCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3136,9 +3312,10 @@ func (a *Auth) CertificatesWrite(ctx context.Context, name string, request schem ) } -// CertificatesWriteCRL Manage Certificate Revocation Lists checked during authentication. +// CertWriteCrl Manage Certificate Revocation Lists checked during authentication. // name: The name of the certificate -func (a *Auth) CertificatesWriteCRL(ctx context.Context, name string, request schema.CertificatesWriteCRLRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// certMountPath: Path that the backend was mounted at +func (a *Auth) CertWriteCrl(ctx context.Context, name string, certMountPath string, request schema.CertWriteCrlRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3161,31 +3338,9 @@ func (a *Auth) CertificatesWriteCRL(ctx context.Context, name string, request sc ) } -// CertificatesWriteConfig -func (a *Auth) CertificatesWriteConfig(ctx context.Context, request schema.CertificatesWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{cert_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"cert_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cert")), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// CloudFoundryDeleteConfig -func (a *Auth) CloudFoundryDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryConfigure +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryConfigure(ctx context.Context, cfMountPath string, request schema.CloudFoundryConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3196,78 +3351,6 @@ func (a *Auth) CloudFoundryDeleteConfig(ctx context.Context, options ...RequestO requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodDelete, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// CloudFoundryDeleteRole -// role: The name of the role. -func (a *Auth) CloudFoundryDeleteRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{cf_mount_path}/roles/{role}" - requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodDelete, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// CloudFoundryListRoles -func (a *Auth) CloudFoundryListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{cf_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) - - requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// CloudFoundryLogin -func (a *Auth) CloudFoundryLogin(ctx context.Context, request schema.CloudFoundryLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{cf_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) - - requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, @@ -3279,8 +3362,9 @@ func (a *Auth) CloudFoundryLogin(ctx context.Context, request schema.CloudFoundr ) } -// CloudFoundryReadConfig -func (a *Auth) CloudFoundryReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryDeleteConfiguration +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryDeleteConfiguration(ctx context.Context, cfMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3294,98 +3378,26 @@ func (a *Auth) CloudFoundryReadConfig(ctx context.Context, options ...RequestOpt return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// CloudFoundryReadRole -// role: The name of the role. -func (a *Auth) CloudFoundryReadRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{cf_mount_path}/roles/{role}" - requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// CloudFoundryWriteConfig -func (a *Auth) CloudFoundryWriteConfig(ctx context.Context, request schema.CloudFoundryWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{cf_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// CloudFoundryWriteRole -// role: The name of the role. -func (a *Auth) CloudFoundryWriteRole(ctx context.Context, role string, request schema.CloudFoundryWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{cf_mount_path}/roles/{role}" - requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GitHubDeleteMapTeam Read/write/delete a single teams mapping -// key: Key for the teams mapping -func (a *Auth) GitHubDeleteMapTeam(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryDeleteRole +// role: The name of the role. +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryDeleteRole(ctx context.Context, role string, cfMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/teams/{key}" - requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) + requestPath := "/v1/auth/{cf_mount_path}/roles/{role}" + requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -3400,24 +3412,24 @@ func (a *Auth) GitHubDeleteMapTeam(ctx context.Context, key string, options ...R ) } -// GitHubDeleteMapUser Read/write/delete a single users mapping -// key: Key for the users mapping -func (a *Auth) GitHubDeleteMapUser(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryListRoles +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryListRoles(ctx context.Context, cfMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/users/{key}" - requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) + requestPath := "/v1/auth/{cf_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -3425,15 +3437,16 @@ func (a *Auth) GitHubDeleteMapUser(ctx context.Context, key string, options ...R ) } -// GitHubLogin -func (a *Auth) GitHubLogin(ctx context.Context, request schema.GitHubLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryLogin +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryLogin(ctx context.Context, cfMountPath string, request schema.CloudFoundryLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath := "/v1/auth/{cf_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) requestQueryParameters := make(url.Values) @@ -3448,15 +3461,16 @@ func (a *Auth) GitHubLogin(ctx context.Context, request schema.GitHubLoginReques ) } -// GitHubReadConfig -func (a *Auth) GitHubReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryReadConfiguration +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryReadConfiguration(ctx context.Context, cfMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath := "/v1/auth/{cf_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) requestQueryParameters := make(url.Values) @@ -3471,17 +3485,18 @@ func (a *Auth) GitHubReadConfig(ctx context.Context, options ...RequestOption) ( ) } -// GitHubReadMapTeam Read/write/delete a single teams mapping -// key: Key for the teams mapping -func (a *Auth) GitHubReadMapTeam(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryReadRole +// role: The name of the role. +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryReadRole(ctx context.Context, role string, cfMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/teams/{key}" - requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) + requestPath := "/v1/auth/{cf_mount_path}/roles/{role}" + requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -3496,72 +3511,75 @@ func (a *Auth) GitHubReadMapTeam(ctx context.Context, key string, options ...Req ) } -// GitHubReadMapTeams Read mappings for teams -func (a *Auth) GitHubReadMapTeams(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CloudFoundryWriteRole +// role: The name of the role. +// cfMountPath: Path that the backend was mounted at +func (a *Auth) CloudFoundryWriteRole(ctx context.Context, role string, cfMountPath string, request schema.CloudFoundryWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/teams" - requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath := "/v1/auth/{cf_mount_path}/roles/{role}" + requestPath = strings.Replace(requestPath, "{"+"cf_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cf")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GitHubReadMapUser Read/write/delete a single users mapping -// key: Key for the users mapping -func (a *Auth) GitHubReadMapUser(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubConfigure +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubConfigure(ctx context.Context, githubMountPath string, request schema.GithubConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/users/{key}" + requestPath := "/v1/auth/{github_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GitHubReadMapUsers Read mappings for users -func (a *Auth) GitHubReadMapUsers(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubDeleteTeamMapping Read/write/delete a single teams mapping +// key: Key for the teams mapping +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubDeleteTeamMapping(ctx context.Context, key string, githubMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/users" + requestPath := "/v1/auth/{github_mount_path}/map/teams/{key}" requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -3569,40 +3587,42 @@ func (a *Auth) GitHubReadMapUsers(ctx context.Context, options ...RequestOption) ) } -// GitHubWriteConfig -func (a *Auth) GitHubWriteConfig(ctx context.Context, request schema.GitHubWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubDeleteUserMapping Read/write/delete a single users mapping +// key: Key for the users mapping +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubDeleteUserMapping(ctx context.Context, key string, githubMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/config" + requestPath := "/v1/auth/{github_mount_path}/map/users/{key}" requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GitHubWriteMapTeam Read/write/delete a single teams mapping -// key: Key for the teams mapping -func (a *Auth) GitHubWriteMapTeam(ctx context.Context, key string, request schema.GitHubWriteMapTeamRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubLogin +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubLogin(ctx context.Context, githubMountPath string, request schema.GithubLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/teams/{key}" + requestPath := "/v1/auth/{github_mount_path}/login" requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) @@ -3617,49 +3637,49 @@ func (a *Auth) GitHubWriteMapTeam(ctx context.Context, key string, request schem ) } -// GitHubWriteMapUser Read/write/delete a single users mapping -// key: Key for the users mapping -func (a *Auth) GitHubWriteMapUser(ctx context.Context, key string, request schema.GitHubWriteMapUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubReadConfiguration +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubReadConfiguration(ctx context.Context, githubMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{github_mount_path}/map/users/{key}" + requestPath := "/v1/auth/{github_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GoogleCloudDeleteRole Create a GCP role with associated policies and required attributes. -// name: Name of the role. -func (a *Auth) GoogleCloudDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubReadTeamMapping Read/write/delete a single teams mapping +// key: Key for the teams mapping +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubReadTeamMapping(ctx context.Context, key string, githubMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{gcp_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{github_mount_path}/map/teams/{key}" + requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -3667,15 +3687,16 @@ func (a *Auth) GoogleCloudDeleteRole(ctx context.Context, name string, options . ) } -// GoogleCloudListRoles Lists all the roles that are registered with Vault. -func (a *Auth) GoogleCloudListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubReadTeams Read mappings for teams +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubReadTeams(ctx context.Context, githubMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{gcp_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath := "/v1/auth/{github_mount_path}/map/teams" + requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -3691,18 +3712,20 @@ func (a *Auth) GoogleCloudListRoles(ctx context.Context, options ...RequestOptio ) } -// GoogleCloudListRoles2 Lists all the roles that are registered with Vault. -func (a *Auth) GoogleCloudListRoles2(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubReadUserMapping Read/write/delete a single users mapping +// key: Key for the users mapping +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubReadUserMapping(ctx context.Context, key string, githubMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{gcp_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath := "/v1/auth/{github_mount_path}/map/users/{key}" + requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -3715,79 +3738,86 @@ func (a *Auth) GoogleCloudListRoles2(ctx context.Context, options ...RequestOpti ) } -// GoogleCloudLogin -func (a *Auth) GoogleCloudLogin(ctx context.Context, request schema.GoogleCloudLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubReadUsers Read mappings for users +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubReadUsers(ctx context.Context, githubMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{gcp_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath := "/v1/auth/{github_mount_path}/map/users" + requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GoogleCloudReadAuthConfig Configure credentials used to query the GCP IAM API to verify authenticating service accounts -func (a *Auth) GoogleCloudReadAuthConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubWriteTeamMapping Read/write/delete a single teams mapping +// key: Key for the teams mapping +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubWriteTeamMapping(ctx context.Context, key string, githubMountPath string, request schema.GithubWriteTeamMappingRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{gcp_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath := "/v1/auth/{github_mount_path}/map/teams/{key}" + requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GoogleCloudReadRole Create a GCP role with associated policies and required attributes. -// name: Name of the role. -func (a *Auth) GoogleCloudReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GithubWriteUserMapping Read/write/delete a single users mapping +// key: Key for the users mapping +// githubMountPath: Path that the backend was mounted at +func (a *Auth) GithubWriteUserMapping(ctx context.Context, key string, githubMountPath string, request schema.GithubWriteUserMappingRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{gcp_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{github_mount_path}/map/users/{key}" + requestPath = strings.Replace(requestPath, "{"+"github_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("github")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GoogleCloudWriteAuthConfig Configure credentials used to query the GCP IAM API to verify authenticating service accounts -func (a *Auth) GoogleCloudWriteAuthConfig(ctx context.Context, request schema.GoogleCloudWriteAuthConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudConfigureAuth +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudConfigureAuth(ctx context.Context, gcpMountPath string, request schema.GoogleCloudConfigureAuthRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3809,9 +3839,10 @@ func (a *Auth) GoogleCloudWriteAuthConfig(ctx context.Context, request schema.Go ) } -// GoogleCloudWriteRole Create a GCP role with associated policies and required attributes. +// GoogleCloudDeleteRole Create a GCP role with associated policies and required attributes. // name: Name of the role. -func (a *Auth) GoogleCloudWriteRole(ctx context.Context, name string, request schema.GoogleCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudDeleteRole(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3823,20 +3854,21 @@ func (a *Auth) GoogleCloudWriteRole(ctx context.Context, name string, request sc requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GoogleCloudWriteRoleLabels Add or remove labels for an existing 'gce' role +// GoogleCloudEditLabelsForRole Add or remove labels for an existing 'gce' role // name: Name of the role. -func (a *Auth) GoogleCloudWriteRoleLabels(ctx context.Context, name string, request schema.GoogleCloudWriteRoleLabelsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudEditLabelsForRole(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudEditLabelsForRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3859,9 +3891,10 @@ func (a *Auth) GoogleCloudWriteRoleLabels(ctx context.Context, name string, requ ) } -// GoogleCloudWriteRoleServiceAccounts Add or remove service accounts for an existing `iam` role +// GoogleCloudEditServiceAccountsForRole Add or remove service accounts for an existing `iam` role // name: Name of the role. -func (a *Auth) GoogleCloudWriteRoleServiceAccounts(ctx context.Context, name string, request schema.GoogleCloudWriteRoleServiceAccountsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudEditServiceAccountsForRole(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudEditServiceAccountsForRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3884,24 +3917,24 @@ func (a *Auth) GoogleCloudWriteRoleServiceAccounts(ctx context.Context, name str ) } -// JWTDeleteRole Delete an existing role. -// name: Name of the role. -func (a *Auth) JWTDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListRoles Lists all the roles that are registered with Vault. +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudListRoles(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{gcp_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -3909,16 +3942,16 @@ func (a *Auth) JWTDeleteRole(ctx context.Context, name string, options ...Reques ) } -// JWTListRoles Lists all the roles registered with the backend. -// The list will contain the names of the roles. -func (a *Auth) JWTListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListRoles2 Lists all the roles that are registered with Vault. +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudListRoles2(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath := "/v1/auth/{gcp_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -3934,15 +3967,16 @@ func (a *Auth) JWTListRoles(ctx context.Context, options ...RequestOption) (*Res ) } -// JWTLogin Authenticates to Vault using a JWT (or OIDC) token. -func (a *Auth) JWTLogin(ctx context.Context, request schema.JWTLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudLogin +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudLogin(ctx context.Context, gcpMountPath string, request schema.GoogleCloudLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath := "/v1/auth/{gcp_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) @@ -3957,38 +3991,16 @@ func (a *Auth) JWTLogin(ctx context.Context, request schema.JWTLoginRequest, opt ) } -// JWTReadConfig Read the current JWT authentication backend configuration. -func (a *Auth) JWTReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{jwt_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// JWTReadOIDCCallback Callback endpoint to complete an OIDC login. -func (a *Auth) JWTReadOIDCCallback(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudReadAuthConfiguration +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudReadAuthConfiguration(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/oidc/callback" - requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath := "/v1/auth/{gcp_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) @@ -4003,16 +4015,17 @@ func (a *Auth) JWTReadOIDCCallback(ctx context.Context, options ...RequestOption ) } -// JWTReadRole Read an existing role. +// GoogleCloudReadRole Create a GCP role with associated policies and required attributes. // name: Name of the role. -func (a *Auth) JWTReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudReadRole(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath := "/v1/auth/{gcp_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4028,16 +4041,18 @@ func (a *Auth) JWTReadRole(ctx context.Context, name string, options ...RequestO ) } -// JWTWriteConfig Configure the JWT authentication backend. -// The JWT authentication backend validates JWTs (or OIDC) using the configured credentials. If using OIDC Discovery, the URL must be provided, along with (optionally) the CA cert to use for the connection. If performing JWT validation locally, a set of public keys must be provided. -func (a *Auth) JWTWriteConfig(ctx context.Context, request schema.JWTWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudWriteRole Create a GCP role with associated policies and required attributes. +// name: Name of the role. +// gcpMountPath: Path that the backend was mounted at +func (a *Auth) GoogleCloudWriteRole(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath := "/v1/auth/{gcp_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4052,14 +4067,16 @@ func (a *Auth) JWTWriteConfig(ctx context.Context, request schema.JWTWriteConfig ) } -// JWTWriteOIDCAuthURL Request an authorization URL to start an OIDC login flow. -func (a *Auth) JWTWriteOIDCAuthURL(ctx context.Context, request schema.JWTWriteOIDCAuthURLRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtConfigure Configure the JWT authentication backend. +// The JWT authentication backend validates JWTs (or OIDC) using the configured credentials. If using OIDC Discovery, the URL must be provided, along with (optionally) the CA cert to use for the connection. If performing JWT validation locally, a set of public keys must be provided. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtConfigure(ctx context.Context, jwtMountPath string, request schema.JwtConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/oidc/auth_url" + requestPath := "/v1/auth/{jwt_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) requestQueryParameters := make(url.Values) @@ -4075,92 +4092,94 @@ func (a *Auth) JWTWriteOIDCAuthURL(ctx context.Context, request schema.JWTWriteO ) } -// JWTWriteOIDCCallback Callback endpoint to handle form_posts. -func (a *Auth) JWTWriteOIDCCallback(ctx context.Context, request schema.JWTWriteOIDCCallbackRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtDeleteRole Delete an existing role. +// name: Name of the role. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtDeleteRole(ctx context.Context, name string, jwtMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/oidc/callback" + requestPath := "/v1/auth/{jwt_mount_path}/role/{name}" requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// JWTWriteRole Register an role with the backend. -// A role is required to authenticate with this backend. The role binds JWT token information with token policies and settings. The bindings, token polices and token settings can all be configured using this endpoint -// name: Name of the role. -func (a *Auth) JWTWriteRole(ctx context.Context, name string, request schema.JWTWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtListRoles Lists all the roles registered with the backend. +// The list will contain the names of the roles. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtListRoles(ctx context.Context, jwtMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{jwt_mount_path}/role/{name}" + requestPath := "/v1/auth/{jwt_mount_path}/role" requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// KerberosDeleteGroup -// name: Name of the LDAP group. -func (a *Auth) KerberosDeleteGroup(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtLogin Authenticates to Vault using a JWT (or OIDC) token. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtLogin(ctx context.Context, jwtMountPath string, request schema.JwtLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/groups/{name}" - requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{jwt_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// KerberosListGroups -func (a *Auth) KerberosListGroups(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtOidcCallback Callback endpoint to complete an OIDC login. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtOidcCallback(ctx context.Context, jwtMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/groups" - requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) + requestPath := "/v1/auth/{jwt_mount_path}/oidc/callback" + requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -4173,15 +4192,16 @@ func (a *Auth) KerberosListGroups(ctx context.Context, options ...RequestOption) ) } -// KerberosLogin -func (a *Auth) KerberosLogin(ctx context.Context, request schema.KerberosLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtOidcCallbackWithParameters Callback endpoint to handle form_posts. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtOidcCallbackWithParameters(ctx context.Context, jwtMountPath string, request schema.JwtOidcCallbackWithParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) + requestPath := "/v1/auth/{jwt_mount_path}/oidc/callback" + requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) requestQueryParameters := make(url.Values) @@ -4196,40 +4216,40 @@ func (a *Auth) KerberosLogin(ctx context.Context, request schema.KerberosLoginRe ) } -// KerberosReadConfig -func (a *Auth) KerberosReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtOidcRequestAuthorizationUrl Request an authorization URL to start an OIDC login flow. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtOidcRequestAuthorizationUrl(ctx context.Context, jwtMountPath string, request schema.JwtOidcRequestAuthorizationUrlRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) + requestPath := "/v1/auth/{jwt_mount_path}/oidc/auth_url" + requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// KerberosReadGroup -// name: Name of the LDAP group. -func (a *Auth) KerberosReadGroup(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtReadConfiguration Read the current JWT authentication backend configuration. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtReadConfiguration(ctx context.Context, jwtMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/groups/{name}" - requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{jwt_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) requestQueryParameters := make(url.Values) @@ -4244,15 +4264,18 @@ func (a *Auth) KerberosReadGroup(ctx context.Context, name string, options ...Re ) } -// KerberosReadLDAPConfig -func (a *Auth) KerberosReadLDAPConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtReadRole Read an existing role. +// name: Name of the role. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtReadRole(ctx context.Context, name string, jwtMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/config/ldap" - requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) + requestPath := "/v1/auth/{jwt_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4267,15 +4290,19 @@ func (a *Auth) KerberosReadLDAPConfig(ctx context.Context, options ...RequestOpt ) } -// KerberosWriteConfig -func (a *Auth) KerberosWriteConfig(ctx context.Context, request schema.KerberosWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// JwtWriteRole Register an role with the backend. +// A role is required to authenticate with this backend. The role binds JWT token information with token policies and settings. The bindings, token polices and token settings can all be configured using this endpoint +// name: Name of the role. +// jwtMountPath: Path that the backend was mounted at +func (a *Auth) JwtWriteRole(ctx context.Context, name string, jwtMountPath string, request schema.JwtWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) + requestPath := "/v1/auth/{jwt_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"jwt_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("jwt")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4290,17 +4317,16 @@ func (a *Auth) KerberosWriteConfig(ctx context.Context, request schema.KerberosW ) } -// KerberosWriteGroup -// name: Name of the LDAP group. -func (a *Auth) KerberosWriteGroup(ctx context.Context, name string, request schema.KerberosWriteGroupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosConfigure +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosConfigure(ctx context.Context, kerberosMountPath string, request schema.KerberosConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kerberos_mount_path}/groups/{name}" + requestPath := "/v1/auth/{kerberos_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4315,8 +4341,9 @@ func (a *Auth) KerberosWriteGroup(ctx context.Context, name string, request sche ) } -// KerberosWriteLDAPConfig -func (a *Auth) KerberosWriteLDAPConfig(ctx context.Context, request schema.KerberosWriteLDAPConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosConfigureLdap +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosConfigureLdap(ctx context.Context, kerberosMountPath string, request schema.KerberosConfigureLdapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4338,16 +4365,17 @@ func (a *Auth) KerberosWriteLDAPConfig(ctx context.Context, request schema.Kerbe ) } -// KubernetesDeleteAuthRole Register an role with the backend. -// name: Name of the role. -func (a *Auth) KubernetesDeleteAuthRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosDeleteGroup +// name: Name of the LDAP group. +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosDeleteGroup(ctx context.Context, name string, kerberosMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kubernetes_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/groups/{name}" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4363,15 +4391,16 @@ func (a *Auth) KubernetesDeleteAuthRole(ctx context.Context, name string, option ) } -// KubernetesListAuthRoles Lists all the roles registered with the backend. -func (a *Auth) KubernetesListAuthRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosListGroups +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosListGroups(ctx context.Context, kerberosMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kubernetes_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/groups" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -4387,15 +4416,16 @@ func (a *Auth) KubernetesListAuthRoles(ctx context.Context, options ...RequestOp ) } -// KubernetesLogin Authenticates Kubernetes service accounts with Vault. -func (a *Auth) KubernetesLogin(ctx context.Context, request schema.KubernetesLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosLogin +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosLogin(ctx context.Context, kerberosMountPath string, request schema.KerberosLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kubernetes_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) requestQueryParameters := make(url.Values) @@ -4410,15 +4440,16 @@ func (a *Auth) KubernetesLogin(ctx context.Context, request schema.KubernetesLog ) } -// KubernetesReadAuthConfig Configures the JWT Public Key and Kubernetes API information. -func (a *Auth) KubernetesReadAuthConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosLogin2 +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosLogin2(ctx context.Context, kerberosMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kubernetes_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) requestQueryParameters := make(url.Values) @@ -4433,17 +4464,16 @@ func (a *Auth) KubernetesReadAuthConfig(ctx context.Context, options ...RequestO ) } -// KubernetesReadAuthRole Register an role with the backend. -// name: Name of the role. -func (a *Auth) KubernetesReadAuthRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosReadConfiguration +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosReadConfiguration(ctx context.Context, kerberosMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kubernetes_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) requestQueryParameters := make(url.Values) @@ -4458,121 +4488,125 @@ func (a *Auth) KubernetesReadAuthRole(ctx context.Context, name string, options ) } -// KubernetesWriteAuthConfig Configures the JWT Public Key and Kubernetes API information. -func (a *Auth) KubernetesWriteAuthConfig(ctx context.Context, request schema.KubernetesWriteAuthConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosReadGroup +// name: Name of the LDAP group. +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosReadGroup(ctx context.Context, name string, kerberosMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kubernetes_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/groups/{name}" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// KubernetesWriteAuthRole Register an role with the backend. -// name: Name of the role. -func (a *Auth) KubernetesWriteAuthRole(ctx context.Context, name string, request schema.KubernetesWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KerberosReadLdapConfiguration +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosReadLdapConfiguration(ctx context.Context, kerberosMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{kubernetes_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/config/ldap" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// LDAPDeleteGroup Manage additional groups for users allowed to authenticate. +// KerberosWriteGroup // name: Name of the LDAP group. -func (a *Auth) LDAPDeleteGroup(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// kerberosMountPath: Path that the backend was mounted at +func (a *Auth) KerberosWriteGroup(ctx context.Context, name string, kerberosMountPath string, request schema.KerberosWriteGroupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/groups/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/auth/{kerberos_mount_path}/groups/{name}" + requestPath = strings.Replace(requestPath, "{"+"kerberos_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kerberos")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPDeleteUser Manage users allowed to authenticate. -// name: Name of the LDAP user. -func (a *Auth) LDAPDeleteUser(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesConfigureAuth +// kubernetesMountPath: Path that the backend was mounted at +func (a *Auth) KubernetesConfigureAuth(ctx context.Context, kubernetesMountPath string, request schema.KubernetesConfigureAuthRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/users/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{kubernetes_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPListGroups Manage additional groups for users allowed to authenticate. -func (a *Auth) LDAPListGroups(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesDeleteAuthRole Register an role with the backend. +// name: Name of the role. +// kubernetesMountPath: Path that the backend was mounted at +func (a *Auth) KubernetesDeleteAuthRole(ctx context.Context, name string, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/groups" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/auth/{kubernetes_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -4580,15 +4614,16 @@ func (a *Auth) LDAPListGroups(ctx context.Context, options ...RequestOption) (*R ) } -// LDAPListUsers Manage users allowed to authenticate. -func (a *Auth) LDAPListUsers(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesListAuthRoles Lists all the roles registered with the backend. +// kubernetesMountPath: Path that the backend was mounted at +func (a *Auth) KubernetesListAuthRoles(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/users" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/auth/{kubernetes_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -4604,17 +4639,16 @@ func (a *Auth) LDAPListUsers(ctx context.Context, options ...RequestOption) (*Re ) } -// LDAPLogin Log in with a username and password. -// username: DN (distinguished name) to be used for login. -func (a *Auth) LDAPLogin(ctx context.Context, username string, request schema.LDAPLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesLogin Authenticates Kubernetes service accounts with Vault. +// kubernetesMountPath: Path that the backend was mounted at +func (a *Auth) KubernetesLogin(ctx context.Context, kubernetesMountPath string, request schema.KubernetesLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/login/{username}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"username"+"}", url.PathEscape(username), -1) + requestPath := "/v1/auth/{kubernetes_mount_path}/login" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestQueryParameters := make(url.Values) @@ -4629,15 +4663,16 @@ func (a *Auth) LDAPLogin(ctx context.Context, username string, request schema.LD ) } -// LDAPReadAuthConfig Configure the LDAP server to connect to, along with its options. -func (a *Auth) LDAPReadAuthConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesReadAuthConfiguration +// kubernetesMountPath: Path that the backend was mounted at +func (a *Auth) KubernetesReadAuthConfiguration(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/auth/{kubernetes_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestQueryParameters := make(url.Values) @@ -4652,16 +4687,17 @@ func (a *Auth) LDAPReadAuthConfig(ctx context.Context, options ...RequestOption) ) } -// LDAPReadGroup Manage additional groups for users allowed to authenticate. -// name: Name of the LDAP group. -func (a *Auth) LDAPReadGroup(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesReadAuthRole Register an role with the backend. +// name: Name of the role. +// kubernetesMountPath: Path that the backend was mounted at +func (a *Auth) KubernetesReadAuthRole(ctx context.Context, name string, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/groups/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/auth/{kubernetes_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4677,33 +4713,35 @@ func (a *Auth) LDAPReadGroup(ctx context.Context, name string, options ...Reques ) } -// LDAPReadUser Manage users allowed to authenticate. -// name: Name of the LDAP user. -func (a *Auth) LDAPReadUser(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesWriteAuthRole Register an role with the backend. +// name: Name of the role. +// kubernetesMountPath: Path that the backend was mounted at +func (a *Auth) KubernetesWriteAuthRole(ctx context.Context, name string, kubernetesMountPath string, request schema.KubernetesWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{ldap_mount_path}/users/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/auth/{kubernetes_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPWriteAuthConfig Configure the LDAP server to connect to, along with its options. -func (a *Auth) LDAPWriteAuthConfig(ctx context.Context, request schema.LDAPWriteAuthConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapConfigureAuth +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapConfigureAuth(ctx context.Context, ldapMountPath string, request schema.LdapConfigureAuthRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4725,9 +4763,10 @@ func (a *Auth) LDAPWriteAuthConfig(ctx context.Context, request schema.LDAPWrite ) } -// LDAPWriteGroup Manage additional groups for users allowed to authenticate. +// LdapDeleteGroup Manage additional groups for users allowed to authenticate. // name: Name of the LDAP group. -func (a *Auth) LDAPWriteGroup(ctx context.Context, name string, request schema.LDAPWriteGroupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapDeleteGroup(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4739,20 +4778,21 @@ func (a *Auth) LDAPWriteGroup(ctx context.Context, name string, request schema.L requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// LDAPWriteUser Manage users allowed to authenticate. +// LdapDeleteUser Manage users allowed to authenticate. // name: Name of the LDAP user. -func (a *Auth) LDAPWriteUser(ctx context.Context, name string, request schema.LDAPWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapDeleteUser(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4764,29 +4804,6 @@ func (a *Auth) LDAPWriteUser(ctx context.Context, name string, request schema.LD requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// OCIDeleteConfig Manages the configuration for the Vault Auth Plugin. -func (a *Auth) OCIDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{oci_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) - - requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, @@ -4798,24 +4815,24 @@ func (a *Auth) OCIDeleteConfig(ctx context.Context, options ...RequestOption) (* ) } -// OCIDeleteRole Create a role and associate policies to it. -// role: Name of the role. -func (a *Auth) OCIDeleteRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapListGroups Manage additional groups for users allowed to authenticate. +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapListGroups(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oci_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{ldap_mount_path}/groups" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -4823,15 +4840,16 @@ func (a *Auth) OCIDeleteRole(ctx context.Context, role string, options ...Reques ) } -// OCIListRoles Lists all the roles that are registered with Vault. -func (a *Auth) OCIListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapListUsers Manage users allowed to authenticate. +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapListUsers(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oci_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) + requestPath := "/v1/auth/{ldap_mount_path}/users" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -4847,17 +4865,18 @@ func (a *Auth) OCIListRoles(ctx context.Context, options ...RequestOption) (*Res ) } -// OCILoginWithRole Authenticates to Vault using OCI credentials -// role: Name of the role. -func (a *Auth) OCILoginWithRole(ctx context.Context, role string, request schema.OCILoginWithRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLogin Log in with a username and password. +// username: DN (distinguished name) to be used for login. +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapLogin(ctx context.Context, username string, ldapMountPath string, request schema.LdapLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oci_mount_path}/login/{role}" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{ldap_mount_path}/login/{username}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"username"+"}", url.PathEscape(username), -1) requestQueryParameters := make(url.Values) @@ -4872,15 +4891,16 @@ func (a *Auth) OCILoginWithRole(ctx context.Context, role string, request schema ) } -// OCIReadConfig Manages the configuration for the Vault Auth Plugin. -func (a *Auth) OCIReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapReadAuthConfiguration +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapReadAuthConfiguration(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oci_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) + requestPath := "/v1/auth/{ldap_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) @@ -4895,17 +4915,18 @@ func (a *Auth) OCIReadConfig(ctx context.Context, options ...RequestOption) (*Re ) } -// OCIReadRole Create a role and associate policies to it. -// role: Name of the role. -func (a *Auth) OCIReadRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapReadGroup Manage additional groups for users allowed to authenticate. +// name: Name of the LDAP group. +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapReadGroup(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oci_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/auth/{ldap_mount_path}/groups/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4920,41 +4941,45 @@ func (a *Auth) OCIReadRole(ctx context.Context, role string, options ...RequestO ) } -// OCIWriteConfig Manages the configuration for the Vault Auth Plugin. -func (a *Auth) OCIWriteConfig(ctx context.Context, request schema.OCIWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapReadUser Manage users allowed to authenticate. +// name: Name of the LDAP user. +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapReadUser(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oci_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) + requestPath := "/v1/auth/{ldap_mount_path}/users/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OCIWriteRole Create a role and associate policies to it. -// role: Name of the role. -func (a *Auth) OCIWriteRole(ctx context.Context, role string, request schema.OCIWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapWriteGroup Manage additional groups for users allowed to authenticate. +// name: Name of the LDAP group. +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapWriteGroup(ctx context.Context, name string, ldapMountPath string, request schema.LdapWriteGroupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oci_mount_path}/role/{role}" - requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) - + requestPath := "/v1/auth/{ldap_mount_path}/groups/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestQueryParameters := make(url.Values) return sendStructuredRequestParseResponse[map[string]interface{}]( @@ -4968,95 +4993,99 @@ func (a *Auth) OCIWriteRole(ctx context.Context, role string, request schema.OCI ) } -// OIDCDeleteAuthRole Delete an existing role. -// name: Name of the role. -func (a *Auth) OIDCDeleteAuthRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapWriteUser Manage users allowed to authenticate. +// name: Name of the LDAP user. +// ldapMountPath: Path that the backend was mounted at +func (a *Auth) LdapWriteUser(ctx context.Context, name string, ldapMountPath string, request schema.LdapWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{ldap_mount_path}/users/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OIDCListAuthRoles Lists all the roles registered with the backend. -// The list will contain the names of the roles. -func (a *Auth) OIDCListAuthRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciConfigure +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciConfigure(ctx context.Context, ociMountPath string, request schema.OciConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{oci_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OIDCLogin Authenticates to Vault using a JWT (or OIDC) token. -func (a *Auth) OIDCLogin(ctx context.Context, request schema.OIDCLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciDeleteConfiguration +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciDeleteConfiguration(ctx context.Context, ociMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/login" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{oci_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OIDCReadAuthConfig Read the current JWT authentication backend configuration. -func (a *Auth) OIDCReadAuthConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciDeleteRole Create a role and associate policies to it. +// role: Name of the role. +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciDeleteRole(ctx context.Context, role string, ociMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{oci_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -5064,19 +5093,19 @@ func (a *Auth) OIDCReadAuthConfig(ctx context.Context, options ...RequestOption) ) } -// OIDCReadAuthRole Read an existing role. -// name: Name of the role. -func (a *Auth) OIDCReadAuthRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciListRoles Lists all the roles that are registered with Vault. +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciListRoles(ctx context.Context, ociMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{oci_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -5089,88 +5118,94 @@ func (a *Auth) OIDCReadAuthRole(ctx context.Context, name string, options ...Req ) } -// OIDCReadCallback Callback endpoint to complete an OIDC login. -func (a *Auth) OIDCReadCallback(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciLogin Authenticates to Vault using OCI credentials +// role: Name of the role. +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciLogin(ctx context.Context, role string, ociMountPath string, request schema.OciLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/oidc/callback" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{oci_mount_path}/login/{role}" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OIDCWriteAuthConfig Configure the JWT authentication backend. -// The JWT authentication backend validates JWTs (or OIDC) using the configured credentials. If using OIDC Discovery, the URL must be provided, along with (optionally) the CA cert to use for the connection. If performing JWT validation locally, a set of public keys must be provided. -func (a *Auth) OIDCWriteAuthConfig(ctx context.Context, request schema.OIDCWriteAuthConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciReadConfiguration +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciReadConfiguration(ctx context.Context, ociMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{oci_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OIDCWriteAuthRole Register an role with the backend. -// A role is required to authenticate with this backend. The role binds JWT token information with token policies and settings. The bindings, token polices and token settings can all be configured using this endpoint -// name: Name of the role. -func (a *Auth) OIDCWriteAuthRole(ctx context.Context, name string, request schema.OIDCWriteAuthRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciReadRole Create a role and associate policies to it. +// role: Name of the role. +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciReadRole(ctx context.Context, role string, ociMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{oci_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OIDCWriteAuthURL Request an authorization URL to start an OIDC login flow. -func (a *Auth) OIDCWriteAuthURL(ctx context.Context, request schema.OIDCWriteAuthURLRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OciWriteRole Create a role and associate policies to it. +// role: Name of the role. +// ociMountPath: Path that the backend was mounted at +func (a *Auth) OciWriteRole(ctx context.Context, role string, ociMountPath string, request schema.OciWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/oidc/auth_url" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{oci_mount_path}/role/{role}" + requestPath = strings.Replace(requestPath, "{"+"oci_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oci")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -5185,15 +5220,16 @@ func (a *Auth) OIDCWriteAuthURL(ctx context.Context, request schema.OIDCWriteAut ) } -// OIDCWriteCallback Callback endpoint to handle form_posts. -func (a *Auth) OIDCWriteCallback(ctx context.Context, request schema.OIDCWriteCallbackRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OktaConfigure +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaConfigure(ctx context.Context, oktaMountPath string, request schema.OktaConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{oidc_mount_path}/oidc/callback" - requestPath = strings.Replace(requestPath, "{"+"oidc_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("oidc")), -1) + requestPath := "/v1/auth/{okta_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"okta_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("okta")), -1) requestQueryParameters := make(url.Values) @@ -5210,7 +5246,8 @@ func (a *Auth) OIDCWriteCallback(ctx context.Context, request schema.OIDCWriteCa // OktaDeleteGroup Manage users allowed to authenticate. // name: Name of the Okta group. -func (a *Auth) OktaDeleteGroup(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaDeleteGroup(ctx context.Context, name string, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5235,7 +5272,8 @@ func (a *Auth) OktaDeleteGroup(ctx context.Context, name string, options ...Requ // OktaDeleteUser Manage additional groups for users allowed to authenticate. // name: Name of the user. -func (a *Auth) OktaDeleteUser(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaDeleteUser(ctx context.Context, name string, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5259,7 +5297,8 @@ func (a *Auth) OktaDeleteUser(ctx context.Context, name string, options ...Reque } // OktaListGroups Manage users allowed to authenticate. -func (a *Auth) OktaListGroups(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaListGroups(ctx context.Context, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5283,7 +5322,8 @@ func (a *Auth) OktaListGroups(ctx context.Context, options ...RequestOption) (*R } // OktaListUsers Manage additional groups for users allowed to authenticate. -func (a *Auth) OktaListUsers(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaListUsers(ctx context.Context, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5308,7 +5348,8 @@ func (a *Auth) OktaListUsers(ctx context.Context, options ...RequestOption) (*Re // OktaLogin Log in with a username and password. // username: Username to be used for login. -func (a *Auth) OktaLogin(ctx context.Context, username string, request schema.OktaLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaLogin(ctx context.Context, username string, oktaMountPath string, request schema.OktaLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5331,8 +5372,9 @@ func (a *Auth) OktaLogin(ctx context.Context, username string, request schema.Ok ) } -// OktaReadConfig This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com -func (a *Auth) OktaReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OktaReadConfiguration +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaReadConfiguration(ctx context.Context, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5356,7 +5398,8 @@ func (a *Auth) OktaReadConfig(ctx context.Context, options ...RequestOption) (*R // OktaReadGroup Manage users allowed to authenticate. // name: Name of the Okta group. -func (a *Auth) OktaReadGroup(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaReadGroup(ctx context.Context, name string, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5381,7 +5424,8 @@ func (a *Auth) OktaReadGroup(ctx context.Context, name string, options ...Reques // OktaReadUser Manage additional groups for users allowed to authenticate. // name: Name of the user. -func (a *Auth) OktaReadUser(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaReadUser(ctx context.Context, name string, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5406,7 +5450,8 @@ func (a *Auth) OktaReadUser(ctx context.Context, name string, options ...Request // OktaVerify // nonce: Nonce provided during a login request to retrieve the number verification challenge for the matching request. -func (a *Auth) OktaVerify(ctx context.Context, nonce string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaVerify(ctx context.Context, nonce string, oktaMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5429,15 +5474,18 @@ func (a *Auth) OktaVerify(ctx context.Context, nonce string, options ...RequestO ) } -// OktaWriteConfig This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com -func (a *Auth) OktaWriteConfig(ctx context.Context, request schema.OktaWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OktaWriteGroup Manage users allowed to authenticate. +// name: Name of the Okta group. +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaWriteGroup(ctx context.Context, name string, oktaMountPath string, request schema.OktaWriteGroupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{okta_mount_path}/config" + requestPath := "/v1/auth/{okta_mount_path}/groups/{name}" requestPath = strings.Replace(requestPath, "{"+"okta_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("okta")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -5452,15 +5500,16 @@ func (a *Auth) OktaWriteConfig(ctx context.Context, request schema.OktaWriteConf ) } -// OktaWriteGroup Manage users allowed to authenticate. -// name: Name of the Okta group. -func (a *Auth) OktaWriteGroup(ctx context.Context, name string, request schema.OktaWriteGroupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OktaWriteUser Manage additional groups for users allowed to authenticate. +// name: Name of the user. +// oktaMountPath: Path that the backend was mounted at +func (a *Auth) OktaWriteUser(ctx context.Context, name string, oktaMountPath string, request schema.OktaWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{okta_mount_path}/groups/{name}" + requestPath := "/v1/auth/{okta_mount_path}/users/{name}" requestPath = strings.Replace(requestPath, "{"+"okta_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("okta")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) @@ -5477,17 +5526,16 @@ func (a *Auth) OktaWriteGroup(ctx context.Context, name string, request schema.O ) } -// OktaWriteUser Manage additional groups for users allowed to authenticate. -// name: Name of the user. -func (a *Auth) OktaWriteUser(ctx context.Context, name string, request schema.OktaWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RadiusConfigure +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusConfigure(ctx context.Context, radiusMountPath string, request schema.RadiusConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{okta_mount_path}/users/{name}" - requestPath = strings.Replace(requestPath, "{"+"okta_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("okta")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/{radius_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"radius_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("radius")), -1) requestQueryParameters := make(url.Values) @@ -5504,7 +5552,8 @@ func (a *Auth) OktaWriteUser(ctx context.Context, name string, request schema.Ok // RadiusDeleteUser Manage users allowed to authenticate. // name: Name of the RADIUS user. -func (a *Auth) RadiusDeleteUser(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusDeleteUser(ctx context.Context, name string, radiusMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5528,7 +5577,8 @@ func (a *Auth) RadiusDeleteUser(ctx context.Context, name string, options ...Req } // RadiusListUsers Manage users allowed to authenticate. -func (a *Auth) RadiusListUsers(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusListUsers(ctx context.Context, radiusMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5552,7 +5602,8 @@ func (a *Auth) RadiusListUsers(ctx context.Context, options ...RequestOption) (* } // RadiusLogin Log in with a username and password. -func (a *Auth) RadiusLogin(ctx context.Context, request schema.RadiusLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusLogin(ctx context.Context, radiusMountPath string, request schema.RadiusLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5576,7 +5627,8 @@ func (a *Auth) RadiusLogin(ctx context.Context, request schema.RadiusLoginReques // RadiusLoginWithUsername Log in with a username and password. // urlusername: Username to be used for login. (URL parameter) -func (a *Auth) RadiusLoginWithUsername(ctx context.Context, urlusername string, request schema.RadiusLoginWithUsernameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusLoginWithUsername(ctx context.Context, urlusername string, radiusMountPath string, request schema.RadiusLoginWithUsernameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5599,8 +5651,9 @@ func (a *Auth) RadiusLoginWithUsername(ctx context.Context, urlusername string, ) } -// RadiusReadConfig Configure the RADIUS server to connect to, along with its options. -func (a *Auth) RadiusReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RadiusReadConfiguration +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusReadConfiguration(ctx context.Context, radiusMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5624,7 +5677,8 @@ func (a *Auth) RadiusReadConfig(ctx context.Context, options ...RequestOption) ( // RadiusReadUser Manage users allowed to authenticate. // name: Name of the RADIUS user. -func (a *Auth) RadiusReadUser(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusReadUser(ctx context.Context, name string, radiusMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5647,15 +5701,18 @@ func (a *Auth) RadiusReadUser(ctx context.Context, name string, options ...Reque ) } -// RadiusWriteConfig Configure the RADIUS server to connect to, along with its options. -func (a *Auth) RadiusWriteConfig(ctx context.Context, request schema.RadiusWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RadiusWriteUser Manage users allowed to authenticate. +// name: Name of the RADIUS user. +// radiusMountPath: Path that the backend was mounted at +func (a *Auth) RadiusWriteUser(ctx context.Context, name string, radiusMountPath string, request schema.RadiusWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{radius_mount_path}/config" + requestPath := "/v1/auth/{radius_mount_path}/users/{name}" requestPath = strings.Replace(requestPath, "{"+"radius_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("radius")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -5670,19 +5727,18 @@ func (a *Auth) RadiusWriteConfig(ctx context.Context, request schema.RadiusWrite ) } -// RadiusWriteUser Manage users allowed to authenticate. -// name: Name of the RADIUS user. -func (a *Auth) RadiusWriteUser(ctx context.Context, name string, request schema.RadiusWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenCreate The token create path is used to create new tokens. +// format: Return json formatted output +func (a *Auth) TokenCreate(ctx context.Context, request schema.TokenCreateRequest, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{radius_mount_path}/users/{name}" - requestPath = strings.Replace(requestPath, "{"+"radius_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("radius")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/auth/token/create" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("format", url.QueryEscape(format)) return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, @@ -5695,95 +5751,73 @@ func (a *Auth) RadiusWriteUser(ctx context.Context, name string, request schema. ) } -// TokenDeleteRole +// TokenCreateAgainstRole This token create path is used to create new tokens adhering to the given role. // roleName: Name of the role -func (a *Auth) TokenDeleteRole(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// format: Return json formatted output +func (a *Auth) TokenCreateAgainstRole(ctx context.Context, roleName string, request schema.TokenCreateAgainstRoleRequest, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/roles/{role_name}" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/create/{role_name}" requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("format", url.QueryEscape(format)) - return sendRequestParseResponse[map[string]interface{}]( - ctx, - a.client, - http.MethodDelete, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// TokenListAccessors List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'. -func (a *Auth) TokenListAccessors(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/auth/{token_mount_path}/accessors/" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) - - requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// TokenListRoles This endpoint lists configured roles. -func (a *Auth) TokenListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenCreateOrphan The token create path is used to create new orphan tokens. +// format: Return json formatted output +func (a *Auth) TokenCreateOrphan(ctx context.Context, request schema.TokenCreateOrphanRequest, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/create-orphan" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") + requestQueryParameters.Set("format", url.QueryEscape(format)) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// TokenReadLookup This endpoint will lookup a token and its properties. -func (a *Auth) TokenReadLookup(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenDeleteRole +// roleName: Name of the role +func (a *Auth) TokenDeleteRole(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/lookup" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/roles/{role_name}" + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -5791,17 +5825,17 @@ func (a *Auth) TokenReadLookup(ctx context.Context, options ...RequestOption) (* ) } -// TokenReadLookupSelf This endpoint will lookup a token and its properties. -func (a *Auth) TokenReadLookupSelf(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenListAccessors List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'. +func (a *Auth) TokenListAccessors(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/lookup-self" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/accessors/" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -5814,19 +5848,17 @@ func (a *Auth) TokenReadLookupSelf(ctx context.Context, options ...RequestOption ) } -// TokenReadRole -// roleName: Name of the role -func (a *Auth) TokenReadRole(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenListRoles This endpoint lists configured roles. +func (a *Auth) TokenListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/roles/{role_name}" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/token/roles" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -5839,15 +5871,14 @@ func (a *Auth) TokenReadRole(ctx context.Context, roleName string, options ...Re ) } -// TokenRenew This endpoint will renew the given token and prevent expiration. -func (a *Auth) TokenRenew(ctx context.Context, request schema.TokenRenewRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenLookUp +func (a *Auth) TokenLookUp(ctx context.Context, request schema.TokenLookUpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/renew" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/lookup" requestQueryParameters := make(url.Values) @@ -5862,15 +5893,14 @@ func (a *Auth) TokenRenew(ctx context.Context, request schema.TokenRenewRequest, ) } -// TokenRenewAccessor This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID. -func (a *Auth) TokenRenewAccessor(ctx context.Context, request schema.TokenRenewAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenLookUpAccessor This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID. +func (a *Auth) TokenLookUpAccessor(ctx context.Context, request schema.TokenLookUpAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/renew-accessor" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/lookup-accessor" requestQueryParameters := make(url.Values) @@ -5885,38 +5915,36 @@ func (a *Auth) TokenRenewAccessor(ctx context.Context, request schema.TokenRenew ) } -// TokenRenewSelf This endpoint will renew the token used to call it and prevent expiration. -func (a *Auth) TokenRenewSelf(ctx context.Context, request schema.TokenRenewSelfRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenLookUpSelf +func (a *Auth) TokenLookUpSelf(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/renew-self" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/lookup-self" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// TokenRevoke This endpoint will delete the given token and all of its child tokens. -func (a *Auth) TokenRevoke(ctx context.Context, request schema.TokenRevokeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenLookUpSelf2 +func (a *Auth) TokenLookUpSelf2(ctx context.Context, request schema.TokenLookUpSelf2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/revoke" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/lookup-self" requestQueryParameters := make(url.Values) @@ -5931,111 +5959,106 @@ func (a *Auth) TokenRevoke(ctx context.Context, request schema.TokenRevokeReques ) } -// TokenRevokeAccessor This endpoint will delete the token associated with the accessor and all of its child tokens. -func (a *Auth) TokenRevokeAccessor(ctx context.Context, request schema.TokenRevokeAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenLookUpSelf3 +func (a *Auth) TokenLookUpSelf3(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/revoke-accessor" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/lookup" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// TokenRevokeOrphan This endpoint will delete the token and orphan its child tokens. -func (a *Auth) TokenRevokeOrphan(ctx context.Context, request schema.TokenRevokeOrphanRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenReadRole +// roleName: Name of the role +func (a *Auth) TokenReadRole(ctx context.Context, roleName string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/revoke-orphan" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/roles/{role_name}" + requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// TokenRevokeSelf This endpoint will delete the token used to call it and all of its child tokens. -func (a *Auth) TokenRevokeSelf(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenRenew This endpoint will renew the given token and prevent expiration. +func (a *Auth) TokenRenew(ctx context.Context, request schema.TokenRenewRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/revoke-self" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/renew" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// TokenTidy This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. -func (a *Auth) TokenTidy(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenRenewAccessor This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID. +func (a *Auth) TokenRenewAccessor(ctx context.Context, request schema.TokenRenewAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/tidy" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/renew-accessor" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// TokenWriteCreate The token create path is used to create new tokens. -// format: Return json formatted output -func (a *Auth) TokenWriteCreate(ctx context.Context, request schema.TokenWriteCreateRequest, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenRenewSelf This endpoint will renew the token used to call it and prevent expiration. +func (a *Auth) TokenRenewSelf(ctx context.Context, request schema.TokenRenewSelfRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/create" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/renew-self" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("format", url.QueryEscape(format)) return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, @@ -6048,19 +6071,16 @@ func (a *Auth) TokenWriteCreate(ctx context.Context, request schema.TokenWriteCr ) } -// TokenWriteCreateOrphan The token create path is used to create new orphan tokens. -// format: Return json formatted output -func (a *Auth) TokenWriteCreateOrphan(ctx context.Context, request schema.TokenWriteCreateOrphanRequest, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenRevoke This endpoint will delete the given token and all of its child tokens. +func (a *Auth) TokenRevoke(ctx context.Context, request schema.TokenRevokeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/create-orphan" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/revoke" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("format", url.QueryEscape(format)) return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, @@ -6073,21 +6093,16 @@ func (a *Auth) TokenWriteCreateOrphan(ctx context.Context, request schema.TokenW ) } -// TokenWriteCreateWithRole This token create path is used to create new tokens adhering to the given role. -// roleName: Name of the role -// format: Return json formatted output -func (a *Auth) TokenWriteCreateWithRole(ctx context.Context, roleName string, request schema.TokenWriteCreateWithRoleRequest, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenRevokeAccessor This endpoint will delete the token associated with the accessor and all of its child tokens. +func (a *Auth) TokenRevokeAccessor(ctx context.Context, request schema.TokenRevokeAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/create/{role_name}" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) - requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) + requestPath := "/v1/auth/token/revoke-accessor" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("format", url.QueryEscape(format)) return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, @@ -6100,15 +6115,14 @@ func (a *Auth) TokenWriteCreateWithRole(ctx context.Context, roleName string, re ) } -// TokenWriteLookup This endpoint will lookup a token and its properties. -func (a *Auth) TokenWriteLookup(ctx context.Context, request schema.TokenWriteLookupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenRevokeOrphan This endpoint will delete the token and orphan its child tokens. +func (a *Auth) TokenRevokeOrphan(ctx context.Context, request schema.TokenRevokeOrphanRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/lookup" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/revoke-orphan" requestQueryParameters := make(url.Values) @@ -6123,47 +6137,45 @@ func (a *Auth) TokenWriteLookup(ctx context.Context, request schema.TokenWriteLo ) } -// TokenWriteLookupAccessor This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID. -func (a *Auth) TokenWriteLookupAccessor(ctx context.Context, request schema.TokenWriteLookupAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenRevokeSelf This endpoint will delete the token used to call it and all of its child tokens. +func (a *Auth) TokenRevokeSelf(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/lookup-accessor" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/revoke-self" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// TokenWriteLookupSelf This endpoint will lookup a token and its properties. -func (a *Auth) TokenWriteLookupSelf(ctx context.Context, request schema.TokenWriteLookupSelfRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TokenTidy This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. +func (a *Auth) TokenTidy(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{token_mount_path}/lookup-self" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/tidy" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, a.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) @@ -6177,8 +6189,7 @@ func (a *Auth) TokenWriteRole(ctx context.Context, roleName string, request sche return nil, err } - requestPath := "/v1/auth/{token_mount_path}/roles/{role_name}" - requestPath = strings.Replace(requestPath, "{"+"token_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("token")), -1) + requestPath := "/v1/auth/token/roles/{role_name}" requestPath = strings.Replace(requestPath, "{"+"role_name"+"}", url.PathEscape(roleName), -1) requestQueryParameters := make(url.Values) @@ -6196,7 +6207,8 @@ func (a *Auth) TokenWriteRole(ctx context.Context, roleName string, request sche // UserpassDeleteUser Manage users allowed to authenticate. // username: Username for this user. -func (a *Auth) UserpassDeleteUser(ctx context.Context, username string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// userpassMountPath: Path that the backend was mounted at +func (a *Auth) UserpassDeleteUser(ctx context.Context, username string, userpassMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6220,7 +6232,8 @@ func (a *Auth) UserpassDeleteUser(ctx context.Context, username string, options } // UserpassListUsers Manage users allowed to authenticate. -func (a *Auth) UserpassListUsers(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// userpassMountPath: Path that the backend was mounted at +func (a *Auth) UserpassListUsers(ctx context.Context, userpassMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6245,7 +6258,8 @@ func (a *Auth) UserpassListUsers(ctx context.Context, options ...RequestOption) // UserpassLogin Log in with a username and password. // username: Username of the user. -func (a *Auth) UserpassLogin(ctx context.Context, username string, request schema.UserpassLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// userpassMountPath: Path that the backend was mounted at +func (a *Auth) UserpassLogin(ctx context.Context, username string, userpassMountPath string, request schema.UserpassLoginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6270,7 +6284,8 @@ func (a *Auth) UserpassLogin(ctx context.Context, username string, request schem // UserpassReadUser Manage users allowed to authenticate. // username: Username for this user. -func (a *Auth) UserpassReadUser(ctx context.Context, username string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// userpassMountPath: Path that the backend was mounted at +func (a *Auth) UserpassReadUser(ctx context.Context, username string, userpassMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6293,15 +6308,16 @@ func (a *Auth) UserpassReadUser(ctx context.Context, username string, options .. ) } -// UserpassWriteUser Manage users allowed to authenticate. +// UserpassResetPassword Reset user's password. // username: Username for this user. -func (a *Auth) UserpassWriteUser(ctx context.Context, username string, request schema.UserpassWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// userpassMountPath: Path that the backend was mounted at +func (a *Auth) UserpassResetPassword(ctx context.Context, username string, userpassMountPath string, request schema.UserpassResetPasswordRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{userpass_mount_path}/users/{username}" + requestPath := "/v1/auth/{userpass_mount_path}/users/{username}/password" requestPath = strings.Replace(requestPath, "{"+"userpass_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("userpass")), -1) requestPath = strings.Replace(requestPath, "{"+"username"+"}", url.PathEscape(username), -1) @@ -6318,15 +6334,16 @@ func (a *Auth) UserpassWriteUser(ctx context.Context, username string, request s ) } -// UserpassWriteUserPassword Reset user's password. +// UserpassUpdatePolicies Update the policies associated with the username. // username: Username for this user. -func (a *Auth) UserpassWriteUserPassword(ctx context.Context, username string, request schema.UserpassWriteUserPasswordRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// userpassMountPath: Path that the backend was mounted at +func (a *Auth) UserpassUpdatePolicies(ctx context.Context, username string, userpassMountPath string, request schema.UserpassUpdatePoliciesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{userpass_mount_path}/users/{username}/password" + requestPath := "/v1/auth/{userpass_mount_path}/users/{username}/policies" requestPath = strings.Replace(requestPath, "{"+"userpass_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("userpass")), -1) requestPath = strings.Replace(requestPath, "{"+"username"+"}", url.PathEscape(username), -1) @@ -6343,15 +6360,16 @@ func (a *Auth) UserpassWriteUserPassword(ctx context.Context, username string, r ) } -// UserpassWriteUserPolicies Update the policies associated with the username. +// UserpassWriteUser Manage users allowed to authenticate. // username: Username for this user. -func (a *Auth) UserpassWriteUserPolicies(ctx context.Context, username string, request schema.UserpassWriteUserPoliciesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// userpassMountPath: Path that the backend was mounted at +func (a *Auth) UserpassWriteUser(ctx context.Context, username string, userpassMountPath string, request schema.UserpassWriteUserRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/auth/{userpass_mount_path}/users/{username}/policies" + requestPath := "/v1/auth/{userpass_mount_path}/users/{username}" requestPath = strings.Replace(requestPath, "{"+"userpass_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("userpass")), -1) requestPath = strings.Replace(requestPath, "{"+"username"+"}", url.PathEscape(username), -1) diff --git a/api_identity.go b/api_identity.go index be541873..73a3a202 100644 --- a/api_identity.go +++ b/api_identity.go @@ -19,9 +19,31 @@ type Identity struct { client *Client } -// AliasDeleteByID Update, read or delete an alias ID. +// AliasCreate Create a new alias. +func (i *Identity) AliasCreate(ctx context.Context, request schema.AliasCreateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/identity/alias" + + requestQueryParameters := make(url.Values) + + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + i.client, + http.MethodPost, + requestPath, + request, + requestQueryParameters, + requestModifiers, + ) +} + +// AliasDeleteById // id: ID of the alias -func (i *Identity) AliasDeleteByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) AliasDeleteById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -43,8 +65,8 @@ func (i *Identity) AliasDeleteByID(ctx context.Context, id string, options ...Re ) } -// AliasListByID List all the alias IDs. -func (i *Identity) AliasListByID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliasListById List all the alias IDs. +func (i *Identity) AliasListById(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -66,9 +88,9 @@ func (i *Identity) AliasListByID(ctx context.Context, options ...RequestOption) ) } -// AliasReadByID Update, read or delete an alias ID. +// AliasReadById // id: ID of the alias -func (i *Identity) AliasReadByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) AliasReadById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -90,14 +112,16 @@ func (i *Identity) AliasReadByID(ctx context.Context, id string, options ...Requ ) } -// AliasWrite Create a new alias. -func (i *Identity) AliasWrite(ctx context.Context, request schema.AliasWriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliasUpdateById +// id: ID of the alias +func (i *Identity) AliasUpdateById(ctx context.Context, id string, request schema.AliasUpdateByIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/alias" + requestPath := "/v1/identity/alias/id/{id}" + requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) requestQueryParameters := make(url.Values) @@ -112,16 +136,14 @@ func (i *Identity) AliasWrite(ctx context.Context, request schema.AliasWriteRequ ) } -// AliasWriteByID Update, read or delete an alias ID. -// id: ID of the alias -func (i *Identity) AliasWriteByID(ctx context.Context, id string, request schema.AliasWriteByIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityBatchDelete Delete all of the entities provided +func (i *Identity) EntityBatchDelete(ctx context.Context, request schema.EntityBatchDeleteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/alias/id/{id}" - requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) + requestPath := "/v1/identity/entity/batch-delete" requestQueryParameters := make(url.Values) @@ -136,14 +158,36 @@ func (i *Identity) AliasWriteByID(ctx context.Context, id string, request schema ) } -// EntityBatchDelete Delete all of the entities provided -func (i *Identity) EntityBatchDelete(ctx context.Context, request schema.EntityBatchDeleteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityCreate Create a new entity +func (i *Identity) EntityCreate(ctx context.Context, request schema.EntityCreateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/entity/batch-delete" + requestPath := "/v1/identity/entity" + + requestQueryParameters := make(url.Values) + + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + i.client, + http.MethodPost, + requestPath, + request, + requestQueryParameters, + requestModifiers, + ) +} + +// EntityCreateAlias Create a new alias. +func (i *Identity) EntityCreateAlias(ctx context.Context, request schema.EntityCreateAliasRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/identity/entity-alias" requestQueryParameters := make(url.Values) @@ -158,9 +202,9 @@ func (i *Identity) EntityBatchDelete(ctx context.Context, request schema.EntityB ) } -// EntityDeleteAliasByID Update, read or delete an alias ID. +// EntityDeleteAliasById // id: ID of the alias -func (i *Identity) EntityDeleteAliasByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) EntityDeleteAliasById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -182,9 +226,9 @@ func (i *Identity) EntityDeleteAliasByID(ctx context.Context, id string, options ) } -// EntityDeleteByID Update, read or delete an entity using entity ID +// EntityDeleteById // id: ID of the entity. If set, updates the corresponding existing entity. -func (i *Identity) EntityDeleteByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) EntityDeleteById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -206,7 +250,7 @@ func (i *Identity) EntityDeleteByID(ctx context.Context, id string, options ...R ) } -// EntityDeleteByName Update, read or delete an entity using entity name +// EntityDeleteByName // name: Name of the entity func (i *Identity) EntityDeleteByName(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) @@ -230,8 +274,8 @@ func (i *Identity) EntityDeleteByName(ctx context.Context, name string, options ) } -// EntityListAliasesByID List all the alias IDs. -func (i *Identity) EntityListAliasesByID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityListAliasesById List all the alias IDs. +func (i *Identity) EntityListAliasesById(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -253,8 +297,8 @@ func (i *Identity) EntityListAliasesByID(ctx context.Context, options ...Request ) } -// EntityListByID List all the entity IDs -func (i *Identity) EntityListByID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityListById List all the entity IDs +func (i *Identity) EntityListById(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -299,8 +343,8 @@ func (i *Identity) EntityListByName(ctx context.Context, options ...RequestOptio ) } -// EntityLookup Query entities based on various properties. -func (i *Identity) EntityLookup(ctx context.Context, request schema.EntityLookupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityLookUp Query entities based on various properties. +func (i *Identity) EntityLookUp(ctx context.Context, request schema.EntityLookUpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -343,9 +387,9 @@ func (i *Identity) EntityMerge(ctx context.Context, request schema.EntityMergeRe ) } -// EntityReadAliasByID Update, read or delete an alias ID. +// EntityReadAliasById // id: ID of the alias -func (i *Identity) EntityReadAliasByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) EntityReadAliasById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -367,9 +411,9 @@ func (i *Identity) EntityReadAliasByID(ctx context.Context, id string, options . ) } -// EntityReadByID Update, read or delete an entity using entity ID +// EntityReadById // id: ID of the entity. If set, updates the corresponding existing entity. -func (i *Identity) EntityReadByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) EntityReadById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -391,7 +435,7 @@ func (i *Identity) EntityReadByID(ctx context.Context, id string, options ...Req ) } -// EntityReadByName Update, read or delete an entity using entity name +// EntityReadByName // name: Name of the entity func (i *Identity) EntityReadByName(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) @@ -415,14 +459,16 @@ func (i *Identity) EntityReadByName(ctx context.Context, name string, options .. ) } -// EntityWrite Create a new entity -func (i *Identity) EntityWrite(ctx context.Context, request schema.EntityWriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityUpdateAliasById +// id: ID of the alias +func (i *Identity) EntityUpdateAliasById(ctx context.Context, id string, request schema.EntityUpdateAliasByIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/entity" + requestPath := "/v1/identity/entity-alias/id/{id}" + requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) requestQueryParameters := make(url.Values) @@ -437,14 +483,16 @@ func (i *Identity) EntityWrite(ctx context.Context, request schema.EntityWriteRe ) } -// EntityWriteAlias Create a new alias. -func (i *Identity) EntityWriteAlias(ctx context.Context, request schema.EntityWriteAliasRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityUpdateById +// id: ID of the entity. If set, updates the corresponding existing entity. +func (i *Identity) EntityUpdateById(ctx context.Context, id string, request schema.EntityUpdateByIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/entity-alias" + requestPath := "/v1/identity/entity/id/{id}" + requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) requestQueryParameters := make(url.Values) @@ -459,16 +507,16 @@ func (i *Identity) EntityWriteAlias(ctx context.Context, request schema.EntityWr ) } -// EntityWriteAliasByID Update, read or delete an alias ID. -// id: ID of the alias -func (i *Identity) EntityWriteAliasByID(ctx context.Context, id string, request schema.EntityWriteAliasByIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EntityUpdateByName +// name: Name of the entity +func (i *Identity) EntityUpdateByName(ctx context.Context, name string, request schema.EntityUpdateByNameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/entity-alias/id/{id}" - requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) + requestPath := "/v1/identity/entity/name/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -483,16 +531,14 @@ func (i *Identity) EntityWriteAliasByID(ctx context.Context, id string, request ) } -// EntityWriteByID Update, read or delete an entity using entity ID -// id: ID of the entity. If set, updates the corresponding existing entity. -func (i *Identity) EntityWriteByID(ctx context.Context, id string, request schema.EntityWriteByIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupCreate Create a new group. +func (i *Identity) GroupCreate(ctx context.Context, request schema.GroupCreateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/entity/id/{id}" - requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) + requestPath := "/v1/identity/group" requestQueryParameters := make(url.Values) @@ -507,16 +553,14 @@ func (i *Identity) EntityWriteByID(ctx context.Context, id string, request schem ) } -// EntityWriteByName Update, read or delete an entity using entity name -// name: Name of the entity -func (i *Identity) EntityWriteByName(ctx context.Context, name string, request schema.EntityWriteByNameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupCreateAlias Creates a new group alias, or updates an existing one. +func (i *Identity) GroupCreateAlias(ctx context.Context, request schema.GroupCreateAliasRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/entity/name/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/identity/group-alias" requestQueryParameters := make(url.Values) @@ -531,9 +575,9 @@ func (i *Identity) EntityWriteByName(ctx context.Context, name string, request s ) } -// GroupDeleteAliasByID +// GroupDeleteAliasById // id: ID of the group alias. -func (i *Identity) GroupDeleteAliasByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) GroupDeleteAliasById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -555,9 +599,9 @@ func (i *Identity) GroupDeleteAliasByID(ctx context.Context, id string, options ) } -// GroupDeleteByID Update or delete an existing group using its ID. +// GroupDeleteById // id: ID of the group. If set, updates the corresponding existing group. -func (i *Identity) GroupDeleteByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) GroupDeleteById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -603,8 +647,8 @@ func (i *Identity) GroupDeleteByName(ctx context.Context, name string, options . ) } -// GroupListAliasesByID List all the group alias IDs. -func (i *Identity) GroupListAliasesByID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupListAliasesById List all the group alias IDs. +func (i *Identity) GroupListAliasesById(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -626,8 +670,8 @@ func (i *Identity) GroupListAliasesByID(ctx context.Context, options ...RequestO ) } -// GroupListByID List all the group IDs. -func (i *Identity) GroupListByID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupListById List all the group IDs. +func (i *Identity) GroupListById(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -672,8 +716,8 @@ func (i *Identity) GroupListByName(ctx context.Context, options ...RequestOption ) } -// GroupLookup Query groups based on various properties. -func (i *Identity) GroupLookup(ctx context.Context, request schema.GroupLookupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupLookUp Query groups based on various properties. +func (i *Identity) GroupLookUp(ctx context.Context, request schema.GroupLookUpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -694,9 +738,9 @@ func (i *Identity) GroupLookup(ctx context.Context, request schema.GroupLookupRe ) } -// GroupReadAliasByID +// GroupReadAliasById // id: ID of the group alias. -func (i *Identity) GroupReadAliasByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) GroupReadAliasById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -718,9 +762,9 @@ func (i *Identity) GroupReadAliasByID(ctx context.Context, id string, options .. ) } -// GroupReadByID Update or delete an existing group using its ID. +// GroupReadById // id: ID of the group. If set, updates the corresponding existing group. -func (i *Identity) GroupReadByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) GroupReadById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -766,14 +810,16 @@ func (i *Identity) GroupReadByName(ctx context.Context, name string, options ... ) } -// GroupWrite Create a new group. -func (i *Identity) GroupWrite(ctx context.Context, request schema.GroupWriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupUpdateAliasById +// id: ID of the group alias. +func (i *Identity) GroupUpdateAliasById(ctx context.Context, id string, request schema.GroupUpdateAliasByIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/group" + requestPath := "/v1/identity/group-alias/id/{id}" + requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) requestQueryParameters := make(url.Values) @@ -788,14 +834,16 @@ func (i *Identity) GroupWrite(ctx context.Context, request schema.GroupWriteRequ ) } -// GroupWriteAlias Creates a new group alias, or updates an existing one. -func (i *Identity) GroupWriteAlias(ctx context.Context, request schema.GroupWriteAliasRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupUpdateById +// id: ID of the group. If set, updates the corresponding existing group. +func (i *Identity) GroupUpdateById(ctx context.Context, id string, request schema.GroupUpdateByIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/group-alias" + requestPath := "/v1/identity/group/id/{id}" + requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) requestQueryParameters := make(url.Values) @@ -810,16 +858,16 @@ func (i *Identity) GroupWriteAlias(ctx context.Context, request schema.GroupWrit ) } -// GroupWriteAliasByID -// id: ID of the group alias. -func (i *Identity) GroupWriteAliasByID(ctx context.Context, id string, request schema.GroupWriteAliasByIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GroupUpdateByName +// name: Name of the group. +func (i *Identity) GroupUpdateByName(ctx context.Context, name string, request schema.GroupUpdateByNameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/group-alias/id/{id}" - requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) + requestPath := "/v1/identity/group/name/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -834,16 +882,14 @@ func (i *Identity) GroupWriteAliasByID(ctx context.Context, id string, request s ) } -// GroupWriteByID Update or delete an existing group using its ID. -// id: ID of the group. If set, updates the corresponding existing group. -func (i *Identity) GroupWriteByID(ctx context.Context, id string, request schema.GroupWriteByIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaAdminDestroyTotpSecret Destroys a TOTP secret for the given MFA method ID on the given entity +func (i *Identity) MfaAdminDestroyTotpSecret(ctx context.Context, request schema.MfaAdminDestroyTotpSecretRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/group/id/{id}" - requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) + requestPath := "/v1/identity/mfa/method/totp/admin-destroy" requestQueryParameters := make(url.Values) @@ -858,16 +904,14 @@ func (i *Identity) GroupWriteByID(ctx context.Context, id string, request schema ) } -// GroupWriteByName -// name: Name of the group. -func (i *Identity) GroupWriteByName(ctx context.Context, name string, request schema.GroupWriteByNameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaAdminGenerateTotpSecret Update or create TOTP secret for the given method ID on the given entity. +func (i *Identity) MfaAdminGenerateTotpSecret(ctx context.Context, request schema.MfaAdminGenerateTotpSecretRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/group/name/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/identity/mfa/method/totp/admin-generate" requestQueryParameters := make(url.Values) @@ -882,61 +926,64 @@ func (i *Identity) GroupWriteByName(ctx context.Context, name string, request sc ) } -// MFADeleteLoginEnforcement Delete a login enforcement -// name: Name for this login enforcement configuration -func (i *Identity) MFADeleteLoginEnforcement(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaConfigureDuoMethod Update or create a configuration for the given MFA method +// methodId: The unique identifier for this MFA method. +func (i *Identity) MfaConfigureDuoMethod(ctx context.Context, methodId string, request schema.MfaConfigureDuoMethodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/login-enforcement/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/identity/mfa/method/duo/{method_id}" + requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// MFAListLoginEnforcements List login enforcements -func (i *Identity) MFAListLoginEnforcements(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaConfigureOktaMethod Update or create a configuration for the given MFA method +// methodId: The unique identifier for this MFA method. +func (i *Identity) MfaConfigureOktaMethod(ctx context.Context, methodId string, request schema.MfaConfigureOktaMethodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/login-enforcement" + requestPath := "/v1/identity/mfa/method/okta/{method_id}" + requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// MFAMethodAdminDestroyTOTP Destroys a TOTP secret for the given MFA method ID on the given entity -func (i *Identity) MFAMethodAdminDestroyTOTP(ctx context.Context, request schema.MFAMethodAdminDestroyTOTPRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaConfigurePingIdMethod Update or create a configuration for the given MFA method +// methodId: The unique identifier for this MFA method. +func (i *Identity) MfaConfigurePingIdMethod(ctx context.Context, methodId string, request schema.MfaConfigurePingIdMethodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/totp/admin-destroy" + requestPath := "/v1/identity/mfa/method/pingid/{method_id}" + requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) @@ -951,14 +998,16 @@ func (i *Identity) MFAMethodAdminDestroyTOTP(ctx context.Context, request schema ) } -// MFAMethodAdminGenerateTOTP Update or create TOTP secret for the given method ID on the given entity. -func (i *Identity) MFAMethodAdminGenerateTOTP(ctx context.Context, request schema.MFAMethodAdminGenerateTOTPRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaConfigureTotpMethod Update or create a configuration for the given MFA method +// methodId: The unique identifier for this MFA method. +func (i *Identity) MfaConfigureTotpMethod(ctx context.Context, methodId string, request schema.MfaConfigureTotpMethodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/totp/admin-generate" + requestPath := "/v1/identity/mfa/method/totp/{method_id}" + requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) @@ -973,9 +1022,9 @@ func (i *Identity) MFAMethodAdminGenerateTOTP(ctx context.Context, request schem ) } -// MFAMethodDeleteDuo Delete a configuration for the given MFA method +// MfaDeleteDuoMethod Delete a configuration for the given MFA method // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodDeleteDuo(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaDeleteDuoMethod(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -997,16 +1046,16 @@ func (i *Identity) MFAMethodDeleteDuo(ctx context.Context, methodId string, opti ) } -// MFAMethodDeleteOkta Delete a configuration for the given MFA method -// methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodDeleteOkta(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaDeleteLoginEnforcement Delete a login enforcement +// name: Name for this login enforcement configuration +func (i *Identity) MfaDeleteLoginEnforcement(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/okta/{method_id}" - requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) + requestPath := "/v1/identity/mfa/login-enforcement/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1021,15 +1070,15 @@ func (i *Identity) MFAMethodDeleteOkta(ctx context.Context, methodId string, opt ) } -// MFAMethodDeletePingID Delete a configuration for the given MFA method +// MfaDeleteOktaMethod Delete a configuration for the given MFA method // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodDeletePingID(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaDeleteOktaMethod(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/pingid/{method_id}" + requestPath := "/v1/identity/mfa/method/okta/{method_id}" requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) @@ -1045,15 +1094,15 @@ func (i *Identity) MFAMethodDeletePingID(ctx context.Context, methodId string, o ) } -// MFAMethodDeleteTOTP Delete a configuration for the given MFA method +// MfaDeletePingIdMethod Delete a configuration for the given MFA method // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodDeleteTOTP(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaDeletePingIdMethod(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/totp/{method_id}" + requestPath := "/v1/identity/mfa/method/pingid/{method_id}" requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) @@ -1069,53 +1118,54 @@ func (i *Identity) MFAMethodDeleteTOTP(ctx context.Context, methodId string, opt ) } -// MFAMethodGenerateTOTP Update or create TOTP secret for the given method ID on the given entity. -func (i *Identity) MFAMethodGenerateTOTP(ctx context.Context, request schema.MFAMethodGenerateTOTPRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaDeleteTotpMethod Delete a configuration for the given MFA method +// methodId: The unique identifier for this MFA method. +func (i *Identity) MfaDeleteTotpMethod(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/totp/generate" + requestPath := "/v1/identity/mfa/method/totp/{method_id}" + requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// MFAMethodList List MFA method configurations for all MFA methods -func (i *Identity) MFAMethodList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaGenerateTotpSecret Update or create TOTP secret for the given method ID on the given entity. +func (i *Identity) MfaGenerateTotpSecret(ctx context.Context, request schema.MfaGenerateTotpSecretRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method" + requestPath := "/v1/identity/mfa/method/totp/generate" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// MFAMethodListDuo List MFA method configurations for the given MFA method -func (i *Identity) MFAMethodListDuo(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaListDuoMethods List MFA method configurations for the given MFA method +func (i *Identity) MfaListDuoMethods(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1137,14 +1187,14 @@ func (i *Identity) MFAMethodListDuo(ctx context.Context, options ...RequestOptio ) } -// MFAMethodListOkta List MFA method configurations for the given MFA method -func (i *Identity) MFAMethodListOkta(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaListLoginEnforcements List login enforcements +func (i *Identity) MfaListLoginEnforcements(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/okta" + requestPath := "/v1/identity/mfa/login-enforcement" requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -1160,14 +1210,14 @@ func (i *Identity) MFAMethodListOkta(ctx context.Context, options ...RequestOpti ) } -// MFAMethodListPingID List MFA method configurations for the given MFA method -func (i *Identity) MFAMethodListPingID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaListMethods List MFA method configurations for all MFA methods +func (i *Identity) MfaListMethods(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/pingid" + requestPath := "/v1/identity/mfa/method" requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -1183,14 +1233,14 @@ func (i *Identity) MFAMethodListPingID(ctx context.Context, options ...RequestOp ) } -// MFAMethodListTOTP List MFA method configurations for the given MFA method -func (i *Identity) MFAMethodListTOTP(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaListOktaMethods List MFA method configurations for the given MFA method +func (i *Identity) MfaListOktaMethods(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/totp" + requestPath := "/v1/identity/mfa/method/okta" requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -1206,18 +1256,17 @@ func (i *Identity) MFAMethodListTOTP(ctx context.Context, options ...RequestOpti ) } -// MFAMethodRead Read the current configuration for the given ID regardless of the MFA method type -// methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodRead(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaListPingIdMethods List MFA method configurations for the given MFA method +func (i *Identity) MfaListPingIdMethods(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/{method_id}" - requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) + requestPath := "/v1/identity/mfa/method/pingid" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1230,18 +1279,17 @@ func (i *Identity) MFAMethodRead(ctx context.Context, methodId string, options . ) } -// MFAMethodReadDuo Read the current configuration for the given MFA method -// methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodReadDuo(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaListTotpMethods List MFA method configurations for the given MFA method +func (i *Identity) MfaListTotpMethods(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/duo/{method_id}" - requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) + requestPath := "/v1/identity/mfa/method/totp" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1254,15 +1302,15 @@ func (i *Identity) MFAMethodReadDuo(ctx context.Context, methodId string, option ) } -// MFAMethodReadOkta Read the current configuration for the given MFA method +// MfaReadDuoMethodConfiguration Read the current configuration for the given MFA method // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodReadOkta(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaReadDuoMethodConfiguration(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/okta/{method_id}" + requestPath := "/v1/identity/mfa/method/duo/{method_id}" requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) @@ -1278,16 +1326,16 @@ func (i *Identity) MFAMethodReadOkta(ctx context.Context, methodId string, optio ) } -// MFAMethodReadPingID Read the current configuration for the given MFA method -// methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodReadPingID(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaReadLoginEnforcement Read the current login enforcement +// name: Name for this login enforcement configuration +func (i *Identity) MfaReadLoginEnforcement(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/pingid/{method_id}" - requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) + requestPath := "/v1/identity/mfa/login-enforcement/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1302,15 +1350,15 @@ func (i *Identity) MFAMethodReadPingID(ctx context.Context, methodId string, opt ) } -// MFAMethodReadTOTP Read the current configuration for the given MFA method +// MfaReadMethodConfiguration Read the current configuration for the given ID regardless of the MFA method type // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodReadTOTP(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaReadMethodConfiguration(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/method/totp/{method_id}" + requestPath := "/v1/identity/mfa/method/{method_id}" requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) requestQueryParameters := make(url.Values) @@ -1326,33 +1374,9 @@ func (i *Identity) MFAMethodReadTOTP(ctx context.Context, methodId string, optio ) } -// MFAMethodWriteDuo Update or create a configuration for the given MFA method +// MfaReadOktaMethodConfiguration Read the current configuration for the given MFA method // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodWriteDuo(ctx context.Context, methodId string, request schema.MFAMethodWriteDuoRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/identity/mfa/method/duo/{method_id}" - requestPath = strings.Replace(requestPath, "{"+"method_id"+"}", url.PathEscape(methodId), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - i.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// MFAMethodWriteOkta Update or create a configuration for the given MFA method -// methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodWriteOkta(ctx context.Context, methodId string, request schema.MFAMethodWriteOktaRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaReadOktaMethodConfiguration(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1363,20 +1387,20 @@ func (i *Identity) MFAMethodWriteOkta(ctx context.Context, methodId string, requ requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// MFAMethodWritePingID Update or create a configuration for the given MFA method +// MfaReadPingIdMethodConfiguration Read the current configuration for the given MFA method // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodWritePingID(ctx context.Context, methodId string, request schema.MFAMethodWritePingIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaReadPingIdMethodConfiguration(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1387,20 +1411,20 @@ func (i *Identity) MFAMethodWritePingID(ctx context.Context, methodId string, re requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// MFAMethodWriteTOTP Update or create a configuration for the given MFA method +// MfaReadTotpMethodConfiguration Read the current configuration for the given MFA method // methodId: The unique identifier for this MFA method. -func (i *Identity) MFAMethodWriteTOTP(ctx context.Context, methodId string, request schema.MFAMethodWriteTOTPRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaReadTotpMethodConfiguration(ctx context.Context, methodId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1411,20 +1435,20 @@ func (i *Identity) MFAMethodWriteTOTP(ctx context.Context, methodId string, requ requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// MFAReadLoginEnforcement Read the current login enforcement +// MfaWriteLoginEnforcement Create or update a login enforcement // name: Name for this login enforcement configuration -func (i *Identity) MFAReadLoginEnforcement(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) MfaWriteLoginEnforcement(ctx context.Context, name string, request schema.MfaWriteLoginEnforcementRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1435,27 +1459,25 @@ func (i *Identity) MFAReadLoginEnforcement(ctx context.Context, name string, opt requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// MFAWriteLoginEnforcement Create or update a login enforcement -// name: Name for this login enforcement configuration -func (i *Identity) MFAWriteLoginEnforcement(ctx context.Context, name string, request schema.MFAWriteLoginEnforcementRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcConfigure +func (i *Identity) OidcConfigure(ctx context.Context, request schema.OidcConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/mfa/login-enforcement/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/identity/oidc/config" requestQueryParameters := make(url.Values) @@ -1470,9 +1492,9 @@ func (i *Identity) MFAWriteLoginEnforcement(ctx context.Context, name string, re ) } -// OIDCDeleteAssignment +// OidcDeleteAssignment // name: Name of the assignment -func (i *Identity) OIDCDeleteAssignment(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcDeleteAssignment(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1494,9 +1516,9 @@ func (i *Identity) OIDCDeleteAssignment(ctx context.Context, name string, option ) } -// OIDCDeleteClient +// OidcDeleteClient // name: Name of the client. -func (i *Identity) OIDCDeleteClient(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcDeleteClient(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1518,9 +1540,9 @@ func (i *Identity) OIDCDeleteClient(ctx context.Context, name string, options .. ) } -// OIDCDeleteKey CRUD operations for OIDC keys. +// OidcDeleteKey CRUD operations for OIDC keys. // name: Name of the key -func (i *Identity) OIDCDeleteKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcDeleteKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1542,9 +1564,9 @@ func (i *Identity) OIDCDeleteKey(ctx context.Context, name string, options ...Re ) } -// OIDCDeleteProvider +// OidcDeleteProvider // name: Name of the provider -func (i *Identity) OIDCDeleteProvider(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcDeleteProvider(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1566,9 +1588,9 @@ func (i *Identity) OIDCDeleteProvider(ctx context.Context, name string, options ) } -// OIDCDeleteRole CRUD operations on OIDC Roles +// OidcDeleteRole CRUD operations on OIDC Roles // name: Name of the role -func (i *Identity) OIDCDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1590,9 +1612,9 @@ func (i *Identity) OIDCDeleteRole(ctx context.Context, name string, options ...R ) } -// OIDCDeleteScope +// OidcDeleteScope // name: Name of the scope -func (i *Identity) OIDCDeleteScope(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcDeleteScope(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1614,8 +1636,32 @@ func (i *Identity) OIDCDeleteScope(ctx context.Context, name string, options ... ) } -// OIDCIntrospect Verify the authenticity of an OIDC token -func (i *Identity) OIDCIntrospect(ctx context.Context, request schema.OIDCIntrospectRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcGenerateToken Generate an OIDC token +// name: Name of the role +func (i *Identity) OidcGenerateToken(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/identity/oidc/token/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + + requestQueryParameters := make(url.Values) + + return sendRequestParseResponse[map[string]interface{}]( + ctx, + i.client, + http.MethodGet, + requestPath, + nil, // request body + requestQueryParameters, + requestModifiers, + ) +} + +// OidcIntrospect Verify the authenticity of an OIDC token +func (i *Identity) OidcIntrospect(ctx context.Context, request schema.OidcIntrospectRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1636,8 +1682,8 @@ func (i *Identity) OIDCIntrospect(ctx context.Context, request schema.OIDCIntros ) } -// OIDCListAssignments -func (i *Identity) OIDCListAssignments(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcListAssignments +func (i *Identity) OidcListAssignments(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1659,8 +1705,8 @@ func (i *Identity) OIDCListAssignments(ctx context.Context, options ...RequestOp ) } -// OIDCListClients -func (i *Identity) OIDCListClients(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcListClients +func (i *Identity) OidcListClients(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1682,8 +1728,8 @@ func (i *Identity) OIDCListClients(ctx context.Context, options ...RequestOption ) } -// OIDCListKeys List OIDC keys -func (i *Identity) OIDCListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcListKeys List OIDC keys +func (i *Identity) OidcListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1705,9 +1751,9 @@ func (i *Identity) OIDCListKeys(ctx context.Context, options ...RequestOption) ( ) } -// OIDCListProviders +// OidcListProviders // allowedClientId: Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids. -func (i *Identity) OIDCListProviders(ctx context.Context, allowedClientId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcListProviders(ctx context.Context, allowedClientId string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1730,8 +1776,8 @@ func (i *Identity) OIDCListProviders(ctx context.Context, allowedClientId string ) } -// OIDCListRoles List configured OIDC roles -func (i *Identity) OIDCListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcListRoles List configured OIDC roles +func (i *Identity) OidcListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1753,8 +1799,8 @@ func (i *Identity) OIDCListRoles(ctx context.Context, options ...RequestOption) ) } -// OIDCListScopes -func (i *Identity) OIDCListScopes(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcListScopes +func (i *Identity) OidcListScopes(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1776,15 +1822,15 @@ func (i *Identity) OIDCListScopes(ctx context.Context, options ...RequestOption) ) } -// OIDCReadAssignment -// name: Name of the assignment -func (i *Identity) OIDCReadAssignment(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcProviderAuthorize +// name: Name of the provider +func (i *Identity) OidcProviderAuthorize(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/assignment/{name}" + requestPath := "/v1/identity/oidc/provider/{name}/authorize" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1800,61 +1846,63 @@ func (i *Identity) OIDCReadAssignment(ctx context.Context, name string, options ) } -// OIDCReadClient -// name: Name of the client. -func (i *Identity) OIDCReadClient(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcProviderAuthorize2 +// name: Name of the provider +func (i *Identity) OidcProviderAuthorize2(ctx context.Context, name string, request schema.OidcProviderAuthorize2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/client/{name}" + requestPath := "/v1/identity/oidc/provider/{name}/authorize" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OIDCReadConfig OIDC configuration -func (i *Identity) OIDCReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcProviderToken +// name: Name of the provider +func (i *Identity) OidcProviderToken(ctx context.Context, name string, request schema.OidcProviderTokenRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/config" + requestPath := "/v1/identity/oidc/provider/{name}/token" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OIDCReadKey CRUD operations for OIDC keys. -// name: Name of the key -func (i *Identity) OIDCReadKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcProviderUserInfo +// name: Name of the provider +func (i *Identity) OidcProviderUserInfo(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/key/{name}" + requestPath := "/v1/identity/oidc/provider/{name}/userinfo" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1870,15 +1918,15 @@ func (i *Identity) OIDCReadKey(ctx context.Context, name string, options ...Requ ) } -// OIDCReadProvider +// OidcProviderUserInfo2 // name: Name of the provider -func (i *Identity) OIDCReadProvider(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcProviderUserInfo2(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}" + requestPath := "/v1/identity/oidc/provider/{name}/userinfo" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1886,7 +1934,7 @@ func (i *Identity) OIDCReadProvider(ctx context.Context, name string, options .. return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1894,15 +1942,15 @@ func (i *Identity) OIDCReadProvider(ctx context.Context, name string, options .. ) } -// OIDCReadProviderAuthorize -// name: Name of the provider -func (i *Identity) OIDCReadProviderAuthorize(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadAssignment +// name: Name of the assignment +func (i *Identity) OidcReadAssignment(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}/authorize" + requestPath := "/v1/identity/oidc/assignment/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1918,15 +1966,15 @@ func (i *Identity) OIDCReadProviderAuthorize(ctx context.Context, name string, o ) } -// OIDCReadProviderUserInfo -// name: Name of the provider -func (i *Identity) OIDCReadProviderUserInfo(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadClient +// name: Name of the client. +func (i *Identity) OidcReadClient(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}/userinfo" + requestPath := "/v1/identity/oidc/client/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1942,16 +1990,14 @@ func (i *Identity) OIDCReadProviderUserInfo(ctx context.Context, name string, op ) } -// OIDCReadProviderWellKnownKeys -// name: Name of the provider -func (i *Identity) OIDCReadProviderWellKnownKeys(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadConfiguration +func (i *Identity) OidcReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}/.well-known/keys" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/identity/oidc/config" requestQueryParameters := make(url.Values) @@ -1966,15 +2012,15 @@ func (i *Identity) OIDCReadProviderWellKnownKeys(ctx context.Context, name strin ) } -// OIDCReadProviderWellKnownOpenIDConfiguration -// name: Name of the provider -func (i *Identity) OIDCReadProviderWellKnownOpenIDConfiguration(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadKey CRUD operations for OIDC keys. +// name: Name of the key +func (i *Identity) OidcReadKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}/.well-known/openid-configuration" + requestPath := "/v1/identity/oidc/key/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1990,16 +2036,14 @@ func (i *Identity) OIDCReadProviderWellKnownOpenIDConfiguration(ctx context.Cont ) } -// OIDCReadRole CRUD operations on OIDC Roles -// name: Name of the role -func (i *Identity) OIDCReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadOpenIdConfiguration Query OIDC configurations +func (i *Identity) OidcReadOpenIdConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/identity/oidc/.well-known/openid-configuration" requestQueryParameters := make(url.Values) @@ -2014,15 +2058,15 @@ func (i *Identity) OIDCReadRole(ctx context.Context, name string, options ...Req ) } -// OIDCReadScope -// name: Name of the scope -func (i *Identity) OIDCReadScope(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadProvider +// name: Name of the provider +func (i *Identity) OidcReadProvider(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/scope/{name}" + requestPath := "/v1/identity/oidc/provider/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2038,15 +2082,15 @@ func (i *Identity) OIDCReadScope(ctx context.Context, name string, options ...Re ) } -// OIDCReadToken Generate an OIDC token -// name: Name of the role -func (i *Identity) OIDCReadToken(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadProviderOpenIdConfiguration +// name: Name of the provider +func (i *Identity) OidcReadProviderOpenIdConfiguration(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/token/{name}" + requestPath := "/v1/identity/oidc/provider/{name}/.well-known/openid-configuration" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2062,14 +2106,16 @@ func (i *Identity) OIDCReadToken(ctx context.Context, name string, options ...Re ) } -// OIDCReadWellKnownKeys Retrieve public keys -func (i *Identity) OIDCReadWellKnownKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadProviderPublicKeys +// name: Name of the provider +func (i *Identity) OidcReadProviderPublicKeys(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/.well-known/keys" + requestPath := "/v1/identity/oidc/provider/{name}/.well-known/keys" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2084,14 +2130,14 @@ func (i *Identity) OIDCReadWellKnownKeys(ctx context.Context, options ...Request ) } -// OIDCReadWellKnownOpenIDConfiguration Query OIDC configurations -func (i *Identity) OIDCReadWellKnownOpenIDConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadPublicKeys Retrieve public keys +func (i *Identity) OidcReadPublicKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/.well-known/openid-configuration" + requestPath := "/v1/identity/oidc/.well-known/keys" requestQueryParameters := make(url.Values) @@ -2106,63 +2152,63 @@ func (i *Identity) OIDCReadWellKnownOpenIDConfiguration(ctx context.Context, opt ) } -// OIDCRotateKey Rotate a named OIDC key. -// name: Name of the key -func (i *Identity) OIDCRotateKey(ctx context.Context, name string, request schema.OIDCRotateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadRole CRUD operations on OIDC Roles +// name: Name of the role +func (i *Identity) OidcReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/key/{name}/rotate" + requestPath := "/v1/identity/oidc/role/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OIDCWriteAssignment -// name: Name of the assignment -func (i *Identity) OIDCWriteAssignment(ctx context.Context, name string, request schema.OIDCWriteAssignmentRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcReadScope +// name: Name of the scope +func (i *Identity) OidcReadScope(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/assignment/{name}" + requestPath := "/v1/identity/oidc/scope/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OIDCWriteClient -// name: Name of the client. -func (i *Identity) OIDCWriteClient(ctx context.Context, name string, request schema.OIDCWriteClientRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcRotateKey Rotate a named OIDC key. +// name: Name of the key +func (i *Identity) OidcRotateKey(ctx context.Context, name string, request schema.OidcRotateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/client/{name}" + requestPath := "/v1/identity/oidc/key/{name}/rotate" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2178,14 +2224,16 @@ func (i *Identity) OIDCWriteClient(ctx context.Context, name string, request sch ) } -// OIDCWriteConfig OIDC configuration -func (i *Identity) OIDCWriteConfig(ctx context.Context, request schema.OIDCWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcWriteAssignment +// name: Name of the assignment +func (i *Identity) OidcWriteAssignment(ctx context.Context, name string, request schema.OidcWriteAssignmentRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/config" + requestPath := "/v1/identity/oidc/assignment/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2200,15 +2248,15 @@ func (i *Identity) OIDCWriteConfig(ctx context.Context, request schema.OIDCWrite ) } -// OIDCWriteKey CRUD operations for OIDC keys. -// name: Name of the key -func (i *Identity) OIDCWriteKey(ctx context.Context, name string, request schema.OIDCWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcWriteClient +// name: Name of the client. +func (i *Identity) OidcWriteClient(ctx context.Context, name string, request schema.OidcWriteClientRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/key/{name}" + requestPath := "/v1/identity/oidc/client/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2224,15 +2272,15 @@ func (i *Identity) OIDCWriteKey(ctx context.Context, name string, request schema ) } -// OIDCWriteProvider -// name: Name of the provider -func (i *Identity) OIDCWriteProvider(ctx context.Context, name string, request schema.OIDCWriteProviderRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcWriteKey CRUD operations for OIDC keys. +// name: Name of the key +func (i *Identity) OidcWriteKey(ctx context.Context, name string, request schema.OidcWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}" + requestPath := "/v1/identity/oidc/key/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2248,15 +2296,15 @@ func (i *Identity) OIDCWriteProvider(ctx context.Context, name string, request s ) } -// OIDCWriteProviderAuthorize +// OidcWriteProvider // name: Name of the provider -func (i *Identity) OIDCWriteProviderAuthorize(ctx context.Context, name string, request schema.OIDCWriteProviderAuthorizeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) OidcWriteProvider(ctx context.Context, name string, request schema.OidcWriteProviderRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}/authorize" + requestPath := "/v1/identity/oidc/provider/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2272,15 +2320,15 @@ func (i *Identity) OIDCWriteProviderAuthorize(ctx context.Context, name string, ) } -// OIDCWriteProviderToken -// name: Name of the provider -func (i *Identity) OIDCWriteProviderToken(ctx context.Context, name string, request schema.OIDCWriteProviderTokenRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcWriteRole CRUD operations on OIDC Roles +// name: Name of the role +func (i *Identity) OidcWriteRole(ctx context.Context, name string, request schema.OidcWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/provider/{name}/token" + requestPath := "/v1/identity/oidc/role/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2296,39 +2344,15 @@ func (i *Identity) OIDCWriteProviderToken(ctx context.Context, name string, requ ) } -// OIDCWriteProviderUserInfo -// name: Name of the provider -func (i *Identity) OIDCWriteProviderUserInfo(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/identity/oidc/provider/{name}/userinfo" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - i.client, - http.MethodPost, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// OIDCWriteRole CRUD operations on OIDC Roles -// name: Name of the role -func (i *Identity) OIDCWriteRole(ctx context.Context, name string, request schema.OIDCWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// OidcWriteScope +// name: Name of the scope +func (i *Identity) OidcWriteScope(ctx context.Context, name string, request schema.OidcWriteScopeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/role/{name}" + requestPath := "/v1/identity/oidc/scope/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2344,16 +2368,14 @@ func (i *Identity) OIDCWriteRole(ctx context.Context, name string, request schem ) } -// OIDCWriteScope -// name: Name of the scope -func (i *Identity) OIDCWriteScope(ctx context.Context, name string, request schema.OIDCWriteScopeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PersonaCreate Create a new alias. +func (i *Identity) PersonaCreate(ctx context.Context, request schema.PersonaCreateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/oidc/scope/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/identity/persona" requestQueryParameters := make(url.Values) @@ -2368,9 +2390,9 @@ func (i *Identity) OIDCWriteScope(ctx context.Context, name string, request sche ) } -// PersonaIDDeleteByID Update, read or delete an alias ID. +// PersonaDeleteById // id: ID of the persona -func (i *Identity) PersonaIDDeleteByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) PersonaDeleteById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2392,18 +2414,17 @@ func (i *Identity) PersonaIDDeleteByID(ctx context.Context, id string, options . ) } -// PersonaIDReadByID Update, read or delete an alias ID. -// id: ID of the persona -func (i *Identity) PersonaIDReadByID(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PersonaListById List all the alias IDs. +func (i *Identity) PersonaListById(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/persona/id/{id}" - requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) + requestPath := "/v1/identity/persona/id" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -2416,9 +2437,9 @@ func (i *Identity) PersonaIDReadByID(ctx context.Context, id string, options ... ) } -// PersonaIDWriteByID Update, read or delete an alias ID. +// PersonaReadById // id: ID of the persona -func (i *Identity) PersonaIDWriteByID(ctx context.Context, id string, request schema.PersonaIDWriteByIDRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (i *Identity) PersonaReadById(ctx context.Context, id string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2429,29 +2450,6 @@ func (i *Identity) PersonaIDWriteByID(ctx context.Context, id string, request sc requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - i.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// PersonaListByID List all the alias IDs. -func (i *Identity) PersonaListByID(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/identity/persona/id" - - requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( ctx, i.client, @@ -2463,14 +2461,16 @@ func (i *Identity) PersonaListByID(ctx context.Context, options ...RequestOption ) } -// PersonaWrite Create a new alias. -func (i *Identity) PersonaWrite(ctx context.Context, request schema.PersonaWriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PersonaUpdateById +// id: ID of the persona +func (i *Identity) PersonaUpdateById(ctx context.Context, id string, request schema.PersonaUpdateByIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/identity/persona" + requestPath := "/v1/identity/persona/id/{id}" + requestPath = strings.Replace(requestPath, "{"+"id"+"}", url.PathEscape(id), -1) requestQueryParameters := make(url.Values) diff --git a/api_secrets.go b/api_secrets.go index 54a4a5b3..a04c1698 100644 --- a/api_secrets.go +++ b/api_secrets.go @@ -19,45 +19,47 @@ type Secrets struct { client *Client } -// AWSConfigReadLease Configure the default lease information for generated credentials. -func (s *Secrets) AWSConfigReadLease(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudConfigure +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudConfigure(ctx context.Context, alicloudMountPath string, request schema.AliCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/config/lease" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/{alicloud_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSConfigReadRootIAMCredentials Configure the root credentials that are used to manage IAM. -func (s *Secrets) AWSConfigReadRootIAMCredentials(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudDeleteConfiguration +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudDeleteConfiguration(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/config/root" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/{alicloud_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -65,22 +67,25 @@ func (s *Secrets) AWSConfigReadRootIAMCredentials(ctx context.Context, options . ) } -// AWSConfigRotateRootIAMCredentials -func (s *Secrets) AWSConfigRotateRootIAMCredentials(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudDeleteRole Read, write and reference policies and roles that API keys or STS credentials can be made for. +// name: The name of the role. +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudDeleteRole(ctx context.Context, name string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/config/rotate-root" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/{alicloud_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -88,70 +93,74 @@ func (s *Secrets) AWSConfigRotateRootIAMCredentials(ctx context.Context, options ) } -// AWSConfigWriteLease Configure the default lease information for generated credentials. -func (s *Secrets) AWSConfigWriteLease(ctx context.Context, request schema.AWSConfigWriteLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudGenerateCredentials Generate an API key or STS credential using the given role's configuration.' +// name: The name of the role. +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudGenerateCredentials(ctx context.Context, name string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/config/lease" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/{alicloud_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSConfigWriteRootIAMCredentials Configure the root credentials that are used to manage IAM. -func (s *Secrets) AWSConfigWriteRootIAMCredentials(ctx context.Context, request schema.AWSConfigWriteRootIAMCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudListRoles List the existing roles in this backend. +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudListRoles(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/config/root" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/{alicloud_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSDeleteRole Read, write and reference IAM policies that access keys can be made for. -// name: Name of the policy -func (s *Secrets) AWSDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudReadConfiguration +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudReadConfiguration(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{alicloud_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -159,18 +168,20 @@ func (s *Secrets) AWSDeleteRole(ctx context.Context, name string, options ...Req ) } -// AWSListRoles List the existing roles in this backend -func (s *Secrets) AWSListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudReadRole Read, write and reference policies and roles that API keys or STS credentials can be made for. +// name: The name of the role. +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudReadRole(ctx context.Context, name string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/{alicloud_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -183,136 +194,142 @@ func (s *Secrets) AWSListRoles(ctx context.Context, options ...RequestOption) (* ) } -// AWSReadCredentials Generate AWS credentials from a specific Vault role. -func (s *Secrets) AWSReadCredentials(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AliCloudWriteRole Read, write and reference policies and roles that API keys or STS credentials can be made for. +// name: The name of the role. +// alicloudMountPath: Path that the backend was mounted at +func (s *Secrets) AliCloudWriteRole(ctx context.Context, name string, alicloudMountPath string, request schema.AliCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/creds" - requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath := "/v1/{alicloud_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSReadRole Read, write and reference IAM policies that access keys can be made for. -// name: Name of the policy -func (s *Secrets) AWSReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureLease +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsConfigureLease(ctx context.Context, awsMountPath string, request schema.AwsConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/roles/{name}" + requestPath := "/v1/{aws_mount_path}/config/lease" requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSReadSecurityTokenService Generate AWS credentials from a specific Vault role. -// name: Name of the role -func (s *Secrets) AWSReadSecurityTokenService(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsConfigureRootIamCredentials +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsConfigureRootIamCredentials(ctx context.Context, awsMountPath string, request schema.AwsConfigureRootIamCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/sts/{name}" + requestPath := "/v1/{aws_mount_path}/config/root" requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// AWSWriteCredentials Generate AWS credentials from a specific Vault role. -func (s *Secrets) AWSWriteCredentials(ctx context.Context, request schema.AWSWriteCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsDeleteRole Read, write and reference IAM policies that access keys can be made for. +// name: Name of the policy +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsDeleteRole(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/creds" + requestPath := "/v1/{aws_mount_path}/roles/{name}" requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSWriteRole Read, write and reference IAM policies that access keys can be made for. -// name: Name of the policy -func (s *Secrets) AWSWriteRole(ctx context.Context, name string, request schema.AWSWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsGenerateCredentials +// name: Name of the role +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsGenerateCredentials(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/roles/{name}" + requestPath := "/v1/{aws_mount_path}/creds/{name}" requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AWSWriteSecurityTokenService Generate AWS credentials from a specific Vault role. +// AwsGenerateCredentials2 // name: Name of the role -func (s *Secrets) AWSWriteSecurityTokenService(ctx context.Context, name string, request schema.AWSWriteSecurityTokenServiceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsGenerateCredentials2(ctx context.Context, name string, awsMountPath string, request schema.AwsGenerateCredentials2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{aws_mount_path}/sts/{name}" + requestPath := "/v1/{aws_mount_path}/creds/{name}" requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) @@ -329,41 +346,43 @@ func (s *Secrets) AWSWriteSecurityTokenService(ctx context.Context, name string, ) } -// ActiveDirectoryCheckInLibrary Check service accounts in to the library. -// name: Name of the set. -func (s *Secrets) ActiveDirectoryCheckInLibrary(ctx context.Context, name string, request schema.ActiveDirectoryCheckInLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsGenerateStsCredentials +// name: Name of the role +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsGenerateStsCredentials(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library/{name}/check-in" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{aws_mount_path}/sts/{name}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// ActiveDirectoryCheckInManageLibrary Check service accounts in to the library. -// name: Name of the set. -func (s *Secrets) ActiveDirectoryCheckInManageLibrary(ctx context.Context, name string, request schema.ActiveDirectoryCheckInManageLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsGenerateStsCredentials2 +// name: Name of the role +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsGenerateStsCredentials2(ctx context.Context, name string, awsMountPath string, request schema.AwsGenerateStsCredentials2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library/manage/{name}/check-in" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{aws_mount_path}/sts/{name}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -379,47 +398,48 @@ func (s *Secrets) ActiveDirectoryCheckInManageLibrary(ctx context.Context, name ) } -// ActiveDirectoryCheckOutLibrary Check a service account out from the library. -// name: Name of the set -func (s *Secrets) ActiveDirectoryCheckOutLibrary(ctx context.Context, name string, request schema.ActiveDirectoryCheckOutLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsListRoles List the existing roles in this backend +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsListRoles(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library/{name}/check-out" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{aws_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// ActiveDirectoryDeleteConfig Configure the AD server to connect to, along with password options. -func (s *Secrets) ActiveDirectoryDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadLeaseConfiguration +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsReadLeaseConfiguration(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{aws_mount_path}/config/lease" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -427,16 +447,17 @@ func (s *Secrets) ActiveDirectoryDeleteConfig(ctx context.Context, options ...Re ) } -// ActiveDirectoryDeleteLibrary Delete a library set. -// name: Name of the set. -func (s *Secrets) ActiveDirectoryDeleteLibrary(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadRole Read, write and reference IAM policies that access keys can be made for. +// name: Name of the policy +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsReadRole(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{aws_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -444,7 +465,7 @@ func (s *Secrets) ActiveDirectoryDeleteLibrary(ctx context.Context, name string, return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -452,24 +473,23 @@ func (s *Secrets) ActiveDirectoryDeleteLibrary(ctx context.Context, name string, ) } -// ActiveDirectoryDeleteRole Manage roles to build links between Vault and Active Directory service accounts. -// name: Name of the role -func (s *Secrets) ActiveDirectoryDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsReadRootIamCredentialsConfiguration +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsReadRootIamCredentialsConfiguration(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{aws_mount_path}/config/root" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -477,23 +497,23 @@ func (s *Secrets) ActiveDirectoryDeleteRole(ctx context.Context, name string, op ) } -// ActiveDirectoryListLibraries -func (s *Secrets) ActiveDirectoryListLibraries(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsRotateRootIamCredentials +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsRotateRootIamCredentials(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{aws_mount_path}/config/rotate-root" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -501,71 +521,73 @@ func (s *Secrets) ActiveDirectoryListLibraries(ctx context.Context, options ...R ) } -// ActiveDirectoryListRoles List the name of each role currently stored. -func (s *Secrets) ActiveDirectoryListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AwsWriteRole Read, write and reference IAM policies that access keys can be made for. +// name: Name of the policy +// awsMountPath: Path that the backend was mounted at +func (s *Secrets) AwsWriteRole(ctx context.Context, name string, awsMountPath string, request schema.AwsWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{aws_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"aws_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("aws")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ActiveDirectoryReadConfig Configure the AD server to connect to, along with password options. -func (s *Secrets) ActiveDirectoryReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureConfigure +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureConfigure(ctx context.Context, azureMountPath string, request schema.AzureConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{azure_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ActiveDirectoryReadCredentials -// name: Name of the role -func (s *Secrets) ActiveDirectoryReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureDeleteConfiguration +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureDeleteConfiguration(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{azure_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -573,16 +595,17 @@ func (s *Secrets) ActiveDirectoryReadCredentials(ctx context.Context, name strin ) } -// ActiveDirectoryReadLibrary Read a library set. -// name: Name of the set. -func (s *Secrets) ActiveDirectoryReadLibrary(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureDeleteRole Manage the Vault roles used to generate Azure credentials. +// name: Name of the role. +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureDeleteRole(ctx context.Context, name string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{azure_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -590,7 +613,7 @@ func (s *Secrets) ActiveDirectoryReadLibrary(ctx context.Context, name string, o return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -598,19 +621,19 @@ func (s *Secrets) ActiveDirectoryReadLibrary(ctx context.Context, name string, o ) } -// ActiveDirectoryReadLibraryStatus Check the status of the service accounts in a library set. -// name: Name of the set. -func (s *Secrets) ActiveDirectoryReadLibraryStatus(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureListRoles List existing roles. +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureListRoles(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library/{name}/status" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{azure_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -623,17 +646,16 @@ func (s *Secrets) ActiveDirectoryReadLibraryStatus(ctx context.Context, name str ) } -// ActiveDirectoryReadRole Manage roles to build links between Vault and Active Directory service accounts. -// name: Name of the role -func (s *Secrets) ActiveDirectoryReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureReadConfiguration +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureReadConfiguration(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{azure_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestQueryParameters := make(url.Values) @@ -648,16 +670,17 @@ func (s *Secrets) ActiveDirectoryReadRole(ctx context.Context, name string, opti ) } -// ActiveDirectoryRotateRole -// name: Name of the static role -func (s *Secrets) ActiveDirectoryRotateRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureReadRole Manage the Vault roles used to generate Azure credentials. +// name: Name of the role. +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureReadRole(ctx context.Context, name string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/rotate-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{azure_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -665,7 +688,7 @@ func (s *Secrets) ActiveDirectoryRotateRole(ctx context.Context, name string, op return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -673,22 +696,25 @@ func (s *Secrets) ActiveDirectoryRotateRole(ctx context.Context, name string, op ) } -// ActiveDirectoryRotateRoot -func (s *Secrets) ActiveDirectoryRotateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureRequestServicePrincipalCredentials +// role: Name of the Vault role +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureRequestServicePrincipalCredentials(ctx context.Context, role string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/rotate-root" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{azure_mount_path}/creds/{role}" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -696,39 +722,41 @@ func (s *Secrets) ActiveDirectoryRotateRoot(ctx context.Context, options ...Requ ) } -// ActiveDirectoryWriteConfig Configure the AD server to connect to, along with password options. -func (s *Secrets) ActiveDirectoryWriteConfig(ctx context.Context, request schema.ActiveDirectoryWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureRotateRoot +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureRotateRoot(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{azure_mount_path}/rotate-root" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// ActiveDirectoryWriteLibrary Update a library set. -// name: Name of the set. -func (s *Secrets) ActiveDirectoryWriteLibrary(ctx context.Context, name string, request schema.ActiveDirectoryWriteLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AzureWriteRole Manage the Vault roles used to generate Azure credentials. +// name: Name of the role. +// azureMountPath: Path that the backend was mounted at +func (s *Secrets) AzureWriteRole(ctx context.Context, name string, azureMountPath string, request schema.AzureWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) + requestPath := "/v1/{azure_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -744,17 +772,16 @@ func (s *Secrets) ActiveDirectoryWriteLibrary(ctx context.Context, name string, ) } -// ActiveDirectoryWriteRole Manage roles to build links between Vault and Active Directory service accounts. -// name: Name of the role -func (s *Secrets) ActiveDirectoryWriteRole(ctx context.Context, name string, request schema.ActiveDirectoryWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ConsulConfigureAccess +// consulMountPath: Path that the backend was mounted at +func (s *Secrets) ConsulConfigureAccess(ctx context.Context, consulMountPath string, request schema.ConsulConfigureAccessRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ad_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"ad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ad")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{consul_mount_path}/config/access" + requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) requestQueryParameters := make(url.Values) @@ -769,15 +796,18 @@ func (s *Secrets) ActiveDirectoryWriteRole(ctx context.Context, name string, req ) } -// AliCloudDeleteConfig Configure the access key and secret to use for RAM and STS calls. -func (s *Secrets) AliCloudDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ConsulDeleteRole +// name: Name of the role. +// consulMountPath: Path that the backend was mounted at +func (s *Secrets) ConsulDeleteRole(ctx context.Context, name string, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/{consul_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -792,24 +822,25 @@ func (s *Secrets) AliCloudDeleteConfig(ctx context.Context, options ...RequestOp ) } -// AliCloudDeleteRole Read, write and reference policies and roles that API keys or STS credentials can be made for. -// name: The name of the role. -func (s *Secrets) AliCloudDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ConsulGenerateCredentials +// role: Name of the role. +// consulMountPath: Path that the backend was mounted at +func (s *Secrets) ConsulGenerateCredentials(ctx context.Context, role string, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{consul_mount_path}/creds/{role}" + requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -817,16 +848,17 @@ func (s *Secrets) AliCloudDeleteRole(ctx context.Context, name string, options . ) } -// AliCloudListRoles List the existing roles in this backend. -func (s *Secrets) AliCloudListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ConsulListRoles +// consulMountPath: Path that the backend was mounted at +func (s *Secrets) ConsulListRoles(ctx context.Context, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) - + requestPath := "/v1/{consul_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -841,15 +873,16 @@ func (s *Secrets) AliCloudListRoles(ctx context.Context, options ...RequestOptio ) } -// AliCloudReadConfig Configure the access key and secret to use for RAM and STS calls. -func (s *Secrets) AliCloudReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ConsulReadAccessConfiguration +// consulMountPath: Path that the backend was mounted at +func (s *Secrets) ConsulReadAccessConfiguration(ctx context.Context, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/{consul_mount_path}/config/access" + requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) requestQueryParameters := make(url.Values) @@ -864,16 +897,17 @@ func (s *Secrets) AliCloudReadConfig(ctx context.Context, options ...RequestOpti ) } -// AliCloudReadCredentials Generate an API key or STS credential using the given role's configuration.' -// name: The name of the role. -func (s *Secrets) AliCloudReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ConsulReadRole +// name: Name of the role. +// consulMountPath: Path that the backend was mounted at +func (s *Secrets) ConsulReadRole(ctx context.Context, name string, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/{consul_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -889,20 +923,70 @@ func (s *Secrets) AliCloudReadCredentials(ctx context.Context, name string, opti ) } -// AliCloudReadRole Read, write and reference policies and roles that API keys or STS credentials can be made for. -// name: The name of the role. -func (s *Secrets) AliCloudReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ConsulWriteRole +// name: Name of the role. +// consulMountPath: Path that the backend was mounted at +func (s *Secrets) ConsulWriteRole(ctx context.Context, name string, consulMountPath string, request schema.ConsulWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/{consul_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + s.client, + http.MethodPost, + requestPath, + request, + requestQueryParameters, + requestModifiers, + ) +} + +// CubbyholeDelete Deletes the secret at the specified location. +// path: Specifies the path of the secret. +func (s *Secrets) CubbyholeDelete(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/cubbyhole/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + + requestQueryParameters := make(url.Values) + + return sendRequestParseResponse[map[string]interface{}]( + ctx, + s.client, + http.MethodDelete, + requestPath, + nil, // request body + requestQueryParameters, + requestModifiers, + ) +} + +// CubbyholeRead Retrieve the secret at the specified location. +// path: Specifies the path of the secret. +func (s *Secrets) CubbyholeRead(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/cubbyhole/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + + requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, @@ -914,39 +998,41 @@ func (s *Secrets) AliCloudReadRole(ctx context.Context, name string, options ... ) } -// AliCloudWriteConfig Configure the access key and secret to use for RAM and STS calls. -func (s *Secrets) AliCloudWriteConfig(ctx context.Context, request schema.AliCloudWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CubbyholeWrite Store a secret at the specified location. +// path: Specifies the path of the secret. +func (s *Secrets) CubbyholeWrite(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/cubbyhole/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AliCloudWriteRole Read, write and reference policies and roles that API keys or STS credentials can be made for. -// name: The name of the role. -func (s *Secrets) AliCloudWriteRole(ctx context.Context, name string, request schema.AliCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseConfigureConnection +// name: Name of this database connection +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseConfigureConnection(ctx context.Context, name string, databaseMountPath string, request schema.DatabaseConfigureConnectionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{alicloud_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"alicloud_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("alicloud")), -1) + requestPath := "/v1/{database_mount_path}/config/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -962,15 +1048,18 @@ func (s *Secrets) AliCloudWriteRole(ctx context.Context, name string, request sc ) } -// AzureDeleteConfig -func (s *Secrets) AzureDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseDeleteConnectionConfiguration +// name: Name of this database connection +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseDeleteConnectionConfiguration(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath := "/v1/{database_mount_path}/config/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -985,16 +1074,17 @@ func (s *Secrets) AzureDeleteConfig(ctx context.Context, options ...RequestOptio ) } -// AzureDeleteRole Manage the Vault roles used to generate Azure credentials. +// DatabaseDeleteRole Manage the roles that can be created with this backend. // name: Name of the role. -func (s *Secrets) AzureDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseDeleteRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath := "/v1/{database_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1010,23 +1100,25 @@ func (s *Secrets) AzureDeleteRole(ctx context.Context, name string, options ...R ) } -// AzureListRoles List existing roles. -func (s *Secrets) AzureListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseDeleteStaticRole Manage the static roles that can be created with this backend. +// name: Name of the role. +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseDeleteStaticRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath := "/v1/{database_mount_path}/static-roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1034,15 +1126,18 @@ func (s *Secrets) AzureListRoles(ctx context.Context, options ...RequestOption) ) } -// AzureReadConfig -func (s *Secrets) AzureReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseGenerateCredentials Request database credentials for a certain role. +// name: Name of the role. +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseGenerateCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath := "/v1/{database_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1057,19 +1152,19 @@ func (s *Secrets) AzureReadConfig(ctx context.Context, options ...RequestOption) ) } -// AzureReadCredentials -// role: Name of the Vault role -func (s *Secrets) AzureReadCredentials(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseListConnections Configure connection details to a database plugin. +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseListConnections(ctx context.Context, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/creds/{role}" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/{database_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1082,19 +1177,19 @@ func (s *Secrets) AzureReadCredentials(ctx context.Context, role string, options ) } -// AzureReadRole Manage the Vault roles used to generate Azure credentials. -// name: Name of the role. -func (s *Secrets) AzureReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseListRoles Manage the roles that can be created with this backend. +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseListRoles(ctx context.Context, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{database_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1107,22 +1202,24 @@ func (s *Secrets) AzureReadRole(ctx context.Context, name string, options ...Req ) } -// AzureRotateRoot -func (s *Secrets) AzureRotateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseListStaticRoles Manage the static roles that can be created with this backend. +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseListStaticRoles(ctx context.Context, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/rotate-root" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath := "/v1/{database_mount_path}/static-roles" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -1130,64 +1227,69 @@ func (s *Secrets) AzureRotateRoot(ctx context.Context, options ...RequestOption) ) } -// AzureWriteConfig -func (s *Secrets) AzureWriteConfig(ctx context.Context, request schema.AzureWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseReadConnectionConfiguration +// name: Name of this database connection +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseReadConnectionConfiguration(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath := "/v1/{database_mount_path}/config/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// AzureWriteRole Manage the Vault roles used to generate Azure credentials. +// DatabaseReadRole Manage the roles that can be created with this backend. // name: Name of the role. -func (s *Secrets) AzureWriteRole(ctx context.Context, name string, request schema.AzureWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseReadRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{azure_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"azure_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("azure")), -1) + requestPath := "/v1/{database_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// ConsulDeleteRole +// DatabaseReadStaticRole Manage the static roles that can be created with this backend. // name: Name of the role. -func (s *Secrets) ConsulDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseReadStaticRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{consul_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath := "/v1/{database_mount_path}/static-roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1195,7 +1297,7 @@ func (s *Secrets) ConsulDeleteRole(ctx context.Context, name string, options ... return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -1203,18 +1305,20 @@ func (s *Secrets) ConsulDeleteRole(ctx context.Context, name string, options ... ) } -// ConsulListRoles -func (s *Secrets) ConsulListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseReadStaticRoleCredentials Request database credentials for a certain static role. These credentials are rotated periodically. +// name: Name of the static role. +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseReadStaticRoleCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{consul_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath := "/v1/{database_mount_path}/static-creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1227,22 +1331,25 @@ func (s *Secrets) ConsulListRoles(ctx context.Context, options ...RequestOption) ) } -// ConsulReadAccessConfig -func (s *Secrets) ConsulReadAccessConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseResetConnection Resets a database plugin. +// name: Name of this database connection +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseResetConnection(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{consul_mount_path}/config/access" - requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath := "/v1/{database_mount_path}/reset/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1250,24 +1357,25 @@ func (s *Secrets) ConsulReadAccessConfig(ctx context.Context, options ...Request ) } -// ConsulReadCredentials -// role: Name of the role. -func (s *Secrets) ConsulReadCredentials(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseRotateRootCredentials +// name: Name of this database connection +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseRotateRootCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{consul_mount_path}/creds/{role}" - requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/{database_mount_path}/rotate-root/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1275,16 +1383,17 @@ func (s *Secrets) ConsulReadCredentials(ctx context.Context, role string, option ) } -// ConsulReadRole -// name: Name of the role. -func (s *Secrets) ConsulReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseRotateStaticRoleCredentials +// name: Name of the static role +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseRotateStaticRoleCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{consul_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath := "/v1/{database_mount_path}/rotate-role/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1292,7 +1401,7 @@ func (s *Secrets) ConsulReadRole(ctx context.Context, name string, options ...Re return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1300,15 +1409,18 @@ func (s *Secrets) ConsulReadRole(ctx context.Context, name string, options ...Re ) } -// ConsulWriteAccessConfig -func (s *Secrets) ConsulWriteAccessConfig(ctx context.Context, request schema.ConsulWriteAccessConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// DatabaseWriteRole Manage the roles that can be created with this backend. +// name: Name of the role. +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseWriteRole(ctx context.Context, name string, databaseMountPath string, request schema.DatabaseWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{consul_mount_path}/config/access" - requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath := "/v1/{database_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1323,16 +1435,17 @@ func (s *Secrets) ConsulWriteAccessConfig(ctx context.Context, request schema.Co ) } -// ConsulWriteRole +// DatabaseWriteStaticRole Manage the static roles that can be created with this backend. // name: Name of the role. -func (s *Secrets) ConsulWriteRole(ctx context.Context, name string, request schema.ConsulWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// databaseMountPath: Path that the backend was mounted at +func (s *Secrets) DatabaseWriteStaticRole(ctx context.Context, name string, databaseMountPath string, request schema.DatabaseWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{consul_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"consul_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("consul")), -1) + requestPath := "/v1/{database_mount_path}/static-roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1348,50 +1461,49 @@ func (s *Secrets) ConsulWriteRole(ctx context.Context, name string, request sche ) } -// CubbyholeDelete Deletes the secret at the specified location. -// path: Specifies the path of the secret. -func (s *Secrets) CubbyholeDelete(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudConfigure +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudConfigure(ctx context.Context, gcpMountPath string, request schema.GoogleCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{cubbyhole_mount_path}/{path}" - requestPath = strings.Replace(requestPath, "{"+"cubbyhole_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cubbyhole")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// CubbyholeRead Retrieve the secret at the specified location. -// path: Specifies the path of the secret. -func (s *Secrets) CubbyholeRead(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudDeleteImpersonatedAccount +// name: Required. Name to refer to this impersonated account in Vault. Cannot be updated. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudDeleteImpersonatedAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{cubbyhole_mount_path}/{path}" - requestPath = strings.Replace(requestPath, "{"+"cubbyhole_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cubbyhole")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/impersonated-account/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1399,24 +1511,25 @@ func (s *Secrets) CubbyholeRead(ctx context.Context, path string, options ...Req ) } -// CubbyholeWrite Store a secret at the specified location. -// path: Specifies the path of the secret. -func (s *Secrets) CubbyholeWrite(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudDeleteRoleset +// name: Required. Name of the role. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudDeleteRoleset(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{cubbyhole_mount_path}/{path}" - requestPath = strings.Replace(requestPath, "{"+"cubbyhole_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("cubbyhole")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1424,16 +1537,17 @@ func (s *Secrets) CubbyholeWrite(ctx context.Context, path string, options ...Re ) } -// DatabaseDeleteConfig Configure connection details to a database plugin. -// name: Name of this database connection -func (s *Secrets) DatabaseDeleteConfig(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudDeleteStaticAccount +// name: Required. Name to refer to this static account in Vault. Cannot be updated. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudDeleteStaticAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/config/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1449,16 +1563,17 @@ func (s *Secrets) DatabaseDeleteConfig(ctx context.Context, name string, options ) } -// DatabaseDeleteRole Manage the roles that can be created with this backend. -// name: Name of the role. -func (s *Secrets) DatabaseDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateImpersonatedAccountAccessToken +// name: Required. Name of the impersonated account. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/impersonated-account/{name}/token" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1466,7 +1581,7 @@ func (s *Secrets) DatabaseDeleteRole(ctx context.Context, name string, options . return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -1474,16 +1589,17 @@ func (s *Secrets) DatabaseDeleteRole(ctx context.Context, name string, options . ) } -// DatabaseDeleteStaticRole Manage the static roles that can be created with this backend. -// name: Name of the role. -func (s *Secrets) DatabaseDeleteStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateImpersonatedAccountAccessToken2 +// name: Required. Name of the impersonated account. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken2(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/static-roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/impersonated-account/{name}/token" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1491,7 +1607,7 @@ func (s *Secrets) DatabaseDeleteStaticRole(ctx context.Context, name string, opt return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1499,18 +1615,20 @@ func (s *Secrets) DatabaseDeleteStaticRole(ctx context.Context, name string, opt ) } -// DatabaseListConfig Configure connection details to a database plugin. -func (s *Secrets) DatabaseListConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetAccessToken +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetAccessToken(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/token" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1523,18 +1641,20 @@ func (s *Secrets) DatabaseListConfig(ctx context.Context, options ...RequestOpti ) } -// DatabaseListRoles Manage the roles that can be created with this backend. -func (s *Secrets) DatabaseListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetAccessToken2 +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetAccessToken2(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/token/{roleset}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1547,23 +1667,25 @@ func (s *Secrets) DatabaseListRoles(ctx context.Context, options ...RequestOptio ) } -// DatabaseListStaticRoles Manage the static roles that can be created with this backend. -func (s *Secrets) DatabaseListStaticRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetAccessTokenWithParameters +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/static-roles" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/token" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1571,24 +1693,25 @@ func (s *Secrets) DatabaseListStaticRoles(ctx context.Context, options ...Reques ) } -// DatabaseReadConfig Configure connection details to a database plugin. -// name: Name of this database connection -func (s *Secrets) DatabaseReadConfig(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetAccessTokenWithParameters2 +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters2(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/config/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcp_mount_path}/token/{roleset}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1596,17 +1719,18 @@ func (s *Secrets) DatabaseReadConfig(ctx context.Context, name string, options . ) } -// DatabaseReadCredentials Request database credentials for a certain role. -// name: Name of the role. -func (s *Secrets) DatabaseReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetKey +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetKey(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/key" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) @@ -1621,17 +1745,18 @@ func (s *Secrets) DatabaseReadCredentials(ctx context.Context, name string, opti ) } -// DatabaseReadRole Manage the roles that can be created with this backend. -// name: Name of the role. -func (s *Secrets) DatabaseReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetKey2 +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetKey2(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcp_mount_path}/key/{roleset}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) @@ -1646,66 +1771,69 @@ func (s *Secrets) DatabaseReadRole(ctx context.Context, name string, options ... ) } -// DatabaseReadStaticCredentials Request database credentials for a certain static role. These credentials are rotated periodically. -// name: Name of the static role. -func (s *Secrets) DatabaseReadStaticCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetKeyWithParameters +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters(ctx context.Context, roleset string, gcpMountPath string, request schema.GoogleCloudGenerateRolesetKeyWithParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/static-creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/key" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// DatabaseReadStaticRole Manage the static roles that can be created with this backend. -// name: Name of the role. -func (s *Secrets) DatabaseReadStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateRolesetKeyWithParameters2 +// roleset: Required. Name of the role set. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters2(ctx context.Context, roleset string, gcpMountPath string, request schema.GoogleCloudGenerateRolesetKeyWithParameters2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/static-roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcp_mount_path}/key/{roleset}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// DatabaseReset Resets a database plugin. -// name: Name of this database connection -func (s *Secrets) DatabaseReset(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateStaticAccountAccessToken +// name: Required. Name of the static account. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateStaticAccountAccessToken(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/reset/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}/token" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1713,7 +1841,7 @@ func (s *Secrets) DatabaseReset(ctx context.Context, name string, options ...Req return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -1721,16 +1849,17 @@ func (s *Secrets) DatabaseReset(ctx context.Context, name string, options ...Req ) } -// DatabaseRotateRole -// name: Name of the static role -func (s *Secrets) DatabaseRotateRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateStaticAccountAccessTokenWithParameters +// name: Required. Name of the static account. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateStaticAccountAccessTokenWithParameters(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/rotate-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}/token" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1746,16 +1875,17 @@ func (s *Secrets) DatabaseRotateRole(ctx context.Context, name string, options . ) } -// DatabaseRotateRoot -// name: Name of this database connection -func (s *Secrets) DatabaseRotateRoot(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateStaticAccountKey +// name: Required. Name of the static account. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateStaticAccountKey(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/rotate-root/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}/key" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1763,7 +1893,7 @@ func (s *Secrets) DatabaseRotateRoot(ctx context.Context, name string, options . return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -1771,16 +1901,17 @@ func (s *Secrets) DatabaseRotateRoot(ctx context.Context, name string, options . ) } -// DatabaseWriteConfig Configure connection details to a database plugin. -// name: Name of this database connection -func (s *Secrets) DatabaseWriteConfig(ctx context.Context, name string, request schema.DatabaseWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudGenerateStaticAccountKeyWithParameters +// name: Required. Name of the static account. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudGenerateStaticAccountKeyWithParameters(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudGenerateStaticAccountKeyWithParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/config/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}/key" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1796,17 +1927,16 @@ func (s *Secrets) DatabaseWriteConfig(ctx context.Context, name string, request ) } -// DatabaseWriteRole Manage the roles that can be created with this backend. -// name: Name of the role. -func (s *Secrets) DatabaseWriteRole(ctx context.Context, name string, request schema.DatabaseWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsConfigure +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsConfigure(ctx context.Context, gcpkmsMountPath string, request schema.GoogleCloudKmsConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) requestQueryParameters := make(url.Values) @@ -1821,17 +1951,18 @@ func (s *Secrets) DatabaseWriteRole(ctx context.Context, name string, request sc ) } -// DatabaseWriteStaticRole Manage the static roles that can be created with this backend. -// name: Name of the role. -func (s *Secrets) DatabaseWriteStaticRole(ctx context.Context, name string, request schema.DatabaseWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsConfigureKey +// key: Name of the key in Vault. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsConfigureKey(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsConfigureKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{database_mount_path}/static-roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"database_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("database")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/config/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) @@ -1846,59 +1977,10 @@ func (s *Secrets) DatabaseWriteStaticRole(ctx context.Context, name string, requ ) } -// GoogleCloudDeleteRoleset -// name: Required. Name of the role. -func (s *Secrets) GoogleCloudDeleteRoleset(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/roleset/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodDelete, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudDeleteStaticAccount -// name: Required. Name to refer to this static account in Vault. Cannot be updated. -func (s *Secrets) GoogleCloudDeleteStaticAccount(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/static-account/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodDelete, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSDecrypt Decrypt a ciphertext value using a named key +// GoogleCloudKmsDecrypt Decrypt a ciphertext value using a named key // key: Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. -func (s *Secrets) GoogleCloudKMSDecrypt(ctx context.Context, key string, request schema.GoogleCloudKMSDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsDecrypt(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1921,8 +2003,9 @@ func (s *Secrets) GoogleCloudKMSDecrypt(ctx context.Context, key string, request ) } -// GoogleCloudKMSDeleteConfig Configure the GCP KMS secrets engine -func (s *Secrets) GoogleCloudKMSDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsDeleteConfiguration +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsDeleteConfiguration(ctx context.Context, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1944,9 +2027,10 @@ func (s *Secrets) GoogleCloudKMSDeleteConfig(ctx context.Context, options ...Req ) } -// GoogleCloudKMSDeleteKey Interact with crypto keys in Vault and Google Cloud KMS +// GoogleCloudKmsDeleteKey Interact with crypto keys in Vault and Google Cloud KMS // key: Name of the key in Vault. -func (s *Secrets) GoogleCloudKMSDeleteKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsDeleteKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1969,540 +2053,25 @@ func (s *Secrets) GoogleCloudKMSDeleteKey(ctx context.Context, key string, optio ) } -// GoogleCloudKMSDeregisterKey Deregister an existing key in Vault +// GoogleCloudKmsDeregisterKey // key: Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. -func (s *Secrets) GoogleCloudKMSDeregisterKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/deregister/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSEncrypt Encrypt a plaintext value using a named key -// key: Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. -func (s *Secrets) GoogleCloudKMSEncrypt(ctx context.Context, key string, request schema.GoogleCloudKMSEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/encrypt/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSListKeys List named keys -func (s *Secrets) GoogleCloudKMSListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsDeregisterKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcpkms_mount_path}/keys" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - - requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSReadConfig Configure the GCP KMS secrets engine -func (s *Secrets) GoogleCloudKMSReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSReadKey Interact with crypto keys in Vault and Google Cloud KMS -// key: Name of the key in Vault. -func (s *Secrets) GoogleCloudKMSReadKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSReadKeyConfig Configure the key in Vault -// key: Name of the key in Vault. -func (s *Secrets) GoogleCloudKMSReadKeyConfig(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/config/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSReadPubkey Retrieve the public key associated with the named key -// key: Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. -func (s *Secrets) GoogleCloudKMSReadPubkey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/pubkey/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSReencrypt Re-encrypt existing ciphertext data to a new version -// key: Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. -func (s *Secrets) GoogleCloudKMSReencrypt(ctx context.Context, key string, request schema.GoogleCloudKMSReencryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/reencrypt/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSRegisterKey Register an existing crypto key in Google Cloud KMS -// key: Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. -func (s *Secrets) GoogleCloudKMSRegisterKey(ctx context.Context, key string, request schema.GoogleCloudKMSRegisterKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/register/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSRotateKey Rotate a crypto key to a new primary version -// key: Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. -func (s *Secrets) GoogleCloudKMSRotateKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/rotate/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSSign Signs a message or digest using a named key -// key: Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. -func (s *Secrets) GoogleCloudKMSSign(ctx context.Context, key string, request schema.GoogleCloudKMSSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/sign/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSTrimKey Delete old crypto key versions from Google Cloud KMS -// key: Name of the key in Vault. -func (s *Secrets) GoogleCloudKMSTrimKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/trim/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSVerify Verify a signature using a named key -// key: Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. -func (s *Secrets) GoogleCloudKMSVerify(ctx context.Context, key string, request schema.GoogleCloudKMSVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/verify/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSWriteConfig Configure the GCP KMS secrets engine -func (s *Secrets) GoogleCloudKMSWriteConfig(ctx context.Context, request schema.GoogleCloudKMSWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSWriteKey Interact with crypto keys in Vault and Google Cloud KMS -// key: Name of the key in Vault. -func (s *Secrets) GoogleCloudKMSWriteKey(ctx context.Context, key string, request schema.GoogleCloudKMSWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudKMSWriteKeyConfig Configure the key in Vault -// key: Name of the key in Vault. -func (s *Secrets) GoogleCloudKMSWriteKeyConfig(ctx context.Context, key string, request schema.GoogleCloudKMSWriteKeyConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcpkms_mount_path}/keys/config/{key}" - requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) - requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudListRolesets -func (s *Secrets) GoogleCloudListRolesets(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/rolesets" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - - requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudListStaticAccounts -func (s *Secrets) GoogleCloudListStaticAccounts(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/static-accounts" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - - requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudReadConfig -func (s *Secrets) GoogleCloudReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudReadKey -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudReadKey(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/key/{roleset}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudReadRoleset -// name: Required. Name of the role. -func (s *Secrets) GoogleCloudReadRoleset(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/roleset/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - - requestQueryParameters := make(url.Values) - - return sendRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodGet, - requestPath, - nil, // request body - requestQueryParameters, - requestModifiers, - ) -} - -// GoogleCloudReadRolesetKey -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudReadRolesetKey(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/key" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) - + requestPath := "/v1/{gcpkms_mount_path}/keys/deregister/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) + requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -2510,24 +2079,25 @@ func (s *Secrets) GoogleCloudReadRolesetKey(ctx context.Context, roleset string, ) } -// GoogleCloudReadRolesetToken -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudReadRolesetToken(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsDeregisterKey2 +// key: Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsDeregisterKey2(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/token" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/deregister/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -2535,44 +2105,45 @@ func (s *Secrets) GoogleCloudReadRolesetToken(ctx context.Context, roleset strin ) } -// GoogleCloudReadStaticAccount -// name: Required. Name to refer to this static account in Vault. Cannot be updated. -func (s *Secrets) GoogleCloudReadStaticAccount(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsEncrypt Encrypt a plaintext value using a named key +// key: Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsEncrypt(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/static-account/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/encrypt/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GoogleCloudReadStaticAccountKey -// name: Required. Name of the static account. -func (s *Secrets) GoogleCloudReadStaticAccountKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsListKeys List named keys +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsListKeys(ctx context.Context, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/static-account/{name}/key" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -2585,17 +2156,16 @@ func (s *Secrets) GoogleCloudReadStaticAccountKey(ctx context.Context, name stri ) } -// GoogleCloudReadStaticAccountToken -// name: Required. Name of the static account. -func (s *Secrets) GoogleCloudReadStaticAccountToken(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsReadConfiguration +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsReadConfiguration(ctx context.Context, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/static-account/{name}/token" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) requestQueryParameters := make(url.Values) @@ -2610,17 +2180,18 @@ func (s *Secrets) GoogleCloudReadStaticAccountToken(ctx context.Context, name st ) } -// GoogleCloudReadToken -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudReadToken(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsReadKey Interact with crypto keys in Vault and Google Cloud KMS +// key: Name of the key in Vault. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsReadKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/token/{roleset}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) @@ -2635,24 +2206,25 @@ func (s *Secrets) GoogleCloudReadToken(ctx context.Context, roleset string, opti ) } -// GoogleCloudRotateRoleset -// name: Name of the role. -func (s *Secrets) GoogleCloudRotateRoleset(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsReadKeyConfiguration +// key: Name of the key in Vault. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsReadKeyConfiguration(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/roleset/{name}/rotate" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/config/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2660,72 +2232,77 @@ func (s *Secrets) GoogleCloudRotateRoleset(ctx context.Context, name string, opt ) } -// GoogleCloudRotateRolesetKey -// name: Name of the role. -func (s *Secrets) GoogleCloudRotateRolesetKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsReencrypt Re-encrypt existing ciphertext data to a new version +// key: Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsReencrypt(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsReencryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/roleset/{name}/rotate-key" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/reencrypt/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GoogleCloudRotateRoot -func (s *Secrets) GoogleCloudRotateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsRegisterKey Register an existing crypto key in Google Cloud KMS +// key: Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsRegisterKey(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsRegisterKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/config/rotate-root" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/register/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GoogleCloudRotateStaticAccountKey -// name: Name of the account. -func (s *Secrets) GoogleCloudRotateStaticAccountKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsRetrievePublicKey Retrieve the public key associated with the named key +// key: Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsRetrievePublicKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/static-account/{name}/rotate-key" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/pubkey/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2733,40 +2310,44 @@ func (s *Secrets) GoogleCloudRotateStaticAccountKey(ctx context.Context, name st ) } -// GoogleCloudWriteConfig -func (s *Secrets) GoogleCloudWriteConfig(ctx context.Context, request schema.GoogleCloudWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsRotateKey Rotate a crypto key to a new primary version +// key: Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsRotateKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/rotate/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GoogleCloudWriteKey -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudWriteKey(ctx context.Context, roleset string, request schema.GoogleCloudWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsSign Signs a message or digest using a named key +// key: Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsSign(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/key/{roleset}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) + requestPath := "/v1/{gcpkms_mount_path}/sign/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) @@ -2781,92 +2362,96 @@ func (s *Secrets) GoogleCloudWriteKey(ctx context.Context, roleset string, reque ) } -// GoogleCloudWriteRoleset -// name: Required. Name of the role. -func (s *Secrets) GoogleCloudWriteRoleset(ctx context.Context, name string, request schema.GoogleCloudWriteRolesetRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsTrimKeyVersions +// key: Name of the key in Vault. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsTrimKeyVersions(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/roleset/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/trim/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GoogleCloudWriteRolesetKey -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudWriteRolesetKey(ctx context.Context, roleset string, request schema.GoogleCloudWriteRolesetKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsTrimKeyVersions2 +// key: Name of the key in Vault. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsTrimKeyVersions2(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/key" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/trim/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GoogleCloudWriteRolesetToken -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudWriteRolesetToken(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsVerify Verify a signature using a named key +// key: Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsVerify(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/roleset/{roleset}/token" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) + requestPath := "/v1/{gcpkms_mount_path}/verify/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// GoogleCloudWriteStaticAccount -// name: Required. Name to refer to this static account in Vault. Cannot be updated. -func (s *Secrets) GoogleCloudWriteStaticAccount(ctx context.Context, name string, request schema.GoogleCloudWriteStaticAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudKmsWriteKey Interact with crypto keys in Vault and Google Cloud KMS +// key: Name of the key in Vault. +// gcpkmsMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudKmsWriteKey(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/static-account/{name}" - requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{gcpkms_mount_path}/keys/{key}" + requestPath = strings.Replace(requestPath, "{"+"gcpkms_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcpkms")), -1) + requestPath = strings.Replace(requestPath, "{"+"key"+"}", url.PathEscape(key), -1) requestQueryParameters := make(url.Values) @@ -2881,49 +2466,49 @@ func (s *Secrets) GoogleCloudWriteStaticAccount(ctx context.Context, name string ) } -// GoogleCloudWriteStaticAccountKey -// name: Required. Name of the static account. -func (s *Secrets) GoogleCloudWriteStaticAccountKey(ctx context.Context, name string, request schema.GoogleCloudWriteStaticAccountKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListImpersonatedAccounts +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudListImpersonatedAccounts(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/static-account/{name}/key" + requestPath := "/v1/{gcp_mount_path}/impersonated-account" requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// GoogleCloudWriteStaticAccountToken -// name: Required. Name of the static account. -func (s *Secrets) GoogleCloudWriteStaticAccountToken(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListImpersonatedAccounts2 +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudListImpersonatedAccounts2(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/static-account/{name}/token" + requestPath := "/v1/{gcp_mount_path}/impersonated-accounts" requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2931,24 +2516,24 @@ func (s *Secrets) GoogleCloudWriteStaticAccountToken(ctx context.Context, name s ) } -// GoogleCloudWriteToken -// roleset: Required. Name of the role set. -func (s *Secrets) GoogleCloudWriteToken(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListRolesets +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudListRolesets(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{gcp_mount_path}/token/{roleset}" + requestPath := "/v1/{gcp_mount_path}/roleset" requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) - requestPath = strings.Replace(requestPath, "{"+"roleset"+"}", url.PathEscape(roleset), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2956,24 +2541,24 @@ func (s *Secrets) GoogleCloudWriteToken(ctx context.Context, roleset string, opt ) } -// KVv1Delete Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. -// path: Location of the secret. -func (s *Secrets) KVv1Delete(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListRolesets2 +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudListRolesets2(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kv_mount_path}/{path}" - requestPath = strings.Replace(requestPath, "{"+"kv_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/rolesets" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2981,17 +2566,16 @@ func (s *Secrets) KVv1Delete(ctx context.Context, path string, options ...Reques ) } -// KVv1Read Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. -// path: Location of the secret. -func (s *Secrets) KVv1Read(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListStaticAccounts +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudListStaticAccounts(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kv_mount_path}/{path}" - requestPath = strings.Replace(requestPath, "{"+"kv_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/static-account" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -3007,24 +2591,24 @@ func (s *Secrets) KVv1Read(ctx context.Context, path string, options ...RequestO ) } -// KVv1Write Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. -// path: Location of the secret. -func (s *Secrets) KVv1Write(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudListStaticAccounts2 +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudListStaticAccounts2(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kv_mount_path}/{path}" - requestPath = strings.Replace(requestPath, "{"+"kv_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/static-accounts" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -3032,24 +2616,23 @@ func (s *Secrets) KVv1Write(ctx context.Context, path string, options ...Request ) } -// KVv2Delete Write, Patch, Read, and Delete data in the Key-Value Store. -// path: Location of the secret. -func (s *Secrets) KVv2Delete(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudReadConfiguration +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudReadConfiguration(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/data/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -3057,24 +2640,25 @@ func (s *Secrets) KVv2Delete(ctx context.Context, path string, options ...Reques ) } -// KVv2DeleteMetadata Configures settings for the KV store -// path: Location of the secret. -func (s *Secrets) KVv2DeleteMetadata(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudReadImpersonatedAccount +// name: Required. Name to refer to this impersonated account in Vault. Cannot be updated. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudReadImpersonatedAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/metadata/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/impersonated-account/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -3082,74 +2666,77 @@ func (s *Secrets) KVv2DeleteMetadata(ctx context.Context, path string, options . ) } -// KVv2DeleteVersions Marks one or more versions as deleted in the KV store. -// path: Location of the secret. -func (s *Secrets) KVv2DeleteVersions(ctx context.Context, path string, request schema.KVv2DeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudReadRoleset +// name: Required. Name of the role. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudReadRoleset(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/delete/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// KVv2DestroyVersions Permanently removes one or more versions in the KV store -// path: Location of the secret. -func (s *Secrets) KVv2DestroyVersions(ctx context.Context, path string, request schema.KVv2DestroyVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudReadStaticAccount +// name: Required. Name to refer to this static account in Vault. Cannot be updated. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudReadStaticAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/destroy/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// KVv2Read Write, Patch, Read, and Delete data in the Key-Value Store. -// path: Location of the secret. -func (s *Secrets) KVv2Read(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudRotateRoleset +// name: Name of the role. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudRotateRoleset(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/data/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{name}/rotate" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -3157,22 +2744,25 @@ func (s *Secrets) KVv2Read(ctx context.Context, path string, options ...RequestO ) } -// KVv2ReadConfig Read the backend level settings. -func (s *Secrets) KVv2ReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudRotateRolesetKey +// name: Name of the role. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudRotateRolesetKey(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{name}/rotate-key" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -3180,25 +2770,23 @@ func (s *Secrets) KVv2ReadConfig(ctx context.Context, options ...RequestOption) ) } -// KVv2ReadMetadata Configures settings for the KV store -// path: Location of the secret. -func (s *Secrets) KVv2ReadMetadata(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudRotateRootCredentials +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudRotateRootCredentials(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/metadata/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/config/rotate-root" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -3206,24 +2794,25 @@ func (s *Secrets) KVv2ReadMetadata(ctx context.Context, path string, options ... ) } -// KVv2ReadSubkeys Read the structure of a secret entry from the Key-Value store with the values removed. -// path: Location of the secret. -func (s *Secrets) KVv2ReadSubkeys(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudRotateStaticAccountKey +// name: Name of the account. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudRotateStaticAccountKey(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/subkeys/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}/rotate-key" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -3231,17 +2820,18 @@ func (s *Secrets) KVv2ReadSubkeys(ctx context.Context, path string, options ...R ) } -// KVv2UndeleteVersions Undeletes one or more versions from the KV store. -// path: Location of the secret. -func (s *Secrets) KVv2UndeleteVersions(ctx context.Context, path string, request schema.KVv2UndeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudWriteImpersonatedAccount +// name: Required. Name to refer to this impersonated account in Vault. Cannot be updated. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudWriteImpersonatedAccount(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudWriteImpersonatedAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/undelete/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/impersonated-account/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -3256,17 +2846,18 @@ func (s *Secrets) KVv2UndeleteVersions(ctx context.Context, path string, request ) } -// KVv2Write Write, Patch, Read, and Delete data in the Key-Value Store. -// path: Location of the secret. -func (s *Secrets) KVv2Write(ctx context.Context, path string, request schema.KVv2WriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudWriteRoleset +// name: Required. Name of the role. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudWriteRoleset(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudWriteRolesetRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/data/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{gcp_mount_path}/roleset/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -3281,15 +2872,18 @@ func (s *Secrets) KVv2Write(ctx context.Context, path string, request schema.KVv ) } -// KVv2WriteConfig Configure backend level settings that are applied to every key in the key-value store. -func (s *Secrets) KVv2WriteConfig(ctx context.Context, request schema.KVv2WriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GoogleCloudWriteStaticAccount +// name: Required. Name to refer to this static account in Vault. Cannot be updated. +// gcpMountPath: Path that the backend was mounted at +func (s *Secrets) GoogleCloudWriteStaticAccount(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudWriteStaticAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) + requestPath := "/v1/{gcp_mount_path}/static-account/{name}" + requestPath = strings.Replace(requestPath, "{"+"gcp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("gcp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -3304,33 +2898,33 @@ func (s *Secrets) KVv2WriteConfig(ctx context.Context, request schema.KVv2WriteC ) } -// KVv2WriteMetadata Configures settings for the KV store -// path: Location of the secret. -func (s *Secrets) KVv2WriteMetadata(ctx context.Context, path string, request schema.KVv2WriteMetadataRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesCheckConfiguration +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesCheckConfiguration(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{secret_mount_path}/metadata/{path}" - requestPath = strings.Replace(requestPath, "{"+"secret_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("secret")), -1) - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/{kubernetes_mount_path}/check" + requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// KubernetesDeleteConfig -func (s *Secrets) KubernetesDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesConfigure +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesConfigure(ctx context.Context, kubernetesMountPath string, request schema.KubernetesConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3341,28 +2935,27 @@ func (s *Secrets) KubernetesDeleteConfig(ctx context.Context, options ...Request requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// KubernetesDeleteRole -// name: Name of the role -func (s *Secrets) KubernetesDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesDeleteConfiguration +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesDeleteConfiguration(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kubernetes_mount_path}/roles/{name}" + requestPath := "/v1/{kubernetes_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -3377,23 +2970,25 @@ func (s *Secrets) KubernetesDeleteRole(ctx context.Context, name string, options ) } -// KubernetesListRoles -func (s *Secrets) KubernetesListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesDeleteRole +// name: Name of the role +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesDeleteRole(ctx context.Context, name string, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kubernetes_mount_path}/roles" + requestPath := "/v1/{kubernetes_mount_path}/roles/{name}" requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -3401,42 +2996,45 @@ func (s *Secrets) KubernetesListRoles(ctx context.Context, options ...RequestOpt ) } -// KubernetesReadConfig -func (s *Secrets) KubernetesReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesGenerateCredentials +// name: Name of the Vault role +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesGenerateCredentials(ctx context.Context, name string, kubernetesMountPath string, request schema.KubernetesGenerateCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kubernetes_mount_path}/config" + requestPath := "/v1/{kubernetes_mount_path}/creds/{name}" requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// KubernetesReadRole -// name: Name of the role -func (s *Secrets) KubernetesReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesListRoles +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesListRoles(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kubernetes_mount_path}/roles/{name}" + requestPath := "/v1/{kubernetes_mount_path}/roles" requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -3449,8 +3047,9 @@ func (s *Secrets) KubernetesReadRole(ctx context.Context, name string, options . ) } -// KubernetesWriteConfig -func (s *Secrets) KubernetesWriteConfig(ctx context.Context, request schema.KubernetesWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesReadConfiguration +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesReadConfiguration(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3461,37 +3060,38 @@ func (s *Secrets) KubernetesWriteConfig(ctx context.Context, request schema.Kube requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// KubernetesWriteCredentials -// name: Name of the Vault role -func (s *Secrets) KubernetesWriteCredentials(ctx context.Context, name string, request schema.KubernetesWriteCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KubernetesReadRole +// name: Name of the role +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesReadRole(ctx context.Context, name string, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{kubernetes_mount_path}/creds/{name}" + requestPath := "/v1/{kubernetes_mount_path}/roles/{name}" requestPath = strings.Replace(requestPath, "{"+"kubernetes_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kubernetes")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) @@ -3499,7 +3099,8 @@ func (s *Secrets) KubernetesWriteCredentials(ctx context.Context, name string, r // KubernetesWriteRole // name: Name of the role -func (s *Secrets) KubernetesWriteRole(ctx context.Context, name string, request schema.KubernetesWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// kubernetesMountPath: Path that the backend was mounted at +func (s *Secrets) KubernetesWriteRole(ctx context.Context, name string, kubernetesMountPath string, request schema.KubernetesWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3522,115 +3123,121 @@ func (s *Secrets) KubernetesWriteRole(ctx context.Context, name string, request ) } -// LDAPCheckInLibrary Check service accounts in to the library. -// name: Name of the set. -func (s *Secrets) LDAPCheckInLibrary(ctx context.Context, name string, request schema.LDAPCheckInLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV1Delete +// path: Location of the secret. +// kvV1MountPath: Path that the backend was mounted at +func (s *Secrets) KvV1Delete(ctx context.Context, path string, kvV1MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library/{name}/check-in" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v1_mount_path}/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v1_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v1")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// LDAPCheckInManageLibrary Check service accounts in to the library. -// name: Name of the set. -func (s *Secrets) LDAPCheckInManageLibrary(ctx context.Context, name string, request schema.LDAPCheckInManageLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV1Read +// path: Location of the secret. +// kvV1MountPath: Path that the backend was mounted at +func (s *Secrets) KvV1Read(ctx context.Context, path string, kvV1MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library/manage/{name}/check-in" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v1_mount_path}/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v1_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v1")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// LDAPCheckOutLibrary Check a service account out from the library. -// name: Name of the set -func (s *Secrets) LDAPCheckOutLibrary(ctx context.Context, name string, request schema.LDAPCheckOutLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV1Write +// path: Location of the secret. +// kvV1MountPath: Path that the backend was mounted at +func (s *Secrets) KvV1Write(ctx context.Context, path string, kvV1MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library/{name}/check-out" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v1_mount_path}/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v1_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v1")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// LDAPDeleteConfig -func (s *Secrets) LDAPDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2Configure Configure backend level settings that are applied to every key in the key-value store. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2Configure(ctx context.Context, kvV2MountPath string, request schema.KvV2ConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/{kv-v2_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPDeleteLibrary Delete a library set. -// name: Name of the set. -func (s *Secrets) LDAPDeleteLibrary(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2Delete +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2Delete(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v2_mount_path}/data/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) @@ -3645,17 +3252,18 @@ func (s *Secrets) LDAPDeleteLibrary(ctx context.Context, name string, options .. ) } -// LDAPDeleteRole -// name: Name of the role (lowercase) -func (s *Secrets) LDAPDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2DeleteMetadata +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2DeleteMetadata(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v2_mount_path}/metadata/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) @@ -3670,69 +3278,74 @@ func (s *Secrets) LDAPDeleteRole(ctx context.Context, name string, options ...Re ) } -// LDAPDeleteStaticRole -// name: Name of the role -func (s *Secrets) LDAPDeleteStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2DeleteVersions +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2DeleteVersions(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2DeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/static-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v2_mount_path}/delete/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPListLibraries -func (s *Secrets) LDAPListLibraries(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2DestroyVersions +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2DestroyVersions(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2DestroyVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/{kv-v2_mount_path}/destroy/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPListRoles -func (s *Secrets) LDAPListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2Read +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2Read(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/{kv-v2_mount_path}/data/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.KvV2ReadResponse]( ctx, s.client, http.MethodGet, @@ -3743,20 +3356,20 @@ func (s *Secrets) LDAPListRoles(ctx context.Context, options ...RequestOption) ( ) } -// LDAPListStaticRoles -func (s *Secrets) LDAPListStaticRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2ReadConfiguration Read the backend level settings. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2ReadConfiguration(ctx context.Context, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/static-role" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/{kv-v2_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.KvV2ReadConfigurationResponse]( ctx, s.client, http.MethodGet, @@ -3767,19 +3380,23 @@ func (s *Secrets) LDAPListStaticRoles(ctx context.Context, options ...RequestOpt ) } -// LDAPReadConfig -func (s *Secrets) LDAPReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2ReadMetadata +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2ReadMetadata(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadMetadataResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath := "/v1/{kv-v2_mount_path}/metadata/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.KvV2ReadMetadataResponse]( ctx, s.client, http.MethodGet, @@ -3790,21 +3407,22 @@ func (s *Secrets) LDAPReadConfig(ctx context.Context, options ...RequestOption) ) } -// LDAPReadCredentials -// name: Name of the dynamic role. -func (s *Secrets) LDAPReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2ReadSubkeys +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2ReadSubkeys(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadSubkeysResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v2_mount_path}/subkeys/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.KvV2ReadSubkeysResponse]( ctx, s.client, http.MethodGet, @@ -3815,124 +3433,125 @@ func (s *Secrets) LDAPReadCredentials(ctx context.Context, name string, options ) } -// LDAPReadLibrary Read a library set. -// name: Name of the set. -func (s *Secrets) LDAPReadLibrary(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2UndeleteVersions +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2UndeleteVersions(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2UndeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v2_mount_path}/undelete/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPReadLibraryStatus Check the status of the service accounts in a library set. -// name: Name of the set. -func (s *Secrets) LDAPReadLibraryStatus(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2Write +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2Write(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2WriteRequest, options ...RequestOption) (*Response[schema.KvV2WriteResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library/{name}/status" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v2_mount_path}/data/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.KvV2WriteResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPReadRole -// name: Name of the role (lowercase) -func (s *Secrets) LDAPReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// KvV2WriteMetadata +// path: Location of the secret. +// kvV2MountPath: Path that the backend was mounted at +func (s *Secrets) KvV2WriteMetadata(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2WriteMetadataRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{kv-v2_mount_path}/metadata/{path}" + requestPath = strings.Replace(requestPath, "{"+"kv-v2_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("kv-v2")), -1) + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPReadStaticCredentials -// name: Name of the static role. -func (s *Secrets) LDAPReadStaticCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapConfigure +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapConfigure(ctx context.Context, ldapMountPath string, request schema.LdapConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/static-cred/{name}" + requestPath := "/v1/{ldap_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// LDAPReadStaticRole -// name: Name of the role -func (s *Secrets) LDAPReadStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapDeleteConfiguration +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapDeleteConfiguration(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/static-role/{name}" + requestPath := "/v1/{ldap_mount_path}/config" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -3940,15 +3559,16 @@ func (s *Secrets) LDAPReadStaticRole(ctx context.Context, name string, options . ) } -// LDAPRotateRole -// name: Name of the static role -func (s *Secrets) LDAPRotateRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapDeleteDynamicRole +// name: Name of the role (lowercase) +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapDeleteDynamicRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/rotate-role/{name}" + requestPath := "/v1/{ldap_mount_path}/role/{name}" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) @@ -3957,7 +3577,7 @@ func (s *Secrets) LDAPRotateRole(ctx context.Context, name string, options ...Re return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -3965,22 +3585,25 @@ func (s *Secrets) LDAPRotateRole(ctx context.Context, name string, options ...Re ) } -// LDAPRotateRoot -func (s *Secrets) LDAPRotateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapDeleteStaticRole +// name: Name of the role +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapDeleteStaticRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/rotate-root" + requestPath := "/v1/{ldap_mount_path}/static-role/{name}" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -3988,15 +3611,18 @@ func (s *Secrets) LDAPRotateRoot(ctx context.Context, options ...RequestOption) ) } -// LDAPWriteConfig -func (s *Secrets) LDAPWriteConfig(ctx context.Context, request schema.LDAPWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryCheckIn Check service accounts in to the library. +// name: Name of the set. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryCheckIn(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryCheckInRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/config" + requestPath := "/v1/{ldap_mount_path}/library/{name}/check-in" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4011,15 +3637,16 @@ func (s *Secrets) LDAPWriteConfig(ctx context.Context, request schema.LDAPWriteC ) } -// LDAPWriteLibrary Update a library set. -// name: Name of the set. -func (s *Secrets) LDAPWriteLibrary(ctx context.Context, name string, request schema.LDAPWriteLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryCheckOut Check a service account out from the library. +// name: Name of the set +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryCheckOut(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryCheckOutRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/library/{name}" + requestPath := "/v1/{ldap_mount_path}/library/{name}/check-out" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) @@ -4036,40 +3663,42 @@ func (s *Secrets) LDAPWriteLibrary(ctx context.Context, name string, request sch ) } -// LDAPWriteRole -// name: Name of the role (lowercase) -func (s *Secrets) LDAPWriteRole(ctx context.Context, name string, request schema.LDAPWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryCheckStatus Check the status of the service accounts in a library set. +// name: Name of the set. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryCheckStatus(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/role/{name}" + requestPath := "/v1/{ldap_mount_path}/library/{name}/status" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// LDAPWriteStaticRole -// name: Name of the role -func (s *Secrets) LDAPWriteStaticRole(ctx context.Context, name string, request schema.LDAPWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryConfigure Update a library set. +// name: Name of the set. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryConfigure(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ldap_mount_path}/static-role/{name}" + requestPath := "/v1/{ldap_mount_path}/library/{name}" requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) @@ -4086,16 +3715,17 @@ func (s *Secrets) LDAPWriteStaticRole(ctx context.Context, name string, request ) } -// MongoDBAtlasDeleteRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. -// name: Name of the Roles -func (s *Secrets) MongoDBAtlasDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryDelete Delete a library set. +// name: Name of the set. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryDelete(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath := "/v1/{ldap_mount_path}/library/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4111,41 +3741,45 @@ func (s *Secrets) MongoDBAtlasDeleteRole(ctx context.Context, name string, optio ) } -// MongoDBAtlasListRoles List the existing roles in this backend -func (s *Secrets) MongoDBAtlasListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryForceCheckIn Check service accounts in to the library. +// name: Name of the set. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryForceCheckIn(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryForceCheckInRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/roles" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath := "/v1/{ldap_mount_path}/library/manage/{name}/check-in" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// MongoDBAtlasReadConfig Configure the credentials that are used to manage Database Users. -func (s *Secrets) MongoDBAtlasReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryList +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryList(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath := "/v1/{ldap_mount_path}/library" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -4158,16 +3792,17 @@ func (s *Secrets) MongoDBAtlasReadConfig(ctx context.Context, options ...Request ) } -// MongoDBAtlasReadCredentials Generate MongoDB Atlas Programmatic API from a specific Vault role. -// name: Name of the role -func (s *Secrets) MongoDBAtlasReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapLibraryRead Read a library set. +// name: Name of the set. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapLibraryRead(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath := "/v1/{ldap_mount_path}/library/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4183,19 +3818,19 @@ func (s *Secrets) MongoDBAtlasReadCredentials(ctx context.Context, name string, ) } -// MongoDBAtlasReadRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. -// name: Name of the Roles -func (s *Secrets) MongoDBAtlasReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapListDynamicRoles +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapListDynamicRoles(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{ldap_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -4208,47 +3843,48 @@ func (s *Secrets) MongoDBAtlasReadRole(ctx context.Context, name string, options ) } -// MongoDBAtlasWriteConfig Configure the credentials that are used to manage Database Users. -func (s *Secrets) MongoDBAtlasWriteConfig(ctx context.Context, request schema.MongoDBAtlasWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapListStaticRoles +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapListStaticRoles(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath := "/v1/{ldap_mount_path}/static-role" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// MongoDBAtlasWriteCredentials Generate MongoDB Atlas Programmatic API from a specific Vault role. -// name: Name of the role -func (s *Secrets) MongoDBAtlasWriteCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapReadConfiguration +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapReadConfiguration(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{ldap_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -4256,47 +3892,51 @@ func (s *Secrets) MongoDBAtlasWriteCredentials(ctx context.Context, name string, ) } -// MongoDBAtlasWriteRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. -// name: Name of the Roles -func (s *Secrets) MongoDBAtlasWriteRole(ctx context.Context, name string, request schema.MongoDBAtlasWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapReadDynamicRole +// name: Name of the role (lowercase) +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapReadDynamicRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{mongodbatlas_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath := "/v1/{ldap_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// NomadDeleteAccessConfig -func (s *Secrets) NomadDeleteAccessConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapReadStaticRole +// name: Name of the role +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapReadStaticRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/config/access" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{ldap_mount_path}/static-role/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -4304,22 +3944,25 @@ func (s *Secrets) NomadDeleteAccessConfig(ctx context.Context, options ...Reques ) } -// NomadDeleteLeaseConfig Configure the lease parameters for generated tokens -func (s *Secrets) NomadDeleteLeaseConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapRequestDynamicRoleCredentials +// name: Name of the dynamic role. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapRequestDynamicRoleCredentials(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/config/lease" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{ldap_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -4327,16 +3970,17 @@ func (s *Secrets) NomadDeleteLeaseConfig(ctx context.Context, options ...Request ) } -// NomadDeleteRole -// name: Name of the role -func (s *Secrets) NomadDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapRequestStaticRoleCredentials +// name: Name of the static role. +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapRequestStaticRoleCredentials(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{ldap_mount_path}/static-cred/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4344,7 +3988,7 @@ func (s *Secrets) NomadDeleteRole(ctx context.Context, name string, options ...R return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -4352,23 +3996,23 @@ func (s *Secrets) NomadDeleteRole(ctx context.Context, name string, options ...R ) } -// NomadListRoles -func (s *Secrets) NomadListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapRotateRootCredentials +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapRotateRootCredentials(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{ldap_mount_path}/rotate-root" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -4376,22 +4020,25 @@ func (s *Secrets) NomadListRoles(ctx context.Context, options ...RequestOption) ) } -// NomadReadAccessConfig -func (s *Secrets) NomadReadAccessConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapRotateStaticRole +// name: Name of the static role +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapRotateStaticRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/config/access" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{ldap_mount_path}/rotate-role/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -4399,309 +4046,319 @@ func (s *Secrets) NomadReadAccessConfig(ctx context.Context, options ...RequestO ) } -// NomadReadCredentials -// name: Name of the role -func (s *Secrets) NomadReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapWriteDynamicRole +// name: Name of the role (lowercase) +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapWriteDynamicRole(ctx context.Context, name string, ldapMountPath string, request schema.LdapWriteDynamicRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{ldap_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// NomadReadLeaseConfig Configure the lease parameters for generated tokens -func (s *Secrets) NomadReadLeaseConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LdapWriteStaticRole +// name: Name of the role +// ldapMountPath: Path that the backend was mounted at +func (s *Secrets) LdapWriteStaticRole(ctx context.Context, name string, ldapMountPath string, request schema.LdapWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/config/lease" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{ldap_mount_path}/static-role/{name}" + requestPath = strings.Replace(requestPath, "{"+"ldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ldap")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// NomadReadRole -// name: Name of the role -func (s *Secrets) NomadReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MongoDbAtlasConfigure +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasConfigure(ctx context.Context, mongodbatlasMountPath string, request schema.MongoDbAtlasConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// NomadWriteAccessConfig -func (s *Secrets) NomadWriteAccessConfig(ctx context.Context, request schema.NomadWriteAccessConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MongoDbAtlasDeleteRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. +// name: Name of the Roles +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasDeleteRole(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/config/access" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// NomadWriteLeaseConfig Configure the lease parameters for generated tokens -func (s *Secrets) NomadWriteLeaseConfig(ctx context.Context, request schema.NomadWriteLeaseConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MongoDbAtlasGenerateCredentials +// name: Name of the role +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasGenerateCredentials(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/config/lease" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// NomadWriteRole +// MongoDbAtlasGenerateCredentials2 // name: Name of the role -func (s *Secrets) NomadWriteRole(ctx context.Context, name string, request schema.NomadWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasGenerateCredentials2(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{nomad_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OpenLDAPCheckInLibrary Check service accounts in to the library. -// name: Name of the set. -func (s *Secrets) OpenLDAPCheckInLibrary(ctx context.Context, name string, request schema.OpenLDAPCheckInLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MongoDbAtlasListRoles List the existing roles in this backend +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasListRoles(ctx context.Context, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library/{name}/check-in" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/roles" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OpenLDAPCheckInManageLibrary Check service accounts in to the library. -// name: Name of the set. -func (s *Secrets) OpenLDAPCheckInManageLibrary(ctx context.Context, name string, request schema.OpenLDAPCheckInManageLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MongoDbAtlasReadConfiguration +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasReadConfiguration(ctx context.Context, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library/manage/{name}/check-in" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OpenLDAPCheckOutLibrary Check a service account out from the library. -// name: Name of the set -func (s *Secrets) OpenLDAPCheckOutLibrary(ctx context.Context, name string, request schema.OpenLDAPCheckOutLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MongoDbAtlasReadRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. +// name: Name of the Roles +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasReadRole(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library/{name}/check-out" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// OpenLDAPDeleteConfig -func (s *Secrets) OpenLDAPDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MongoDbAtlasWriteRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. +// name: Name of the Roles +// mongodbatlasMountPath: Path that the backend was mounted at +func (s *Secrets) MongoDbAtlasWriteRole(ctx context.Context, name string, mongodbatlasMountPath string, request schema.MongoDbAtlasWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{mongodbatlas_mount_path}/roles/{name}" + requestPath = strings.Replace(requestPath, "{"+"mongodbatlas_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("mongodbatlas")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPDeleteLibrary Delete a library set. -// name: Name of the set. -func (s *Secrets) OpenLDAPDeleteLibrary(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadConfigureAccess +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadConfigureAccess(ctx context.Context, nomadMountPath string, request schema.NomadConfigureAccessRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{nomad_mount_path}/config/access" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPDeleteRole -// name: Name of the role (lowercase) -func (s *Secrets) OpenLDAPDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadConfigureLease +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadConfigureLease(ctx context.Context, nomadMountPath string, request schema.NomadConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{nomad_mount_path}/config/lease" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPDeleteStaticRole -// name: Name of the role -func (s *Secrets) OpenLDAPDeleteStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadDeleteAccessConfiguration +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadDeleteAccessConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/static-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{nomad_mount_path}/config/access" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestQueryParameters := make(url.Values) @@ -4716,23 +4373,23 @@ func (s *Secrets) OpenLDAPDeleteStaticRole(ctx context.Context, name string, opt ) } -// OpenLDAPListLibraries -func (s *Secrets) OpenLDAPListLibraries(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadDeleteLeaseConfiguration +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadDeleteLeaseConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{nomad_mount_path}/config/lease" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -4740,23 +4397,25 @@ func (s *Secrets) OpenLDAPListLibraries(ctx context.Context, options ...RequestO ) } -// OpenLDAPListRoles -func (s *Secrets) OpenLDAPListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadDeleteRole +// name: Name of the role +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadDeleteRole(ctx context.Context, name string, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{nomad_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -4764,18 +4423,20 @@ func (s *Secrets) OpenLDAPListRoles(ctx context.Context, options ...RequestOptio ) } -// OpenLDAPListStaticRoles -func (s *Secrets) OpenLDAPListStaticRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadGenerateCredentials +// name: Name of the role +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadGenerateCredentials(ctx context.Context, name string, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/static-role" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{nomad_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -4788,17 +4449,19 @@ func (s *Secrets) OpenLDAPListStaticRoles(ctx context.Context, options ...Reques ) } -// OpenLDAPReadConfig -func (s *Secrets) OpenLDAPReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadListRoles +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadListRoles(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{nomad_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -4811,17 +4474,16 @@ func (s *Secrets) OpenLDAPReadConfig(ctx context.Context, options ...RequestOpti ) } -// OpenLDAPReadCredentials -// name: Name of the dynamic role. -func (s *Secrets) OpenLDAPReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadReadAccessConfiguration +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadReadAccessConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{nomad_mount_path}/config/access" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestQueryParameters := make(url.Values) @@ -4836,17 +4498,16 @@ func (s *Secrets) OpenLDAPReadCredentials(ctx context.Context, name string, opti ) } -// OpenLDAPReadLibrary Read a library set. -// name: Name of the set. -func (s *Secrets) OpenLDAPReadLibrary(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadReadLeaseConfiguration +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadReadLeaseConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{nomad_mount_path}/config/lease" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestQueryParameters := make(url.Values) @@ -4861,16 +4522,17 @@ func (s *Secrets) OpenLDAPReadLibrary(ctx context.Context, name string, options ) } -// OpenLDAPReadLibraryStatus Check the status of the service accounts in a library set. -// name: Name of the set. -func (s *Secrets) OpenLDAPReadLibraryStatus(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadReadRole +// name: Name of the role +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadReadRole(ctx context.Context, name string, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library/{name}/status" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{nomad_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -4886,142 +4548,142 @@ func (s *Secrets) OpenLDAPReadLibraryStatus(ctx context.Context, name string, op ) } -// OpenLDAPReadRole -// name: Name of the role (lowercase) -func (s *Secrets) OpenLDAPReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// NomadWriteRole +// name: Name of the role +// nomadMountPath: Path that the backend was mounted at +func (s *Secrets) NomadWriteRole(ctx context.Context, name string, nomadMountPath string, request schema.NomadWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{nomad_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"nomad_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("nomad")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPReadStaticCredentials -// name: Name of the static role. -func (s *Secrets) OpenLDAPReadStaticCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiConfigureAutoTidy +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiConfigureAutoTidy(ctx context.Context, pkiMountPath string, request schema.PkiConfigureAutoTidyRequest, options ...RequestOption) (*Response[schema.PkiConfigureAutoTidyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/static-cred/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{pki_mount_path}/config/auto-tidy" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiConfigureAutoTidyResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPReadStaticRole -// name: Name of the role -func (s *Secrets) OpenLDAPReadStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiConfigureCa +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiConfigureCa(ctx context.Context, pkiMountPath string, request schema.PkiConfigureCaRequest, options ...RequestOption) (*Response[schema.PkiConfigureCaResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/static-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{pki_mount_path}/config/ca" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiConfigureCaResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPRotateRole -// name: Name of the static role -func (s *Secrets) OpenLDAPRotateRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiConfigureCluster +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiConfigureCluster(ctx context.Context, pkiMountPath string, request schema.PkiConfigureClusterRequest, options ...RequestOption) (*Response[schema.PkiConfigureClusterResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/rotate-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{pki_mount_path}/config/cluster" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiConfigureClusterResponse]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPRotateRoot -func (s *Secrets) OpenLDAPRotateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiConfigureCrl +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiConfigureCrl(ctx context.Context, pkiMountPath string, request schema.PkiConfigureCrlRequest, options ...RequestOption) (*Response[schema.PkiConfigureCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/rotate-root" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{pki_mount_path}/config/crl" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiConfigureCrlResponse]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// OpenLDAPWriteConfig -func (s *Secrets) OpenLDAPWriteConfig(ctx context.Context, request schema.OpenLDAPWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiConfigureIssuers +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiConfigureIssuers(ctx context.Context, pkiMountPath string, request schema.PkiConfigureIssuersRequest, options ...RequestOption) (*Response[schema.PkiConfigureIssuersResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) + requestPath := "/v1/{pki_mount_path}/config/issuers" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiConfigureIssuersResponse]( ctx, s.client, http.MethodPost, @@ -5032,21 +4694,20 @@ func (s *Secrets) OpenLDAPWriteConfig(ctx context.Context, request schema.OpenLD ) } -// OpenLDAPWriteLibrary Update a library set. -// name: Name of the set. -func (s *Secrets) OpenLDAPWriteLibrary(ctx context.Context, name string, request schema.OpenLDAPWriteLibraryRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiConfigureKeys +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiConfigureKeys(ctx context.Context, pkiMountPath string, request schema.PkiConfigureKeysRequest, options ...RequestOption) (*Response[schema.PkiConfigureKeysResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/library/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{pki_mount_path}/config/keys" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiConfigureKeysResponse]( ctx, s.client, http.MethodPost, @@ -5057,21 +4718,20 @@ func (s *Secrets) OpenLDAPWriteLibrary(ctx context.Context, name string, request ) } -// OpenLDAPWriteRole -// name: Name of the role (lowercase) -func (s *Secrets) OpenLDAPWriteRole(ctx context.Context, name string, request schema.OpenLDAPWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiConfigureUrls +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiConfigureUrls(ctx context.Context, pkiMountPath string, request schema.PkiConfigureUrlsRequest, options ...RequestOption) (*Response[schema.PkiConfigureUrlsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{pki_mount_path}/config/urls" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiConfigureUrlsResponse]( ctx, s.client, http.MethodPost, @@ -5082,21 +4742,20 @@ func (s *Secrets) OpenLDAPWriteRole(ctx context.Context, name string, request sc ) } -// OpenLDAPWriteStaticRole -// name: Name of the role -func (s *Secrets) OpenLDAPWriteStaticRole(ctx context.Context, name string, request schema.OpenLDAPWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiCrossSignIntermediate +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiCrossSignIntermediate(ctx context.Context, pkiMountPath string, request schema.PkiCrossSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiCrossSignIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{openldap_mount_path}/static-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"openldap_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("openldap")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{pki_mount_path}/intermediate/cross-sign" + requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiCrossSignIntermediateResponse]( ctx, s.client, http.MethodPost, @@ -5107,32 +4766,36 @@ func (s *Secrets) OpenLDAPWriteStaticRole(ctx context.Context, name string, requ ) } -// PKIBundleWrite -func (s *Secrets) PKIBundleWrite(ctx context.Context, request schema.PKIBundleWriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiDeleteIssuer +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiDeleteIssuer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/bundle" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIDeleteKey +// PkiDeleteKey // keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. -func (s *Secrets) PKIDeleteKey(ctx context.Context, keyRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiDeleteKey(ctx context.Context, keyRef string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5155,9 +4818,10 @@ func (s *Secrets) PKIDeleteKey(ctx context.Context, keyRef string, options ...Re ) } -// PKIDeleteRole +// PkiDeleteRole // name: Name of the role -func (s *Secrets) PKIDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiDeleteRole(ctx context.Context, name string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5180,8 +4844,9 @@ func (s *Secrets) PKIDeleteRole(ctx context.Context, name string, options ...Req ) } -// PKIDeleteRoot -func (s *Secrets) PKIDeleteRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiDeleteRoot +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiDeleteRoot(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5203,21 +4868,20 @@ func (s *Secrets) PKIDeleteRoot(ctx context.Context, options ...RequestOption) ( ) } -// PKIGenerateRoot -// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -func (s *Secrets) PKIGenerateRoot(ctx context.Context, exported string, request schema.PKIGenerateRootRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiGenerateExportedKey +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiGenerateExportedKey(ctx context.Context, pkiMountPath string, request schema.PkiGenerateExportedKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateExportedKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/root/generate/{exported}" + requestPath := "/v1/{pki_mount_path}/keys/generate/exported" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiGenerateExportedKeyResponse]( ctx, s.client, http.MethodPost, @@ -5228,19 +4892,22 @@ func (s *Secrets) PKIGenerateRoot(ctx context.Context, exported string, request ) } -// PKIImportKeys -func (s *Secrets) PKIImportKeys(ctx context.Context, request schema.PKIImportKeysRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiGenerateIntermediate +// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiGenerateIntermediate(ctx context.Context, exported string, pkiMountPath string, request schema.PkiGenerateIntermediateRequest, options ...RequestOption) (*Response[schema.PkiGenerateIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/keys/import" + requestPath := "/v1/{pki_mount_path}/intermediate/generate/{exported}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiGenerateIntermediateResponse]( ctx, s.client, http.MethodPost, @@ -5251,23 +4918,20 @@ func (s *Secrets) PKIImportKeys(ctx context.Context, request schema.PKIImportKey ) } -// PKIIssuerIssueRole -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// role: The desired role with configuration for this request -func (s *Secrets) PKIIssuerIssueRole(ctx context.Context, issuerRef string, role string, request schema.PKIIssuerIssueRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiGenerateInternalKey +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiGenerateInternalKey(ctx context.Context, pkiMountPath string, request schema.PkiGenerateInternalKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateInternalKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/issue/{role}" + requestPath := "/v1/{pki_mount_path}/keys/generate/internal" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiGenerateInternalKeyResponse]( ctx, s.client, http.MethodPost, @@ -5278,21 +4942,20 @@ func (s *Secrets) PKIIssuerIssueRole(ctx context.Context, issuerRef string, role ) } -// PKIIssuerResignCRLs -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PKIIssuerResignCRLs(ctx context.Context, issuerRef string, request schema.PKIIssuerResignCRLsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiGenerateKmsKey +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiGenerateKmsKey(ctx context.Context, pkiMountPath string, request schema.PkiGenerateKmsKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateKmsKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/resign-crls" + requestPath := "/v1/{pki_mount_path}/keys/generate/kms" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiGenerateKmsKeyResponse]( ctx, s.client, http.MethodPost, @@ -5303,46 +4966,46 @@ func (s *Secrets) PKIIssuerResignCRLs(ctx context.Context, issuerRef string, req ) } -// PKIIssuerRevoke -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PKIIssuerRevoke(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiGenerateRoot +// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiGenerateRoot(ctx context.Context, exported string, pkiMountPath string, request schema.PkiGenerateRootRequest, options ...RequestOption) (*Response[schema.PkiGenerateRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/revoke" + requestPath := "/v1/{pki_mount_path}/root/generate/{exported}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) + requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiGenerateRootResponse]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIIssuerSignIntermediate -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PKIIssuerSignIntermediate(ctx context.Context, issuerRef string, request schema.PKIIssuerSignIntermediateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiImportKey +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiImportKey(ctx context.Context, pkiMountPath string, request schema.PkiImportKeyRequest, options ...RequestOption) (*Response[schema.PkiImportKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-intermediate" + requestPath := "/v1/{pki_mount_path}/keys/import" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiImportKeyResponse]( ctx, s.client, http.MethodPost, @@ -5353,21 +5016,22 @@ func (s *Secrets) PKIIssuerSignIntermediate(ctx context.Context, issuerRef strin ) } -// PKIIssuerSignRevocationList -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PKIIssuerSignRevocationList(ctx context.Context, issuerRef string, request schema.PKIIssuerSignRevocationListRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssueWithRole +// role: The desired role with configuration for this request +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssueWithRole(ctx context.Context, role string, pkiMountPath string, request schema.PkiIssueWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssueWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-revocation-list" + requestPath := "/v1/{pki_mount_path}/issue/{role}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssueWithRoleResponse]( ctx, s.client, http.MethodPost, @@ -5378,23 +5042,24 @@ func (s *Secrets) PKIIssuerSignRevocationList(ctx context.Context, issuerRef str ) } -// PKIIssuerSignRole +// PkiIssuerIssueWithRole // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. // role: The desired role with configuration for this request -func (s *Secrets) PKIIssuerSignRole(ctx context.Context, issuerRef string, role string, request schema.PKIIssuerSignRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerIssueWithRole(ctx context.Context, issuerRef string, role string, pkiMountPath string, request schema.PkiIssuerIssueWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerIssueWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign/{role}" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/issue/{role}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerIssueWithRoleResponse]( ctx, s.client, http.MethodPost, @@ -5405,147 +5070,152 @@ func (s *Secrets) PKIIssuerSignRole(ctx context.Context, issuerRef string, role ) } -// PKIIssuerSignSelfIssued +// PkiIssuerReadCrl // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PKIIssuerSignSelfIssued(ctx context.Context, issuerRef string, request schema.PKIIssuerSignSelfIssuedRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerReadCrl(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-self-issued" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/crl" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiIssuerReadCrlResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIIssuerSignVerbatim +// PkiIssuerReadCrlDelta // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PKIIssuerSignVerbatim(ctx context.Context, issuerRef string, request schema.PKIIssuerSignVerbatimRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerReadCrlDelta(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/crl/delta" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiIssuerReadCrlDeltaResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIIssuerSignVerbatimRole +// PkiIssuerReadCrlDeltaDer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// role: The desired role with configuration for this request -func (s *Secrets) PKIIssuerSignVerbatimRole(ctx context.Context, issuerRef string, role string, request schema.PKIIssuerSignVerbatimRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerReadCrlDeltaDer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim/{role}" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/crl/delta/der" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiIssuerReadCrlDeltaDerResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIIssuersGenerateIntermediate -// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -func (s *Secrets) PKIIssuersGenerateIntermediate(ctx context.Context, exported string, request schema.PKIIssuersGenerateIntermediateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerReadCrlDeltaPem +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerReadCrlDeltaPem(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuers/generate/intermediate/{exported}" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/crl/delta/pem" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiIssuerReadCrlDeltaPemResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIIssuersGenerateRoot -// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -func (s *Secrets) PKIIssuersGenerateRoot(ctx context.Context, exported string, request schema.PKIIssuersGenerateRootRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerReadCrlDer +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerReadCrlDer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuers/generate/root/{exported}" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/crl/der" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiIssuerReadCrlDerResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIIssuersList -func (s *Secrets) PKIIssuersList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerReadCrlPem +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerReadCrlPem(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issuers" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/crl/pem" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiIssuerReadCrlPemResponse]( ctx, s.client, http.MethodGet, @@ -5556,301 +5226,333 @@ func (s *Secrets) PKIIssuersList(ctx context.Context, options ...RequestOption) ) } -// PKIListCerts -func (s *Secrets) PKIListCerts(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerResignCrls +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerResignCrls(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerResignCrlsRequest, options ...RequestOption) (*Response[schema.PkiIssuerResignCrlsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/certs" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/resign-crls" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerResignCrlsResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIListCertsRevoked -func (s *Secrets) PKIListCertsRevoked(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerSignIntermediate +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerSignIntermediate(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/certs/revoked" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-intermediate" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerSignIntermediateResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIListKeys -func (s *Secrets) PKIListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerSignRevocationList +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerSignRevocationList(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignRevocationListRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignRevocationListResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/keys" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-revocation-list" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerSignRevocationListResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIListRoles -func (s *Secrets) PKIListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerSignSelfIssued +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerSignSelfIssued(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignSelfIssuedRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignSelfIssuedResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/roles" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-self-issued" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerSignSelfIssuedResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadAutoTidyConfig -func (s *Secrets) PKIReadAutoTidyConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerSignVerbatim +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerSignVerbatim(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignVerbatimRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignVerbatimResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/auto-tidy" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerSignVerbatimResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCA -func (s *Secrets) PKIReadCA(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerSignVerbatimWithRole +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// role: The desired role with configuration for this request +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerSignVerbatimWithRole(ctx context.Context, issuerRef string, role string, pkiMountPath string, request schema.PkiIssuerSignVerbatimWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignVerbatimWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/ca" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim/{role}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerSignVerbatimWithRoleResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCAChain -func (s *Secrets) PKIReadCAChain(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuerSignWithRole +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// role: The desired role with configuration for this request +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuerSignWithRole(ctx context.Context, issuerRef string, role string, pkiMountPath string, request schema.PkiIssuerSignWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/ca_chain" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/sign/{role}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuerSignWithRoleResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCAPem -func (s *Secrets) PKIReadCAPem(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuersGenerateIntermediate +// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuersGenerateIntermediate(ctx context.Context, exported string, pkiMountPath string, request schema.PkiIssuersGenerateIntermediateRequest, options ...RequestOption) (*Response[schema.PkiIssuersGenerateIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/ca/pem" + requestPath := "/v1/{pki_mount_path}/issuers/generate/intermediate/{exported}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuersGenerateIntermediateResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCRL -func (s *Secrets) PKIReadCRL(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuersGenerateRoot +// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuersGenerateRoot(ctx context.Context, exported string, pkiMountPath string, request schema.PkiIssuersGenerateRootRequest, options ...RequestOption) (*Response[schema.PkiIssuersGenerateRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/crl" + requestPath := "/v1/{pki_mount_path}/issuers/generate/root/{exported}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuersGenerateRootResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCRLConfig -func (s *Secrets) PKIReadCRLConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuersImportBundle +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuersImportBundle(ctx context.Context, pkiMountPath string, request schema.PkiIssuersImportBundleRequest, options ...RequestOption) (*Response[schema.PkiIssuersImportBundleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/crl" + requestPath := "/v1/{pki_mount_path}/issuers/import/bundle" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuersImportBundleResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCRLRotate -func (s *Secrets) PKIReadCRLRotate(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuersImportCert +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuersImportCert(ctx context.Context, pkiMountPath string, request schema.PkiIssuersImportCertRequest, options ...RequestOption) (*Response[schema.PkiIssuersImportCertResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/crl/rotate" + requestPath := "/v1/{pki_mount_path}/issuers/import/cert" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuersImportCertResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCRLRotateDelta -func (s *Secrets) PKIReadCRLRotateDelta(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiIssuersRotateRoot +// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiIssuersRotateRoot(ctx context.Context, exported string, pkiMountPath string, request schema.PkiIssuersRotateRootRequest, options ...RequestOption) (*Response[schema.PkiIssuersRotateRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/crl/rotate-delta" + requestPath := "/v1/{pki_mount_path}/root/rotate/{exported}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiIssuersRotateRootResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PKIReadCert -// serial: Certificate serial number, in colon- or hyphen-separated octal -func (s *Secrets) PKIReadCert(ctx context.Context, serial string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiListCerts +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiListCerts(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListCertsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/cert/{serial}" + requestPath := "/v1/{pki_mount_path}/certs" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"serial"+"}", url.PathEscape(serial), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiListCertsResponse]( ctx, s.client, http.MethodGet, @@ -5861,19 +5563,21 @@ func (s *Secrets) PKIReadCert(ctx context.Context, serial string, options ...Req ) } -// PKIReadCertCAChain -func (s *Secrets) PKIReadCertCAChain(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiListIssuers +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiListIssuers(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListIssuersResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/cert/ca_chain" + requestPath := "/v1/{pki_mount_path}/issuers" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiListIssuersResponse]( ctx, s.client, http.MethodGet, @@ -5884,21 +5588,21 @@ func (s *Secrets) PKIReadCertCAChain(ctx context.Context, options ...RequestOpti ) } -// PKIReadCertRaw -// serial: Certificate serial number, in colon- or hyphen-separated octal -func (s *Secrets) PKIReadCertRaw(ctx context.Context, serial string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiListKeys +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiListKeys(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListKeysResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/cert/{serial}/raw" + requestPath := "/v1/{pki_mount_path}/keys" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"serial"+"}", url.PathEscape(serial), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiListKeysResponse]( ctx, s.client, http.MethodGet, @@ -5909,21 +5613,21 @@ func (s *Secrets) PKIReadCertRaw(ctx context.Context, serial string, options ... ) } -// PKIReadCertRawPem -// serial: Certificate serial number, in colon- or hyphen-separated octal -func (s *Secrets) PKIReadCertRawPem(ctx context.Context, serial string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiListRevokedCerts +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiListRevokedCerts(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListRevokedCertsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/cert/{serial}/raw/pem" + requestPath := "/v1/{pki_mount_path}/certs/revoked" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"serial"+"}", url.PathEscape(serial), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiListRevokedCertsResponse]( ctx, s.client, http.MethodGet, @@ -5934,19 +5638,21 @@ func (s *Secrets) PKIReadCertRawPem(ctx context.Context, serial string, options ) } -// PKIReadClusterConfig -func (s *Secrets) PKIReadClusterConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiListRoles +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiListRoles(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListRolesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/cluster" + requestPath := "/v1/{pki_mount_path}/roles" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiListRolesResponse]( ctx, s.client, http.MethodGet, @@ -5957,14 +5663,15 @@ func (s *Secrets) PKIReadClusterConfig(ctx context.Context, options ...RequestOp ) } -// PKIReadDeltaCRL -func (s *Secrets) PKIReadDeltaCRL(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiQueryOcsp +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiQueryOcsp(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/delta-crl" + requestPath := "/v1/{pki_mount_path}/ocsp" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) @@ -5972,7 +5679,7 @@ func (s *Secrets) PKIReadDeltaCRL(ctx context.Context, options ...RequestOption) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -5980,15 +5687,18 @@ func (s *Secrets) PKIReadDeltaCRL(ctx context.Context, options ...RequestOption) ) } -// PKIReadIssuersConfig -func (s *Secrets) PKIReadIssuersConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiQueryOcspWithGetReq +// req: base-64 encoded ocsp request +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiQueryOcspWithGetReq(ctx context.Context, req string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/issuers" + requestPath := "/v1/{pki_mount_path}/ocsp/{req}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"req"+"}", url.PathEscape(req), -1) requestQueryParameters := make(url.Values) @@ -6003,21 +5713,20 @@ func (s *Secrets) PKIReadIssuersConfig(ctx context.Context, options ...RequestOp ) } -// PKIReadKey -// keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. -func (s *Secrets) PKIReadKey(ctx context.Context, keyRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadAutoTidyConfiguration +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadAutoTidyConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadAutoTidyConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/key/{key_ref}" + requestPath := "/v1/{pki_mount_path}/config/auto-tidy" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"key_ref"+"}", url.PathEscape(keyRef), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadAutoTidyConfigurationResponse]( ctx, s.client, http.MethodGet, @@ -6028,19 +5737,20 @@ func (s *Secrets) PKIReadKey(ctx context.Context, keyRef string, options ...Requ ) } -// PKIReadKeysConfig -func (s *Secrets) PKIReadKeysConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCaChainPem +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCaChainPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCaChainPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/keys" + requestPath := "/v1/{pki_mount_path}/ca_chain" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCaChainPemResponse]( ctx, s.client, http.MethodGet, @@ -6051,21 +5761,20 @@ func (s *Secrets) PKIReadKeysConfig(ctx context.Context, options ...RequestOptio ) } -// PKIReadOCSPReq -// req: base-64 encoded ocsp request -func (s *Secrets) PKIReadOCSPReq(ctx context.Context, req string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCaDer +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCaDer(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCaDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/ocsp/{req}" + requestPath := "/v1/{pki_mount_path}/ca" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"req"+"}", url.PathEscape(req), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCaDerResponse]( ctx, s.client, http.MethodGet, @@ -6076,21 +5785,20 @@ func (s *Secrets) PKIReadOCSPReq(ctx context.Context, req string, options ...Req ) } -// PKIReadRole -// name: Name of the role -func (s *Secrets) PKIReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCaPem +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCaPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCaPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/roles/{name}" + requestPath := "/v1/{pki_mount_path}/ca/pem" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCaPemResponse]( ctx, s.client, http.MethodGet, @@ -6101,19 +5809,22 @@ func (s *Secrets) PKIReadRole(ctx context.Context, name string, options ...Reque ) } -// PKIReadURLConfig -func (s *Secrets) PKIReadURLConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCert +// serial: Certificate serial number, in colon- or hyphen-separated octal +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCert(ctx context.Context, serial string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/urls" + requestPath := "/v1/{pki_mount_path}/cert/{serial}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"serial"+"}", url.PathEscape(serial), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCertResponse]( ctx, s.client, http.MethodGet, @@ -6124,258 +5835,267 @@ func (s *Secrets) PKIReadURLConfig(ctx context.Context, options ...RequestOption ) } -// PKIReplaceRoot -func (s *Secrets) PKIReplaceRoot(ctx context.Context, request schema.PKIReplaceRootRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCertCaChain +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCertCaChain(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertCaChainResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/root/replace" + requestPath := "/v1/{pki_mount_path}/cert/ca_chain" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCertCaChainResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIRevoke -func (s *Secrets) PKIRevoke(ctx context.Context, request schema.PKIRevokeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCertCrl +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCertCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/revoke" + requestPath := "/v1/{pki_mount_path}/cert/crl" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCertCrlResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIRevokeWithKey -func (s *Secrets) PKIRevokeWithKey(ctx context.Context, request schema.PKIRevokeWithKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCertDeltaCrl +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCertDeltaCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertDeltaCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/revoke-with-key" + requestPath := "/v1/{pki_mount_path}/cert/delta-crl" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCertDeltaCrlResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIRootSignIntermediate -func (s *Secrets) PKIRootSignIntermediate(ctx context.Context, request schema.PKIRootSignIntermediateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCertRawDer +// serial: Certificate serial number, in colon- or hyphen-separated octal +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCertRawDer(ctx context.Context, serial string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertRawDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/root/sign-intermediate" + requestPath := "/v1/{pki_mount_path}/cert/{serial}/raw" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"serial"+"}", url.PathEscape(serial), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCertRawDerResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIRootSignSelfIssued -func (s *Secrets) PKIRootSignSelfIssued(ctx context.Context, request schema.PKIRootSignSelfIssuedRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCertRawPem +// serial: Certificate serial number, in colon- or hyphen-separated octal +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCertRawPem(ctx context.Context, serial string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertRawPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/root/sign-self-issued" + requestPath := "/v1/{pki_mount_path}/cert/{serial}/raw/pem" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"serial"+"}", url.PathEscape(serial), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCertRawPemResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIRotateRoot -// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -func (s *Secrets) PKIRotateRoot(ctx context.Context, exported string, request schema.PKIRotateRootRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadClusterConfiguration +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadClusterConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadClusterConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/root/rotate/{exported}" + requestPath := "/v1/{pki_mount_path}/config/cluster" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadClusterConfigurationResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKISignRole -// role: The desired role with configuration for this request -func (s *Secrets) PKISignRole(ctx context.Context, role string, request schema.PKISignRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCrlConfiguration +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCrlConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/sign/{role}" + requestPath := "/v1/{pki_mount_path}/config/crl" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCrlConfigurationResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKISignVerbatim -func (s *Secrets) PKISignVerbatim(ctx context.Context, request schema.PKISignVerbatimRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCrlDelta +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCrlDelta(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlDeltaResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/sign-verbatim" + requestPath := "/v1/{pki_mount_path}/crl/delta" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCrlDeltaResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKISignVerbatimRole -// role: The desired role with configuration for this request -func (s *Secrets) PKISignVerbatimRole(ctx context.Context, role string, request schema.PKISignVerbatimRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCrlDeltaPem +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCrlDeltaPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlDeltaPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/sign-verbatim/{role}" + requestPath := "/v1/{pki_mount_path}/crl/delta/pem" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCrlDeltaPemResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKITidy -func (s *Secrets) PKITidy(ctx context.Context, request schema.PKITidyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCrlDer +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCrlDer(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/tidy" + requestPath := "/v1/{pki_mount_path}/crl" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCrlDerResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKITidyCancel -func (s *Secrets) PKITidyCancel(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadCrlPem +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadCrlPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/tidy-cancel" + requestPath := "/v1/{pki_mount_path}/crl/pem" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadCrlPemResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -6383,19 +6103,22 @@ func (s *Secrets) PKITidyCancel(ctx context.Context, options ...RequestOption) ( ) } -// PKITidyStatus -func (s *Secrets) PKITidyStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadIssuer +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadIssuer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/tidy-status" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadIssuerResponse]( ctx, s.client, http.MethodGet, @@ -6406,205 +6129,222 @@ func (s *Secrets) PKITidyStatus(ctx context.Context, options ...RequestOption) ( ) } -// PKIWriteAutoTidyConfig -func (s *Secrets) PKIWriteAutoTidyConfig(ctx context.Context, request schema.PKIWriteAutoTidyConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadIssuerDer +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadIssuerDer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/auto-tidy" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/der" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadIssuerDerResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteCAConfig -func (s *Secrets) PKIWriteCAConfig(ctx context.Context, request schema.PKIWriteCAConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadIssuerJson +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadIssuerJson(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerJsonResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/ca" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/json" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadIssuerJsonResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteCRLConfig -func (s *Secrets) PKIWriteCRLConfig(ctx context.Context, request schema.PKIWriteCRLConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadIssuerPem +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadIssuerPem(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/crl" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/pem" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadIssuerPemResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteCerts -func (s *Secrets) PKIWriteCerts(ctx context.Context, request schema.PKIWriteCertsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadIssuersConfiguration +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadIssuersConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuersConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/cert" + requestPath := "/v1/{pki_mount_path}/config/issuers" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadIssuersConfigurationResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteClusterConfig -func (s *Secrets) PKIWriteClusterConfig(ctx context.Context, request schema.PKIWriteClusterConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadKey +// keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadKey(ctx context.Context, keyRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/cluster" + requestPath := "/v1/{pki_mount_path}/key/{key_ref}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"key_ref"+"}", url.PathEscape(keyRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadKeyResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteIntermediateCrossSign -func (s *Secrets) PKIWriteIntermediateCrossSign(ctx context.Context, request schema.PKIWriteIntermediateCrossSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadKeysConfiguration +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadKeysConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadKeysConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/intermediate/cross-sign" + requestPath := "/v1/{pki_mount_path}/config/keys" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadKeysConfigurationResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteIntermediateGenerate -// exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -func (s *Secrets) PKIWriteIntermediateGenerate(ctx context.Context, exported string, request schema.PKIWriteIntermediateGenerateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadRole +// name: Name of the role +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadRole(ctx context.Context, name string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/intermediate/generate/{exported}" + requestPath := "/v1/{pki_mount_path}/roles/{name}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"exported"+"}", url.PathEscape(exported), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadRoleResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteIntermediateSetSigned -func (s *Secrets) PKIWriteIntermediateSetSigned(ctx context.Context, request schema.PKIWriteIntermediateSetSignedRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReadUrlsConfiguration +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReadUrlsConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadUrlsConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/intermediate/set-signed" + requestPath := "/v1/{pki_mount_path}/config/urls" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiReadUrlsConfigurationResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteInternalExported -func (s *Secrets) PKIWriteInternalExported(ctx context.Context, request schema.PKIWriteInternalExportedRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiReplaceRoot +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiReplaceRoot(ctx context.Context, pkiMountPath string, request schema.PkiReplaceRootRequest, options ...RequestOption) (*Response[schema.PkiReplaceRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/internal|exported" + requestPath := "/v1/{pki_mount_path}/root/replace" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiReplaceRootResponse]( ctx, s.client, http.MethodPost, @@ -6615,21 +6355,20 @@ func (s *Secrets) PKIWriteInternalExported(ctx context.Context, request schema.P ) } -// PKIWriteIssueRole -// role: The desired role with configuration for this request -func (s *Secrets) PKIWriteIssueRole(ctx context.Context, role string, request schema.PKIWriteIssueRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiRevoke +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiRevoke(ctx context.Context, pkiMountPath string, request schema.PkiRevokeRequest, options ...RequestOption) (*Response[schema.PkiRevokeResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/issue/{role}" + requestPath := "/v1/{pki_mount_path}/revoke" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiRevokeResponse]( ctx, s.client, http.MethodPost, @@ -6640,42 +6379,46 @@ func (s *Secrets) PKIWriteIssueRole(ctx context.Context, role string, request sc ) } -// PKIWriteIssuersConfig -func (s *Secrets) PKIWriteIssuersConfig(ctx context.Context, request schema.PKIWriteIssuersConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiRevokeIssuer +// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiRevokeIssuer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiRevokeIssuerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/issuers" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}/revoke" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiRevokeIssuerResponse]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteKMS -func (s *Secrets) PKIWriteKMS(ctx context.Context, request schema.PKIWriteKMSRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiRevokeWithKey +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiRevokeWithKey(ctx context.Context, pkiMountPath string, request schema.PkiRevokeWithKeyRequest, options ...RequestOption) (*Response[schema.PkiRevokeWithKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/kms" + requestPath := "/v1/{pki_mount_path}/revoke-with-key" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiRevokeWithKeyResponse]( ctx, s.client, http.MethodPost, @@ -6686,21 +6429,20 @@ func (s *Secrets) PKIWriteKMS(ctx context.Context, request schema.PKIWriteKMSReq ) } -// PKIWriteKey -// keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. -func (s *Secrets) PKIWriteKey(ctx context.Context, keyRef string, request schema.PKIWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiRootSignIntermediate +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiRootSignIntermediate(ctx context.Context, pkiMountPath string, request schema.PkiRootSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiRootSignIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/key/{key_ref}" + requestPath := "/v1/{pki_mount_path}/root/sign-intermediate" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"key_ref"+"}", url.PathEscape(keyRef), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiRootSignIntermediateResponse]( ctx, s.client, http.MethodPost, @@ -6711,19 +6453,20 @@ func (s *Secrets) PKIWriteKey(ctx context.Context, keyRef string, request schema ) } -// PKIWriteKeysConfig -func (s *Secrets) PKIWriteKeysConfig(ctx context.Context, request schema.PKIWriteKeysConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiRootSignSelfIssued +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiRootSignSelfIssued(ctx context.Context, pkiMountPath string, request schema.PkiRootSignSelfIssuedRequest, options ...RequestOption) (*Response[schema.PkiRootSignSelfIssuedResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/keys" + requestPath := "/v1/{pki_mount_path}/root/sign-self-issued" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiRootSignSelfIssuedResponse]( ctx, s.client, http.MethodPost, @@ -6734,22 +6477,23 @@ func (s *Secrets) PKIWriteKeysConfig(ctx context.Context, request schema.PKIWrit ) } -// PKIWriteOCSP -func (s *Secrets) PKIWriteOCSP(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiRotateCrl +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiRotateCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiRotateCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/ocsp" + requestPath := "/v1/{pki_mount_path}/crl/rotate" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiRotateCrlResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -6757,44 +6501,44 @@ func (s *Secrets) PKIWriteOCSP(ctx context.Context, options ...RequestOption) (* ) } -// PKIWriteRole -// name: Name of the role -func (s *Secrets) PKIWriteRole(ctx context.Context, name string, request schema.PKIWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiRotateDeltaCrl +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiRotateDeltaCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiRotateDeltaCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/roles/{name}" + requestPath := "/v1/{pki_mount_path}/crl/rotate-delta" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiRotateDeltaCrlResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// PKIWriteURLConfig -func (s *Secrets) PKIWriteURLConfig(ctx context.Context, request schema.PKIWriteURLConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiSetSignedIntermediate +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiSetSignedIntermediate(ctx context.Context, pkiMountPath string, request schema.PkiSetSignedIntermediateRequest, options ...RequestOption) (*Response[schema.PkiSetSignedIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/config/urls" + requestPath := "/v1/{pki_mount_path}/intermediate/set-signed" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiSetSignedIntermediateResponse]( ctx, s.client, http.MethodPost, @@ -6805,116 +6549,123 @@ func (s *Secrets) PKIWriteURLConfig(ctx context.Context, request schema.PKIWrite ) } -// PkiDeleteIssuerRefDerPem -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PkiDeleteIssuerRefDerPem(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiSignVerbatim +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiSignVerbatim(ctx context.Context, pkiMountPath string, request schema.PkiSignVerbatimRequest, options ...RequestOption) (*Response[schema.PkiSignVerbatimResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/{issuer_ref}/der|/pem" + requestPath := "/v1/{pki_mount_path}/sign-verbatim" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiSignVerbatimResponse]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PkiDeleteJson -func (s *Secrets) PkiDeleteJson(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiSignVerbatimWithRole +// role: The desired role with configuration for this request +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiSignVerbatimWithRole(ctx context.Context, role string, pkiMountPath string, request schema.PkiSignVerbatimWithRoleRequest, options ...RequestOption) (*Response[schema.PkiSignVerbatimWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}//json" + requestPath := "/v1/{pki_mount_path}/sign-verbatim/{role}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiSignVerbatimWithRoleResponse]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PkiReadDelta -func (s *Secrets) PkiReadDelta(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiSignWithRole +// role: The desired role with configuration for this request +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiSignWithRole(ctx context.Context, role string, pkiMountPath string, request schema.PkiSignWithRoleRequest, options ...RequestOption) (*Response[schema.PkiSignWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}//delta" + requestPath := "/v1/{pki_mount_path}/sign/{role}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiSignWithRoleResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PkiReadDeltaPem -func (s *Secrets) PkiReadDeltaPem(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiTidy +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiTidy(ctx context.Context, pkiMountPath string, request schema.PkiTidyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}//delta/pem" + requestPath := "/v1/{pki_mount_path}/tidy" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PkiReadDer -func (s *Secrets) PkiReadDer(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiTidyCancel +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiTidyCancel(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiTidyCancelResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}//der" + requestPath := "/v1/{pki_mount_path}/tidy-cancel" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiTidyCancelResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -6922,21 +6673,20 @@ func (s *Secrets) PkiReadDer(ctx context.Context, options ...RequestOption) (*Re ) } -// PkiReadIssuerRefCrlPemDerDeltaPem -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PkiReadIssuerRefCrlPemDerDeltaPem(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiTidyStatus +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiTidyStatus(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiTidyStatusResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/{issuer_ref}/crl/pem|/der|/delta/pem" + requestPath := "/v1/{pki_mount_path}/tidy-status" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PkiTidyStatusResponse]( ctx, s.client, http.MethodGet, @@ -6947,88 +6697,94 @@ func (s *Secrets) PkiReadIssuerRefCrlPemDerDeltaPem(ctx context.Context, issuerR ) } -// PkiReadIssuerRefDerPem +// PkiWriteIssuer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PkiReadIssuerRefDerPem(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiWriteIssuer(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiWriteIssuerRequest, options ...RequestOption) (*Response[schema.PkiWriteIssuerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/{issuer_ref}/der|/pem" + requestPath := "/v1/{pki_mount_path}/issuer/{issuer_ref}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiWriteIssuerResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PkiReadJson -func (s *Secrets) PkiReadJson(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiWriteKey +// keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiWriteKey(ctx context.Context, keyRef string, pkiMountPath string, request schema.PkiWriteKeyRequest, options ...RequestOption) (*Response[schema.PkiWriteKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}//json" + requestPath := "/v1/{pki_mount_path}/key/{key_ref}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"key_ref"+"}", url.PathEscape(keyRef), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiWriteKeyResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PkiReadPem -func (s *Secrets) PkiReadPem(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PkiWriteRole +// name: Name of the role +// pkiMountPath: Path that the backend was mounted at +func (s *Secrets) PkiWriteRole(ctx context.Context, name string, pkiMountPath string, request schema.PkiWriteRoleRequest, options ...RequestOption) (*Response[schema.PkiWriteRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}//pem" + requestPath := "/v1/{pki_mount_path}/roles/{name}" requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PkiWriteRoleResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PkiWriteIssuerRefDerPem -// issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -func (s *Secrets) PkiWriteIssuerRefDerPem(ctx context.Context, issuerRef string, request schema.PkiWriteIssuerRefDerPemRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RabbitMqConfigureConnection Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API. +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqConfigureConnection(ctx context.Context, rabbitmqMountPath string, request schema.RabbitMqConfigureConnectionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}/{issuer_ref}/der|/pem" - requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) - requestPath = strings.Replace(requestPath, "{"+"issuer_ref"+"}", url.PathEscape(issuerRef), -1) + requestPath := "/v1/{rabbitmq_mount_path}/config/connection" + requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) requestQueryParameters := make(url.Values) @@ -7043,15 +6799,16 @@ func (s *Secrets) PkiWriteIssuerRefDerPem(ctx context.Context, issuerRef string, ) } -// PkiWriteJson -func (s *Secrets) PkiWriteJson(ctx context.Context, request schema.PkiWriteJsonRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RabbitMqConfigureLease +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqConfigureLease(ctx context.Context, rabbitmqMountPath string, request schema.RabbitMqConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{pki_mount_path}//json" - requestPath = strings.Replace(requestPath, "{"+"pki_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("pki")), -1) + requestPath := "/v1/{rabbitmq_mount_path}/config/lease" + requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) requestQueryParameters := make(url.Values) @@ -7066,9 +6823,10 @@ func (s *Secrets) PkiWriteJson(ctx context.Context, request schema.PkiWriteJsonR ) } -// RabbitMQDeleteRole Manage the roles that can be created with this backend. +// RabbitMqDeleteRole Manage the roles that can be created with this backend. // name: Name of the role. -func (s *Secrets) RabbitMQDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqDeleteRole(ctx context.Context, name string, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7091,8 +6849,9 @@ func (s *Secrets) RabbitMQDeleteRole(ctx context.Context, name string, options . ) } -// RabbitMQListRoles Manage the roles that can be created with this backend. -func (s *Secrets) RabbitMQListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RabbitMqListRoles Manage the roles that can be created with this backend. +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqListRoles(ctx context.Context, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7115,17 +6874,16 @@ func (s *Secrets) RabbitMQListRoles(ctx context.Context, options ...RequestOptio ) } -// RabbitMQReadCredentials Request RabbitMQ credentials for a certain role. -// name: Name of the role. -func (s *Secrets) RabbitMQReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RabbitMqReadLeaseConfiguration +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqReadLeaseConfiguration(ctx context.Context, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{rabbitmq_mount_path}/creds/{name}" + requestPath := "/v1/{rabbitmq_mount_path}/config/lease" requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7140,15 +6898,18 @@ func (s *Secrets) RabbitMQReadCredentials(ctx context.Context, name string, opti ) } -// RabbitMQReadLeaseConfig Configure the lease parameters for generated credentials -func (s *Secrets) RabbitMQReadLeaseConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RabbitMqReadRole Manage the roles that can be created with this backend. +// name: Name of the role. +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqReadRole(ctx context.Context, name string, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{rabbitmq_mount_path}/config/lease" + requestPath := "/v1/{rabbitmq_mount_path}/roles/{name}" requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7163,15 +6924,16 @@ func (s *Secrets) RabbitMQReadLeaseConfig(ctx context.Context, options ...Reques ) } -// RabbitMQReadRole Manage the roles that can be created with this backend. +// RabbitMqRequestCredentials Request RabbitMQ credentials for a certain role. // name: Name of the role. -func (s *Secrets) RabbitMQReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqRequestCredentials(ctx context.Context, name string, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{rabbitmq_mount_path}/roles/{name}" + requestPath := "/v1/{rabbitmq_mount_path}/creds/{name}" requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) @@ -7188,15 +6950,18 @@ func (s *Secrets) RabbitMQReadRole(ctx context.Context, name string, options ... ) } -// RabbitMQWriteConnectionConfig Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API. -func (s *Secrets) RabbitMQWriteConnectionConfig(ctx context.Context, request schema.RabbitMQWriteConnectionConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RabbitMqWriteRole Manage the roles that can be created with this backend. +// name: Name of the role. +// rabbitmqMountPath: Path that the backend was mounted at +func (s *Secrets) RabbitMqWriteRole(ctx context.Context, name string, rabbitmqMountPath string, request schema.RabbitMqWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{rabbitmq_mount_path}/config/connection" + requestPath := "/v1/{rabbitmq_mount_path}/roles/{name}" requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7211,15 +6976,16 @@ func (s *Secrets) RabbitMQWriteConnectionConfig(ctx context.Context, request sch ) } -// RabbitMQWriteLeaseConfig Configure the lease parameters for generated credentials -func (s *Secrets) RabbitMQWriteLeaseConfig(ctx context.Context, request schema.RabbitMQWriteLeaseConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshConfigureCa +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshConfigureCa(ctx context.Context, sshMountPath string, request schema.SshConfigureCaRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{rabbitmq_mount_path}/config/lease" - requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) + requestPath := "/v1/{ssh_mount_path}/config/ca" + requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) requestQueryParameters := make(url.Values) @@ -7234,17 +7000,16 @@ func (s *Secrets) RabbitMQWriteLeaseConfig(ctx context.Context, request schema.R ) } -// RabbitMQWriteRole Manage the roles that can be created with this backend. -// name: Name of the role. -func (s *Secrets) RabbitMQWriteRole(ctx context.Context, name string, request schema.RabbitMQWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshConfigureZeroAddress +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshConfigureZeroAddress(ctx context.Context, sshMountPath string, request schema.SshConfigureZeroAddressRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{rabbitmq_mount_path}/roles/{name}" - requestPath = strings.Replace(requestPath, "{"+"rabbitmq_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("rabbitmq")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{ssh_mount_path}/config/zeroaddress" + requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) requestQueryParameters := make(url.Values) @@ -7259,8 +7024,9 @@ func (s *Secrets) RabbitMQWriteRole(ctx context.Context, name string, request sc ) } -// SSHDeleteCAConfig Set the SSH private key used for signing certificates. -func (s *Secrets) SSHDeleteCAConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshDeleteCaConfiguration +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshDeleteCaConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7282,17 +7048,18 @@ func (s *Secrets) SSHDeleteCAConfig(ctx context.Context, options ...RequestOptio ) } -// SSHDeleteKeys Register a shared private key with Vault. -// keyName: [Required] Name of the key -func (s *Secrets) SSHDeleteKeys(ctx context.Context, keyName string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshDeleteRole Manage the 'roles' that can be created with this backend. +// role: [Required for all types] Name of the role being created. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshDeleteRole(ctx context.Context, role string, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/keys/{key_name}" + requestPath := "/v1/{ssh_mount_path}/roles/{role}" requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) - requestPath = strings.Replace(requestPath, "{"+"key_name"+"}", url.PathEscape(keyName), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -7307,17 +7074,16 @@ func (s *Secrets) SSHDeleteKeys(ctx context.Context, keyName string, options ... ) } -// SSHDeleteRole Manage the 'roles' that can be created with this backend. -// role: [Required for all types] Name of the role being created. -func (s *Secrets) SSHDeleteRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshDeleteZeroAddressConfiguration +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshDeleteZeroAddressConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/roles/{role}" + requestPath := "/v1/{ssh_mount_path}/config/zeroaddress" requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) @@ -7332,31 +7098,61 @@ func (s *Secrets) SSHDeleteRole(ctx context.Context, role string, options ...Req ) } -// SSHDeleteZeroAddressConfig Assign zero address as default CIDR block for select roles. -func (s *Secrets) SSHDeleteZeroAddressConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshGenerateCredentials Creates a credential for establishing SSH connection with the remote host. +// role: [Required] Name of the role +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshGenerateCredentials(ctx context.Context, role string, sshMountPath string, request schema.SshGenerateCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/config/zeroaddress" + requestPath := "/v1/{ssh_mount_path}/creds/{role}" requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, + requestQueryParameters, + requestModifiers, + ) +} + +// SshIssueCertificate +// role: The desired role with configuration for this request. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshIssueCertificate(ctx context.Context, role string, sshMountPath string, request schema.SshIssueCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/{ssh_mount_path}/issue/{role}" + requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) + requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + + requestQueryParameters := make(url.Values) + + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + s.client, + http.MethodPost, + requestPath, + request, requestQueryParameters, requestModifiers, ) } -// SSHListRoles Manage the 'roles' that can be created with this backend. -func (s *Secrets) SSHListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshListRoles Manage the 'roles' that can be created with this backend. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshListRoles(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7379,8 +7175,9 @@ func (s *Secrets) SSHListRoles(ctx context.Context, options ...RequestOption) (* ) } -// SSHLookup List all the roles associated with the given IP address. -func (s *Secrets) SSHLookup(ctx context.Context, request schema.SSHLookupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshListRolesByIp List all the roles associated with the given IP address. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshListRolesByIp(ctx context.Context, sshMountPath string, request schema.SshListRolesByIpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7402,8 +7199,9 @@ func (s *Secrets) SSHLookup(ctx context.Context, request schema.SSHLookupRequest ) } -// SSHReadCAConfig Set the SSH private key used for signing certificates. -func (s *Secrets) SSHReadCAConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshReadCaConfiguration +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshReadCaConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7425,8 +7223,9 @@ func (s *Secrets) SSHReadCAConfig(ctx context.Context, options ...RequestOption) ) } -// SSHReadPublicKey Retrieve the public key. -func (s *Secrets) SSHReadPublicKey(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshReadPublicKey Retrieve the public key. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshReadPublicKey(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7448,9 +7247,10 @@ func (s *Secrets) SSHReadPublicKey(ctx context.Context, options ...RequestOption ) } -// SSHReadRole Manage the 'roles' that can be created with this backend. +// SshReadRole Manage the 'roles' that can be created with this backend. // role: [Required for all types] Name of the role being created. -func (s *Secrets) SSHReadRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshReadRole(ctx context.Context, role string, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7473,8 +7273,9 @@ func (s *Secrets) SSHReadRole(ctx context.Context, role string, options ...Reque ) } -// SSHReadZeroAddressConfig Assign zero address as default CIDR block for select roles. -func (s *Secrets) SSHReadZeroAddressConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshReadZeroAddressConfiguration +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshReadZeroAddressConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7496,9 +7297,10 @@ func (s *Secrets) SSHReadZeroAddressConfig(ctx context.Context, options ...Reque ) } -// SSHSign Request signing an SSH key using a certain role with the provided details. +// SshSignCertificate Request signing an SSH key using a certain role with the provided details. // role: The desired role with configuration for this request. -func (s *Secrets) SSHSign(ctx context.Context, role string, request schema.SSHSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshSignCertificate(ctx context.Context, role string, sshMountPath string, request schema.SshSignCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7521,37 +7323,39 @@ func (s *Secrets) SSHSign(ctx context.Context, role string, request schema.SSHSi ) } -// SSHVerify Validate the OTP provided by Vault SSH Agent. -func (s *Secrets) SSHVerify(ctx context.Context, request schema.SSHVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshTidyDynamicHostKeys This endpoint removes the stored host keys used for the removed Dynamic Key feature, if present. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshTidyDynamicHostKeys(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/verify" + requestPath := "/v1/{ssh_mount_path}/tidy/dynamic-keys" requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// SSHWriteCAConfig Set the SSH private key used for signing certificates. -func (s *Secrets) SSHWriteCAConfig(ctx context.Context, request schema.SSHWriteCAConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshVerifyOtp Validate the OTP provided by Vault SSH Agent. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshVerifyOtp(ctx context.Context, sshMountPath string, request schema.SshVerifyOtpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/config/ca" + requestPath := "/v1/{ssh_mount_path}/verify" requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) requestQueryParameters := make(url.Values) @@ -7567,15 +7371,16 @@ func (s *Secrets) SSHWriteCAConfig(ctx context.Context, request schema.SSHWriteC ) } -// SSHWriteCredentials Creates a credential for establishing SSH connection with the remote host. -// role: [Required] Name of the role -func (s *Secrets) SSHWriteCredentials(ctx context.Context, role string, request schema.SSHWriteCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SshWriteRole Manage the 'roles' that can be created with this backend. +// role: [Required for all types] Name of the role being created. +// sshMountPath: Path that the backend was mounted at +func (s *Secrets) SshWriteRole(ctx context.Context, role string, sshMountPath string, request schema.SshWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/creds/{role}" + requestPath := "/v1/{ssh_mount_path}/roles/{role}" requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) @@ -7592,17 +7397,16 @@ func (s *Secrets) SSHWriteCredentials(ctx context.Context, role string, request ) } -// SSHWriteIssue -// role: The desired role with configuration for this request. -func (s *Secrets) SSHWriteIssue(ctx context.Context, role string, request schema.SSHWriteIssueRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudConfigure +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudConfigure(ctx context.Context, terraformMountPath string, request schema.TerraformCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/issue/{role}" - requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/{terraform_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestQueryParameters := make(url.Values) @@ -7617,89 +7421,93 @@ func (s *Secrets) SSHWriteIssue(ctx context.Context, role string, request schema ) } -// SSHWriteKeys Register a shared private key with Vault. -// keyName: [Required] Name of the key -func (s *Secrets) SSHWriteKeys(ctx context.Context, keyName string, request schema.SSHWriteKeysRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudDeleteConfiguration +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudDeleteConfiguration(ctx context.Context, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/keys/{key_name}" - requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) - requestPath = strings.Replace(requestPath, "{"+"key_name"+"}", url.PathEscape(keyName), -1) + requestPath := "/v1/{terraform_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// SSHWriteRole Manage the 'roles' that can be created with this backend. -// role: [Required for all types] Name of the role being created. -func (s *Secrets) SSHWriteRole(ctx context.Context, role string, request schema.SSHWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudDeleteRole +// name: Name of the role +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudDeleteRole(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/roles/{role}" - requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) - requestPath = strings.Replace(requestPath, "{"+"role"+"}", url.PathEscape(role), -1) + requestPath := "/v1/{terraform_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// SSHWriteZeroAddressConfig Assign zero address as default CIDR block for select roles. -func (s *Secrets) SSHWriteZeroAddressConfig(ctx context.Context, request schema.SSHWriteZeroAddressConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudGenerateCredentials +// name: Name of the role +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudGenerateCredentials(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{ssh_mount_path}/config/zeroaddress" - requestPath = strings.Replace(requestPath, "{"+"ssh_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("ssh")), -1) + requestPath := "/v1/{terraform_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// TOTPDeleteKey Manage the keys that can be created with this backend. -// name: Name of the key. -func (s *Secrets) TOTPDeleteKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudGenerateCredentials2 +// name: Name of the role +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudGenerateCredentials2(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{totp_mount_path}/keys/{name}" - requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) + requestPath := "/v1/{terraform_mount_path}/creds/{name}" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7707,7 +7515,7 @@ func (s *Secrets) TOTPDeleteKey(ctx context.Context, name string, options ...Req return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -7715,15 +7523,16 @@ func (s *Secrets) TOTPDeleteKey(ctx context.Context, name string, options ...Req ) } -// TOTPListKeys Manage the keys that can be created with this backend. -func (s *Secrets) TOTPListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudListRoles +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudListRoles(ctx context.Context, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{totp_mount_path}/keys" - requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) + requestPath := "/v1/{terraform_mount_path}/role" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") @@ -7739,17 +7548,16 @@ func (s *Secrets) TOTPListKeys(ctx context.Context, options ...RequestOption) (* ) } -// TOTPReadCode Request time-based one-time use password or validate a password for a certain key . -// name: Name of the key. -func (s *Secrets) TOTPReadCode(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudReadConfiguration +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudReadConfiguration(ctx context.Context, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{totp_mount_path}/code/{name}" - requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{terraform_mount_path}/config" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestQueryParameters := make(url.Values) @@ -7764,16 +7572,17 @@ func (s *Secrets) TOTPReadCode(ctx context.Context, name string, options ...Requ ) } -// TOTPReadKey Manage the keys that can be created with this backend. -// name: Name of the key. -func (s *Secrets) TOTPReadKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudReadRole +// name: Name of the role +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudReadRole(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{totp_mount_path}/keys/{name}" - requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) + requestPath := "/v1/{terraform_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7789,41 +7598,43 @@ func (s *Secrets) TOTPReadKey(ctx context.Context, name string, options ...Reque ) } -// TOTPWriteCode Request time-based one-time use password or validate a password for a certain key . -// name: Name of the key. -func (s *Secrets) TOTPWriteCode(ctx context.Context, name string, request schema.TOTPWriteCodeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudRotateRole +// name: Name of the team or organization role +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudRotateRole(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{totp_mount_path}/code/{name}" - requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) + requestPath := "/v1/{terraform_mount_path}/rotate-role/{name}" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// TOTPWriteKey Manage the keys that can be created with this backend. -// name: Name of the key. -func (s *Secrets) TOTPWriteKey(ctx context.Context, name string, request schema.TOTPWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TerraformCloudWriteRole +// name: Name of the role +// terraformMountPath: Path that the backend was mounted at +func (s *Secrets) TerraformCloudWriteRole(ctx context.Context, name string, terraformMountPath string, request schema.TerraformCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{totp_mount_path}/keys/{name}" - requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) + requestPath := "/v1/{terraform_mount_path}/role/{name}" + requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7839,39 +7650,43 @@ func (s *Secrets) TOTPWriteKey(ctx context.Context, name string, request schema. ) } -// TerraformDeleteConfig -func (s *Secrets) TerraformDeleteConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TotpCreateKey +// name: Name of the key. +// totpMountPath: Path that the backend was mounted at +func (s *Secrets) TotpCreateKey(ctx context.Context, name string, totpMountPath string, request schema.TotpCreateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{totp_mount_path}/keys/{name}" + requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// TerraformDeleteRole -// name: Name of the role -func (s *Secrets) TerraformDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TotpDeleteKey +// name: Name of the key. +// totpMountPath: Path that the backend was mounted at +func (s *Secrets) TotpDeleteKey(ctx context.Context, name string, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{totp_mount_path}/keys/{name}" + requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7887,18 +7702,20 @@ func (s *Secrets) TerraformDeleteRole(ctx context.Context, name string, options ) } -// TerraformListRoles -func (s *Secrets) TerraformListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TotpGenerateCode +// name: Name of the key. +// totpMountPath: Path that the backend was mounted at +func (s *Secrets) TotpGenerateCode(ctx context.Context, name string, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/role" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{totp_mount_path}/code/{name}" + requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -7911,17 +7728,19 @@ func (s *Secrets) TerraformListRoles(ctx context.Context, options ...RequestOpti ) } -// TerraformReadConfig -func (s *Secrets) TerraformReadConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TotpListKeys Manage the keys that can be created with this backend. +// totpMountPath: Path that the backend was mounted at +func (s *Secrets) TotpListKeys(ctx context.Context, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{totp_mount_path}/keys" + requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -7934,16 +7753,17 @@ func (s *Secrets) TerraformReadConfig(ctx context.Context, options ...RequestOpt ) } -// TerraformReadCredentials Generate a Terraform Cloud or Enterprise API token from a specific Vault role. -// name: Name of the role -func (s *Secrets) TerraformReadCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TotpReadKey +// name: Name of the key. +// totpMountPath: Path that the backend was mounted at +func (s *Secrets) TotpReadKey(ctx context.Context, name string, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{totp_mount_path}/keys/{name}" + requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -7959,41 +7779,43 @@ func (s *Secrets) TerraformReadCredentials(ctx context.Context, name string, opt ) } -// TerraformReadRole -// name: Name of the role -func (s *Secrets) TerraformReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TotpValidateCode +// name: Name of the key. +// totpMountPath: Path that the backend was mounted at +func (s *Secrets) TotpValidateCode(ctx context.Context, name string, totpMountPath string, request schema.TotpValidateCodeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{totp_mount_path}/code/{name}" + requestPath = strings.Replace(requestPath, "{"+"totp_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("totp")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// TerraformRotateRole -// name: Name of the team or organization role -func (s *Secrets) TerraformRotateRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitBackUpKey Backup the named key +// name: Name of the key +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitBackUpKey(ctx context.Context, name string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/rotate-role/{name}" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{transit_mount_path}/backup/{name}" + requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -8001,7 +7823,7 @@ func (s *Secrets) TerraformRotateRole(ctx context.Context, name string, options return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -8009,15 +7831,16 @@ func (s *Secrets) TerraformRotateRole(ctx context.Context, name string, options ) } -// TerraformWriteConfig -func (s *Secrets) TerraformWriteConfig(ctx context.Context, request schema.TerraformWriteConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitConfigureCache Configures a new cache of the specified size +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitConfigureCache(ctx context.Context, transitMountPath string, request schema.TransitConfigureCacheRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/config" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{transit_mount_path}/cache-config" + requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) requestQueryParameters := make(url.Values) @@ -8032,42 +7855,42 @@ func (s *Secrets) TerraformWriteConfig(ctx context.Context, request schema.Terra ) } -// TerraformWriteCredentials Generate a Terraform Cloud or Enterprise API token from a specific Vault role. -// name: Name of the role -func (s *Secrets) TerraformWriteCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitConfigureKey Configure a named encryption key +// name: Name of the key +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitConfigureKey(ctx context.Context, name string, transitMountPath string, request schema.TransitConfigureKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/creds/{name}" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) + requestPath := "/v1/{transit_mount_path}/keys/{name}/config" + requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// TerraformWriteRole -// name: Name of the role -func (s *Secrets) TerraformWriteRole(ctx context.Context, name string, request schema.TerraformWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitConfigureKeys +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitConfigureKeys(ctx context.Context, transitMountPath string, request schema.TransitConfigureKeysRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{terraform_mount_path}/role/{name}" - requestPath = strings.Replace(requestPath, "{"+"terraform_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("terraform")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/{transit_mount_path}/config/keys" + requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) requestQueryParameters := make(url.Values) @@ -8082,26 +7905,27 @@ func (s *Secrets) TerraformWriteRole(ctx context.Context, name string, request s ) } -// TransitBackup Backup the named key +// TransitCreateKey // name: Name of the key -func (s *Secrets) TransitBackup(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitCreateKey(ctx context.Context, name string, transitMountPath string, request schema.TransitCreateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{transit_mount_path}/backup/{name}" + requestPath := "/v1/{transit_mount_path}/keys/{name}" requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) @@ -8109,7 +7933,8 @@ func (s *Secrets) TransitBackup(ctx context.Context, name string, options ...Req // TransitDecrypt Decrypt a ciphertext value using a named key // name: Name of the key -func (s *Secrets) TransitDecrypt(ctx context.Context, name string, request schema.TransitDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitDecrypt(ctx context.Context, name string, transitMountPath string, request schema.TransitDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8132,9 +7957,10 @@ func (s *Secrets) TransitDecrypt(ctx context.Context, name string, request schem ) } -// TransitDeleteKey Managed named encryption keys +// TransitDeleteKey // name: Name of the key -func (s *Secrets) TransitDeleteKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitDeleteKey(ctx context.Context, name string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8159,7 +7985,8 @@ func (s *Secrets) TransitDeleteKey(ctx context.Context, name string, options ... // TransitEncrypt Encrypt a plaintext value or a batch of plaintext blocks using a named key // name: Name of the key -func (s *Secrets) TransitEncrypt(ctx context.Context, name string, request schema.TransitEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitEncrypt(ctx context.Context, name string, transitMountPath string, request schema.TransitEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8182,10 +8009,11 @@ func (s *Secrets) TransitEncrypt(ctx context.Context, name string, request schem ) } -// TransitExport Export named encryption or signing key +// TransitExportKey Export named encryption or signing key // name: Name of the key // type_: Type of key to export (encryption-key, signing-key, hmac-key) -func (s *Secrets) TransitExport(ctx context.Context, name string, type_ string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitExportKey(ctx context.Context, name string, type_ string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8209,11 +8037,12 @@ func (s *Secrets) TransitExport(ctx context.Context, name string, type_ string, ) } -// TransitExportVersion Export named encryption or signing key +// TransitExportKeyVersion Export named encryption or signing key // name: Name of the key // type_: Type of key to export (encryption-key, signing-key, hmac-key) // version: Version of the key -func (s *Secrets) TransitExportVersion(ctx context.Context, name string, type_ string, version string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitExportKeyVersion(ctx context.Context, name string, type_ string, version string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8241,7 +8070,8 @@ func (s *Secrets) TransitExportVersion(ctx context.Context, name string, type_ s // TransitGenerateDataKey Generate a data key // name: The backend key used for encrypting the data key // plaintext: \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. -func (s *Secrets) TransitGenerateDataKey(ctx context.Context, name string, plaintext string, request schema.TransitGenerateDataKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitGenerateDataKey(ctx context.Context, name string, plaintext string, transitMountPath string, request schema.TransitGenerateDataKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8265,9 +8095,10 @@ func (s *Secrets) TransitGenerateDataKey(ctx context.Context, name string, plain ) } -// TransitGenerateHMAC Generate an HMAC for input data using the named key +// TransitGenerateHmac Generate an HMAC for input data using the named key // name: The key to use for the HMAC function -func (s *Secrets) TransitGenerateHMAC(ctx context.Context, name string, request schema.TransitGenerateHMACRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitGenerateHmac(ctx context.Context, name string, transitMountPath string, request schema.TransitGenerateHmacRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8290,10 +8121,11 @@ func (s *Secrets) TransitGenerateHMAC(ctx context.Context, name string, request ) } -// TransitGenerateHMACWithAlgorithm Generate an HMAC for input data using the named key +// TransitGenerateHmacWithAlgorithm Generate an HMAC for input data using the named key // name: The key to use for the HMAC function // urlalgorithm: Algorithm to use (POST URL parameter) -func (s *Secrets) TransitGenerateHMACWithAlgorithm(ctx context.Context, name string, urlalgorithm string, request schema.TransitGenerateHMACWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitGenerateHmacWithAlgorithm(ctx context.Context, name string, urlalgorithm string, transitMountPath string, request schema.TransitGenerateHmacWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8318,7 +8150,8 @@ func (s *Secrets) TransitGenerateHMACWithAlgorithm(ctx context.Context, name str } // TransitGenerateRandom Generate random bytes -func (s *Secrets) TransitGenerateRandom(ctx context.Context, request schema.TransitGenerateRandomRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitGenerateRandom(ctx context.Context, transitMountPath string, request schema.TransitGenerateRandomRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8340,9 +8173,36 @@ func (s *Secrets) TransitGenerateRandom(ctx context.Context, request schema.Tran ) } -// TransitGenerateRandomSource Generate random bytes +// TransitGenerateRandomWithBytes Generate random bytes +// urlbytes: The number of bytes to generate (POST URL parameter) +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitGenerateRandomWithBytes(ctx context.Context, urlbytes string, transitMountPath string, request schema.TransitGenerateRandomWithBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/{transit_mount_path}/random/{urlbytes}" + requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) + requestPath = strings.Replace(requestPath, "{"+"urlbytes"+"}", url.PathEscape(urlbytes), -1) + + requestQueryParameters := make(url.Values) + + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + s.client, + http.MethodPost, + requestPath, + request, + requestQueryParameters, + requestModifiers, + ) +} + +// TransitGenerateRandomWithSource Generate random bytes // source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". -func (s *Secrets) TransitGenerateRandomSource(ctx context.Context, source string, request schema.TransitGenerateRandomSourceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitGenerateRandomWithSource(ctx context.Context, source string, transitMountPath string, request schema.TransitGenerateRandomWithSourceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8365,10 +8225,11 @@ func (s *Secrets) TransitGenerateRandomSource(ctx context.Context, source string ) } -// TransitGenerateRandomSourceBytes Generate random bytes +// TransitGenerateRandomWithSourceAndBytes Generate random bytes // source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". // urlbytes: The number of bytes to generate (POST URL parameter) -func (s *Secrets) TransitGenerateRandomSourceBytes(ctx context.Context, source string, urlbytes string, request schema.TransitGenerateRandomSourceBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitGenerateRandomWithSourceAndBytes(ctx context.Context, source string, urlbytes string, transitMountPath string, request schema.TransitGenerateRandomWithSourceAndBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8393,7 +8254,8 @@ func (s *Secrets) TransitGenerateRandomSourceBytes(ctx context.Context, source s } // TransitHash Generate a hash sum for input data -func (s *Secrets) TransitHash(ctx context.Context, request schema.TransitHashRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitHash(ctx context.Context, transitMountPath string, request schema.TransitHashRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8417,7 +8279,8 @@ func (s *Secrets) TransitHash(ctx context.Context, request schema.TransitHashReq // TransitHashWithAlgorithm Generate a hash sum for input data // urlalgorithm: Algorithm to use (POST URL parameter) -func (s *Secrets) TransitHashWithAlgorithm(ctx context.Context, urlalgorithm string, request schema.TransitHashWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitHashWithAlgorithm(ctx context.Context, urlalgorithm string, transitMountPath string, request schema.TransitHashWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8442,7 +8305,8 @@ func (s *Secrets) TransitHashWithAlgorithm(ctx context.Context, urlalgorithm str // TransitImportKey Imports an externally-generated key into a new transit key // name: The name of the key -func (s *Secrets) TransitImportKey(ctx context.Context, name string, request schema.TransitImportKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitImportKey(ctx context.Context, name string, transitMountPath string, request schema.TransitImportKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8467,7 +8331,8 @@ func (s *Secrets) TransitImportKey(ctx context.Context, name string, request sch // TransitImportKeyVersion Imports an externally-generated key into an existing imported key // name: The name of the key -func (s *Secrets) TransitImportKeyVersion(ctx context.Context, name string, request schema.TransitImportKeyVersionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitImportKeyVersion(ctx context.Context, name string, transitMountPath string, request schema.TransitImportKeyVersionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8491,7 +8356,8 @@ func (s *Secrets) TransitImportKeyVersion(ctx context.Context, name string, requ } // TransitListKeys Managed named encryption keys -func (s *Secrets) TransitListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitListKeys(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8514,8 +8380,9 @@ func (s *Secrets) TransitListKeys(ctx context.Context, options ...RequestOption) ) } -// TransitReadCacheConfig Returns the size of the active cache -func (s *Secrets) TransitReadCacheConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitReadCacheConfiguration Returns the size of the active cache +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitReadCacheConfiguration(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8537,15 +8404,18 @@ func (s *Secrets) TransitReadCacheConfig(ctx context.Context, options ...Request ) } -// TransitReadConfigKeys Configuration common across all keys -func (s *Secrets) TransitReadConfigKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitReadKey +// name: Name of the key +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitReadKey(ctx context.Context, name string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{transit_mount_path}/config/keys" + requestPath := "/v1/{transit_mount_path}/keys/{name}" requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -8560,17 +8430,16 @@ func (s *Secrets) TransitReadConfigKeys(ctx context.Context, options ...RequestO ) } -// TransitReadKey Managed named encryption keys -// name: Name of the key -func (s *Secrets) TransitReadKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitReadKeysConfiguration +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitReadKeysConfiguration(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{transit_mount_path}/keys/{name}" + requestPath := "/v1/{transit_mount_path}/config/keys" requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -8586,7 +8455,8 @@ func (s *Secrets) TransitReadKey(ctx context.Context, name string, options ...Re } // TransitReadWrappingKey Returns the public key to use for wrapping imported keys -func (s *Secrets) TransitReadWrappingKey(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitReadWrappingKey(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8608,15 +8478,18 @@ func (s *Secrets) TransitReadWrappingKey(ctx context.Context, options ...Request ) } -// TransitRestore Restore the named key -func (s *Secrets) TransitRestore(ctx context.Context, request schema.TransitRestoreRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// TransitRestoreAndRenameKey Restore the named key +// name: If set, this will be the name of the restored key. +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitRestoreAndRenameKey(ctx context.Context, name string, transitMountPath string, request schema.TransitRestoreAndRenameKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{transit_mount_path}/restore" + requestPath := "/v1/{transit_mount_path}/restore/{name}" requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -8632,16 +8505,15 @@ func (s *Secrets) TransitRestore(ctx context.Context, request schema.TransitRest } // TransitRestoreKey Restore the named key -// name: If set, this will be the name of the restored key. -func (s *Secrets) TransitRestoreKey(ctx context.Context, name string, request schema.TransitRestoreKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitRestoreKey(ctx context.Context, transitMountPath string, request schema.TransitRestoreKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/{transit_mount_path}/restore/{name}" + requestPath := "/v1/{transit_mount_path}/restore" requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -8658,7 +8530,8 @@ func (s *Secrets) TransitRestoreKey(ctx context.Context, name string, request sc // TransitRewrap Rewrap ciphertext // name: Name of the key -func (s *Secrets) TransitRewrap(ctx context.Context, name string, request schema.TransitRewrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitRewrap(ctx context.Context, name string, transitMountPath string, request schema.TransitRewrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8683,7 +8556,8 @@ func (s *Secrets) TransitRewrap(ctx context.Context, name string, request schema // TransitRotateKey Rotate named encryption key // name: Name of the key -func (s *Secrets) TransitRotateKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitRotateKey(ctx context.Context, name string, transitMountPath string, request schema.TransitRotateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8695,12 +8569,12 @@ func (s *Secrets) TransitRotateKey(ctx context.Context, name string, options ... requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) @@ -8708,7 +8582,8 @@ func (s *Secrets) TransitRotateKey(ctx context.Context, name string, options ... // TransitSign Generate a signature for input data using the named key // name: The key to use -func (s *Secrets) TransitSign(ctx context.Context, name string, request schema.TransitSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitSign(ctx context.Context, name string, transitMountPath string, request schema.TransitSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8734,7 +8609,8 @@ func (s *Secrets) TransitSign(ctx context.Context, name string, request schema.T // TransitSignWithAlgorithm Generate a signature for input data using the named key // name: The key to use // urlalgorithm: Hash algorithm to use (POST URL parameter) -func (s *Secrets) TransitSignWithAlgorithm(ctx context.Context, name string, urlalgorithm string, request schema.TransitSignWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitSignWithAlgorithm(ctx context.Context, name string, urlalgorithm string, transitMountPath string, request schema.TransitSignWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8760,7 +8636,8 @@ func (s *Secrets) TransitSignWithAlgorithm(ctx context.Context, name string, url // TransitTrimKey Trim key versions of a named key // name: Name of the key -func (s *Secrets) TransitTrimKey(ctx context.Context, name string, request schema.TransitTrimKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitTrimKey(ctx context.Context, name string, transitMountPath string, request schema.TransitTrimKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8785,7 +8662,8 @@ func (s *Secrets) TransitTrimKey(ctx context.Context, name string, request schem // TransitVerify Verify a signature or HMAC for input data created using the named key // name: The key to use -func (s *Secrets) TransitVerify(ctx context.Context, name string, request schema.TransitVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitVerify(ctx context.Context, name string, transitMountPath string, request schema.TransitVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8811,7 +8689,8 @@ func (s *Secrets) TransitVerify(ctx context.Context, name string, request schema // TransitVerifyWithAlgorithm Verify a signature or HMAC for input data created using the named key // name: The key to use // urlalgorithm: Hash algorithm to use (POST URL parameter) -func (s *Secrets) TransitVerifyWithAlgorithm(ctx context.Context, name string, urlalgorithm string, request schema.TransitVerifyWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// transitMountPath: Path that the backend was mounted at +func (s *Secrets) TransitVerifyWithAlgorithm(ctx context.Context, name string, urlalgorithm string, transitMountPath string, request schema.TransitVerifyWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8834,124 +8713,3 @@ func (s *Secrets) TransitVerifyWithAlgorithm(ctx context.Context, name string, u requestModifiers, ) } - -// TransitWriteCacheConfig Configures a new cache of the specified size -func (s *Secrets) TransitWriteCacheConfig(ctx context.Context, request schema.TransitWriteCacheConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{transit_mount_path}/cache-config" - requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// TransitWriteConfigKeys Configuration common across all keys -func (s *Secrets) TransitWriteConfigKeys(ctx context.Context, request schema.TransitWriteConfigKeysRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{transit_mount_path}/config/keys" - requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// TransitWriteKey Managed named encryption keys -// name: Name of the key -func (s *Secrets) TransitWriteKey(ctx context.Context, name string, request schema.TransitWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{transit_mount_path}/keys/{name}" - requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// TransitWriteKeyConfig Configure a named encryption key -// name: Name of the key -func (s *Secrets) TransitWriteKeyConfig(ctx context.Context, name string, request schema.TransitWriteKeyConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{transit_mount_path}/keys/{name}/config" - requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// TransitWriteRandomUrlbytes Generate random bytes -// urlbytes: The number of bytes to generate (POST URL parameter) -func (s *Secrets) TransitWriteRandomUrlbytes(ctx context.Context, urlbytes string, request schema.TransitWriteRandomUrlbytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/{transit_mount_path}/random/{urlbytes}" - requestPath = strings.Replace(requestPath, "{"+"transit_mount_path"+"}", url.PathEscape(requestModifiers.mountPathOr("transit")), -1) - requestPath = strings.Replace(requestPath, "{"+"urlbytes"+"}", url.PathEscape(urlbytes), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} diff --git a/api_system.go b/api_system.go index 73f84e81..ff838b56 100644 --- a/api_system.go +++ b/api_system.go @@ -19,9 +19,9 @@ type System struct { client *Client } -// CalculateAuditHash The hash of the given string via the given audit backend +// AuditingCalculateHash // path: The name of the backend. Cannot be delimited. Example: \"mysql\" -func (s *System) CalculateAuditHash(ctx context.Context, path string, request schema.CalculateAuditHashRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *System) AuditingCalculateHash(ctx context.Context, path string, request schema.AuditingCalculateHashRequest, options ...RequestOption) (*Response[schema.AuditingCalculateHashResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -32,7 +32,7 @@ func (s *System) CalculateAuditHash(ctx context.Context, path string, request sc requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.AuditingCalculateHashResponse]( ctx, s.client, http.MethodPost, @@ -43,9 +43,9 @@ func (s *System) CalculateAuditHash(ctx context.Context, path string, request sc ) } -// DeleteAuditDevice Disable the audit device at the given path. +// AuditingDisableDevice Disable the audit device at the given path. // path: The name of the backend. Cannot be delimited. Example: \"mysql\" -func (s *System) DeleteAuditDevice(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *System) AuditingDisableDevice(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -67,16 +67,15 @@ func (s *System) DeleteAuditDevice(ctx context.Context, path string, options ... ) } -// DeleteAuthMethod Disable the auth method at the given auth path -// path: The path to mount to. Cannot be delimited. Example: \"user\" -func (s *System) DeleteAuthMethod(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuditingDisableRequestHeader Disable auditing of the given request header. +func (s *System) AuditingDisableRequestHeader(ctx context.Context, header string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/auth/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/config/auditing/request-headers/{header}" + requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) requestQueryParameters := make(url.Values) @@ -91,8 +90,32 @@ func (s *System) DeleteAuthMethod(ctx context.Context, path string, options ...R ) } -// DeleteConfigAuditingRequestHeader Disable auditing of the given request header. -func (s *System) DeleteConfigAuditingRequestHeader(ctx context.Context, header string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuditingEnableDevice Enable a new audit device at the supplied path. +// path: The name of the backend. Cannot be delimited. Example: \"mysql\" +func (s *System) AuditingEnableDevice(ctx context.Context, path string, request schema.AuditingEnableDeviceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { + requestModifiers, err := requestOptionsToRequestModifiers(options) + if err != nil { + return nil, err + } + + requestPath := "/v1/sys/audit/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + + requestQueryParameters := make(url.Values) + + return sendStructuredRequestParseResponse[map[string]interface{}]( + ctx, + s.client, + http.MethodPost, + requestPath, + request, + requestQueryParameters, + requestModifiers, + ) +} + +// AuditingEnableRequestHeader Enable auditing of a header. +func (s *System) AuditingEnableRequestHeader(ctx context.Context, header string, request schema.AuditingEnableRequestHeaderRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -103,32 +126,32 @@ func (s *System) DeleteConfigAuditingRequestHeader(ctx context.Context, header s requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// DeleteConfigCORS Remove any CORS settings. -func (s *System) DeleteConfigCORS(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuditingListEnabledDevices List the enabled audit devices. +func (s *System) AuditingListEnabledDevices(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/cors" + requestPath := "/v1/sys/audit" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -136,23 +159,21 @@ func (s *System) DeleteConfigCORS(ctx context.Context, options ...RequestOption) ) } -// DeleteConfigUIHeader Remove a UI header. -// header: The name of the header. -func (s *System) DeleteConfigUIHeader(ctx context.Context, header string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuditingListRequestHeaders List the request headers that are configured to be audited. +func (s *System) AuditingListRequestHeaders(ctx context.Context, options ...RequestOption) (*Response[schema.AuditingListRequestHeadersResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/ui/headers/{header}" - requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) + requestPath := "/v1/sys/config/auditing/request-headers" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AuditingListRequestHeadersResponse]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -160,21 +181,22 @@ func (s *System) DeleteConfigUIHeader(ctx context.Context, header string, option ) } -// DeleteGenerateRoot Cancels any in-progress root generation attempt. -func (s *System) DeleteGenerateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuditingReadRequestHeaderInformation List the information for the given request header. +func (s *System) AuditingReadRequestHeaderInformation(ctx context.Context, header string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/generate-root" + requestPath := "/v1/sys/config/auditing/request-headers/{header}" + requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -182,14 +204,16 @@ func (s *System) DeleteGenerateRoot(ctx context.Context, options ...RequestOptio ) } -// DeleteGenerateRootAttempt Cancels any in-progress root generation attempt. -func (s *System) DeleteGenerateRootAttempt(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuthDisableMethod Disable the auth method at the given auth path +// path: The path to mount to. Cannot be delimited. Example: \"user\" +func (s *System) AuthDisableMethod(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/generate-root/attempt" + requestPath := "/v1/sys/auth/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) @@ -204,45 +228,46 @@ func (s *System) DeleteGenerateRootAttempt(ctx context.Context, options ...Reque ) } -// DeleteLogger Revert a single logger to use log level provided in config. -// name: The name of the logger to be modified. -func (s *System) DeleteLogger(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuthEnableMethod Enables a new auth method. +// After enabling, the auth method can be accessed and configured via the auth path specified as part of the URL. This auth path will be nested under the auth prefix. For example, enable the \"foo\" auth method will make it accessible at /auth/foo. +// path: The path to mount to. Cannot be delimited. Example: \"user\" +func (s *System) AuthEnableMethod(ctx context.Context, path string, request schema.AuthEnableMethodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/loggers/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/auth/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// DeleteLoggers Revert the all loggers to use log level provided in config. -func (s *System) DeleteLoggers(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuthListEnabledMethods +func (s *System) AuthListEnabledMethods(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/loggers" + requestPath := "/v1/sys/auth" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -250,23 +275,23 @@ func (s *System) DeleteLoggers(ctx context.Context, options ...RequestOption) (* ) } -// DeleteMount Disable the mount point specified at the given path. -// path: The path to mount to. Example: \"aws/east\" -func (s *System) DeleteMount(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuthReadConfiguration Read the configuration of the auth engine at the given path. +// path: The path to mount to. Cannot be delimited. Example: \"user\" +func (s *System) AuthReadConfiguration(ctx context.Context, path string, options ...RequestOption) (*Response[schema.AuthReadConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/mounts/{path}" + requestPath := "/v1/sys/auth/{path}" requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AuthReadConfigurationResponse]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -274,25 +299,24 @@ func (s *System) DeleteMount(ctx context.Context, path string, options ...Reques ) } -// DeletePluginsCatalogByTypeByName Remove the plugin with the given name. -// name: The name of the plugin -// type_: The type of the plugin, may be auth, secret, or database -func (s *System) DeletePluginsCatalogByTypeByName(ctx context.Context, name string, type_ string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuthReadTuningInformation Reads the given auth path's configuration. +// This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`. +// path: Tune the configuration parameters for an auth path. +func (s *System) AuthReadTuningInformation(ctx context.Context, path string, options ...RequestOption) (*Response[schema.AuthReadTuningInformationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog/{type}/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) + requestPath := "/v1/sys/auth/{path}/tune" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.AuthReadTuningInformationResponse]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -300,47 +324,47 @@ func (s *System) DeletePluginsCatalogByTypeByName(ctx context.Context, name stri ) } -// DeletePoliciesACL Delete the ACL policy with the given name. -// name: The name of the policy. Example: \"ops\" -func (s *System) DeletePoliciesACL(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// AuthTuneConfigurationParameters Tune configuration parameters for a given auth path. +// This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`. +// path: Tune the configuration parameters for an auth path. +func (s *System) AuthTuneConfigurationParameters(ctx context.Context, path string, request schema.AuthTuneConfigurationParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/acl/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/auth/{path}/tune" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// DeletePoliciesPassword Delete a password policy. -// name: The name of the password policy. -func (s *System) DeletePoliciesPassword(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CollectHostInformation Information about the host instance that this Vault server is running on. +// Information about the host instance that this Vault server is running on. The information that gets collected includes host hardware information, and CPU, disk, and memory utilization +func (s *System) CollectHostInformation(ctx context.Context, options ...RequestOption) (*Response[schema.CollectHostInformationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/password/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/host-info" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.CollectHostInformationResponse]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -348,23 +372,22 @@ func (s *System) DeletePoliciesPassword(ctx context.Context, name string, option ) } -// DeletePolicy Delete the policy with the given name. -// name: The name of the policy. Example: \"ops\" -func (s *System) DeletePolicy(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CollectInFlightRequestInformation reports in-flight requests +// This path responds to the following HTTP methods. GET / Returns a map of in-flight requests. +func (s *System) CollectInFlightRequestInformation(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policy/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/in-flight-req" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -372,38 +395,36 @@ func (s *System) DeletePolicy(ctx context.Context, name string, options ...Reque ) } -// DeleteQuotasRateLimit -// name: Name of the quota rule. -func (s *System) DeleteQuotasRateLimit(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CorsConfigure Configure the CORS settings. +func (s *System) CorsConfigure(ctx context.Context, request schema.CorsConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/quotas/rate-limit/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/config/cors" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// DeleteRaw Delete the key with given path. -func (s *System) DeleteRaw(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CorsDeleteConfiguration Remove any CORS settings. +func (s *System) CorsDeleteConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/raw" + requestPath := "/v1/sys/config/cors" requestQueryParameters := make(url.Values) @@ -418,22 +439,21 @@ func (s *System) DeleteRaw(ctx context.Context, options ...RequestOption) (*Resp ) } -// DeleteRawPath Delete the key with given path. -func (s *System) DeleteRawPath(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// CorsReadConfiguration Return the current CORS settings. +func (s *System) CorsReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.CorsReadConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/raw/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/config/cors" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.CorsReadConfigurationResponse]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -441,44 +461,43 @@ func (s *System) DeleteRawPath(ctx context.Context, path string, options ...Requ ) } -// DeleteRekeyBackup Delete the backup copy of PGP-encrypted unseal keys. -func (s *System) DeleteRekeyBackup(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EncryptionKeyConfigureRotation +func (s *System) EncryptionKeyConfigureRotation(ctx context.Context, request schema.EncryptionKeyConfigureRotationRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/backup" + requestPath := "/v1/sys/rotate/config" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// DeleteRekeyInit Cancels any in-progress rekey. -// This clears the rekey settings as well as any progress made. This must be called to change the parameters of the rekey. Note: verification is still a part of a rekey. If rekeying is canceled during the verification flow, the current unseal keys remain valid. -func (s *System) DeleteRekeyInit(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EncryptionKeyReadRotationConfiguration +func (s *System) EncryptionKeyReadRotationConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.EncryptionKeyReadRotationConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/init" + requestPath := "/v1/sys/rotate/config" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.EncryptionKeyReadRotationConfigurationResponse]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -486,21 +505,21 @@ func (s *System) DeleteRekeyInit(ctx context.Context, options ...RequestOption) ) } -// DeleteRekeyRecoveryKeyBackup Allows fetching or deleting the backup of the rotated unseal keys. -func (s *System) DeleteRekeyRecoveryKeyBackup(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EncryptionKeyRotate +func (s *System) EncryptionKeyRotate(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/recovery-key-backup" + requestPath := "/v1/sys/rotate" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -508,22 +527,21 @@ func (s *System) DeleteRekeyRecoveryKeyBackup(ctx context.Context, options ...Re ) } -// DeleteRekeyVerify Cancel any in-progress rekey verification operation. -// This clears any progress made and resets the nonce. Unlike a `DELETE` against `sys/rekey/init`, this only resets the current verification operation, not the entire rekey atttempt. -func (s *System) DeleteRekeyVerify(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// EncryptionKeyStatus Provides information about the backend encryption key. +func (s *System) EncryptionKeyStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/verify" + requestPath := "/v1/sys/key-status" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -531,161 +549,160 @@ func (s *System) DeleteRekeyVerify(ctx context.Context, options ...RequestOption ) } -// ListConfigUIHeaders Return a list of configured UI headers. -func (s *System) ListConfigUIHeaders(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GenerateHash +func (s *System) GenerateHash(ctx context.Context, request schema.GenerateHashRequest, options ...RequestOption) (*Response[schema.GenerateHashResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/ui/headers/" + requestPath := "/v1/sys/tools/hash" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.GenerateHashResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ListLeasesLookupPrefix Returns a list of lease ids. -// prefix: The path to list leases under. Example: \"aws/creds/deploy\" -func (s *System) ListLeasesLookupPrefix(ctx context.Context, prefix string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GenerateHashWithAlgorithm +// urlalgorithm: Algorithm to use (POST URL parameter) +func (s *System) GenerateHashWithAlgorithm(ctx context.Context, urlalgorithm string, request schema.GenerateHashWithAlgorithmRequest, options ...RequestOption) (*Response[schema.GenerateHashWithAlgorithmResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/lookup/{prefix}" - requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) + requestPath := "/v1/sys/tools/hash/{urlalgorithm}" + requestPath = strings.Replace(requestPath, "{"+"urlalgorithm"+"}", url.PathEscape(urlalgorithm), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.GenerateHashWithAlgorithmResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ListPluginsCatalogByType List the plugins in the catalog. -// type_: The type of the plugin, may be auth, secret, or database -func (s *System) ListPluginsCatalogByType(ctx context.Context, type_ string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GenerateRandom +func (s *System) GenerateRandom(ctx context.Context, request schema.GenerateRandomRequest, options ...RequestOption) (*Response[schema.GenerateRandomResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog/{type}" - requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) + requestPath := "/v1/sys/tools/random" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.GenerateRandomResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ListPoliciesACL List the configured access control policies. -func (s *System) ListPoliciesACL(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GenerateRandomWithBytes +// urlbytes: The number of bytes to generate (POST URL parameter) +func (s *System) GenerateRandomWithBytes(ctx context.Context, urlbytes string, request schema.GenerateRandomWithBytesRequest, options ...RequestOption) (*Response[schema.GenerateRandomWithBytesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/acl" + requestPath := "/v1/sys/tools/random/{urlbytes}" + requestPath = strings.Replace(requestPath, "{"+"urlbytes"+"}", url.PathEscape(urlbytes), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.GenerateRandomWithBytesResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ListPoliciesPassword List the existing password policies. -func (s *System) ListPoliciesPassword(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GenerateRandomWithSource +// source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". +func (s *System) GenerateRandomWithSource(ctx context.Context, source string, request schema.GenerateRandomWithSourceRequest, options ...RequestOption) (*Response[schema.GenerateRandomWithSourceResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/password" + requestPath := "/v1/sys/tools/random/{source}" + requestPath = strings.Replace(requestPath, "{"+"source"+"}", url.PathEscape(source), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.GenerateRandomWithSourceResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ListQuotasRateLimits -func (s *System) ListQuotasRateLimits(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// GenerateRandomWithSourceAndBytes +// source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". +// urlbytes: The number of bytes to generate (POST URL parameter) +func (s *System) GenerateRandomWithSourceAndBytes(ctx context.Context, source string, urlbytes string, request schema.GenerateRandomWithSourceAndBytesRequest, options ...RequestOption) (*Response[schema.GenerateRandomWithSourceAndBytesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/quotas/rate-limit" + requestPath := "/v1/sys/tools/random/{source}/{urlbytes}" + requestPath = strings.Replace(requestPath, "{"+"source"+"}", url.PathEscape(source), -1) + requestPath = strings.Replace(requestPath, "{"+"urlbytes"+"}", url.PathEscape(urlbytes), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.GenerateRandomWithSourceAndBytesResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ListVersionHistory Returns map of historical version change entries -func (s *System) ListVersionHistory(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// HaStatus Check the HA status of a Vault cluster +func (s *System) HaStatus(ctx context.Context, options ...RequestOption) (*Response[schema.HaStatusResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/version-history/" + requestPath := "/v1/sys/ha-status" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.HaStatusResponse]( ctx, s.client, http.MethodGet, @@ -696,14 +713,15 @@ func (s *System) ListVersionHistory(ctx context.Context, options ...RequestOptio ) } -// MFAValidate Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token -func (s *System) MFAValidate(ctx context.Context, request schema.MFAValidateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Initialize Initialize a new Vault. +// The Vault must not have been previously initialized. The recovery options, as well as the stored shares option, are only available when using Vault HSM. +func (s *System) Initialize(ctx context.Context, request schema.InitializeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/mfa/validate" + requestPath := "/v1/sys/init" requestQueryParameters := make(url.Values) @@ -718,41 +736,36 @@ func (s *System) MFAValidate(ctx context.Context, request schema.MFAValidateRequ ) } -// Monitor -// logFormat: Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". -// logLevel: Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". -func (s *System) Monitor(ctx context.Context, logFormat string, logLevel string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalClientActivityConfigure Enable or disable collection of client count, set retention period, or set default reporting period. +func (s *System) InternalClientActivityConfigure(ctx context.Context, request schema.InternalClientActivityConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/monitor" + requestPath := "/v1/sys/internal/counters/config" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("logFormat", url.QueryEscape(logFormat)) - requestQueryParameters.Set("logLevel", url.QueryEscape(logLevel)) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PprofRead Returns an HTML page listing the available profiles. -// Returns an HTML page listing the available profiles. This should be mainly accessed via browsers or applications that can render pages. -func (s *System) PprofRead(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalClientActivityExport Report the client count metrics, for this namespace and all child namespaces. +func (s *System) InternalClientActivityExport(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/" + requestPath := "/v1/sys/internal/counters/activity/export" requestQueryParameters := make(url.Values) @@ -767,15 +780,14 @@ func (s *System) PprofRead(ctx context.Context, options ...RequestOption) (*Resp ) } -// PprofReadAllocs Returns a sampling of all past memory allocations. -// Returns a sampling of all past memory allocations. -func (s *System) PprofReadAllocs(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalClientActivityReadConfiguration Read the client count tracking configuration. +func (s *System) InternalClientActivityReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/allocs" + requestPath := "/v1/sys/internal/counters/config" requestQueryParameters := make(url.Values) @@ -790,15 +802,14 @@ func (s *System) PprofReadAllocs(ctx context.Context, options ...RequestOption) ) } -// PprofReadBlock Returns stack traces that led to blocking on synchronization primitives -// Returns stack traces that led to blocking on synchronization primitives -func (s *System) PprofReadBlock(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalClientActivityReportCounts Report the client count metrics, for this namespace and all child namespaces. +func (s *System) InternalClientActivityReportCounts(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/block" + requestPath := "/v1/sys/internal/counters/activity" requestQueryParameters := make(url.Values) @@ -813,15 +824,14 @@ func (s *System) PprofReadBlock(ctx context.Context, options ...RequestOption) ( ) } -// PprofReadCmdline Returns the running program's command line. -// Returns the running program's command line, with arguments separated by NUL bytes. -func (s *System) PprofReadCmdline(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalClientActivityReportCountsThisMonth Report the number of clients for this month, for this namespace and all child namespaces. +func (s *System) InternalClientActivityReportCountsThisMonth(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/cmdline" + requestPath := "/v1/sys/internal/counters/activity/monthly" requestQueryParameters := make(url.Values) @@ -836,19 +846,18 @@ func (s *System) PprofReadCmdline(ctx context.Context, options ...RequestOption) ) } -// PprofReadGoroutine Returns stack traces of all current goroutines. -// Returns stack traces of all current goroutines. -func (s *System) PprofReadGoroutine(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalCountEntities Backwards compatibility is not guaranteed for this API +func (s *System) InternalCountEntities(ctx context.Context, options ...RequestOption) (*Response[schema.InternalCountEntitiesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/goroutine" + requestPath := "/v1/sys/internal/counters/entities" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.InternalCountEntitiesResponse]( ctx, s.client, http.MethodGet, @@ -859,15 +868,15 @@ func (s *System) PprofReadGoroutine(ctx context.Context, options ...RequestOptio ) } -// PprofReadHeap Returns a sampling of memory allocations of live object. -// Returns a sampling of memory allocations of live object. -func (s *System) PprofReadHeap(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Deprecated +// InternalCountRequests Backwards compatibility is not guaranteed for this API +func (s *System) InternalCountRequests(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/heap" + requestPath := "/v1/sys/internal/counters/requests" requestQueryParameters := make(url.Values) @@ -882,19 +891,18 @@ func (s *System) PprofReadHeap(ctx context.Context, options ...RequestOption) (* ) } -// PprofReadMutex Returns stack traces of holders of contended mutexes -// Returns stack traces of holders of contended mutexes -func (s *System) PprofReadMutex(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalCountTokens Backwards compatibility is not guaranteed for this API +func (s *System) InternalCountTokens(ctx context.Context, options ...RequestOption) (*Response[schema.InternalCountTokensResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/mutex" + requestPath := "/v1/sys/internal/counters/tokens" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.InternalCountTokensResponse]( ctx, s.client, http.MethodGet, @@ -905,17 +913,18 @@ func (s *System) PprofReadMutex(ctx context.Context, options ...RequestOption) ( ) } -// PprofReadProfile Returns a pprof-formatted cpu profile payload. -// Returns a pprof-formatted cpu profile payload. Profiling lasts for duration specified in seconds GET parameter, or for 30 seconds if not specified. -func (s *System) PprofReadProfile(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalGenerateOpenApiDocument +// genericMountPaths: Use generic mount paths +func (s *System) InternalGenerateOpenApiDocument(ctx context.Context, genericMountPaths bool, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/profile" + requestPath := "/v1/sys/internal/specs/openapi" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("genericMountPaths", url.QueryEscape(genericMountPaths)) return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -928,38 +937,40 @@ func (s *System) PprofReadProfile(ctx context.Context, options ...RequestOption) ) } -// PprofReadSymbol Returns the program counters listed in the request. -// Returns the program counters listed in the request. -func (s *System) PprofReadSymbol(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalGenerateOpenApiDocument2 +// genericMountPaths: Use generic mount paths +func (s *System) InternalGenerateOpenApiDocument2(ctx context.Context, request schema.InternalGenerateOpenApiDocument2Request, genericMountPaths bool, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/symbol" + requestPath := "/v1/sys/internal/specs/openapi" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("genericMountPaths", url.QueryEscape(genericMountPaths)) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// PprofReadThreadcreate Returns stack traces that led to the creation of new OS threads -// Returns stack traces that led to the creation of new OS threads -func (s *System) PprofReadThreadcreate(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalInspectRouter Expose the route entry and mount entry tables present in the router +// tag: Name of subtree being observed +func (s *System) InternalInspectRouter(ctx context.Context, tag string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/threadcreate" + requestPath := "/v1/sys/internal/inspect/router/{tag}" + requestPath = strings.Replace(requestPath, "{"+"tag"+"}", url.PathEscape(tag), -1) requestQueryParameters := make(url.Values) @@ -974,19 +985,18 @@ func (s *System) PprofReadThreadcreate(ctx context.Context, options ...RequestOp ) } -// PprofReadTrace Returns the execution trace in binary form. -// Returns the execution trace in binary form. Tracing lasts for duration specified in seconds GET parameter, or for 1 second if not specified. -func (s *System) PprofReadTrace(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalUiListEnabledFeatureFlags Lists enabled feature flags. +func (s *System) InternalUiListEnabledFeatureFlags(ctx context.Context, options ...RequestOption) (*Response[schema.InternalUiListEnabledFeatureFlagsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/pprof/trace" + requestPath := "/v1/sys/internal/ui/feature-flags" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.InternalUiListEnabledFeatureFlagsResponse]( ctx, s.client, http.MethodGet, @@ -997,18 +1007,18 @@ func (s *System) PprofReadTrace(ctx context.Context, options ...RequestOption) ( ) } -// ReadAuditDevices List the enabled audit devices. -func (s *System) ReadAuditDevices(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalUiListEnabledVisibleMounts Lists all enabled and visible auth and secrets mounts. +func (s *System) InternalUiListEnabledVisibleMounts(ctx context.Context, options ...RequestOption) (*Response[schema.InternalUiListEnabledVisibleMountsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/audit" + requestPath := "/v1/sys/internal/ui/mounts" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.InternalUiListEnabledVisibleMountsResponse]( ctx, s.client, http.MethodGet, @@ -1019,20 +1029,18 @@ func (s *System) ReadAuditDevices(ctx context.Context, options ...RequestOption) ) } -// ReadAuthMethod Read the configuration of the auth engine at the given path. -// path: The path to mount to. Cannot be delimited. Example: \"user\" -func (s *System) ReadAuthMethod(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalUiListNamespaces Backwards compatibility is not guaranteed for this API +func (s *System) InternalUiListNamespaces(ctx context.Context, options ...RequestOption) (*Response[schema.InternalUiListNamespacesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/auth/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/internal/ui/namespaces" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.InternalUiListNamespacesResponse]( ctx, s.client, http.MethodGet, @@ -1043,21 +1051,20 @@ func (s *System) ReadAuthMethod(ctx context.Context, path string, options ...Req ) } -// ReadAuthMethodTune Reads the given auth path's configuration. -// This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`. -// path: Tune the configuration parameters for an auth path. -func (s *System) ReadAuthMethodTune(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalUiReadMountInformation Return information about the given mount. +// path: The path of the mount. +func (s *System) InternalUiReadMountInformation(ctx context.Context, path string, options ...RequestOption) (*Response[schema.InternalUiReadMountInformationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/auth/{path}/tune" + requestPath := "/v1/sys/internal/ui/mounts/{path}" requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.InternalUiReadMountInformationResponse]( ctx, s.client, http.MethodGet, @@ -1068,18 +1075,18 @@ func (s *System) ReadAuthMethodTune(ctx context.Context, path string, options .. ) } -// ReadAuthMethods List the currently enabled credential backends. -func (s *System) ReadAuthMethods(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// InternalUiReadResultantAcl Backwards compatibility is not guaranteed for this API +func (s *System) InternalUiReadResultantAcl(ctx context.Context, options ...RequestOption) (*Response[schema.InternalUiReadResultantAclResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/auth" + requestPath := "/v1/sys/internal/ui/resultant-acl" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.InternalUiReadResultantAclResponse]( ctx, s.client, http.MethodGet, @@ -1090,19 +1097,18 @@ func (s *System) ReadAuthMethods(ctx context.Context, options ...RequestOption) ) } -// ReadConfigAuditingRequestHeader List the information for the given request header. -func (s *System) ReadConfigAuditingRequestHeader(ctx context.Context, header string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeaderStatus Returns the high availability status and current leader instance of Vault. +func (s *System) LeaderStatus(ctx context.Context, options ...RequestOption) (*Response[schema.LeaderStatusResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/auditing/request-headers/{header}" - requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) + requestPath := "/v1/sys/leader" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.LeaderStatusResponse]( ctx, s.client, http.MethodGet, @@ -1113,18 +1119,18 @@ func (s *System) ReadConfigAuditingRequestHeader(ctx context.Context, header str ) } -// ReadConfigAuditingRequestHeaders List the request headers that are configured to be audited. -func (s *System) ReadConfigAuditingRequestHeaders(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesCount +func (s *System) LeasesCount(ctx context.Context, options ...RequestOption) (*Response[schema.LeasesCountResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/auditing/request-headers" + requestPath := "/v1/sys/leases/count" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.LeasesCountResponse]( ctx, s.client, http.MethodGet, @@ -1135,21 +1141,24 @@ func (s *System) ReadConfigAuditingRequestHeaders(ctx context.Context, options . ) } -// ReadConfigCORS Return the current CORS settings. -func (s *System) ReadConfigCORS(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesForceRevokeLeaseWithPrefix Revokes all secrets or tokens generated under a given prefix immediately +// Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation. By ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled. +// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" +func (s *System) LeasesForceRevokeLeaseWithPrefix(ctx context.Context, prefix string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/cors" + requestPath := "/v1/sys/leases/revoke-force/{prefix}" + requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1157,22 +1166,24 @@ func (s *System) ReadConfigCORS(ctx context.Context, options ...RequestOption) ( ) } -// ReadConfigStateSanitized Return a sanitized version of the Vault server configuration. -// The sanitized output strips configuration values in the storage, HA storage, and seals stanzas, which may contain sensitive values such as API tokens. It also removes any token or secret fields in other stanzas, such as the circonus_api_token from telemetry. -func (s *System) ReadConfigStateSanitized(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesForceRevokeLeaseWithPrefix2 Revokes all secrets or tokens generated under a given prefix immediately +// Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation. By ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled. +// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" +func (s *System) LeasesForceRevokeLeaseWithPrefix2(ctx context.Context, prefix string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/state/sanitized" + requestPath := "/v1/sys/revoke-force/{prefix}" + requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1180,20 +1191,18 @@ func (s *System) ReadConfigStateSanitized(ctx context.Context, options ...Reques ) } -// ReadConfigUIHeader Return the given UI header's configuration -// header: The name of the header. -func (s *System) ReadConfigUIHeader(ctx context.Context, header string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesList +func (s *System) LeasesList(ctx context.Context, options ...RequestOption) (*Response[schema.LeasesListResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/ui/headers/{header}" - requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) + requestPath := "/v1/sys/leases" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.LeasesListResponse]( ctx, s.client, http.MethodGet, @@ -1204,18 +1213,19 @@ func (s *System) ReadConfigUIHeader(ctx context.Context, header string, options ) } -// ReadGenerateRoot Read the configuration and progress of the current root generation attempt. -func (s *System) ReadGenerateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesLookUp +func (s *System) LeasesLookUp(ctx context.Context, options ...RequestOption) (*Response[schema.LeasesLookUpResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/generate-root" + requestPath := "/v1/sys/leases/lookup/" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.LeasesLookUpResponse]( ctx, s.client, http.MethodGet, @@ -1226,18 +1236,21 @@ func (s *System) ReadGenerateRoot(ctx context.Context, options ...RequestOption) ) } -// ReadGenerateRootAttempt Read the configuration and progress of the current root generation attempt. -func (s *System) ReadGenerateRootAttempt(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesLookUpWithPrefix +// prefix: The path to list leases under. Example: \"aws/creds/deploy\" +func (s *System) LeasesLookUpWithPrefix(ctx context.Context, prefix string, options ...RequestOption) (*Response[schema.LeasesLookUpWithPrefixResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/generate-root/attempt" + requestPath := "/v1/sys/leases/lookup/{prefix}" + requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.LeasesLookUpWithPrefixResponse]( ctx, s.client, http.MethodGet, @@ -1248,265 +1261,275 @@ func (s *System) ReadGenerateRootAttempt(ctx context.Context, options ...Request ) } -// ReadHAStatus Check the HA status of a Vault cluster -func (s *System) ReadHAStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesReadLease +func (s *System) LeasesReadLease(ctx context.Context, request schema.LeasesReadLeaseRequest, options ...RequestOption) (*Response[schema.LeasesReadLeaseResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/ha-status" + requestPath := "/v1/sys/leases/lookup" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.LeasesReadLeaseResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadHealth Returns the health status of Vault. -func (s *System) ReadHealth(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRenewLease Renews a lease, requesting to extend the lease. +func (s *System) LeasesRenewLease(ctx context.Context, request schema.LeasesRenewLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/health" + requestPath := "/v1/sys/leases/renew" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadHostInfo Information about the host instance that this Vault server is running on. -// Information about the host instance that this Vault server is running on. The information that gets collected includes host hardware information, and CPU, disk, and memory utilization -func (s *System) ReadHostInfo(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRenewLease2 Renews a lease, requesting to extend the lease. +func (s *System) LeasesRenewLease2(ctx context.Context, request schema.LeasesRenewLease2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/host-info" + requestPath := "/v1/sys/renew" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInFlightRequests reports in-flight requests -// This path responds to the following HTTP methods. GET / Returns a map of in-flight requests. -func (s *System) ReadInFlightRequests(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRenewLeaseWithId Renews a lease, requesting to extend the lease. +// urlLeaseId: The lease identifier to renew. This is included with a lease. +func (s *System) LeasesRenewLeaseWithId(ctx context.Context, urlLeaseId string, request schema.LeasesRenewLeaseWithIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/in-flight-req" + requestPath := "/v1/sys/leases/renew/{url_lease_id}" + requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInit Returns the initialization status of Vault. -func (s *System) ReadInit(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRenewLeaseWithId2 Renews a lease, requesting to extend the lease. +// urlLeaseId: The lease identifier to renew. This is included with a lease. +func (s *System) LeasesRenewLeaseWithId2(ctx context.Context, urlLeaseId string, request schema.LeasesRenewLeaseWithId2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/init" + requestPath := "/v1/sys/renew/{url_lease_id}" + requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInternalCountersActivity Report the client count metrics, for this namespace and all child namespaces. -func (s *System) ReadInternalCountersActivity(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRevokeLease Revokes a lease immediately. +func (s *System) LeasesRevokeLease(ctx context.Context, request schema.LeasesRevokeLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/activity" + requestPath := "/v1/sys/leases/revoke" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInternalCountersActivityExport Report the client count metrics, for this namespace and all child namespaces. -func (s *System) ReadInternalCountersActivityExport(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRevokeLease2 Revokes a lease immediately. +func (s *System) LeasesRevokeLease2(ctx context.Context, request schema.LeasesRevokeLease2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/activity/export" + requestPath := "/v1/sys/revoke" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInternalCountersActivityMonthly Report the number of clients for this month, for this namespace and all child namespaces. -func (s *System) ReadInternalCountersActivityMonthly(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRevokeLeaseWithId Revokes a lease immediately. +// urlLeaseId: The lease identifier to renew. This is included with a lease. +func (s *System) LeasesRevokeLeaseWithId(ctx context.Context, urlLeaseId string, request schema.LeasesRevokeLeaseWithIdRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/activity/monthly" + requestPath := "/v1/sys/leases/revoke/{url_lease_id}" + requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInternalCountersConfig Read the client count tracking configuration. -func (s *System) ReadInternalCountersConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRevokeLeaseWithId2 Revokes a lease immediately. +// urlLeaseId: The lease identifier to renew. This is included with a lease. +func (s *System) LeasesRevokeLeaseWithId2(ctx context.Context, urlLeaseId string, request schema.LeasesRevokeLeaseWithId2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/config" + requestPath := "/v1/sys/revoke/{url_lease_id}" + requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInternalCountersEntities Backwards compatibility is not guaranteed for this API -func (s *System) ReadInternalCountersEntities(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRevokeLeaseWithPrefix Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. +// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" +func (s *System) LeasesRevokeLeaseWithPrefix(ctx context.Context, prefix string, request schema.LeasesRevokeLeaseWithPrefixRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/entities" + requestPath := "/v1/sys/leases/revoke-prefix/{prefix}" + requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInternalCountersRequests Backwards compatibility is not guaranteed for this API -func (s *System) ReadInternalCountersRequests(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesRevokeLeaseWithPrefix2 Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. +// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" +func (s *System) LeasesRevokeLeaseWithPrefix2(ctx context.Context, prefix string, request schema.LeasesRevokeLeaseWithPrefix2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/requests" + requestPath := "/v1/sys/revoke-prefix/{prefix}" + requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadInternalCountersTokens Backwards compatibility is not guaranteed for this API -func (s *System) ReadInternalCountersTokens(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LeasesTidy +func (s *System) LeasesTidy(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/tokens" + requestPath := "/v1/sys/leases/tidy" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1514,16 +1537,14 @@ func (s *System) ReadInternalCountersTokens(ctx context.Context, options ...Requ ) } -// ReadInternalInspectRouter Expose the route entry and mount entry tables present in the router -// tag: Name of subtree being observed -func (s *System) ReadInternalInspectRouter(ctx context.Context, tag string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ListExperimentalFeatures Returns the available and enabled experiments +func (s *System) ListExperimentalFeatures(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/inspect/router/{tag}" - requestPath = strings.Replace(requestPath, "{"+"tag"+"}", url.PathEscape(tag), -1) + requestPath := "/v1/sys/experiments" requestQueryParameters := make(url.Values) @@ -1538,14 +1559,14 @@ func (s *System) ReadInternalInspectRouter(ctx context.Context, tag string, opti ) } -// ReadInternalSpecsOpenAPI Generate an OpenAPI 3 document of all mounted paths. -func (s *System) ReadInternalSpecsOpenAPI(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LockedUsersList Report the locked user count metrics, for this namespace and all child namespaces. +func (s *System) LockedUsersList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/specs/openapi" + requestPath := "/v1/sys/locked-users" requestQueryParameters := make(url.Values) @@ -1560,21 +1581,25 @@ func (s *System) ReadInternalSpecsOpenAPI(ctx context.Context, options ...Reques ) } -// ReadInternalUIFeatureFlags Lists enabled feature flags. -func (s *System) ReadInternalUIFeatureFlags(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LockedUsersUnlock Unlocks the user with given mount_accessor and alias_identifier +// aliasIdentifier: It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID +// mountAccessor: MountAccessor is the identifier of the mount entry to which the user belongs +func (s *System) LockedUsersUnlock(ctx context.Context, aliasIdentifier string, mountAccessor string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/ui/feature-flags" + requestPath := "/v1/sys/locked-users/{mount_accessor}/unlock/{alias_identifier}" + requestPath = strings.Replace(requestPath, "{"+"alias_identifier"+"}", url.PathEscape(aliasIdentifier), -1) + requestPath = strings.Replace(requestPath, "{"+"mount_accessor"+"}", url.PathEscape(mountAccessor), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, nil, // request body requestQueryParameters, @@ -1582,16 +1607,14 @@ func (s *System) ReadInternalUIFeatureFlags(ctx context.Context, options ...Requ ) } -// ReadInternalUIMount Return information about the given mount. -// path: The path of the mount. -func (s *System) ReadInternalUIMount(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LoggersReadVerbosityLevel Read the log level for all existing loggers. +func (s *System) LoggersReadVerbosityLevel(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/ui/mounts/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/loggers" requestQueryParameters := make(url.Values) @@ -1606,14 +1629,16 @@ func (s *System) ReadInternalUIMount(ctx context.Context, path string, options . ) } -// ReadInternalUIMounts Lists all enabled and visible auth and secrets mounts. -func (s *System) ReadInternalUIMounts(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LoggersReadVerbosityLevelFor Read the log level for a single logger. +// name: The name of the logger to be modified. +func (s *System) LoggersReadVerbosityLevelFor(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/ui/mounts" + requestPath := "/v1/sys/loggers/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -1628,21 +1653,21 @@ func (s *System) ReadInternalUIMounts(ctx context.Context, options ...RequestOpt ) } -// ReadInternalUINamespaces Backwards compatibility is not guaranteed for this API -func (s *System) ReadInternalUINamespaces(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LoggersRevertVerbosityLevel Revert the all loggers to use log level provided in config. +func (s *System) LoggersRevertVerbosityLevel(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/ui/namespaces" + requestPath := "/v1/sys/loggers" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1650,21 +1675,23 @@ func (s *System) ReadInternalUINamespaces(ctx context.Context, options ...Reques ) } -// ReadInternalUIResultantACL Backwards compatibility is not guaranteed for this API -func (s *System) ReadInternalUIResultantACL(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LoggersRevertVerbosityLevelFor Revert a single logger to use log level provided in config. +// name: The name of the logger to be modified. +func (s *System) LoggersRevertVerbosityLevelFor(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/ui/resultant-acl" + requestPath := "/v1/sys/loggers/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1672,60 +1699,64 @@ func (s *System) ReadInternalUIResultantACL(ctx context.Context, options ...Requ ) } -// ReadKeyStatus Provides information about the backend encryption key. -func (s *System) ReadKeyStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LoggersUpdateVerbosityLevel Modify the log level for all existing loggers. +func (s *System) LoggersUpdateVerbosityLevel(ctx context.Context, request schema.LoggersUpdateVerbosityLevelRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/key-status" + requestPath := "/v1/sys/loggers" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadLeader Returns the high availability status and current leader instance of Vault. -func (s *System) ReadLeader(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// LoggersUpdateVerbosityLevelFor Modify the log level of a single logger. +// name: The name of the logger to be modified. +func (s *System) LoggersUpdateVerbosityLevelFor(ctx context.Context, name string, request schema.LoggersUpdateVerbosityLevelForRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leader" + requestPath := "/v1/sys/loggers/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadLeases List leases associated with this Vault cluster -func (s *System) ReadLeases(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Metrics +// format: Format to export metrics into. Currently accepts only \"prometheus\". +func (s *System) Metrics(ctx context.Context, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases" + requestPath := "/v1/sys/metrics" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("format", url.QueryEscape(format)) return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1738,40 +1769,42 @@ func (s *System) ReadLeases(ctx context.Context, options ...RequestOption) (*Res ) } -// ReadLeasesCount Count of leases associated with this Vault cluster -func (s *System) ReadLeasesCount(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MfaValidate Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token +func (s *System) MfaValidate(ctx context.Context, request schema.MfaValidateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/count" + requestPath := "/v1/sys/mfa/validate" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadLogger Read the log level for a single logger. -// name: The name of the logger to be modified. -func (s *System) ReadLogger(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Monitor +// logFormat: Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". +// logLevel: Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". +func (s *System) Monitor(ctx context.Context, logFormat string, logLevel string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/loggers/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/monitor" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("logFormat", url.QueryEscape(logFormat)) + requestQueryParameters.Set("logLevel", url.QueryEscape(logLevel)) return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -1784,21 +1817,23 @@ func (s *System) ReadLogger(ctx context.Context, name string, options ...Request ) } -// ReadLoggers Read the log level for all existing loggers. -func (s *System) ReadLoggers(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MountsDisableSecretsEngine Disable the mount point specified at the given path. +// path: The path to mount to. Example: \"aws/east\" +func (s *System) MountsDisableSecretsEngine(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/loggers" + requestPath := "/v1/sys/mounts/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -1806,40 +1841,38 @@ func (s *System) ReadLoggers(ctx context.Context, options ...RequestOption) (*Re ) } -// ReadMetrics Export the metrics aggregated for telemetry purpose. -// format: Format to export metrics into. Currently accepts only \"prometheus\". -func (s *System) ReadMetrics(ctx context.Context, format string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MountsEnableSecretsEngine Enable a new secrets engine at the given path. +// path: The path to mount to. Example: \"aws/east\" +func (s *System) MountsEnableSecretsEngine(ctx context.Context, path string, request schema.MountsEnableSecretsEngineRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/metrics" + requestPath := "/v1/sys/mounts/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("format", url.QueryEscape(format)) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadMount Read the configuration of the secret engine at the given path. -// path: The path to mount to. Example: \"aws/east\" -func (s *System) ReadMount(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MountsListSecretsEngines +func (s *System) MountsListSecretsEngines(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/mounts/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/mounts" requestQueryParameters := make(url.Values) @@ -1854,18 +1887,20 @@ func (s *System) ReadMount(ctx context.Context, path string, options ...RequestO ) } -// ReadMounts List the currently mounted backends. -func (s *System) ReadMounts(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MountsReadConfiguration Read the configuration of the secret engine at the given path. +// path: The path to mount to. Example: \"aws/east\" +func (s *System) MountsReadConfiguration(ctx context.Context, path string, options ...RequestOption) (*Response[schema.MountsReadConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/mounts" + requestPath := "/v1/sys/mounts/{path}" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.MountsReadConfigurationResponse]( ctx, s.client, http.MethodGet, @@ -1876,9 +1911,9 @@ func (s *System) ReadMounts(ctx context.Context, options ...RequestOption) (*Res ) } -// ReadMountsConfig Tune backend configuration parameters for this mount. +// MountsReadTuningInformation // path: The path to mount to. Example: \"aws/east\" -func (s *System) ReadMountsConfig(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *System) MountsReadTuningInformation(ctx context.Context, path string, options ...RequestOption) (*Response[schema.MountsReadTuningInformationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1889,7 +1924,7 @@ func (s *System) ReadMountsConfig(ctx context.Context, path string, options ...R requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.MountsReadTuningInformationResponse]( ctx, s.client, http.MethodGet, @@ -1900,44 +1935,42 @@ func (s *System) ReadMountsConfig(ctx context.Context, path string, options ...R ) } -// ReadPluginsCatalog Lists all the plugins known to Vault -func (s *System) ReadPluginsCatalog(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// MountsTuneConfigurationParameters +// path: The path to mount to. Example: \"aws/east\" +func (s *System) MountsTuneConfigurationParameters(ctx context.Context, path string, request schema.MountsTuneConfigurationParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog" + requestPath := "/v1/sys/mounts/{path}/tune" + requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadPluginsCatalogByTypeByName Return the configuration data for the plugin with the given name. -// name: The name of the plugin -// type_: The type of the plugin, may be auth, secret, or database -func (s *System) ReadPluginsCatalogByTypeByName(ctx context.Context, name string, type_ string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogListPlugins +func (s *System) PluginsCatalogListPlugins(ctx context.Context, options ...RequestOption) (*Response[schema.PluginsCatalogListPluginsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog/{type}/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) + requestPath := "/v1/sys/plugins/catalog" requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PluginsCatalogListPluginsResponse]( ctx, s.client, http.MethodGet, @@ -1948,19 +1981,21 @@ func (s *System) ReadPluginsCatalogByTypeByName(ctx context.Context, name string ) } -// ReadPolicies List the configured access control policies. -func (s *System) ReadPolicies(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogListPluginsWithType List the plugins in the catalog. +// type_: The type of the plugin, may be auth, secret, or database +func (s *System) PluginsCatalogListPluginsWithType(ctx context.Context, type_ string, options ...RequestOption) (*Response[schema.PluginsCatalogListPluginsWithTypeResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policy" + requestPath := "/v1/sys/plugins/catalog/{type}" + requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) requestQueryParameters := make(url.Values) requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PluginsCatalogListPluginsWithTypeResponse]( ctx, s.client, http.MethodGet, @@ -1971,20 +2006,20 @@ func (s *System) ReadPolicies(ctx context.Context, options ...RequestOption) (*R ) } -// ReadPoliciesACL Retrieve information about the named ACL policy. -// name: The name of the policy. Example: \"ops\" -func (s *System) ReadPoliciesACL(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogReadPluginConfiguration Return the configuration data for the plugin with the given name. +// name: The name of the plugin +func (s *System) PluginsCatalogReadPluginConfiguration(ctx context.Context, name string, options ...RequestOption) (*Response[schema.PluginsCatalogReadPluginConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/acl/{name}" + requestPath := "/v1/sys/plugins/catalog/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PluginsCatalogReadPluginConfigurationResponse]( ctx, s.client, http.MethodGet, @@ -1995,20 +2030,22 @@ func (s *System) ReadPoliciesACL(ctx context.Context, name string, options ...Re ) } -// ReadPoliciesPassword Retrieve an existing password policy. -// name: The name of the password policy. -func (s *System) ReadPoliciesPassword(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogReadPluginConfigurationWithType Return the configuration data for the plugin with the given name. +// name: The name of the plugin +// type_: The type of the plugin, may be auth, secret, or database +func (s *System) PluginsCatalogReadPluginConfigurationWithType(ctx context.Context, name string, type_ string, options ...RequestOption) (*Response[schema.PluginsCatalogReadPluginConfigurationWithTypeResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/password/{name}" + requestPath := "/v1/sys/plugins/catalog/{type}/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PluginsCatalogReadPluginConfigurationWithTypeResponse]( ctx, s.client, http.MethodGet, @@ -2019,69 +2056,73 @@ func (s *System) ReadPoliciesPassword(ctx context.Context, name string, options ) } -// ReadPoliciesPasswordGenerate Generate a password from an existing password policy. -// name: The name of the password policy. -func (s *System) ReadPoliciesPasswordGenerate(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogRegisterPlugin Register a new plugin, or updates an existing one with the supplied name. +// name: The name of the plugin +func (s *System) PluginsCatalogRegisterPlugin(ctx context.Context, name string, request schema.PluginsCatalogRegisterPluginRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/password/{name}/generate" + requestPath := "/v1/sys/plugins/catalog/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadPolicy Retrieve the policy body for the named policy. -// name: The name of the policy. Example: \"ops\" -func (s *System) ReadPolicy(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogRegisterPluginWithType Register a new plugin, or updates an existing one with the supplied name. +// name: The name of the plugin +// type_: The type of the plugin, may be auth, secret, or database +func (s *System) PluginsCatalogRegisterPluginWithType(ctx context.Context, name string, type_ string, request schema.PluginsCatalogRegisterPluginWithTypeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policy/{name}" + requestPath := "/v1/sys/plugins/catalog/{type}/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadQuotasConfig -func (s *System) ReadQuotasConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogRemovePlugin Remove the plugin with the given name. +// name: The name of the plugin +func (s *System) PluginsCatalogRemovePlugin(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/quotas/config" + requestPath := "/v1/sys/plugins/catalog/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -2089,23 +2130,25 @@ func (s *System) ReadQuotasConfig(ctx context.Context, options ...RequestOption) ) } -// ReadQuotasRateLimit -// name: Name of the quota rule. -func (s *System) ReadQuotasRateLimit(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsCatalogRemovePluginWithType Remove the plugin with the given name. +// name: The name of the plugin +// type_: The type of the plugin, may be auth, secret, or database +func (s *System) PluginsCatalogRemovePluginWithType(ctx context.Context, name string, type_ string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/quotas/rate-limit/{name}" + requestPath := "/v1/sys/plugins/catalog/{type}/{name}" requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -2113,46 +2156,46 @@ func (s *System) ReadQuotasRateLimit(ctx context.Context, name string, options . ) } -// ReadRaw Read the value of the key at the given path. -func (s *System) ReadRaw(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PluginsReloadBackends Reload mounted plugin backends. +// Either the plugin name (`plugin`) or the desired plugin backend mounts (`mounts`) must be provided, but not both. In the case that the plugin name is provided, all mounted paths that use that plugin backend will be reloaded. If (`scope`) is provided and is (`global`), the plugin(s) are reloaded globally. +func (s *System) PluginsReloadBackends(ctx context.Context, request schema.PluginsReloadBackendsRequest, options ...RequestOption) (*Response[schema.PluginsReloadBackendsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/raw" + requestPath := "/v1/sys/plugins/reload/backend" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.PluginsReloadBackendsResponse]( ctx, s.client, - http.MethodGet, + http.MethodPost, requestPath, - nil, // request body + request, requestQueryParameters, requestModifiers, ) } -// ReadRawPath Read the value of the key at the given path. -func (s *System) ReadRawPath(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesDeleteAclPolicy Delete the ACL policy with the given name. +// name: The name of the policy. Example: \"ops\" +func (s *System) PoliciesDeleteAclPolicy(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/raw/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/policies/acl/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -2160,21 +2203,23 @@ func (s *System) ReadRawPath(ctx context.Context, path string, options ...Reques ) } -// ReadRekeyBackup Return the backup copy of PGP-encrypted unseal keys. -func (s *System) ReadRekeyBackup(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesDeleteAclPolicy2 Delete the policy with the given name. +// name: The name of the policy. Example: \"ops\" +func (s *System) PoliciesDeleteAclPolicy2(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/backup" + requestPath := "/v1/sys/policy/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -2182,21 +2227,23 @@ func (s *System) ReadRekeyBackup(ctx context.Context, options ...RequestOption) ) } -// ReadRekeyInit Reads the configuration and progress of the current rekey attempt. -func (s *System) ReadRekeyInit(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesDeletePasswordPolicy Delete a password policy. +// name: The name of the password policy. +func (s *System) PoliciesDeletePasswordPolicy(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/init" + requestPath := "/v1/sys/policies/password/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodGet, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -2204,18 +2251,20 @@ func (s *System) ReadRekeyInit(ctx context.Context, options ...RequestOption) (* ) } -// ReadRekeyRecoveryKeyBackup Allows fetching or deleting the backup of the rotated unseal keys. -func (s *System) ReadRekeyRecoveryKeyBackup(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesGeneratePasswordFromPasswordPolicy Generate a password from an existing password policy. +// name: The name of the password policy. +func (s *System) PoliciesGeneratePasswordFromPasswordPolicy(ctx context.Context, name string, options ...RequestOption) (*Response[schema.PoliciesGeneratePasswordFromPasswordPolicyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/recovery-key-backup" + requestPath := "/v1/sys/policies/password/{name}/generate" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PoliciesGeneratePasswordFromPasswordPolicyResponse]( ctx, s.client, http.MethodGet, @@ -2226,18 +2275,19 @@ func (s *System) ReadRekeyRecoveryKeyBackup(ctx context.Context, options ...Requ ) } -// ReadRekeyVerify Read the configuration and progress of the current rekey verification attempt. -func (s *System) ReadRekeyVerify(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesList +func (s *System) PoliciesList(ctx context.Context, options ...RequestOption) (*Response[schema.PoliciesListResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/verify" + requestPath := "/v1/sys/policy" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PoliciesListResponse]( ctx, s.client, http.MethodGet, @@ -2248,20 +2298,19 @@ func (s *System) ReadRekeyVerify(ctx context.Context, options ...RequestOption) ) } -// ReadRemountStatus Check status of a mount migration -// migrationId: The ID of the migration operation -func (s *System) ReadRemountStatus(ctx context.Context, migrationId string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesListAclPolicies +func (s *System) PoliciesListAclPolicies(ctx context.Context, options ...RequestOption) (*Response[schema.PoliciesListAclPoliciesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/remount/status/{migration_id}" - requestPath = strings.Replace(requestPath, "{"+"migration_id"+"}", url.PathEscape(migrationId), -1) + requestPath := "/v1/sys/policies/acl" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PoliciesListAclPoliciesResponse]( ctx, s.client, http.MethodGet, @@ -2272,18 +2321,19 @@ func (s *System) ReadRemountStatus(ctx context.Context, migrationId string, opti ) } -// ReadReplicationStatus -func (s *System) ReadReplicationStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesListPasswordPolicies List the existing password policies. +func (s *System) PoliciesListPasswordPolicies(ctx context.Context, options ...RequestOption) (*Response[schema.PoliciesListPasswordPoliciesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/replication/status" + requestPath := "/v1/sys/policies/password" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PoliciesListPasswordPoliciesResponse]( ctx, s.client, http.MethodGet, @@ -2294,18 +2344,20 @@ func (s *System) ReadReplicationStatus(ctx context.Context, options ...RequestOp ) } -// ReadRotateConfig -func (s *System) ReadRotateConfig(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesReadAclPolicy Retrieve information about the named ACL policy. +// name: The name of the policy. Example: \"ops\" +func (s *System) PoliciesReadAclPolicy(ctx context.Context, name string, options ...RequestOption) (*Response[schema.PoliciesReadAclPolicyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rotate/config" + requestPath := "/v1/sys/policies/acl/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PoliciesReadAclPolicyResponse]( ctx, s.client, http.MethodGet, @@ -2316,18 +2368,20 @@ func (s *System) ReadRotateConfig(ctx context.Context, options ...RequestOption) ) } -// ReadSealStatus Check the seal status of a Vault. -func (s *System) ReadSealStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesReadAclPolicy2 Retrieve the policy body for the named policy. +// name: The name of the policy. Example: \"ops\" +func (s *System) PoliciesReadAclPolicy2(ctx context.Context, name string, options ...RequestOption) (*Response[schema.PoliciesReadAclPolicy2Response], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/seal-status" + requestPath := "/v1/sys/policy/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PoliciesReadAclPolicy2Response]( ctx, s.client, http.MethodGet, @@ -2338,36 +2392,40 @@ func (s *System) ReadSealStatus(ctx context.Context, options ...RequestOption) ( ) } -// Remount Initiate a mount migration -func (s *System) Remount(ctx context.Context, request schema.RemountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesReadPasswordPolicy Retrieve an existing password policy. +// name: The name of the password policy. +func (s *System) PoliciesReadPasswordPolicy(ctx context.Context, name string, options ...RequestOption) (*Response[schema.PoliciesReadPasswordPolicyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/remount" + requestPath := "/v1/sys/policies/password/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.PoliciesReadPasswordPolicyResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// Renew Renews a lease, requesting to extend the lease. -func (s *System) Renew(ctx context.Context, request schema.RenewRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesWriteAclPolicy Add a new or update an existing ACL policy. +// name: The name of the policy. Example: \"ops\" +func (s *System) PoliciesWriteAclPolicy(ctx context.Context, name string, request schema.PoliciesWriteAclPolicyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/renew" + requestPath := "/v1/sys/policies/acl/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2382,16 +2440,16 @@ func (s *System) Renew(ctx context.Context, request schema.RenewRequest, options ) } -// RenewFor Renews a lease, requesting to extend the lease. -// urlLeaseId: The lease identifier to renew. This is included with a lease. -func (s *System) RenewFor(ctx context.Context, urlLeaseId string, request schema.RenewForRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesWriteAclPolicy2 Add a new or update an existing policy. +// name: The name of the policy. Example: \"ops\" +func (s *System) PoliciesWriteAclPolicy2(ctx context.Context, name string, request schema.PoliciesWriteAclPolicy2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/renew/{url_lease_id}" - requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) + requestPath := "/v1/sys/policy/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2406,14 +2464,16 @@ func (s *System) RenewFor(ctx context.Context, urlLeaseId string, request schema ) } -// Revoke Revokes a lease immediately. -func (s *System) Revoke(ctx context.Context, request schema.RevokeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PoliciesWritePasswordPolicy Add a new or update an existing password policy. +// name: The name of the password policy. +func (s *System) PoliciesWritePasswordPolicy(ctx context.Context, name string, request schema.PoliciesWritePasswordPolicyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/revoke" + requestPath := "/v1/sys/policies/password/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2428,24 +2488,22 @@ func (s *System) Revoke(ctx context.Context, request schema.RevokeRequest, optio ) } -// RevokeForce Revokes all secrets or tokens generated under a given prefix immediately -// Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation. By ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled. -// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" -func (s *System) RevokeForce(ctx context.Context, prefix string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofBlocking Returns stack traces that led to blocking on synchronization primitives +// Returns stack traces that led to blocking on synchronization primitives +func (s *System) PprofBlocking(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/revoke-force/{prefix}" - requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) + requestPath := "/v1/sys/pprof/block" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2453,69 +2511,68 @@ func (s *System) RevokeForce(ctx context.Context, prefix string, options ...Requ ) } -// RevokeLease Revokes a lease immediately. -// urlLeaseId: The lease identifier to renew. This is included with a lease. -func (s *System) RevokeLease(ctx context.Context, urlLeaseId string, request schema.RevokeLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofCommandLine Returns the running program's command line. +// Returns the running program's command line, with arguments separated by NUL bytes. +func (s *System) PprofCommandLine(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/revoke/{url_lease_id}" - requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) + requestPath := "/v1/sys/pprof/cmdline" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// RevokePrefix Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. -// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" -func (s *System) RevokePrefix(ctx context.Context, prefix string, request schema.RevokePrefixRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofCpuProfile Returns a pprof-formatted cpu profile payload. +// Returns a pprof-formatted cpu profile payload. Profiling lasts for duration specified in seconds GET parameter, or for 30 seconds if not specified. +func (s *System) PprofCpuProfile(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/revoke-prefix/{prefix}" - requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) + requestPath := "/v1/sys/pprof/profile" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// Rotate Rotates the backend encryption key used to persist data. -func (s *System) Rotate(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofExecutionTrace Returns the execution trace in binary form. +// Returns the execution trace in binary form. Tracing lasts for duration specified in seconds GET parameter, or for 1 second if not specified. +func (s *System) PprofExecutionTrace(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rotate" + requestPath := "/v1/sys/pprof/trace" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2523,21 +2580,22 @@ func (s *System) Rotate(ctx context.Context, options ...RequestOption) (*Respons ) } -// Seal Seal the Vault. -func (s *System) Seal(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofGoroutines Returns stack traces of all current goroutines. +// Returns stack traces of all current goroutines. +func (s *System) PprofGoroutines(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/seal" + requestPath := "/v1/sys/pprof/goroutine" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2545,22 +2603,22 @@ func (s *System) Seal(ctx context.Context, options ...RequestOption) (*Response[ ) } -// StepDownLeader Cause the node to give up active status. -// This endpoint forces the node to give up active status. If the node does not have active status, this endpoint does nothing. Note that the node will sleep for ten seconds before attempting to grab the active lock again, but if no standby nodes grab the active lock in the interim, the same node may become the active node again. -func (s *System) StepDownLeader(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofIndex Returns an HTML page listing the available profiles. +// Returns an HTML page listing the available profiles. This should be mainly accessed via browsers or applications that can render pages. +func (s *System) PprofIndex(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/step-down" + requestPath := "/v1/sys/pprof/" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2568,23 +2626,22 @@ func (s *System) StepDownLeader(ctx context.Context, options ...RequestOption) ( ) } -// SysDeletePluginsCatalogName Remove the plugin with the given name. -// name: The name of the plugin -func (s *System) SysDeletePluginsCatalogName(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofMemoryAllocations Returns a sampling of all past memory allocations. +// Returns a sampling of all past memory allocations. +func (s *System) PprofMemoryAllocations(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/pprof/allocs" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodDelete, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2592,17 +2649,17 @@ func (s *System) SysDeletePluginsCatalogName(ctx context.Context, name string, o ) } -// SysListLeasesLookup Returns a list of lease ids. -func (s *System) SysListLeasesLookup(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofMemoryAllocationsLive Returns a sampling of memory allocations of live object. +// Returns a sampling of memory allocations of live object. +func (s *System) PprofMemoryAllocationsLive(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/lookup/" + requestPath := "/v1/sys/pprof/heap" requestQueryParameters := make(url.Values) - requestQueryParameters.Set("list", "true") return sendRequestParseResponse[map[string]interface{}]( ctx, @@ -2615,16 +2672,15 @@ func (s *System) SysListLeasesLookup(ctx context.Context, options ...RequestOpti ) } -// SysReadPluginsCatalogName Return the configuration data for the plugin with the given name. -// name: The name of the plugin -func (s *System) SysReadPluginsCatalogName(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofMutexes Returns stack traces of holders of contended mutexes +// Returns stack traces of holders of contended mutexes +func (s *System) PprofMutexes(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/pprof/mutex" requestQueryParameters := make(url.Values) @@ -2639,25 +2695,22 @@ func (s *System) SysReadPluginsCatalogName(ctx context.Context, name string, opt ) } -// SysWriteLockedusersMountAccessorUnlockAliasIdentifier Unlocks the user with given mount_accessor and alias_identifier -// aliasIdentifier: It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID -// mountAccessor: MountAccessor is the identifier of the mount entry to which the user belongs -func (s *System) SysWriteLockedusersMountAccessorUnlockAliasIdentifier(ctx context.Context, aliasIdentifier string, mountAccessor string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofSymbols Returns the program counters listed in the request. +// Returns the program counters listed in the request. +func (s *System) PprofSymbols(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/lockedusers/{mount_accessor}/unlock/{alias_identifier}" - requestPath = strings.Replace(requestPath, "{"+"alias_identifier"+"}", url.PathEscape(aliasIdentifier), -1) - requestPath = strings.Replace(requestPath, "{"+"mount_accessor"+"}", url.PathEscape(mountAccessor), -1) + requestPath := "/v1/sys/pprof/symbol" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2665,62 +2718,37 @@ func (s *System) SysWriteLockedusersMountAccessorUnlockAliasIdentifier(ctx conte ) } -// SysWritePluginsCatalogName Register a new plugin, or updates an existing one with the supplied name. -// name: The name of the plugin -func (s *System) SysWritePluginsCatalogName(ctx context.Context, name string, request schema.SysWritePluginsCatalogNameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// PprofThreadCreations Returns stack traces that led to the creation of new OS threads +// Returns stack traces that led to the creation of new OS threads +func (s *System) PprofThreadCreations(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// SysWriteToolsRandomUrlbytes Generate random bytes -// urlbytes: The number of bytes to generate (POST URL parameter) -func (s *System) SysWriteToolsRandomUrlbytes(ctx context.Context, urlbytes string, request schema.SysWriteToolsRandomUrlbytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/sys/tools/random/{urlbytes}" - requestPath = strings.Replace(requestPath, "{"+"urlbytes"+"}", url.PathEscape(urlbytes), -1) + requestPath := "/v1/sys/pprof/threadcreate" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// ToolsGenerateRandom Generate random bytes -func (s *System) ToolsGenerateRandom(ctx context.Context, request schema.ToolsGenerateRandomRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// QueryTokenAccessorCapabilities +func (s *System) QueryTokenAccessorCapabilities(ctx context.Context, request schema.QueryTokenAccessorCapabilitiesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/tools/random" + requestPath := "/v1/sys/capabilities-accessor" requestQueryParameters := make(url.Values) @@ -2735,16 +2763,14 @@ func (s *System) ToolsGenerateRandom(ctx context.Context, request schema.ToolsGe ) } -// ToolsGenerateRandomSource Generate random bytes -// source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". -func (s *System) ToolsGenerateRandomSource(ctx context.Context, source string, request schema.ToolsGenerateRandomSourceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// QueryTokenCapabilities +func (s *System) QueryTokenCapabilities(ctx context.Context, request schema.QueryTokenCapabilitiesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/tools/random/{source}" - requestPath = strings.Replace(requestPath, "{"+"source"+"}", url.PathEscape(source), -1) + requestPath := "/v1/sys/capabilities" requestQueryParameters := make(url.Values) @@ -2759,18 +2785,14 @@ func (s *System) ToolsGenerateRandomSource(ctx context.Context, source string, r ) } -// ToolsGenerateRandomSourceBytes Generate random bytes -// source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". -// urlbytes: The number of bytes to generate (POST URL parameter) -func (s *System) ToolsGenerateRandomSourceBytes(ctx context.Context, source string, urlbytes string, request schema.ToolsGenerateRandomSourceBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// QueryTokenSelfCapabilities +func (s *System) QueryTokenSelfCapabilities(ctx context.Context, request schema.QueryTokenSelfCapabilitiesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/tools/random/{source}/{urlbytes}" - requestPath = strings.Replace(requestPath, "{"+"source"+"}", url.PathEscape(source), -1) - requestPath = strings.Replace(requestPath, "{"+"urlbytes"+"}", url.PathEscape(urlbytes), -1) + requestPath := "/v1/sys/capabilities-self" requestQueryParameters := make(url.Values) @@ -2785,14 +2807,14 @@ func (s *System) ToolsGenerateRandomSourceBytes(ctx context.Context, source stri ) } -// ToolsHash Generate a hash sum for input data -func (s *System) ToolsHash(ctx context.Context, request schema.ToolsHashRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RateLimitQuotasConfigure +func (s *System) RateLimitQuotasConfigure(ctx context.Context, request schema.RateLimitQuotasConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/tools/hash" + requestPath := "/v1/sys/quotas/config" requestQueryParameters := make(url.Values) @@ -2807,64 +2829,67 @@ func (s *System) ToolsHash(ctx context.Context, request schema.ToolsHashRequest, ) } -// ToolsHashWith Generate a hash sum for input data -// urlalgorithm: Algorithm to use (POST URL parameter) -func (s *System) ToolsHashWith(ctx context.Context, urlalgorithm string, request schema.ToolsHashWithRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RateLimitQuotasDelete +// name: Name of the quota rule. +func (s *System) RateLimitQuotasDelete(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/tools/hash/{urlalgorithm}" - requestPath = strings.Replace(requestPath, "{"+"urlalgorithm"+"}", url.PathEscape(urlalgorithm), -1) + requestPath := "/v1/sys/quotas/rate-limit/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// Unseal Unseal the Vault. -func (s *System) Unseal(ctx context.Context, request schema.UnsealRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RateLimitQuotasList +func (s *System) RateLimitQuotasList(ctx context.Context, options ...RequestOption) (*Response[schema.RateLimitQuotasListResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/unseal" + requestPath := "/v1/sys/quotas/rate-limit" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RateLimitQuotasListResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WrappingReadLookup Look up wrapping properties for the requester's token. -func (s *System) WrappingReadLookup(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RateLimitQuotasRead +// name: Name of the quota rule. +func (s *System) RateLimitQuotasRead(ctx context.Context, name string, options ...RequestOption) (*Response[schema.RateLimitQuotasReadResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/wrapping/lookup" + requestPath := "/v1/sys/quotas/rate-limit/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) - return sendRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RateLimitQuotasReadResponse]( ctx, s.client, http.MethodGet, @@ -2875,36 +2900,38 @@ func (s *System) WrappingReadLookup(ctx context.Context, options ...RequestOptio ) } -// WrappingRewrap Rotates a response-wrapped token. -func (s *System) WrappingRewrap(ctx context.Context, request schema.WrappingRewrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RateLimitQuotasReadConfiguration +func (s *System) RateLimitQuotasReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.RateLimitQuotasReadConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/wrapping/rewrap" + requestPath := "/v1/sys/quotas/config" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RateLimitQuotasReadConfigurationResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WrappingUnwrap Unwraps a response-wrapped token. -func (s *System) WrappingUnwrap(ctx context.Context, request schema.WrappingUnwrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RateLimitQuotasWrite +// name: Name of the quota rule. +func (s *System) RateLimitQuotasWrite(ctx context.Context, name string, request schema.RateLimitQuotasWriteRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/wrapping/unwrap" + requestPath := "/v1/sys/quotas/rate-limit/{name}" + requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) requestQueryParameters := make(url.Values) @@ -2919,21 +2946,21 @@ func (s *System) WrappingUnwrap(ctx context.Context, request schema.WrappingUnwr ) } -// WrappingWrap Response-wraps an arbitrary JSON object. -func (s *System) WrappingWrap(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ReadHealthStatus Returns the health status of Vault. +func (s *System) ReadHealthStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/wrapping/wrap" + requestPath := "/v1/sys/health" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -2941,92 +2968,63 @@ func (s *System) WrappingWrap(ctx context.Context, options ...RequestOption) (*R ) } -// WrappingWriteLookup Look up wrapping properties for the given token. -func (s *System) WrappingWriteLookup(ctx context.Context, request schema.WrappingWriteLookupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/sys/wrapping/lookup" - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// WriteAuditDevice Enable a new audit device at the supplied path. -// path: The name of the backend. Cannot be delimited. Example: \"mysql\" -func (s *System) WriteAuditDevice(ctx context.Context, path string, request schema.WriteAuditDeviceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ReadInitializationStatus Returns the initialization status of Vault. +func (s *System) ReadInitializationStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/audit/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/init" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteAuthMethod Enables a new auth method. -// After enabling, the auth method can be accessed and configured via the auth path specified as part of the URL. This auth path will be nested under the auth prefix. For example, enable the \"foo\" auth method will make it accessible at /auth/foo. -// path: The path to mount to. Cannot be delimited. Example: \"user\" -func (s *System) WriteAuthMethod(ctx context.Context, path string, request schema.WriteAuthMethodRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ReadSanitizedConfigurationState Return a sanitized version of the Vault server configuration. +// The sanitized output strips configuration values in the storage, HA storage, and seals stanzas, which may contain sensitive values such as API tokens. It also removes any token or secret fields in other stanzas, such as the circonus_api_token from telemetry. +func (s *System) ReadSanitizedConfigurationState(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/auth/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/config/state/sanitized" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteAuthMethodTune Tune configuration parameters for a given auth path. -// This endpoint requires sudo capability on the final path, but the same functionality can be achieved without sudo via `sys/mounts/auth/[auth-path]/tune`. -// path: Tune the configuration parameters for an auth path. -func (s *System) WriteAuthMethodTune(ctx context.Context, path string, request schema.WriteAuthMethodTuneRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ReadWrappingProperties Look up wrapping properties for the given token. +func (s *System) ReadWrappingProperties(ctx context.Context, request schema.ReadWrappingPropertiesRequest, options ...RequestOption) (*Response[schema.ReadWrappingPropertiesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/auth/{path}/tune" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/wrapping/lookup" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.ReadWrappingPropertiesResponse]( ctx, s.client, http.MethodPost, @@ -3037,62 +3035,64 @@ func (s *System) WriteAuthMethodTune(ctx context.Context, path string, request s ) } -// WriteCapabilities Fetches the capabilities of the given token on the given path. -func (s *System) WriteCapabilities(ctx context.Context, request schema.WriteCapabilitiesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ReadWrappingProperties2 Look up wrapping properties for the requester's token. +func (s *System) ReadWrappingProperties2(ctx context.Context, options ...RequestOption) (*Response[schema.ReadWrappingProperties2Response], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/capabilities" + requestPath := "/v1/sys/wrapping/lookup" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.ReadWrappingProperties2Response]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteCapabilitiesAccessor Fetches the capabilities of the token associated with the given token, on the given path. -func (s *System) WriteCapabilitiesAccessor(ctx context.Context, request schema.WriteCapabilitiesAccessorRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyAttemptCancel Cancels any in-progress rekey. +// This clears the rekey settings as well as any progress made. This must be called to change the parameters of the rekey. Note: verification is still a part of a rekey. If rekeying is canceled during the verification flow, the current unseal keys remain valid. +func (s *System) RekeyAttemptCancel(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/capabilities-accessor" + requestPath := "/v1/sys/rekey/init" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteCapabilitiesSelf Fetches the capabilities of the given token on the given path. -func (s *System) WriteCapabilitiesSelf(ctx context.Context, request schema.WriteCapabilitiesSelfRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyAttemptInitialize Initializes a new rekey attempt. +// Only a single rekey attempt can take place at a time, and changing the parameters of a rekey requires canceling and starting a new rekey, which will also provide a new nonce. +func (s *System) RekeyAttemptInitialize(ctx context.Context, request schema.RekeyAttemptInitializeRequest, options ...RequestOption) (*Response[schema.RekeyAttemptInitializeResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/capabilities-self" + requestPath := "/v1/sys/rekey/init" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.RekeyAttemptInitializeResponse]( ctx, s.client, http.MethodPost, @@ -3103,41 +3103,40 @@ func (s *System) WriteCapabilitiesSelf(ctx context.Context, request schema.Write ) } -// WriteConfigAuditingRequestHeader Enable auditing of a header. -func (s *System) WriteConfigAuditingRequestHeader(ctx context.Context, header string, request schema.WriteConfigAuditingRequestHeaderRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyAttemptReadProgress Reads the configuration and progress of the current rekey attempt. +func (s *System) RekeyAttemptReadProgress(ctx context.Context, options ...RequestOption) (*Response[schema.RekeyAttemptReadProgressResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/auditing/request-headers/{header}" - requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) + requestPath := "/v1/sys/rekey/init" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RekeyAttemptReadProgressResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteConfigCORS Configure the CORS settings. -func (s *System) WriteConfigCORS(ctx context.Context, request schema.WriteConfigCORSRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyAttemptUpdate Enter a single unseal key share to progress the rekey of the Vault. +func (s *System) RekeyAttemptUpdate(ctx context.Context, request schema.RekeyAttemptUpdateRequest, options ...RequestOption) (*Response[schema.RekeyAttemptUpdateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/cors" + requestPath := "/v1/sys/rekey/update" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.RekeyAttemptUpdateResponse]( ctx, s.client, http.MethodPost, @@ -3148,22 +3147,21 @@ func (s *System) WriteConfigCORS(ctx context.Context, request schema.WriteConfig ) } -// WriteConfigReloadSubsystem Reload the given subsystem -func (s *System) WriteConfigReloadSubsystem(ctx context.Context, subsystem string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyDeleteBackupKey Delete the backup copy of PGP-encrypted unseal keys. +func (s *System) RekeyDeleteBackupKey(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/config/reload/{subsystem}" - requestPath = strings.Replace(requestPath, "{"+"subsystem"+"}", url.PathEscape(subsystem), -1) + requestPath := "/v1/sys/rekey/backup" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -3171,178 +3169,129 @@ func (s *System) WriteConfigReloadSubsystem(ctx context.Context, subsystem strin ) } -// WriteConfigUIHeader Configure the values to be returned for the UI header. -// header: The name of the header. -func (s *System) WriteConfigUIHeader(ctx context.Context, header string, request schema.WriteConfigUIHeaderRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/sys/config/ui/headers/{header}" - requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// WriteGenerateRoot Initializes a new root generation attempt. -// Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required. -func (s *System) WriteGenerateRoot(ctx context.Context, request schema.WriteGenerateRootRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyDeleteBackupRecoveryKey +func (s *System) RekeyDeleteBackupRecoveryKey(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/generate-root" - - requestQueryParameters := make(url.Values) - - return sendStructuredRequestParseResponse[map[string]interface{}]( - ctx, - s.client, - http.MethodPost, - requestPath, - request, - requestQueryParameters, - requestModifiers, - ) -} - -// WriteGenerateRootAttempt Initializes a new root generation attempt. -// Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required. -func (s *System) WriteGenerateRootAttempt(ctx context.Context, request schema.WriteGenerateRootAttemptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { - requestModifiers, err := requestOptionsToRequestModifiers(options) - if err != nil { - return nil, err - } - - requestPath := "/v1/sys/generate-root/attempt" + requestPath := "/v1/sys/rekey/recovery-key-backup" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteGenerateRootUpdate Enter a single unseal key share to progress the root generation attempt. -// If the threshold number of unseal key shares is reached, Vault will complete the root generation and issue the new token. Otherwise, this API must be called multiple times until that threshold is met. The attempt nonce must be provided with each call. -func (s *System) WriteGenerateRootUpdate(ctx context.Context, request schema.WriteGenerateRootUpdateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyReadBackupKey Return the backup copy of PGP-encrypted unseal keys. +func (s *System) RekeyReadBackupKey(ctx context.Context, options ...RequestOption) (*Response[schema.RekeyReadBackupKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/generate-root/update" + requestPath := "/v1/sys/rekey/backup" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RekeyReadBackupKeyResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteInit Initialize a new Vault. -// The Vault must not have been previously initialized. The recovery options, as well as the stored shares option, are only available when using Vault HSM. -func (s *System) WriteInit(ctx context.Context, request schema.WriteInitRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyReadBackupRecoveryKey +func (s *System) RekeyReadBackupRecoveryKey(ctx context.Context, options ...RequestOption) (*Response[schema.RekeyReadBackupRecoveryKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/init" + requestPath := "/v1/sys/rekey/recovery-key-backup" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RekeyReadBackupRecoveryKeyResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteInternalCountersConfig Enable or disable collection of client count, set retention period, or set default reporting period. -func (s *System) WriteInternalCountersConfig(ctx context.Context, request schema.WriteInternalCountersConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyVerificationCancel Cancel any in-progress rekey verification operation. +// This clears any progress made and resets the nonce. Unlike a `DELETE` against `sys/rekey/init`, this only resets the current verification operation, not the entire rekey atttempt. +func (s *System) RekeyVerificationCancel(ctx context.Context, options ...RequestOption) (*Response[schema.RekeyVerificationCancelResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/internal/counters/config" + requestPath := "/v1/sys/rekey/verify" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RekeyVerificationCancelResponse]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteLeasesLookup Retrieve lease metadata. -func (s *System) WriteLeasesLookup(ctx context.Context, request schema.WriteLeasesLookupRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyVerificationReadProgress Read the configuration and progress of the current rekey verification attempt. +func (s *System) RekeyVerificationReadProgress(ctx context.Context, options ...RequestOption) (*Response[schema.RekeyVerificationReadProgressResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/lookup" + requestPath := "/v1/sys/rekey/verify" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RekeyVerificationReadProgressResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteLeasesRenew Renews a lease, requesting to extend the lease. -func (s *System) WriteLeasesRenew(ctx context.Context, request schema.WriteLeasesRenewRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RekeyVerificationUpdate Enter a single new key share to progress the rekey verification operation. +func (s *System) RekeyVerificationUpdate(ctx context.Context, request schema.RekeyVerificationUpdateRequest, options ...RequestOption) (*Response[schema.RekeyVerificationUpdateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/renew" + requestPath := "/v1/sys/rekey/verify" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.RekeyVerificationUpdateResponse]( ctx, s.client, http.MethodPost, @@ -3353,42 +3302,41 @@ func (s *System) WriteLeasesRenew(ctx context.Context, request schema.WriteLease ) } -// WriteLeasesRenew2 Renews a lease, requesting to extend the lease. -// urlLeaseId: The lease identifier to renew. This is included with a lease. -func (s *System) WriteLeasesRenew2(ctx context.Context, urlLeaseId string, request schema.WriteLeasesRenew2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ReloadSubsystem Reload the given subsystem +func (s *System) ReloadSubsystem(ctx context.Context, subsystem string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/renew/{url_lease_id}" - requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) + requestPath := "/v1/sys/config/reload/{subsystem}" + requestPath = strings.Replace(requestPath, "{"+"subsystem"+"}", url.PathEscape(subsystem), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteLeasesRevoke Revokes a lease immediately. -func (s *System) WriteLeasesRevoke(ctx context.Context, request schema.WriteLeasesRevokeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Remount Initiate a mount migration +func (s *System) Remount(ctx context.Context, request schema.RemountRequest, options ...RequestOption) (*Response[schema.RemountResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/revoke" + requestPath := "/v1/sys/remount" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.RemountResponse]( ctx, s.client, http.MethodPost, @@ -3399,48 +3347,45 @@ func (s *System) WriteLeasesRevoke(ctx context.Context, request schema.WriteLeas ) } -// WriteLeasesRevoke2 Revokes a lease immediately. -// urlLeaseId: The lease identifier to renew. This is included with a lease. -func (s *System) WriteLeasesRevoke2(ctx context.Context, urlLeaseId string, request schema.WriteLeasesRevoke2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RemountStatus Check status of a mount migration +// migrationId: The ID of the migration operation +func (s *System) RemountStatus(ctx context.Context, migrationId string, options ...RequestOption) (*Response[schema.RemountStatusResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/revoke/{url_lease_id}" - requestPath = strings.Replace(requestPath, "{"+"url_lease_id"+"}", url.PathEscape(urlLeaseId), -1) + requestPath := "/v1/sys/remount/status/{migration_id}" + requestPath = strings.Replace(requestPath, "{"+"migration_id"+"}", url.PathEscape(migrationId), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RemountStatusResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteLeasesRevokeForce Revokes all secrets or tokens generated under a given prefix immediately -// Unlike `/sys/leases/revoke-prefix`, this path ignores backend errors encountered during revocation. This is potentially very dangerous and should only be used in specific emergency situations where errors in the backend or the connected backend service prevent normal revocation. By ignoring these errors, Vault abdicates responsibility for ensuring that the issued credentials or secrets are properly revoked and/or cleaned up. Access to this endpoint should be tightly controlled. -// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" -func (s *System) WriteLeasesRevokeForce(ctx context.Context, prefix string, options ...RequestOption) (*Response[map[string]interface{}], error) { +// ReplicationStatus +func (s *System) ReplicationStatus(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/revoke-force/{prefix}" - requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) + requestPath := "/v1/sys/replication/status" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, nil, // request body requestQueryParameters, @@ -3448,16 +3393,14 @@ func (s *System) WriteLeasesRevokeForce(ctx context.Context, prefix string, opti ) } -// WriteLeasesRevokePrefix Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. -// prefix: The path to revoke keys under. Example: \"prod/aws/ops\" -func (s *System) WriteLeasesRevokePrefix(ctx context.Context, prefix string, request schema.WriteLeasesRevokePrefixRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Rewrap +func (s *System) Rewrap(ctx context.Context, request schema.RewrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/revoke-prefix/{prefix}" - requestPath = strings.Replace(requestPath, "{"+"prefix"+"}", url.PathEscape(prefix), -1) + requestPath := "/v1/sys/wrapping/rewrap" requestQueryParameters := make(url.Values) @@ -3472,21 +3415,21 @@ func (s *System) WriteLeasesRevokePrefix(ctx context.Context, prefix string, req ) } -// WriteLeasesTidy This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. -func (s *System) WriteLeasesTidy(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RootTokenGenerationCancel Cancels any in-progress root generation attempt. +func (s *System) RootTokenGenerationCancel(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/leases/tidy" + requestPath := "/v1/sys/generate-root/attempt" requestQueryParameters := make(url.Values) return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, nil, // request body requestQueryParameters, @@ -3494,42 +3437,41 @@ func (s *System) WriteLeasesTidy(ctx context.Context, options ...RequestOption) ) } -// WriteLogger Modify the log level of a single logger. -// name: The name of the logger to be modified. -func (s *System) WriteLogger(ctx context.Context, name string, request schema.WriteLoggerRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RootTokenGenerationCancel2 Cancels any in-progress root generation attempt. +func (s *System) RootTokenGenerationCancel2(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/loggers/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/generate-root" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteLoggers Modify the log level for all existing loggers. -func (s *System) WriteLoggers(ctx context.Context, request schema.WriteLoggersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RootTokenGenerationInitialize Initializes a new root generation attempt. +// Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required. +func (s *System) RootTokenGenerationInitialize(ctx context.Context, request schema.RootTokenGenerationInitializeRequest, options ...RequestOption) (*Response[schema.RootTokenGenerationInitializeResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/loggers" + requestPath := "/v1/sys/generate-root/attempt" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.RootTokenGenerationInitializeResponse]( ctx, s.client, http.MethodPost, @@ -3540,20 +3482,19 @@ func (s *System) WriteLoggers(ctx context.Context, request schema.WriteLoggersRe ) } -// WriteMount Enable a new secrets engine at the given path. -// path: The path to mount to. Example: \"aws/east\" -func (s *System) WriteMount(ctx context.Context, path string, request schema.WriteMountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RootTokenGenerationInitialize2 Initializes a new root generation attempt. +// Only a single root generation attempt can take place at a time. One (and only one) of otp or pgp_key are required. +func (s *System) RootTokenGenerationInitialize2(ctx context.Context, request schema.RootTokenGenerationInitialize2Request, options ...RequestOption) (*Response[schema.RootTokenGenerationInitialize2Response], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/mounts/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/generate-root" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.RootTokenGenerationInitialize2Response]( ctx, s.client, http.MethodPost, @@ -3564,69 +3505,63 @@ func (s *System) WriteMount(ctx context.Context, path string, request schema.Wri ) } -// WriteMountsConfig Tune backend configuration parameters for this mount. -// path: The path to mount to. Example: \"aws/east\" -func (s *System) WriteMountsConfig(ctx context.Context, path string, request schema.WriteMountsConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RootTokenGenerationReadProgress Read the configuration and progress of the current root generation attempt. +func (s *System) RootTokenGenerationReadProgress(ctx context.Context, options ...RequestOption) (*Response[schema.RootTokenGenerationReadProgressResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/mounts/{path}/tune" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/generate-root/attempt" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RootTokenGenerationReadProgressResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WritePluginsCatalogByTypeByName Register a new plugin, or updates an existing one with the supplied name. -// name: The name of the plugin -// type_: The type of the plugin, may be auth, secret, or database -func (s *System) WritePluginsCatalogByTypeByName(ctx context.Context, name string, type_ string, request schema.WritePluginsCatalogByTypeByNameRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RootTokenGenerationReadProgress2 Read the configuration and progress of the current root generation attempt. +func (s *System) RootTokenGenerationReadProgress2(ctx context.Context, options ...RequestOption) (*Response[schema.RootTokenGenerationReadProgress2Response], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/catalog/{type}/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) - requestPath = strings.Replace(requestPath, "{"+"type"+"}", url.PathEscape(type_), -1) + requestPath := "/v1/sys/generate-root" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.RootTokenGenerationReadProgress2Response]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WritePluginsReloadBackend Reload mounted plugin backends. -// Either the plugin name (`plugin`) or the desired plugin backend mounts (`mounts`) must be provided, but not both. In the case that the plugin name is provided, all mounted paths that use that plugin backend will be reloaded. If (`scope`) is provided and is (`global`), the plugin(s) are reloaded globally. -func (s *System) WritePluginsReloadBackend(ctx context.Context, request schema.WritePluginsReloadBackendRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// RootTokenGenerationUpdate Enter a single unseal key share to progress the root generation attempt. +// If the threshold number of unseal key shares is reached, Vault will complete the root generation and issue the new token. Otherwise, this API must be called multiple times until that threshold is met. The attempt nonce must be provided with each call. +func (s *System) RootTokenGenerationUpdate(ctx context.Context, request schema.RootTokenGenerationUpdateRequest, options ...RequestOption) (*Response[schema.RootTokenGenerationUpdateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/plugins/reload/backend" + requestPath := "/v1/sys/generate-root/update" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.RootTokenGenerationUpdateResponse]( ctx, s.client, http.MethodPost, @@ -3637,86 +3572,83 @@ func (s *System) WritePluginsReloadBackend(ctx context.Context, request schema.W ) } -// WritePoliciesACL Add a new or update an existing ACL policy. -// name: The name of the policy. Example: \"ops\" -func (s *System) WritePoliciesACL(ctx context.Context, name string, request schema.WritePoliciesACLRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Seal Seal the Vault. +func (s *System) Seal(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/acl/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/seal" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WritePoliciesPassword Add a new or update an existing password policy. -// name: The name of the password policy. -func (s *System) WritePoliciesPassword(ctx context.Context, name string, request schema.WritePoliciesPasswordRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// SealStatus Check the seal status of a Vault. +func (s *System) SealStatus(ctx context.Context, options ...RequestOption) (*Response[schema.SealStatusResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policies/password/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/seal-status" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.SealStatusResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WritePolicy Add a new or update an existing policy. -// name: The name of the policy. Example: \"ops\" -func (s *System) WritePolicy(ctx context.Context, name string, request schema.WritePolicyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// StepDownLeader Cause the node to give up active status. +// This endpoint forces the node to give up active status. If the node does not have active status, this endpoint does nothing. Note that the node will sleep for ten seconds before attempting to grab the active lock again, but if no standby nodes grab the active lock in the interim, the same node may become the active node again. +func (s *System) StepDownLeader(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/policy/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/step-down" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteQuotasConfig -func (s *System) WriteQuotasConfig(ctx context.Context, request schema.WriteQuotasConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// UiHeadersConfigure Configure the values to be returned for the UI header. +// header: The name of the header. +func (s *System) UiHeadersConfigure(ctx context.Context, header string, request schema.UiHeadersConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/quotas/config" + requestPath := "/v1/sys/config/ui/headers/{header}" + requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) requestQueryParameters := make(url.Values) @@ -3731,88 +3663,89 @@ func (s *System) WriteQuotasConfig(ctx context.Context, request schema.WriteQuot ) } -// WriteQuotasRateLimit -// name: Name of the quota rule. -func (s *System) WriteQuotasRateLimit(ctx context.Context, name string, request schema.WriteQuotasRateLimitRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// UiHeadersDeleteConfiguration Remove a UI header. +// header: The name of the header. +func (s *System) UiHeadersDeleteConfiguration(ctx context.Context, header string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/quotas/rate-limit/{name}" - requestPath = strings.Replace(requestPath, "{"+"name"+"}", url.PathEscape(name), -1) + requestPath := "/v1/sys/config/ui/headers/{header}" + requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, - http.MethodPost, + http.MethodDelete, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteRaw Update the value of the key at the given path. -func (s *System) WriteRaw(ctx context.Context, request schema.WriteRawRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// UiHeadersList Return a list of configured UI headers. +func (s *System) UiHeadersList(ctx context.Context, options ...RequestOption) (*Response[schema.UiHeadersListResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/raw" + requestPath := "/v1/sys/config/ui/headers/" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.UiHeadersListResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteRawPath Update the value of the key at the given path. -func (s *System) WriteRawPath(ctx context.Context, path string, request schema.WriteRawPathRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// UiHeadersReadConfiguration Return the given UI header's configuration +// header: The name of the header. +func (s *System) UiHeadersReadConfiguration(ctx context.Context, header string, options ...RequestOption) (*Response[schema.UiHeadersReadConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/raw/{path}" - requestPath = strings.Replace(requestPath, "{"+"path"+"}", url.PathEscape(path), -1) + requestPath := "/v1/sys/config/ui/headers/{header}" + requestPath = strings.Replace(requestPath, "{"+"header"+"}", url.PathEscape(header), -1) requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.UiHeadersReadConfigurationResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteRekeyInit Initializes a new rekey attempt. -// Only a single rekey attempt can take place at a time, and changing the parameters of a rekey requires canceling and starting a new rekey, which will also provide a new nonce. -func (s *System) WriteRekeyInit(ctx context.Context, request schema.WriteRekeyInitRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Unseal Unseal the Vault. +func (s *System) Unseal(ctx context.Context, request schema.UnsealRequest, options ...RequestOption) (*Response[schema.UnsealResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/init" + requestPath := "/v1/sys/unseal" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendStructuredRequestParseResponse[schema.UnsealResponse]( ctx, s.client, http.MethodPost, @@ -3823,14 +3756,14 @@ func (s *System) WriteRekeyInit(ctx context.Context, request schema.WriteRekeyIn ) } -// WriteRekeyUpdate Enter a single unseal key share to progress the rekey of the Vault. -func (s *System) WriteRekeyUpdate(ctx context.Context, request schema.WriteRekeyUpdateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Unwrap +func (s *System) Unwrap(ctx context.Context, request schema.UnwrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/update" + requestPath := "/v1/sys/wrapping/unwrap" requestQueryParameters := make(url.Values) @@ -3845,45 +3778,46 @@ func (s *System) WriteRekeyUpdate(ctx context.Context, request schema.WriteRekey ) } -// WriteRekeyVerify Enter a single new key share to progress the rekey verification operation. -func (s *System) WriteRekeyVerify(ctx context.Context, request schema.WriteRekeyVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// VersionHistory Returns map of historical version change entries +func (s *System) VersionHistory(ctx context.Context, options ...RequestOption) (*Response[schema.VersionHistoryResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rekey/verify" + requestPath := "/v1/sys/version-history/" requestQueryParameters := make(url.Values) + requestQueryParameters.Set("list", "true") - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[schema.VersionHistoryResponse]( ctx, s.client, - http.MethodPost, + http.MethodGet, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) } -// WriteRotateConfig -func (s *System) WriteRotateConfig(ctx context.Context, request schema.WriteRotateConfigRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +// Wrap +func (s *System) Wrap(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err } - requestPath := "/v1/sys/rotate/config" + requestPath := "/v1/sys/wrapping/wrap" requestQueryParameters := make(url.Values) - return sendStructuredRequestParseResponse[map[string]interface{}]( + return sendRequestParseResponse[map[string]interface{}]( ctx, s.client, http.MethodPost, requestPath, - request, + nil, // request body requestQueryParameters, requestModifiers, ) diff --git a/docs/AWSLoginRequest.md b/docs/AWSLoginRequest.md index a6768181..42c8af81 100644 --- a/docs/AWSLoginRequest.md +++ b/docs/AWSLoginRequest.md @@ -1,4 +1,4 @@ -# AWSLoginRequest +# AwsLoginRequest ## Properties @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSLoginRequest +### NewAwsLoginRequest -`func NewAWSLoginRequest() *AWSLoginRequest` +`func NewAwsLoginRequest() *AwsLoginRequest` -NewAWSLoginRequest instantiates a new AWSLoginRequest object +NewAwsLoginRequest instantiates a new AwsLoginRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSLoginRequestWithDefaults +### NewAwsLoginRequestWithDefaults -`func NewAWSLoginRequestWithDefaults() *AWSLoginRequest` +`func NewAwsLoginRequestWithDefaults() *AwsLoginRequest` -NewAWSLoginRequestWithDefaults instantiates a new AWSLoginRequest object +NewAwsLoginRequestWithDefaults instantiates a new AwsLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIamHttpRequestMethod -`func (o *AWSLoginRequest) GetIamHttpRequestMethod() string` +`func (o *AwsLoginRequest) GetIamHttpRequestMethod() string` GetIamHttpRequestMethod returns the IamHttpRequestMethod field if non-nil, zero value otherwise. ### GetIamHttpRequestMethodOk -`func (o *AWSLoginRequest) GetIamHttpRequestMethodOk() (*string, bool)` +`func (o *AwsLoginRequest) GetIamHttpRequestMethodOk() (*string, bool)` GetIamHttpRequestMethodOk returns a tuple with the IamHttpRequestMethod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamHttpRequestMethod -`func (o *AWSLoginRequest) SetIamHttpRequestMethod(v string)` +`func (o *AwsLoginRequest) SetIamHttpRequestMethod(v string)` SetIamHttpRequestMethod sets IamHttpRequestMethod field to given value. ### HasIamHttpRequestMethod -`func (o *AWSLoginRequest) HasIamHttpRequestMethod() bool` +`func (o *AwsLoginRequest) HasIamHttpRequestMethod() bool` HasIamHttpRequestMethod returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasIamHttpRequestMethod returns a boolean if a field has been set. ### GetIamRequestBody -`func (o *AWSLoginRequest) GetIamRequestBody() string` +`func (o *AwsLoginRequest) GetIamRequestBody() string` GetIamRequestBody returns the IamRequestBody field if non-nil, zero value otherwise. ### GetIamRequestBodyOk -`func (o *AWSLoginRequest) GetIamRequestBodyOk() (*string, bool)` +`func (o *AwsLoginRequest) GetIamRequestBodyOk() (*string, bool)` GetIamRequestBodyOk returns a tuple with the IamRequestBody field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamRequestBody -`func (o *AWSLoginRequest) SetIamRequestBody(v string)` +`func (o *AwsLoginRequest) SetIamRequestBody(v string)` SetIamRequestBody sets IamRequestBody field to given value. ### HasIamRequestBody -`func (o *AWSLoginRequest) HasIamRequestBody() bool` +`func (o *AwsLoginRequest) HasIamRequestBody() bool` HasIamRequestBody returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasIamRequestBody returns a boolean if a field has been set. ### GetIamRequestHeaders -`func (o *AWSLoginRequest) GetIamRequestHeaders() string` +`func (o *AwsLoginRequest) GetIamRequestHeaders() string` GetIamRequestHeaders returns the IamRequestHeaders field if non-nil, zero value otherwise. ### GetIamRequestHeadersOk -`func (o *AWSLoginRequest) GetIamRequestHeadersOk() (*string, bool)` +`func (o *AwsLoginRequest) GetIamRequestHeadersOk() (*string, bool)` GetIamRequestHeadersOk returns a tuple with the IamRequestHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamRequestHeaders -`func (o *AWSLoginRequest) SetIamRequestHeaders(v string)` +`func (o *AwsLoginRequest) SetIamRequestHeaders(v string)` SetIamRequestHeaders sets IamRequestHeaders field to given value. ### HasIamRequestHeaders -`func (o *AWSLoginRequest) HasIamRequestHeaders() bool` +`func (o *AwsLoginRequest) HasIamRequestHeaders() bool` HasIamRequestHeaders returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasIamRequestHeaders returns a boolean if a field has been set. ### GetIamRequestUrl -`func (o *AWSLoginRequest) GetIamRequestUrl() string` +`func (o *AwsLoginRequest) GetIamRequestUrl() string` GetIamRequestUrl returns the IamRequestUrl field if non-nil, zero value otherwise. ### GetIamRequestUrlOk -`func (o *AWSLoginRequest) GetIamRequestUrlOk() (*string, bool)` +`func (o *AwsLoginRequest) GetIamRequestUrlOk() (*string, bool)` GetIamRequestUrlOk returns a tuple with the IamRequestUrl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamRequestUrl -`func (o *AWSLoginRequest) SetIamRequestUrl(v string)` +`func (o *AwsLoginRequest) SetIamRequestUrl(v string)` SetIamRequestUrl sets IamRequestUrl field to given value. ### HasIamRequestUrl -`func (o *AWSLoginRequest) HasIamRequestUrl() bool` +`func (o *AwsLoginRequest) HasIamRequestUrl() bool` HasIamRequestUrl returns a boolean if a field has been set. @@ -156,27 +156,27 @@ HasIamRequestUrl returns a boolean if a field has been set. ### GetIdentity -`func (o *AWSLoginRequest) GetIdentity() string` +`func (o *AwsLoginRequest) GetIdentity() string` GetIdentity returns the Identity field if non-nil, zero value otherwise. ### GetIdentityOk -`func (o *AWSLoginRequest) GetIdentityOk() (*string, bool)` +`func (o *AwsLoginRequest) GetIdentityOk() (*string, bool)` GetIdentityOk returns a tuple with the Identity field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIdentity -`func (o *AWSLoginRequest) SetIdentity(v string)` +`func (o *AwsLoginRequest) SetIdentity(v string)` SetIdentity sets Identity field to given value. ### HasIdentity -`func (o *AWSLoginRequest) HasIdentity() bool` +`func (o *AwsLoginRequest) HasIdentity() bool` HasIdentity returns a boolean if a field has been set. @@ -185,27 +185,27 @@ HasIdentity returns a boolean if a field has been set. ### GetNonce -`func (o *AWSLoginRequest) GetNonce() string` +`func (o *AwsLoginRequest) GetNonce() string` GetNonce returns the Nonce field if non-nil, zero value otherwise. ### GetNonceOk -`func (o *AWSLoginRequest) GetNonceOk() (*string, bool)` +`func (o *AwsLoginRequest) GetNonceOk() (*string, bool)` GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNonce -`func (o *AWSLoginRequest) SetNonce(v string)` +`func (o *AwsLoginRequest) SetNonce(v string)` SetNonce sets Nonce field to given value. ### HasNonce -`func (o *AWSLoginRequest) HasNonce() bool` +`func (o *AwsLoginRequest) HasNonce() bool` HasNonce returns a boolean if a field has been set. @@ -214,27 +214,27 @@ HasNonce returns a boolean if a field has been set. ### GetPkcs7 -`func (o *AWSLoginRequest) GetPkcs7() string` +`func (o *AwsLoginRequest) GetPkcs7() string` GetPkcs7 returns the Pkcs7 field if non-nil, zero value otherwise. ### GetPkcs7Ok -`func (o *AWSLoginRequest) GetPkcs7Ok() (*string, bool)` +`func (o *AwsLoginRequest) GetPkcs7Ok() (*string, bool)` GetPkcs7Ok returns a tuple with the Pkcs7 field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPkcs7 -`func (o *AWSLoginRequest) SetPkcs7(v string)` +`func (o *AwsLoginRequest) SetPkcs7(v string)` SetPkcs7 sets Pkcs7 field to given value. ### HasPkcs7 -`func (o *AWSLoginRequest) HasPkcs7() bool` +`func (o *AwsLoginRequest) HasPkcs7() bool` HasPkcs7 returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasPkcs7 returns a boolean if a field has been set. ### GetRole -`func (o *AWSLoginRequest) GetRole() string` +`func (o *AwsLoginRequest) GetRole() string` GetRole returns the Role field if non-nil, zero value otherwise. ### GetRoleOk -`func (o *AWSLoginRequest) GetRoleOk() (*string, bool)` +`func (o *AwsLoginRequest) GetRoleOk() (*string, bool)` GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRole -`func (o *AWSLoginRequest) SetRole(v string)` +`func (o *AwsLoginRequest) SetRole(v string)` SetRole sets Role field to given value. ### HasRole -`func (o *AWSLoginRequest) HasRole() bool` +`func (o *AwsLoginRequest) HasRole() bool` HasRole returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasRole returns a boolean if a field has been set. ### GetSignature -`func (o *AWSLoginRequest) GetSignature() string` +`func (o *AwsLoginRequest) GetSignature() string` GetSignature returns the Signature field if non-nil, zero value otherwise. ### GetSignatureOk -`func (o *AWSLoginRequest) GetSignatureOk() (*string, bool)` +`func (o *AwsLoginRequest) GetSignatureOk() (*string, bool)` GetSignatureOk returns a tuple with the Signature field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignature -`func (o *AWSLoginRequest) SetSignature(v string)` +`func (o *AwsLoginRequest) SetSignature(v string)` SetSignature sets Signature field to given value. ### HasSignature -`func (o *AWSLoginRequest) HasSignature() bool` +`func (o *AwsLoginRequest) HasSignature() bool` HasSignature returns a boolean if a field has been set. diff --git a/docs/AWSWriteAuthRoleRequest.md b/docs/AWSWriteAuthRoleRequest.md index 304ac1dc..0663473d 100644 --- a/docs/AWSWriteAuthRoleRequest.md +++ b/docs/AWSWriteAuthRoleRequest.md @@ -1,4 +1,4 @@ -# AWSWriteAuthRoleRequest +# AwsWriteAuthRoleRequest ## Properties @@ -40,47 +40,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteAuthRoleRequest +### NewAwsWriteAuthRoleRequest -`func NewAWSWriteAuthRoleRequest() *AWSWriteAuthRoleRequest` +`func NewAwsWriteAuthRoleRequest() *AwsWriteAuthRoleRequest` -NewAWSWriteAuthRoleRequest instantiates a new AWSWriteAuthRoleRequest object +NewAwsWriteAuthRoleRequest instantiates a new AwsWriteAuthRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteAuthRoleRequestWithDefaults +### NewAwsWriteAuthRoleRequestWithDefaults -`func NewAWSWriteAuthRoleRequestWithDefaults() *AWSWriteAuthRoleRequest` +`func NewAwsWriteAuthRoleRequestWithDefaults() *AwsWriteAuthRoleRequest` -NewAWSWriteAuthRoleRequestWithDefaults instantiates a new AWSWriteAuthRoleRequest object +NewAwsWriteAuthRoleRequestWithDefaults instantiates a new AwsWriteAuthRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowInstanceMigration -`func (o *AWSWriteAuthRoleRequest) GetAllowInstanceMigration() bool` +`func (o *AwsWriteAuthRoleRequest) GetAllowInstanceMigration() bool` GetAllowInstanceMigration returns the AllowInstanceMigration field if non-nil, zero value otherwise. ### GetAllowInstanceMigrationOk -`func (o *AWSWriteAuthRoleRequest) GetAllowInstanceMigrationOk() (*bool, bool)` +`func (o *AwsWriteAuthRoleRequest) GetAllowInstanceMigrationOk() (*bool, bool)` GetAllowInstanceMigrationOk returns a tuple with the AllowInstanceMigration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowInstanceMigration -`func (o *AWSWriteAuthRoleRequest) SetAllowInstanceMigration(v bool)` +`func (o *AwsWriteAuthRoleRequest) SetAllowInstanceMigration(v bool)` SetAllowInstanceMigration sets AllowInstanceMigration field to given value. ### HasAllowInstanceMigration -`func (o *AWSWriteAuthRoleRequest) HasAllowInstanceMigration() bool` +`func (o *AwsWriteAuthRoleRequest) HasAllowInstanceMigration() bool` HasAllowInstanceMigration returns a boolean if a field has been set. @@ -89,27 +89,27 @@ HasAllowInstanceMigration returns a boolean if a field has been set. ### GetAuthType -`func (o *AWSWriteAuthRoleRequest) GetAuthType() string` +`func (o *AwsWriteAuthRoleRequest) GetAuthType() string` GetAuthType returns the AuthType field if non-nil, zero value otherwise. ### GetAuthTypeOk -`func (o *AWSWriteAuthRoleRequest) GetAuthTypeOk() (*string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetAuthTypeOk() (*string, bool)` GetAuthTypeOk returns a tuple with the AuthType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAuthType -`func (o *AWSWriteAuthRoleRequest) SetAuthType(v string)` +`func (o *AwsWriteAuthRoleRequest) SetAuthType(v string)` SetAuthType sets AuthType field to given value. ### HasAuthType -`func (o *AWSWriteAuthRoleRequest) HasAuthType() bool` +`func (o *AwsWriteAuthRoleRequest) HasAuthType() bool` HasAuthType returns a boolean if a field has been set. @@ -118,27 +118,27 @@ HasAuthType returns a boolean if a field has been set. ### GetBoundAccountId -`func (o *AWSWriteAuthRoleRequest) GetBoundAccountId() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundAccountId() []string` GetBoundAccountId returns the BoundAccountId field if non-nil, zero value otherwise. ### GetBoundAccountIdOk -`func (o *AWSWriteAuthRoleRequest) GetBoundAccountIdOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundAccountIdOk() (*[]string, bool)` GetBoundAccountIdOk returns a tuple with the BoundAccountId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundAccountId -`func (o *AWSWriteAuthRoleRequest) SetBoundAccountId(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundAccountId(v []string)` SetBoundAccountId sets BoundAccountId field to given value. ### HasBoundAccountId -`func (o *AWSWriteAuthRoleRequest) HasBoundAccountId() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundAccountId() bool` HasBoundAccountId returns a boolean if a field has been set. @@ -147,27 +147,27 @@ HasBoundAccountId returns a boolean if a field has been set. ### GetBoundAmiId -`func (o *AWSWriteAuthRoleRequest) GetBoundAmiId() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundAmiId() []string` GetBoundAmiId returns the BoundAmiId field if non-nil, zero value otherwise. ### GetBoundAmiIdOk -`func (o *AWSWriteAuthRoleRequest) GetBoundAmiIdOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundAmiIdOk() (*[]string, bool)` GetBoundAmiIdOk returns a tuple with the BoundAmiId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundAmiId -`func (o *AWSWriteAuthRoleRequest) SetBoundAmiId(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundAmiId(v []string)` SetBoundAmiId sets BoundAmiId field to given value. ### HasBoundAmiId -`func (o *AWSWriteAuthRoleRequest) HasBoundAmiId() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundAmiId() bool` HasBoundAmiId returns a boolean if a field has been set. @@ -176,27 +176,27 @@ HasBoundAmiId returns a boolean if a field has been set. ### GetBoundEc2InstanceId -`func (o *AWSWriteAuthRoleRequest) GetBoundEc2InstanceId() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundEc2InstanceId() []string` GetBoundEc2InstanceId returns the BoundEc2InstanceId field if non-nil, zero value otherwise. ### GetBoundEc2InstanceIdOk -`func (o *AWSWriteAuthRoleRequest) GetBoundEc2InstanceIdOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundEc2InstanceIdOk() (*[]string, bool)` GetBoundEc2InstanceIdOk returns a tuple with the BoundEc2InstanceId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundEc2InstanceId -`func (o *AWSWriteAuthRoleRequest) SetBoundEc2InstanceId(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundEc2InstanceId(v []string)` SetBoundEc2InstanceId sets BoundEc2InstanceId field to given value. ### HasBoundEc2InstanceId -`func (o *AWSWriteAuthRoleRequest) HasBoundEc2InstanceId() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundEc2InstanceId() bool` HasBoundEc2InstanceId returns a boolean if a field has been set. @@ -205,27 +205,27 @@ HasBoundEc2InstanceId returns a boolean if a field has been set. ### GetBoundIamInstanceProfileArn -`func (o *AWSWriteAuthRoleRequest) GetBoundIamInstanceProfileArn() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundIamInstanceProfileArn() []string` GetBoundIamInstanceProfileArn returns the BoundIamInstanceProfileArn field if non-nil, zero value otherwise. ### GetBoundIamInstanceProfileArnOk -`func (o *AWSWriteAuthRoleRequest) GetBoundIamInstanceProfileArnOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundIamInstanceProfileArnOk() (*[]string, bool)` GetBoundIamInstanceProfileArnOk returns a tuple with the BoundIamInstanceProfileArn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundIamInstanceProfileArn -`func (o *AWSWriteAuthRoleRequest) SetBoundIamInstanceProfileArn(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundIamInstanceProfileArn(v []string)` SetBoundIamInstanceProfileArn sets BoundIamInstanceProfileArn field to given value. ### HasBoundIamInstanceProfileArn -`func (o *AWSWriteAuthRoleRequest) HasBoundIamInstanceProfileArn() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundIamInstanceProfileArn() bool` HasBoundIamInstanceProfileArn returns a boolean if a field has been set. @@ -234,27 +234,27 @@ HasBoundIamInstanceProfileArn returns a boolean if a field has been set. ### GetBoundIamPrincipalArn -`func (o *AWSWriteAuthRoleRequest) GetBoundIamPrincipalArn() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundIamPrincipalArn() []string` GetBoundIamPrincipalArn returns the BoundIamPrincipalArn field if non-nil, zero value otherwise. ### GetBoundIamPrincipalArnOk -`func (o *AWSWriteAuthRoleRequest) GetBoundIamPrincipalArnOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundIamPrincipalArnOk() (*[]string, bool)` GetBoundIamPrincipalArnOk returns a tuple with the BoundIamPrincipalArn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundIamPrincipalArn -`func (o *AWSWriteAuthRoleRequest) SetBoundIamPrincipalArn(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundIamPrincipalArn(v []string)` SetBoundIamPrincipalArn sets BoundIamPrincipalArn field to given value. ### HasBoundIamPrincipalArn -`func (o *AWSWriteAuthRoleRequest) HasBoundIamPrincipalArn() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundIamPrincipalArn() bool` HasBoundIamPrincipalArn returns a boolean if a field has been set. @@ -263,27 +263,27 @@ HasBoundIamPrincipalArn returns a boolean if a field has been set. ### GetBoundIamRoleArn -`func (o *AWSWriteAuthRoleRequest) GetBoundIamRoleArn() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundIamRoleArn() []string` GetBoundIamRoleArn returns the BoundIamRoleArn field if non-nil, zero value otherwise. ### GetBoundIamRoleArnOk -`func (o *AWSWriteAuthRoleRequest) GetBoundIamRoleArnOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundIamRoleArnOk() (*[]string, bool)` GetBoundIamRoleArnOk returns a tuple with the BoundIamRoleArn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundIamRoleArn -`func (o *AWSWriteAuthRoleRequest) SetBoundIamRoleArn(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundIamRoleArn(v []string)` SetBoundIamRoleArn sets BoundIamRoleArn field to given value. ### HasBoundIamRoleArn -`func (o *AWSWriteAuthRoleRequest) HasBoundIamRoleArn() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundIamRoleArn() bool` HasBoundIamRoleArn returns a boolean if a field has been set. @@ -292,27 +292,27 @@ HasBoundIamRoleArn returns a boolean if a field has been set. ### GetBoundRegion -`func (o *AWSWriteAuthRoleRequest) GetBoundRegion() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundRegion() []string` GetBoundRegion returns the BoundRegion field if non-nil, zero value otherwise. ### GetBoundRegionOk -`func (o *AWSWriteAuthRoleRequest) GetBoundRegionOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundRegionOk() (*[]string, bool)` GetBoundRegionOk returns a tuple with the BoundRegion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundRegion -`func (o *AWSWriteAuthRoleRequest) SetBoundRegion(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundRegion(v []string)` SetBoundRegion sets BoundRegion field to given value. ### HasBoundRegion -`func (o *AWSWriteAuthRoleRequest) HasBoundRegion() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundRegion() bool` HasBoundRegion returns a boolean if a field has been set. @@ -321,27 +321,27 @@ HasBoundRegion returns a boolean if a field has been set. ### GetBoundSubnetId -`func (o *AWSWriteAuthRoleRequest) GetBoundSubnetId() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundSubnetId() []string` GetBoundSubnetId returns the BoundSubnetId field if non-nil, zero value otherwise. ### GetBoundSubnetIdOk -`func (o *AWSWriteAuthRoleRequest) GetBoundSubnetIdOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundSubnetIdOk() (*[]string, bool)` GetBoundSubnetIdOk returns a tuple with the BoundSubnetId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundSubnetId -`func (o *AWSWriteAuthRoleRequest) SetBoundSubnetId(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundSubnetId(v []string)` SetBoundSubnetId sets BoundSubnetId field to given value. ### HasBoundSubnetId -`func (o *AWSWriteAuthRoleRequest) HasBoundSubnetId() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundSubnetId() bool` HasBoundSubnetId returns a boolean if a field has been set. @@ -350,27 +350,27 @@ HasBoundSubnetId returns a boolean if a field has been set. ### GetBoundVpcId -`func (o *AWSWriteAuthRoleRequest) GetBoundVpcId() []string` +`func (o *AwsWriteAuthRoleRequest) GetBoundVpcId() []string` GetBoundVpcId returns the BoundVpcId field if non-nil, zero value otherwise. ### GetBoundVpcIdOk -`func (o *AWSWriteAuthRoleRequest) GetBoundVpcIdOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetBoundVpcIdOk() (*[]string, bool)` GetBoundVpcIdOk returns a tuple with the BoundVpcId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundVpcId -`func (o *AWSWriteAuthRoleRequest) SetBoundVpcId(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetBoundVpcId(v []string)` SetBoundVpcId sets BoundVpcId field to given value. ### HasBoundVpcId -`func (o *AWSWriteAuthRoleRequest) HasBoundVpcId() bool` +`func (o *AwsWriteAuthRoleRequest) HasBoundVpcId() bool` HasBoundVpcId returns a boolean if a field has been set. @@ -379,27 +379,27 @@ HasBoundVpcId returns a boolean if a field has been set. ### GetDisallowReauthentication -`func (o *AWSWriteAuthRoleRequest) GetDisallowReauthentication() bool` +`func (o *AwsWriteAuthRoleRequest) GetDisallowReauthentication() bool` GetDisallowReauthentication returns the DisallowReauthentication field if non-nil, zero value otherwise. ### GetDisallowReauthenticationOk -`func (o *AWSWriteAuthRoleRequest) GetDisallowReauthenticationOk() (*bool, bool)` +`func (o *AwsWriteAuthRoleRequest) GetDisallowReauthenticationOk() (*bool, bool)` GetDisallowReauthenticationOk returns a tuple with the DisallowReauthentication field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisallowReauthentication -`func (o *AWSWriteAuthRoleRequest) SetDisallowReauthentication(v bool)` +`func (o *AwsWriteAuthRoleRequest) SetDisallowReauthentication(v bool)` SetDisallowReauthentication sets DisallowReauthentication field to given value. ### HasDisallowReauthentication -`func (o *AWSWriteAuthRoleRequest) HasDisallowReauthentication() bool` +`func (o *AwsWriteAuthRoleRequest) HasDisallowReauthentication() bool` HasDisallowReauthentication returns a boolean if a field has been set. @@ -408,27 +408,27 @@ HasDisallowReauthentication returns a boolean if a field has been set. ### GetInferredAwsRegion -`func (o *AWSWriteAuthRoleRequest) GetInferredAwsRegion() string` +`func (o *AwsWriteAuthRoleRequest) GetInferredAwsRegion() string` GetInferredAwsRegion returns the InferredAwsRegion field if non-nil, zero value otherwise. ### GetInferredAwsRegionOk -`func (o *AWSWriteAuthRoleRequest) GetInferredAwsRegionOk() (*string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetInferredAwsRegionOk() (*string, bool)` GetInferredAwsRegionOk returns a tuple with the InferredAwsRegion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInferredAwsRegion -`func (o *AWSWriteAuthRoleRequest) SetInferredAwsRegion(v string)` +`func (o *AwsWriteAuthRoleRequest) SetInferredAwsRegion(v string)` SetInferredAwsRegion sets InferredAwsRegion field to given value. ### HasInferredAwsRegion -`func (o *AWSWriteAuthRoleRequest) HasInferredAwsRegion() bool` +`func (o *AwsWriteAuthRoleRequest) HasInferredAwsRegion() bool` HasInferredAwsRegion returns a boolean if a field has been set. @@ -437,27 +437,27 @@ HasInferredAwsRegion returns a boolean if a field has been set. ### GetInferredEntityType -`func (o *AWSWriteAuthRoleRequest) GetInferredEntityType() string` +`func (o *AwsWriteAuthRoleRequest) GetInferredEntityType() string` GetInferredEntityType returns the InferredEntityType field if non-nil, zero value otherwise. ### GetInferredEntityTypeOk -`func (o *AWSWriteAuthRoleRequest) GetInferredEntityTypeOk() (*string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetInferredEntityTypeOk() (*string, bool)` GetInferredEntityTypeOk returns a tuple with the InferredEntityType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInferredEntityType -`func (o *AWSWriteAuthRoleRequest) SetInferredEntityType(v string)` +`func (o *AwsWriteAuthRoleRequest) SetInferredEntityType(v string)` SetInferredEntityType sets InferredEntityType field to given value. ### HasInferredEntityType -`func (o *AWSWriteAuthRoleRequest) HasInferredEntityType() bool` +`func (o *AwsWriteAuthRoleRequest) HasInferredEntityType() bool` HasInferredEntityType returns a boolean if a field has been set. @@ -466,27 +466,27 @@ HasInferredEntityType returns a boolean if a field has been set. ### GetMaxTtl -`func (o *AWSWriteAuthRoleRequest) GetMaxTtl() int32` +`func (o *AwsWriteAuthRoleRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *AWSWriteAuthRoleRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *AWSWriteAuthRoleRequest) SetMaxTtl(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *AWSWriteAuthRoleRequest) HasMaxTtl() bool` +`func (o *AwsWriteAuthRoleRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -495,27 +495,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetPeriod -`func (o *AWSWriteAuthRoleRequest) GetPeriod() int32` +`func (o *AwsWriteAuthRoleRequest) GetPeriod() int32` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *AWSWriteAuthRoleRequest) GetPeriodOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetPeriodOk() (*int32, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *AWSWriteAuthRoleRequest) SetPeriod(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetPeriod(v int32)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *AWSWriteAuthRoleRequest) HasPeriod() bool` +`func (o *AwsWriteAuthRoleRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -524,27 +524,27 @@ HasPeriod returns a boolean if a field has been set. ### GetPolicies -`func (o *AWSWriteAuthRoleRequest) GetPolicies() []string` +`func (o *AwsWriteAuthRoleRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *AWSWriteAuthRoleRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *AWSWriteAuthRoleRequest) SetPolicies(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *AWSWriteAuthRoleRequest) HasPolicies() bool` +`func (o *AwsWriteAuthRoleRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -553,27 +553,27 @@ HasPolicies returns a boolean if a field has been set. ### GetResolveAwsUniqueIds -`func (o *AWSWriteAuthRoleRequest) GetResolveAwsUniqueIds() bool` +`func (o *AwsWriteAuthRoleRequest) GetResolveAwsUniqueIds() bool` GetResolveAwsUniqueIds returns the ResolveAwsUniqueIds field if non-nil, zero value otherwise. ### GetResolveAwsUniqueIdsOk -`func (o *AWSWriteAuthRoleRequest) GetResolveAwsUniqueIdsOk() (*bool, bool)` +`func (o *AwsWriteAuthRoleRequest) GetResolveAwsUniqueIdsOk() (*bool, bool)` GetResolveAwsUniqueIdsOk returns a tuple with the ResolveAwsUniqueIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetResolveAwsUniqueIds -`func (o *AWSWriteAuthRoleRequest) SetResolveAwsUniqueIds(v bool)` +`func (o *AwsWriteAuthRoleRequest) SetResolveAwsUniqueIds(v bool)` SetResolveAwsUniqueIds sets ResolveAwsUniqueIds field to given value. ### HasResolveAwsUniqueIds -`func (o *AWSWriteAuthRoleRequest) HasResolveAwsUniqueIds() bool` +`func (o *AwsWriteAuthRoleRequest) HasResolveAwsUniqueIds() bool` HasResolveAwsUniqueIds returns a boolean if a field has been set. @@ -582,27 +582,27 @@ HasResolveAwsUniqueIds returns a boolean if a field has been set. ### GetRoleTag -`func (o *AWSWriteAuthRoleRequest) GetRoleTag() string` +`func (o *AwsWriteAuthRoleRequest) GetRoleTag() string` GetRoleTag returns the RoleTag field if non-nil, zero value otherwise. ### GetRoleTagOk -`func (o *AWSWriteAuthRoleRequest) GetRoleTagOk() (*string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetRoleTagOk() (*string, bool)` GetRoleTagOk returns a tuple with the RoleTag field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleTag -`func (o *AWSWriteAuthRoleRequest) SetRoleTag(v string)` +`func (o *AwsWriteAuthRoleRequest) SetRoleTag(v string)` SetRoleTag sets RoleTag field to given value. ### HasRoleTag -`func (o *AWSWriteAuthRoleRequest) HasRoleTag() bool` +`func (o *AwsWriteAuthRoleRequest) HasRoleTag() bool` HasRoleTag returns a boolean if a field has been set. @@ -611,27 +611,27 @@ HasRoleTag returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *AWSWriteAuthRoleRequest) GetTokenBoundCidrs() []string` +`func (o *AwsWriteAuthRoleRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *AWSWriteAuthRoleRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *AWSWriteAuthRoleRequest) SetTokenBoundCidrs(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *AWSWriteAuthRoleRequest) HasTokenBoundCidrs() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -640,27 +640,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *AWSWriteAuthRoleRequest) GetTokenExplicitMaxTtl() int32` +`func (o *AwsWriteAuthRoleRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *AWSWriteAuthRoleRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *AWSWriteAuthRoleRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *AWSWriteAuthRoleRequest) HasTokenExplicitMaxTtl() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -669,27 +669,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *AWSWriteAuthRoleRequest) GetTokenMaxTtl() int32` +`func (o *AwsWriteAuthRoleRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *AWSWriteAuthRoleRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *AWSWriteAuthRoleRequest) SetTokenMaxTtl(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *AWSWriteAuthRoleRequest) HasTokenMaxTtl() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -698,27 +698,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *AWSWriteAuthRoleRequest) GetTokenNoDefaultPolicy() bool` +`func (o *AwsWriteAuthRoleRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *AWSWriteAuthRoleRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *AWSWriteAuthRoleRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *AwsWriteAuthRoleRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *AWSWriteAuthRoleRequest) HasTokenNoDefaultPolicy() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -727,27 +727,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *AWSWriteAuthRoleRequest) GetTokenNumUses() int32` +`func (o *AwsWriteAuthRoleRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *AWSWriteAuthRoleRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *AWSWriteAuthRoleRequest) SetTokenNumUses(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *AWSWriteAuthRoleRequest) HasTokenNumUses() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -756,27 +756,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *AWSWriteAuthRoleRequest) GetTokenPeriod() int32` +`func (o *AwsWriteAuthRoleRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *AWSWriteAuthRoleRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *AWSWriteAuthRoleRequest) SetTokenPeriod(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *AWSWriteAuthRoleRequest) HasTokenPeriod() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -785,27 +785,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *AWSWriteAuthRoleRequest) GetTokenPolicies() []string` +`func (o *AwsWriteAuthRoleRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *AWSWriteAuthRoleRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *AWSWriteAuthRoleRequest) SetTokenPolicies(v []string)` +`func (o *AwsWriteAuthRoleRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *AWSWriteAuthRoleRequest) HasTokenPolicies() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -814,27 +814,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *AWSWriteAuthRoleRequest) GetTokenTtl() int32` +`func (o *AwsWriteAuthRoleRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *AWSWriteAuthRoleRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *AWSWriteAuthRoleRequest) SetTokenTtl(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *AWSWriteAuthRoleRequest) HasTokenTtl() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -843,27 +843,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *AWSWriteAuthRoleRequest) GetTokenType() string` +`func (o *AwsWriteAuthRoleRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *AWSWriteAuthRoleRequest) GetTokenTypeOk() (*string, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *AWSWriteAuthRoleRequest) SetTokenType(v string)` +`func (o *AwsWriteAuthRoleRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *AWSWriteAuthRoleRequest) HasTokenType() bool` +`func (o *AwsWriteAuthRoleRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -872,27 +872,27 @@ HasTokenType returns a boolean if a field has been set. ### GetTtl -`func (o *AWSWriteAuthRoleRequest) GetTtl() int32` +`func (o *AwsWriteAuthRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *AWSWriteAuthRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *AwsWriteAuthRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *AWSWriteAuthRoleRequest) SetTtl(v int32)` +`func (o *AwsWriteAuthRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *AWSWriteAuthRoleRequest) HasTtl() bool` +`func (o *AwsWriteAuthRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/AWSWriteRoleRequest.md b/docs/AWSWriteRoleRequest.md index e15e537e..b64791ea 100644 --- a/docs/AWSWriteRoleRequest.md +++ b/docs/AWSWriteRoleRequest.md @@ -1,4 +1,4 @@ -# AWSWriteRoleRequest +# AwsWriteRoleRequest ## Properties @@ -23,47 +23,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteRoleRequest +### NewAwsWriteRoleRequest -`func NewAWSWriteRoleRequest() *AWSWriteRoleRequest` +`func NewAwsWriteRoleRequest() *AwsWriteRoleRequest` -NewAWSWriteRoleRequest instantiates a new AWSWriteRoleRequest object +NewAwsWriteRoleRequest instantiates a new AwsWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteRoleRequestWithDefaults +### NewAwsWriteRoleRequestWithDefaults -`func NewAWSWriteRoleRequestWithDefaults() *AWSWriteRoleRequest` +`func NewAwsWriteRoleRequestWithDefaults() *AwsWriteRoleRequest` -NewAWSWriteRoleRequestWithDefaults instantiates a new AWSWriteRoleRequest object +NewAwsWriteRoleRequestWithDefaults instantiates a new AwsWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetArn -`func (o *AWSWriteRoleRequest) GetArn() string` +`func (o *AwsWriteRoleRequest) GetArn() string` GetArn returns the Arn field if non-nil, zero value otherwise. ### GetArnOk -`func (o *AWSWriteRoleRequest) GetArnOk() (*string, bool)` +`func (o *AwsWriteRoleRequest) GetArnOk() (*string, bool)` GetArnOk returns a tuple with the Arn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetArn -`func (o *AWSWriteRoleRequest) SetArn(v string)` +`func (o *AwsWriteRoleRequest) SetArn(v string)` SetArn sets Arn field to given value. ### HasArn -`func (o *AWSWriteRoleRequest) HasArn() bool` +`func (o *AwsWriteRoleRequest) HasArn() bool` HasArn returns a boolean if a field has been set. @@ -72,27 +72,27 @@ HasArn returns a boolean if a field has been set. ### GetCredentialType -`func (o *AWSWriteRoleRequest) GetCredentialType() string` +`func (o *AwsWriteRoleRequest) GetCredentialType() string` GetCredentialType returns the CredentialType field if non-nil, zero value otherwise. ### GetCredentialTypeOk -`func (o *AWSWriteRoleRequest) GetCredentialTypeOk() (*string, bool)` +`func (o *AwsWriteRoleRequest) GetCredentialTypeOk() (*string, bool)` GetCredentialTypeOk returns a tuple with the CredentialType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCredentialType -`func (o *AWSWriteRoleRequest) SetCredentialType(v string)` +`func (o *AwsWriteRoleRequest) SetCredentialType(v string)` SetCredentialType sets CredentialType field to given value. ### HasCredentialType -`func (o *AWSWriteRoleRequest) HasCredentialType() bool` +`func (o *AwsWriteRoleRequest) HasCredentialType() bool` HasCredentialType returns a boolean if a field has been set. @@ -101,27 +101,27 @@ HasCredentialType returns a boolean if a field has been set. ### GetDefaultStsTtl -`func (o *AWSWriteRoleRequest) GetDefaultStsTtl() int32` +`func (o *AwsWriteRoleRequest) GetDefaultStsTtl() int32` GetDefaultStsTtl returns the DefaultStsTtl field if non-nil, zero value otherwise. ### GetDefaultStsTtlOk -`func (o *AWSWriteRoleRequest) GetDefaultStsTtlOk() (*int32, bool)` +`func (o *AwsWriteRoleRequest) GetDefaultStsTtlOk() (*int32, bool)` GetDefaultStsTtlOk returns a tuple with the DefaultStsTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultStsTtl -`func (o *AWSWriteRoleRequest) SetDefaultStsTtl(v int32)` +`func (o *AwsWriteRoleRequest) SetDefaultStsTtl(v int32)` SetDefaultStsTtl sets DefaultStsTtl field to given value. ### HasDefaultStsTtl -`func (o *AWSWriteRoleRequest) HasDefaultStsTtl() bool` +`func (o *AwsWriteRoleRequest) HasDefaultStsTtl() bool` HasDefaultStsTtl returns a boolean if a field has been set. @@ -130,27 +130,27 @@ HasDefaultStsTtl returns a boolean if a field has been set. ### GetIamGroups -`func (o *AWSWriteRoleRequest) GetIamGroups() []string` +`func (o *AwsWriteRoleRequest) GetIamGroups() []string` GetIamGroups returns the IamGroups field if non-nil, zero value otherwise. ### GetIamGroupsOk -`func (o *AWSWriteRoleRequest) GetIamGroupsOk() (*[]string, bool)` +`func (o *AwsWriteRoleRequest) GetIamGroupsOk() (*[]string, bool)` GetIamGroupsOk returns a tuple with the IamGroups field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamGroups -`func (o *AWSWriteRoleRequest) SetIamGroups(v []string)` +`func (o *AwsWriteRoleRequest) SetIamGroups(v []string)` SetIamGroups sets IamGroups field to given value. ### HasIamGroups -`func (o *AWSWriteRoleRequest) HasIamGroups() bool` +`func (o *AwsWriteRoleRequest) HasIamGroups() bool` HasIamGroups returns a boolean if a field has been set. @@ -159,27 +159,27 @@ HasIamGroups returns a boolean if a field has been set. ### GetIamTags -`func (o *AWSWriteRoleRequest) GetIamTags() map[string]interface{}` +`func (o *AwsWriteRoleRequest) GetIamTags() map[string]interface{}` GetIamTags returns the IamTags field if non-nil, zero value otherwise. ### GetIamTagsOk -`func (o *AWSWriteRoleRequest) GetIamTagsOk() (*map[string]interface{}, bool)` +`func (o *AwsWriteRoleRequest) GetIamTagsOk() (*map[string]interface{}, bool)` GetIamTagsOk returns a tuple with the IamTags field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamTags -`func (o *AWSWriteRoleRequest) SetIamTags(v map[string]interface{})` +`func (o *AwsWriteRoleRequest) SetIamTags(v map[string]interface{})` SetIamTags sets IamTags field to given value. ### HasIamTags -`func (o *AWSWriteRoleRequest) HasIamTags() bool` +`func (o *AwsWriteRoleRequest) HasIamTags() bool` HasIamTags returns a boolean if a field has been set. @@ -188,27 +188,27 @@ HasIamTags returns a boolean if a field has been set. ### GetMaxStsTtl -`func (o *AWSWriteRoleRequest) GetMaxStsTtl() int32` +`func (o *AwsWriteRoleRequest) GetMaxStsTtl() int32` GetMaxStsTtl returns the MaxStsTtl field if non-nil, zero value otherwise. ### GetMaxStsTtlOk -`func (o *AWSWriteRoleRequest) GetMaxStsTtlOk() (*int32, bool)` +`func (o *AwsWriteRoleRequest) GetMaxStsTtlOk() (*int32, bool)` GetMaxStsTtlOk returns a tuple with the MaxStsTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxStsTtl -`func (o *AWSWriteRoleRequest) SetMaxStsTtl(v int32)` +`func (o *AwsWriteRoleRequest) SetMaxStsTtl(v int32)` SetMaxStsTtl sets MaxStsTtl field to given value. ### HasMaxStsTtl -`func (o *AWSWriteRoleRequest) HasMaxStsTtl() bool` +`func (o *AwsWriteRoleRequest) HasMaxStsTtl() bool` HasMaxStsTtl returns a boolean if a field has been set. @@ -217,27 +217,27 @@ HasMaxStsTtl returns a boolean if a field has been set. ### GetPermissionsBoundaryArn -`func (o *AWSWriteRoleRequest) GetPermissionsBoundaryArn() string` +`func (o *AwsWriteRoleRequest) GetPermissionsBoundaryArn() string` GetPermissionsBoundaryArn returns the PermissionsBoundaryArn field if non-nil, zero value otherwise. ### GetPermissionsBoundaryArnOk -`func (o *AWSWriteRoleRequest) GetPermissionsBoundaryArnOk() (*string, bool)` +`func (o *AwsWriteRoleRequest) GetPermissionsBoundaryArnOk() (*string, bool)` GetPermissionsBoundaryArnOk returns a tuple with the PermissionsBoundaryArn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPermissionsBoundaryArn -`func (o *AWSWriteRoleRequest) SetPermissionsBoundaryArn(v string)` +`func (o *AwsWriteRoleRequest) SetPermissionsBoundaryArn(v string)` SetPermissionsBoundaryArn sets PermissionsBoundaryArn field to given value. ### HasPermissionsBoundaryArn -`func (o *AWSWriteRoleRequest) HasPermissionsBoundaryArn() bool` +`func (o *AwsWriteRoleRequest) HasPermissionsBoundaryArn() bool` HasPermissionsBoundaryArn returns a boolean if a field has been set. @@ -246,27 +246,27 @@ HasPermissionsBoundaryArn returns a boolean if a field has been set. ### GetPolicy -`func (o *AWSWriteRoleRequest) GetPolicy() string` +`func (o *AwsWriteRoleRequest) GetPolicy() string` GetPolicy returns the Policy field if non-nil, zero value otherwise. ### GetPolicyOk -`func (o *AWSWriteRoleRequest) GetPolicyOk() (*string, bool)` +`func (o *AwsWriteRoleRequest) GetPolicyOk() (*string, bool)` GetPolicyOk returns a tuple with the Policy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicy -`func (o *AWSWriteRoleRequest) SetPolicy(v string)` +`func (o *AwsWriteRoleRequest) SetPolicy(v string)` SetPolicy sets Policy field to given value. ### HasPolicy -`func (o *AWSWriteRoleRequest) HasPolicy() bool` +`func (o *AwsWriteRoleRequest) HasPolicy() bool` HasPolicy returns a boolean if a field has been set. @@ -275,27 +275,27 @@ HasPolicy returns a boolean if a field has been set. ### GetPolicyArns -`func (o *AWSWriteRoleRequest) GetPolicyArns() []string` +`func (o *AwsWriteRoleRequest) GetPolicyArns() []string` GetPolicyArns returns the PolicyArns field if non-nil, zero value otherwise. ### GetPolicyArnsOk -`func (o *AWSWriteRoleRequest) GetPolicyArnsOk() (*[]string, bool)` +`func (o *AwsWriteRoleRequest) GetPolicyArnsOk() (*[]string, bool)` GetPolicyArnsOk returns a tuple with the PolicyArns field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicyArns -`func (o *AWSWriteRoleRequest) SetPolicyArns(v []string)` +`func (o *AwsWriteRoleRequest) SetPolicyArns(v []string)` SetPolicyArns sets PolicyArns field to given value. ### HasPolicyArns -`func (o *AWSWriteRoleRequest) HasPolicyArns() bool` +`func (o *AwsWriteRoleRequest) HasPolicyArns() bool` HasPolicyArns returns a boolean if a field has been set. @@ -304,27 +304,27 @@ HasPolicyArns returns a boolean if a field has been set. ### GetPolicyDocument -`func (o *AWSWriteRoleRequest) GetPolicyDocument() string` +`func (o *AwsWriteRoleRequest) GetPolicyDocument() string` GetPolicyDocument returns the PolicyDocument field if non-nil, zero value otherwise. ### GetPolicyDocumentOk -`func (o *AWSWriteRoleRequest) GetPolicyDocumentOk() (*string, bool)` +`func (o *AwsWriteRoleRequest) GetPolicyDocumentOk() (*string, bool)` GetPolicyDocumentOk returns a tuple with the PolicyDocument field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicyDocument -`func (o *AWSWriteRoleRequest) SetPolicyDocument(v string)` +`func (o *AwsWriteRoleRequest) SetPolicyDocument(v string)` SetPolicyDocument sets PolicyDocument field to given value. ### HasPolicyDocument -`func (o *AWSWriteRoleRequest) HasPolicyDocument() bool` +`func (o *AwsWriteRoleRequest) HasPolicyDocument() bool` HasPolicyDocument returns a boolean if a field has been set. @@ -333,27 +333,27 @@ HasPolicyDocument returns a boolean if a field has been set. ### GetRoleArns -`func (o *AWSWriteRoleRequest) GetRoleArns() []string` +`func (o *AwsWriteRoleRequest) GetRoleArns() []string` GetRoleArns returns the RoleArns field if non-nil, zero value otherwise. ### GetRoleArnsOk -`func (o *AWSWriteRoleRequest) GetRoleArnsOk() (*[]string, bool)` +`func (o *AwsWriteRoleRequest) GetRoleArnsOk() (*[]string, bool)` GetRoleArnsOk returns a tuple with the RoleArns field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleArns -`func (o *AWSWriteRoleRequest) SetRoleArns(v []string)` +`func (o *AwsWriteRoleRequest) SetRoleArns(v []string)` SetRoleArns sets RoleArns field to given value. ### HasRoleArns -`func (o *AWSWriteRoleRequest) HasRoleArns() bool` +`func (o *AwsWriteRoleRequest) HasRoleArns() bool` HasRoleArns returns a boolean if a field has been set. @@ -362,27 +362,27 @@ HasRoleArns returns a boolean if a field has been set. ### GetUserPath -`func (o *AWSWriteRoleRequest) GetUserPath() string` +`func (o *AwsWriteRoleRequest) GetUserPath() string` GetUserPath returns the UserPath field if non-nil, zero value otherwise. ### GetUserPathOk -`func (o *AWSWriteRoleRequest) GetUserPathOk() (*string, bool)` +`func (o *AwsWriteRoleRequest) GetUserPathOk() (*string, bool)` GetUserPathOk returns a tuple with the UserPath field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserPath -`func (o *AWSWriteRoleRequest) SetUserPath(v string)` +`func (o *AwsWriteRoleRequest) SetUserPath(v string)` SetUserPath sets UserPath field to given value. ### HasUserPath -`func (o *AWSWriteRoleRequest) HasUserPath() bool` +`func (o *AwsWriteRoleRequest) HasUserPath() bool` HasUserPath returns a boolean if a field has been set. diff --git a/docs/ActiveDirectoryCheckInLibraryRequest.md b/docs/ActiveDirectoryCheckInLibraryRequest.md deleted file mode 100644 index 79a511ad..00000000 --- a/docs/ActiveDirectoryCheckInLibraryRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# ActiveDirectoryCheckInLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ServiceAccountNames** | Pointer to **[]string** | The username/logon name for the service accounts to check in. | [optional] - - - -## Methods - - -### NewActiveDirectoryCheckInLibraryRequest - -`func NewActiveDirectoryCheckInLibraryRequest() *ActiveDirectoryCheckInLibraryRequest` - -NewActiveDirectoryCheckInLibraryRequest instantiates a new ActiveDirectoryCheckInLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewActiveDirectoryCheckInLibraryRequestWithDefaults - -`func NewActiveDirectoryCheckInLibraryRequestWithDefaults() *ActiveDirectoryCheckInLibraryRequest` - -NewActiveDirectoryCheckInLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckInLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetServiceAccountNames - -`func (o *ActiveDirectoryCheckInLibraryRequest) GetServiceAccountNames() []string` - -GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. - -### GetServiceAccountNamesOk - -`func (o *ActiveDirectoryCheckInLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` - -GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetServiceAccountNames - -`func (o *ActiveDirectoryCheckInLibraryRequest) SetServiceAccountNames(v []string)` - -SetServiceAccountNames sets ServiceAccountNames field to given value. - - -### HasServiceAccountNames - -`func (o *ActiveDirectoryCheckInLibraryRequest) HasServiceAccountNames() bool` - -HasServiceAccountNames returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ActiveDirectoryCheckInManageLibraryRequest.md b/docs/ActiveDirectoryCheckInManageLibraryRequest.md deleted file mode 100644 index f094e599..00000000 --- a/docs/ActiveDirectoryCheckInManageLibraryRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# ActiveDirectoryCheckInManageLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ServiceAccountNames** | Pointer to **[]string** | The username/logon name for the service accounts to check in. | [optional] - - - -## Methods - - -### NewActiveDirectoryCheckInManageLibraryRequest - -`func NewActiveDirectoryCheckInManageLibraryRequest() *ActiveDirectoryCheckInManageLibraryRequest` - -NewActiveDirectoryCheckInManageLibraryRequest instantiates a new ActiveDirectoryCheckInManageLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewActiveDirectoryCheckInManageLibraryRequestWithDefaults - -`func NewActiveDirectoryCheckInManageLibraryRequestWithDefaults() *ActiveDirectoryCheckInManageLibraryRequest` - -NewActiveDirectoryCheckInManageLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckInManageLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetServiceAccountNames - -`func (o *ActiveDirectoryCheckInManageLibraryRequest) GetServiceAccountNames() []string` - -GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. - -### GetServiceAccountNamesOk - -`func (o *ActiveDirectoryCheckInManageLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` - -GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetServiceAccountNames - -`func (o *ActiveDirectoryCheckInManageLibraryRequest) SetServiceAccountNames(v []string)` - -SetServiceAccountNames sets ServiceAccountNames field to given value. - - -### HasServiceAccountNames - -`func (o *ActiveDirectoryCheckInManageLibraryRequest) HasServiceAccountNames() bool` - -HasServiceAccountNames returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ActiveDirectoryCheckOutLibraryRequest.md b/docs/ActiveDirectoryCheckOutLibraryRequest.md deleted file mode 100644 index 5d99cb55..00000000 --- a/docs/ActiveDirectoryCheckOutLibraryRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# ActiveDirectoryCheckOutLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Ttl** | Pointer to **int32** | The length of time before the check-out will expire, in seconds. | [optional] - - - -## Methods - - -### NewActiveDirectoryCheckOutLibraryRequest - -`func NewActiveDirectoryCheckOutLibraryRequest() *ActiveDirectoryCheckOutLibraryRequest` - -NewActiveDirectoryCheckOutLibraryRequest instantiates a new ActiveDirectoryCheckOutLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewActiveDirectoryCheckOutLibraryRequestWithDefaults - -`func NewActiveDirectoryCheckOutLibraryRequestWithDefaults() *ActiveDirectoryCheckOutLibraryRequest` - -NewActiveDirectoryCheckOutLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckOutLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetTtl - -`func (o *ActiveDirectoryCheckOutLibraryRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *ActiveDirectoryCheckOutLibraryRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *ActiveDirectoryCheckOutLibraryRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *ActiveDirectoryCheckOutLibraryRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ActiveDirectoryWriteConfigRequest.md b/docs/ActiveDirectoryWriteConfigRequest.md deleted file mode 100644 index b9452e10..00000000 --- a/docs/ActiveDirectoryWriteConfigRequest.md +++ /dev/null @@ -1,969 +0,0 @@ -# ActiveDirectoryWriteConfigRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**AnonymousGroupSearch** | Pointer to **bool** | Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). | [optional] [default to false] -**Binddn** | Pointer to **string** | LDAP DN for searching for the user DN (optional) | [optional] -**Bindpass** | Pointer to **string** | LDAP password for searching for the user DN (optional) | [optional] -**CaseSensitiveNames** | Pointer to **bool** | If true, case sensitivity will be used when comparing usernames and groups for matching policies. | [optional] -**Certificate** | Pointer to **string** | CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) | [optional] -**ClientTlsCert** | Pointer to **string** | Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] -**ClientTlsKey** | Pointer to **string** | Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] -**DenyNullBind** | Pointer to **bool** | Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true | [optional] [default to true] -**Discoverdn** | Pointer to **bool** | Use anonymous bind to discover the bind DN of a user (optional) | [optional] -**Formatter** | Pointer to **string** | Text to insert the password into, ex. \"customPrefix{{PASSWORD}}customSuffix\". | [optional] -**Groupattr** | Pointer to **string** | LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn | [optional] [default to "cn"] -**Groupdn** | Pointer to **string** | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) | [optional] -**Groupfilter** | Pointer to **string** | Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) | [optional] [default to "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))"] -**InsecureTls** | Pointer to **bool** | Skip LDAP server SSL Certificate verification - VERY insecure (optional) | [optional] -**LastRotationTolerance** | Pointer to **int32** | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | [optional] [default to 5] -**Length** | Pointer to **int32** | The desired length of passwords that Vault generates. | [optional] [default to 64] -**MaxTtl** | Pointer to **int32** | In seconds, the maximum password time-to-live. | [optional] -**PasswordPolicy** | Pointer to **string** | Name of the password policy to use to generate passwords. | [optional] -**RequestTimeout** | Pointer to **int32** | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | [optional] -**Starttls** | Pointer to **bool** | Issue a StartTLS command after establishing unencrypted connection (optional) | [optional] -**TlsMaxVersion** | Pointer to **string** | Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' | [optional] [default to "tls12"] -**TlsMinVersion** | Pointer to **string** | Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' | [optional] [default to "tls12"] -**Ttl** | Pointer to **int32** | In seconds, the default password time-to-live. | [optional] -**Upndomain** | Pointer to **string** | Enables userPrincipalDomain login with [username]@UPNDomain (optional) | [optional] -**Url** | Pointer to **string** | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | [optional] [default to "ldap://127.0.0.1"] -**UsePre111GroupCnBehavior** | Pointer to **bool** | In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. | [optional] -**UseTokenGroups** | Pointer to **bool** | If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. | [optional] [default to false] -**Userattr** | Pointer to **string** | Attribute used for users (default: cn) | [optional] [default to "cn"] -**Userdn** | Pointer to **string** | LDAP domain to use for users (eg: ou=People,dc=example,dc=org) | [optional] -**Userfilter** | Pointer to **string** | Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) | [optional] [default to "({{.UserAttr}}={{.Username}})"] -**UsernameAsAlias** | Pointer to **bool** | If true, sets the alias name to the username | [optional] [default to false] - - - -## Methods - - -### NewActiveDirectoryWriteConfigRequest - -`func NewActiveDirectoryWriteConfigRequest() *ActiveDirectoryWriteConfigRequest` - -NewActiveDirectoryWriteConfigRequest instantiates a new ActiveDirectoryWriteConfigRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewActiveDirectoryWriteConfigRequestWithDefaults - -`func NewActiveDirectoryWriteConfigRequestWithDefaults() *ActiveDirectoryWriteConfigRequest` - -NewActiveDirectoryWriteConfigRequestWithDefaults instantiates a new ActiveDirectoryWriteConfigRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetAnonymousGroupSearch - -`func (o *ActiveDirectoryWriteConfigRequest) GetAnonymousGroupSearch() bool` - -GetAnonymousGroupSearch returns the AnonymousGroupSearch field if non-nil, zero value otherwise. - -### GetAnonymousGroupSearchOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetAnonymousGroupSearchOk() (*bool, bool)` - -GetAnonymousGroupSearchOk returns a tuple with the AnonymousGroupSearch field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetAnonymousGroupSearch - -`func (o *ActiveDirectoryWriteConfigRequest) SetAnonymousGroupSearch(v bool)` - -SetAnonymousGroupSearch sets AnonymousGroupSearch field to given value. - - -### HasAnonymousGroupSearch - -`func (o *ActiveDirectoryWriteConfigRequest) HasAnonymousGroupSearch() bool` - -HasAnonymousGroupSearch returns a boolean if a field has been set. - - - - -### GetBinddn - -`func (o *ActiveDirectoryWriteConfigRequest) GetBinddn() string` - -GetBinddn returns the Binddn field if non-nil, zero value otherwise. - -### GetBinddnOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetBinddnOk() (*string, bool)` - -GetBinddnOk returns a tuple with the Binddn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBinddn - -`func (o *ActiveDirectoryWriteConfigRequest) SetBinddn(v string)` - -SetBinddn sets Binddn field to given value. - - -### HasBinddn - -`func (o *ActiveDirectoryWriteConfigRequest) HasBinddn() bool` - -HasBinddn returns a boolean if a field has been set. - - - - -### GetBindpass - -`func (o *ActiveDirectoryWriteConfigRequest) GetBindpass() string` - -GetBindpass returns the Bindpass field if non-nil, zero value otherwise. - -### GetBindpassOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetBindpassOk() (*string, bool)` - -GetBindpassOk returns a tuple with the Bindpass field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBindpass - -`func (o *ActiveDirectoryWriteConfigRequest) SetBindpass(v string)` - -SetBindpass sets Bindpass field to given value. - - -### HasBindpass - -`func (o *ActiveDirectoryWriteConfigRequest) HasBindpass() bool` - -HasBindpass returns a boolean if a field has been set. - - - - -### GetCaseSensitiveNames - -`func (o *ActiveDirectoryWriteConfigRequest) GetCaseSensitiveNames() bool` - -GetCaseSensitiveNames returns the CaseSensitiveNames field if non-nil, zero value otherwise. - -### GetCaseSensitiveNamesOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetCaseSensitiveNamesOk() (*bool, bool)` - -GetCaseSensitiveNamesOk returns a tuple with the CaseSensitiveNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCaseSensitiveNames - -`func (o *ActiveDirectoryWriteConfigRequest) SetCaseSensitiveNames(v bool)` - -SetCaseSensitiveNames sets CaseSensitiveNames field to given value. - - -### HasCaseSensitiveNames - -`func (o *ActiveDirectoryWriteConfigRequest) HasCaseSensitiveNames() bool` - -HasCaseSensitiveNames returns a boolean if a field has been set. - - - - -### GetCertificate - -`func (o *ActiveDirectoryWriteConfigRequest) GetCertificate() string` - -GetCertificate returns the Certificate field if non-nil, zero value otherwise. - -### GetCertificateOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetCertificateOk() (*string, bool)` - -GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCertificate - -`func (o *ActiveDirectoryWriteConfigRequest) SetCertificate(v string)` - -SetCertificate sets Certificate field to given value. - - -### HasCertificate - -`func (o *ActiveDirectoryWriteConfigRequest) HasCertificate() bool` - -HasCertificate returns a boolean if a field has been set. - - - - -### GetClientTlsCert - -`func (o *ActiveDirectoryWriteConfigRequest) GetClientTlsCert() string` - -GetClientTlsCert returns the ClientTlsCert field if non-nil, zero value otherwise. - -### GetClientTlsCertOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetClientTlsCertOk() (*string, bool)` - -GetClientTlsCertOk returns a tuple with the ClientTlsCert field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClientTlsCert - -`func (o *ActiveDirectoryWriteConfigRequest) SetClientTlsCert(v string)` - -SetClientTlsCert sets ClientTlsCert field to given value. - - -### HasClientTlsCert - -`func (o *ActiveDirectoryWriteConfigRequest) HasClientTlsCert() bool` - -HasClientTlsCert returns a boolean if a field has been set. - - - - -### GetClientTlsKey - -`func (o *ActiveDirectoryWriteConfigRequest) GetClientTlsKey() string` - -GetClientTlsKey returns the ClientTlsKey field if non-nil, zero value otherwise. - -### GetClientTlsKeyOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetClientTlsKeyOk() (*string, bool)` - -GetClientTlsKeyOk returns a tuple with the ClientTlsKey field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClientTlsKey - -`func (o *ActiveDirectoryWriteConfigRequest) SetClientTlsKey(v string)` - -SetClientTlsKey sets ClientTlsKey field to given value. - - -### HasClientTlsKey - -`func (o *ActiveDirectoryWriteConfigRequest) HasClientTlsKey() bool` - -HasClientTlsKey returns a boolean if a field has been set. - - - - -### GetDenyNullBind - -`func (o *ActiveDirectoryWriteConfigRequest) GetDenyNullBind() bool` - -GetDenyNullBind returns the DenyNullBind field if non-nil, zero value otherwise. - -### GetDenyNullBindOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetDenyNullBindOk() (*bool, bool)` - -GetDenyNullBindOk returns a tuple with the DenyNullBind field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDenyNullBind - -`func (o *ActiveDirectoryWriteConfigRequest) SetDenyNullBind(v bool)` - -SetDenyNullBind sets DenyNullBind field to given value. - - -### HasDenyNullBind - -`func (o *ActiveDirectoryWriteConfigRequest) HasDenyNullBind() bool` - -HasDenyNullBind returns a boolean if a field has been set. - - - - -### GetDiscoverdn - -`func (o *ActiveDirectoryWriteConfigRequest) GetDiscoverdn() bool` - -GetDiscoverdn returns the Discoverdn field if non-nil, zero value otherwise. - -### GetDiscoverdnOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetDiscoverdnOk() (*bool, bool)` - -GetDiscoverdnOk returns a tuple with the Discoverdn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDiscoverdn - -`func (o *ActiveDirectoryWriteConfigRequest) SetDiscoverdn(v bool)` - -SetDiscoverdn sets Discoverdn field to given value. - - -### HasDiscoverdn - -`func (o *ActiveDirectoryWriteConfigRequest) HasDiscoverdn() bool` - -HasDiscoverdn returns a boolean if a field has been set. - - - - -### GetFormatter - -`func (o *ActiveDirectoryWriteConfigRequest) GetFormatter() string` - -GetFormatter returns the Formatter field if non-nil, zero value otherwise. - -### GetFormatterOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetFormatterOk() (*string, bool)` - -GetFormatterOk returns a tuple with the Formatter field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetFormatter - -`func (o *ActiveDirectoryWriteConfigRequest) SetFormatter(v string)` - -SetFormatter sets Formatter field to given value. - - -### HasFormatter - -`func (o *ActiveDirectoryWriteConfigRequest) HasFormatter() bool` - -HasFormatter returns a boolean if a field has been set. - - - - -### GetGroupattr - -`func (o *ActiveDirectoryWriteConfigRequest) GetGroupattr() string` - -GetGroupattr returns the Groupattr field if non-nil, zero value otherwise. - -### GetGroupattrOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetGroupattrOk() (*string, bool)` - -GetGroupattrOk returns a tuple with the Groupattr field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetGroupattr - -`func (o *ActiveDirectoryWriteConfigRequest) SetGroupattr(v string)` - -SetGroupattr sets Groupattr field to given value. - - -### HasGroupattr - -`func (o *ActiveDirectoryWriteConfigRequest) HasGroupattr() bool` - -HasGroupattr returns a boolean if a field has been set. - - - - -### GetGroupdn - -`func (o *ActiveDirectoryWriteConfigRequest) GetGroupdn() string` - -GetGroupdn returns the Groupdn field if non-nil, zero value otherwise. - -### GetGroupdnOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetGroupdnOk() (*string, bool)` - -GetGroupdnOk returns a tuple with the Groupdn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetGroupdn - -`func (o *ActiveDirectoryWriteConfigRequest) SetGroupdn(v string)` - -SetGroupdn sets Groupdn field to given value. - - -### HasGroupdn - -`func (o *ActiveDirectoryWriteConfigRequest) HasGroupdn() bool` - -HasGroupdn returns a boolean if a field has been set. - - - - -### GetGroupfilter - -`func (o *ActiveDirectoryWriteConfigRequest) GetGroupfilter() string` - -GetGroupfilter returns the Groupfilter field if non-nil, zero value otherwise. - -### GetGroupfilterOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetGroupfilterOk() (*string, bool)` - -GetGroupfilterOk returns a tuple with the Groupfilter field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetGroupfilter - -`func (o *ActiveDirectoryWriteConfigRequest) SetGroupfilter(v string)` - -SetGroupfilter sets Groupfilter field to given value. - - -### HasGroupfilter - -`func (o *ActiveDirectoryWriteConfigRequest) HasGroupfilter() bool` - -HasGroupfilter returns a boolean if a field has been set. - - - - -### GetInsecureTls - -`func (o *ActiveDirectoryWriteConfigRequest) GetInsecureTls() bool` - -GetInsecureTls returns the InsecureTls field if non-nil, zero value otherwise. - -### GetInsecureTlsOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetInsecureTlsOk() (*bool, bool)` - -GetInsecureTlsOk returns a tuple with the InsecureTls field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetInsecureTls - -`func (o *ActiveDirectoryWriteConfigRequest) SetInsecureTls(v bool)` - -SetInsecureTls sets InsecureTls field to given value. - - -### HasInsecureTls - -`func (o *ActiveDirectoryWriteConfigRequest) HasInsecureTls() bool` - -HasInsecureTls returns a boolean if a field has been set. - - - - -### GetLastRotationTolerance - -`func (o *ActiveDirectoryWriteConfigRequest) GetLastRotationTolerance() int32` - -GetLastRotationTolerance returns the LastRotationTolerance field if non-nil, zero value otherwise. - -### GetLastRotationToleranceOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetLastRotationToleranceOk() (*int32, bool)` - -GetLastRotationToleranceOk returns a tuple with the LastRotationTolerance field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetLastRotationTolerance - -`func (o *ActiveDirectoryWriteConfigRequest) SetLastRotationTolerance(v int32)` - -SetLastRotationTolerance sets LastRotationTolerance field to given value. - - -### HasLastRotationTolerance - -`func (o *ActiveDirectoryWriteConfigRequest) HasLastRotationTolerance() bool` - -HasLastRotationTolerance returns a boolean if a field has been set. - - - - -### GetLength - -`func (o *ActiveDirectoryWriteConfigRequest) GetLength() int32` - -GetLength returns the Length field if non-nil, zero value otherwise. - -### GetLengthOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetLengthOk() (*int32, bool)` - -GetLengthOk returns a tuple with the Length field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetLength - -`func (o *ActiveDirectoryWriteConfigRequest) SetLength(v int32)` - -SetLength sets Length field to given value. - - -### HasLength - -`func (o *ActiveDirectoryWriteConfigRequest) HasLength() bool` - -HasLength returns a boolean if a field has been set. - - - - -### GetMaxTtl - -`func (o *ActiveDirectoryWriteConfigRequest) GetMaxTtl() int32` - -GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. - -### GetMaxTtlOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetMaxTtlOk() (*int32, bool)` - -GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetMaxTtl - -`func (o *ActiveDirectoryWriteConfigRequest) SetMaxTtl(v int32)` - -SetMaxTtl sets MaxTtl field to given value. - - -### HasMaxTtl - -`func (o *ActiveDirectoryWriteConfigRequest) HasMaxTtl() bool` - -HasMaxTtl returns a boolean if a field has been set. - - - - -### GetPasswordPolicy - -`func (o *ActiveDirectoryWriteConfigRequest) GetPasswordPolicy() string` - -GetPasswordPolicy returns the PasswordPolicy field if non-nil, zero value otherwise. - -### GetPasswordPolicyOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetPasswordPolicyOk() (*string, bool)` - -GetPasswordPolicyOk returns a tuple with the PasswordPolicy field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetPasswordPolicy - -`func (o *ActiveDirectoryWriteConfigRequest) SetPasswordPolicy(v string)` - -SetPasswordPolicy sets PasswordPolicy field to given value. - - -### HasPasswordPolicy - -`func (o *ActiveDirectoryWriteConfigRequest) HasPasswordPolicy() bool` - -HasPasswordPolicy returns a boolean if a field has been set. - - - - -### GetRequestTimeout - -`func (o *ActiveDirectoryWriteConfigRequest) GetRequestTimeout() int32` - -GetRequestTimeout returns the RequestTimeout field if non-nil, zero value otherwise. - -### GetRequestTimeoutOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetRequestTimeoutOk() (*int32, bool)` - -GetRequestTimeoutOk returns a tuple with the RequestTimeout field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRequestTimeout - -`func (o *ActiveDirectoryWriteConfigRequest) SetRequestTimeout(v int32)` - -SetRequestTimeout sets RequestTimeout field to given value. - - -### HasRequestTimeout - -`func (o *ActiveDirectoryWriteConfigRequest) HasRequestTimeout() bool` - -HasRequestTimeout returns a boolean if a field has been set. - - - - -### GetStarttls - -`func (o *ActiveDirectoryWriteConfigRequest) GetStarttls() bool` - -GetStarttls returns the Starttls field if non-nil, zero value otherwise. - -### GetStarttlsOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetStarttlsOk() (*bool, bool)` - -GetStarttlsOk returns a tuple with the Starttls field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetStarttls - -`func (o *ActiveDirectoryWriteConfigRequest) SetStarttls(v bool)` - -SetStarttls sets Starttls field to given value. - - -### HasStarttls - -`func (o *ActiveDirectoryWriteConfigRequest) HasStarttls() bool` - -HasStarttls returns a boolean if a field has been set. - - - - -### GetTlsMaxVersion - -`func (o *ActiveDirectoryWriteConfigRequest) GetTlsMaxVersion() string` - -GetTlsMaxVersion returns the TlsMaxVersion field if non-nil, zero value otherwise. - -### GetTlsMaxVersionOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetTlsMaxVersionOk() (*string, bool)` - -GetTlsMaxVersionOk returns a tuple with the TlsMaxVersion field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTlsMaxVersion - -`func (o *ActiveDirectoryWriteConfigRequest) SetTlsMaxVersion(v string)` - -SetTlsMaxVersion sets TlsMaxVersion field to given value. - - -### HasTlsMaxVersion - -`func (o *ActiveDirectoryWriteConfigRequest) HasTlsMaxVersion() bool` - -HasTlsMaxVersion returns a boolean if a field has been set. - - - - -### GetTlsMinVersion - -`func (o *ActiveDirectoryWriteConfigRequest) GetTlsMinVersion() string` - -GetTlsMinVersion returns the TlsMinVersion field if non-nil, zero value otherwise. - -### GetTlsMinVersionOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetTlsMinVersionOk() (*string, bool)` - -GetTlsMinVersionOk returns a tuple with the TlsMinVersion field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTlsMinVersion - -`func (o *ActiveDirectoryWriteConfigRequest) SetTlsMinVersion(v string)` - -SetTlsMinVersion sets TlsMinVersion field to given value. - - -### HasTlsMinVersion - -`func (o *ActiveDirectoryWriteConfigRequest) HasTlsMinVersion() bool` - -HasTlsMinVersion returns a boolean if a field has been set. - - - - -### GetTtl - -`func (o *ActiveDirectoryWriteConfigRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *ActiveDirectoryWriteConfigRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *ActiveDirectoryWriteConfigRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - -### GetUpndomain - -`func (o *ActiveDirectoryWriteConfigRequest) GetUpndomain() string` - -GetUpndomain returns the Upndomain field if non-nil, zero value otherwise. - -### GetUpndomainOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUpndomainOk() (*string, bool)` - -GetUpndomainOk returns a tuple with the Upndomain field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUpndomain - -`func (o *ActiveDirectoryWriteConfigRequest) SetUpndomain(v string)` - -SetUpndomain sets Upndomain field to given value. - - -### HasUpndomain - -`func (o *ActiveDirectoryWriteConfigRequest) HasUpndomain() bool` - -HasUpndomain returns a boolean if a field has been set. - - - - -### GetUrl - -`func (o *ActiveDirectoryWriteConfigRequest) GetUrl() string` - -GetUrl returns the Url field if non-nil, zero value otherwise. - -### GetUrlOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUrlOk() (*string, bool)` - -GetUrlOk returns a tuple with the Url field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUrl - -`func (o *ActiveDirectoryWriteConfigRequest) SetUrl(v string)` - -SetUrl sets Url field to given value. - - -### HasUrl - -`func (o *ActiveDirectoryWriteConfigRequest) HasUrl() bool` - -HasUrl returns a boolean if a field has been set. - - - - -### GetUsePre111GroupCnBehavior - -`func (o *ActiveDirectoryWriteConfigRequest) GetUsePre111GroupCnBehavior() bool` - -GetUsePre111GroupCnBehavior returns the UsePre111GroupCnBehavior field if non-nil, zero value otherwise. - -### GetUsePre111GroupCnBehaviorOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` - -GetUsePre111GroupCnBehaviorOk returns a tuple with the UsePre111GroupCnBehavior field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUsePre111GroupCnBehavior - -`func (o *ActiveDirectoryWriteConfigRequest) SetUsePre111GroupCnBehavior(v bool)` - -SetUsePre111GroupCnBehavior sets UsePre111GroupCnBehavior field to given value. - - -### HasUsePre111GroupCnBehavior - -`func (o *ActiveDirectoryWriteConfigRequest) HasUsePre111GroupCnBehavior() bool` - -HasUsePre111GroupCnBehavior returns a boolean if a field has been set. - - - - -### GetUseTokenGroups - -`func (o *ActiveDirectoryWriteConfigRequest) GetUseTokenGroups() bool` - -GetUseTokenGroups returns the UseTokenGroups field if non-nil, zero value otherwise. - -### GetUseTokenGroupsOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUseTokenGroupsOk() (*bool, bool)` - -GetUseTokenGroupsOk returns a tuple with the UseTokenGroups field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUseTokenGroups - -`func (o *ActiveDirectoryWriteConfigRequest) SetUseTokenGroups(v bool)` - -SetUseTokenGroups sets UseTokenGroups field to given value. - - -### HasUseTokenGroups - -`func (o *ActiveDirectoryWriteConfigRequest) HasUseTokenGroups() bool` - -HasUseTokenGroups returns a boolean if a field has been set. - - - - -### GetUserattr - -`func (o *ActiveDirectoryWriteConfigRequest) GetUserattr() string` - -GetUserattr returns the Userattr field if non-nil, zero value otherwise. - -### GetUserattrOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUserattrOk() (*string, bool)` - -GetUserattrOk returns a tuple with the Userattr field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserattr - -`func (o *ActiveDirectoryWriteConfigRequest) SetUserattr(v string)` - -SetUserattr sets Userattr field to given value. - - -### HasUserattr - -`func (o *ActiveDirectoryWriteConfigRequest) HasUserattr() bool` - -HasUserattr returns a boolean if a field has been set. - - - - -### GetUserdn - -`func (o *ActiveDirectoryWriteConfigRequest) GetUserdn() string` - -GetUserdn returns the Userdn field if non-nil, zero value otherwise. - -### GetUserdnOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUserdnOk() (*string, bool)` - -GetUserdnOk returns a tuple with the Userdn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserdn - -`func (o *ActiveDirectoryWriteConfigRequest) SetUserdn(v string)` - -SetUserdn sets Userdn field to given value. - - -### HasUserdn - -`func (o *ActiveDirectoryWriteConfigRequest) HasUserdn() bool` - -HasUserdn returns a boolean if a field has been set. - - - - -### GetUserfilter - -`func (o *ActiveDirectoryWriteConfigRequest) GetUserfilter() string` - -GetUserfilter returns the Userfilter field if non-nil, zero value otherwise. - -### GetUserfilterOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUserfilterOk() (*string, bool)` - -GetUserfilterOk returns a tuple with the Userfilter field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserfilter - -`func (o *ActiveDirectoryWriteConfigRequest) SetUserfilter(v string)` - -SetUserfilter sets Userfilter field to given value. - - -### HasUserfilter - -`func (o *ActiveDirectoryWriteConfigRequest) HasUserfilter() bool` - -HasUserfilter returns a boolean if a field has been set. - - - - -### GetUsernameAsAlias - -`func (o *ActiveDirectoryWriteConfigRequest) GetUsernameAsAlias() bool` - -GetUsernameAsAlias returns the UsernameAsAlias field if non-nil, zero value otherwise. - -### GetUsernameAsAliasOk - -`func (o *ActiveDirectoryWriteConfigRequest) GetUsernameAsAliasOk() (*bool, bool)` - -GetUsernameAsAliasOk returns a tuple with the UsernameAsAlias field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUsernameAsAlias - -`func (o *ActiveDirectoryWriteConfigRequest) SetUsernameAsAlias(v bool)` - -SetUsernameAsAlias sets UsernameAsAlias field to given value. - - -### HasUsernameAsAlias - -`func (o *ActiveDirectoryWriteConfigRequest) HasUsernameAsAlias() bool` - -HasUsernameAsAlias returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ActiveDirectoryWriteLibraryRequest.md b/docs/ActiveDirectoryWriteLibraryRequest.md deleted file mode 100644 index 26b9ab97..00000000 --- a/docs/ActiveDirectoryWriteLibraryRequest.md +++ /dev/null @@ -1,159 +0,0 @@ -# ActiveDirectoryWriteLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**DisableCheckInEnforcement** | Pointer to **bool** | Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. | [optional] [default to false] -**MaxTtl** | Pointer to **int32** | In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours. | [optional] [default to 86400] -**ServiceAccountNames** | Pointer to **[]string** | The username/logon name for the service accounts with which this set will be associated. | [optional] -**Ttl** | Pointer to **int32** | In seconds, the amount of time a check-out should last. Defaults to 24 hours. | [optional] [default to 86400] - - - -## Methods - - -### NewActiveDirectoryWriteLibraryRequest - -`func NewActiveDirectoryWriteLibraryRequest() *ActiveDirectoryWriteLibraryRequest` - -NewActiveDirectoryWriteLibraryRequest instantiates a new ActiveDirectoryWriteLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewActiveDirectoryWriteLibraryRequestWithDefaults - -`func NewActiveDirectoryWriteLibraryRequestWithDefaults() *ActiveDirectoryWriteLibraryRequest` - -NewActiveDirectoryWriteLibraryRequestWithDefaults instantiates a new ActiveDirectoryWriteLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetDisableCheckInEnforcement - -`func (o *ActiveDirectoryWriteLibraryRequest) GetDisableCheckInEnforcement() bool` - -GetDisableCheckInEnforcement returns the DisableCheckInEnforcement field if non-nil, zero value otherwise. - -### GetDisableCheckInEnforcementOk - -`func (o *ActiveDirectoryWriteLibraryRequest) GetDisableCheckInEnforcementOk() (*bool, bool)` - -GetDisableCheckInEnforcementOk returns a tuple with the DisableCheckInEnforcement field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDisableCheckInEnforcement - -`func (o *ActiveDirectoryWriteLibraryRequest) SetDisableCheckInEnforcement(v bool)` - -SetDisableCheckInEnforcement sets DisableCheckInEnforcement field to given value. - - -### HasDisableCheckInEnforcement - -`func (o *ActiveDirectoryWriteLibraryRequest) HasDisableCheckInEnforcement() bool` - -HasDisableCheckInEnforcement returns a boolean if a field has been set. - - - - -### GetMaxTtl - -`func (o *ActiveDirectoryWriteLibraryRequest) GetMaxTtl() int32` - -GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. - -### GetMaxTtlOk - -`func (o *ActiveDirectoryWriteLibraryRequest) GetMaxTtlOk() (*int32, bool)` - -GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetMaxTtl - -`func (o *ActiveDirectoryWriteLibraryRequest) SetMaxTtl(v int32)` - -SetMaxTtl sets MaxTtl field to given value. - - -### HasMaxTtl - -`func (o *ActiveDirectoryWriteLibraryRequest) HasMaxTtl() bool` - -HasMaxTtl returns a boolean if a field has been set. - - - - -### GetServiceAccountNames - -`func (o *ActiveDirectoryWriteLibraryRequest) GetServiceAccountNames() []string` - -GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. - -### GetServiceAccountNamesOk - -`func (o *ActiveDirectoryWriteLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` - -GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetServiceAccountNames - -`func (o *ActiveDirectoryWriteLibraryRequest) SetServiceAccountNames(v []string)` - -SetServiceAccountNames sets ServiceAccountNames field to given value. - - -### HasServiceAccountNames - -`func (o *ActiveDirectoryWriteLibraryRequest) HasServiceAccountNames() bool` - -HasServiceAccountNames returns a boolean if a field has been set. - - - - -### GetTtl - -`func (o *ActiveDirectoryWriteLibraryRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *ActiveDirectoryWriteLibraryRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *ActiveDirectoryWriteLibraryRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *ActiveDirectoryWriteLibraryRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ActiveDirectoryWriteRoleRequest.md b/docs/ActiveDirectoryWriteRoleRequest.md deleted file mode 100644 index 686a666e..00000000 --- a/docs/ActiveDirectoryWriteRoleRequest.md +++ /dev/null @@ -1,99 +0,0 @@ -# ActiveDirectoryWriteRoleRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ServiceAccountName** | Pointer to **string** | The username/logon name for the service account with which this role will be associated. | [optional] -**Ttl** | Pointer to **int32** | In seconds, the default password time-to-live. | [optional] - - - -## Methods - - -### NewActiveDirectoryWriteRoleRequest - -`func NewActiveDirectoryWriteRoleRequest() *ActiveDirectoryWriteRoleRequest` - -NewActiveDirectoryWriteRoleRequest instantiates a new ActiveDirectoryWriteRoleRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewActiveDirectoryWriteRoleRequestWithDefaults - -`func NewActiveDirectoryWriteRoleRequestWithDefaults() *ActiveDirectoryWriteRoleRequest` - -NewActiveDirectoryWriteRoleRequestWithDefaults instantiates a new ActiveDirectoryWriteRoleRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetServiceAccountName - -`func (o *ActiveDirectoryWriteRoleRequest) GetServiceAccountName() string` - -GetServiceAccountName returns the ServiceAccountName field if non-nil, zero value otherwise. - -### GetServiceAccountNameOk - -`func (o *ActiveDirectoryWriteRoleRequest) GetServiceAccountNameOk() (*string, bool)` - -GetServiceAccountNameOk returns a tuple with the ServiceAccountName field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetServiceAccountName - -`func (o *ActiveDirectoryWriteRoleRequest) SetServiceAccountName(v string)` - -SetServiceAccountName sets ServiceAccountName field to given value. - - -### HasServiceAccountName - -`func (o *ActiveDirectoryWriteRoleRequest) HasServiceAccountName() bool` - -HasServiceAccountName returns a boolean if a field has been set. - - - - -### GetTtl - -`func (o *ActiveDirectoryWriteRoleRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *ActiveDirectoryWriteRoleRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *ActiveDirectoryWriteRoleRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *ActiveDirectoryWriteRoleRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AliCloudWriteConfigRequest.md b/docs/AliCloudConfigureRequest.md similarity index 64% rename from docs/AliCloudWriteConfigRequest.md rename to docs/AliCloudConfigureRequest.md index 87ceeeda..4ffa1724 100644 --- a/docs/AliCloudWriteConfigRequest.md +++ b/docs/AliCloudConfigureRequest.md @@ -1,4 +1,4 @@ -# AliCloudWriteConfigRequest +# AliCloudConfigureRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewAliCloudWriteConfigRequest +### NewAliCloudConfigureRequest -`func NewAliCloudWriteConfigRequest() *AliCloudWriteConfigRequest` +`func NewAliCloudConfigureRequest() *AliCloudConfigureRequest` -NewAliCloudWriteConfigRequest instantiates a new AliCloudWriteConfigRequest object +NewAliCloudConfigureRequest instantiates a new AliCloudConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAliCloudWriteConfigRequestWithDefaults +### NewAliCloudConfigureRequestWithDefaults -`func NewAliCloudWriteConfigRequestWithDefaults() *AliCloudWriteConfigRequest` +`func NewAliCloudConfigureRequestWithDefaults() *AliCloudConfigureRequest` -NewAliCloudWriteConfigRequestWithDefaults instantiates a new AliCloudWriteConfigRequest object +NewAliCloudConfigureRequestWithDefaults instantiates a new AliCloudConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAccessKey -`func (o *AliCloudWriteConfigRequest) GetAccessKey() string` +`func (o *AliCloudConfigureRequest) GetAccessKey() string` GetAccessKey returns the AccessKey field if non-nil, zero value otherwise. ### GetAccessKeyOk -`func (o *AliCloudWriteConfigRequest) GetAccessKeyOk() (*string, bool)` +`func (o *AliCloudConfigureRequest) GetAccessKeyOk() (*string, bool)` GetAccessKeyOk returns a tuple with the AccessKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAccessKey -`func (o *AliCloudWriteConfigRequest) SetAccessKey(v string)` +`func (o *AliCloudConfigureRequest) SetAccessKey(v string)` SetAccessKey sets AccessKey field to given value. ### HasAccessKey -`func (o *AliCloudWriteConfigRequest) HasAccessKey() bool` +`func (o *AliCloudConfigureRequest) HasAccessKey() bool` HasAccessKey returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasAccessKey returns a boolean if a field has been set. ### GetSecretKey -`func (o *AliCloudWriteConfigRequest) GetSecretKey() string` +`func (o *AliCloudConfigureRequest) GetSecretKey() string` GetSecretKey returns the SecretKey field if non-nil, zero value otherwise. ### GetSecretKeyOk -`func (o *AliCloudWriteConfigRequest) GetSecretKeyOk() (*string, bool)` +`func (o *AliCloudConfigureRequest) GetSecretKeyOk() (*string, bool)` GetSecretKeyOk returns a tuple with the SecretKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretKey -`func (o *AliCloudWriteConfigRequest) SetSecretKey(v string)` +`func (o *AliCloudConfigureRequest) SetSecretKey(v string)` SetSecretKey sets SecretKey field to given value. ### HasSecretKey -`func (o *AliCloudWriteConfigRequest) HasSecretKey() bool` +`func (o *AliCloudConfigureRequest) HasSecretKey() bool` HasSecretKey returns a boolean if a field has been set. diff --git a/docs/AliasWriteRequest.md b/docs/AliasCreateRequest.md similarity index 68% rename from docs/AliasWriteRequest.md rename to docs/AliasCreateRequest.md index 63e21f33..7605cc0d 100644 --- a/docs/AliasWriteRequest.md +++ b/docs/AliasCreateRequest.md @@ -1,4 +1,4 @@ -# AliasWriteRequest +# AliasCreateRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewAliasWriteRequest +### NewAliasCreateRequest -`func NewAliasWriteRequest() *AliasWriteRequest` +`func NewAliasCreateRequest() *AliasCreateRequest` -NewAliasWriteRequest instantiates a new AliasWriteRequest object +NewAliasCreateRequest instantiates a new AliasCreateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAliasWriteRequestWithDefaults +### NewAliasCreateRequestWithDefaults -`func NewAliasWriteRequestWithDefaults() *AliasWriteRequest` +`func NewAliasCreateRequestWithDefaults() *AliasCreateRequest` -NewAliasWriteRequestWithDefaults instantiates a new AliasWriteRequest object +NewAliasCreateRequestWithDefaults instantiates a new AliasCreateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCanonicalId -`func (o *AliasWriteRequest) GetCanonicalId() string` +`func (o *AliasCreateRequest) GetCanonicalId() string` GetCanonicalId returns the CanonicalId field if non-nil, zero value otherwise. ### GetCanonicalIdOk -`func (o *AliasWriteRequest) GetCanonicalIdOk() (*string, bool)` +`func (o *AliasCreateRequest) GetCanonicalIdOk() (*string, bool)` GetCanonicalIdOk returns a tuple with the CanonicalId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCanonicalId -`func (o *AliasWriteRequest) SetCanonicalId(v string)` +`func (o *AliasCreateRequest) SetCanonicalId(v string)` SetCanonicalId sets CanonicalId field to given value. ### HasCanonicalId -`func (o *AliasWriteRequest) HasCanonicalId() bool` +`func (o *AliasCreateRequest) HasCanonicalId() bool` HasCanonicalId returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasCanonicalId returns a boolean if a field has been set. ### GetEntityId -`func (o *AliasWriteRequest) GetEntityId() string` +`func (o *AliasCreateRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *AliasWriteRequest) GetEntityIdOk() (*string, bool)` +`func (o *AliasCreateRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *AliasWriteRequest) SetEntityId(v string)` +`func (o *AliasCreateRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. ### HasEntityId -`func (o *AliasWriteRequest) HasEntityId() bool` +`func (o *AliasCreateRequest) HasEntityId() bool` HasEntityId returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasEntityId returns a boolean if a field has been set. ### GetId -`func (o *AliasWriteRequest) GetId() string` +`func (o *AliasCreateRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *AliasWriteRequest) GetIdOk() (*string, bool)` +`func (o *AliasCreateRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *AliasWriteRequest) SetId(v string)` +`func (o *AliasCreateRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *AliasWriteRequest) HasId() bool` +`func (o *AliasCreateRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasId returns a boolean if a field has been set. ### GetMountAccessor -`func (o *AliasWriteRequest) GetMountAccessor() string` +`func (o *AliasCreateRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *AliasWriteRequest) GetMountAccessorOk() (*string, bool)` +`func (o *AliasCreateRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *AliasWriteRequest) SetMountAccessor(v string)` +`func (o *AliasCreateRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *AliasWriteRequest) HasMountAccessor() bool` +`func (o *AliasCreateRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *AliasWriteRequest) GetName() string` +`func (o *AliasCreateRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *AliasWriteRequest) GetNameOk() (*string, bool)` +`func (o *AliasCreateRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *AliasWriteRequest) SetName(v string)` +`func (o *AliasCreateRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *AliasWriteRequest) HasName() bool` +`func (o *AliasCreateRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/AliasWriteByIDRequest.md b/docs/AliasUpdateByIdRequest.md similarity index 67% rename from docs/AliasWriteByIDRequest.md rename to docs/AliasUpdateByIdRequest.md index 91ec86fa..688c208e 100644 --- a/docs/AliasWriteByIDRequest.md +++ b/docs/AliasUpdateByIdRequest.md @@ -1,4 +1,4 @@ -# AliasWriteByIDRequest +# AliasUpdateByIdRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewAliasWriteByIDRequest +### NewAliasUpdateByIdRequest -`func NewAliasWriteByIDRequest() *AliasWriteByIDRequest` +`func NewAliasUpdateByIdRequest() *AliasUpdateByIdRequest` -NewAliasWriteByIDRequest instantiates a new AliasWriteByIDRequest object +NewAliasUpdateByIdRequest instantiates a new AliasUpdateByIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAliasWriteByIDRequestWithDefaults +### NewAliasUpdateByIdRequestWithDefaults -`func NewAliasWriteByIDRequestWithDefaults() *AliasWriteByIDRequest` +`func NewAliasUpdateByIdRequestWithDefaults() *AliasUpdateByIdRequest` -NewAliasWriteByIDRequestWithDefaults instantiates a new AliasWriteByIDRequest object +NewAliasUpdateByIdRequestWithDefaults instantiates a new AliasUpdateByIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCanonicalId -`func (o *AliasWriteByIDRequest) GetCanonicalId() string` +`func (o *AliasUpdateByIdRequest) GetCanonicalId() string` GetCanonicalId returns the CanonicalId field if non-nil, zero value otherwise. ### GetCanonicalIdOk -`func (o *AliasWriteByIDRequest) GetCanonicalIdOk() (*string, bool)` +`func (o *AliasUpdateByIdRequest) GetCanonicalIdOk() (*string, bool)` GetCanonicalIdOk returns a tuple with the CanonicalId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCanonicalId -`func (o *AliasWriteByIDRequest) SetCanonicalId(v string)` +`func (o *AliasUpdateByIdRequest) SetCanonicalId(v string)` SetCanonicalId sets CanonicalId field to given value. ### HasCanonicalId -`func (o *AliasWriteByIDRequest) HasCanonicalId() bool` +`func (o *AliasUpdateByIdRequest) HasCanonicalId() bool` HasCanonicalId returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasCanonicalId returns a boolean if a field has been set. ### GetEntityId -`func (o *AliasWriteByIDRequest) GetEntityId() string` +`func (o *AliasUpdateByIdRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *AliasWriteByIDRequest) GetEntityIdOk() (*string, bool)` +`func (o *AliasUpdateByIdRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *AliasWriteByIDRequest) SetEntityId(v string)` +`func (o *AliasUpdateByIdRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. ### HasEntityId -`func (o *AliasWriteByIDRequest) HasEntityId() bool` +`func (o *AliasUpdateByIdRequest) HasEntityId() bool` HasEntityId returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasEntityId returns a boolean if a field has been set. ### GetMountAccessor -`func (o *AliasWriteByIDRequest) GetMountAccessor() string` +`func (o *AliasUpdateByIdRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *AliasWriteByIDRequest) GetMountAccessorOk() (*string, bool)` +`func (o *AliasUpdateByIdRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *AliasWriteByIDRequest) SetMountAccessor(v string)` +`func (o *AliasUpdateByIdRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *AliasWriteByIDRequest) HasMountAccessor() bool` +`func (o *AliasUpdateByIdRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *AliasWriteByIDRequest) GetName() string` +`func (o *AliasUpdateByIdRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *AliasWriteByIDRequest) GetNameOk() (*string, bool)` +`func (o *AliasUpdateByIdRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *AliasWriteByIDRequest) SetName(v string)` +`func (o *AliasUpdateByIdRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *AliasWriteByIDRequest) HasName() bool` +`func (o *AliasUpdateByIdRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDAccessorLookupRequest.md b/docs/AppRoleDestroySecretIdByAccessorRequest.md similarity index 56% rename from docs/AppRoleWriteSecretIDAccessorLookupRequest.md rename to docs/AppRoleDestroySecretIdByAccessorRequest.md index b5c9cc8d..1c07ecba 100644 --- a/docs/AppRoleWriteSecretIDAccessorLookupRequest.md +++ b/docs/AppRoleDestroySecretIdByAccessorRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDAccessorLookupRequest +# AppRoleDestroySecretIdByAccessorRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDAccessorLookupRequest +### NewAppRoleDestroySecretIdByAccessorRequest -`func NewAppRoleWriteSecretIDAccessorLookupRequest() *AppRoleWriteSecretIDAccessorLookupRequest` +`func NewAppRoleDestroySecretIdByAccessorRequest() *AppRoleDestroySecretIdByAccessorRequest` -NewAppRoleWriteSecretIDAccessorLookupRequest instantiates a new AppRoleWriteSecretIDAccessorLookupRequest object +NewAppRoleDestroySecretIdByAccessorRequest instantiates a new AppRoleDestroySecretIdByAccessorRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults +### NewAppRoleDestroySecretIdByAccessorRequestWithDefaults -`func NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults() *AppRoleWriteSecretIDAccessorLookupRequest` +`func NewAppRoleDestroySecretIdByAccessorRequestWithDefaults() *AppRoleDestroySecretIdByAccessorRequest` -NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults instantiates a new AppRoleWriteSecretIDAccessorLookupRequest object +NewAppRoleDestroySecretIdByAccessorRequestWithDefaults instantiates a new AppRoleDestroySecretIdByAccessorRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorLookupRequest) GetSecretIdAccessor() string` +`func (o *AppRoleDestroySecretIdByAccessorRequest) GetSecretIdAccessor() string` GetSecretIdAccessor returns the SecretIdAccessor field if non-nil, zero value otherwise. ### GetSecretIdAccessorOk -`func (o *AppRoleWriteSecretIDAccessorLookupRequest) GetSecretIdAccessorOk() (*string, bool)` +`func (o *AppRoleDestroySecretIdByAccessorRequest) GetSecretIdAccessorOk() (*string, bool)` GetSecretIdAccessorOk returns a tuple with the SecretIdAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorLookupRequest) SetSecretIdAccessor(v string)` +`func (o *AppRoleDestroySecretIdByAccessorRequest) SetSecretIdAccessor(v string)` SetSecretIdAccessor sets SecretIdAccessor field to given value. ### HasSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorLookupRequest) HasSecretIdAccessor() bool` +`func (o *AppRoleDestroySecretIdByAccessorRequest) HasSecretIdAccessor() bool` HasSecretIdAccessor returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDLookupRequest.md b/docs/AppRoleDestroySecretIdRequest.md similarity index 59% rename from docs/AppRoleWriteSecretIDLookupRequest.md rename to docs/AppRoleDestroySecretIdRequest.md index 8cf6215b..dcd72713 100644 --- a/docs/AppRoleWriteSecretIDLookupRequest.md +++ b/docs/AppRoleDestroySecretIdRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDLookupRequest +# AppRoleDestroySecretIdRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDLookupRequest +### NewAppRoleDestroySecretIdRequest -`func NewAppRoleWriteSecretIDLookupRequest() *AppRoleWriteSecretIDLookupRequest` +`func NewAppRoleDestroySecretIdRequest() *AppRoleDestroySecretIdRequest` -NewAppRoleWriteSecretIDLookupRequest instantiates a new AppRoleWriteSecretIDLookupRequest object +NewAppRoleDestroySecretIdRequest instantiates a new AppRoleDestroySecretIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDLookupRequestWithDefaults +### NewAppRoleDestroySecretIdRequestWithDefaults -`func NewAppRoleWriteSecretIDLookupRequestWithDefaults() *AppRoleWriteSecretIDLookupRequest` +`func NewAppRoleDestroySecretIdRequestWithDefaults() *AppRoleDestroySecretIdRequest` -NewAppRoleWriteSecretIDLookupRequestWithDefaults instantiates a new AppRoleWriteSecretIDLookupRequest object +NewAppRoleDestroySecretIdRequestWithDefaults instantiates a new AppRoleDestroySecretIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretId -`func (o *AppRoleWriteSecretIDLookupRequest) GetSecretId() string` +`func (o *AppRoleDestroySecretIdRequest) GetSecretId() string` GetSecretId returns the SecretId field if non-nil, zero value otherwise. ### GetSecretIdOk -`func (o *AppRoleWriteSecretIDLookupRequest) GetSecretIdOk() (*string, bool)` +`func (o *AppRoleDestroySecretIdRequest) GetSecretIdOk() (*string, bool)` GetSecretIdOk returns a tuple with the SecretId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretId -`func (o *AppRoleWriteSecretIDLookupRequest) SetSecretId(v string)` +`func (o *AppRoleDestroySecretIdRequest) SetSecretId(v string)` SetSecretId sets SecretId field to given value. ### HasSecretId -`func (o *AppRoleWriteSecretIDLookupRequest) HasSecretId() bool` +`func (o *AppRoleDestroySecretIdRequest) HasSecretId() bool` HasSecretId returns a boolean if a field has been set. diff --git a/docs/AppRoleListSecretIdsResponse.md b/docs/AppRoleListSecretIdsResponse.md new file mode 100644 index 00000000..49fa9614 --- /dev/null +++ b/docs/AppRoleListSecretIdsResponse.md @@ -0,0 +1,69 @@ +# AppRoleListSecretIdsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | | [optional] + + + +## Methods + + +### NewAppRoleListSecretIdsResponse + +`func NewAppRoleListSecretIdsResponse() *AppRoleListSecretIdsResponse` + +NewAppRoleListSecretIdsResponse instantiates a new AppRoleListSecretIdsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewAppRoleListSecretIdsResponseWithDefaults + +`func NewAppRoleListSecretIdsResponseWithDefaults() *AppRoleListSecretIdsResponse` + +NewAppRoleListSecretIdsResponseWithDefaults instantiates a new AppRoleListSecretIdsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *AppRoleListSecretIdsResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *AppRoleListSecretIdsResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *AppRoleListSecretIdsResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *AppRoleListSecretIdsResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AppRoleLoginResponse.md b/docs/AppRoleLoginResponse.md new file mode 100644 index 00000000..9ec50522 --- /dev/null +++ b/docs/AppRoleLoginResponse.md @@ -0,0 +1,69 @@ +# AppRoleLoginResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Role** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewAppRoleLoginResponse + +`func NewAppRoleLoginResponse() *AppRoleLoginResponse` + +NewAppRoleLoginResponse instantiates a new AppRoleLoginResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewAppRoleLoginResponseWithDefaults + +`func NewAppRoleLoginResponseWithDefaults() *AppRoleLoginResponse` + +NewAppRoleLoginResponseWithDefaults instantiates a new AppRoleLoginResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetRole + +`func (o *AppRoleLoginResponse) GetRole() string` + +GetRole returns the Role field if non-nil, zero value otherwise. + +### GetRoleOk + +`func (o *AppRoleLoginResponse) GetRoleOk() (*string, bool)` + +GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRole + +`func (o *AppRoleLoginResponse) SetRole(v string)` + +SetRole sets Role field to given value. + + +### HasRole + +`func (o *AppRoleLoginResponse) HasRole() bool` + +HasRole returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AppRoleWriteSecretIDAccessorDestroyRequest.md b/docs/AppRoleLookUpSecretIdByAccessorRequest.md similarity index 56% rename from docs/AppRoleWriteSecretIDAccessorDestroyRequest.md rename to docs/AppRoleLookUpSecretIdByAccessorRequest.md index b06f68ad..e4ea906b 100644 --- a/docs/AppRoleWriteSecretIDAccessorDestroyRequest.md +++ b/docs/AppRoleLookUpSecretIdByAccessorRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDAccessorDestroyRequest +# AppRoleLookUpSecretIdByAccessorRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDAccessorDestroyRequest +### NewAppRoleLookUpSecretIdByAccessorRequest -`func NewAppRoleWriteSecretIDAccessorDestroyRequest() *AppRoleWriteSecretIDAccessorDestroyRequest` +`func NewAppRoleLookUpSecretIdByAccessorRequest() *AppRoleLookUpSecretIdByAccessorRequest` -NewAppRoleWriteSecretIDAccessorDestroyRequest instantiates a new AppRoleWriteSecretIDAccessorDestroyRequest object +NewAppRoleLookUpSecretIdByAccessorRequest instantiates a new AppRoleLookUpSecretIdByAccessorRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults +### NewAppRoleLookUpSecretIdByAccessorRequestWithDefaults -`func NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults() *AppRoleWriteSecretIDAccessorDestroyRequest` +`func NewAppRoleLookUpSecretIdByAccessorRequestWithDefaults() *AppRoleLookUpSecretIdByAccessorRequest` -NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults instantiates a new AppRoleWriteSecretIDAccessorDestroyRequest object +NewAppRoleLookUpSecretIdByAccessorRequestWithDefaults instantiates a new AppRoleLookUpSecretIdByAccessorRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorDestroyRequest) GetSecretIdAccessor() string` +`func (o *AppRoleLookUpSecretIdByAccessorRequest) GetSecretIdAccessor() string` GetSecretIdAccessor returns the SecretIdAccessor field if non-nil, zero value otherwise. ### GetSecretIdAccessorOk -`func (o *AppRoleWriteSecretIDAccessorDestroyRequest) GetSecretIdAccessorOk() (*string, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorRequest) GetSecretIdAccessorOk() (*string, bool)` GetSecretIdAccessorOk returns a tuple with the SecretIdAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorDestroyRequest) SetSecretIdAccessor(v string)` +`func (o *AppRoleLookUpSecretIdByAccessorRequest) SetSecretIdAccessor(v string)` SetSecretIdAccessor sets SecretIdAccessor field to given value. ### HasSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorDestroyRequest) HasSecretIdAccessor() bool` +`func (o *AppRoleLookUpSecretIdByAccessorRequest) HasSecretIdAccessor() bool` HasSecretIdAccessor returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDAccessorLookupResponse.md b/docs/AppRoleLookUpSecretIdByAccessorResponse.md similarity index 61% rename from docs/AppRoleWriteSecretIDAccessorLookupResponse.md rename to docs/AppRoleLookUpSecretIdByAccessorResponse.md index a46d01ea..f32d3412 100644 --- a/docs/AppRoleWriteSecretIDAccessorLookupResponse.md +++ b/docs/AppRoleLookUpSecretIdByAccessorResponse.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDAccessorLookupResponse +# AppRoleLookUpSecretIdByAccessorResponse ## Properties @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDAccessorLookupResponse +### NewAppRoleLookUpSecretIdByAccessorResponse -`func NewAppRoleWriteSecretIDAccessorLookupResponse() *AppRoleWriteSecretIDAccessorLookupResponse` +`func NewAppRoleLookUpSecretIdByAccessorResponse() *AppRoleLookUpSecretIdByAccessorResponse` -NewAppRoleWriteSecretIDAccessorLookupResponse instantiates a new AppRoleWriteSecretIDAccessorLookupResponse object +NewAppRoleLookUpSecretIdByAccessorResponse instantiates a new AppRoleLookUpSecretIdByAccessorResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults +### NewAppRoleLookUpSecretIdByAccessorResponseWithDefaults -`func NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults() *AppRoleWriteSecretIDAccessorLookupResponse` +`func NewAppRoleLookUpSecretIdByAccessorResponseWithDefaults() *AppRoleLookUpSecretIdByAccessorResponse` -NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults instantiates a new AppRoleWriteSecretIDAccessorLookupResponse object +NewAppRoleLookUpSecretIdByAccessorResponseWithDefaults instantiates a new AppRoleLookUpSecretIdByAccessorResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCidrList -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetCidrList() []string` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetCidrList() []string` GetCidrList returns the CidrList field if non-nil, zero value otherwise. ### GetCidrListOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetCidrListOk() (*[]string, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetCidrListOk() (*[]string, bool)` GetCidrListOk returns a tuple with the CidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCidrList -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetCidrList(v []string)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetCidrList(v []string)` SetCidrList sets CidrList field to given value. ### HasCidrList -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasCidrList() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasCidrList() bool` HasCidrList returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasCidrList returns a boolean if a field has been set. ### GetCreationTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetCreationTime() time.Time` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetCreationTime() time.Time` GetCreationTime returns the CreationTime field if non-nil, zero value otherwise. ### GetCreationTimeOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetCreationTimeOk() (*time.Time, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetCreationTimeOk() (*time.Time, bool)` GetCreationTimeOk returns a tuple with the CreationTime field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCreationTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetCreationTime(v time.Time)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetCreationTime(v time.Time)` SetCreationTime sets CreationTime field to given value. ### HasCreationTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasCreationTime() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasCreationTime() bool` HasCreationTime returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasCreationTime returns a boolean if a field has been set. ### GetExpirationTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetExpirationTime() time.Time` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetExpirationTime() time.Time` GetExpirationTime returns the ExpirationTime field if non-nil, zero value otherwise. ### GetExpirationTimeOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetExpirationTimeOk() (*time.Time, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetExpirationTimeOk() (*time.Time, bool)` GetExpirationTimeOk returns a tuple with the ExpirationTime field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExpirationTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetExpirationTime(v time.Time)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetExpirationTime(v time.Time)` SetExpirationTime sets ExpirationTime field to given value. ### HasExpirationTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasExpirationTime() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasExpirationTime() bool` HasExpirationTime returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasExpirationTime returns a boolean if a field has been set. ### GetLastUpdatedTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetLastUpdatedTime() time.Time` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetLastUpdatedTime() time.Time` GetLastUpdatedTime returns the LastUpdatedTime field if non-nil, zero value otherwise. ### GetLastUpdatedTimeOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetLastUpdatedTimeOk() (*time.Time, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetLastUpdatedTimeOk() (*time.Time, bool)` GetLastUpdatedTimeOk returns a tuple with the LastUpdatedTime field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLastUpdatedTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetLastUpdatedTime(v time.Time)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetLastUpdatedTime(v time.Time)` SetLastUpdatedTime sets LastUpdatedTime field to given value. ### HasLastUpdatedTime -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasLastUpdatedTime() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasLastUpdatedTime() bool` HasLastUpdatedTime returns a boolean if a field has been set. @@ -156,27 +156,27 @@ HasLastUpdatedTime returns a boolean if a field has been set. ### GetMetadata -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetMetadata() map[string]interface{}` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetMetadata(v map[string]interface{})` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasMetadata() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -185,27 +185,27 @@ HasMetadata returns a boolean if a field has been set. ### GetSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetSecretIdAccessor() string` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetSecretIdAccessor() string` GetSecretIdAccessor returns the SecretIdAccessor field if non-nil, zero value otherwise. ### GetSecretIdAccessorOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetSecretIdAccessorOk() (*string, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetSecretIdAccessorOk() (*string, bool)` GetSecretIdAccessorOk returns a tuple with the SecretIdAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetSecretIdAccessor(v string)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetSecretIdAccessor(v string)` SetSecretIdAccessor sets SecretIdAccessor field to given value. ### HasSecretIdAccessor -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasSecretIdAccessor() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasSecretIdAccessor() bool` HasSecretIdAccessor returns a boolean if a field has been set. @@ -214,27 +214,27 @@ HasSecretIdAccessor returns a boolean if a field has been set. ### GetSecretIdNumUses -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetSecretIdNumUses() int32` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetSecretIdNumUses() int32` GetSecretIdNumUses returns the SecretIdNumUses field if non-nil, zero value otherwise. ### GetSecretIdNumUsesOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetSecretIdNumUsesOk() (*int32, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetSecretIdNumUsesOk() (*int32, bool)` GetSecretIdNumUsesOk returns a tuple with the SecretIdNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdNumUses -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetSecretIdNumUses(v int32)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetSecretIdNumUses(v int32)` SetSecretIdNumUses sets SecretIdNumUses field to given value. ### HasSecretIdNumUses -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasSecretIdNumUses() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasSecretIdNumUses() bool` HasSecretIdNumUses returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasSecretIdNumUses returns a boolean if a field has been set. ### GetSecretIdTtl -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetSecretIdTtl() int32` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetSecretIdTtl() int32` GetSecretIdTtl returns the SecretIdTtl field if non-nil, zero value otherwise. ### GetSecretIdTtlOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetSecretIdTtlOk() (*int32, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetSecretIdTtlOk() (*int32, bool)` GetSecretIdTtlOk returns a tuple with the SecretIdTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdTtl -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetSecretIdTtl(v int32)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetSecretIdTtl(v int32)` SetSecretIdTtl sets SecretIdTtl field to given value. ### HasSecretIdTtl -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasSecretIdTtl() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasSecretIdTtl() bool` HasSecretIdTtl returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasSecretIdTtl returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetTokenBoundCidrs() []string` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) SetTokenBoundCidrs(v []string)` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *AppRoleWriteSecretIDAccessorLookupResponse) HasTokenBoundCidrs() bool` +`func (o *AppRoleLookUpSecretIdByAccessorResponse) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDDestroyRequest.md b/docs/AppRoleLookUpSecretIdRequest.md similarity index 58% rename from docs/AppRoleWriteSecretIDDestroyRequest.md rename to docs/AppRoleLookUpSecretIdRequest.md index 38c8f000..59ec5414 100644 --- a/docs/AppRoleWriteSecretIDDestroyRequest.md +++ b/docs/AppRoleLookUpSecretIdRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDDestroyRequest +# AppRoleLookUpSecretIdRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDDestroyRequest +### NewAppRoleLookUpSecretIdRequest -`func NewAppRoleWriteSecretIDDestroyRequest() *AppRoleWriteSecretIDDestroyRequest` +`func NewAppRoleLookUpSecretIdRequest() *AppRoleLookUpSecretIdRequest` -NewAppRoleWriteSecretIDDestroyRequest instantiates a new AppRoleWriteSecretIDDestroyRequest object +NewAppRoleLookUpSecretIdRequest instantiates a new AppRoleLookUpSecretIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDDestroyRequestWithDefaults +### NewAppRoleLookUpSecretIdRequestWithDefaults -`func NewAppRoleWriteSecretIDDestroyRequestWithDefaults() *AppRoleWriteSecretIDDestroyRequest` +`func NewAppRoleLookUpSecretIdRequestWithDefaults() *AppRoleLookUpSecretIdRequest` -NewAppRoleWriteSecretIDDestroyRequestWithDefaults instantiates a new AppRoleWriteSecretIDDestroyRequest object +NewAppRoleLookUpSecretIdRequestWithDefaults instantiates a new AppRoleLookUpSecretIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretId -`func (o *AppRoleWriteSecretIDDestroyRequest) GetSecretId() string` +`func (o *AppRoleLookUpSecretIdRequest) GetSecretId() string` GetSecretId returns the SecretId field if non-nil, zero value otherwise. ### GetSecretIdOk -`func (o *AppRoleWriteSecretIDDestroyRequest) GetSecretIdOk() (*string, bool)` +`func (o *AppRoleLookUpSecretIdRequest) GetSecretIdOk() (*string, bool)` GetSecretIdOk returns a tuple with the SecretId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretId -`func (o *AppRoleWriteSecretIDDestroyRequest) SetSecretId(v string)` +`func (o *AppRoleLookUpSecretIdRequest) SetSecretId(v string)` SetSecretId sets SecretId field to given value. ### HasSecretId -`func (o *AppRoleWriteSecretIDDestroyRequest) HasSecretId() bool` +`func (o *AppRoleLookUpSecretIdRequest) HasSecretId() bool` HasSecretId returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDLookupResponse.md b/docs/AppRoleLookUpSecretIdResponse.md similarity index 64% rename from docs/AppRoleWriteSecretIDLookupResponse.md rename to docs/AppRoleLookUpSecretIdResponse.md index 0c9bb492..7e31b214 100644 --- a/docs/AppRoleWriteSecretIDLookupResponse.md +++ b/docs/AppRoleLookUpSecretIdResponse.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDLookupResponse +# AppRoleLookUpSecretIdResponse ## Properties @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDLookupResponse +### NewAppRoleLookUpSecretIdResponse -`func NewAppRoleWriteSecretIDLookupResponse() *AppRoleWriteSecretIDLookupResponse` +`func NewAppRoleLookUpSecretIdResponse() *AppRoleLookUpSecretIdResponse` -NewAppRoleWriteSecretIDLookupResponse instantiates a new AppRoleWriteSecretIDLookupResponse object +NewAppRoleLookUpSecretIdResponse instantiates a new AppRoleLookUpSecretIdResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDLookupResponseWithDefaults +### NewAppRoleLookUpSecretIdResponseWithDefaults -`func NewAppRoleWriteSecretIDLookupResponseWithDefaults() *AppRoleWriteSecretIDLookupResponse` +`func NewAppRoleLookUpSecretIdResponseWithDefaults() *AppRoleLookUpSecretIdResponse` -NewAppRoleWriteSecretIDLookupResponseWithDefaults instantiates a new AppRoleWriteSecretIDLookupResponse object +NewAppRoleLookUpSecretIdResponseWithDefaults instantiates a new AppRoleLookUpSecretIdResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCidrList -`func (o *AppRoleWriteSecretIDLookupResponse) GetCidrList() []string` +`func (o *AppRoleLookUpSecretIdResponse) GetCidrList() []string` GetCidrList returns the CidrList field if non-nil, zero value otherwise. ### GetCidrListOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetCidrListOk() (*[]string, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetCidrListOk() (*[]string, bool)` GetCidrListOk returns a tuple with the CidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCidrList -`func (o *AppRoleWriteSecretIDLookupResponse) SetCidrList(v []string)` +`func (o *AppRoleLookUpSecretIdResponse) SetCidrList(v []string)` SetCidrList sets CidrList field to given value. ### HasCidrList -`func (o *AppRoleWriteSecretIDLookupResponse) HasCidrList() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasCidrList() bool` HasCidrList returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasCidrList returns a boolean if a field has been set. ### GetCreationTime -`func (o *AppRoleWriteSecretIDLookupResponse) GetCreationTime() time.Time` +`func (o *AppRoleLookUpSecretIdResponse) GetCreationTime() time.Time` GetCreationTime returns the CreationTime field if non-nil, zero value otherwise. ### GetCreationTimeOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetCreationTimeOk() (*time.Time, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetCreationTimeOk() (*time.Time, bool)` GetCreationTimeOk returns a tuple with the CreationTime field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCreationTime -`func (o *AppRoleWriteSecretIDLookupResponse) SetCreationTime(v time.Time)` +`func (o *AppRoleLookUpSecretIdResponse) SetCreationTime(v time.Time)` SetCreationTime sets CreationTime field to given value. ### HasCreationTime -`func (o *AppRoleWriteSecretIDLookupResponse) HasCreationTime() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasCreationTime() bool` HasCreationTime returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasCreationTime returns a boolean if a field has been set. ### GetExpirationTime -`func (o *AppRoleWriteSecretIDLookupResponse) GetExpirationTime() time.Time` +`func (o *AppRoleLookUpSecretIdResponse) GetExpirationTime() time.Time` GetExpirationTime returns the ExpirationTime field if non-nil, zero value otherwise. ### GetExpirationTimeOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetExpirationTimeOk() (*time.Time, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetExpirationTimeOk() (*time.Time, bool)` GetExpirationTimeOk returns a tuple with the ExpirationTime field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExpirationTime -`func (o *AppRoleWriteSecretIDLookupResponse) SetExpirationTime(v time.Time)` +`func (o *AppRoleLookUpSecretIdResponse) SetExpirationTime(v time.Time)` SetExpirationTime sets ExpirationTime field to given value. ### HasExpirationTime -`func (o *AppRoleWriteSecretIDLookupResponse) HasExpirationTime() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasExpirationTime() bool` HasExpirationTime returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasExpirationTime returns a boolean if a field has been set. ### GetLastUpdatedTime -`func (o *AppRoleWriteSecretIDLookupResponse) GetLastUpdatedTime() time.Time` +`func (o *AppRoleLookUpSecretIdResponse) GetLastUpdatedTime() time.Time` GetLastUpdatedTime returns the LastUpdatedTime field if non-nil, zero value otherwise. ### GetLastUpdatedTimeOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetLastUpdatedTimeOk() (*time.Time, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetLastUpdatedTimeOk() (*time.Time, bool)` GetLastUpdatedTimeOk returns a tuple with the LastUpdatedTime field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLastUpdatedTime -`func (o *AppRoleWriteSecretIDLookupResponse) SetLastUpdatedTime(v time.Time)` +`func (o *AppRoleLookUpSecretIdResponse) SetLastUpdatedTime(v time.Time)` SetLastUpdatedTime sets LastUpdatedTime field to given value. ### HasLastUpdatedTime -`func (o *AppRoleWriteSecretIDLookupResponse) HasLastUpdatedTime() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasLastUpdatedTime() bool` HasLastUpdatedTime returns a boolean if a field has been set. @@ -156,27 +156,27 @@ HasLastUpdatedTime returns a boolean if a field has been set. ### GetMetadata -`func (o *AppRoleWriteSecretIDLookupResponse) GetMetadata() map[string]interface{}` +`func (o *AppRoleLookUpSecretIdResponse) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *AppRoleWriteSecretIDLookupResponse) SetMetadata(v map[string]interface{})` +`func (o *AppRoleLookUpSecretIdResponse) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *AppRoleWriteSecretIDLookupResponse) HasMetadata() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -185,27 +185,27 @@ HasMetadata returns a boolean if a field has been set. ### GetSecretIdAccessor -`func (o *AppRoleWriteSecretIDLookupResponse) GetSecretIdAccessor() string` +`func (o *AppRoleLookUpSecretIdResponse) GetSecretIdAccessor() string` GetSecretIdAccessor returns the SecretIdAccessor field if non-nil, zero value otherwise. ### GetSecretIdAccessorOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetSecretIdAccessorOk() (*string, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetSecretIdAccessorOk() (*string, bool)` GetSecretIdAccessorOk returns a tuple with the SecretIdAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdAccessor -`func (o *AppRoleWriteSecretIDLookupResponse) SetSecretIdAccessor(v string)` +`func (o *AppRoleLookUpSecretIdResponse) SetSecretIdAccessor(v string)` SetSecretIdAccessor sets SecretIdAccessor field to given value. ### HasSecretIdAccessor -`func (o *AppRoleWriteSecretIDLookupResponse) HasSecretIdAccessor() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasSecretIdAccessor() bool` HasSecretIdAccessor returns a boolean if a field has been set. @@ -214,27 +214,27 @@ HasSecretIdAccessor returns a boolean if a field has been set. ### GetSecretIdNumUses -`func (o *AppRoleWriteSecretIDLookupResponse) GetSecretIdNumUses() int32` +`func (o *AppRoleLookUpSecretIdResponse) GetSecretIdNumUses() int32` GetSecretIdNumUses returns the SecretIdNumUses field if non-nil, zero value otherwise. ### GetSecretIdNumUsesOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetSecretIdNumUsesOk() (*int32, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetSecretIdNumUsesOk() (*int32, bool)` GetSecretIdNumUsesOk returns a tuple with the SecretIdNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdNumUses -`func (o *AppRoleWriteSecretIDLookupResponse) SetSecretIdNumUses(v int32)` +`func (o *AppRoleLookUpSecretIdResponse) SetSecretIdNumUses(v int32)` SetSecretIdNumUses sets SecretIdNumUses field to given value. ### HasSecretIdNumUses -`func (o *AppRoleWriteSecretIDLookupResponse) HasSecretIdNumUses() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasSecretIdNumUses() bool` HasSecretIdNumUses returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasSecretIdNumUses returns a boolean if a field has been set. ### GetSecretIdTtl -`func (o *AppRoleWriteSecretIDLookupResponse) GetSecretIdTtl() int32` +`func (o *AppRoleLookUpSecretIdResponse) GetSecretIdTtl() int32` GetSecretIdTtl returns the SecretIdTtl field if non-nil, zero value otherwise. ### GetSecretIdTtlOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetSecretIdTtlOk() (*int32, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetSecretIdTtlOk() (*int32, bool)` GetSecretIdTtlOk returns a tuple with the SecretIdTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdTtl -`func (o *AppRoleWriteSecretIDLookupResponse) SetSecretIdTtl(v int32)` +`func (o *AppRoleLookUpSecretIdResponse) SetSecretIdTtl(v int32)` SetSecretIdTtl sets SecretIdTtl field to given value. ### HasSecretIdTtl -`func (o *AppRoleWriteSecretIDLookupResponse) HasSecretIdTtl() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasSecretIdTtl() bool` HasSecretIdTtl returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasSecretIdTtl returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *AppRoleWriteSecretIDLookupResponse) GetTokenBoundCidrs() []string` +`func (o *AppRoleLookUpSecretIdResponse) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *AppRoleWriteSecretIDLookupResponse) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleLookUpSecretIdResponse) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *AppRoleWriteSecretIDLookupResponse) SetTokenBoundCidrs(v []string)` +`func (o *AppRoleLookUpSecretIdResponse) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *AppRoleWriteSecretIDLookupResponse) HasTokenBoundCidrs() bool` +`func (o *AppRoleLookUpSecretIdResponse) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. diff --git a/docs/AppRoleReadBindSecretIDResponse.md b/docs/AppRoleReadBindSecretIDResponse.md index 64390deb..be5d1551 100644 --- a/docs/AppRoleReadBindSecretIDResponse.md +++ b/docs/AppRoleReadBindSecretIDResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadBindSecretIDResponse +# AppRoleReadBindSecretIdResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadBindSecretIDResponse +### NewAppRoleReadBindSecretIdResponse -`func NewAppRoleReadBindSecretIDResponse() *AppRoleReadBindSecretIDResponse` +`func NewAppRoleReadBindSecretIdResponse() *AppRoleReadBindSecretIdResponse` -NewAppRoleReadBindSecretIDResponse instantiates a new AppRoleReadBindSecretIDResponse object +NewAppRoleReadBindSecretIdResponse instantiates a new AppRoleReadBindSecretIdResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadBindSecretIDResponseWithDefaults +### NewAppRoleReadBindSecretIdResponseWithDefaults -`func NewAppRoleReadBindSecretIDResponseWithDefaults() *AppRoleReadBindSecretIDResponse` +`func NewAppRoleReadBindSecretIdResponseWithDefaults() *AppRoleReadBindSecretIdResponse` -NewAppRoleReadBindSecretIDResponseWithDefaults instantiates a new AppRoleReadBindSecretIDResponse object +NewAppRoleReadBindSecretIdResponseWithDefaults instantiates a new AppRoleReadBindSecretIdResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBindSecretId -`func (o *AppRoleReadBindSecretIDResponse) GetBindSecretId() bool` +`func (o *AppRoleReadBindSecretIdResponse) GetBindSecretId() bool` GetBindSecretId returns the BindSecretId field if non-nil, zero value otherwise. ### GetBindSecretIdOk -`func (o *AppRoleReadBindSecretIDResponse) GetBindSecretIdOk() (*bool, bool)` +`func (o *AppRoleReadBindSecretIdResponse) GetBindSecretIdOk() (*bool, bool)` GetBindSecretIdOk returns a tuple with the BindSecretId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBindSecretId -`func (o *AppRoleReadBindSecretIDResponse) SetBindSecretId(v bool)` +`func (o *AppRoleReadBindSecretIdResponse) SetBindSecretId(v bool)` SetBindSecretId sets BindSecretId field to given value. ### HasBindSecretId -`func (o *AppRoleReadBindSecretIDResponse) HasBindSecretId() bool` +`func (o *AppRoleReadBindSecretIdResponse) HasBindSecretId() bool` HasBindSecretId returns a boolean if a field has been set. diff --git a/docs/AppRoleReadBoundCIDRListResponse.md b/docs/AppRoleReadBoundCIDRListResponse.md index 66e0a237..a860c9b1 100644 --- a/docs/AppRoleReadBoundCIDRListResponse.md +++ b/docs/AppRoleReadBoundCIDRListResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadBoundCIDRListResponse +# AppRoleReadBoundCidrListResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadBoundCIDRListResponse +### NewAppRoleReadBoundCidrListResponse -`func NewAppRoleReadBoundCIDRListResponse() *AppRoleReadBoundCIDRListResponse` +`func NewAppRoleReadBoundCidrListResponse() *AppRoleReadBoundCidrListResponse` -NewAppRoleReadBoundCIDRListResponse instantiates a new AppRoleReadBoundCIDRListResponse object +NewAppRoleReadBoundCidrListResponse instantiates a new AppRoleReadBoundCidrListResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadBoundCIDRListResponseWithDefaults +### NewAppRoleReadBoundCidrListResponseWithDefaults -`func NewAppRoleReadBoundCIDRListResponseWithDefaults() *AppRoleReadBoundCIDRListResponse` +`func NewAppRoleReadBoundCidrListResponseWithDefaults() *AppRoleReadBoundCidrListResponse` -NewAppRoleReadBoundCIDRListResponseWithDefaults instantiates a new AppRoleReadBoundCIDRListResponse object +NewAppRoleReadBoundCidrListResponseWithDefaults instantiates a new AppRoleReadBoundCidrListResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBoundCidrList -`func (o *AppRoleReadBoundCIDRListResponse) GetBoundCidrList() []string` +`func (o *AppRoleReadBoundCidrListResponse) GetBoundCidrList() []string` GetBoundCidrList returns the BoundCidrList field if non-nil, zero value otherwise. ### GetBoundCidrListOk -`func (o *AppRoleReadBoundCIDRListResponse) GetBoundCidrListOk() (*[]string, bool)` +`func (o *AppRoleReadBoundCidrListResponse) GetBoundCidrListOk() (*[]string, bool)` GetBoundCidrListOk returns a tuple with the BoundCidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundCidrList -`func (o *AppRoleReadBoundCIDRListResponse) SetBoundCidrList(v []string)` +`func (o *AppRoleReadBoundCidrListResponse) SetBoundCidrList(v []string)` SetBoundCidrList sets BoundCidrList field to given value. ### HasBoundCidrList -`func (o *AppRoleReadBoundCIDRListResponse) HasBoundCidrList() bool` +`func (o *AppRoleReadBoundCidrListResponse) HasBoundCidrList() bool` HasBoundCidrList returns a boolean if a field has been set. diff --git a/docs/AppRoleReadLocalSecretIDsResponse.md b/docs/AppRoleReadLocalSecretIDsResponse.md index ed393974..042bec33 100644 --- a/docs/AppRoleReadLocalSecretIDsResponse.md +++ b/docs/AppRoleReadLocalSecretIDsResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadLocalSecretIDsResponse +# AppRoleReadLocalSecretIdsResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadLocalSecretIDsResponse +### NewAppRoleReadLocalSecretIdsResponse -`func NewAppRoleReadLocalSecretIDsResponse() *AppRoleReadLocalSecretIDsResponse` +`func NewAppRoleReadLocalSecretIdsResponse() *AppRoleReadLocalSecretIdsResponse` -NewAppRoleReadLocalSecretIDsResponse instantiates a new AppRoleReadLocalSecretIDsResponse object +NewAppRoleReadLocalSecretIdsResponse instantiates a new AppRoleReadLocalSecretIdsResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadLocalSecretIDsResponseWithDefaults +### NewAppRoleReadLocalSecretIdsResponseWithDefaults -`func NewAppRoleReadLocalSecretIDsResponseWithDefaults() *AppRoleReadLocalSecretIDsResponse` +`func NewAppRoleReadLocalSecretIdsResponseWithDefaults() *AppRoleReadLocalSecretIdsResponse` -NewAppRoleReadLocalSecretIDsResponseWithDefaults instantiates a new AppRoleReadLocalSecretIDsResponse object +NewAppRoleReadLocalSecretIdsResponseWithDefaults instantiates a new AppRoleReadLocalSecretIdsResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLocalSecretIds -`func (o *AppRoleReadLocalSecretIDsResponse) GetLocalSecretIds() bool` +`func (o *AppRoleReadLocalSecretIdsResponse) GetLocalSecretIds() bool` GetLocalSecretIds returns the LocalSecretIds field if non-nil, zero value otherwise. ### GetLocalSecretIdsOk -`func (o *AppRoleReadLocalSecretIDsResponse) GetLocalSecretIdsOk() (*bool, bool)` +`func (o *AppRoleReadLocalSecretIdsResponse) GetLocalSecretIdsOk() (*bool, bool)` GetLocalSecretIdsOk returns a tuple with the LocalSecretIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocalSecretIds -`func (o *AppRoleReadLocalSecretIDsResponse) SetLocalSecretIds(v bool)` +`func (o *AppRoleReadLocalSecretIdsResponse) SetLocalSecretIds(v bool)` SetLocalSecretIds sets LocalSecretIds field to given value. ### HasLocalSecretIds -`func (o *AppRoleReadLocalSecretIDsResponse) HasLocalSecretIds() bool` +`func (o *AppRoleReadLocalSecretIdsResponse) HasLocalSecretIds() bool` HasLocalSecretIds returns a boolean if a field has been set. diff --git a/docs/AppRoleReadRoleIDResponse.md b/docs/AppRoleReadRoleIDResponse.md index 9d64b407..29c51dc6 100644 --- a/docs/AppRoleReadRoleIDResponse.md +++ b/docs/AppRoleReadRoleIDResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadRoleIDResponse +# AppRoleReadRoleIdResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadRoleIDResponse +### NewAppRoleReadRoleIdResponse -`func NewAppRoleReadRoleIDResponse() *AppRoleReadRoleIDResponse` +`func NewAppRoleReadRoleIdResponse() *AppRoleReadRoleIdResponse` -NewAppRoleReadRoleIDResponse instantiates a new AppRoleReadRoleIDResponse object +NewAppRoleReadRoleIdResponse instantiates a new AppRoleReadRoleIdResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadRoleIDResponseWithDefaults +### NewAppRoleReadRoleIdResponseWithDefaults -`func NewAppRoleReadRoleIDResponseWithDefaults() *AppRoleReadRoleIDResponse` +`func NewAppRoleReadRoleIdResponseWithDefaults() *AppRoleReadRoleIdResponse` -NewAppRoleReadRoleIDResponseWithDefaults instantiates a new AppRoleReadRoleIDResponse object +NewAppRoleReadRoleIdResponseWithDefaults instantiates a new AppRoleReadRoleIdResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetRoleId -`func (o *AppRoleReadRoleIDResponse) GetRoleId() string` +`func (o *AppRoleReadRoleIdResponse) GetRoleId() string` GetRoleId returns the RoleId field if non-nil, zero value otherwise. ### GetRoleIdOk -`func (o *AppRoleReadRoleIDResponse) GetRoleIdOk() (*string, bool)` +`func (o *AppRoleReadRoleIdResponse) GetRoleIdOk() (*string, bool)` GetRoleIdOk returns a tuple with the RoleId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleId -`func (o *AppRoleReadRoleIDResponse) SetRoleId(v string)` +`func (o *AppRoleReadRoleIdResponse) SetRoleId(v string)` SetRoleId sets RoleId field to given value. ### HasRoleId -`func (o *AppRoleReadRoleIDResponse) HasRoleId() bool` +`func (o *AppRoleReadRoleIdResponse) HasRoleId() bool` HasRoleId returns a boolean if a field has been set. diff --git a/docs/AppRoleReadSecretIDBoundCIDRsResponse.md b/docs/AppRoleReadSecretIDBoundCIDRsResponse.md index 703c385d..b5042207 100644 --- a/docs/AppRoleReadSecretIDBoundCIDRsResponse.md +++ b/docs/AppRoleReadSecretIDBoundCIDRsResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadSecretIDBoundCIDRsResponse +# AppRoleReadSecretIdBoundCidrsResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadSecretIDBoundCIDRsResponse +### NewAppRoleReadSecretIdBoundCidrsResponse -`func NewAppRoleReadSecretIDBoundCIDRsResponse() *AppRoleReadSecretIDBoundCIDRsResponse` +`func NewAppRoleReadSecretIdBoundCidrsResponse() *AppRoleReadSecretIdBoundCidrsResponse` -NewAppRoleReadSecretIDBoundCIDRsResponse instantiates a new AppRoleReadSecretIDBoundCIDRsResponse object +NewAppRoleReadSecretIdBoundCidrsResponse instantiates a new AppRoleReadSecretIdBoundCidrsResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults +### NewAppRoleReadSecretIdBoundCidrsResponseWithDefaults -`func NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults() *AppRoleReadSecretIDBoundCIDRsResponse` +`func NewAppRoleReadSecretIdBoundCidrsResponseWithDefaults() *AppRoleReadSecretIdBoundCidrsResponse` -NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults instantiates a new AppRoleReadSecretIDBoundCIDRsResponse object +NewAppRoleReadSecretIdBoundCidrsResponseWithDefaults instantiates a new AppRoleReadSecretIdBoundCidrsResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdBoundCidrs -`func (o *AppRoleReadSecretIDBoundCIDRsResponse) GetSecretIdBoundCidrs() []string` +`func (o *AppRoleReadSecretIdBoundCidrsResponse) GetSecretIdBoundCidrs() []string` GetSecretIdBoundCidrs returns the SecretIdBoundCidrs field if non-nil, zero value otherwise. ### GetSecretIdBoundCidrsOk -`func (o *AppRoleReadSecretIDBoundCIDRsResponse) GetSecretIdBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleReadSecretIdBoundCidrsResponse) GetSecretIdBoundCidrsOk() (*[]string, bool)` GetSecretIdBoundCidrsOk returns a tuple with the SecretIdBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdBoundCidrs -`func (o *AppRoleReadSecretIDBoundCIDRsResponse) SetSecretIdBoundCidrs(v []string)` +`func (o *AppRoleReadSecretIdBoundCidrsResponse) SetSecretIdBoundCidrs(v []string)` SetSecretIdBoundCidrs sets SecretIdBoundCidrs field to given value. ### HasSecretIdBoundCidrs -`func (o *AppRoleReadSecretIDBoundCIDRsResponse) HasSecretIdBoundCidrs() bool` +`func (o *AppRoleReadSecretIdBoundCidrsResponse) HasSecretIdBoundCidrs() bool` HasSecretIdBoundCidrs returns a boolean if a field has been set. diff --git a/docs/AppRoleReadSecretIDNumUsesResponse.md b/docs/AppRoleReadSecretIDNumUsesResponse.md index 29a24a92..cdb93be6 100644 --- a/docs/AppRoleReadSecretIDNumUsesResponse.md +++ b/docs/AppRoleReadSecretIDNumUsesResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadSecretIDNumUsesResponse +# AppRoleReadSecretIdNumUsesResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadSecretIDNumUsesResponse +### NewAppRoleReadSecretIdNumUsesResponse -`func NewAppRoleReadSecretIDNumUsesResponse() *AppRoleReadSecretIDNumUsesResponse` +`func NewAppRoleReadSecretIdNumUsesResponse() *AppRoleReadSecretIdNumUsesResponse` -NewAppRoleReadSecretIDNumUsesResponse instantiates a new AppRoleReadSecretIDNumUsesResponse object +NewAppRoleReadSecretIdNumUsesResponse instantiates a new AppRoleReadSecretIdNumUsesResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadSecretIDNumUsesResponseWithDefaults +### NewAppRoleReadSecretIdNumUsesResponseWithDefaults -`func NewAppRoleReadSecretIDNumUsesResponseWithDefaults() *AppRoleReadSecretIDNumUsesResponse` +`func NewAppRoleReadSecretIdNumUsesResponseWithDefaults() *AppRoleReadSecretIdNumUsesResponse` -NewAppRoleReadSecretIDNumUsesResponseWithDefaults instantiates a new AppRoleReadSecretIDNumUsesResponse object +NewAppRoleReadSecretIdNumUsesResponseWithDefaults instantiates a new AppRoleReadSecretIdNumUsesResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdNumUses -`func (o *AppRoleReadSecretIDNumUsesResponse) GetSecretIdNumUses() int32` +`func (o *AppRoleReadSecretIdNumUsesResponse) GetSecretIdNumUses() int32` GetSecretIdNumUses returns the SecretIdNumUses field if non-nil, zero value otherwise. ### GetSecretIdNumUsesOk -`func (o *AppRoleReadSecretIDNumUsesResponse) GetSecretIdNumUsesOk() (*int32, bool)` +`func (o *AppRoleReadSecretIdNumUsesResponse) GetSecretIdNumUsesOk() (*int32, bool)` GetSecretIdNumUsesOk returns a tuple with the SecretIdNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdNumUses -`func (o *AppRoleReadSecretIDNumUsesResponse) SetSecretIdNumUses(v int32)` +`func (o *AppRoleReadSecretIdNumUsesResponse) SetSecretIdNumUses(v int32)` SetSecretIdNumUses sets SecretIdNumUses field to given value. ### HasSecretIdNumUses -`func (o *AppRoleReadSecretIDNumUsesResponse) HasSecretIdNumUses() bool` +`func (o *AppRoleReadSecretIdNumUsesResponse) HasSecretIdNumUses() bool` HasSecretIdNumUses returns a boolean if a field has been set. diff --git a/docs/AppRoleReadSecretIDTTLResponse.md b/docs/AppRoleReadSecretIDTTLResponse.md index ac2a5af4..d1cf8c71 100644 --- a/docs/AppRoleReadSecretIDTTLResponse.md +++ b/docs/AppRoleReadSecretIDTTLResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadSecretIDTTLResponse +# AppRoleReadSecretIdTtlResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadSecretIDTTLResponse +### NewAppRoleReadSecretIdTtlResponse -`func NewAppRoleReadSecretIDTTLResponse() *AppRoleReadSecretIDTTLResponse` +`func NewAppRoleReadSecretIdTtlResponse() *AppRoleReadSecretIdTtlResponse` -NewAppRoleReadSecretIDTTLResponse instantiates a new AppRoleReadSecretIDTTLResponse object +NewAppRoleReadSecretIdTtlResponse instantiates a new AppRoleReadSecretIdTtlResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadSecretIDTTLResponseWithDefaults +### NewAppRoleReadSecretIdTtlResponseWithDefaults -`func NewAppRoleReadSecretIDTTLResponseWithDefaults() *AppRoleReadSecretIDTTLResponse` +`func NewAppRoleReadSecretIdTtlResponseWithDefaults() *AppRoleReadSecretIdTtlResponse` -NewAppRoleReadSecretIDTTLResponseWithDefaults instantiates a new AppRoleReadSecretIDTTLResponse object +NewAppRoleReadSecretIdTtlResponseWithDefaults instantiates a new AppRoleReadSecretIdTtlResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdTtl -`func (o *AppRoleReadSecretIDTTLResponse) GetSecretIdTtl() int32` +`func (o *AppRoleReadSecretIdTtlResponse) GetSecretIdTtl() int32` GetSecretIdTtl returns the SecretIdTtl field if non-nil, zero value otherwise. ### GetSecretIdTtlOk -`func (o *AppRoleReadSecretIDTTLResponse) GetSecretIdTtlOk() (*int32, bool)` +`func (o *AppRoleReadSecretIdTtlResponse) GetSecretIdTtlOk() (*int32, bool)` GetSecretIdTtlOk returns a tuple with the SecretIdTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdTtl -`func (o *AppRoleReadSecretIDTTLResponse) SetSecretIdTtl(v int32)` +`func (o *AppRoleReadSecretIdTtlResponse) SetSecretIdTtl(v int32)` SetSecretIdTtl sets SecretIdTtl field to given value. ### HasSecretIdTtl -`func (o *AppRoleReadSecretIDTTLResponse) HasSecretIdTtl() bool` +`func (o *AppRoleReadSecretIdTtlResponse) HasSecretIdTtl() bool` HasSecretIdTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleReadTokenBoundCIDRsResponse.md b/docs/AppRoleReadTokenBoundCIDRsResponse.md index a97612d0..098c923b 100644 --- a/docs/AppRoleReadTokenBoundCIDRsResponse.md +++ b/docs/AppRoleReadTokenBoundCIDRsResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadTokenBoundCIDRsResponse +# AppRoleReadTokenBoundCidrsResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadTokenBoundCIDRsResponse +### NewAppRoleReadTokenBoundCidrsResponse -`func NewAppRoleReadTokenBoundCIDRsResponse() *AppRoleReadTokenBoundCIDRsResponse` +`func NewAppRoleReadTokenBoundCidrsResponse() *AppRoleReadTokenBoundCidrsResponse` -NewAppRoleReadTokenBoundCIDRsResponse instantiates a new AppRoleReadTokenBoundCIDRsResponse object +NewAppRoleReadTokenBoundCidrsResponse instantiates a new AppRoleReadTokenBoundCidrsResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadTokenBoundCIDRsResponseWithDefaults +### NewAppRoleReadTokenBoundCidrsResponseWithDefaults -`func NewAppRoleReadTokenBoundCIDRsResponseWithDefaults() *AppRoleReadTokenBoundCIDRsResponse` +`func NewAppRoleReadTokenBoundCidrsResponseWithDefaults() *AppRoleReadTokenBoundCidrsResponse` -NewAppRoleReadTokenBoundCIDRsResponseWithDefaults instantiates a new AppRoleReadTokenBoundCIDRsResponse object +NewAppRoleReadTokenBoundCidrsResponseWithDefaults instantiates a new AppRoleReadTokenBoundCidrsResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTokenBoundCidrs -`func (o *AppRoleReadTokenBoundCIDRsResponse) GetTokenBoundCidrs() []string` +`func (o *AppRoleReadTokenBoundCidrsResponse) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *AppRoleReadTokenBoundCIDRsResponse) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleReadTokenBoundCidrsResponse) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *AppRoleReadTokenBoundCIDRsResponse) SetTokenBoundCidrs(v []string)` +`func (o *AppRoleReadTokenBoundCidrsResponse) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *AppRoleReadTokenBoundCIDRsResponse) HasTokenBoundCidrs() bool` +`func (o *AppRoleReadTokenBoundCidrsResponse) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. diff --git a/docs/AppRoleReadTokenMaxTTLResponse.md b/docs/AppRoleReadTokenMaxTTLResponse.md index 05892d5f..003b025d 100644 --- a/docs/AppRoleReadTokenMaxTTLResponse.md +++ b/docs/AppRoleReadTokenMaxTTLResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadTokenMaxTTLResponse +# AppRoleReadTokenMaxTtlResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadTokenMaxTTLResponse +### NewAppRoleReadTokenMaxTtlResponse -`func NewAppRoleReadTokenMaxTTLResponse() *AppRoleReadTokenMaxTTLResponse` +`func NewAppRoleReadTokenMaxTtlResponse() *AppRoleReadTokenMaxTtlResponse` -NewAppRoleReadTokenMaxTTLResponse instantiates a new AppRoleReadTokenMaxTTLResponse object +NewAppRoleReadTokenMaxTtlResponse instantiates a new AppRoleReadTokenMaxTtlResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadTokenMaxTTLResponseWithDefaults +### NewAppRoleReadTokenMaxTtlResponseWithDefaults -`func NewAppRoleReadTokenMaxTTLResponseWithDefaults() *AppRoleReadTokenMaxTTLResponse` +`func NewAppRoleReadTokenMaxTtlResponseWithDefaults() *AppRoleReadTokenMaxTtlResponse` -NewAppRoleReadTokenMaxTTLResponseWithDefaults instantiates a new AppRoleReadTokenMaxTTLResponse object +NewAppRoleReadTokenMaxTtlResponseWithDefaults instantiates a new AppRoleReadTokenMaxTtlResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTokenMaxTtl -`func (o *AppRoleReadTokenMaxTTLResponse) GetTokenMaxTtl() int32` +`func (o *AppRoleReadTokenMaxTtlResponse) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *AppRoleReadTokenMaxTTLResponse) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *AppRoleReadTokenMaxTtlResponse) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *AppRoleReadTokenMaxTTLResponse) SetTokenMaxTtl(v int32)` +`func (o *AppRoleReadTokenMaxTtlResponse) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *AppRoleReadTokenMaxTTLResponse) HasTokenMaxTtl() bool` +`func (o *AppRoleReadTokenMaxTtlResponse) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleReadTokenTTLResponse.md b/docs/AppRoleReadTokenTTLResponse.md index 58e06ee8..74b8fe33 100644 --- a/docs/AppRoleReadTokenTTLResponse.md +++ b/docs/AppRoleReadTokenTTLResponse.md @@ -1,4 +1,4 @@ -# AppRoleReadTokenTTLResponse +# AppRoleReadTokenTtlResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleReadTokenTTLResponse +### NewAppRoleReadTokenTtlResponse -`func NewAppRoleReadTokenTTLResponse() *AppRoleReadTokenTTLResponse` +`func NewAppRoleReadTokenTtlResponse() *AppRoleReadTokenTtlResponse` -NewAppRoleReadTokenTTLResponse instantiates a new AppRoleReadTokenTTLResponse object +NewAppRoleReadTokenTtlResponse instantiates a new AppRoleReadTokenTtlResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleReadTokenTTLResponseWithDefaults +### NewAppRoleReadTokenTtlResponseWithDefaults -`func NewAppRoleReadTokenTTLResponseWithDefaults() *AppRoleReadTokenTTLResponse` +`func NewAppRoleReadTokenTtlResponseWithDefaults() *AppRoleReadTokenTtlResponse` -NewAppRoleReadTokenTTLResponseWithDefaults instantiates a new AppRoleReadTokenTTLResponse object +NewAppRoleReadTokenTtlResponseWithDefaults instantiates a new AppRoleReadTokenTtlResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTokenTtl -`func (o *AppRoleReadTokenTTLResponse) GetTokenTtl() int32` +`func (o *AppRoleReadTokenTtlResponse) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *AppRoleReadTokenTTLResponse) GetTokenTtlOk() (*int32, bool)` +`func (o *AppRoleReadTokenTtlResponse) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *AppRoleReadTokenTTLResponse) SetTokenTtl(v int32)` +`func (o *AppRoleReadTokenTtlResponse) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *AppRoleReadTokenTTLResponse) HasTokenTtl() bool` +`func (o *AppRoleReadTokenTtlResponse) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteBindSecretIDRequest.md b/docs/AppRoleWriteBindSecretIDRequest.md index 626cac56..e64bd123 100644 --- a/docs/AppRoleWriteBindSecretIDRequest.md +++ b/docs/AppRoleWriteBindSecretIDRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteBindSecretIDRequest +# AppRoleWriteBindSecretIdRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteBindSecretIDRequest +### NewAppRoleWriteBindSecretIdRequest -`func NewAppRoleWriteBindSecretIDRequest() *AppRoleWriteBindSecretIDRequest` +`func NewAppRoleWriteBindSecretIdRequest() *AppRoleWriteBindSecretIdRequest` -NewAppRoleWriteBindSecretIDRequest instantiates a new AppRoleWriteBindSecretIDRequest object +NewAppRoleWriteBindSecretIdRequest instantiates a new AppRoleWriteBindSecretIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteBindSecretIDRequestWithDefaults +### NewAppRoleWriteBindSecretIdRequestWithDefaults -`func NewAppRoleWriteBindSecretIDRequestWithDefaults() *AppRoleWriteBindSecretIDRequest` +`func NewAppRoleWriteBindSecretIdRequestWithDefaults() *AppRoleWriteBindSecretIdRequest` -NewAppRoleWriteBindSecretIDRequestWithDefaults instantiates a new AppRoleWriteBindSecretIDRequest object +NewAppRoleWriteBindSecretIdRequestWithDefaults instantiates a new AppRoleWriteBindSecretIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBindSecretId -`func (o *AppRoleWriteBindSecretIDRequest) GetBindSecretId() bool` +`func (o *AppRoleWriteBindSecretIdRequest) GetBindSecretId() bool` GetBindSecretId returns the BindSecretId field if non-nil, zero value otherwise. ### GetBindSecretIdOk -`func (o *AppRoleWriteBindSecretIDRequest) GetBindSecretIdOk() (*bool, bool)` +`func (o *AppRoleWriteBindSecretIdRequest) GetBindSecretIdOk() (*bool, bool)` GetBindSecretIdOk returns a tuple with the BindSecretId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBindSecretId -`func (o *AppRoleWriteBindSecretIDRequest) SetBindSecretId(v bool)` +`func (o *AppRoleWriteBindSecretIdRequest) SetBindSecretId(v bool)` SetBindSecretId sets BindSecretId field to given value. ### HasBindSecretId -`func (o *AppRoleWriteBindSecretIDRequest) HasBindSecretId() bool` +`func (o *AppRoleWriteBindSecretIdRequest) HasBindSecretId() bool` HasBindSecretId returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteBoundCIDRListRequest.md b/docs/AppRoleWriteBoundCIDRListRequest.md index 7b5206a0..dc864322 100644 --- a/docs/AppRoleWriteBoundCIDRListRequest.md +++ b/docs/AppRoleWriteBoundCIDRListRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteBoundCIDRListRequest +# AppRoleWriteBoundCidrListRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteBoundCIDRListRequest +### NewAppRoleWriteBoundCidrListRequest -`func NewAppRoleWriteBoundCIDRListRequest() *AppRoleWriteBoundCIDRListRequest` +`func NewAppRoleWriteBoundCidrListRequest() *AppRoleWriteBoundCidrListRequest` -NewAppRoleWriteBoundCIDRListRequest instantiates a new AppRoleWriteBoundCIDRListRequest object +NewAppRoleWriteBoundCidrListRequest instantiates a new AppRoleWriteBoundCidrListRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteBoundCIDRListRequestWithDefaults +### NewAppRoleWriteBoundCidrListRequestWithDefaults -`func NewAppRoleWriteBoundCIDRListRequestWithDefaults() *AppRoleWriteBoundCIDRListRequest` +`func NewAppRoleWriteBoundCidrListRequestWithDefaults() *AppRoleWriteBoundCidrListRequest` -NewAppRoleWriteBoundCIDRListRequestWithDefaults instantiates a new AppRoleWriteBoundCIDRListRequest object +NewAppRoleWriteBoundCidrListRequestWithDefaults instantiates a new AppRoleWriteBoundCidrListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBoundCidrList -`func (o *AppRoleWriteBoundCIDRListRequest) GetBoundCidrList() []string` +`func (o *AppRoleWriteBoundCidrListRequest) GetBoundCidrList() []string` GetBoundCidrList returns the BoundCidrList field if non-nil, zero value otherwise. ### GetBoundCidrListOk -`func (o *AppRoleWriteBoundCIDRListRequest) GetBoundCidrListOk() (*[]string, bool)` +`func (o *AppRoleWriteBoundCidrListRequest) GetBoundCidrListOk() (*[]string, bool)` GetBoundCidrListOk returns a tuple with the BoundCidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundCidrList -`func (o *AppRoleWriteBoundCIDRListRequest) SetBoundCidrList(v []string)` +`func (o *AppRoleWriteBoundCidrListRequest) SetBoundCidrList(v []string)` SetBoundCidrList sets BoundCidrList field to given value. ### HasBoundCidrList -`func (o *AppRoleWriteBoundCIDRListRequest) HasBoundCidrList() bool` +`func (o *AppRoleWriteBoundCidrListRequest) HasBoundCidrList() bool` HasBoundCidrList returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteCustomSecretIDRequest.md b/docs/AppRoleWriteCustomSecretIDRequest.md index d73c69ab..a2d1bf19 100644 --- a/docs/AppRoleWriteCustomSecretIDRequest.md +++ b/docs/AppRoleWriteCustomSecretIDRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteCustomSecretIDRequest +# AppRoleWriteCustomSecretIdRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteCustomSecretIDRequest +### NewAppRoleWriteCustomSecretIdRequest -`func NewAppRoleWriteCustomSecretIDRequest() *AppRoleWriteCustomSecretIDRequest` +`func NewAppRoleWriteCustomSecretIdRequest() *AppRoleWriteCustomSecretIdRequest` -NewAppRoleWriteCustomSecretIDRequest instantiates a new AppRoleWriteCustomSecretIDRequest object +NewAppRoleWriteCustomSecretIdRequest instantiates a new AppRoleWriteCustomSecretIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteCustomSecretIDRequestWithDefaults +### NewAppRoleWriteCustomSecretIdRequestWithDefaults -`func NewAppRoleWriteCustomSecretIDRequestWithDefaults() *AppRoleWriteCustomSecretIDRequest` +`func NewAppRoleWriteCustomSecretIdRequestWithDefaults() *AppRoleWriteCustomSecretIdRequest` -NewAppRoleWriteCustomSecretIDRequestWithDefaults instantiates a new AppRoleWriteCustomSecretIDRequest object +NewAppRoleWriteCustomSecretIdRequestWithDefaults instantiates a new AppRoleWriteCustomSecretIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCidrList -`func (o *AppRoleWriteCustomSecretIDRequest) GetCidrList() []string` +`func (o *AppRoleWriteCustomSecretIdRequest) GetCidrList() []string` GetCidrList returns the CidrList field if non-nil, zero value otherwise. ### GetCidrListOk -`func (o *AppRoleWriteCustomSecretIDRequest) GetCidrListOk() (*[]string, bool)` +`func (o *AppRoleWriteCustomSecretIdRequest) GetCidrListOk() (*[]string, bool)` GetCidrListOk returns a tuple with the CidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCidrList -`func (o *AppRoleWriteCustomSecretIDRequest) SetCidrList(v []string)` +`func (o *AppRoleWriteCustomSecretIdRequest) SetCidrList(v []string)` SetCidrList sets CidrList field to given value. ### HasCidrList -`func (o *AppRoleWriteCustomSecretIDRequest) HasCidrList() bool` +`func (o *AppRoleWriteCustomSecretIdRequest) HasCidrList() bool` HasCidrList returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasCidrList returns a boolean if a field has been set. ### GetMetadata -`func (o *AppRoleWriteCustomSecretIDRequest) GetMetadata() string` +`func (o *AppRoleWriteCustomSecretIdRequest) GetMetadata() string` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *AppRoleWriteCustomSecretIDRequest) GetMetadataOk() (*string, bool)` +`func (o *AppRoleWriteCustomSecretIdRequest) GetMetadataOk() (*string, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *AppRoleWriteCustomSecretIDRequest) SetMetadata(v string)` +`func (o *AppRoleWriteCustomSecretIdRequest) SetMetadata(v string)` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *AppRoleWriteCustomSecretIDRequest) HasMetadata() bool` +`func (o *AppRoleWriteCustomSecretIdRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasMetadata returns a boolean if a field has been set. ### GetNumUses -`func (o *AppRoleWriteCustomSecretIDRequest) GetNumUses() int32` +`func (o *AppRoleWriteCustomSecretIdRequest) GetNumUses() int32` GetNumUses returns the NumUses field if non-nil, zero value otherwise. ### GetNumUsesOk -`func (o *AppRoleWriteCustomSecretIDRequest) GetNumUsesOk() (*int32, bool)` +`func (o *AppRoleWriteCustomSecretIdRequest) GetNumUsesOk() (*int32, bool)` GetNumUsesOk returns a tuple with the NumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNumUses -`func (o *AppRoleWriteCustomSecretIDRequest) SetNumUses(v int32)` +`func (o *AppRoleWriteCustomSecretIdRequest) SetNumUses(v int32)` SetNumUses sets NumUses field to given value. ### HasNumUses -`func (o *AppRoleWriteCustomSecretIDRequest) HasNumUses() bool` +`func (o *AppRoleWriteCustomSecretIdRequest) HasNumUses() bool` HasNumUses returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasNumUses returns a boolean if a field has been set. ### GetSecretId -`func (o *AppRoleWriteCustomSecretIDRequest) GetSecretId() string` +`func (o *AppRoleWriteCustomSecretIdRequest) GetSecretId() string` GetSecretId returns the SecretId field if non-nil, zero value otherwise. ### GetSecretIdOk -`func (o *AppRoleWriteCustomSecretIDRequest) GetSecretIdOk() (*string, bool)` +`func (o *AppRoleWriteCustomSecretIdRequest) GetSecretIdOk() (*string, bool)` GetSecretIdOk returns a tuple with the SecretId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretId -`func (o *AppRoleWriteCustomSecretIDRequest) SetSecretId(v string)` +`func (o *AppRoleWriteCustomSecretIdRequest) SetSecretId(v string)` SetSecretId sets SecretId field to given value. ### HasSecretId -`func (o *AppRoleWriteCustomSecretIDRequest) HasSecretId() bool` +`func (o *AppRoleWriteCustomSecretIdRequest) HasSecretId() bool` HasSecretId returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasSecretId returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *AppRoleWriteCustomSecretIDRequest) GetTokenBoundCidrs() []string` +`func (o *AppRoleWriteCustomSecretIdRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *AppRoleWriteCustomSecretIDRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleWriteCustomSecretIdRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *AppRoleWriteCustomSecretIDRequest) SetTokenBoundCidrs(v []string)` +`func (o *AppRoleWriteCustomSecretIdRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *AppRoleWriteCustomSecretIDRequest) HasTokenBoundCidrs() bool` +`func (o *AppRoleWriteCustomSecretIdRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTtl -`func (o *AppRoleWriteCustomSecretIDRequest) GetTtl() int32` +`func (o *AppRoleWriteCustomSecretIdRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *AppRoleWriteCustomSecretIDRequest) GetTtlOk() (*int32, bool)` +`func (o *AppRoleWriteCustomSecretIdRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *AppRoleWriteCustomSecretIDRequest) SetTtl(v int32)` +`func (o *AppRoleWriteCustomSecretIdRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *AppRoleWriteCustomSecretIDRequest) HasTtl() bool` +`func (o *AppRoleWriteCustomSecretIdRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteCustomSecretIDResponse.md b/docs/AppRoleWriteCustomSecretIDResponse.md index e269ac8f..8e4cbbfc 100644 --- a/docs/AppRoleWriteCustomSecretIDResponse.md +++ b/docs/AppRoleWriteCustomSecretIDResponse.md @@ -1,4 +1,4 @@ -# AppRoleWriteCustomSecretIDResponse +# AppRoleWriteCustomSecretIdResponse ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteCustomSecretIDResponse +### NewAppRoleWriteCustomSecretIdResponse -`func NewAppRoleWriteCustomSecretIDResponse() *AppRoleWriteCustomSecretIDResponse` +`func NewAppRoleWriteCustomSecretIdResponse() *AppRoleWriteCustomSecretIdResponse` -NewAppRoleWriteCustomSecretIDResponse instantiates a new AppRoleWriteCustomSecretIDResponse object +NewAppRoleWriteCustomSecretIdResponse instantiates a new AppRoleWriteCustomSecretIdResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteCustomSecretIDResponseWithDefaults +### NewAppRoleWriteCustomSecretIdResponseWithDefaults -`func NewAppRoleWriteCustomSecretIDResponseWithDefaults() *AppRoleWriteCustomSecretIDResponse` +`func NewAppRoleWriteCustomSecretIdResponseWithDefaults() *AppRoleWriteCustomSecretIdResponse` -NewAppRoleWriteCustomSecretIDResponseWithDefaults instantiates a new AppRoleWriteCustomSecretIDResponse object +NewAppRoleWriteCustomSecretIdResponseWithDefaults instantiates a new AppRoleWriteCustomSecretIdResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretId -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretId() string` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretId() string` GetSecretId returns the SecretId field if non-nil, zero value otherwise. ### GetSecretIdOk -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretIdOk() (*string, bool)` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretIdOk() (*string, bool)` GetSecretIdOk returns a tuple with the SecretId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretId -`func (o *AppRoleWriteCustomSecretIDResponse) SetSecretId(v string)` +`func (o *AppRoleWriteCustomSecretIdResponse) SetSecretId(v string)` SetSecretId sets SecretId field to given value. ### HasSecretId -`func (o *AppRoleWriteCustomSecretIDResponse) HasSecretId() bool` +`func (o *AppRoleWriteCustomSecretIdResponse) HasSecretId() bool` HasSecretId returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasSecretId returns a boolean if a field has been set. ### GetSecretIdAccessor -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretIdAccessor() string` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretIdAccessor() string` GetSecretIdAccessor returns the SecretIdAccessor field if non-nil, zero value otherwise. ### GetSecretIdAccessorOk -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretIdAccessorOk() (*string, bool)` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretIdAccessorOk() (*string, bool)` GetSecretIdAccessorOk returns a tuple with the SecretIdAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdAccessor -`func (o *AppRoleWriteCustomSecretIDResponse) SetSecretIdAccessor(v string)` +`func (o *AppRoleWriteCustomSecretIdResponse) SetSecretIdAccessor(v string)` SetSecretIdAccessor sets SecretIdAccessor field to given value. ### HasSecretIdAccessor -`func (o *AppRoleWriteCustomSecretIDResponse) HasSecretIdAccessor() bool` +`func (o *AppRoleWriteCustomSecretIdResponse) HasSecretIdAccessor() bool` HasSecretIdAccessor returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasSecretIdAccessor returns a boolean if a field has been set. ### GetSecretIdNumUses -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretIdNumUses() int32` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretIdNumUses() int32` GetSecretIdNumUses returns the SecretIdNumUses field if non-nil, zero value otherwise. ### GetSecretIdNumUsesOk -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretIdNumUsesOk() (*int32, bool)` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretIdNumUsesOk() (*int32, bool)` GetSecretIdNumUsesOk returns a tuple with the SecretIdNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdNumUses -`func (o *AppRoleWriteCustomSecretIDResponse) SetSecretIdNumUses(v int32)` +`func (o *AppRoleWriteCustomSecretIdResponse) SetSecretIdNumUses(v int32)` SetSecretIdNumUses sets SecretIdNumUses field to given value. ### HasSecretIdNumUses -`func (o *AppRoleWriteCustomSecretIDResponse) HasSecretIdNumUses() bool` +`func (o *AppRoleWriteCustomSecretIdResponse) HasSecretIdNumUses() bool` HasSecretIdNumUses returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasSecretIdNumUses returns a boolean if a field has been set. ### GetSecretIdTtl -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretIdTtl() int32` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretIdTtl() int32` GetSecretIdTtl returns the SecretIdTtl field if non-nil, zero value otherwise. ### GetSecretIdTtlOk -`func (o *AppRoleWriteCustomSecretIDResponse) GetSecretIdTtlOk() (*int32, bool)` +`func (o *AppRoleWriteCustomSecretIdResponse) GetSecretIdTtlOk() (*int32, bool)` GetSecretIdTtlOk returns a tuple with the SecretIdTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdTtl -`func (o *AppRoleWriteCustomSecretIDResponse) SetSecretIdTtl(v int32)` +`func (o *AppRoleWriteCustomSecretIdResponse) SetSecretIdTtl(v int32)` SetSecretIdTtl sets SecretIdTtl field to given value. ### HasSecretIdTtl -`func (o *AppRoleWriteCustomSecretIDResponse) HasSecretIdTtl() bool` +`func (o *AppRoleWriteCustomSecretIdResponse) HasSecretIdTtl() bool` HasSecretIdTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteRoleIDRequest.md b/docs/AppRoleWriteRoleIDRequest.md index 0bdc3b8b..da498544 100644 --- a/docs/AppRoleWriteRoleIDRequest.md +++ b/docs/AppRoleWriteRoleIDRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteRoleIDRequest +# AppRoleWriteRoleIdRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteRoleIDRequest +### NewAppRoleWriteRoleIdRequest -`func NewAppRoleWriteRoleIDRequest() *AppRoleWriteRoleIDRequest` +`func NewAppRoleWriteRoleIdRequest() *AppRoleWriteRoleIdRequest` -NewAppRoleWriteRoleIDRequest instantiates a new AppRoleWriteRoleIDRequest object +NewAppRoleWriteRoleIdRequest instantiates a new AppRoleWriteRoleIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteRoleIDRequestWithDefaults +### NewAppRoleWriteRoleIdRequestWithDefaults -`func NewAppRoleWriteRoleIDRequestWithDefaults() *AppRoleWriteRoleIDRequest` +`func NewAppRoleWriteRoleIdRequestWithDefaults() *AppRoleWriteRoleIdRequest` -NewAppRoleWriteRoleIDRequestWithDefaults instantiates a new AppRoleWriteRoleIDRequest object +NewAppRoleWriteRoleIdRequestWithDefaults instantiates a new AppRoleWriteRoleIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetRoleId -`func (o *AppRoleWriteRoleIDRequest) GetRoleId() string` +`func (o *AppRoleWriteRoleIdRequest) GetRoleId() string` GetRoleId returns the RoleId field if non-nil, zero value otherwise. ### GetRoleIdOk -`func (o *AppRoleWriteRoleIDRequest) GetRoleIdOk() (*string, bool)` +`func (o *AppRoleWriteRoleIdRequest) GetRoleIdOk() (*string, bool)` GetRoleIdOk returns a tuple with the RoleId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleId -`func (o *AppRoleWriteRoleIDRequest) SetRoleId(v string)` +`func (o *AppRoleWriteRoleIdRequest) SetRoleId(v string)` SetRoleId sets RoleId field to given value. ### HasRoleId -`func (o *AppRoleWriteRoleIDRequest) HasRoleId() bool` +`func (o *AppRoleWriteRoleIdRequest) HasRoleId() bool` HasRoleId returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDBoundCIDRsRequest.md b/docs/AppRoleWriteSecretIDBoundCIDRsRequest.md index 9af4035e..8ebebdc7 100644 --- a/docs/AppRoleWriteSecretIDBoundCIDRsRequest.md +++ b/docs/AppRoleWriteSecretIDBoundCIDRsRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDBoundCIDRsRequest +# AppRoleWriteSecretIdBoundCidrsRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDBoundCIDRsRequest +### NewAppRoleWriteSecretIdBoundCidrsRequest -`func NewAppRoleWriteSecretIDBoundCIDRsRequest() *AppRoleWriteSecretIDBoundCIDRsRequest` +`func NewAppRoleWriteSecretIdBoundCidrsRequest() *AppRoleWriteSecretIdBoundCidrsRequest` -NewAppRoleWriteSecretIDBoundCIDRsRequest instantiates a new AppRoleWriteSecretIDBoundCIDRsRequest object +NewAppRoleWriteSecretIdBoundCidrsRequest instantiates a new AppRoleWriteSecretIdBoundCidrsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults +### NewAppRoleWriteSecretIdBoundCidrsRequestWithDefaults -`func NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults() *AppRoleWriteSecretIDBoundCIDRsRequest` +`func NewAppRoleWriteSecretIdBoundCidrsRequestWithDefaults() *AppRoleWriteSecretIdBoundCidrsRequest` -NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults instantiates a new AppRoleWriteSecretIDBoundCIDRsRequest object +NewAppRoleWriteSecretIdBoundCidrsRequestWithDefaults instantiates a new AppRoleWriteSecretIdBoundCidrsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdBoundCidrs -`func (o *AppRoleWriteSecretIDBoundCIDRsRequest) GetSecretIdBoundCidrs() []string` +`func (o *AppRoleWriteSecretIdBoundCidrsRequest) GetSecretIdBoundCidrs() []string` GetSecretIdBoundCidrs returns the SecretIdBoundCidrs field if non-nil, zero value otherwise. ### GetSecretIdBoundCidrsOk -`func (o *AppRoleWriteSecretIDBoundCIDRsRequest) GetSecretIdBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleWriteSecretIdBoundCidrsRequest) GetSecretIdBoundCidrsOk() (*[]string, bool)` GetSecretIdBoundCidrsOk returns a tuple with the SecretIdBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdBoundCidrs -`func (o *AppRoleWriteSecretIDBoundCIDRsRequest) SetSecretIdBoundCidrs(v []string)` +`func (o *AppRoleWriteSecretIdBoundCidrsRequest) SetSecretIdBoundCidrs(v []string)` SetSecretIdBoundCidrs sets SecretIdBoundCidrs field to given value. ### HasSecretIdBoundCidrs -`func (o *AppRoleWriteSecretIDBoundCIDRsRequest) HasSecretIdBoundCidrs() bool` +`func (o *AppRoleWriteSecretIdBoundCidrsRequest) HasSecretIdBoundCidrs() bool` HasSecretIdBoundCidrs returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDNumUsesRequest.md b/docs/AppRoleWriteSecretIDNumUsesRequest.md index 4edbe0c0..5397c6f3 100644 --- a/docs/AppRoleWriteSecretIDNumUsesRequest.md +++ b/docs/AppRoleWriteSecretIDNumUsesRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDNumUsesRequest +# AppRoleWriteSecretIdNumUsesRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDNumUsesRequest +### NewAppRoleWriteSecretIdNumUsesRequest -`func NewAppRoleWriteSecretIDNumUsesRequest() *AppRoleWriteSecretIDNumUsesRequest` +`func NewAppRoleWriteSecretIdNumUsesRequest() *AppRoleWriteSecretIdNumUsesRequest` -NewAppRoleWriteSecretIDNumUsesRequest instantiates a new AppRoleWriteSecretIDNumUsesRequest object +NewAppRoleWriteSecretIdNumUsesRequest instantiates a new AppRoleWriteSecretIdNumUsesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDNumUsesRequestWithDefaults +### NewAppRoleWriteSecretIdNumUsesRequestWithDefaults -`func NewAppRoleWriteSecretIDNumUsesRequestWithDefaults() *AppRoleWriteSecretIDNumUsesRequest` +`func NewAppRoleWriteSecretIdNumUsesRequestWithDefaults() *AppRoleWriteSecretIdNumUsesRequest` -NewAppRoleWriteSecretIDNumUsesRequestWithDefaults instantiates a new AppRoleWriteSecretIDNumUsesRequest object +NewAppRoleWriteSecretIdNumUsesRequestWithDefaults instantiates a new AppRoleWriteSecretIdNumUsesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdNumUses -`func (o *AppRoleWriteSecretIDNumUsesRequest) GetSecretIdNumUses() int32` +`func (o *AppRoleWriteSecretIdNumUsesRequest) GetSecretIdNumUses() int32` GetSecretIdNumUses returns the SecretIdNumUses field if non-nil, zero value otherwise. ### GetSecretIdNumUsesOk -`func (o *AppRoleWriteSecretIDNumUsesRequest) GetSecretIdNumUsesOk() (*int32, bool)` +`func (o *AppRoleWriteSecretIdNumUsesRequest) GetSecretIdNumUsesOk() (*int32, bool)` GetSecretIdNumUsesOk returns a tuple with the SecretIdNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdNumUses -`func (o *AppRoleWriteSecretIDNumUsesRequest) SetSecretIdNumUses(v int32)` +`func (o *AppRoleWriteSecretIdNumUsesRequest) SetSecretIdNumUses(v int32)` SetSecretIdNumUses sets SecretIdNumUses field to given value. ### HasSecretIdNumUses -`func (o *AppRoleWriteSecretIDNumUsesRequest) HasSecretIdNumUses() bool` +`func (o *AppRoleWriteSecretIdNumUsesRequest) HasSecretIdNumUses() bool` HasSecretIdNumUses returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDRequest.md b/docs/AppRoleWriteSecretIDRequest.md index 951da6d0..4d877256 100644 --- a/docs/AppRoleWriteSecretIDRequest.md +++ b/docs/AppRoleWriteSecretIDRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDRequest +# AppRoleWriteSecretIdRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDRequest +### NewAppRoleWriteSecretIdRequest -`func NewAppRoleWriteSecretIDRequest() *AppRoleWriteSecretIDRequest` +`func NewAppRoleWriteSecretIdRequest() *AppRoleWriteSecretIdRequest` -NewAppRoleWriteSecretIDRequest instantiates a new AppRoleWriteSecretIDRequest object +NewAppRoleWriteSecretIdRequest instantiates a new AppRoleWriteSecretIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDRequestWithDefaults +### NewAppRoleWriteSecretIdRequestWithDefaults -`func NewAppRoleWriteSecretIDRequestWithDefaults() *AppRoleWriteSecretIDRequest` +`func NewAppRoleWriteSecretIdRequestWithDefaults() *AppRoleWriteSecretIdRequest` -NewAppRoleWriteSecretIDRequestWithDefaults instantiates a new AppRoleWriteSecretIDRequest object +NewAppRoleWriteSecretIdRequestWithDefaults instantiates a new AppRoleWriteSecretIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCidrList -`func (o *AppRoleWriteSecretIDRequest) GetCidrList() []string` +`func (o *AppRoleWriteSecretIdRequest) GetCidrList() []string` GetCidrList returns the CidrList field if non-nil, zero value otherwise. ### GetCidrListOk -`func (o *AppRoleWriteSecretIDRequest) GetCidrListOk() (*[]string, bool)` +`func (o *AppRoleWriteSecretIdRequest) GetCidrListOk() (*[]string, bool)` GetCidrListOk returns a tuple with the CidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCidrList -`func (o *AppRoleWriteSecretIDRequest) SetCidrList(v []string)` +`func (o *AppRoleWriteSecretIdRequest) SetCidrList(v []string)` SetCidrList sets CidrList field to given value. ### HasCidrList -`func (o *AppRoleWriteSecretIDRequest) HasCidrList() bool` +`func (o *AppRoleWriteSecretIdRequest) HasCidrList() bool` HasCidrList returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasCidrList returns a boolean if a field has been set. ### GetMetadata -`func (o *AppRoleWriteSecretIDRequest) GetMetadata() string` +`func (o *AppRoleWriteSecretIdRequest) GetMetadata() string` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *AppRoleWriteSecretIDRequest) GetMetadataOk() (*string, bool)` +`func (o *AppRoleWriteSecretIdRequest) GetMetadataOk() (*string, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *AppRoleWriteSecretIDRequest) SetMetadata(v string)` +`func (o *AppRoleWriteSecretIdRequest) SetMetadata(v string)` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *AppRoleWriteSecretIDRequest) HasMetadata() bool` +`func (o *AppRoleWriteSecretIdRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasMetadata returns a boolean if a field has been set. ### GetNumUses -`func (o *AppRoleWriteSecretIDRequest) GetNumUses() int32` +`func (o *AppRoleWriteSecretIdRequest) GetNumUses() int32` GetNumUses returns the NumUses field if non-nil, zero value otherwise. ### GetNumUsesOk -`func (o *AppRoleWriteSecretIDRequest) GetNumUsesOk() (*int32, bool)` +`func (o *AppRoleWriteSecretIdRequest) GetNumUsesOk() (*int32, bool)` GetNumUsesOk returns a tuple with the NumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNumUses -`func (o *AppRoleWriteSecretIDRequest) SetNumUses(v int32)` +`func (o *AppRoleWriteSecretIdRequest) SetNumUses(v int32)` SetNumUses sets NumUses field to given value. ### HasNumUses -`func (o *AppRoleWriteSecretIDRequest) HasNumUses() bool` +`func (o *AppRoleWriteSecretIdRequest) HasNumUses() bool` HasNumUses returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasNumUses returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *AppRoleWriteSecretIDRequest) GetTokenBoundCidrs() []string` +`func (o *AppRoleWriteSecretIdRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *AppRoleWriteSecretIDRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleWriteSecretIdRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *AppRoleWriteSecretIDRequest) SetTokenBoundCidrs(v []string)` +`func (o *AppRoleWriteSecretIdRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *AppRoleWriteSecretIDRequest) HasTokenBoundCidrs() bool` +`func (o *AppRoleWriteSecretIdRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTtl -`func (o *AppRoleWriteSecretIDRequest) GetTtl() int32` +`func (o *AppRoleWriteSecretIdRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *AppRoleWriteSecretIDRequest) GetTtlOk() (*int32, bool)` +`func (o *AppRoleWriteSecretIdRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *AppRoleWriteSecretIDRequest) SetTtl(v int32)` +`func (o *AppRoleWriteSecretIdRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *AppRoleWriteSecretIDRequest) HasTtl() bool` +`func (o *AppRoleWriteSecretIdRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDResponse.md b/docs/AppRoleWriteSecretIDResponse.md index b4208eba..c6c665d8 100644 --- a/docs/AppRoleWriteSecretIDResponse.md +++ b/docs/AppRoleWriteSecretIDResponse.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDResponse +# AppRoleWriteSecretIdResponse ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDResponse +### NewAppRoleWriteSecretIdResponse -`func NewAppRoleWriteSecretIDResponse() *AppRoleWriteSecretIDResponse` +`func NewAppRoleWriteSecretIdResponse() *AppRoleWriteSecretIdResponse` -NewAppRoleWriteSecretIDResponse instantiates a new AppRoleWriteSecretIDResponse object +NewAppRoleWriteSecretIdResponse instantiates a new AppRoleWriteSecretIdResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDResponseWithDefaults +### NewAppRoleWriteSecretIdResponseWithDefaults -`func NewAppRoleWriteSecretIDResponseWithDefaults() *AppRoleWriteSecretIDResponse` +`func NewAppRoleWriteSecretIdResponseWithDefaults() *AppRoleWriteSecretIdResponse` -NewAppRoleWriteSecretIDResponseWithDefaults instantiates a new AppRoleWriteSecretIDResponse object +NewAppRoleWriteSecretIdResponseWithDefaults instantiates a new AppRoleWriteSecretIdResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretId -`func (o *AppRoleWriteSecretIDResponse) GetSecretId() string` +`func (o *AppRoleWriteSecretIdResponse) GetSecretId() string` GetSecretId returns the SecretId field if non-nil, zero value otherwise. ### GetSecretIdOk -`func (o *AppRoleWriteSecretIDResponse) GetSecretIdOk() (*string, bool)` +`func (o *AppRoleWriteSecretIdResponse) GetSecretIdOk() (*string, bool)` GetSecretIdOk returns a tuple with the SecretId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretId -`func (o *AppRoleWriteSecretIDResponse) SetSecretId(v string)` +`func (o *AppRoleWriteSecretIdResponse) SetSecretId(v string)` SetSecretId sets SecretId field to given value. ### HasSecretId -`func (o *AppRoleWriteSecretIDResponse) HasSecretId() bool` +`func (o *AppRoleWriteSecretIdResponse) HasSecretId() bool` HasSecretId returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasSecretId returns a boolean if a field has been set. ### GetSecretIdAccessor -`func (o *AppRoleWriteSecretIDResponse) GetSecretIdAccessor() string` +`func (o *AppRoleWriteSecretIdResponse) GetSecretIdAccessor() string` GetSecretIdAccessor returns the SecretIdAccessor field if non-nil, zero value otherwise. ### GetSecretIdAccessorOk -`func (o *AppRoleWriteSecretIDResponse) GetSecretIdAccessorOk() (*string, bool)` +`func (o *AppRoleWriteSecretIdResponse) GetSecretIdAccessorOk() (*string, bool)` GetSecretIdAccessorOk returns a tuple with the SecretIdAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdAccessor -`func (o *AppRoleWriteSecretIDResponse) SetSecretIdAccessor(v string)` +`func (o *AppRoleWriteSecretIdResponse) SetSecretIdAccessor(v string)` SetSecretIdAccessor sets SecretIdAccessor field to given value. ### HasSecretIdAccessor -`func (o *AppRoleWriteSecretIDResponse) HasSecretIdAccessor() bool` +`func (o *AppRoleWriteSecretIdResponse) HasSecretIdAccessor() bool` HasSecretIdAccessor returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasSecretIdAccessor returns a boolean if a field has been set. ### GetSecretIdNumUses -`func (o *AppRoleWriteSecretIDResponse) GetSecretIdNumUses() int32` +`func (o *AppRoleWriteSecretIdResponse) GetSecretIdNumUses() int32` GetSecretIdNumUses returns the SecretIdNumUses field if non-nil, zero value otherwise. ### GetSecretIdNumUsesOk -`func (o *AppRoleWriteSecretIDResponse) GetSecretIdNumUsesOk() (*int32, bool)` +`func (o *AppRoleWriteSecretIdResponse) GetSecretIdNumUsesOk() (*int32, bool)` GetSecretIdNumUsesOk returns a tuple with the SecretIdNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdNumUses -`func (o *AppRoleWriteSecretIDResponse) SetSecretIdNumUses(v int32)` +`func (o *AppRoleWriteSecretIdResponse) SetSecretIdNumUses(v int32)` SetSecretIdNumUses sets SecretIdNumUses field to given value. ### HasSecretIdNumUses -`func (o *AppRoleWriteSecretIDResponse) HasSecretIdNumUses() bool` +`func (o *AppRoleWriteSecretIdResponse) HasSecretIdNumUses() bool` HasSecretIdNumUses returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasSecretIdNumUses returns a boolean if a field has been set. ### GetSecretIdTtl -`func (o *AppRoleWriteSecretIDResponse) GetSecretIdTtl() int32` +`func (o *AppRoleWriteSecretIdResponse) GetSecretIdTtl() int32` GetSecretIdTtl returns the SecretIdTtl field if non-nil, zero value otherwise. ### GetSecretIdTtlOk -`func (o *AppRoleWriteSecretIDResponse) GetSecretIdTtlOk() (*int32, bool)` +`func (o *AppRoleWriteSecretIdResponse) GetSecretIdTtlOk() (*int32, bool)` GetSecretIdTtlOk returns a tuple with the SecretIdTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdTtl -`func (o *AppRoleWriteSecretIDResponse) SetSecretIdTtl(v int32)` +`func (o *AppRoleWriteSecretIdResponse) SetSecretIdTtl(v int32)` SetSecretIdTtl sets SecretIdTtl field to given value. ### HasSecretIdTtl -`func (o *AppRoleWriteSecretIDResponse) HasSecretIdTtl() bool` +`func (o *AppRoleWriteSecretIdResponse) HasSecretIdTtl() bool` HasSecretIdTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteSecretIDTTLRequest.md b/docs/AppRoleWriteSecretIDTTLRequest.md index 788e74e2..122943c6 100644 --- a/docs/AppRoleWriteSecretIDTTLRequest.md +++ b/docs/AppRoleWriteSecretIDTTLRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteSecretIDTTLRequest +# AppRoleWriteSecretIdTtlRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteSecretIDTTLRequest +### NewAppRoleWriteSecretIdTtlRequest -`func NewAppRoleWriteSecretIDTTLRequest() *AppRoleWriteSecretIDTTLRequest` +`func NewAppRoleWriteSecretIdTtlRequest() *AppRoleWriteSecretIdTtlRequest` -NewAppRoleWriteSecretIDTTLRequest instantiates a new AppRoleWriteSecretIDTTLRequest object +NewAppRoleWriteSecretIdTtlRequest instantiates a new AppRoleWriteSecretIdTtlRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteSecretIDTTLRequestWithDefaults +### NewAppRoleWriteSecretIdTtlRequestWithDefaults -`func NewAppRoleWriteSecretIDTTLRequestWithDefaults() *AppRoleWriteSecretIDTTLRequest` +`func NewAppRoleWriteSecretIdTtlRequestWithDefaults() *AppRoleWriteSecretIdTtlRequest` -NewAppRoleWriteSecretIDTTLRequestWithDefaults instantiates a new AppRoleWriteSecretIDTTLRequest object +NewAppRoleWriteSecretIdTtlRequestWithDefaults instantiates a new AppRoleWriteSecretIdTtlRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSecretIdTtl -`func (o *AppRoleWriteSecretIDTTLRequest) GetSecretIdTtl() int32` +`func (o *AppRoleWriteSecretIdTtlRequest) GetSecretIdTtl() int32` GetSecretIdTtl returns the SecretIdTtl field if non-nil, zero value otherwise. ### GetSecretIdTtlOk -`func (o *AppRoleWriteSecretIDTTLRequest) GetSecretIdTtlOk() (*int32, bool)` +`func (o *AppRoleWriteSecretIdTtlRequest) GetSecretIdTtlOk() (*int32, bool)` GetSecretIdTtlOk returns a tuple with the SecretIdTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretIdTtl -`func (o *AppRoleWriteSecretIDTTLRequest) SetSecretIdTtl(v int32)` +`func (o *AppRoleWriteSecretIdTtlRequest) SetSecretIdTtl(v int32)` SetSecretIdTtl sets SecretIdTtl field to given value. ### HasSecretIdTtl -`func (o *AppRoleWriteSecretIDTTLRequest) HasSecretIdTtl() bool` +`func (o *AppRoleWriteSecretIdTtlRequest) HasSecretIdTtl() bool` HasSecretIdTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteTokenBoundCIDRsRequest.md b/docs/AppRoleWriteTokenBoundCIDRsRequest.md index 448ecdca..3cd6ee8a 100644 --- a/docs/AppRoleWriteTokenBoundCIDRsRequest.md +++ b/docs/AppRoleWriteTokenBoundCIDRsRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteTokenBoundCIDRsRequest +# AppRoleWriteTokenBoundCidrsRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteTokenBoundCIDRsRequest +### NewAppRoleWriteTokenBoundCidrsRequest -`func NewAppRoleWriteTokenBoundCIDRsRequest() *AppRoleWriteTokenBoundCIDRsRequest` +`func NewAppRoleWriteTokenBoundCidrsRequest() *AppRoleWriteTokenBoundCidrsRequest` -NewAppRoleWriteTokenBoundCIDRsRequest instantiates a new AppRoleWriteTokenBoundCIDRsRequest object +NewAppRoleWriteTokenBoundCidrsRequest instantiates a new AppRoleWriteTokenBoundCidrsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults +### NewAppRoleWriteTokenBoundCidrsRequestWithDefaults -`func NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults() *AppRoleWriteTokenBoundCIDRsRequest` +`func NewAppRoleWriteTokenBoundCidrsRequestWithDefaults() *AppRoleWriteTokenBoundCidrsRequest` -NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults instantiates a new AppRoleWriteTokenBoundCIDRsRequest object +NewAppRoleWriteTokenBoundCidrsRequestWithDefaults instantiates a new AppRoleWriteTokenBoundCidrsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTokenBoundCidrs -`func (o *AppRoleWriteTokenBoundCIDRsRequest) GetTokenBoundCidrs() []string` +`func (o *AppRoleWriteTokenBoundCidrsRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *AppRoleWriteTokenBoundCIDRsRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *AppRoleWriteTokenBoundCidrsRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *AppRoleWriteTokenBoundCIDRsRequest) SetTokenBoundCidrs(v []string)` +`func (o *AppRoleWriteTokenBoundCidrsRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *AppRoleWriteTokenBoundCIDRsRequest) HasTokenBoundCidrs() bool` +`func (o *AppRoleWriteTokenBoundCidrsRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteTokenMaxTTLRequest.md b/docs/AppRoleWriteTokenMaxTTLRequest.md index 5d966a0f..163f11a1 100644 --- a/docs/AppRoleWriteTokenMaxTTLRequest.md +++ b/docs/AppRoleWriteTokenMaxTTLRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteTokenMaxTTLRequest +# AppRoleWriteTokenMaxTtlRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteTokenMaxTTLRequest +### NewAppRoleWriteTokenMaxTtlRequest -`func NewAppRoleWriteTokenMaxTTLRequest() *AppRoleWriteTokenMaxTTLRequest` +`func NewAppRoleWriteTokenMaxTtlRequest() *AppRoleWriteTokenMaxTtlRequest` -NewAppRoleWriteTokenMaxTTLRequest instantiates a new AppRoleWriteTokenMaxTTLRequest object +NewAppRoleWriteTokenMaxTtlRequest instantiates a new AppRoleWriteTokenMaxTtlRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteTokenMaxTTLRequestWithDefaults +### NewAppRoleWriteTokenMaxTtlRequestWithDefaults -`func NewAppRoleWriteTokenMaxTTLRequestWithDefaults() *AppRoleWriteTokenMaxTTLRequest` +`func NewAppRoleWriteTokenMaxTtlRequestWithDefaults() *AppRoleWriteTokenMaxTtlRequest` -NewAppRoleWriteTokenMaxTTLRequestWithDefaults instantiates a new AppRoleWriteTokenMaxTTLRequest object +NewAppRoleWriteTokenMaxTtlRequestWithDefaults instantiates a new AppRoleWriteTokenMaxTtlRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTokenMaxTtl -`func (o *AppRoleWriteTokenMaxTTLRequest) GetTokenMaxTtl() int32` +`func (o *AppRoleWriteTokenMaxTtlRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *AppRoleWriteTokenMaxTTLRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *AppRoleWriteTokenMaxTtlRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *AppRoleWriteTokenMaxTTLRequest) SetTokenMaxTtl(v int32)` +`func (o *AppRoleWriteTokenMaxTtlRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *AppRoleWriteTokenMaxTTLRequest) HasTokenMaxTtl() bool` +`func (o *AppRoleWriteTokenMaxTtlRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. diff --git a/docs/AppRoleWriteTokenTTLRequest.md b/docs/AppRoleWriteTokenTTLRequest.md index 2480f4b9..1d3976e4 100644 --- a/docs/AppRoleWriteTokenTTLRequest.md +++ b/docs/AppRoleWriteTokenTTLRequest.md @@ -1,4 +1,4 @@ -# AppRoleWriteTokenTTLRequest +# AppRoleWriteTokenTtlRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleWriteTokenTTLRequest +### NewAppRoleWriteTokenTtlRequest -`func NewAppRoleWriteTokenTTLRequest() *AppRoleWriteTokenTTLRequest` +`func NewAppRoleWriteTokenTtlRequest() *AppRoleWriteTokenTtlRequest` -NewAppRoleWriteTokenTTLRequest instantiates a new AppRoleWriteTokenTTLRequest object +NewAppRoleWriteTokenTtlRequest instantiates a new AppRoleWriteTokenTtlRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleWriteTokenTTLRequestWithDefaults +### NewAppRoleWriteTokenTtlRequestWithDefaults -`func NewAppRoleWriteTokenTTLRequestWithDefaults() *AppRoleWriteTokenTTLRequest` +`func NewAppRoleWriteTokenTtlRequestWithDefaults() *AppRoleWriteTokenTtlRequest` -NewAppRoleWriteTokenTTLRequestWithDefaults instantiates a new AppRoleWriteTokenTTLRequest object +NewAppRoleWriteTokenTtlRequestWithDefaults instantiates a new AppRoleWriteTokenTtlRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTokenTtl -`func (o *AppRoleWriteTokenTTLRequest) GetTokenTtl() int32` +`func (o *AppRoleWriteTokenTtlRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *AppRoleWriteTokenTTLRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *AppRoleWriteTokenTtlRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *AppRoleWriteTokenTTLRequest) SetTokenTtl(v int32)` +`func (o *AppRoleWriteTokenTtlRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *AppRoleWriteTokenTTLRequest) HasTokenTtl() bool` +`func (o *AppRoleWriteTokenTtlRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. diff --git a/docs/CalculateAuditHashRequest.md b/docs/AuditingCalculateHashRequest.md similarity index 60% rename from docs/CalculateAuditHashRequest.md rename to docs/AuditingCalculateHashRequest.md index 3f294dce..b7fda6f4 100644 --- a/docs/CalculateAuditHashRequest.md +++ b/docs/AuditingCalculateHashRequest.md @@ -1,4 +1,4 @@ -# CalculateAuditHashRequest +# AuditingCalculateHashRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewCalculateAuditHashRequest +### NewAuditingCalculateHashRequest -`func NewCalculateAuditHashRequest() *CalculateAuditHashRequest` +`func NewAuditingCalculateHashRequest() *AuditingCalculateHashRequest` -NewCalculateAuditHashRequest instantiates a new CalculateAuditHashRequest object +NewAuditingCalculateHashRequest instantiates a new AuditingCalculateHashRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewCalculateAuditHashRequestWithDefaults +### NewAuditingCalculateHashRequestWithDefaults -`func NewCalculateAuditHashRequestWithDefaults() *CalculateAuditHashRequest` +`func NewAuditingCalculateHashRequestWithDefaults() *AuditingCalculateHashRequest` -NewCalculateAuditHashRequestWithDefaults instantiates a new CalculateAuditHashRequest object +NewAuditingCalculateHashRequestWithDefaults instantiates a new AuditingCalculateHashRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetInput -`func (o *CalculateAuditHashRequest) GetInput() string` +`func (o *AuditingCalculateHashRequest) GetInput() string` GetInput returns the Input field if non-nil, zero value otherwise. ### GetInputOk -`func (o *CalculateAuditHashRequest) GetInputOk() (*string, bool)` +`func (o *AuditingCalculateHashRequest) GetInputOk() (*string, bool)` GetInputOk returns a tuple with the Input field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInput -`func (o *CalculateAuditHashRequest) SetInput(v string)` +`func (o *AuditingCalculateHashRequest) SetInput(v string)` SetInput sets Input field to given value. ### HasInput -`func (o *CalculateAuditHashRequest) HasInput() bool` +`func (o *AuditingCalculateHashRequest) HasInput() bool` HasInput returns a boolean if a field has been set. diff --git a/docs/AuditingCalculateHashResponse.md b/docs/AuditingCalculateHashResponse.md new file mode 100644 index 00000000..5b63a3fb --- /dev/null +++ b/docs/AuditingCalculateHashResponse.md @@ -0,0 +1,69 @@ +# AuditingCalculateHashResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Hash** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewAuditingCalculateHashResponse + +`func NewAuditingCalculateHashResponse() *AuditingCalculateHashResponse` + +NewAuditingCalculateHashResponse instantiates a new AuditingCalculateHashResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewAuditingCalculateHashResponseWithDefaults + +`func NewAuditingCalculateHashResponseWithDefaults() *AuditingCalculateHashResponse` + +NewAuditingCalculateHashResponseWithDefaults instantiates a new AuditingCalculateHashResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetHash + +`func (o *AuditingCalculateHashResponse) GetHash() string` + +GetHash returns the Hash field if non-nil, zero value otherwise. + +### GetHashOk + +`func (o *AuditingCalculateHashResponse) GetHashOk() (*string, bool)` + +GetHashOk returns a tuple with the Hash field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHash + +`func (o *AuditingCalculateHashResponse) SetHash(v string)` + +SetHash sets Hash field to given value. + + +### HasHash + +`func (o *AuditingCalculateHashResponse) HasHash() bool` + +HasHash returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteAuditDeviceRequest.md b/docs/AuditingEnableDeviceRequest.md similarity index 64% rename from docs/WriteAuditDeviceRequest.md rename to docs/AuditingEnableDeviceRequest.md index 89669fdd..c143795b 100644 --- a/docs/WriteAuditDeviceRequest.md +++ b/docs/AuditingEnableDeviceRequest.md @@ -1,4 +1,4 @@ -# WriteAuditDeviceRequest +# AuditingEnableDeviceRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteAuditDeviceRequest +### NewAuditingEnableDeviceRequest -`func NewWriteAuditDeviceRequest() *WriteAuditDeviceRequest` +`func NewAuditingEnableDeviceRequest() *AuditingEnableDeviceRequest` -NewWriteAuditDeviceRequest instantiates a new WriteAuditDeviceRequest object +NewAuditingEnableDeviceRequest instantiates a new AuditingEnableDeviceRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteAuditDeviceRequestWithDefaults +### NewAuditingEnableDeviceRequestWithDefaults -`func NewWriteAuditDeviceRequestWithDefaults() *WriteAuditDeviceRequest` +`func NewAuditingEnableDeviceRequestWithDefaults() *AuditingEnableDeviceRequest` -NewWriteAuditDeviceRequestWithDefaults instantiates a new WriteAuditDeviceRequest object +NewAuditingEnableDeviceRequestWithDefaults instantiates a new AuditingEnableDeviceRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDescription -`func (o *WriteAuditDeviceRequest) GetDescription() string` +`func (o *AuditingEnableDeviceRequest) GetDescription() string` GetDescription returns the Description field if non-nil, zero value otherwise. ### GetDescriptionOk -`func (o *WriteAuditDeviceRequest) GetDescriptionOk() (*string, bool)` +`func (o *AuditingEnableDeviceRequest) GetDescriptionOk() (*string, bool)` GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDescription -`func (o *WriteAuditDeviceRequest) SetDescription(v string)` +`func (o *AuditingEnableDeviceRequest) SetDescription(v string)` SetDescription sets Description field to given value. ### HasDescription -`func (o *WriteAuditDeviceRequest) HasDescription() bool` +`func (o *AuditingEnableDeviceRequest) HasDescription() bool` HasDescription returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasDescription returns a boolean if a field has been set. ### GetLocal -`func (o *WriteAuditDeviceRequest) GetLocal() bool` +`func (o *AuditingEnableDeviceRequest) GetLocal() bool` GetLocal returns the Local field if non-nil, zero value otherwise. ### GetLocalOk -`func (o *WriteAuditDeviceRequest) GetLocalOk() (*bool, bool)` +`func (o *AuditingEnableDeviceRequest) GetLocalOk() (*bool, bool)` GetLocalOk returns a tuple with the Local field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocal -`func (o *WriteAuditDeviceRequest) SetLocal(v bool)` +`func (o *AuditingEnableDeviceRequest) SetLocal(v bool)` SetLocal sets Local field to given value. ### HasLocal -`func (o *WriteAuditDeviceRequest) HasLocal() bool` +`func (o *AuditingEnableDeviceRequest) HasLocal() bool` HasLocal returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasLocal returns a boolean if a field has been set. ### GetOptions -`func (o *WriteAuditDeviceRequest) GetOptions() map[string]interface{}` +`func (o *AuditingEnableDeviceRequest) GetOptions() map[string]interface{}` GetOptions returns the Options field if non-nil, zero value otherwise. ### GetOptionsOk -`func (o *WriteAuditDeviceRequest) GetOptionsOk() (*map[string]interface{}, bool)` +`func (o *AuditingEnableDeviceRequest) GetOptionsOk() (*map[string]interface{}, bool)` GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOptions -`func (o *WriteAuditDeviceRequest) SetOptions(v map[string]interface{})` +`func (o *AuditingEnableDeviceRequest) SetOptions(v map[string]interface{})` SetOptions sets Options field to given value. ### HasOptions -`func (o *WriteAuditDeviceRequest) HasOptions() bool` +`func (o *AuditingEnableDeviceRequest) HasOptions() bool` HasOptions returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasOptions returns a boolean if a field has been set. ### GetType -`func (o *WriteAuditDeviceRequest) GetType() string` +`func (o *AuditingEnableDeviceRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *WriteAuditDeviceRequest) GetTypeOk() (*string, bool)` +`func (o *AuditingEnableDeviceRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *WriteAuditDeviceRequest) SetType(v string)` +`func (o *AuditingEnableDeviceRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *WriteAuditDeviceRequest) HasType() bool` +`func (o *AuditingEnableDeviceRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/WriteConfigAuditingRequestHeaderRequest.md b/docs/AuditingEnableRequestHeaderRequest.md similarity index 55% rename from docs/WriteConfigAuditingRequestHeaderRequest.md rename to docs/AuditingEnableRequestHeaderRequest.md index 24dffac9..5d91fad7 100644 --- a/docs/WriteConfigAuditingRequestHeaderRequest.md +++ b/docs/AuditingEnableRequestHeaderRequest.md @@ -1,4 +1,4 @@ -# WriteConfigAuditingRequestHeaderRequest +# AuditingEnableRequestHeaderRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteConfigAuditingRequestHeaderRequest +### NewAuditingEnableRequestHeaderRequest -`func NewWriteConfigAuditingRequestHeaderRequest() *WriteConfigAuditingRequestHeaderRequest` +`func NewAuditingEnableRequestHeaderRequest() *AuditingEnableRequestHeaderRequest` -NewWriteConfigAuditingRequestHeaderRequest instantiates a new WriteConfigAuditingRequestHeaderRequest object +NewAuditingEnableRequestHeaderRequest instantiates a new AuditingEnableRequestHeaderRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteConfigAuditingRequestHeaderRequestWithDefaults +### NewAuditingEnableRequestHeaderRequestWithDefaults -`func NewWriteConfigAuditingRequestHeaderRequestWithDefaults() *WriteConfigAuditingRequestHeaderRequest` +`func NewAuditingEnableRequestHeaderRequestWithDefaults() *AuditingEnableRequestHeaderRequest` -NewWriteConfigAuditingRequestHeaderRequestWithDefaults instantiates a new WriteConfigAuditingRequestHeaderRequest object +NewAuditingEnableRequestHeaderRequestWithDefaults instantiates a new AuditingEnableRequestHeaderRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetHmac -`func (o *WriteConfigAuditingRequestHeaderRequest) GetHmac() bool` +`func (o *AuditingEnableRequestHeaderRequest) GetHmac() bool` GetHmac returns the Hmac field if non-nil, zero value otherwise. ### GetHmacOk -`func (o *WriteConfigAuditingRequestHeaderRequest) GetHmacOk() (*bool, bool)` +`func (o *AuditingEnableRequestHeaderRequest) GetHmacOk() (*bool, bool)` GetHmacOk returns a tuple with the Hmac field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetHmac -`func (o *WriteConfigAuditingRequestHeaderRequest) SetHmac(v bool)` +`func (o *AuditingEnableRequestHeaderRequest) SetHmac(v bool)` SetHmac sets Hmac field to given value. ### HasHmac -`func (o *WriteConfigAuditingRequestHeaderRequest) HasHmac() bool` +`func (o *AuditingEnableRequestHeaderRequest) HasHmac() bool` HasHmac returns a boolean if a field has been set. diff --git a/docs/AuditingListRequestHeadersResponse.md b/docs/AuditingListRequestHeadersResponse.md new file mode 100644 index 00000000..f59d6d8d --- /dev/null +++ b/docs/AuditingListRequestHeadersResponse.md @@ -0,0 +1,69 @@ +# AuditingListRequestHeadersResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Headers** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewAuditingListRequestHeadersResponse + +`func NewAuditingListRequestHeadersResponse() *AuditingListRequestHeadersResponse` + +NewAuditingListRequestHeadersResponse instantiates a new AuditingListRequestHeadersResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewAuditingListRequestHeadersResponseWithDefaults + +`func NewAuditingListRequestHeadersResponseWithDefaults() *AuditingListRequestHeadersResponse` + +NewAuditingListRequestHeadersResponseWithDefaults instantiates a new AuditingListRequestHeadersResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetHeaders + +`func (o *AuditingListRequestHeadersResponse) GetHeaders() map[string]interface{}` + +GetHeaders returns the Headers field if non-nil, zero value otherwise. + +### GetHeadersOk + +`func (o *AuditingListRequestHeadersResponse) GetHeadersOk() (*map[string]interface{}, bool)` + +GetHeadersOk returns a tuple with the Headers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHeaders + +`func (o *AuditingListRequestHeadersResponse) SetHeaders(v map[string]interface{})` + +SetHeaders sets Headers field to given value. + + +### HasHeaders + +`func (o *AuditingListRequestHeadersResponse) HasHeaders() bool` + +HasHeaders returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AuthApi.md b/docs/AuthApi.md index af500a4b..6ba21404 100644 --- a/docs/AuthApi.md +++ b/docs/AuthApi.md @@ -2,276 +2,268 @@ Method | HTTP request | Description ------------- | ------------- | ------------- -[**AWSConfigDeleteCertificate**](AuthApi.md#AWSConfigDeleteCertificate) | **Delete** /auth/{aws_mount_path}/config/certificate/{cert_name} | -[**AWSConfigDeleteClient**](AuthApi.md#AWSConfigDeleteClient) | **Delete** /auth/{aws_mount_path}/config/client | -[**AWSConfigDeleteIdentityAccessList**](AuthApi.md#AWSConfigDeleteIdentityAccessList) | **Delete** /auth/{aws_mount_path}/config/tidy/identity-accesslist | -[**AWSConfigDeleteIdentityWhiteList**](AuthApi.md#AWSConfigDeleteIdentityWhiteList) | **Delete** /auth/{aws_mount_path}/config/tidy/identity-whitelist | -[**AWSConfigDeleteRoleTagBlackList**](AuthApi.md#AWSConfigDeleteRoleTagBlackList) | **Delete** /auth/{aws_mount_path}/config/tidy/roletag-blacklist | -[**AWSConfigDeleteRoleTagDenyList**](AuthApi.md#AWSConfigDeleteRoleTagDenyList) | **Delete** /auth/{aws_mount_path}/config/tidy/roletag-denylist | -[**AWSConfigDeleteSecurityTokenServiceAccount**](AuthApi.md#AWSConfigDeleteSecurityTokenServiceAccount) | **Delete** /auth/{aws_mount_path}/config/sts/{account_id} | -[**AWSConfigListCertificates**](AuthApi.md#AWSConfigListCertificates) | **Get** /auth/{aws_mount_path}/config/certificates | -[**AWSConfigListSecurityTokenService**](AuthApi.md#AWSConfigListSecurityTokenService) | **Get** /auth/{aws_mount_path}/config/sts | -[**AWSConfigReadCertificate**](AuthApi.md#AWSConfigReadCertificate) | **Get** /auth/{aws_mount_path}/config/certificate/{cert_name} | -[**AWSConfigReadClient**](AuthApi.md#AWSConfigReadClient) | **Get** /auth/{aws_mount_path}/config/client | -[**AWSConfigReadIdentity**](AuthApi.md#AWSConfigReadIdentity) | **Get** /auth/{aws_mount_path}/config/identity | -[**AWSConfigReadIdentityAccessList**](AuthApi.md#AWSConfigReadIdentityAccessList) | **Get** /auth/{aws_mount_path}/config/tidy/identity-accesslist | -[**AWSConfigReadIdentityWhiteList**](AuthApi.md#AWSConfigReadIdentityWhiteList) | **Get** /auth/{aws_mount_path}/config/tidy/identity-whitelist | -[**AWSConfigReadRoleTagBlackList**](AuthApi.md#AWSConfigReadRoleTagBlackList) | **Get** /auth/{aws_mount_path}/config/tidy/roletag-blacklist | -[**AWSConfigReadRoleTagDenyList**](AuthApi.md#AWSConfigReadRoleTagDenyList) | **Get** /auth/{aws_mount_path}/config/tidy/roletag-denylist | -[**AWSConfigReadSecurityTokenServiceAccount**](AuthApi.md#AWSConfigReadSecurityTokenServiceAccount) | **Get** /auth/{aws_mount_path}/config/sts/{account_id} | -[**AWSConfigRotateRoot**](AuthApi.md#AWSConfigRotateRoot) | **Post** /auth/{aws_mount_path}/config/rotate-root | -[**AWSConfigWriteCertificate**](AuthApi.md#AWSConfigWriteCertificate) | **Post** /auth/{aws_mount_path}/config/certificate/{cert_name} | -[**AWSConfigWriteClient**](AuthApi.md#AWSConfigWriteClient) | **Post** /auth/{aws_mount_path}/config/client | -[**AWSConfigWriteIdentity**](AuthApi.md#AWSConfigWriteIdentity) | **Post** /auth/{aws_mount_path}/config/identity | -[**AWSConfigWriteIdentityAccessList**](AuthApi.md#AWSConfigWriteIdentityAccessList) | **Post** /auth/{aws_mount_path}/config/tidy/identity-accesslist | -[**AWSConfigWriteIdentityWhiteList**](AuthApi.md#AWSConfigWriteIdentityWhiteList) | **Post** /auth/{aws_mount_path}/config/tidy/identity-whitelist | -[**AWSConfigWriteRoleTagBlackList**](AuthApi.md#AWSConfigWriteRoleTagBlackList) | **Post** /auth/{aws_mount_path}/config/tidy/roletag-blacklist | -[**AWSConfigWriteRoleTagDenyList**](AuthApi.md#AWSConfigWriteRoleTagDenyList) | **Post** /auth/{aws_mount_path}/config/tidy/roletag-denylist | -[**AWSConfigWriteSecurityTokenServiceAccount**](AuthApi.md#AWSConfigWriteSecurityTokenServiceAccount) | **Post** /auth/{aws_mount_path}/config/sts/{account_id} | -[**AWSDeleteAuthRole**](AuthApi.md#AWSDeleteAuthRole) | **Delete** /auth/{aws_mount_path}/role/{role} | -[**AWSDeleteIdentityAccessListFor**](AuthApi.md#AWSDeleteIdentityAccessListFor) | **Delete** /auth/{aws_mount_path}/identity-accesslist/{instance_id} | -[**AWSDeleteIdentityWhiteListFor**](AuthApi.md#AWSDeleteIdentityWhiteListFor) | **Delete** /auth/{aws_mount_path}/identity-whitelist/{instance_id} | -[**AWSDeleteRoleTagBlackListFor**](AuthApi.md#AWSDeleteRoleTagBlackListFor) | **Delete** /auth/{aws_mount_path}/roletag-blacklist/{role_tag} | -[**AWSDeleteRoleTagDenyListFor**](AuthApi.md#AWSDeleteRoleTagDenyListFor) | **Delete** /auth/{aws_mount_path}/roletag-denylist/{role_tag} | -[**AWSListAuthRoles**](AuthApi.md#AWSListAuthRoles) | **Get** /auth/{aws_mount_path}/role | -[**AWSListAuthRoles2**](AuthApi.md#AWSListAuthRoles2) | **Get** /auth/{aws_mount_path}/roles | -[**AWSListIdentityAccessList**](AuthApi.md#AWSListIdentityAccessList) | **Get** /auth/{aws_mount_path}/identity-accesslist | -[**AWSListIdentityWhiteList**](AuthApi.md#AWSListIdentityWhiteList) | **Get** /auth/{aws_mount_path}/identity-whitelist | -[**AWSListRoleTagBlackList**](AuthApi.md#AWSListRoleTagBlackList) | **Get** /auth/{aws_mount_path}/roletag-blacklist | -[**AWSListRoleTagDenyList**](AuthApi.md#AWSListRoleTagDenyList) | **Get** /auth/{aws_mount_path}/roletag-denylist | -[**AWSLogin**](AuthApi.md#AWSLogin) | **Post** /auth/{aws_mount_path}/login | -[**AWSReadAuthRole**](AuthApi.md#AWSReadAuthRole) | **Get** /auth/{aws_mount_path}/role/{role} | -[**AWSReadIdentityAccessListFor**](AuthApi.md#AWSReadIdentityAccessListFor) | **Get** /auth/{aws_mount_path}/identity-accesslist/{instance_id} | -[**AWSReadIdentityWhiteListFor**](AuthApi.md#AWSReadIdentityWhiteListFor) | **Get** /auth/{aws_mount_path}/identity-whitelist/{instance_id} | -[**AWSReadRoleTagBlackListFor**](AuthApi.md#AWSReadRoleTagBlackListFor) | **Get** /auth/{aws_mount_path}/roletag-blacklist/{role_tag} | -[**AWSReadRoleTagDenyListFor**](AuthApi.md#AWSReadRoleTagDenyListFor) | **Get** /auth/{aws_mount_path}/roletag-denylist/{role_tag} | -[**AWSWriteAuthRole**](AuthApi.md#AWSWriteAuthRole) | **Post** /auth/{aws_mount_path}/role/{role} | -[**AWSWriteAuthRoleTag**](AuthApi.md#AWSWriteAuthRoleTag) | **Post** /auth/{aws_mount_path}/role/{role}/tag | -[**AWSWriteIdentityAccessListTidySettings**](AuthApi.md#AWSWriteIdentityAccessListTidySettings) | **Post** /auth/{aws_mount_path}/tidy/identity-accesslist | -[**AWSWriteIdentityWhiteListTidySettings**](AuthApi.md#AWSWriteIdentityWhiteListTidySettings) | **Post** /auth/{aws_mount_path}/tidy/identity-whitelist | -[**AWSWriteRoleTagBlackListFor**](AuthApi.md#AWSWriteRoleTagBlackListFor) | **Post** /auth/{aws_mount_path}/roletag-blacklist/{role_tag} | -[**AWSWriteRoleTagBlackListTidySettings**](AuthApi.md#AWSWriteRoleTagBlackListTidySettings) | **Post** /auth/{aws_mount_path}/tidy/roletag-blacklist | -[**AWSWriteRoleTagDenyListFor**](AuthApi.md#AWSWriteRoleTagDenyListFor) | **Post** /auth/{aws_mount_path}/roletag-denylist/{role_tag} | -[**AWSWriteRoleTagDenyListTidySettings**](AuthApi.md#AWSWriteRoleTagDenyListTidySettings) | **Post** /auth/{aws_mount_path}/tidy/roletag-denylist | [**AliCloudDeleteAuthRole**](AuthApi.md#AliCloudDeleteAuthRole) | **Delete** /auth/{alicloud_mount_path}/role/{role} | Create a role and associate policies to it. [**AliCloudListAuthRoles**](AuthApi.md#AliCloudListAuthRoles) | **Get** /auth/{alicloud_mount_path}/role | Lists all the roles that are registered with Vault. [**AliCloudListAuthRoles2**](AuthApi.md#AliCloudListAuthRoles2) | **Get** /auth/{alicloud_mount_path}/roles | Lists all the roles that are registered with Vault. [**AliCloudLogin**](AuthApi.md#AliCloudLogin) | **Post** /auth/{alicloud_mount_path}/login | Authenticates an RAM entity with Vault. [**AliCloudReadAuthRole**](AuthApi.md#AliCloudReadAuthRole) | **Get** /auth/{alicloud_mount_path}/role/{role} | Create a role and associate policies to it. [**AliCloudWriteAuthRole**](AuthApi.md#AliCloudWriteAuthRole) | **Post** /auth/{alicloud_mount_path}/role/{role} | Create a role and associate policies to it. -[**AppRoleDeleteBindSecretID**](AuthApi.md#AppRoleDeleteBindSecretID) | **Delete** /auth/{approle_mount_path}/role/{role_name}/bind-secret-id | -[**AppRoleDeleteBoundCIDRList**](AuthApi.md#AppRoleDeleteBoundCIDRList) | **Delete** /auth/{approle_mount_path}/role/{role_name}/bound-cidr-list | +[**AppRoleDeleteBindSecretId**](AuthApi.md#AppRoleDeleteBindSecretId) | **Delete** /auth/{approle_mount_path}/role/{role_name}/bind-secret-id | +[**AppRoleDeleteBoundCidrList**](AuthApi.md#AppRoleDeleteBoundCidrList) | **Delete** /auth/{approle_mount_path}/role/{role_name}/bound-cidr-list | [**AppRoleDeletePeriod**](AuthApi.md#AppRoleDeletePeriod) | **Delete** /auth/{approle_mount_path}/role/{role_name}/period | [**AppRoleDeletePolicies**](AuthApi.md#AppRoleDeletePolicies) | **Delete** /auth/{approle_mount_path}/role/{role_name}/policies | [**AppRoleDeleteRole**](AuthApi.md#AppRoleDeleteRole) | **Delete** /auth/{approle_mount_path}/role/{role_name} | -[**AppRoleDeleteSecretIDAccessorDestroy**](AuthApi.md#AppRoleDeleteSecretIDAccessorDestroy) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy | -[**AppRoleDeleteSecretIDBoundCIDRs**](AuthApi.md#AppRoleDeleteSecretIDBoundCIDRs) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs | -[**AppRoleDeleteSecretIDDestroy**](AuthApi.md#AppRoleDeleteSecretIDDestroy) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id/destroy | -[**AppRoleDeleteSecretIDNumUses**](AuthApi.md#AppRoleDeleteSecretIDNumUses) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses | -[**AppRoleDeleteSecretIDTTL**](AuthApi.md#AppRoleDeleteSecretIDTTL) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-ttl | -[**AppRoleDeleteTokenBoundCIDRs**](AuthApi.md#AppRoleDeleteTokenBoundCIDRs) | **Delete** /auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs | -[**AppRoleDeleteTokenMaxTTL**](AuthApi.md#AppRoleDeleteTokenMaxTTL) | **Delete** /auth/{approle_mount_path}/role/{role_name}/token-max-ttl | +[**AppRoleDeleteSecretIdBoundCidrs**](AuthApi.md#AppRoleDeleteSecretIdBoundCidrs) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs | +[**AppRoleDeleteSecretIdNumUses**](AuthApi.md#AppRoleDeleteSecretIdNumUses) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses | +[**AppRoleDeleteSecretIdTtl**](AuthApi.md#AppRoleDeleteSecretIdTtl) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-ttl | +[**AppRoleDeleteTokenBoundCidrs**](AuthApi.md#AppRoleDeleteTokenBoundCidrs) | **Delete** /auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs | +[**AppRoleDeleteTokenMaxTtl**](AuthApi.md#AppRoleDeleteTokenMaxTtl) | **Delete** /auth/{approle_mount_path}/role/{role_name}/token-max-ttl | [**AppRoleDeleteTokenNumUses**](AuthApi.md#AppRoleDeleteTokenNumUses) | **Delete** /auth/{approle_mount_path}/role/{role_name}/token-num-uses | -[**AppRoleDeleteTokenTTL**](AuthApi.md#AppRoleDeleteTokenTTL) | **Delete** /auth/{approle_mount_path}/role/{role_name}/token-ttl | +[**AppRoleDeleteTokenTtl**](AuthApi.md#AppRoleDeleteTokenTtl) | **Delete** /auth/{approle_mount_path}/role/{role_name}/token-ttl | +[**AppRoleDestroySecretId**](AuthApi.md#AppRoleDestroySecretId) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id/destroy | +[**AppRoleDestroySecretId2**](AuthApi.md#AppRoleDestroySecretId2) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id/destroy | +[**AppRoleDestroySecretIdByAccessor**](AuthApi.md#AppRoleDestroySecretIdByAccessor) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy | +[**AppRoleDestroySecretIdByAccessor2**](AuthApi.md#AppRoleDestroySecretIdByAccessor2) | **Delete** /auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy | [**AppRoleListRoles**](AuthApi.md#AppRoleListRoles) | **Get** /auth/{approle_mount_path}/role | -[**AppRoleListSecretID**](AuthApi.md#AppRoleListSecretID) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id | +[**AppRoleListSecretIds**](AuthApi.md#AppRoleListSecretIds) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id | [**AppRoleLogin**](AuthApi.md#AppRoleLogin) | **Post** /auth/{approle_mount_path}/login | -[**AppRoleReadBindSecretID**](AuthApi.md#AppRoleReadBindSecretID) | **Get** /auth/{approle_mount_path}/role/{role_name}/bind-secret-id | -[**AppRoleReadBoundCIDRList**](AuthApi.md#AppRoleReadBoundCIDRList) | **Get** /auth/{approle_mount_path}/role/{role_name}/bound-cidr-list | -[**AppRoleReadLocalSecretIDs**](AuthApi.md#AppRoleReadLocalSecretIDs) | **Get** /auth/{approle_mount_path}/role/{role_name}/local-secret-ids | +[**AppRoleLookUpSecretId**](AuthApi.md#AppRoleLookUpSecretId) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id/lookup | +[**AppRoleLookUpSecretIdByAccessor**](AuthApi.md#AppRoleLookUpSecretIdByAccessor) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/lookup | +[**AppRoleReadBindSecretId**](AuthApi.md#AppRoleReadBindSecretId) | **Get** /auth/{approle_mount_path}/role/{role_name}/bind-secret-id | +[**AppRoleReadBoundCidrList**](AuthApi.md#AppRoleReadBoundCidrList) | **Get** /auth/{approle_mount_path}/role/{role_name}/bound-cidr-list | +[**AppRoleReadLocalSecretIds**](AuthApi.md#AppRoleReadLocalSecretIds) | **Get** /auth/{approle_mount_path}/role/{role_name}/local-secret-ids | [**AppRoleReadPeriod**](AuthApi.md#AppRoleReadPeriod) | **Get** /auth/{approle_mount_path}/role/{role_name}/period | [**AppRoleReadPolicies**](AuthApi.md#AppRoleReadPolicies) | **Get** /auth/{approle_mount_path}/role/{role_name}/policies | [**AppRoleReadRole**](AuthApi.md#AppRoleReadRole) | **Get** /auth/{approle_mount_path}/role/{role_name} | -[**AppRoleReadRoleID**](AuthApi.md#AppRoleReadRoleID) | **Get** /auth/{approle_mount_path}/role/{role_name}/role-id | -[**AppRoleReadSecretIDBoundCIDRs**](AuthApi.md#AppRoleReadSecretIDBoundCIDRs) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs | -[**AppRoleReadSecretIDNumUses**](AuthApi.md#AppRoleReadSecretIDNumUses) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses | -[**AppRoleReadSecretIDTTL**](AuthApi.md#AppRoleReadSecretIDTTL) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id-ttl | -[**AppRoleReadTokenBoundCIDRs**](AuthApi.md#AppRoleReadTokenBoundCIDRs) | **Get** /auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs | -[**AppRoleReadTokenMaxTTL**](AuthApi.md#AppRoleReadTokenMaxTTL) | **Get** /auth/{approle_mount_path}/role/{role_name}/token-max-ttl | +[**AppRoleReadRoleId**](AuthApi.md#AppRoleReadRoleId) | **Get** /auth/{approle_mount_path}/role/{role_name}/role-id | +[**AppRoleReadSecretIdBoundCidrs**](AuthApi.md#AppRoleReadSecretIdBoundCidrs) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs | +[**AppRoleReadSecretIdNumUses**](AuthApi.md#AppRoleReadSecretIdNumUses) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses | +[**AppRoleReadSecretIdTtl**](AuthApi.md#AppRoleReadSecretIdTtl) | **Get** /auth/{approle_mount_path}/role/{role_name}/secret-id-ttl | +[**AppRoleReadTokenBoundCidrs**](AuthApi.md#AppRoleReadTokenBoundCidrs) | **Get** /auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs | +[**AppRoleReadTokenMaxTtl**](AuthApi.md#AppRoleReadTokenMaxTtl) | **Get** /auth/{approle_mount_path}/role/{role_name}/token-max-ttl | [**AppRoleReadTokenNumUses**](AuthApi.md#AppRoleReadTokenNumUses) | **Get** /auth/{approle_mount_path}/role/{role_name}/token-num-uses | -[**AppRoleReadTokenTTL**](AuthApi.md#AppRoleReadTokenTTL) | **Get** /auth/{approle_mount_path}/role/{role_name}/token-ttl | -[**AppRoleTidySecretID**](AuthApi.md#AppRoleTidySecretID) | **Post** /auth/{approle_mount_path}/tidy/secret-id | Trigger the clean-up of expired SecretID entries. -[**AppRoleWriteBindSecretID**](AuthApi.md#AppRoleWriteBindSecretID) | **Post** /auth/{approle_mount_path}/role/{role_name}/bind-secret-id | -[**AppRoleWriteBoundCIDRList**](AuthApi.md#AppRoleWriteBoundCIDRList) | **Post** /auth/{approle_mount_path}/role/{role_name}/bound-cidr-list | -[**AppRoleWriteCustomSecretID**](AuthApi.md#AppRoleWriteCustomSecretID) | **Post** /auth/{approle_mount_path}/role/{role_name}/custom-secret-id | +[**AppRoleReadTokenTtl**](AuthApi.md#AppRoleReadTokenTtl) | **Get** /auth/{approle_mount_path}/role/{role_name}/token-ttl | +[**AppRoleTidySecretId**](AuthApi.md#AppRoleTidySecretId) | **Post** /auth/{approle_mount_path}/tidy/secret-id | +[**AppRoleWriteBindSecretId**](AuthApi.md#AppRoleWriteBindSecretId) | **Post** /auth/{approle_mount_path}/role/{role_name}/bind-secret-id | +[**AppRoleWriteBoundCidrList**](AuthApi.md#AppRoleWriteBoundCidrList) | **Post** /auth/{approle_mount_path}/role/{role_name}/bound-cidr-list | +[**AppRoleWriteCustomSecretId**](AuthApi.md#AppRoleWriteCustomSecretId) | **Post** /auth/{approle_mount_path}/role/{role_name}/custom-secret-id | [**AppRoleWritePeriod**](AuthApi.md#AppRoleWritePeriod) | **Post** /auth/{approle_mount_path}/role/{role_name}/period | [**AppRoleWritePolicies**](AuthApi.md#AppRoleWritePolicies) | **Post** /auth/{approle_mount_path}/role/{role_name}/policies | [**AppRoleWriteRole**](AuthApi.md#AppRoleWriteRole) | **Post** /auth/{approle_mount_path}/role/{role_name} | -[**AppRoleWriteRoleID**](AuthApi.md#AppRoleWriteRoleID) | **Post** /auth/{approle_mount_path}/role/{role_name}/role-id | -[**AppRoleWriteSecretID**](AuthApi.md#AppRoleWriteSecretID) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id | -[**AppRoleWriteSecretIDAccessorDestroy**](AuthApi.md#AppRoleWriteSecretIDAccessorDestroy) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/destroy | -[**AppRoleWriteSecretIDAccessorLookup**](AuthApi.md#AppRoleWriteSecretIDAccessorLookup) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-accessor/lookup | -[**AppRoleWriteSecretIDBoundCIDRs**](AuthApi.md#AppRoleWriteSecretIDBoundCIDRs) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs | -[**AppRoleWriteSecretIDDestroy**](AuthApi.md#AppRoleWriteSecretIDDestroy) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id/destroy | -[**AppRoleWriteSecretIDLookup**](AuthApi.md#AppRoleWriteSecretIDLookup) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id/lookup | -[**AppRoleWriteSecretIDNumUses**](AuthApi.md#AppRoleWriteSecretIDNumUses) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses | -[**AppRoleWriteSecretIDTTL**](AuthApi.md#AppRoleWriteSecretIDTTL) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-ttl | -[**AppRoleWriteTokenBoundCIDRs**](AuthApi.md#AppRoleWriteTokenBoundCIDRs) | **Post** /auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs | -[**AppRoleWriteTokenMaxTTL**](AuthApi.md#AppRoleWriteTokenMaxTTL) | **Post** /auth/{approle_mount_path}/role/{role_name}/token-max-ttl | +[**AppRoleWriteRoleId**](AuthApi.md#AppRoleWriteRoleId) | **Post** /auth/{approle_mount_path}/role/{role_name}/role-id | +[**AppRoleWriteSecretId**](AuthApi.md#AppRoleWriteSecretId) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id | +[**AppRoleWriteSecretIdBoundCidrs**](AuthApi.md#AppRoleWriteSecretIdBoundCidrs) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-bound-cidrs | +[**AppRoleWriteSecretIdNumUses**](AuthApi.md#AppRoleWriteSecretIdNumUses) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-num-uses | +[**AppRoleWriteSecretIdTtl**](AuthApi.md#AppRoleWriteSecretIdTtl) | **Post** /auth/{approle_mount_path}/role/{role_name}/secret-id-ttl | +[**AppRoleWriteTokenBoundCidrs**](AuthApi.md#AppRoleWriteTokenBoundCidrs) | **Post** /auth/{approle_mount_path}/role/{role_name}/token-bound-cidrs | +[**AppRoleWriteTokenMaxTtl**](AuthApi.md#AppRoleWriteTokenMaxTtl) | **Post** /auth/{approle_mount_path}/role/{role_name}/token-max-ttl | [**AppRoleWriteTokenNumUses**](AuthApi.md#AppRoleWriteTokenNumUses) | **Post** /auth/{approle_mount_path}/role/{role_name}/token-num-uses | -[**AppRoleWriteTokenTTL**](AuthApi.md#AppRoleWriteTokenTTL) | **Post** /auth/{approle_mount_path}/role/{role_name}/token-ttl | -[**AzureDeleteAuthConfig**](AuthApi.md#AzureDeleteAuthConfig) | **Delete** /auth/{azure_mount_path}/config | +[**AppRoleWriteTokenTtl**](AuthApi.md#AppRoleWriteTokenTtl) | **Post** /auth/{approle_mount_path}/role/{role_name}/token-ttl | +[**AwsConfigureCertificate**](AuthApi.md#AwsConfigureCertificate) | **Post** /auth/{aws_mount_path}/config/certificate/{cert_name} | +[**AwsConfigureClient**](AuthApi.md#AwsConfigureClient) | **Post** /auth/{aws_mount_path}/config/client | +[**AwsConfigureIdentityAccessListTidyOperation**](AuthApi.md#AwsConfigureIdentityAccessListTidyOperation) | **Post** /auth/{aws_mount_path}/config/tidy/identity-accesslist | +[**AwsConfigureIdentityIntegration**](AuthApi.md#AwsConfigureIdentityIntegration) | **Post** /auth/{aws_mount_path}/config/identity | +[**AwsConfigureIdentityWhitelistTidyOperation**](AuthApi.md#AwsConfigureIdentityWhitelistTidyOperation) | **Post** /auth/{aws_mount_path}/config/tidy/identity-whitelist | +[**AwsConfigureRoleTagBlacklistTidyOperation**](AuthApi.md#AwsConfigureRoleTagBlacklistTidyOperation) | **Post** /auth/{aws_mount_path}/config/tidy/roletag-blacklist | +[**AwsConfigureRoleTagDenyListTidyOperation**](AuthApi.md#AwsConfigureRoleTagDenyListTidyOperation) | **Post** /auth/{aws_mount_path}/config/tidy/roletag-denylist | +[**AwsDeleteAuthRole**](AuthApi.md#AwsDeleteAuthRole) | **Delete** /auth/{aws_mount_path}/role/{role} | +[**AwsDeleteCertificateConfiguration**](AuthApi.md#AwsDeleteCertificateConfiguration) | **Delete** /auth/{aws_mount_path}/config/certificate/{cert_name} | +[**AwsDeleteClientConfiguration**](AuthApi.md#AwsDeleteClientConfiguration) | **Delete** /auth/{aws_mount_path}/config/client | +[**AwsDeleteIdentityAccessList**](AuthApi.md#AwsDeleteIdentityAccessList) | **Delete** /auth/{aws_mount_path}/identity-accesslist/{instance_id} | +[**AwsDeleteIdentityAccessListTidySettings**](AuthApi.md#AwsDeleteIdentityAccessListTidySettings) | **Delete** /auth/{aws_mount_path}/config/tidy/identity-accesslist | +[**AwsDeleteIdentityWhitelist**](AuthApi.md#AwsDeleteIdentityWhitelist) | **Delete** /auth/{aws_mount_path}/identity-whitelist/{instance_id} | +[**AwsDeleteIdentityWhitelistTidySettings**](AuthApi.md#AwsDeleteIdentityWhitelistTidySettings) | **Delete** /auth/{aws_mount_path}/config/tidy/identity-whitelist | +[**AwsDeleteRoleTagBlacklist**](AuthApi.md#AwsDeleteRoleTagBlacklist) | **Delete** /auth/{aws_mount_path}/roletag-blacklist/{role_tag} | +[**AwsDeleteRoleTagBlacklistTidySettings**](AuthApi.md#AwsDeleteRoleTagBlacklistTidySettings) | **Delete** /auth/{aws_mount_path}/config/tidy/roletag-blacklist | +[**AwsDeleteRoleTagDenyList**](AuthApi.md#AwsDeleteRoleTagDenyList) | **Delete** /auth/{aws_mount_path}/roletag-denylist/{role_tag} | +[**AwsDeleteRoleTagDenyListTidySettings**](AuthApi.md#AwsDeleteRoleTagDenyListTidySettings) | **Delete** /auth/{aws_mount_path}/config/tidy/roletag-denylist | +[**AwsDeleteStsRole**](AuthApi.md#AwsDeleteStsRole) | **Delete** /auth/{aws_mount_path}/config/sts/{account_id} | +[**AwsListAuthRoles**](AuthApi.md#AwsListAuthRoles) | **Get** /auth/{aws_mount_path}/role | +[**AwsListCertificateConfigurations**](AuthApi.md#AwsListCertificateConfigurations) | **Get** /auth/{aws_mount_path}/config/certificates | +[**AwsListIdentityAccessList**](AuthApi.md#AwsListIdentityAccessList) | **Get** /auth/{aws_mount_path}/identity-accesslist | +[**AwsListIdentityWhitelist**](AuthApi.md#AwsListIdentityWhitelist) | **Get** /auth/{aws_mount_path}/identity-whitelist | +[**AwsListRoleTagBlacklists**](AuthApi.md#AwsListRoleTagBlacklists) | **Get** /auth/{aws_mount_path}/roletag-blacklist | +[**AwsListRoleTagDenyLists**](AuthApi.md#AwsListRoleTagDenyLists) | **Get** /auth/{aws_mount_path}/roletag-denylist | +[**AwsListRoles2**](AuthApi.md#AwsListRoles2) | **Get** /auth/{aws_mount_path}/roles | +[**AwsListStsRoleRelationships**](AuthApi.md#AwsListStsRoleRelationships) | **Get** /auth/{aws_mount_path}/config/sts | +[**AwsLogin**](AuthApi.md#AwsLogin) | **Post** /auth/{aws_mount_path}/login | +[**AwsReadAuthRole**](AuthApi.md#AwsReadAuthRole) | **Get** /auth/{aws_mount_path}/role/{role} | +[**AwsReadCertificateConfiguration**](AuthApi.md#AwsReadCertificateConfiguration) | **Get** /auth/{aws_mount_path}/config/certificate/{cert_name} | +[**AwsReadClientConfiguration**](AuthApi.md#AwsReadClientConfiguration) | **Get** /auth/{aws_mount_path}/config/client | +[**AwsReadIdentityAccessList**](AuthApi.md#AwsReadIdentityAccessList) | **Get** /auth/{aws_mount_path}/identity-accesslist/{instance_id} | +[**AwsReadIdentityAccessListTidySettings**](AuthApi.md#AwsReadIdentityAccessListTidySettings) | **Get** /auth/{aws_mount_path}/config/tidy/identity-accesslist | +[**AwsReadIdentityIntegrationConfiguration**](AuthApi.md#AwsReadIdentityIntegrationConfiguration) | **Get** /auth/{aws_mount_path}/config/identity | +[**AwsReadIdentityWhitelist**](AuthApi.md#AwsReadIdentityWhitelist) | **Get** /auth/{aws_mount_path}/identity-whitelist/{instance_id} | +[**AwsReadIdentityWhitelistTidySettings**](AuthApi.md#AwsReadIdentityWhitelistTidySettings) | **Get** /auth/{aws_mount_path}/config/tidy/identity-whitelist | +[**AwsReadRoleTagBlacklist**](AuthApi.md#AwsReadRoleTagBlacklist) | **Get** /auth/{aws_mount_path}/roletag-blacklist/{role_tag} | +[**AwsReadRoleTagBlacklistTidySettings**](AuthApi.md#AwsReadRoleTagBlacklistTidySettings) | **Get** /auth/{aws_mount_path}/config/tidy/roletag-blacklist | +[**AwsReadRoleTagDenyList**](AuthApi.md#AwsReadRoleTagDenyList) | **Get** /auth/{aws_mount_path}/roletag-denylist/{role_tag} | +[**AwsReadRoleTagDenyListTidySettings**](AuthApi.md#AwsReadRoleTagDenyListTidySettings) | **Get** /auth/{aws_mount_path}/config/tidy/roletag-denylist | +[**AwsReadStsRole**](AuthApi.md#AwsReadStsRole) | **Get** /auth/{aws_mount_path}/config/sts/{account_id} | +[**AwsRotateRootCredentials**](AuthApi.md#AwsRotateRootCredentials) | **Post** /auth/{aws_mount_path}/config/rotate-root | +[**AwsTidyIdentityAccessList**](AuthApi.md#AwsTidyIdentityAccessList) | **Post** /auth/{aws_mount_path}/tidy/identity-accesslist | +[**AwsTidyIdentityWhitelist**](AuthApi.md#AwsTidyIdentityWhitelist) | **Post** /auth/{aws_mount_path}/tidy/identity-whitelist | +[**AwsTidyRoleTagBlacklist**](AuthApi.md#AwsTidyRoleTagBlacklist) | **Post** /auth/{aws_mount_path}/tidy/roletag-blacklist | +[**AwsTidyRoleTagDenyList**](AuthApi.md#AwsTidyRoleTagDenyList) | **Post** /auth/{aws_mount_path}/tidy/roletag-denylist | +[**AwsWriteAuthRole**](AuthApi.md#AwsWriteAuthRole) | **Post** /auth/{aws_mount_path}/role/{role} | +[**AwsWriteRoleTag**](AuthApi.md#AwsWriteRoleTag) | **Post** /auth/{aws_mount_path}/role/{role}/tag | +[**AwsWriteRoleTagBlacklist**](AuthApi.md#AwsWriteRoleTagBlacklist) | **Post** /auth/{aws_mount_path}/roletag-blacklist/{role_tag} | +[**AwsWriteRoleTagDenyList**](AuthApi.md#AwsWriteRoleTagDenyList) | **Post** /auth/{aws_mount_path}/roletag-denylist/{role_tag} | +[**AwsWriteStsRole**](AuthApi.md#AwsWriteStsRole) | **Post** /auth/{aws_mount_path}/config/sts/{account_id} | +[**AzureConfigureAuth**](AuthApi.md#AzureConfigureAuth) | **Post** /auth/{azure_mount_path}/config | +[**AzureDeleteAuthConfiguration**](AuthApi.md#AzureDeleteAuthConfiguration) | **Delete** /auth/{azure_mount_path}/config | [**AzureDeleteAuthRole**](AuthApi.md#AzureDeleteAuthRole) | **Delete** /auth/{azure_mount_path}/role/{name} | [**AzureListAuthRoles**](AuthApi.md#AzureListAuthRoles) | **Get** /auth/{azure_mount_path}/role | [**AzureLogin**](AuthApi.md#AzureLogin) | **Post** /auth/{azure_mount_path}/login | -[**AzureReadAuthConfig**](AuthApi.md#AzureReadAuthConfig) | **Get** /auth/{azure_mount_path}/config | +[**AzureReadAuthConfiguration**](AuthApi.md#AzureReadAuthConfiguration) | **Get** /auth/{azure_mount_path}/config | [**AzureReadAuthRole**](AuthApi.md#AzureReadAuthRole) | **Get** /auth/{azure_mount_path}/role/{name} | -[**AzureWriteAuthConfig**](AuthApi.md#AzureWriteAuthConfig) | **Post** /auth/{azure_mount_path}/config | +[**AzureRotateRootCredentials**](AuthApi.md#AzureRotateRootCredentials) | **Post** /auth/{azure_mount_path}/rotate-root | [**AzureWriteAuthRole**](AuthApi.md#AzureWriteAuthRole) | **Post** /auth/{azure_mount_path}/role/{name} | +[**CentrifyConfigure**](AuthApi.md#CentrifyConfigure) | **Post** /auth/{centrify_mount_path}/config | [**CentrifyLogin**](AuthApi.md#CentrifyLogin) | **Post** /auth/{centrify_mount_path}/login | Log in with a username and password. -[**CentrifyReadConfig**](AuthApi.md#CentrifyReadConfig) | **Get** /auth/{centrify_mount_path}/config | This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users. -[**CentrifyWriteConfig**](AuthApi.md#CentrifyWriteConfig) | **Post** /auth/{centrify_mount_path}/config | This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users. -[**CertificatesDelete**](AuthApi.md#CertificatesDelete) | **Delete** /auth/{cert_mount_path}/certs/{name} | Manage trusted certificates used for authentication. -[**CertificatesDeleteCRL**](AuthApi.md#CertificatesDeleteCRL) | **Delete** /auth/{cert_mount_path}/crls/{name} | Manage Certificate Revocation Lists checked during authentication. -[**CertificatesList**](AuthApi.md#CertificatesList) | **Get** /auth/{cert_mount_path}/certs | Manage trusted certificates used for authentication. -[**CertificatesListCRLs**](AuthApi.md#CertificatesListCRLs) | **Get** /auth/{cert_mount_path}/crls | -[**CertificatesLogin**](AuthApi.md#CertificatesLogin) | **Post** /auth/{cert_mount_path}/login | -[**CertificatesRead**](AuthApi.md#CertificatesRead) | **Get** /auth/{cert_mount_path}/certs/{name} | Manage trusted certificates used for authentication. -[**CertificatesReadCRL**](AuthApi.md#CertificatesReadCRL) | **Get** /auth/{cert_mount_path}/crls/{name} | Manage Certificate Revocation Lists checked during authentication. -[**CertificatesReadConfig**](AuthApi.md#CertificatesReadConfig) | **Get** /auth/{cert_mount_path}/config | -[**CertificatesWrite**](AuthApi.md#CertificatesWrite) | **Post** /auth/{cert_mount_path}/certs/{name} | Manage trusted certificates used for authentication. -[**CertificatesWriteCRL**](AuthApi.md#CertificatesWriteCRL) | **Post** /auth/{cert_mount_path}/crls/{name} | Manage Certificate Revocation Lists checked during authentication. -[**CertificatesWriteConfig**](AuthApi.md#CertificatesWriteConfig) | **Post** /auth/{cert_mount_path}/config | -[**CloudFoundryDeleteConfig**](AuthApi.md#CloudFoundryDeleteConfig) | **Delete** /auth/{cf_mount_path}/config | +[**CentrifyReadConfiguration**](AuthApi.md#CentrifyReadConfiguration) | **Get** /auth/{centrify_mount_path}/config | +[**CertConfigure**](AuthApi.md#CertConfigure) | **Post** /auth/{cert_mount_path}/config | +[**CertDeleteCertificate**](AuthApi.md#CertDeleteCertificate) | **Delete** /auth/{cert_mount_path}/certs/{name} | Manage trusted certificates used for authentication. +[**CertDeleteCrl**](AuthApi.md#CertDeleteCrl) | **Delete** /auth/{cert_mount_path}/crls/{name} | Manage Certificate Revocation Lists checked during authentication. +[**CertListCertificates**](AuthApi.md#CertListCertificates) | **Get** /auth/{cert_mount_path}/certs | Manage trusted certificates used for authentication. +[**CertListCrls**](AuthApi.md#CertListCrls) | **Get** /auth/{cert_mount_path}/crls | +[**CertLogin**](AuthApi.md#CertLogin) | **Post** /auth/{cert_mount_path}/login | +[**CertReadCertificate**](AuthApi.md#CertReadCertificate) | **Get** /auth/{cert_mount_path}/certs/{name} | Manage trusted certificates used for authentication. +[**CertReadConfiguration**](AuthApi.md#CertReadConfiguration) | **Get** /auth/{cert_mount_path}/config | +[**CertReadCrl**](AuthApi.md#CertReadCrl) | **Get** /auth/{cert_mount_path}/crls/{name} | Manage Certificate Revocation Lists checked during authentication. +[**CertWriteCertificate**](AuthApi.md#CertWriteCertificate) | **Post** /auth/{cert_mount_path}/certs/{name} | Manage trusted certificates used for authentication. +[**CertWriteCrl**](AuthApi.md#CertWriteCrl) | **Post** /auth/{cert_mount_path}/crls/{name} | Manage Certificate Revocation Lists checked during authentication. +[**CloudFoundryConfigure**](AuthApi.md#CloudFoundryConfigure) | **Post** /auth/{cf_mount_path}/config | +[**CloudFoundryDeleteConfiguration**](AuthApi.md#CloudFoundryDeleteConfiguration) | **Delete** /auth/{cf_mount_path}/config | [**CloudFoundryDeleteRole**](AuthApi.md#CloudFoundryDeleteRole) | **Delete** /auth/{cf_mount_path}/roles/{role} | [**CloudFoundryListRoles**](AuthApi.md#CloudFoundryListRoles) | **Get** /auth/{cf_mount_path}/roles | [**CloudFoundryLogin**](AuthApi.md#CloudFoundryLogin) | **Post** /auth/{cf_mount_path}/login | -[**CloudFoundryReadConfig**](AuthApi.md#CloudFoundryReadConfig) | **Get** /auth/{cf_mount_path}/config | +[**CloudFoundryReadConfiguration**](AuthApi.md#CloudFoundryReadConfiguration) | **Get** /auth/{cf_mount_path}/config | [**CloudFoundryReadRole**](AuthApi.md#CloudFoundryReadRole) | **Get** /auth/{cf_mount_path}/roles/{role} | -[**CloudFoundryWriteConfig**](AuthApi.md#CloudFoundryWriteConfig) | **Post** /auth/{cf_mount_path}/config | [**CloudFoundryWriteRole**](AuthApi.md#CloudFoundryWriteRole) | **Post** /auth/{cf_mount_path}/roles/{role} | -[**GitHubDeleteMapTeam**](AuthApi.md#GitHubDeleteMapTeam) | **Delete** /auth/{github_mount_path}/map/teams/{key} | Read/write/delete a single teams mapping -[**GitHubDeleteMapUser**](AuthApi.md#GitHubDeleteMapUser) | **Delete** /auth/{github_mount_path}/map/users/{key} | Read/write/delete a single users mapping -[**GitHubLogin**](AuthApi.md#GitHubLogin) | **Post** /auth/{github_mount_path}/login | -[**GitHubReadConfig**](AuthApi.md#GitHubReadConfig) | **Get** /auth/{github_mount_path}/config | -[**GitHubReadMapTeam**](AuthApi.md#GitHubReadMapTeam) | **Get** /auth/{github_mount_path}/map/teams/{key} | Read/write/delete a single teams mapping -[**GitHubReadMapTeams**](AuthApi.md#GitHubReadMapTeams) | **Get** /auth/{github_mount_path}/map/teams | Read mappings for teams -[**GitHubReadMapUser**](AuthApi.md#GitHubReadMapUser) | **Get** /auth/{github_mount_path}/map/users/{key} | Read/write/delete a single users mapping -[**GitHubReadMapUsers**](AuthApi.md#GitHubReadMapUsers) | **Get** /auth/{github_mount_path}/map/users | Read mappings for users -[**GitHubWriteConfig**](AuthApi.md#GitHubWriteConfig) | **Post** /auth/{github_mount_path}/config | -[**GitHubWriteMapTeam**](AuthApi.md#GitHubWriteMapTeam) | **Post** /auth/{github_mount_path}/map/teams/{key} | Read/write/delete a single teams mapping -[**GitHubWriteMapUser**](AuthApi.md#GitHubWriteMapUser) | **Post** /auth/{github_mount_path}/map/users/{key} | Read/write/delete a single users mapping +[**GithubConfigure**](AuthApi.md#GithubConfigure) | **Post** /auth/{github_mount_path}/config | +[**GithubDeleteTeamMapping**](AuthApi.md#GithubDeleteTeamMapping) | **Delete** /auth/{github_mount_path}/map/teams/{key} | Read/write/delete a single teams mapping +[**GithubDeleteUserMapping**](AuthApi.md#GithubDeleteUserMapping) | **Delete** /auth/{github_mount_path}/map/users/{key} | Read/write/delete a single users mapping +[**GithubLogin**](AuthApi.md#GithubLogin) | **Post** /auth/{github_mount_path}/login | +[**GithubReadConfiguration**](AuthApi.md#GithubReadConfiguration) | **Get** /auth/{github_mount_path}/config | +[**GithubReadTeamMapping**](AuthApi.md#GithubReadTeamMapping) | **Get** /auth/{github_mount_path}/map/teams/{key} | Read/write/delete a single teams mapping +[**GithubReadTeams**](AuthApi.md#GithubReadTeams) | **Get** /auth/{github_mount_path}/map/teams | Read mappings for teams +[**GithubReadUserMapping**](AuthApi.md#GithubReadUserMapping) | **Get** /auth/{github_mount_path}/map/users/{key} | Read/write/delete a single users mapping +[**GithubReadUsers**](AuthApi.md#GithubReadUsers) | **Get** /auth/{github_mount_path}/map/users | Read mappings for users +[**GithubWriteTeamMapping**](AuthApi.md#GithubWriteTeamMapping) | **Post** /auth/{github_mount_path}/map/teams/{key} | Read/write/delete a single teams mapping +[**GithubWriteUserMapping**](AuthApi.md#GithubWriteUserMapping) | **Post** /auth/{github_mount_path}/map/users/{key} | Read/write/delete a single users mapping +[**GoogleCloudConfigureAuth**](AuthApi.md#GoogleCloudConfigureAuth) | **Post** /auth/{gcp_mount_path}/config | [**GoogleCloudDeleteRole**](AuthApi.md#GoogleCloudDeleteRole) | **Delete** /auth/{gcp_mount_path}/role/{name} | Create a GCP role with associated policies and required attributes. +[**GoogleCloudEditLabelsForRole**](AuthApi.md#GoogleCloudEditLabelsForRole) | **Post** /auth/{gcp_mount_path}/role/{name}/labels | Add or remove labels for an existing 'gce' role +[**GoogleCloudEditServiceAccountsForRole**](AuthApi.md#GoogleCloudEditServiceAccountsForRole) | **Post** /auth/{gcp_mount_path}/role/{name}/service-accounts | Add or remove service accounts for an existing `iam` role [**GoogleCloudListRoles**](AuthApi.md#GoogleCloudListRoles) | **Get** /auth/{gcp_mount_path}/role | Lists all the roles that are registered with Vault. [**GoogleCloudListRoles2**](AuthApi.md#GoogleCloudListRoles2) | **Get** /auth/{gcp_mount_path}/roles | Lists all the roles that are registered with Vault. [**GoogleCloudLogin**](AuthApi.md#GoogleCloudLogin) | **Post** /auth/{gcp_mount_path}/login | -[**GoogleCloudReadAuthConfig**](AuthApi.md#GoogleCloudReadAuthConfig) | **Get** /auth/{gcp_mount_path}/config | Configure credentials used to query the GCP IAM API to verify authenticating service accounts +[**GoogleCloudReadAuthConfiguration**](AuthApi.md#GoogleCloudReadAuthConfiguration) | **Get** /auth/{gcp_mount_path}/config | [**GoogleCloudReadRole**](AuthApi.md#GoogleCloudReadRole) | **Get** /auth/{gcp_mount_path}/role/{name} | Create a GCP role with associated policies and required attributes. -[**GoogleCloudWriteAuthConfig**](AuthApi.md#GoogleCloudWriteAuthConfig) | **Post** /auth/{gcp_mount_path}/config | Configure credentials used to query the GCP IAM API to verify authenticating service accounts [**GoogleCloudWriteRole**](AuthApi.md#GoogleCloudWriteRole) | **Post** /auth/{gcp_mount_path}/role/{name} | Create a GCP role with associated policies and required attributes. -[**GoogleCloudWriteRoleLabels**](AuthApi.md#GoogleCloudWriteRoleLabels) | **Post** /auth/{gcp_mount_path}/role/{name}/labels | Add or remove labels for an existing 'gce' role -[**GoogleCloudWriteRoleServiceAccounts**](AuthApi.md#GoogleCloudWriteRoleServiceAccounts) | **Post** /auth/{gcp_mount_path}/role/{name}/service-accounts | Add or remove service accounts for an existing `iam` role -[**JWTDeleteRole**](AuthApi.md#JWTDeleteRole) | **Delete** /auth/{jwt_mount_path}/role/{name} | Delete an existing role. -[**JWTListRoles**](AuthApi.md#JWTListRoles) | **Get** /auth/{jwt_mount_path}/role | Lists all the roles registered with the backend. -[**JWTLogin**](AuthApi.md#JWTLogin) | **Post** /auth/{jwt_mount_path}/login | Authenticates to Vault using a JWT (or OIDC) token. -[**JWTReadConfig**](AuthApi.md#JWTReadConfig) | **Get** /auth/{jwt_mount_path}/config | Read the current JWT authentication backend configuration. -[**JWTReadOIDCCallback**](AuthApi.md#JWTReadOIDCCallback) | **Get** /auth/{jwt_mount_path}/oidc/callback | Callback endpoint to complete an OIDC login. -[**JWTReadRole**](AuthApi.md#JWTReadRole) | **Get** /auth/{jwt_mount_path}/role/{name} | Read an existing role. -[**JWTWriteConfig**](AuthApi.md#JWTWriteConfig) | **Post** /auth/{jwt_mount_path}/config | Configure the JWT authentication backend. -[**JWTWriteOIDCAuthURL**](AuthApi.md#JWTWriteOIDCAuthURL) | **Post** /auth/{jwt_mount_path}/oidc/auth_url | Request an authorization URL to start an OIDC login flow. -[**JWTWriteOIDCCallback**](AuthApi.md#JWTWriteOIDCCallback) | **Post** /auth/{jwt_mount_path}/oidc/callback | Callback endpoint to handle form_posts. -[**JWTWriteRole**](AuthApi.md#JWTWriteRole) | **Post** /auth/{jwt_mount_path}/role/{name} | Register an role with the backend. +[**JwtConfigure**](AuthApi.md#JwtConfigure) | **Post** /auth/{jwt_mount_path}/config | Configure the JWT authentication backend. +[**JwtDeleteRole**](AuthApi.md#JwtDeleteRole) | **Delete** /auth/{jwt_mount_path}/role/{name} | Delete an existing role. +[**JwtListRoles**](AuthApi.md#JwtListRoles) | **Get** /auth/{jwt_mount_path}/role | Lists all the roles registered with the backend. +[**JwtLogin**](AuthApi.md#JwtLogin) | **Post** /auth/{jwt_mount_path}/login | Authenticates to Vault using a JWT (or OIDC) token. +[**JwtOidcCallback**](AuthApi.md#JwtOidcCallback) | **Get** /auth/{jwt_mount_path}/oidc/callback | Callback endpoint to complete an OIDC login. +[**JwtOidcCallbackWithParameters**](AuthApi.md#JwtOidcCallbackWithParameters) | **Post** /auth/{jwt_mount_path}/oidc/callback | Callback endpoint to handle form_posts. +[**JwtOidcRequestAuthorizationUrl**](AuthApi.md#JwtOidcRequestAuthorizationUrl) | **Post** /auth/{jwt_mount_path}/oidc/auth_url | Request an authorization URL to start an OIDC login flow. +[**JwtReadConfiguration**](AuthApi.md#JwtReadConfiguration) | **Get** /auth/{jwt_mount_path}/config | Read the current JWT authentication backend configuration. +[**JwtReadRole**](AuthApi.md#JwtReadRole) | **Get** /auth/{jwt_mount_path}/role/{name} | Read an existing role. +[**JwtWriteRole**](AuthApi.md#JwtWriteRole) | **Post** /auth/{jwt_mount_path}/role/{name} | Register an role with the backend. +[**KerberosConfigure**](AuthApi.md#KerberosConfigure) | **Post** /auth/{kerberos_mount_path}/config | +[**KerberosConfigureLdap**](AuthApi.md#KerberosConfigureLdap) | **Post** /auth/{kerberos_mount_path}/config/ldap | [**KerberosDeleteGroup**](AuthApi.md#KerberosDeleteGroup) | **Delete** /auth/{kerberos_mount_path}/groups/{name} | [**KerberosListGroups**](AuthApi.md#KerberosListGroups) | **Get** /auth/{kerberos_mount_path}/groups | [**KerberosLogin**](AuthApi.md#KerberosLogin) | **Post** /auth/{kerberos_mount_path}/login | -[**KerberosReadConfig**](AuthApi.md#KerberosReadConfig) | **Get** /auth/{kerberos_mount_path}/config | +[**KerberosLogin2**](AuthApi.md#KerberosLogin2) | **Get** /auth/{kerberos_mount_path}/login | +[**KerberosReadConfiguration**](AuthApi.md#KerberosReadConfiguration) | **Get** /auth/{kerberos_mount_path}/config | [**KerberosReadGroup**](AuthApi.md#KerberosReadGroup) | **Get** /auth/{kerberos_mount_path}/groups/{name} | -[**KerberosReadLDAPConfig**](AuthApi.md#KerberosReadLDAPConfig) | **Get** /auth/{kerberos_mount_path}/config/ldap | -[**KerberosWriteConfig**](AuthApi.md#KerberosWriteConfig) | **Post** /auth/{kerberos_mount_path}/config | +[**KerberosReadLdapConfiguration**](AuthApi.md#KerberosReadLdapConfiguration) | **Get** /auth/{kerberos_mount_path}/config/ldap | [**KerberosWriteGroup**](AuthApi.md#KerberosWriteGroup) | **Post** /auth/{kerberos_mount_path}/groups/{name} | -[**KerberosWriteLDAPConfig**](AuthApi.md#KerberosWriteLDAPConfig) | **Post** /auth/{kerberos_mount_path}/config/ldap | +[**KubernetesConfigureAuth**](AuthApi.md#KubernetesConfigureAuth) | **Post** /auth/{kubernetes_mount_path}/config | [**KubernetesDeleteAuthRole**](AuthApi.md#KubernetesDeleteAuthRole) | **Delete** /auth/{kubernetes_mount_path}/role/{name} | Register an role with the backend. [**KubernetesListAuthRoles**](AuthApi.md#KubernetesListAuthRoles) | **Get** /auth/{kubernetes_mount_path}/role | Lists all the roles registered with the backend. [**KubernetesLogin**](AuthApi.md#KubernetesLogin) | **Post** /auth/{kubernetes_mount_path}/login | Authenticates Kubernetes service accounts with Vault. -[**KubernetesReadAuthConfig**](AuthApi.md#KubernetesReadAuthConfig) | **Get** /auth/{kubernetes_mount_path}/config | Configures the JWT Public Key and Kubernetes API information. +[**KubernetesReadAuthConfiguration**](AuthApi.md#KubernetesReadAuthConfiguration) | **Get** /auth/{kubernetes_mount_path}/config | [**KubernetesReadAuthRole**](AuthApi.md#KubernetesReadAuthRole) | **Get** /auth/{kubernetes_mount_path}/role/{name} | Register an role with the backend. -[**KubernetesWriteAuthConfig**](AuthApi.md#KubernetesWriteAuthConfig) | **Post** /auth/{kubernetes_mount_path}/config | Configures the JWT Public Key and Kubernetes API information. [**KubernetesWriteAuthRole**](AuthApi.md#KubernetesWriteAuthRole) | **Post** /auth/{kubernetes_mount_path}/role/{name} | Register an role with the backend. -[**LDAPDeleteGroup**](AuthApi.md#LDAPDeleteGroup) | **Delete** /auth/{ldap_mount_path}/groups/{name} | Manage additional groups for users allowed to authenticate. -[**LDAPDeleteUser**](AuthApi.md#LDAPDeleteUser) | **Delete** /auth/{ldap_mount_path}/users/{name} | Manage users allowed to authenticate. -[**LDAPListGroups**](AuthApi.md#LDAPListGroups) | **Get** /auth/{ldap_mount_path}/groups | Manage additional groups for users allowed to authenticate. -[**LDAPListUsers**](AuthApi.md#LDAPListUsers) | **Get** /auth/{ldap_mount_path}/users | Manage users allowed to authenticate. -[**LDAPLogin**](AuthApi.md#LDAPLogin) | **Post** /auth/{ldap_mount_path}/login/{username} | Log in with a username and password. -[**LDAPReadAuthConfig**](AuthApi.md#LDAPReadAuthConfig) | **Get** /auth/{ldap_mount_path}/config | Configure the LDAP server to connect to, along with its options. -[**LDAPReadGroup**](AuthApi.md#LDAPReadGroup) | **Get** /auth/{ldap_mount_path}/groups/{name} | Manage additional groups for users allowed to authenticate. -[**LDAPReadUser**](AuthApi.md#LDAPReadUser) | **Get** /auth/{ldap_mount_path}/users/{name} | Manage users allowed to authenticate. -[**LDAPWriteAuthConfig**](AuthApi.md#LDAPWriteAuthConfig) | **Post** /auth/{ldap_mount_path}/config | Configure the LDAP server to connect to, along with its options. -[**LDAPWriteGroup**](AuthApi.md#LDAPWriteGroup) | **Post** /auth/{ldap_mount_path}/groups/{name} | Manage additional groups for users allowed to authenticate. -[**LDAPWriteUser**](AuthApi.md#LDAPWriteUser) | **Post** /auth/{ldap_mount_path}/users/{name} | Manage users allowed to authenticate. -[**OCIDeleteConfig**](AuthApi.md#OCIDeleteConfig) | **Delete** /auth/{oci_mount_path}/config | Manages the configuration for the Vault Auth Plugin. -[**OCIDeleteRole**](AuthApi.md#OCIDeleteRole) | **Delete** /auth/{oci_mount_path}/role/{role} | Create a role and associate policies to it. -[**OCIListRoles**](AuthApi.md#OCIListRoles) | **Get** /auth/{oci_mount_path}/role | Lists all the roles that are registered with Vault. -[**OCILoginWithRole**](AuthApi.md#OCILoginWithRole) | **Post** /auth/{oci_mount_path}/login/{role} | Authenticates to Vault using OCI credentials -[**OCIReadConfig**](AuthApi.md#OCIReadConfig) | **Get** /auth/{oci_mount_path}/config | Manages the configuration for the Vault Auth Plugin. -[**OCIReadRole**](AuthApi.md#OCIReadRole) | **Get** /auth/{oci_mount_path}/role/{role} | Create a role and associate policies to it. -[**OCIWriteConfig**](AuthApi.md#OCIWriteConfig) | **Post** /auth/{oci_mount_path}/config | Manages the configuration for the Vault Auth Plugin. -[**OCIWriteRole**](AuthApi.md#OCIWriteRole) | **Post** /auth/{oci_mount_path}/role/{role} | Create a role and associate policies to it. -[**OIDCDeleteAuthRole**](AuthApi.md#OIDCDeleteAuthRole) | **Delete** /auth/{oidc_mount_path}/role/{name} | Delete an existing role. -[**OIDCListAuthRoles**](AuthApi.md#OIDCListAuthRoles) | **Get** /auth/{oidc_mount_path}/role | Lists all the roles registered with the backend. -[**OIDCLogin**](AuthApi.md#OIDCLogin) | **Post** /auth/{oidc_mount_path}/login | Authenticates to Vault using a JWT (or OIDC) token. -[**OIDCReadAuthConfig**](AuthApi.md#OIDCReadAuthConfig) | **Get** /auth/{oidc_mount_path}/config | Read the current JWT authentication backend configuration. -[**OIDCReadAuthRole**](AuthApi.md#OIDCReadAuthRole) | **Get** /auth/{oidc_mount_path}/role/{name} | Read an existing role. -[**OIDCReadCallback**](AuthApi.md#OIDCReadCallback) | **Get** /auth/{oidc_mount_path}/oidc/callback | Callback endpoint to complete an OIDC login. -[**OIDCWriteAuthConfig**](AuthApi.md#OIDCWriteAuthConfig) | **Post** /auth/{oidc_mount_path}/config | Configure the JWT authentication backend. -[**OIDCWriteAuthRole**](AuthApi.md#OIDCWriteAuthRole) | **Post** /auth/{oidc_mount_path}/role/{name} | Register an role with the backend. -[**OIDCWriteAuthURL**](AuthApi.md#OIDCWriteAuthURL) | **Post** /auth/{oidc_mount_path}/oidc/auth_url | Request an authorization URL to start an OIDC login flow. -[**OIDCWriteCallback**](AuthApi.md#OIDCWriteCallback) | **Post** /auth/{oidc_mount_path}/oidc/callback | Callback endpoint to handle form_posts. +[**LdapConfigureAuth**](AuthApi.md#LdapConfigureAuth) | **Post** /auth/{ldap_mount_path}/config | +[**LdapDeleteGroup**](AuthApi.md#LdapDeleteGroup) | **Delete** /auth/{ldap_mount_path}/groups/{name} | Manage additional groups for users allowed to authenticate. +[**LdapDeleteUser**](AuthApi.md#LdapDeleteUser) | **Delete** /auth/{ldap_mount_path}/users/{name} | Manage users allowed to authenticate. +[**LdapListGroups**](AuthApi.md#LdapListGroups) | **Get** /auth/{ldap_mount_path}/groups | Manage additional groups for users allowed to authenticate. +[**LdapListUsers**](AuthApi.md#LdapListUsers) | **Get** /auth/{ldap_mount_path}/users | Manage users allowed to authenticate. +[**LdapLogin**](AuthApi.md#LdapLogin) | **Post** /auth/{ldap_mount_path}/login/{username} | Log in with a username and password. +[**LdapReadAuthConfiguration**](AuthApi.md#LdapReadAuthConfiguration) | **Get** /auth/{ldap_mount_path}/config | +[**LdapReadGroup**](AuthApi.md#LdapReadGroup) | **Get** /auth/{ldap_mount_path}/groups/{name} | Manage additional groups for users allowed to authenticate. +[**LdapReadUser**](AuthApi.md#LdapReadUser) | **Get** /auth/{ldap_mount_path}/users/{name} | Manage users allowed to authenticate. +[**LdapWriteGroup**](AuthApi.md#LdapWriteGroup) | **Post** /auth/{ldap_mount_path}/groups/{name} | Manage additional groups for users allowed to authenticate. +[**LdapWriteUser**](AuthApi.md#LdapWriteUser) | **Post** /auth/{ldap_mount_path}/users/{name} | Manage users allowed to authenticate. +[**OciConfigure**](AuthApi.md#OciConfigure) | **Post** /auth/{oci_mount_path}/config | +[**OciDeleteConfiguration**](AuthApi.md#OciDeleteConfiguration) | **Delete** /auth/{oci_mount_path}/config | +[**OciDeleteRole**](AuthApi.md#OciDeleteRole) | **Delete** /auth/{oci_mount_path}/role/{role} | Create a role and associate policies to it. +[**OciListRoles**](AuthApi.md#OciListRoles) | **Get** /auth/{oci_mount_path}/role | Lists all the roles that are registered with Vault. +[**OciLogin**](AuthApi.md#OciLogin) | **Post** /auth/{oci_mount_path}/login/{role} | Authenticates to Vault using OCI credentials +[**OciReadConfiguration**](AuthApi.md#OciReadConfiguration) | **Get** /auth/{oci_mount_path}/config | +[**OciReadRole**](AuthApi.md#OciReadRole) | **Get** /auth/{oci_mount_path}/role/{role} | Create a role and associate policies to it. +[**OciWriteRole**](AuthApi.md#OciWriteRole) | **Post** /auth/{oci_mount_path}/role/{role} | Create a role and associate policies to it. +[**OktaConfigure**](AuthApi.md#OktaConfigure) | **Post** /auth/{okta_mount_path}/config | [**OktaDeleteGroup**](AuthApi.md#OktaDeleteGroup) | **Delete** /auth/{okta_mount_path}/groups/{name} | Manage users allowed to authenticate. [**OktaDeleteUser**](AuthApi.md#OktaDeleteUser) | **Delete** /auth/{okta_mount_path}/users/{name} | Manage additional groups for users allowed to authenticate. [**OktaListGroups**](AuthApi.md#OktaListGroups) | **Get** /auth/{okta_mount_path}/groups | Manage users allowed to authenticate. [**OktaListUsers**](AuthApi.md#OktaListUsers) | **Get** /auth/{okta_mount_path}/users | Manage additional groups for users allowed to authenticate. [**OktaLogin**](AuthApi.md#OktaLogin) | **Post** /auth/{okta_mount_path}/login/{username} | Log in with a username and password. -[**OktaReadConfig**](AuthApi.md#OktaReadConfig) | **Get** /auth/{okta_mount_path}/config | This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com +[**OktaReadConfiguration**](AuthApi.md#OktaReadConfiguration) | **Get** /auth/{okta_mount_path}/config | [**OktaReadGroup**](AuthApi.md#OktaReadGroup) | **Get** /auth/{okta_mount_path}/groups/{name} | Manage users allowed to authenticate. [**OktaReadUser**](AuthApi.md#OktaReadUser) | **Get** /auth/{okta_mount_path}/users/{name} | Manage additional groups for users allowed to authenticate. [**OktaVerify**](AuthApi.md#OktaVerify) | **Get** /auth/{okta_mount_path}/verify/{nonce} | -[**OktaWriteConfig**](AuthApi.md#OktaWriteConfig) | **Post** /auth/{okta_mount_path}/config | This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com [**OktaWriteGroup**](AuthApi.md#OktaWriteGroup) | **Post** /auth/{okta_mount_path}/groups/{name} | Manage users allowed to authenticate. [**OktaWriteUser**](AuthApi.md#OktaWriteUser) | **Post** /auth/{okta_mount_path}/users/{name} | Manage additional groups for users allowed to authenticate. +[**RadiusConfigure**](AuthApi.md#RadiusConfigure) | **Post** /auth/{radius_mount_path}/config | [**RadiusDeleteUser**](AuthApi.md#RadiusDeleteUser) | **Delete** /auth/{radius_mount_path}/users/{name} | Manage users allowed to authenticate. [**RadiusListUsers**](AuthApi.md#RadiusListUsers) | **Get** /auth/{radius_mount_path}/users | Manage users allowed to authenticate. [**RadiusLogin**](AuthApi.md#RadiusLogin) | **Post** /auth/{radius_mount_path}/login | Log in with a username and password. [**RadiusLoginWithUsername**](AuthApi.md#RadiusLoginWithUsername) | **Post** /auth/{radius_mount_path}/login/{urlusername} | Log in with a username and password. -[**RadiusReadConfig**](AuthApi.md#RadiusReadConfig) | **Get** /auth/{radius_mount_path}/config | Configure the RADIUS server to connect to, along with its options. +[**RadiusReadConfiguration**](AuthApi.md#RadiusReadConfiguration) | **Get** /auth/{radius_mount_path}/config | [**RadiusReadUser**](AuthApi.md#RadiusReadUser) | **Get** /auth/{radius_mount_path}/users/{name} | Manage users allowed to authenticate. -[**RadiusWriteConfig**](AuthApi.md#RadiusWriteConfig) | **Post** /auth/{radius_mount_path}/config | Configure the RADIUS server to connect to, along with its options. [**RadiusWriteUser**](AuthApi.md#RadiusWriteUser) | **Post** /auth/{radius_mount_path}/users/{name} | Manage users allowed to authenticate. -[**TokenDeleteRole**](AuthApi.md#TokenDeleteRole) | **Delete** /auth/{token_mount_path}/roles/{role_name} | -[**TokenListAccessors**](AuthApi.md#TokenListAccessors) | **Get** /auth/{token_mount_path}/accessors/ | List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'. -[**TokenListRoles**](AuthApi.md#TokenListRoles) | **Get** /auth/{token_mount_path}/roles | This endpoint lists configured roles. -[**TokenReadLookup**](AuthApi.md#TokenReadLookup) | **Get** /auth/{token_mount_path}/lookup | This endpoint will lookup a token and its properties. -[**TokenReadLookupSelf**](AuthApi.md#TokenReadLookupSelf) | **Get** /auth/{token_mount_path}/lookup-self | This endpoint will lookup a token and its properties. -[**TokenReadRole**](AuthApi.md#TokenReadRole) | **Get** /auth/{token_mount_path}/roles/{role_name} | -[**TokenRenew**](AuthApi.md#TokenRenew) | **Post** /auth/{token_mount_path}/renew | This endpoint will renew the given token and prevent expiration. -[**TokenRenewAccessor**](AuthApi.md#TokenRenewAccessor) | **Post** /auth/{token_mount_path}/renew-accessor | This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID. -[**TokenRenewSelf**](AuthApi.md#TokenRenewSelf) | **Post** /auth/{token_mount_path}/renew-self | This endpoint will renew the token used to call it and prevent expiration. -[**TokenRevoke**](AuthApi.md#TokenRevoke) | **Post** /auth/{token_mount_path}/revoke | This endpoint will delete the given token and all of its child tokens. -[**TokenRevokeAccessor**](AuthApi.md#TokenRevokeAccessor) | **Post** /auth/{token_mount_path}/revoke-accessor | This endpoint will delete the token associated with the accessor and all of its child tokens. -[**TokenRevokeOrphan**](AuthApi.md#TokenRevokeOrphan) | **Post** /auth/{token_mount_path}/revoke-orphan | This endpoint will delete the token and orphan its child tokens. -[**TokenRevokeSelf**](AuthApi.md#TokenRevokeSelf) | **Post** /auth/{token_mount_path}/revoke-self | This endpoint will delete the token used to call it and all of its child tokens. -[**TokenTidy**](AuthApi.md#TokenTidy) | **Post** /auth/{token_mount_path}/tidy | This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. -[**TokenWriteCreate**](AuthApi.md#TokenWriteCreate) | **Post** /auth/{token_mount_path}/create | The token create path is used to create new tokens. -[**TokenWriteCreateOrphan**](AuthApi.md#TokenWriteCreateOrphan) | **Post** /auth/{token_mount_path}/create-orphan | The token create path is used to create new orphan tokens. -[**TokenWriteCreateWithRole**](AuthApi.md#TokenWriteCreateWithRole) | **Post** /auth/{token_mount_path}/create/{role_name} | This token create path is used to create new tokens adhering to the given role. -[**TokenWriteLookup**](AuthApi.md#TokenWriteLookup) | **Post** /auth/{token_mount_path}/lookup | This endpoint will lookup a token and its properties. -[**TokenWriteLookupAccessor**](AuthApi.md#TokenWriteLookupAccessor) | **Post** /auth/{token_mount_path}/lookup-accessor | This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID. -[**TokenWriteLookupSelf**](AuthApi.md#TokenWriteLookupSelf) | **Post** /auth/{token_mount_path}/lookup-self | This endpoint will lookup a token and its properties. -[**TokenWriteRole**](AuthApi.md#TokenWriteRole) | **Post** /auth/{token_mount_path}/roles/{role_name} | +[**TokenCreate**](AuthApi.md#TokenCreate) | **Post** /auth/token/create | The token create path is used to create new tokens. +[**TokenCreateAgainstRole**](AuthApi.md#TokenCreateAgainstRole) | **Post** /auth/token/create/{role_name} | This token create path is used to create new tokens adhering to the given role. +[**TokenCreateOrphan**](AuthApi.md#TokenCreateOrphan) | **Post** /auth/token/create-orphan | The token create path is used to create new orphan tokens. +[**TokenDeleteRole**](AuthApi.md#TokenDeleteRole) | **Delete** /auth/token/roles/{role_name} | +[**TokenListAccessors**](AuthApi.md#TokenListAccessors) | **Get** /auth/token/accessors/ | List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'. +[**TokenListRoles**](AuthApi.md#TokenListRoles) | **Get** /auth/token/roles | This endpoint lists configured roles. +[**TokenLookUp**](AuthApi.md#TokenLookUp) | **Post** /auth/token/lookup | +[**TokenLookUpAccessor**](AuthApi.md#TokenLookUpAccessor) | **Post** /auth/token/lookup-accessor | This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID. +[**TokenLookUpSelf**](AuthApi.md#TokenLookUpSelf) | **Get** /auth/token/lookup-self | +[**TokenLookUpSelf2**](AuthApi.md#TokenLookUpSelf2) | **Post** /auth/token/lookup-self | +[**TokenLookUpSelf3**](AuthApi.md#TokenLookUpSelf3) | **Get** /auth/token/lookup | +[**TokenReadRole**](AuthApi.md#TokenReadRole) | **Get** /auth/token/roles/{role_name} | +[**TokenRenew**](AuthApi.md#TokenRenew) | **Post** /auth/token/renew | This endpoint will renew the given token and prevent expiration. +[**TokenRenewAccessor**](AuthApi.md#TokenRenewAccessor) | **Post** /auth/token/renew-accessor | This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID. +[**TokenRenewSelf**](AuthApi.md#TokenRenewSelf) | **Post** /auth/token/renew-self | This endpoint will renew the token used to call it and prevent expiration. +[**TokenRevoke**](AuthApi.md#TokenRevoke) | **Post** /auth/token/revoke | This endpoint will delete the given token and all of its child tokens. +[**TokenRevokeAccessor**](AuthApi.md#TokenRevokeAccessor) | **Post** /auth/token/revoke-accessor | This endpoint will delete the token associated with the accessor and all of its child tokens. +[**TokenRevokeOrphan**](AuthApi.md#TokenRevokeOrphan) | **Post** /auth/token/revoke-orphan | This endpoint will delete the token and orphan its child tokens. +[**TokenRevokeSelf**](AuthApi.md#TokenRevokeSelf) | **Post** /auth/token/revoke-self | This endpoint will delete the token used to call it and all of its child tokens. +[**TokenTidy**](AuthApi.md#TokenTidy) | **Post** /auth/token/tidy | This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. +[**TokenWriteRole**](AuthApi.md#TokenWriteRole) | **Post** /auth/token/roles/{role_name} | [**UserpassDeleteUser**](AuthApi.md#UserpassDeleteUser) | **Delete** /auth/{userpass_mount_path}/users/{username} | Manage users allowed to authenticate. [**UserpassListUsers**](AuthApi.md#UserpassListUsers) | **Get** /auth/{userpass_mount_path}/users | Manage users allowed to authenticate. [**UserpassLogin**](AuthApi.md#UserpassLogin) | **Post** /auth/{userpass_mount_path}/login/{username} | Log in with a username and password. [**UserpassReadUser**](AuthApi.md#UserpassReadUser) | **Get** /auth/{userpass_mount_path}/users/{username} | Manage users allowed to authenticate. +[**UserpassResetPassword**](AuthApi.md#UserpassResetPassword) | **Post** /auth/{userpass_mount_path}/users/{username}/password | Reset user's password. +[**UserpassUpdatePolicies**](AuthApi.md#UserpassUpdatePolicies) | **Post** /auth/{userpass_mount_path}/users/{username}/policies | Update the policies associated with the username. [**UserpassWriteUser**](AuthApi.md#UserpassWriteUser) | **Post** /auth/{userpass_mount_path}/users/{username} | Manage users allowed to authenticate. -[**UserpassWriteUserPassword**](AuthApi.md#UserpassWriteUserPassword) | **Post** /auth/{userpass_mount_path}/users/{username}/password | Reset user's password. -[**UserpassWriteUserPolicies**](AuthApi.md#UserpassWriteUserPolicies) | **Post** /auth/{userpass_mount_path}/users/{username}/policies | Update the policies associated with the username. -## AWSConfigDeleteCertificate - +## AliCloudDeleteAuthRole +Create a role and associate policies to it. ### Example @@ -294,10 +286,12 @@ func main() { log.Fatal(err) } - certName := "certName_example" // string | Name of the certificate. - resp, err := client.Auth.AWSConfigDeleteCertificate( + role := "role_example" // string | The name of the role as it should appear in Vault. + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Auth.AliCloudDeleteAuthRole( context.Background(), - certName, + role, + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -314,7 +308,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**certName** | **string** | Name of the certificate. | +**role** | **string** | The name of the role as it should appear in Vault. | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -331,9 +326,9 @@ Name | Type | Description | Notes -## AWSConfigDeleteClient - +## AliCloudListAuthRoles +Lists all the roles that are registered with Vault. ### Example @@ -356,8 +351,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigDeleteClient( + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Auth.AliCloudListAuthRoles( context.Background(), + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -374,6 +371,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -381,6 +379,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -389,9 +388,9 @@ Name | Type | Description | Notes -## AWSConfigDeleteIdentityAccessList - +## AliCloudListAuthRoles2 +Lists all the roles that are registered with Vault. ### Example @@ -414,8 +413,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigDeleteIdentityAccessList( + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Auth.AliCloudListAuthRoles2( context.Background(), + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -432,6 +433,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -439,6 +441,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -447,9 +450,9 @@ Name | Type | Description | Notes -## AWSConfigDeleteIdentityWhiteList - +## AliCloudLogin +Authenticates an RAM entity with Vault. ### Example @@ -462,6 +465,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -472,8 +476,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigDeleteIdentityWhiteList( + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + request := schema.NewAliCloudLoginRequestWithDefaults() + resp, err := client.Auth.AliCloudLogin( context.Background(), + alicloudMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -490,6 +498,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -497,6 +506,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **aliCloudLoginRequest** | [**AliCloudLoginRequest**](AliCloudLoginRequest.md) | | (empty response body) @@ -505,9 +515,9 @@ Name | Type | Description | Notes -## AWSConfigDeleteRoleTagBlackList - +## AliCloudReadAuthRole +Create a role and associate policies to it. ### Example @@ -530,8 +540,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigDeleteRoleTagBlackList( + role := "role_example" // string | The name of the role as it should appear in Vault. + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Auth.AliCloudReadAuthRole( context.Background(), + role, + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -548,6 +562,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | The name of the role as it should appear in Vault. | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -556,6 +572,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -563,9 +580,9 @@ Name | Type | Description | Notes -## AWSConfigDeleteRoleTagDenyList - +## AliCloudWriteAuthRole +Create a role and associate policies to it. ### Example @@ -578,6 +595,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -588,8 +606,14 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigDeleteRoleTagDenyList( + role := "role_example" // string | The name of the role as it should appear in Vault. + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + request := schema.NewAliCloudWriteAuthRoleRequestWithDefaults() + resp, err := client.Auth.AliCloudWriteAuthRole( context.Background(), + role, + alicloudMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -606,6 +630,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | The name of the role as it should appear in Vault. | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -614,6 +640,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **aliCloudWriteAuthRoleRequest** | [**AliCloudWriteAuthRoleRequest**](AliCloudWriteAuthRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -621,7 +649,7 @@ Name | Type | Description | Notes -## AWSConfigDeleteSecurityTokenServiceAccount +## AppRoleDeleteBindSecretId @@ -646,10 +674,12 @@ func main() { log.Fatal(err) } - accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. - resp, err := client.Auth.AWSConfigDeleteSecurityTokenServiceAccount( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteBindSecretId( context.Background(), - accountId, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -666,7 +696,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**accountId** | **string** | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -683,7 +714,7 @@ Name | Type | Description | Notes -## AWSConfigListCertificates +## AppRoleDeleteBoundCidrList @@ -708,8 +739,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigListCertificates( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteBoundCidrList( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -726,13 +761,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -742,7 +779,7 @@ Name | Type | Description | Notes -## AWSConfigListSecurityTokenService +## AppRoleDeletePeriod @@ -767,8 +804,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigListSecurityTokenService( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeletePeriod( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -785,13 +826,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -801,7 +844,7 @@ Name | Type | Description | Notes -## AWSConfigReadCertificate +## AppRoleDeletePolicies @@ -826,10 +869,12 @@ func main() { log.Fatal(err) } - certName := "certName_example" // string | Name of the certificate. - resp, err := client.Auth.AWSConfigReadCertificate( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeletePolicies( context.Background(), - certName, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -846,7 +891,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**certName** | **string** | Name of the certificate. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -863,7 +909,7 @@ Name | Type | Description | Notes -## AWSConfigReadClient +## AppRoleDeleteRole @@ -888,8 +934,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigReadClient( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteRole( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -906,6 +956,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -914,6 +966,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -921,7 +974,7 @@ Name | Type | Description | Notes -## AWSConfigReadIdentity +## AppRoleDeleteSecretIdBoundCidrs @@ -946,8 +999,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigReadIdentity( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteSecretIdBoundCidrs( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -964,6 +1021,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -972,6 +1031,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -979,7 +1039,7 @@ Name | Type | Description | Notes -## AWSConfigReadIdentityAccessList +## AppRoleDeleteSecretIdNumUses @@ -1004,8 +1064,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigReadIdentityAccessList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteSecretIdNumUses( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1022,6 +1086,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1030,6 +1096,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -1037,7 +1104,7 @@ Name | Type | Description | Notes -## AWSConfigReadIdentityWhiteList +## AppRoleDeleteSecretIdTtl @@ -1062,8 +1129,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigReadIdentityWhiteList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteSecretIdTtl( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1080,6 +1151,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1088,6 +1161,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -1095,7 +1169,7 @@ Name | Type | Description | Notes -## AWSConfigReadRoleTagBlackList +## AppRoleDeleteTokenBoundCidrs @@ -1120,8 +1194,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigReadRoleTagBlackList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteTokenBoundCidrs( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1138,6 +1216,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1146,6 +1226,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -1153,7 +1234,7 @@ Name | Type | Description | Notes -## AWSConfigReadRoleTagDenyList +## AppRoleDeleteTokenMaxTtl @@ -1178,8 +1259,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigReadRoleTagDenyList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteTokenMaxTtl( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1196,6 +1281,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1204,6 +1291,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -1211,7 +1299,7 @@ Name | Type | Description | Notes -## AWSConfigReadSecurityTokenServiceAccount +## AppRoleDeleteTokenNumUses @@ -1236,10 +1324,12 @@ func main() { log.Fatal(err) } - accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. - resp, err := client.Auth.AWSConfigReadSecurityTokenServiceAccount( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteTokenNumUses( context.Background(), - accountId, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1256,7 +1346,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**accountId** | **string** | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1273,7 +1364,7 @@ Name | Type | Description | Notes -## AWSConfigRotateRoot +## AppRoleDeleteTokenTtl @@ -1298,8 +1389,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSConfigRotateRoot( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDeleteTokenTtl( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1316,6 +1411,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1324,6 +1421,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -1331,7 +1429,7 @@ Name | Type | Description | Notes -## AWSConfigWriteCertificate +## AppRoleDestroySecretId @@ -1357,11 +1455,13 @@ func main() { log.Fatal(err) } - certName := "certName_example" // string | Name of the certificate. - request := schema.NewAWSConfigWriteCertificateRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteCertificate( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleDestroySecretIdRequestWithDefaults() + resp, err := client.Auth.AppRoleDestroySecretId( context.Background(), - certName, + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -1379,7 +1479,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**certName** | **string** | Name of the certificate. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1387,8 +1488,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteCertificateRequest** | [**AWSConfigWriteCertificateRequest**](AWSConfigWriteCertificateRequest.md) | | + **appRoleDestroySecretIdRequest** | [**AppRoleDestroySecretIdRequest**](AppRoleDestroySecretIdRequest.md) | | (empty response body) @@ -1397,7 +1498,7 @@ Name | Type | Description | Notes -## AWSConfigWriteClient +## AppRoleDestroySecretId2 @@ -1412,7 +1513,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1423,10 +1523,12 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteClientRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteClient( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDestroySecretId2( context.Background(), - request, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1443,13 +1545,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteClientRequest** | [**AWSConfigWriteClientRequest**](AWSConfigWriteClientRequest.md) | | + (empty response body) @@ -1459,7 +1563,7 @@ Name | Type | Description | Notes -## AWSConfigWriteIdentity +## AppRoleDestroySecretIdByAccessor @@ -1485,9 +1589,13 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteIdentityRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteIdentity( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleDestroySecretIdByAccessorRequestWithDefaults() + resp, err := client.Auth.AppRoleDestroySecretIdByAccessor( context.Background(), + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -1505,15 +1613,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteIdentityRequest** | [**AWSConfigWriteIdentityRequest**](AWSConfigWriteIdentityRequest.md) | | + **appRoleDestroySecretIdByAccessorRequest** | [**AppRoleDestroySecretIdByAccessorRequest**](AppRoleDestroySecretIdByAccessorRequest.md) | | + (empty response body) [[Back to top]](#) @@ -1521,7 +1632,7 @@ Name | Type | Description | Notes -## AWSConfigWriteIdentityAccessList +## AppRoleDestroySecretIdByAccessor2 @@ -1536,7 +1647,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1547,10 +1657,12 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteIdentityAccessListRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteIdentityAccessList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleDestroySecretIdByAccessor2( context.Background(), - request, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1567,13 +1679,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteIdentityAccessListRequest** | [**AWSConfigWriteIdentityAccessListRequest**](AWSConfigWriteIdentityAccessListRequest.md) | | + (empty response body) @@ -1583,7 +1697,7 @@ Name | Type | Description | Notes -## AWSConfigWriteIdentityWhiteList +## AppRoleListRoles @@ -1598,7 +1712,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1609,10 +1722,10 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteIdentityWhiteListRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteIdentityWhiteList( + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleListRoles( context.Background(), - request, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1629,23 +1742,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteIdentityWhiteListRequest** | [**AWSConfigWriteIdentityWhiteListRequest**](AWSConfigWriteIdentityWhiteListRequest.md) | | + **list** | **string** | Must be set to `true` | - (empty response body) +[**AppRoleListRolesResponse**](AppRoleListRolesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSConfigWriteRoleTagBlackList +## AppRoleListSecretIds @@ -1660,7 +1774,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1671,10 +1784,12 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteRoleTagBlackListRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteRoleTagBlackList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleListSecretIds( context.Background(), - request, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1691,23 +1806,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteRoleTagBlackListRequest** | [**AWSConfigWriteRoleTagBlackListRequest**](AWSConfigWriteRoleTagBlackListRequest.md) | | - (empty response body) + **list** | **string** | Must be set to `true` | + +[**AppRoleListSecretIdsResponse**](AppRoleListSecretIdsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSConfigWriteRoleTagDenyList +## AppRoleLogin @@ -1733,9 +1851,11 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteRoleTagDenyListRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteRoleTagDenyList( + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleLoginRequestWithDefaults() + resp, err := client.Auth.AppRoleLogin( context.Background(), + approleMountPath, request, vault.WithToken("my-token"), ) @@ -1753,14 +1873,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteRoleTagDenyListRequest** | [**AWSConfigWriteRoleTagDenyListRequest**](AWSConfigWriteRoleTagDenyListRequest.md) | | + **appRoleLoginRequest** | [**AppRoleLoginRequest**](AppRoleLoginRequest.md) | | (empty response body) @@ -1769,7 +1890,7 @@ Name | Type | Description | Notes -## AWSConfigWriteSecurityTokenServiceAccount +## AppRoleLookUpSecretId @@ -1795,11 +1916,13 @@ func main() { log.Fatal(err) } - accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. - request := schema.NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults() - resp, err := client.Auth.AWSConfigWriteSecurityTokenServiceAccount( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleLookUpSecretIdRequestWithDefaults() + resp, err := client.Auth.AppRoleLookUpSecretId( context.Background(), - accountId, + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -1817,7 +1940,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**accountId** | **string** | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1825,17 +1949,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteSecurityTokenServiceAccountRequest** | [**AWSConfigWriteSecurityTokenServiceAccountRequest**](AWSConfigWriteSecurityTokenServiceAccountRequest.md) | | + **appRoleLookUpSecretIdRequest** | [**AppRoleLookUpSecretIdRequest**](AppRoleLookUpSecretIdRequest.md) | | - (empty response body) +[**AppRoleLookUpSecretIdResponse**](AppRoleLookUpSecretIdResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSDeleteAuthRole +## AppRoleLookUpSecretIdByAccessor @@ -1850,6 +1974,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1860,10 +1985,14 @@ func main() { log.Fatal(err) } - role := "role_example" // string | Name of the role. - resp, err := client.Auth.AWSDeleteAuthRole( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleLookUpSecretIdByAccessorRequestWithDefaults() + resp, err := client.Auth.AppRoleLookUpSecretIdByAccessor( context.Background(), - role, + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1880,7 +2009,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | Name of the role. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1889,15 +2019,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **appRoleLookUpSecretIdByAccessorRequest** | [**AppRoleLookUpSecretIdByAccessorRequest**](AppRoleLookUpSecretIdByAccessorRequest.md) | | - (empty response body) +[**AppRoleLookUpSecretIdByAccessorResponse**](AppRoleLookUpSecretIdByAccessorResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSDeleteIdentityAccessListFor +## AppRoleReadBindSecretId @@ -1922,10 +2053,12 @@ func main() { log.Fatal(err) } - instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. - resp, err := client.Auth.AWSDeleteIdentityAccessListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadBindSecretId( context.Background(), - instanceId, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1942,7 +2075,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -1952,14 +2086,14 @@ Name | Type | Description | Notes - (empty response body) +[**AppRoleReadBindSecretIdResponse**](AppRoleReadBindSecretIdResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSDeleteIdentityWhiteListFor +## AppRoleReadBoundCidrList @@ -1984,10 +2118,12 @@ func main() { log.Fatal(err) } - instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. - resp, err := client.Auth.AWSDeleteIdentityWhiteListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadBoundCidrList( context.Background(), - instanceId, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2004,7 +2140,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2014,14 +2151,14 @@ Name | Type | Description | Notes - (empty response body) +[**AppRoleReadBoundCidrListResponse**](AppRoleReadBoundCidrListResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSDeleteRoleTagBlackListFor +## AppRoleReadLocalSecretIds @@ -2046,10 +2183,12 @@ func main() { log.Fatal(err) } - roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. - resp, err := client.Auth.AWSDeleteRoleTagBlackListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadLocalSecretIds( context.Background(), - roleTag, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2066,7 +2205,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2076,14 +2216,14 @@ Name | Type | Description | Notes - (empty response body) +[**AppRoleReadLocalSecretIdsResponse**](AppRoleReadLocalSecretIdsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSDeleteRoleTagDenyListFor +## AppRoleReadPeriod @@ -2108,10 +2248,12 @@ func main() { log.Fatal(err) } - roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. - resp, err := client.Auth.AWSDeleteRoleTagDenyListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadPeriod( context.Background(), - roleTag, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2128,7 +2270,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2138,14 +2281,14 @@ Name | Type | Description | Notes - (empty response body) +[**AppRoleReadPeriodResponse**](AppRoleReadPeriodResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSListAuthRoles +## AppRoleReadPolicies @@ -2170,8 +2313,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSListAuthRoles( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadPolicies( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2188,23 +2335,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + +[**AppRoleReadPoliciesResponse**](AppRoleReadPoliciesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSListAuthRoles2 +## AppRoleReadRole @@ -2229,8 +2378,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSListAuthRoles2( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadRole( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2247,23 +2400,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + +[**AppRoleReadRoleResponse**](AppRoleReadRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSListIdentityAccessList +## AppRoleReadRoleId @@ -2288,8 +2443,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSListIdentityAccessList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadRoleId( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2306,23 +2465,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + +[**AppRoleReadRoleIdResponse**](AppRoleReadRoleIdResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSListIdentityWhiteList +## AppRoleReadSecretIdBoundCidrs @@ -2347,8 +2508,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSListIdentityWhiteList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadSecretIdBoundCidrs( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2365,23 +2530,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + +[**AppRoleReadSecretIdBoundCidrsResponse**](AppRoleReadSecretIdBoundCidrsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSListRoleTagBlackList +## AppRoleReadSecretIdNumUses @@ -2406,8 +2573,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSListRoleTagBlackList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadSecretIdNumUses( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2424,23 +2595,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + +[**AppRoleReadSecretIdNumUsesResponse**](AppRoleReadSecretIdNumUsesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSListRoleTagDenyList +## AppRoleReadSecretIdTtl @@ -2465,8 +2638,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AWSListRoleTagDenyList( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadSecretIdTtl( context.Background(), + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2483,23 +2660,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + +[**AppRoleReadSecretIdTtlResponse**](AppRoleReadSecretIdTtlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSLogin +## AppRoleReadTokenBoundCidrs @@ -2514,7 +2693,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2525,10 +2703,12 @@ func main() { log.Fatal(err) } - request := schema.NewAWSLoginRequestWithDefaults() - resp, err := client.Auth.AWSLogin( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadTokenBoundCidrs( context.Background(), - request, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2545,23 +2725,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSLoginRequest** | [**AWSLoginRequest**](AWSLoginRequest.md) | | - (empty response body) + +[**AppRoleReadTokenBoundCidrsResponse**](AppRoleReadTokenBoundCidrsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSReadAuthRole +## AppRoleReadTokenMaxTtl @@ -2586,10 +2768,12 @@ func main() { log.Fatal(err) } - role := "role_example" // string | Name of the role. - resp, err := client.Auth.AWSReadAuthRole( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadTokenMaxTtl( context.Background(), - role, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2606,7 +2790,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | Name of the role. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2616,14 +2801,14 @@ Name | Type | Description | Notes - (empty response body) +[**AppRoleReadTokenMaxTtlResponse**](AppRoleReadTokenMaxTtlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSReadIdentityAccessListFor +## AppRoleReadTokenNumUses @@ -2648,10 +2833,12 @@ func main() { log.Fatal(err) } - instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. - resp, err := client.Auth.AWSReadIdentityAccessListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadTokenNumUses( context.Background(), - instanceId, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2668,7 +2855,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2678,14 +2866,14 @@ Name | Type | Description | Notes - (empty response body) +[**AppRoleReadTokenNumUsesResponse**](AppRoleReadTokenNumUsesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSReadIdentityWhiteListFor +## AppRoleReadTokenTtl @@ -2710,10 +2898,12 @@ func main() { log.Fatal(err) } - instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. - resp, err := client.Auth.AWSReadIdentityWhiteListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleReadTokenTtl( context.Background(), - instanceId, + roleName, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2730,7 +2920,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2740,14 +2931,14 @@ Name | Type | Description | Notes - (empty response body) +[**AppRoleReadTokenTtlResponse**](AppRoleReadTokenTtlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSReadRoleTagBlackListFor +## AppRoleTidySecretId @@ -2772,10 +2963,10 @@ func main() { log.Fatal(err) } - roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. - resp, err := client.Auth.AWSReadRoleTagBlackListFor( + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + resp, err := client.Auth.AppRoleTidySecretId( context.Background(), - roleTag, + approleMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2792,7 +2983,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2801,7 +2992,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -2809,7 +2999,7 @@ Name | Type | Description | Notes -## AWSReadRoleTagDenyListFor +## AppRoleWriteBindSecretId @@ -2824,6 +3014,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2834,10 +3025,14 @@ func main() { log.Fatal(err) } - roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. - resp, err := client.Auth.AWSReadRoleTagDenyListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteBindSecretIdRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteBindSecretId( context.Background(), - roleTag, + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -2854,7 +3049,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2863,6 +3059,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **appRoleWriteBindSecretIdRequest** | [**AppRoleWriteBindSecretIdRequest**](AppRoleWriteBindSecretIdRequest.md) | | (empty response body) @@ -2871,7 +3068,7 @@ Name | Type | Description | Notes -## AWSWriteAuthRole +## AppRoleWriteBoundCidrList @@ -2897,11 +3094,13 @@ func main() { log.Fatal(err) } - role := "role_example" // string | Name of the role. - request := schema.NewAWSWriteAuthRoleRequestWithDefaults() - resp, err := client.Auth.AWSWriteAuthRole( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteBoundCidrListRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteBoundCidrList( context.Background(), - role, + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -2919,7 +3118,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | Name of the role. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2927,8 +3127,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteAuthRoleRequest** | [**AWSWriteAuthRoleRequest**](AWSWriteAuthRoleRequest.md) | | + **appRoleWriteBoundCidrListRequest** | [**AppRoleWriteBoundCidrListRequest**](AppRoleWriteBoundCidrListRequest.md) | | (empty response body) @@ -2937,7 +3137,7 @@ Name | Type | Description | Notes -## AWSWriteAuthRoleTag +## AppRoleWriteCustomSecretId @@ -2963,11 +3163,13 @@ func main() { log.Fatal(err) } - role := "role_example" // string | Name of the role. - request := schema.NewAWSWriteAuthRoleTagRequestWithDefaults() - resp, err := client.Auth.AWSWriteAuthRoleTag( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteCustomSecretIdRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteCustomSecretId( context.Background(), - role, + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -2985,7 +3187,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | Name of the role. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -2993,17 +3196,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteAuthRoleTagRequest** | [**AWSWriteAuthRoleTagRequest**](AWSWriteAuthRoleTagRequest.md) | | + **appRoleWriteCustomSecretIdRequest** | [**AppRoleWriteCustomSecretIdRequest**](AppRoleWriteCustomSecretIdRequest.md) | | - (empty response body) +[**AppRoleWriteCustomSecretIdResponse**](AppRoleWriteCustomSecretIdResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSWriteIdentityAccessListTidySettings +## AppRoleWritePeriod @@ -3029,9 +3232,13 @@ func main() { log.Fatal(err) } - request := schema.NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults() - resp, err := client.Auth.AWSWriteIdentityAccessListTidySettings( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWritePeriodRequestWithDefaults() + resp, err := client.Auth.AppRoleWritePeriod( context.Background(), + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -3049,15 +3256,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteIdentityAccessListTidySettingsRequest** | [**AWSWriteIdentityAccessListTidySettingsRequest**](AWSWriteIdentityAccessListTidySettingsRequest.md) | | + **appRoleWritePeriodRequest** | [**AppRoleWritePeriodRequest**](AppRoleWritePeriodRequest.md) | | + (empty response body) [[Back to top]](#) @@ -3065,7 +3275,7 @@ Name | Type | Description | Notes -## AWSWriteIdentityWhiteListTidySettings +## AppRoleWritePolicies @@ -3091,9 +3301,13 @@ func main() { log.Fatal(err) } - request := schema.NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults() - resp, err := client.Auth.AWSWriteIdentityWhiteListTidySettings( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWritePoliciesRequestWithDefaults() + resp, err := client.Auth.AppRoleWritePolicies( context.Background(), + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -3111,15 +3325,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteIdentityWhiteListTidySettingsRequest** | [**AWSWriteIdentityWhiteListTidySettingsRequest**](AWSWriteIdentityWhiteListTidySettingsRequest.md) | | + **appRoleWritePoliciesRequest** | [**AppRoleWritePoliciesRequest**](AppRoleWritePoliciesRequest.md) | | + (empty response body) [[Back to top]](#) @@ -3127,7 +3344,7 @@ Name | Type | Description | Notes -## AWSWriteRoleTagBlackListFor +## AppRoleWriteRole @@ -3142,6 +3359,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3152,10 +3370,14 @@ func main() { log.Fatal(err) } - roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. - resp, err := client.Auth.AWSWriteRoleTagBlackListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteRoleRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteRole( context.Background(), - roleTag, + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3172,7 +3394,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -3181,6 +3404,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **appRoleWriteRoleRequest** | [**AppRoleWriteRoleRequest**](AppRoleWriteRoleRequest.md) | | (empty response body) @@ -3189,7 +3413,7 @@ Name | Type | Description | Notes -## AWSWriteRoleTagBlackListTidySettings +## AppRoleWriteRoleId @@ -3215,9 +3439,13 @@ func main() { log.Fatal(err) } - request := schema.NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults() - resp, err := client.Auth.AWSWriteRoleTagBlackListTidySettings( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteRoleIdRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteRoleId( context.Background(), + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -3235,15 +3463,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteRoleTagBlackListTidySettingsRequest** | [**AWSWriteRoleTagBlackListTidySettingsRequest**](AWSWriteRoleTagBlackListTidySettingsRequest.md) | | + **appRoleWriteRoleIdRequest** | [**AppRoleWriteRoleIdRequest**](AppRoleWriteRoleIdRequest.md) | | + (empty response body) [[Back to top]](#) @@ -3251,7 +3482,7 @@ Name | Type | Description | Notes -## AWSWriteRoleTagDenyListFor +## AppRoleWriteSecretId @@ -3266,6 +3497,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3276,10 +3508,14 @@ func main() { log.Fatal(err) } - roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. - resp, err := client.Auth.AWSWriteRoleTagDenyListFor( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteSecretIdRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteSecretId( context.Background(), - roleTag, + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3296,7 +3532,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -3305,15 +3542,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **appRoleWriteSecretIdRequest** | [**AppRoleWriteSecretIdRequest**](AppRoleWriteSecretIdRequest.md) | | - (empty response body) +[**AppRoleWriteSecretIdResponse**](AppRoleWriteSecretIdResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## AWSWriteRoleTagDenyListTidySettings +## AppRoleWriteSecretIdBoundCidrs @@ -3339,9 +3577,13 @@ func main() { log.Fatal(err) } - request := schema.NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults() - resp, err := client.Auth.AWSWriteRoleTagDenyListTidySettings( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteSecretIdBoundCidrsRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteSecretIdBoundCidrs( context.Background(), + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -3359,15 +3601,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteRoleTagDenyListTidySettingsRequest** | [**AWSWriteRoleTagDenyListTidySettingsRequest**](AWSWriteRoleTagDenyListTidySettingsRequest.md) | | + **appRoleWriteSecretIdBoundCidrsRequest** | [**AppRoleWriteSecretIdBoundCidrsRequest**](AppRoleWriteSecretIdBoundCidrsRequest.md) | | + (empty response body) [[Back to top]](#) @@ -3375,9 +3620,9 @@ Name | Type | Description | Notes -## AliCloudDeleteAuthRole +## AppRoleWriteSecretIdNumUses + -Create a role and associate policies to it. ### Example @@ -3390,6 +3635,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3400,10 +3646,14 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The name of the role as it should appear in Vault. - resp, err := client.Auth.AliCloudDeleteAuthRole( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteSecretIdNumUsesRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteSecretIdNumUses( context.Background(), - role, + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3420,7 +3670,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The name of the role as it should appear in Vault. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -3429,6 +3680,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **appRoleWriteSecretIdNumUsesRequest** | [**AppRoleWriteSecretIdNumUsesRequest**](AppRoleWriteSecretIdNumUsesRequest.md) | | (empty response body) @@ -3437,9 +3689,9 @@ Name | Type | Description | Notes -## AliCloudListAuthRoles +## AppRoleWriteSecretIdTtl + -Lists all the roles that are registered with Vault. ### Example @@ -3452,6 +3704,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3462,8 +3715,14 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AliCloudListAuthRoles( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteSecretIdTtlRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteSecretIdTtl( context.Background(), + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3480,15 +3739,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **appRoleWriteSecretIdTtlRequest** | [**AppRoleWriteSecretIdTtlRequest**](AppRoleWriteSecretIdTtlRequest.md) | | + (empty response body) [[Back to top]](#) @@ -3496,9 +3758,9 @@ Name | Type | Description | Notes -## AliCloudListAuthRoles2 +## AppRoleWriteTokenBoundCidrs + -Lists all the roles that are registered with Vault. ### Example @@ -3511,6 +3773,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3521,8 +3784,14 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AliCloudListAuthRoles2( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteTokenBoundCidrsRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteTokenBoundCidrs( context.Background(), + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3539,15 +3808,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **appRoleWriteTokenBoundCidrsRequest** | [**AppRoleWriteTokenBoundCidrsRequest**](AppRoleWriteTokenBoundCidrsRequest.md) | | + (empty response body) [[Back to top]](#) @@ -3555,9 +3827,9 @@ Name | Type | Description | Notes -## AliCloudLogin +## AppRoleWriteTokenMaxTtl + -Authenticates an RAM entity with Vault. ### Example @@ -3581,9 +3853,13 @@ func main() { log.Fatal(err) } - request := schema.NewAliCloudLoginRequestWithDefaults() - resp, err := client.Auth.AliCloudLogin( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteTokenMaxTtlRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteTokenMaxTtl( context.Background(), + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -3601,15 +3877,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aliCloudLoginRequest** | [**AliCloudLoginRequest**](AliCloudLoginRequest.md) | | + **appRoleWriteTokenMaxTtlRequest** | [**AppRoleWriteTokenMaxTtlRequest**](AppRoleWriteTokenMaxTtlRequest.md) | | + (empty response body) [[Back to top]](#) @@ -3617,9 +3896,9 @@ Name | Type | Description | Notes -## AliCloudReadAuthRole +## AppRoleWriteTokenNumUses + -Create a role and associate policies to it. ### Example @@ -3632,6 +3911,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3642,10 +3922,14 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The name of the role as it should appear in Vault. - resp, err := client.Auth.AliCloudReadAuthRole( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteTokenNumUsesRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteTokenNumUses( context.Background(), - role, + roleName, + approleMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3662,7 +3946,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The name of the role as it should appear in Vault. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -3671,6 +3956,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **appRoleWriteTokenNumUsesRequest** | [**AppRoleWriteTokenNumUsesRequest**](AppRoleWriteTokenNumUsesRequest.md) | | (empty response body) @@ -3679,9 +3965,9 @@ Name | Type | Description | Notes -## AliCloudWriteAuthRole +## AppRoleWriteTokenTtl + -Create a role and associate policies to it. ### Example @@ -3705,11 +3991,13 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The name of the role as it should appear in Vault. - request := schema.NewAliCloudWriteAuthRoleRequestWithDefaults() - resp, err := client.Auth.AliCloudWriteAuthRole( + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. + approleMountPath := "approleMountPath_example" // string | Path that the backend was mounted at (defaults to "approle") + request := schema.NewAppRoleWriteTokenTtlRequestWithDefaults() + resp, err := client.Auth.AppRoleWriteTokenTtl( context.Background(), - role, + roleName, + approleMountPath, request, vault.WithToken("my-token"), ) @@ -3727,7 +4015,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The name of the role as it should appear in Vault. | +**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**approleMountPath** | **string** | Path that the backend was mounted at | [default to "approle"] ### Other Parameters @@ -3735,8 +4024,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aliCloudWriteAuthRoleRequest** | [**AliCloudWriteAuthRoleRequest**](AliCloudWriteAuthRoleRequest.md) | | + **appRoleWriteTokenTtlRequest** | [**AppRoleWriteTokenTtlRequest**](AppRoleWriteTokenTtlRequest.md) | | (empty response body) @@ -3745,7 +4034,7 @@ Name | Type | Description | Notes -## AppRoleDeleteBindSecretID +## AwsConfigureCertificate @@ -3760,6 +4049,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3770,10 +4060,14 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteBindSecretID( + certName := "certName_example" // string | Name of the certificate. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureCertificateRequestWithDefaults() + resp, err := client.Auth.AwsConfigureCertificate( context.Background(), - roleName, + certName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3790,7 +4084,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**certName** | **string** | Name of the certificate. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -3799,6 +4094,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **awsConfigureCertificateRequest** | [**AwsConfigureCertificateRequest**](AwsConfigureCertificateRequest.md) | | (empty response body) @@ -3807,7 +4103,7 @@ Name | Type | Description | Notes -## AppRoleDeleteBoundCIDRList +## AwsConfigureClient @@ -3822,6 +4118,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3832,10 +4129,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteBoundCIDRList( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureClientRequestWithDefaults() + resp, err := client.Auth.AwsConfigureClient( context.Background(), - roleName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3852,7 +4151,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -3860,7 +4159,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureClientRequest** | [**AwsConfigureClientRequest**](AwsConfigureClientRequest.md) | | (empty response body) @@ -3869,7 +4168,7 @@ Name | Type | Description | Notes -## AppRoleDeletePeriod +## AwsConfigureIdentityAccessListTidyOperation @@ -3884,6 +4183,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3894,10 +4194,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeletePeriod( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureIdentityAccessListTidyOperationRequestWithDefaults() + resp, err := client.Auth.AwsConfigureIdentityAccessListTidyOperation( context.Background(), - roleName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3914,7 +4216,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -3922,7 +4224,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureIdentityAccessListTidyOperationRequest** | [**AwsConfigureIdentityAccessListTidyOperationRequest**](AwsConfigureIdentityAccessListTidyOperationRequest.md) | | (empty response body) @@ -3931,7 +4233,7 @@ Name | Type | Description | Notes -## AppRoleDeletePolicies +## AwsConfigureIdentityIntegration @@ -3946,6 +4248,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3956,10 +4259,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeletePolicies( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureIdentityIntegrationRequestWithDefaults() + resp, err := client.Auth.AwsConfigureIdentityIntegration( context.Background(), - roleName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3976,7 +4281,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -3984,7 +4289,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureIdentityIntegrationRequest** | [**AwsConfigureIdentityIntegrationRequest**](AwsConfigureIdentityIntegrationRequest.md) | | (empty response body) @@ -3993,7 +4298,7 @@ Name | Type | Description | Notes -## AppRoleDeleteRole +## AwsConfigureIdentityWhitelistTidyOperation @@ -4008,6 +4313,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4018,10 +4324,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteRole( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureIdentityWhitelistTidyOperationRequestWithDefaults() + resp, err := client.Auth.AwsConfigureIdentityWhitelistTidyOperation( context.Background(), - roleName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4038,7 +4346,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4046,7 +4354,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureIdentityWhitelistTidyOperationRequest** | [**AwsConfigureIdentityWhitelistTidyOperationRequest**](AwsConfigureIdentityWhitelistTidyOperationRequest.md) | | (empty response body) @@ -4055,7 +4363,7 @@ Name | Type | Description | Notes -## AppRoleDeleteSecretIDAccessorDestroy +## AwsConfigureRoleTagBlacklistTidyOperation @@ -4070,6 +4378,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4080,10 +4389,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteSecretIDAccessorDestroy( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureRoleTagBlacklistTidyOperationRequestWithDefaults() + resp, err := client.Auth.AwsConfigureRoleTagBlacklistTidyOperation( context.Background(), - roleName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4100,7 +4411,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4108,7 +4419,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureRoleTagBlacklistTidyOperationRequest** | [**AwsConfigureRoleTagBlacklistTidyOperationRequest**](AwsConfigureRoleTagBlacklistTidyOperationRequest.md) | | (empty response body) @@ -4117,7 +4428,7 @@ Name | Type | Description | Notes -## AppRoleDeleteSecretIDBoundCIDRs +## AwsConfigureRoleTagDenyListTidyOperation @@ -4132,6 +4443,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4142,10 +4454,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteSecretIDBoundCIDRs( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureRoleTagDenyListTidyOperationRequestWithDefaults() + resp, err := client.Auth.AwsConfigureRoleTagDenyListTidyOperation( context.Background(), - roleName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4162,7 +4476,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4170,7 +4484,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureRoleTagDenyListTidyOperationRequest** | [**AwsConfigureRoleTagDenyListTidyOperationRequest**](AwsConfigureRoleTagDenyListTidyOperationRequest.md) | | (empty response body) @@ -4179,7 +4493,7 @@ Name | Type | Description | Notes -## AppRoleDeleteSecretIDDestroy +## AwsDeleteAuthRole @@ -4204,10 +4518,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteSecretIDDestroy( + role := "role_example" // string | Name of the role. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteAuthRole( context.Background(), - roleName, + role, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4224,7 +4540,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**role** | **string** | Name of the role. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4241,7 +4558,7 @@ Name | Type | Description | Notes -## AppRoleDeleteSecretIDNumUses +## AwsDeleteCertificateConfiguration @@ -4266,10 +4583,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteSecretIDNumUses( + certName := "certName_example" // string | Name of the certificate. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteCertificateConfiguration( context.Background(), - roleName, + certName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4286,7 +4605,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**certName** | **string** | Name of the certificate. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4303,7 +4623,7 @@ Name | Type | Description | Notes -## AppRoleDeleteSecretIDTTL +## AwsDeleteClientConfiguration @@ -4328,10 +4648,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteSecretIDTTL( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteClientConfiguration( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4348,7 +4668,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4357,7 +4677,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -4365,7 +4684,7 @@ Name | Type | Description | Notes -## AppRoleDeleteTokenBoundCIDRs +## AwsDeleteIdentityAccessList @@ -4390,10 +4709,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteTokenBoundCIDRs( + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteIdentityAccessList( context.Background(), - roleName, + instanceId, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4410,7 +4731,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4427,7 +4749,7 @@ Name | Type | Description | Notes -## AppRoleDeleteTokenMaxTTL +## AwsDeleteIdentityAccessListTidySettings @@ -4452,10 +4774,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteTokenMaxTTL( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteIdentityAccessListTidySettings( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4472,7 +4794,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4481,7 +4803,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -4489,7 +4810,7 @@ Name | Type | Description | Notes -## AppRoleDeleteTokenNumUses +## AwsDeleteIdentityWhitelist @@ -4514,10 +4835,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteTokenNumUses( + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteIdentityWhitelist( context.Background(), - roleName, + instanceId, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4534,7 +4857,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4551,7 +4875,7 @@ Name | Type | Description | Notes -## AppRoleDeleteTokenTTL +## AwsDeleteIdentityWhitelistTidySettings @@ -4576,10 +4900,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleDeleteTokenTTL( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteIdentityWhitelistTidySettings( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4596,7 +4920,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4605,7 +4929,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -4613,7 +4936,7 @@ Name | Type | Description | Notes -## AppRoleListRoles +## AwsDeleteRoleTagBlacklist @@ -4638,8 +4961,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AppRoleListRoles( + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteRoleTagBlacklist( context.Background(), + roleTag, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4656,23 +4983,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | -[**AppRoleListRolesResponse**](AppRoleListRolesResponse.md) + + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleListSecretID +## AwsDeleteRoleTagBlacklistTidySettings @@ -4697,10 +5026,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleListSecretID( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteRoleTagBlacklistTidySettings( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4717,7 +5046,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4725,17 +5054,15 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - -[**AppRoleListSecretIDResponse**](AppRoleListSecretIDResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleLogin +## AwsDeleteRoleTagDenyList @@ -4750,7 +5077,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4761,10 +5087,12 @@ func main() { log.Fatal(err) } - request := schema.NewAppRoleLoginRequestWithDefaults() - resp, err := client.Auth.AppRoleLogin( + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteRoleTagDenyList( context.Background(), - request, + roleTag, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4781,13 +5109,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleLoginRequest** | [**AppRoleLoginRequest**](AppRoleLoginRequest.md) | | + (empty response body) @@ -4797,7 +5127,7 @@ Name | Type | Description | Notes -## AppRoleReadBindSecretID +## AwsDeleteRoleTagDenyListTidySettings @@ -4822,10 +5152,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadBindSecretID( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteRoleTagDenyListTidySettings( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4842,7 +5172,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4851,15 +5181,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - -[**AppRoleReadBindSecretIDResponse**](AppRoleReadBindSecretIDResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadBoundCIDRList +## AwsDeleteStsRole @@ -4884,10 +5213,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadBoundCIDRList( + accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsDeleteStsRole( context.Background(), - roleName, + accountId, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4904,7 +5235,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**accountId** | **string** | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4914,14 +5246,14 @@ Name | Type | Description | Notes -[**AppRoleReadBoundCIDRListResponse**](AppRoleReadBoundCIDRListResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadLocalSecretIDs +## AwsListAuthRoles @@ -4946,10 +5278,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadLocalSecretIDs( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListAuthRoles( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4966,7 +5298,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -4974,16 +5306,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadLocalSecretIDsResponse**](AppRoleReadLocalSecretIDsResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadPeriod +## AwsListCertificateConfigurations @@ -5008,10 +5340,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadPeriod( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListCertificateConfigurations( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5028,7 +5360,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5036,16 +5368,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadPeriodResponse**](AppRoleReadPeriodResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadPolicies +## AwsListIdentityAccessList @@ -5070,10 +5402,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadPolicies( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListIdentityAccessList( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5090,7 +5422,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5098,16 +5430,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadPoliciesResponse**](AppRoleReadPoliciesResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadRole +## AwsListIdentityWhitelist @@ -5132,10 +5464,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadRole( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListIdentityWhitelist( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5152,7 +5484,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5160,16 +5492,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadRoleResponse**](AppRoleReadRoleResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadRoleID +## AwsListRoleTagBlacklists @@ -5194,10 +5526,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadRoleID( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListRoleTagBlacklists( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5214,7 +5546,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5222,16 +5554,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadRoleIDResponse**](AppRoleReadRoleIDResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadSecretIDBoundCIDRs +## AwsListRoleTagDenyLists @@ -5256,10 +5588,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadSecretIDBoundCIDRs( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListRoleTagDenyLists( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5276,7 +5608,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5284,16 +5616,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadSecretIDBoundCIDRsResponse**](AppRoleReadSecretIDBoundCIDRsResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadSecretIDNumUses +## AwsListRoles2 @@ -5318,10 +5650,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadSecretIDNumUses( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListRoles2( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5338,7 +5670,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5346,16 +5678,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadSecretIDNumUsesResponse**](AppRoleReadSecretIDNumUsesResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadSecretIDTTL +## AwsListStsRoleRelationships @@ -5380,10 +5712,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadSecretIDTTL( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsListStsRoleRelationships( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5400,7 +5732,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5408,16 +5740,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - -[**AppRoleReadSecretIDTTLResponse**](AppRoleReadSecretIDTTLResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadTokenBoundCIDRs +## AwsLogin @@ -5432,6 +5764,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5442,10 +5775,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadTokenBoundCIDRs( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsLoginRequestWithDefaults() + resp, err := client.Auth.AwsLogin( context.Background(), - roleName, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -5462,7 +5797,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5470,16 +5805,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **awsLoginRequest** | [**AwsLoginRequest**](AwsLoginRequest.md) | | - -[**AppRoleReadTokenBoundCIDRsResponse**](AppRoleReadTokenBoundCIDRsResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadTokenMaxTTL +## AwsReadAuthRole @@ -5504,10 +5839,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadTokenMaxTTL( + role := "role_example" // string | Name of the role. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadAuthRole( context.Background(), - roleName, + role, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5524,7 +5861,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**role** | **string** | Name of the role. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5534,14 +5872,14 @@ Name | Type | Description | Notes -[**AppRoleReadTokenMaxTTLResponse**](AppRoleReadTokenMaxTTLResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadTokenNumUses +## AwsReadCertificateConfiguration @@ -5566,10 +5904,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadTokenNumUses( + certName := "certName_example" // string | Name of the certificate. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadCertificateConfiguration( context.Background(), - roleName, + certName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5586,7 +5926,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**certName** | **string** | Name of the certificate. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5596,14 +5937,14 @@ Name | Type | Description | Notes -[**AppRoleReadTokenNumUsesResponse**](AppRoleReadTokenNumUsesResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleReadTokenTTL +## AwsReadClientConfiguration @@ -5628,10 +5969,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - resp, err := client.Auth.AppRoleReadTokenTTL( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadClientConfiguration( context.Background(), - roleName, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5648,7 +5989,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5657,17 +5998,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - -[**AppRoleReadTokenTTLResponse**](AppRoleReadTokenTTLResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleTidySecretID +## AwsReadIdentityAccessList + -Trigger the clean-up of expired SecretID entries. ### Example @@ -5690,8 +6030,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AppRoleTidySecretID( + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadIdentityAccessList( context.Background(), + instanceId, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5708,6 +6052,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5716,6 +6062,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -5723,7 +6070,7 @@ Name | Type | Description | Notes -## AppRoleWriteBindSecretID +## AwsReadIdentityAccessListTidySettings @@ -5738,7 +6085,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5749,12 +6095,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteBindSecretIDRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteBindSecretID( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadIdentityAccessListTidySettings( context.Background(), - roleName, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5771,7 +6115,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5779,8 +6123,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteBindSecretIDRequest** | [**AppRoleWriteBindSecretIDRequest**](AppRoleWriteBindSecretIDRequest.md) | | - (empty response body) @@ -5789,7 +6131,7 @@ Name | Type | Description | Notes -## AppRoleWriteBoundCIDRList +## AwsReadIdentityIntegrationConfiguration @@ -5804,7 +6146,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5815,12 +6156,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteBoundCIDRListRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteBoundCIDRList( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadIdentityIntegrationConfiguration( context.Background(), - roleName, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5837,7 +6176,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5845,8 +6184,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteBoundCIDRListRequest** | [**AppRoleWriteBoundCIDRListRequest**](AppRoleWriteBoundCIDRListRequest.md) | | - (empty response body) @@ -5855,7 +6192,7 @@ Name | Type | Description | Notes -## AppRoleWriteCustomSecretID +## AwsReadIdentityWhitelist @@ -5870,7 +6207,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5881,12 +6217,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteCustomSecretIDRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteCustomSecretID( + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadIdentityWhitelist( context.Background(), - roleName, - request, + instanceId, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5903,7 +6239,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**instanceId** | **string** | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5911,17 +6248,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteCustomSecretIDRequest** | [**AppRoleWriteCustomSecretIDRequest**](AppRoleWriteCustomSecretIDRequest.md) | | -[**AppRoleWriteCustomSecretIDResponse**](AppRoleWriteCustomSecretIDResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleWritePeriod +## AwsReadIdentityWhitelistTidySettings @@ -5936,7 +6272,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5947,12 +6282,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWritePeriodRequestWithDefaults() - resp, err := client.Auth.AppRoleWritePeriod( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadIdentityWhitelistTidySettings( context.Background(), - roleName, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5969,7 +6302,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -5977,8 +6310,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWritePeriodRequest** | [**AppRoleWritePeriodRequest**](AppRoleWritePeriodRequest.md) | | - (empty response body) @@ -5987,7 +6318,7 @@ Name | Type | Description | Notes -## AppRoleWritePolicies +## AwsReadRoleTagBlacklist @@ -6002,7 +6333,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6013,12 +6343,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWritePoliciesRequestWithDefaults() - resp, err := client.Auth.AppRoleWritePolicies( + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadRoleTagBlacklist( context.Background(), - roleName, - request, + roleTag, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6035,7 +6365,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6043,7 +6374,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWritePoliciesRequest** | [**AppRoleWritePoliciesRequest**](AppRoleWritePoliciesRequest.md) | | (empty response body) @@ -6053,7 +6383,7 @@ Name | Type | Description | Notes -## AppRoleWriteRole +## AwsReadRoleTagBlacklistTidySettings @@ -6068,7 +6398,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6079,12 +6408,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteRoleRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteRole( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadRoleTagBlacklistTidySettings( context.Background(), - roleName, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6101,7 +6428,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6109,8 +6436,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteRoleRequest** | [**AppRoleWriteRoleRequest**](AppRoleWriteRoleRequest.md) | | - (empty response body) @@ -6119,7 +6444,7 @@ Name | Type | Description | Notes -## AppRoleWriteRoleID +## AwsReadRoleTagDenyList @@ -6134,7 +6459,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6145,12 +6469,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteRoleIDRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteRoleID( + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadRoleTagDenyList( context.Background(), - roleName, - request, + roleTag, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6167,7 +6491,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6175,7 +6500,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteRoleIDRequest** | [**AppRoleWriteRoleIDRequest**](AppRoleWriteRoleIDRequest.md) | | (empty response body) @@ -6185,7 +6509,7 @@ Name | Type | Description | Notes -## AppRoleWriteSecretID +## AwsReadRoleTagDenyListTidySettings @@ -6200,7 +6524,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6211,12 +6534,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretID( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadRoleTagDenyListTidySettings( context.Background(), - roleName, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6233,7 +6554,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6241,17 +6562,15 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDRequest** | [**AppRoleWriteSecretIDRequest**](AppRoleWriteSecretIDRequest.md) | | - -[**AppRoleWriteSecretIDResponse**](AppRoleWriteSecretIDResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleWriteSecretIDAccessorDestroy +## AwsReadStsRole @@ -6266,7 +6585,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6277,12 +6595,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretIDAccessorDestroy( + accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsReadStsRole( context.Background(), - roleName, - request, + accountId, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6299,7 +6617,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**accountId** | **string** | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6307,7 +6626,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDAccessorDestroyRequest** | [**AppRoleWriteSecretIDAccessorDestroyRequest**](AppRoleWriteSecretIDAccessorDestroyRequest.md) | | (empty response body) @@ -6317,7 +6635,7 @@ Name | Type | Description | Notes -## AppRoleWriteSecretIDAccessorLookup +## AwsRotateRootCredentials @@ -6332,7 +6650,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6343,12 +6660,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretIDAccessorLookup( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsRotateRootCredentials( context.Background(), - roleName, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6365,7 +6680,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6373,17 +6688,15 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDAccessorLookupRequest** | [**AppRoleWriteSecretIDAccessorLookupRequest**](AppRoleWriteSecretIDAccessorLookupRequest.md) | | - -[**AppRoleWriteSecretIDAccessorLookupResponse**](AppRoleWriteSecretIDAccessorLookupResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleWriteSecretIDBoundCIDRs +## AwsTidyIdentityAccessList @@ -6409,11 +6722,11 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretIDBoundCIDRs( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsTidyIdentityAccessListRequestWithDefaults() + resp, err := client.Auth.AwsTidyIdentityAccessList( context.Background(), - roleName, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -6431,7 +6744,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6439,8 +6752,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDBoundCIDRsRequest** | [**AppRoleWriteSecretIDBoundCIDRsRequest**](AppRoleWriteSecretIDBoundCIDRsRequest.md) | | - + **awsTidyIdentityAccessListRequest** | [**AwsTidyIdentityAccessListRequest**](AwsTidyIdentityAccessListRequest.md) | | (empty response body) @@ -6449,7 +6761,7 @@ Name | Type | Description | Notes -## AppRoleWriteSecretIDDestroy +## AwsTidyIdentityWhitelist @@ -6475,11 +6787,11 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDDestroyRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretIDDestroy( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsTidyIdentityWhitelistRequestWithDefaults() + resp, err := client.Auth.AwsTidyIdentityWhitelist( context.Background(), - roleName, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -6497,7 +6809,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6505,8 +6817,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDDestroyRequest** | [**AppRoleWriteSecretIDDestroyRequest**](AppRoleWriteSecretIDDestroyRequest.md) | | - + **awsTidyIdentityWhitelistRequest** | [**AwsTidyIdentityWhitelistRequest**](AwsTidyIdentityWhitelistRequest.md) | | (empty response body) @@ -6515,7 +6826,7 @@ Name | Type | Description | Notes -## AppRoleWriteSecretIDLookup +## AwsTidyRoleTagBlacklist @@ -6541,11 +6852,11 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDLookupRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretIDLookup( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsTidyRoleTagBlacklistRequestWithDefaults() + resp, err := client.Auth.AwsTidyRoleTagBlacklist( context.Background(), - roleName, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -6563,7 +6874,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6571,17 +6882,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDLookupRequest** | [**AppRoleWriteSecretIDLookupRequest**](AppRoleWriteSecretIDLookupRequest.md) | | - + **awsTidyRoleTagBlacklistRequest** | [**AwsTidyRoleTagBlacklistRequest**](AwsTidyRoleTagBlacklistRequest.md) | | -[**AppRoleWriteSecretIDLookupResponse**](AppRoleWriteSecretIDLookupResponse.md) + (empty response body) [[Back to top]](#) [[Back to README]](../README.md) -## AppRoleWriteSecretIDNumUses +## AwsTidyRoleTagDenyList @@ -6607,11 +6917,11 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDNumUsesRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretIDNumUses( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsTidyRoleTagDenyListRequestWithDefaults() + resp, err := client.Auth.AwsTidyRoleTagDenyList( context.Background(), - roleName, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -6629,7 +6939,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6637,8 +6947,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDNumUsesRequest** | [**AppRoleWriteSecretIDNumUsesRequest**](AppRoleWriteSecretIDNumUsesRequest.md) | | - + **awsTidyRoleTagDenyListRequest** | [**AwsTidyRoleTagDenyListRequest**](AwsTidyRoleTagDenyListRequest.md) | | (empty response body) @@ -6647,7 +6956,7 @@ Name | Type | Description | Notes -## AppRoleWriteSecretIDTTL +## AwsWriteAuthRole @@ -6673,11 +6982,13 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteSecretIDTTLRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteSecretIDTTL( + role := "role_example" // string | Name of the role. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsWriteAuthRoleRequestWithDefaults() + resp, err := client.Auth.AwsWriteAuthRole( context.Background(), - roleName, + role, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -6695,7 +7006,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**role** | **string** | Name of the role. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6703,8 +7015,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteSecretIDTTLRequest** | [**AppRoleWriteSecretIDTTLRequest**](AppRoleWriteSecretIDTTLRequest.md) | | + **awsWriteAuthRoleRequest** | [**AwsWriteAuthRoleRequest**](AwsWriteAuthRoleRequest.md) | | (empty response body) @@ -6713,7 +7025,7 @@ Name | Type | Description | Notes -## AppRoleWriteTokenBoundCIDRs +## AwsWriteRoleTag @@ -6739,11 +7051,13 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteTokenBoundCIDRs( + role := "role_example" // string | Name of the role. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsWriteRoleTagRequestWithDefaults() + resp, err := client.Auth.AwsWriteRoleTag( context.Background(), - roleName, + role, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -6761,7 +7075,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**role** | **string** | Name of the role. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6769,8 +7084,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteTokenBoundCIDRsRequest** | [**AppRoleWriteTokenBoundCIDRsRequest**](AppRoleWriteTokenBoundCIDRsRequest.md) | | + **awsWriteRoleTagRequest** | [**AwsWriteRoleTagRequest**](AwsWriteRoleTagRequest.md) | | (empty response body) @@ -6779,7 +7094,7 @@ Name | Type | Description | Notes -## AppRoleWriteTokenMaxTTL +## AwsWriteRoleTagBlacklist @@ -6794,7 +7109,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6805,12 +7119,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteTokenMaxTTLRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteTokenMaxTTL( + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsWriteRoleTagBlacklist( context.Background(), - roleName, - request, + roleTag, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6827,7 +7141,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6835,7 +7150,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteTokenMaxTTLRequest** | [**AppRoleWriteTokenMaxTTLRequest**](AppRoleWriteTokenMaxTTLRequest.md) | | (empty response body) @@ -6845,7 +7159,7 @@ Name | Type | Description | Notes -## AppRoleWriteTokenNumUses +## AwsWriteRoleTagDenyList @@ -6860,7 +7174,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6871,12 +7184,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteTokenNumUsesRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteTokenNumUses( + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Auth.AwsWriteRoleTagDenyList( context.Background(), - roleName, - request, + roleTag, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6893,7 +7206,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**roleTag** | **string** | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6901,7 +7215,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteTokenNumUsesRequest** | [**AppRoleWriteTokenNumUsesRequest**](AppRoleWriteTokenNumUsesRequest.md) | | (empty response body) @@ -6911,7 +7224,7 @@ Name | Type | Description | Notes -## AppRoleWriteTokenTTL +## AwsWriteStsRole @@ -6937,11 +7250,13 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. - request := schema.NewAppRoleWriteTokenTTLRequestWithDefaults() - resp, err := client.Auth.AppRoleWriteTokenTTL( + accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsWriteStsRoleRequestWithDefaults() + resp, err := client.Auth.AwsWriteStsRole( context.Background(), - roleName, + accountId, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -6959,7 +7274,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role. Must be less than 4096 bytes. | +**accountId** | **string** | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -6967,8 +7283,73 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **appRoleWriteTokenTTLRequest** | [**AppRoleWriteTokenTTLRequest**](AppRoleWriteTokenTTLRequest.md) | | + **awsWriteStsRoleRequest** | [**AwsWriteStsRoleRequest**](AwsWriteStsRoleRequest.md) | | + + (empty response body) + +[[Back to top]](#) +[[Back to README]](../README.md) + + + +## AzureConfigureAuth + + + +### Example + +```go +package main + +import ( + "context" + "log" + "os" + + "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" +) + +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + request := schema.NewAzureConfigureAuthRequestWithDefaults() + resp, err := client.Auth.AzureConfigureAuth( + context.Background(), + azureMountPath, + request, + vault.WithToken("my-token"), + ) + if err != nil { + log.Fatal(err) + } + + log.Println(resp.Data) +} +``` + +### Path Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] + +### Other Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **azureConfigureAuthRequest** | [**AzureConfigureAuthRequest**](AzureConfigureAuthRequest.md) | | (empty response body) @@ -6977,7 +7358,7 @@ Name | Type | Description | Notes -## AzureDeleteAuthConfig +## AzureDeleteAuthConfiguration @@ -7002,8 +7383,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AzureDeleteAuthConfig( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Auth.AzureDeleteAuthConfiguration( context.Background(), + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7020,6 +7403,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -7061,9 +7445,11 @@ func main() { } name := "name_example" // string | Name of the role. + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") resp, err := client.Auth.AzureDeleteAuthRole( context.Background(), name, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7081,6 +7467,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -7122,8 +7509,10 @@ func main() { log.Fatal(err) } + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") resp, err := client.Auth.AzureListAuthRoles( context.Background(), + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7140,14 +7529,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -7182,9 +7572,11 @@ func main() { log.Fatal(err) } + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") request := schema.NewAzureLoginRequestWithDefaults() resp, err := client.Auth.AzureLogin( context.Background(), + azureMountPath, request, vault.WithToken("my-token"), ) @@ -7202,14 +7594,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **azureLoginRequest** | [**AzureLoginRequest**](AzureLoginRequest.md) | | + **azureLoginRequest** | [**AzureLoginRequest**](AzureLoginRequest.md) | | (empty response body) @@ -7218,7 +7611,7 @@ Name | Type | Description | Notes -## AzureReadAuthConfig +## AzureReadAuthConfiguration @@ -7243,8 +7636,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.AzureReadAuthConfig( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Auth.AzureReadAuthConfiguration( context.Background(), + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7261,6 +7656,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -7302,9 +7698,11 @@ func main() { } name := "name_example" // string | Name of the role. + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") resp, err := client.Auth.AzureReadAuthRole( context.Background(), name, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7322,6 +7720,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -7338,7 +7737,7 @@ Name | Type | Description | Notes -## AzureWriteAuthConfig +## AzureRotateRootCredentials @@ -7353,7 +7752,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7364,10 +7762,10 @@ func main() { log.Fatal(err) } - request := schema.NewAzureWriteAuthConfigRequestWithDefaults() - resp, err := client.Auth.AzureWriteAuthConfig( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Auth.AzureRotateRootCredentials( context.Background(), - request, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7384,13 +7782,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **azureWriteAuthConfigRequest** | [**AzureWriteAuthConfigRequest**](AzureWriteAuthConfigRequest.md) | | (empty response body) @@ -7427,10 +7825,12 @@ func main() { } name := "name_example" // string | Name of the role. + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") request := schema.NewAzureWriteAuthRoleRequestWithDefaults() resp, err := client.Auth.AzureWriteAuthRole( context.Background(), name, + azureMountPath, request, vault.WithToken("my-token"), ) @@ -7449,6 +7849,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -7456,8 +7857,73 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **azureWriteAuthRoleRequest** | [**AzureWriteAuthRoleRequest**](AzureWriteAuthRoleRequest.md) | | + (empty response body) + +[[Back to top]](#) +[[Back to README]](../README.md) + + + +## CentrifyConfigure + + + +### Example + +```go +package main + +import ( + "context" + "log" + "os" + + "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" +) + +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + centrifyMountPath := "centrifyMountPath_example" // string | Path that the backend was mounted at (defaults to "centrify") + request := schema.NewCentrifyConfigureRequestWithDefaults() + resp, err := client.Auth.CentrifyConfigure( + context.Background(), + centrifyMountPath, + request, + vault.WithToken("my-token"), + ) + if err != nil { + log.Fatal(err) + } + + log.Println(resp.Data) +} +``` + +### Path Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**centrifyMountPath** | **string** | Path that the backend was mounted at | [default to "centrify"] + +### Other Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **centrifyConfigureRequest** | [**CentrifyConfigureRequest**](CentrifyConfigureRequest.md) | | (empty response body) @@ -7492,9 +7958,11 @@ func main() { log.Fatal(err) } + centrifyMountPath := "centrifyMountPath_example" // string | Path that the backend was mounted at (defaults to "centrify") request := schema.NewCentrifyLoginRequestWithDefaults() resp, err := client.Auth.CentrifyLogin( context.Background(), + centrifyMountPath, request, vault.WithToken("my-token"), ) @@ -7512,14 +7980,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**centrifyMountPath** | **string** | Path that the backend was mounted at | [default to "centrify"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **centrifyLoginRequest** | [**CentrifyLoginRequest**](CentrifyLoginRequest.md) | | + **centrifyLoginRequest** | [**CentrifyLoginRequest**](CentrifyLoginRequest.md) | | (empty response body) @@ -7528,9 +7997,9 @@ Name | Type | Description | Notes -## CentrifyReadConfig +## CentrifyReadConfiguration + -This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users. ### Example @@ -7553,8 +8022,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.CentrifyReadConfig( + centrifyMountPath := "centrifyMountPath_example" // string | Path that the backend was mounted at (defaults to "centrify") + resp, err := client.Auth.CentrifyReadConfiguration( context.Background(), + centrifyMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7571,6 +8042,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**centrifyMountPath** | **string** | Path that the backend was mounted at | [default to "centrify"] ### Other Parameters @@ -7586,9 +8058,9 @@ Name | Type | Description | Notes -## CentrifyWriteConfig +## CertConfigure + -This path allows you to configure the centrify auth provider to interact with the Centrify Identity Services Platform for authenticating users. ### Example @@ -7612,9 +8084,11 @@ func main() { log.Fatal(err) } - request := schema.NewCentrifyWriteConfigRequestWithDefaults() - resp, err := client.Auth.CentrifyWriteConfig( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + request := schema.NewCertConfigureRequestWithDefaults() + resp, err := client.Auth.CertConfigure( context.Background(), + certMountPath, request, vault.WithToken("my-token"), ) @@ -7632,14 +8106,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **centrifyWriteConfigRequest** | [**CentrifyWriteConfigRequest**](CentrifyWriteConfigRequest.md) | | + **certConfigureRequest** | [**CertConfigureRequest**](CertConfigureRequest.md) | | (empty response body) @@ -7648,7 +8123,7 @@ Name | Type | Description | Notes -## CertificatesDelete +## CertDeleteCertificate Manage trusted certificates used for authentication. @@ -7674,9 +8149,11 @@ func main() { } name := "name_example" // string | The name of the certificate - resp, err := client.Auth.CertificatesDelete( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + resp, err := client.Auth.CertDeleteCertificate( context.Background(), name, + certMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7694,6 +8171,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | The name of the certificate | +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters @@ -7710,7 +8188,7 @@ Name | Type | Description | Notes -## CertificatesDeleteCRL +## CertDeleteCrl Manage Certificate Revocation Lists checked during authentication. @@ -7736,9 +8214,11 @@ func main() { } name := "name_example" // string | The name of the certificate - resp, err := client.Auth.CertificatesDeleteCRL( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + resp, err := client.Auth.CertDeleteCrl( context.Background(), name, + certMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7756,6 +8236,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | The name of the certificate | +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters @@ -7772,7 +8253,7 @@ Name | Type | Description | Notes -## CertificatesList +## CertListCertificates Manage trusted certificates used for authentication. @@ -7797,8 +8278,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.CertificatesList( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + resp, err := client.Auth.CertListCertificates( context.Background(), + certMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7815,14 +8298,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -7831,7 +8315,7 @@ Name | Type | Description | Notes -## CertificatesListCRLs +## CertListCrls @@ -7856,8 +8340,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.CertificatesListCRLs( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + resp, err := client.Auth.CertListCrls( context.Background(), + certMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7874,14 +8360,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -7890,7 +8377,7 @@ Name | Type | Description | Notes -## CertificatesLogin +## CertLogin @@ -7916,9 +8403,11 @@ func main() { log.Fatal(err) } - request := schema.NewCertificatesLoginRequestWithDefaults() - resp, err := client.Auth.CertificatesLogin( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + request := schema.NewCertLoginRequestWithDefaults() + resp, err := client.Auth.CertLogin( context.Background(), + certMountPath, request, vault.WithToken("my-token"), ) @@ -7936,14 +8425,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **certificatesLoginRequest** | [**CertificatesLoginRequest**](CertificatesLoginRequest.md) | | + **certLoginRequest** | [**CertLoginRequest**](CertLoginRequest.md) | | (empty response body) @@ -7952,7 +8442,7 @@ Name | Type | Description | Notes -## CertificatesRead +## CertReadCertificate Manage trusted certificates used for authentication. @@ -7978,9 +8468,11 @@ func main() { } name := "name_example" // string | The name of the certificate - resp, err := client.Auth.CertificatesRead( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + resp, err := client.Auth.CertReadCertificate( context.Background(), name, + certMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7998,6 +8490,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | The name of the certificate | +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters @@ -8014,9 +8507,9 @@ Name | Type | Description | Notes -## CertificatesReadCRL +## CertReadConfiguration + -Manage Certificate Revocation Lists checked during authentication. ### Example @@ -8039,10 +8532,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the certificate - resp, err := client.Auth.CertificatesReadCRL( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + resp, err := client.Auth.CertReadConfiguration( context.Background(), - name, + certMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8059,7 +8552,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the certificate | +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters @@ -8068,7 +8561,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -8076,9 +8568,9 @@ Name | Type | Description | Notes -## CertificatesReadConfig - +## CertReadCrl +Manage Certificate Revocation Lists checked during authentication. ### Example @@ -8101,8 +8593,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.CertificatesReadConfig( + name := "name_example" // string | The name of the certificate + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + resp, err := client.Auth.CertReadCrl( context.Background(), + name, + certMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8119,6 +8615,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the certificate | +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters @@ -8127,6 +8625,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -8134,7 +8633,7 @@ Name | Type | Description | Notes -## CertificatesWrite +## CertWriteCertificate Manage trusted certificates used for authentication. @@ -8161,10 +8660,12 @@ func main() { } name := "name_example" // string | The name of the certificate - request := schema.NewCertificatesWriteRequestWithDefaults() - resp, err := client.Auth.CertificatesWrite( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + request := schema.NewCertWriteCertificateRequestWithDefaults() + resp, err := client.Auth.CertWriteCertificate( context.Background(), name, + certMountPath, request, vault.WithToken("my-token"), ) @@ -8183,6 +8684,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | The name of the certificate | +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters @@ -8190,8 +8692,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **certificatesWriteRequest** | [**CertificatesWriteRequest**](CertificatesWriteRequest.md) | | + **certWriteCertificateRequest** | [**CertWriteCertificateRequest**](CertWriteCertificateRequest.md) | | (empty response body) @@ -8200,7 +8702,7 @@ Name | Type | Description | Notes -## CertificatesWriteCRL +## CertWriteCrl Manage Certificate Revocation Lists checked during authentication. @@ -8227,10 +8729,12 @@ func main() { } name := "name_example" // string | The name of the certificate - request := schema.NewCertificatesWriteCRLRequestWithDefaults() - resp, err := client.Auth.CertificatesWriteCRL( + certMountPath := "certMountPath_example" // string | Path that the backend was mounted at (defaults to "cert") + request := schema.NewCertWriteCrlRequestWithDefaults() + resp, err := client.Auth.CertWriteCrl( context.Background(), name, + certMountPath, request, vault.WithToken("my-token"), ) @@ -8249,6 +8753,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | The name of the certificate | +**certMountPath** | **string** | Path that the backend was mounted at | [default to "cert"] ### Other Parameters @@ -8256,8 +8761,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **certificatesWriteCRLRequest** | [**CertificatesWriteCRLRequest**](CertificatesWriteCRLRequest.md) | | + **certWriteCrlRequest** | [**CertWriteCrlRequest**](CertWriteCrlRequest.md) | | (empty response body) @@ -8266,7 +8771,7 @@ Name | Type | Description | Notes -## CertificatesWriteConfig +## CloudFoundryConfigure @@ -8292,9 +8797,11 @@ func main() { log.Fatal(err) } - request := schema.NewCertificatesWriteConfigRequestWithDefaults() - resp, err := client.Auth.CertificatesWriteConfig( + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") + request := schema.NewCloudFoundryConfigureRequestWithDefaults() + resp, err := client.Auth.CloudFoundryConfigure( context.Background(), + cfMountPath, request, vault.WithToken("my-token"), ) @@ -8312,14 +8819,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **certificatesWriteConfigRequest** | [**CertificatesWriteConfigRequest**](CertificatesWriteConfigRequest.md) | | + **cloudFoundryConfigureRequest** | [**CloudFoundryConfigureRequest**](CloudFoundryConfigureRequest.md) | | (empty response body) @@ -8328,7 +8836,7 @@ Name | Type | Description | Notes -## CloudFoundryDeleteConfig +## CloudFoundryDeleteConfiguration @@ -8353,8 +8861,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.CloudFoundryDeleteConfig( + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") + resp, err := client.Auth.CloudFoundryDeleteConfiguration( context.Background(), + cfMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8371,6 +8881,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters @@ -8412,9 +8923,11 @@ func main() { } role := "role_example" // string | The name of the role. + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") resp, err := client.Auth.CloudFoundryDeleteRole( context.Background(), role, + cfMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8432,6 +8945,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **role** | **string** | The name of the role. | +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters @@ -8473,8 +8987,10 @@ func main() { log.Fatal(err) } + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") resp, err := client.Auth.CloudFoundryListRoles( context.Background(), + cfMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8491,14 +9007,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -8533,9 +9050,11 @@ func main() { log.Fatal(err) } + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") request := schema.NewCloudFoundryLoginRequestWithDefaults() resp, err := client.Auth.CloudFoundryLogin( context.Background(), + cfMountPath, request, vault.WithToken("my-token"), ) @@ -8553,14 +9072,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **cloudFoundryLoginRequest** | [**CloudFoundryLoginRequest**](CloudFoundryLoginRequest.md) | | + **cloudFoundryLoginRequest** | [**CloudFoundryLoginRequest**](CloudFoundryLoginRequest.md) | | (empty response body) @@ -8569,7 +9089,7 @@ Name | Type | Description | Notes -## CloudFoundryReadConfig +## CloudFoundryReadConfiguration @@ -8594,8 +9114,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.CloudFoundryReadConfig( + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") + resp, err := client.Auth.CloudFoundryReadConfiguration( context.Background(), + cfMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8612,6 +9134,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters @@ -8653,9 +9176,11 @@ func main() { } role := "role_example" // string | The name of the role. + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") resp, err := client.Auth.CloudFoundryReadRole( context.Background(), role, + cfMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8673,6 +9198,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **role** | **string** | The name of the role. | +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters @@ -8689,7 +9215,7 @@ Name | Type | Description | Notes -## CloudFoundryWriteConfig +## CloudFoundryWriteRole @@ -8715,9 +9241,13 @@ func main() { log.Fatal(err) } - request := schema.NewCloudFoundryWriteConfigRequestWithDefaults() - resp, err := client.Auth.CloudFoundryWriteConfig( + role := "role_example" // string | The name of the role. + cfMountPath := "cfMountPath_example" // string | Path that the backend was mounted at (defaults to "cf") + request := schema.NewCloudFoundryWriteRoleRequestWithDefaults() + resp, err := client.Auth.CloudFoundryWriteRole( context.Background(), + role, + cfMountPath, request, vault.WithToken("my-token"), ) @@ -8735,15 +9265,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | The name of the role. | +**cfMountPath** | **string** | Path that the backend was mounted at | [default to "cf"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **cloudFoundryWriteConfigRequest** | [**CloudFoundryWriteConfigRequest**](CloudFoundryWriteConfigRequest.md) | | + **cloudFoundryWriteRoleRequest** | [**CloudFoundryWriteRoleRequest**](CloudFoundryWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -8751,7 +9284,7 @@ Name | Type | Description | Notes -## CloudFoundryWriteRole +## GithubConfigure @@ -8777,11 +9310,11 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The name of the role. - request := schema.NewCloudFoundryWriteRoleRequestWithDefaults() - resp, err := client.Auth.CloudFoundryWriteRole( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + request := schema.NewGithubConfigureRequestWithDefaults() + resp, err := client.Auth.GithubConfigure( context.Background(), - role, + githubMountPath, request, vault.WithToken("my-token"), ) @@ -8799,7 +9332,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The name of the role. | +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -8807,8 +9340,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **cloudFoundryWriteRoleRequest** | [**CloudFoundryWriteRoleRequest**](CloudFoundryWriteRoleRequest.md) | | - + **githubConfigureRequest** | [**GithubConfigureRequest**](GithubConfigureRequest.md) | | (empty response body) @@ -8817,7 +9349,7 @@ Name | Type | Description | Notes -## GitHubDeleteMapTeam +## GithubDeleteTeamMapping Read/write/delete a single teams mapping @@ -8843,9 +9375,11 @@ func main() { } key := "key_example" // string | Key for the teams mapping - resp, err := client.Auth.GitHubDeleteMapTeam( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + resp, err := client.Auth.GithubDeleteTeamMapping( context.Background(), key, + githubMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8863,6 +9397,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Key for the teams mapping | +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -8879,7 +9414,7 @@ Name | Type | Description | Notes -## GitHubDeleteMapUser +## GithubDeleteUserMapping Read/write/delete a single users mapping @@ -8905,9 +9440,11 @@ func main() { } key := "key_example" // string | Key for the users mapping - resp, err := client.Auth.GitHubDeleteMapUser( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + resp, err := client.Auth.GithubDeleteUserMapping( context.Background(), key, + githubMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8925,6 +9462,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Key for the users mapping | +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -8941,7 +9479,7 @@ Name | Type | Description | Notes -## GitHubLogin +## GithubLogin @@ -8967,9 +9505,11 @@ func main() { log.Fatal(err) } - request := schema.NewGitHubLoginRequestWithDefaults() - resp, err := client.Auth.GitHubLogin( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + request := schema.NewGithubLoginRequestWithDefaults() + resp, err := client.Auth.GithubLogin( context.Background(), + githubMountPath, request, vault.WithToken("my-token"), ) @@ -8987,14 +9527,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **gitHubLoginRequest** | [**GitHubLoginRequest**](GitHubLoginRequest.md) | | + **githubLoginRequest** | [**GithubLoginRequest**](GithubLoginRequest.md) | | (empty response body) @@ -9003,7 +9544,7 @@ Name | Type | Description | Notes -## GitHubReadConfig +## GithubReadConfiguration @@ -9028,8 +9569,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.GitHubReadConfig( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + resp, err := client.Auth.GithubReadConfiguration( context.Background(), + githubMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9046,6 +9589,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -9061,7 +9605,7 @@ Name | Type | Description | Notes -## GitHubReadMapTeam +## GithubReadTeamMapping Read/write/delete a single teams mapping @@ -9087,9 +9631,11 @@ func main() { } key := "key_example" // string | Key for the teams mapping - resp, err := client.Auth.GitHubReadMapTeam( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + resp, err := client.Auth.GithubReadTeamMapping( context.Background(), key, + githubMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9107,6 +9653,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Key for the teams mapping | +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -9123,7 +9670,7 @@ Name | Type | Description | Notes -## GitHubReadMapTeams +## GithubReadTeams Read mappings for teams @@ -9148,8 +9695,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.GitHubReadMapTeams( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + resp, err := client.Auth.GithubReadTeams( context.Background(), + githubMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9166,6 +9715,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -9182,7 +9732,7 @@ Name | Type | Description | Notes -## GitHubReadMapUser +## GithubReadUserMapping Read/write/delete a single users mapping @@ -9208,9 +9758,11 @@ func main() { } key := "key_example" // string | Key for the users mapping - resp, err := client.Auth.GitHubReadMapUser( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + resp, err := client.Auth.GithubReadUserMapping( context.Background(), key, + githubMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9228,6 +9780,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Key for the users mapping | +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -9244,7 +9797,7 @@ Name | Type | Description | Notes -## GitHubReadMapUsers +## GithubReadUsers Read mappings for users @@ -9269,8 +9822,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.GitHubReadMapUsers( + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + resp, err := client.Auth.GithubReadUsers( context.Background(), + githubMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9287,6 +9842,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -9303,9 +9859,9 @@ Name | Type | Description | Notes -## GitHubWriteConfig - +## GithubWriteTeamMapping +Read/write/delete a single teams mapping ### Example @@ -9329,9 +9885,13 @@ func main() { log.Fatal(err) } - request := schema.NewGitHubWriteConfigRequestWithDefaults() - resp, err := client.Auth.GitHubWriteConfig( + key := "key_example" // string | Key for the teams mapping + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + request := schema.NewGithubWriteTeamMappingRequestWithDefaults() + resp, err := client.Auth.GithubWriteTeamMapping( context.Background(), + key, + githubMountPath, request, vault.WithToken("my-token"), ) @@ -9349,15 +9909,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**key** | **string** | Key for the teams mapping | +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **gitHubWriteConfigRequest** | [**GitHubWriteConfigRequest**](GitHubWriteConfigRequest.md) | | + **githubWriteTeamMappingRequest** | [**GithubWriteTeamMappingRequest**](GithubWriteTeamMappingRequest.md) | | + (empty response body) [[Back to top]](#) @@ -9365,9 +9928,9 @@ Name | Type | Description | Notes -## GitHubWriteMapTeam +## GithubWriteUserMapping -Read/write/delete a single teams mapping +Read/write/delete a single users mapping ### Example @@ -9391,11 +9954,13 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Key for the teams mapping - request := schema.NewGitHubWriteMapTeamRequestWithDefaults() - resp, err := client.Auth.GitHubWriteMapTeam( + key := "key_example" // string | Key for the users mapping + githubMountPath := "githubMountPath_example" // string | Path that the backend was mounted at (defaults to "github") + request := schema.NewGithubWriteUserMappingRequestWithDefaults() + resp, err := client.Auth.GithubWriteUserMapping( context.Background(), key, + githubMountPath, request, vault.WithToken("my-token"), ) @@ -9413,7 +9978,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Key for the teams mapping | +**key** | **string** | Key for the users mapping | +**githubMountPath** | **string** | Path that the backend was mounted at | [default to "github"] ### Other Parameters @@ -9421,8 +9987,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **gitHubWriteMapTeamRequest** | [**GitHubWriteMapTeamRequest**](GitHubWriteMapTeamRequest.md) | | + **githubWriteUserMappingRequest** | [**GithubWriteUserMappingRequest**](GithubWriteUserMappingRequest.md) | | (empty response body) @@ -9431,9 +9997,9 @@ Name | Type | Description | Notes -## GitHubWriteMapUser +## GoogleCloudConfigureAuth + -Read/write/delete a single users mapping ### Example @@ -9457,11 +10023,11 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Key for the users mapping - request := schema.NewGitHubWriteMapUserRequestWithDefaults() - resp, err := client.Auth.GitHubWriteMapUser( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudConfigureAuthRequestWithDefaults() + resp, err := client.Auth.GoogleCloudConfigureAuth( context.Background(), - key, + gcpMountPath, request, vault.WithToken("my-token"), ) @@ -9479,7 +10045,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Key for the users mapping | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -9487,8 +10053,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **gitHubWriteMapUserRequest** | [**GitHubWriteMapUserRequest**](GitHubWriteMapUserRequest.md) | | - + **googleCloudConfigureAuthRequest** | [**GoogleCloudConfigureAuthRequest**](GoogleCloudConfigureAuthRequest.md) | | (empty response body) @@ -9523,9 +10088,11 @@ func main() { } name := "name_example" // string | Name of the role. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") resp, err := client.Auth.GoogleCloudDeleteRole( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9543,6 +10110,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -9559,9 +10127,9 @@ Name | Type | Description | Notes -## GoogleCloudListRoles +## GoogleCloudEditLabelsForRole -Lists all the roles that are registered with Vault. +Add or remove labels for an existing 'gce' role ### Example @@ -9574,6 +10142,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9584,8 +10153,14 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.GoogleCloudListRoles( + name := "name_example" // string | Name of the role. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudEditLabelsForRoleRequestWithDefaults() + resp, err := client.Auth.GoogleCloudEditLabelsForRole( context.Background(), + name, + gcpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -9602,15 +10177,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **googleCloudEditLabelsForRoleRequest** | [**GoogleCloudEditLabelsForRoleRequest**](GoogleCloudEditLabelsForRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -9618,9 +10196,9 @@ Name | Type | Description | Notes -## GoogleCloudListRoles2 +## GoogleCloudEditServiceAccountsForRole -Lists all the roles that are registered with Vault. +Add or remove service accounts for an existing `iam` role ### Example @@ -9633,6 +10211,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9643,8 +10222,14 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.GoogleCloudListRoles2( + name := "name_example" // string | Name of the role. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudEditServiceAccountsForRoleRequestWithDefaults() + resp, err := client.Auth.GoogleCloudEditServiceAccountsForRole( context.Background(), + name, + gcpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -9661,15 +10246,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **googleCloudEditServiceAccountsForRoleRequest** | [**GoogleCloudEditServiceAccountsForRoleRequest**](GoogleCloudEditServiceAccountsForRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -9677,9 +10265,9 @@ Name | Type | Description | Notes -## GoogleCloudLogin - +## GoogleCloudListRoles +Lists all the roles that are registered with Vault. ### Example @@ -9692,7 +10280,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9703,10 +10290,10 @@ func main() { log.Fatal(err) } - request := schema.NewGoogleCloudLoginRequestWithDefaults() - resp, err := client.Auth.GoogleCloudLogin( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Auth.GoogleCloudListRoles( context.Background(), - request, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9723,14 +10310,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudLoginRequest** | [**GoogleCloudLoginRequest**](GoogleCloudLoginRequest.md) | | + **list** | **string** | Must be set to `true` | (empty response body) @@ -9739,9 +10327,9 @@ Name | Type | Description | Notes -## GoogleCloudReadAuthConfig +## GoogleCloudListRoles2 -Configure credentials used to query the GCP IAM API to verify authenticating service accounts +Lists all the roles that are registered with Vault. ### Example @@ -9764,8 +10352,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.GoogleCloudReadAuthConfig( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Auth.GoogleCloudListRoles2( context.Background(), + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9782,6 +10372,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -9789,6 +10380,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -9797,9 +10389,9 @@ Name | Type | Description | Notes -## GoogleCloudReadRole +## GoogleCloudLogin + -Create a GCP role with associated policies and required attributes. ### Example @@ -9812,6 +10404,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9822,10 +10415,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Auth.GoogleCloudReadRole( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudLoginRequestWithDefaults() + resp, err := client.Auth.GoogleCloudLogin( context.Background(), - name, + gcpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -9842,7 +10437,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -9850,7 +10445,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **googleCloudLoginRequest** | [**GoogleCloudLoginRequest**](GoogleCloudLoginRequest.md) | | (empty response body) @@ -9859,9 +10454,9 @@ Name | Type | Description | Notes -## GoogleCloudWriteAuthConfig +## GoogleCloudReadAuthConfiguration + -Configure credentials used to query the GCP IAM API to verify authenticating service accounts ### Example @@ -9874,7 +10469,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9885,10 +10479,10 @@ func main() { log.Fatal(err) } - request := schema.NewGoogleCloudWriteAuthConfigRequestWithDefaults() - resp, err := client.Auth.GoogleCloudWriteAuthConfig( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Auth.GoogleCloudReadAuthConfiguration( context.Background(), - request, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9905,13 +10499,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteAuthConfigRequest** | [**GoogleCloudWriteAuthConfigRequest**](GoogleCloudWriteAuthConfigRequest.md) | | (empty response body) @@ -9921,7 +10515,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteRole +## GoogleCloudReadRole Create a GCP role with associated policies and required attributes. @@ -9936,7 +10530,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9948,11 +10541,11 @@ func main() { } name := "name_example" // string | Name of the role. - request := schema.NewGoogleCloudWriteRoleRequestWithDefaults() - resp, err := client.Auth.GoogleCloudWriteRole( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Auth.GoogleCloudReadRole( context.Background(), name, - request, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9970,6 +10563,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -9977,7 +10571,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteRoleRequest** | [**GoogleCloudWriteRoleRequest**](GoogleCloudWriteRoleRequest.md) | | (empty response body) @@ -9987,9 +10580,9 @@ Name | Type | Description | Notes -## GoogleCloudWriteRoleLabels +## GoogleCloudWriteRole -Add or remove labels for an existing 'gce' role +Create a GCP role with associated policies and required attributes. ### Example @@ -10014,10 +10607,12 @@ func main() { } name := "name_example" // string | Name of the role. - request := schema.NewGoogleCloudWriteRoleLabelsRequestWithDefaults() - resp, err := client.Auth.GoogleCloudWriteRoleLabels( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudWriteRoleRequestWithDefaults() + resp, err := client.Auth.GoogleCloudWriteRole( context.Background(), name, + gcpMountPath, request, vault.WithToken("my-token"), ) @@ -10036,6 +10631,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -10043,8 +10639,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteRoleLabelsRequest** | [**GoogleCloudWriteRoleLabelsRequest**](GoogleCloudWriteRoleLabelsRequest.md) | | + **googleCloudWriteRoleRequest** | [**GoogleCloudWriteRoleRequest**](GoogleCloudWriteRoleRequest.md) | | (empty response body) @@ -10053,9 +10649,11 @@ Name | Type | Description | Notes -## GoogleCloudWriteRoleServiceAccounts +## JwtConfigure + +Configure the JWT authentication backend. + -Add or remove service accounts for an existing `iam` role ### Example @@ -10079,11 +10677,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults() - resp, err := client.Auth.GoogleCloudWriteRoleServiceAccounts( + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + request := schema.NewJwtConfigureRequestWithDefaults() + resp, err := client.Auth.JwtConfigure( context.Background(), - name, + jwtMountPath, request, vault.WithToken("my-token"), ) @@ -10101,7 +10699,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters @@ -10109,8 +10707,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteRoleServiceAccountsRequest** | [**GoogleCloudWriteRoleServiceAccountsRequest**](GoogleCloudWriteRoleServiceAccountsRequest.md) | | - + **jwtConfigureRequest** | [**JwtConfigureRequest**](JwtConfigureRequest.md) | | (empty response body) @@ -10119,7 +10716,7 @@ Name | Type | Description | Notes -## JWTDeleteRole +## JwtDeleteRole Delete an existing role. @@ -10145,9 +10742,11 @@ func main() { } name := "name_example" // string | Name of the role. - resp, err := client.Auth.JWTDeleteRole( + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + resp, err := client.Auth.JwtDeleteRole( context.Background(), name, + jwtMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10165,6 +10764,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters @@ -10181,7 +10781,7 @@ Name | Type | Description | Notes -## JWTListRoles +## JwtListRoles Lists all the roles registered with the backend. @@ -10208,8 +10808,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.JWTListRoles( + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + resp, err := client.Auth.JwtListRoles( context.Background(), + jwtMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10226,14 +10828,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -10242,7 +10845,7 @@ Name | Type | Description | Notes -## JWTLogin +## JwtLogin Authenticates to Vault using a JWT (or OIDC) token. @@ -10268,9 +10871,11 @@ func main() { log.Fatal(err) } - request := schema.NewJWTLoginRequestWithDefaults() - resp, err := client.Auth.JWTLogin( + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + request := schema.NewJwtLoginRequestWithDefaults() + resp, err := client.Auth.JwtLogin( context.Background(), + jwtMountPath, request, vault.WithToken("my-token"), ) @@ -10288,14 +10893,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **jWTLoginRequest** | [**JWTLoginRequest**](JWTLoginRequest.md) | | + **jwtLoginRequest** | [**JwtLoginRequest**](JwtLoginRequest.md) | | (empty response body) @@ -10304,9 +10910,9 @@ Name | Type | Description | Notes -## JWTReadConfig +## JwtOidcCallback -Read the current JWT authentication backend configuration. +Callback endpoint to complete an OIDC login. ### Example @@ -10329,8 +10935,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.JWTReadConfig( + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + resp, err := client.Auth.JwtOidcCallback( context.Background(), + jwtMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10347,6 +10955,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters @@ -10362,9 +10971,9 @@ Name | Type | Description | Notes -## JWTReadOIDCCallback +## JwtOidcCallbackWithParameters -Callback endpoint to complete an OIDC login. +Callback endpoint to handle form_posts. ### Example @@ -10377,6 +10986,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10387,8 +10997,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.JWTReadOIDCCallback( + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + request := schema.NewJwtOidcCallbackWithParametersRequestWithDefaults() + resp, err := client.Auth.JwtOidcCallbackWithParameters( context.Background(), + jwtMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10405,6 +11019,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters @@ -10412,6 +11027,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **jwtOidcCallbackWithParametersRequest** | [**JwtOidcCallbackWithParametersRequest**](JwtOidcCallbackWithParametersRequest.md) | | (empty response body) @@ -10420,9 +11036,9 @@ Name | Type | Description | Notes -## JWTReadRole +## JwtOidcRequestAuthorizationUrl -Read an existing role. +Request an authorization URL to start an OIDC login flow. ### Example @@ -10435,6 +11051,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10445,10 +11062,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Auth.JWTReadRole( + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + request := schema.NewJwtOidcRequestAuthorizationUrlRequestWithDefaults() + resp, err := client.Auth.JwtOidcRequestAuthorizationUrl( context.Background(), - name, + jwtMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10465,7 +11084,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters @@ -10473,7 +11092,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **jwtOidcRequestAuthorizationUrlRequest** | [**JwtOidcRequestAuthorizationUrlRequest**](JwtOidcRequestAuthorizationUrlRequest.md) | | (empty response body) @@ -10482,11 +11101,70 @@ Name | Type | Description | Notes -## JWTWriteConfig +## JwtReadConfiguration -Configure the JWT authentication backend. +Read the current JWT authentication backend configuration. + +### Example + +```go +package main + +import ( + "context" + "log" + "os" + + "github.com/hashicorp/vault-client-go" +) + +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + resp, err := client.Auth.JwtReadConfiguration( + context.Background(), + jwtMountPath, + vault.WithToken("my-token"), + ) + if err != nil { + log.Fatal(err) + } + + log.Println(resp.Data) +} +``` + +### Path Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] + +### Other Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) + +[[Back to top]](#) +[[Back to README]](../README.md) + + + +## JwtReadRole + +Read an existing role. ### Example @@ -10499,7 +11177,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10510,10 +11187,12 @@ func main() { log.Fatal(err) } - request := schema.NewJWTWriteConfigRequestWithDefaults() - resp, err := client.Auth.JWTWriteConfig( + name := "name_example" // string | Name of the role. + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + resp, err := client.Auth.JwtReadRole( context.Background(), - request, + name, + jwtMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10530,13 +11209,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **jWTWriteConfigRequest** | [**JWTWriteConfigRequest**](JWTWriteConfigRequest.md) | | + (empty response body) @@ -10546,9 +11227,11 @@ Name | Type | Description | Notes -## JWTWriteOIDCAuthURL +## JwtWriteRole + +Register an role with the backend. + -Request an authorization URL to start an OIDC login flow. ### Example @@ -10572,9 +11255,13 @@ func main() { log.Fatal(err) } - request := schema.NewJWTWriteOIDCAuthURLRequestWithDefaults() - resp, err := client.Auth.JWTWriteOIDCAuthURL( + name := "name_example" // string | Name of the role. + jwtMountPath := "jwtMountPath_example" // string | Path that the backend was mounted at (defaults to "jwt") + request := schema.NewJwtWriteRoleRequestWithDefaults() + resp, err := client.Auth.JwtWriteRole( context.Background(), + name, + jwtMountPath, request, vault.WithToken("my-token"), ) @@ -10592,15 +11279,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**jwtMountPath** | **string** | Path that the backend was mounted at | [default to "jwt"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **jWTWriteOIDCAuthURLRequest** | [**JWTWriteOIDCAuthURLRequest**](JWTWriteOIDCAuthURLRequest.md) | | + **jwtWriteRoleRequest** | [**JwtWriteRoleRequest**](JwtWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -10608,9 +11298,9 @@ Name | Type | Description | Notes -## JWTWriteOIDCCallback +## KerberosConfigure + -Callback endpoint to handle form_posts. ### Example @@ -10634,9 +11324,11 @@ func main() { log.Fatal(err) } - request := schema.NewJWTWriteOIDCCallbackRequestWithDefaults() - resp, err := client.Auth.JWTWriteOIDCCallback( + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") + request := schema.NewKerberosConfigureRequestWithDefaults() + resp, err := client.Auth.KerberosConfigure( context.Background(), + kerberosMountPath, request, vault.WithToken("my-token"), ) @@ -10654,14 +11346,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **jWTWriteOIDCCallbackRequest** | [**JWTWriteOIDCCallbackRequest**](JWTWriteOIDCCallbackRequest.md) | | + **kerberosConfigureRequest** | [**KerberosConfigureRequest**](KerberosConfigureRequest.md) | | (empty response body) @@ -10670,9 +11363,7 @@ Name | Type | Description | Notes -## JWTWriteRole - -Register an role with the backend. +## KerberosConfigureLdap @@ -10698,11 +11389,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewJWTWriteRoleRequestWithDefaults() - resp, err := client.Auth.JWTWriteRole( + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") + request := schema.NewKerberosConfigureLdapRequestWithDefaults() + resp, err := client.Auth.KerberosConfigureLdap( context.Background(), - name, + kerberosMountPath, request, vault.WithToken("my-token"), ) @@ -10720,7 +11411,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters @@ -10728,8 +11419,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **jWTWriteRoleRequest** | [**JWTWriteRoleRequest**](JWTWriteRoleRequest.md) | | - + **kerberosConfigureLdapRequest** | [**KerberosConfigureLdapRequest**](KerberosConfigureLdapRequest.md) | | (empty response body) @@ -10764,9 +11454,11 @@ func main() { } name := "name_example" // string | Name of the LDAP group. + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") resp, err := client.Auth.KerberosDeleteGroup( context.Background(), name, + kerberosMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10784,6 +11476,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the LDAP group. | +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters @@ -10825,8 +11518,10 @@ func main() { log.Fatal(err) } + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") resp, err := client.Auth.KerberosListGroups( context.Background(), + kerberosMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10843,14 +11538,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -10885,9 +11581,11 @@ func main() { log.Fatal(err) } + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") request := schema.NewKerberosLoginRequestWithDefaults() resp, err := client.Auth.KerberosLogin( context.Background(), + kerberosMountPath, request, vault.WithToken("my-token"), ) @@ -10905,14 +11603,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kerberosLoginRequest** | [**KerberosLoginRequest**](KerberosLoginRequest.md) | | + **kerberosLoginRequest** | [**KerberosLoginRequest**](KerberosLoginRequest.md) | | (empty response body) @@ -10921,7 +11620,7 @@ Name | Type | Description | Notes -## KerberosReadConfig +## KerberosLogin2 @@ -10946,8 +11645,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.KerberosReadConfig( + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") + resp, err := client.Auth.KerberosLogin2( context.Background(), + kerberosMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10964,6 +11665,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters @@ -10979,7 +11681,7 @@ Name | Type | Description | Notes -## KerberosReadGroup +## KerberosReadConfiguration @@ -11004,10 +11706,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the LDAP group. - resp, err := client.Auth.KerberosReadGroup( + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") + resp, err := client.Auth.KerberosReadConfiguration( context.Background(), - name, + kerberosMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11024,7 +11726,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the LDAP group. | +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters @@ -11033,7 +11735,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -11041,7 +11742,7 @@ Name | Type | Description | Notes -## KerberosReadLDAPConfig +## KerberosReadGroup @@ -11066,8 +11767,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.KerberosReadLDAPConfig( + name := "name_example" // string | Name of the LDAP group. + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") + resp, err := client.Auth.KerberosReadGroup( context.Background(), + name, + kerberosMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11084,6 +11789,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the LDAP group. | +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters @@ -11092,6 +11799,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -11099,7 +11807,7 @@ Name | Type | Description | Notes -## KerberosWriteConfig +## KerberosReadLdapConfiguration @@ -11114,7 +11822,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -11125,10 +11832,10 @@ func main() { log.Fatal(err) } - request := schema.NewKerberosWriteConfigRequestWithDefaults() - resp, err := client.Auth.KerberosWriteConfig( + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") + resp, err := client.Auth.KerberosReadLdapConfiguration( context.Background(), - request, + kerberosMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11145,13 +11852,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kerberosWriteConfigRequest** | [**KerberosWriteConfigRequest**](KerberosWriteConfigRequest.md) | | (empty response body) @@ -11188,10 +11895,12 @@ func main() { } name := "name_example" // string | Name of the LDAP group. + kerberosMountPath := "kerberosMountPath_example" // string | Path that the backend was mounted at (defaults to "kerberos") request := schema.NewKerberosWriteGroupRequestWithDefaults() resp, err := client.Auth.KerberosWriteGroup( context.Background(), name, + kerberosMountPath, request, vault.WithToken("my-token"), ) @@ -11210,6 +11919,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the LDAP group. | +**kerberosMountPath** | **string** | Path that the backend was mounted at | [default to "kerberos"] ### Other Parameters @@ -11217,8 +11927,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kerberosWriteGroupRequest** | [**KerberosWriteGroupRequest**](KerberosWriteGroupRequest.md) | | + **kerberosWriteGroupRequest** | [**KerberosWriteGroupRequest**](KerberosWriteGroupRequest.md) | | (empty response body) @@ -11227,7 +11937,7 @@ Name | Type | Description | Notes -## KerberosWriteLDAPConfig +## KubernetesConfigureAuth @@ -11253,9 +11963,11 @@ func main() { log.Fatal(err) } - request := schema.NewKerberosWriteLDAPConfigRequestWithDefaults() - resp, err := client.Auth.KerberosWriteLDAPConfig( + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + request := schema.NewKubernetesConfigureAuthRequestWithDefaults() + resp, err := client.Auth.KubernetesConfigureAuth( context.Background(), + kubernetesMountPath, request, vault.WithToken("my-token"), ) @@ -11273,14 +11985,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kerberosWriteLDAPConfigRequest** | [**KerberosWriteLDAPConfigRequest**](KerberosWriteLDAPConfigRequest.md) | | + **kubernetesConfigureAuthRequest** | [**KubernetesConfigureAuthRequest**](KubernetesConfigureAuthRequest.md) | | (empty response body) @@ -11315,9 +12028,11 @@ func main() { } name := "name_example" // string | Name of the role. + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") resp, err := client.Auth.KubernetesDeleteAuthRole( context.Background(), name, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11335,6 +12050,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -11376,8 +12092,10 @@ func main() { log.Fatal(err) } + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") resp, err := client.Auth.KubernetesListAuthRoles( context.Background(), + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11394,14 +12112,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -11436,9 +12155,11 @@ func main() { log.Fatal(err) } + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") request := schema.NewKubernetesLoginRequestWithDefaults() resp, err := client.Auth.KubernetesLogin( context.Background(), + kubernetesMountPath, request, vault.WithToken("my-token"), ) @@ -11456,14 +12177,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kubernetesLoginRequest** | [**KubernetesLoginRequest**](KubernetesLoginRequest.md) | | + **kubernetesLoginRequest** | [**KubernetesLoginRequest**](KubernetesLoginRequest.md) | | (empty response body) @@ -11472,9 +12194,9 @@ Name | Type | Description | Notes -## KubernetesReadAuthConfig +## KubernetesReadAuthConfiguration + -Configures the JWT Public Key and Kubernetes API information. ### Example @@ -11497,8 +12219,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.KubernetesReadAuthConfig( + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + resp, err := client.Auth.KubernetesReadAuthConfiguration( context.Background(), + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11515,6 +12239,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -11556,9 +12281,11 @@ func main() { } name := "name_example" // string | Name of the role. + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") resp, err := client.Auth.KubernetesReadAuthRole( context.Background(), name, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11576,6 +12303,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -11592,9 +12320,9 @@ Name | Type | Description | Notes -## KubernetesWriteAuthConfig +## KubernetesWriteAuthRole -Configures the JWT Public Key and Kubernetes API information. +Register an role with the backend. ### Example @@ -11618,9 +12346,13 @@ func main() { log.Fatal(err) } - request := schema.NewKubernetesWriteAuthConfigRequestWithDefaults() - resp, err := client.Auth.KubernetesWriteAuthConfig( + name := "name_example" // string | Name of the role. + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + request := schema.NewKubernetesWriteAuthRoleRequestWithDefaults() + resp, err := client.Auth.KubernetesWriteAuthRole( context.Background(), + name, + kubernetesMountPath, request, vault.WithToken("my-token"), ) @@ -11638,15 +12370,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kubernetesWriteAuthConfigRequest** | [**KubernetesWriteAuthConfigRequest**](KubernetesWriteAuthConfigRequest.md) | | + **kubernetesWriteAuthRoleRequest** | [**KubernetesWriteAuthRoleRequest**](KubernetesWriteAuthRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -11654,9 +12389,9 @@ Name | Type | Description | Notes -## KubernetesWriteAuthRole +## LdapConfigureAuth + -Register an role with the backend. ### Example @@ -11680,11 +12415,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewKubernetesWriteAuthRoleRequestWithDefaults() - resp, err := client.Auth.KubernetesWriteAuthRole( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapConfigureAuthRequestWithDefaults() + resp, err := client.Auth.LdapConfigureAuth( context.Background(), - name, + ldapMountPath, request, vault.WithToken("my-token"), ) @@ -11702,7 +12437,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -11710,8 +12445,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kubernetesWriteAuthRoleRequest** | [**KubernetesWriteAuthRoleRequest**](KubernetesWriteAuthRoleRequest.md) | | - + **ldapConfigureAuthRequest** | [**LdapConfigureAuthRequest**](LdapConfigureAuthRequest.md) | | (empty response body) @@ -11720,7 +12454,7 @@ Name | Type | Description | Notes -## LDAPDeleteGroup +## LdapDeleteGroup Manage additional groups for users allowed to authenticate. @@ -11746,9 +12480,11 @@ func main() { } name := "name_example" // string | Name of the LDAP group. - resp, err := client.Auth.LDAPDeleteGroup( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Auth.LdapDeleteGroup( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11766,6 +12502,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the LDAP group. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -11782,7 +12519,7 @@ Name | Type | Description | Notes -## LDAPDeleteUser +## LdapDeleteUser Manage users allowed to authenticate. @@ -11808,9 +12545,11 @@ func main() { } name := "name_example" // string | Name of the LDAP user. - resp, err := client.Auth.LDAPDeleteUser( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Auth.LdapDeleteUser( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11828,6 +12567,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the LDAP user. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -11844,7 +12584,7 @@ Name | Type | Description | Notes -## LDAPListGroups +## LdapListGroups Manage additional groups for users allowed to authenticate. @@ -11869,8 +12609,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.LDAPListGroups( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Auth.LdapListGroups( context.Background(), + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11887,14 +12629,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -11903,7 +12646,7 @@ Name | Type | Description | Notes -## LDAPListUsers +## LdapListUsers Manage users allowed to authenticate. @@ -11928,8 +12671,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.LDAPListUsers( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Auth.LdapListUsers( context.Background(), + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11946,14 +12691,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -11962,7 +12708,7 @@ Name | Type | Description | Notes -## LDAPLogin +## LdapLogin Log in with a username and password. @@ -11989,10 +12735,12 @@ func main() { } username := "username_example" // string | DN (distinguished name) to be used for login. - request := schema.NewLDAPLoginRequestWithDefaults() - resp, err := client.Auth.LDAPLogin( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapLoginRequestWithDefaults() + resp, err := client.Auth.LdapLogin( context.Background(), username, + ldapMountPath, request, vault.WithToken("my-token"), ) @@ -12011,6 +12759,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **username** | **string** | DN (distinguished name) to be used for login. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -12018,8 +12767,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPLoginRequest** | [**LDAPLoginRequest**](LDAPLoginRequest.md) | | + **ldapLoginRequest** | [**LdapLoginRequest**](LdapLoginRequest.md) | | (empty response body) @@ -12028,9 +12777,9 @@ Name | Type | Description | Notes -## LDAPReadAuthConfig +## LdapReadAuthConfiguration + -Configure the LDAP server to connect to, along with its options. ### Example @@ -12053,8 +12802,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.LDAPReadAuthConfig( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Auth.LdapReadAuthConfiguration( context.Background(), + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12071,6 +12822,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -12086,7 +12838,7 @@ Name | Type | Description | Notes -## LDAPReadGroup +## LdapReadGroup Manage additional groups for users allowed to authenticate. @@ -12112,9 +12864,11 @@ func main() { } name := "name_example" // string | Name of the LDAP group. - resp, err := client.Auth.LDAPReadGroup( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Auth.LdapReadGroup( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12132,6 +12886,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the LDAP group. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -12148,7 +12903,7 @@ Name | Type | Description | Notes -## LDAPReadUser +## LdapReadUser Manage users allowed to authenticate. @@ -12174,9 +12929,11 @@ func main() { } name := "name_example" // string | Name of the LDAP user. - resp, err := client.Auth.LDAPReadUser( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Auth.LdapReadUser( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12194,6 +12951,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the LDAP user. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -12210,9 +12968,9 @@ Name | Type | Description | Notes -## LDAPWriteAuthConfig +## LdapWriteGroup -Configure the LDAP server to connect to, along with its options. +Manage additional groups for users allowed to authenticate. ### Example @@ -12236,9 +12994,13 @@ func main() { log.Fatal(err) } - request := schema.NewLDAPWriteAuthConfigRequestWithDefaults() - resp, err := client.Auth.LDAPWriteAuthConfig( + name := "name_example" // string | Name of the LDAP group. + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapWriteGroupRequestWithDefaults() + resp, err := client.Auth.LdapWriteGroup( context.Background(), + name, + ldapMountPath, request, vault.WithToken("my-token"), ) @@ -12256,15 +13018,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the LDAP group. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPWriteAuthConfigRequest** | [**LDAPWriteAuthConfigRequest**](LDAPWriteAuthConfigRequest.md) | | + **ldapWriteGroupRequest** | [**LdapWriteGroupRequest**](LdapWriteGroupRequest.md) | | + (empty response body) [[Back to top]](#) @@ -12272,9 +13037,9 @@ Name | Type | Description | Notes -## LDAPWriteGroup +## LdapWriteUser -Manage additional groups for users allowed to authenticate. +Manage users allowed to authenticate. ### Example @@ -12298,11 +13063,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the LDAP group. - request := schema.NewLDAPWriteGroupRequestWithDefaults() - resp, err := client.Auth.LDAPWriteGroup( + name := "name_example" // string | Name of the LDAP user. + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapWriteUserRequestWithDefaults() + resp, err := client.Auth.LdapWriteUser( context.Background(), name, + ldapMountPath, request, vault.WithToken("my-token"), ) @@ -12320,7 +13087,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the LDAP group. | +**name** | **string** | Name of the LDAP user. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -12328,8 +13096,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPWriteGroupRequest** | [**LDAPWriteGroupRequest**](LDAPWriteGroupRequest.md) | | + **ldapWriteUserRequest** | [**LdapWriteUserRequest**](LdapWriteUserRequest.md) | | (empty response body) @@ -12338,9 +13106,9 @@ Name | Type | Description | Notes -## LDAPWriteUser +## OciConfigure + -Manage users allowed to authenticate. ### Example @@ -12364,11 +13132,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the LDAP user. - request := schema.NewLDAPWriteUserRequestWithDefaults() - resp, err := client.Auth.LDAPWriteUser( + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + request := schema.NewOciConfigureRequestWithDefaults() + resp, err := client.Auth.OciConfigure( context.Background(), - name, + ociMountPath, request, vault.WithToken("my-token"), ) @@ -12386,7 +13154,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the LDAP user. | +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters @@ -12394,8 +13162,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPWriteUserRequest** | [**LDAPWriteUserRequest**](LDAPWriteUserRequest.md) | | - + **ociConfigureRequest** | [**OciConfigureRequest**](OciConfigureRequest.md) | | (empty response body) @@ -12404,9 +13171,9 @@ Name | Type | Description | Notes -## OCIDeleteConfig +## OciDeleteConfiguration + -Manages the configuration for the Vault Auth Plugin. ### Example @@ -12429,8 +13196,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.OCIDeleteConfig( + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + resp, err := client.Auth.OciDeleteConfiguration( context.Background(), + ociMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12447,6 +13216,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters @@ -12462,7 +13232,7 @@ Name | Type | Description | Notes -## OCIDeleteRole +## OciDeleteRole Create a role and associate policies to it. @@ -12488,9 +13258,11 @@ func main() { } role := "role_example" // string | Name of the role. - resp, err := client.Auth.OCIDeleteRole( + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + resp, err := client.Auth.OciDeleteRole( context.Background(), role, + ociMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12508,6 +13280,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **role** | **string** | Name of the role. | +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters @@ -12524,7 +13297,7 @@ Name | Type | Description | Notes -## OCIListRoles +## OciListRoles Lists all the roles that are registered with Vault. @@ -12549,8 +13322,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.OCIListRoles( + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + resp, err := client.Auth.OciListRoles( context.Background(), + ociMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12567,14 +13342,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -12583,7 +13359,7 @@ Name | Type | Description | Notes -## OCILoginWithRole +## OciLogin Authenticates to Vault using OCI credentials @@ -12610,10 +13386,12 @@ func main() { } role := "role_example" // string | Name of the role. - request := schema.NewOCILoginWithRoleRequestWithDefaults() - resp, err := client.Auth.OCILoginWithRole( + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + request := schema.NewOciLoginRequestWithDefaults() + resp, err := client.Auth.OciLogin( context.Background(), role, + ociMountPath, request, vault.WithToken("my-token"), ) @@ -12632,6 +13410,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **role** | **string** | Name of the role. | +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters @@ -12639,8 +13418,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oCILoginWithRoleRequest** | [**OCILoginWithRoleRequest**](OCILoginWithRoleRequest.md) | | + **ociLoginRequest** | [**OciLoginRequest**](OciLoginRequest.md) | | (empty response body) @@ -12649,9 +13428,9 @@ Name | Type | Description | Notes -## OCIReadConfig +## OciReadConfiguration + -Manages the configuration for the Vault Auth Plugin. ### Example @@ -12674,8 +13453,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.OCIReadConfig( + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + resp, err := client.Auth.OciReadConfiguration( context.Background(), + ociMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12692,6 +13473,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters @@ -12707,7 +13489,7 @@ Name | Type | Description | Notes -## OCIReadRole +## OciReadRole Create a role and associate policies to it. @@ -12733,9 +13515,11 @@ func main() { } role := "role_example" // string | Name of the role. - resp, err := client.Auth.OCIReadRole( + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + resp, err := client.Auth.OciReadRole( context.Background(), role, + ociMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12753,6 +13537,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **role** | **string** | Name of the role. | +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters @@ -12769,9 +13554,9 @@ Name | Type | Description | Notes -## OCIWriteConfig +## OciWriteRole -Manages the configuration for the Vault Auth Plugin. +Create a role and associate policies to it. ### Example @@ -12795,9 +13580,13 @@ func main() { log.Fatal(err) } - request := schema.NewOCIWriteConfigRequestWithDefaults() - resp, err := client.Auth.OCIWriteConfig( + role := "role_example" // string | Name of the role. + ociMountPath := "ociMountPath_example" // string | Path that the backend was mounted at (defaults to "oci") + request := schema.NewOciWriteRoleRequestWithDefaults() + resp, err := client.Auth.OciWriteRole( context.Background(), + role, + ociMountPath, request, vault.WithToken("my-token"), ) @@ -12815,15 +13604,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | Name of the role. | +**ociMountPath** | **string** | Path that the backend was mounted at | [default to "oci"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oCIWriteConfigRequest** | [**OCIWriteConfigRequest**](OCIWriteConfigRequest.md) | | + **ociWriteRoleRequest** | [**OciWriteRoleRequest**](OciWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -12831,9 +13623,9 @@ Name | Type | Description | Notes -## OCIWriteRole +## OktaConfigure + -Create a role and associate policies to it. ### Example @@ -12857,11 +13649,11 @@ func main() { log.Fatal(err) } - role := "role_example" // string | Name of the role. - request := schema.NewOCIWriteRoleRequestWithDefaults() - resp, err := client.Auth.OCIWriteRole( + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + request := schema.NewOktaConfigureRequestWithDefaults() + resp, err := client.Auth.OktaConfigure( context.Background(), - role, + oktaMountPath, request, vault.WithToken("my-token"), ) @@ -12879,7 +13671,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | Name of the role. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -12887,8 +13679,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oCIWriteRoleRequest** | [**OCIWriteRoleRequest**](OCIWriteRoleRequest.md) | | - + **oktaConfigureRequest** | [**OktaConfigureRequest**](OktaConfigureRequest.md) | | (empty response body) @@ -12897,9 +13688,9 @@ Name | Type | Description | Notes -## OIDCDeleteAuthRole +## OktaDeleteGroup -Delete an existing role. +Manage users allowed to authenticate. ### Example @@ -12922,10 +13713,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Auth.OIDCDeleteAuthRole( + name := "name_example" // string | Name of the Okta group. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaDeleteGroup( context.Background(), name, + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12942,7 +13735,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Name of the Okta group. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -12959,11 +13753,9 @@ Name | Type | Description | Notes -## OIDCListAuthRoles - -Lists all the roles registered with the backend. - +## OktaDeleteUser +Manage additional groups for users allowed to authenticate. ### Example @@ -12986,8 +13778,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.OIDCListAuthRoles( + name := "name_example" // string | Name of the user. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaDeleteUser( context.Background(), + name, + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13004,13 +13800,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the user. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -13020,9 +13818,9 @@ Name | Type | Description | Notes -## OIDCLogin +## OktaListGroups -Authenticates to Vault using a JWT (or OIDC) token. +Manage users allowed to authenticate. ### Example @@ -13035,7 +13833,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13046,10 +13843,10 @@ func main() { log.Fatal(err) } - request := schema.NewOIDCLoginRequestWithDefaults() - resp, err := client.Auth.OIDCLogin( + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaListGroups( context.Background(), - request, + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13066,14 +13863,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCLoginRequest** | [**OIDCLoginRequest**](OIDCLoginRequest.md) | | + **list** | **string** | Must be set to `true` | (empty response body) @@ -13082,9 +13880,9 @@ Name | Type | Description | Notes -## OIDCReadAuthConfig +## OktaListUsers -Read the current JWT authentication backend configuration. +Manage additional groups for users allowed to authenticate. ### Example @@ -13107,8 +13905,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.OIDCReadAuthConfig( + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaListUsers( context.Background(), + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13125,6 +13925,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -13132,6 +13933,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -13140,9 +13942,9 @@ Name | Type | Description | Notes -## OIDCReadAuthRole +## OktaLogin -Read an existing role. +Log in with a username and password. ### Example @@ -13155,6 +13957,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13165,10 +13968,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Auth.OIDCReadAuthRole( + username := "username_example" // string | Username to be used for login. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + request := schema.NewOktaLoginRequestWithDefaults() + resp, err := client.Auth.OktaLogin( context.Background(), - name, + username, + oktaMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -13185,7 +13992,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**username** | **string** | Username to be used for login. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -13194,6 +14002,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **oktaLoginRequest** | [**OktaLoginRequest**](OktaLoginRequest.md) | | (empty response body) @@ -13202,9 +14011,9 @@ Name | Type | Description | Notes -## OIDCReadCallback +## OktaReadConfiguration + -Callback endpoint to complete an OIDC login. ### Example @@ -13227,8 +14036,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.OIDCReadCallback( + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaReadConfiguration( context.Background(), + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13245,6 +14056,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -13260,11 +14072,9 @@ Name | Type | Description | Notes -## OIDCWriteAuthConfig - -Configure the JWT authentication backend. - +## OktaReadGroup +Manage users allowed to authenticate. ### Example @@ -13277,7 +14087,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13288,10 +14097,12 @@ func main() { log.Fatal(err) } - request := schema.NewOIDCWriteAuthConfigRequestWithDefaults() - resp, err := client.Auth.OIDCWriteAuthConfig( + name := "name_example" // string | Name of the Okta group. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaReadGroup( context.Background(), - request, + name, + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13308,13 +14119,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the Okta group. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteAuthConfigRequest** | [**OIDCWriteAuthConfigRequest**](OIDCWriteAuthConfigRequest.md) | | + (empty response body) @@ -13324,11 +14137,9 @@ Name | Type | Description | Notes -## OIDCWriteAuthRole - -Register an role with the backend. - +## OktaReadUser +Manage additional groups for users allowed to authenticate. ### Example @@ -13341,7 +14152,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13352,12 +14162,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewOIDCWriteAuthRoleRequestWithDefaults() - resp, err := client.Auth.OIDCWriteAuthRole( + name := "name_example" // string | Name of the user. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaReadUser( context.Background(), name, - request, + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13374,7 +14184,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Name of the user. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -13382,7 +14193,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteAuthRoleRequest** | [**OIDCWriteAuthRoleRequest**](OIDCWriteAuthRoleRequest.md) | | (empty response body) @@ -13392,9 +14202,9 @@ Name | Type | Description | Notes -## OIDCWriteAuthURL +## OktaVerify + -Request an authorization URL to start an OIDC login flow. ### Example @@ -13407,7 +14217,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13418,10 +14227,12 @@ func main() { log.Fatal(err) } - request := schema.NewOIDCWriteAuthURLRequestWithDefaults() - resp, err := client.Auth.OIDCWriteAuthURL( + nonce := "nonce_example" // string | Nonce provided during a login request to retrieve the number verification challenge for the matching request. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + resp, err := client.Auth.OktaVerify( context.Background(), - request, + nonce, + oktaMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13438,620 +14249,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **oIDCWriteAuthURLRequest** | [**OIDCWriteAuthURLRequest**](OIDCWriteAuthURLRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OIDCWriteCallback - -Callback endpoint to handle form_posts. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - request := schema.NewOIDCWriteCallbackRequestWithDefaults() - resp, err := client.Auth.OIDCWriteCallback( - context.Background(), - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **oIDCWriteCallbackRequest** | [**OIDCWriteCallbackRequest**](OIDCWriteCallbackRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaDeleteGroup - -Manage users allowed to authenticate. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the Okta group. - resp, err := client.Auth.OktaDeleteGroup( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the Okta group. | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaDeleteUser - -Manage additional groups for users allowed to authenticate. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the user. - resp, err := client.Auth.OktaDeleteUser( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the user. | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaListGroups - -Manage users allowed to authenticate. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Auth.OktaListGroups( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaListUsers - -Manage additional groups for users allowed to authenticate. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Auth.OktaListUsers( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaLogin - -Log in with a username and password. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - username := "username_example" // string | Username to be used for login. - request := schema.NewOktaLoginRequestWithDefaults() - resp, err := client.Auth.OktaLogin( - context.Background(), - username, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**username** | **string** | Username to be used for login. | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **oktaLoginRequest** | [**OktaLoginRequest**](OktaLoginRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaReadConfig - -This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Auth.OktaReadConfig( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaReadGroup - -Manage users allowed to authenticate. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the Okta group. - resp, err := client.Auth.OktaReadGroup( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the Okta group. | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaReadUser - -Manage additional groups for users allowed to authenticate. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the user. - resp, err := client.Auth.OktaReadUser( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the user. | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OktaVerify - - - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - nonce := "nonce_example" // string | Nonce provided during a login request to retrieve the number verification challenge for the matching request. - resp, err := client.Auth.OktaVerify( - context.Background(), - nonce, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**nonce** | **string** | Nonce provided during a login request to retrieve the number verification challenge for the matching request. | +**nonce** | **string** | Nonce provided during a login request to retrieve the number verification challenge for the matching request. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -14068,9 +14267,9 @@ Name | Type | Description | Notes -## OktaWriteConfig +## OktaWriteGroup -This endpoint allows you to configure the Okta and its configuration options. The Okta organization are the characters at the front of the URL for Okta. Example https://ORG.okta.com +Manage users allowed to authenticate. ### Example @@ -14094,9 +14293,13 @@ func main() { log.Fatal(err) } - request := schema.NewOktaWriteConfigRequestWithDefaults() - resp, err := client.Auth.OktaWriteConfig( + name := "name_example" // string | Name of the Okta group. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + request := schema.NewOktaWriteGroupRequestWithDefaults() + resp, err := client.Auth.OktaWriteGroup( context.Background(), + name, + oktaMountPath, request, vault.WithToken("my-token"), ) @@ -14114,15 +14317,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the Okta group. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oktaWriteConfigRequest** | [**OktaWriteConfigRequest**](OktaWriteConfigRequest.md) | | + **oktaWriteGroupRequest** | [**OktaWriteGroupRequest**](OktaWriteGroupRequest.md) | | + (empty response body) [[Back to top]](#) @@ -14130,9 +14336,9 @@ Name | Type | Description | Notes -## OktaWriteGroup +## OktaWriteUser -Manage users allowed to authenticate. +Manage additional groups for users allowed to authenticate. ### Example @@ -14156,11 +14362,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the Okta group. - request := schema.NewOktaWriteGroupRequestWithDefaults() - resp, err := client.Auth.OktaWriteGroup( + name := "name_example" // string | Name of the user. + oktaMountPath := "oktaMountPath_example" // string | Path that the backend was mounted at (defaults to "okta") + request := schema.NewOktaWriteUserRequestWithDefaults() + resp, err := client.Auth.OktaWriteUser( context.Background(), name, + oktaMountPath, request, vault.WithToken("my-token"), ) @@ -14178,7 +14386,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the Okta group. | +**name** | **string** | Name of the user. | +**oktaMountPath** | **string** | Path that the backend was mounted at | [default to "okta"] ### Other Parameters @@ -14186,8 +14395,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oktaWriteGroupRequest** | [**OktaWriteGroupRequest**](OktaWriteGroupRequest.md) | | + **oktaWriteUserRequest** | [**OktaWriteUserRequest**](OktaWriteUserRequest.md) | | (empty response body) @@ -14196,9 +14405,9 @@ Name | Type | Description | Notes -## OktaWriteUser +## RadiusConfigure + -Manage additional groups for users allowed to authenticate. ### Example @@ -14222,11 +14431,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the user. - request := schema.NewOktaWriteUserRequestWithDefaults() - resp, err := client.Auth.OktaWriteUser( + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") + request := schema.NewRadiusConfigureRequestWithDefaults() + resp, err := client.Auth.RadiusConfigure( context.Background(), - name, + radiusMountPath, request, vault.WithToken("my-token"), ) @@ -14244,7 +14453,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the user. | +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters @@ -14252,8 +14461,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oktaWriteUserRequest** | [**OktaWriteUserRequest**](OktaWriteUserRequest.md) | | - + **radiusConfigureRequest** | [**RadiusConfigureRequest**](RadiusConfigureRequest.md) | | (empty response body) @@ -14288,9 +14496,11 @@ func main() { } name := "name_example" // string | Name of the RADIUS user. + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") resp, err := client.Auth.RadiusDeleteUser( context.Background(), name, + radiusMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14308,6 +14518,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the RADIUS user. | +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters @@ -14349,8 +14560,10 @@ func main() { log.Fatal(err) } + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") resp, err := client.Auth.RadiusListUsers( context.Background(), + radiusMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14367,14 +14580,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -14409,9 +14623,11 @@ func main() { log.Fatal(err) } + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") request := schema.NewRadiusLoginRequestWithDefaults() resp, err := client.Auth.RadiusLogin( context.Background(), + radiusMountPath, request, vault.WithToken("my-token"), ) @@ -14429,14 +14645,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **radiusLoginRequest** | [**RadiusLoginRequest**](RadiusLoginRequest.md) | | + **radiusLoginRequest** | [**RadiusLoginRequest**](RadiusLoginRequest.md) | | (empty response body) @@ -14472,10 +14689,12 @@ func main() { } urlusername := "urlusername_example" // string | Username to be used for login. (URL parameter) + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") request := schema.NewRadiusLoginWithUsernameRequestWithDefaults() resp, err := client.Auth.RadiusLoginWithUsername( context.Background(), urlusername, + radiusMountPath, request, vault.WithToken("my-token"), ) @@ -14494,6 +14713,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **urlusername** | **string** | Username to be used for login. (URL parameter) | +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters @@ -14501,8 +14721,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **radiusLoginWithUsernameRequest** | [**RadiusLoginWithUsernameRequest**](RadiusLoginWithUsernameRequest.md) | | + **radiusLoginWithUsernameRequest** | [**RadiusLoginWithUsernameRequest**](RadiusLoginWithUsernameRequest.md) | | (empty response body) @@ -14511,9 +14731,9 @@ Name | Type | Description | Notes -## RadiusReadConfig +## RadiusReadConfiguration + -Configure the RADIUS server to connect to, along with its options. ### Example @@ -14536,8 +14756,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.RadiusReadConfig( + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") + resp, err := client.Auth.RadiusReadConfiguration( context.Background(), + radiusMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14554,6 +14776,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters @@ -14595,9 +14818,11 @@ func main() { } name := "name_example" // string | Name of the RADIUS user. + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") resp, err := client.Auth.RadiusReadUser( context.Background(), name, + radiusMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14615,6 +14840,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the RADIUS user. | +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters @@ -14631,68 +14857,6 @@ Name | Type | Description | Notes -## RadiusWriteConfig - -Configure the RADIUS server to connect to, along with its options. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - request := schema.NewRadiusWriteConfigRequestWithDefaults() - resp, err := client.Auth.RadiusWriteConfig( - context.Background(), - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **radiusWriteConfigRequest** | [**RadiusWriteConfigRequest**](RadiusWriteConfigRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - ## RadiusWriteUser Manage users allowed to authenticate. @@ -14720,10 +14884,12 @@ func main() { } name := "name_example" // string | Name of the RADIUS user. + radiusMountPath := "radiusMountPath_example" // string | Path that the backend was mounted at (defaults to "radius") request := schema.NewRadiusWriteUserRequestWithDefaults() resp, err := client.Auth.RadiusWriteUser( context.Background(), name, + radiusMountPath, request, vault.WithToken("my-token"), ) @@ -14742,6 +14908,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the RADIUS user. | +**radiusMountPath** | **string** | Path that the backend was mounted at | [default to "radius"] ### Other Parameters @@ -14749,8 +14916,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **radiusWriteUserRequest** | [**RadiusWriteUserRequest**](RadiusWriteUserRequest.md) | | + **radiusWriteUserRequest** | [**RadiusWriteUserRequest**](RadiusWriteUserRequest.md) | | (empty response body) @@ -14759,9 +14926,9 @@ Name | Type | Description | Notes -## TokenDeleteRole - +## TokenCreate +The token create path is used to create new tokens. ### Example @@ -14774,6 +14941,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14784,10 +14952,12 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role - resp, err := client.Auth.TokenDeleteRole( + request := schema.NewTokenCreateRequestWithDefaults() + format := "format_example" // string | Return json formatted output + resp, err := client.Auth.TokenCreate( context.Background(), - roleName, + request, + format, vault.WithToken("my-token"), ) if err != nil { @@ -14801,18 +14971,14 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - + **tokenCreateRequest** | [**TokenCreateRequest**](TokenCreateRequest.md) | | + **format** | **string** | Return json formatted output | (empty response body) @@ -14821,9 +14987,9 @@ Name | Type | Description | Notes -## TokenListAccessors +## TokenCreateAgainstRole -List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'. +This token create path is used to create new tokens adhering to the given role. ### Example @@ -14836,6 +15002,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14846,8 +15013,14 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.TokenListAccessors( + roleName := "roleName_example" // string | Name of the role + request := schema.NewTokenCreateAgainstRoleRequestWithDefaults() + format := "format_example" // string | Return json formatted output + resp, err := client.Auth.TokenCreateAgainstRole( context.Background(), + roleName, + request, + format, vault.WithToken("my-token"), ) if err != nil { @@ -14864,14 +15037,16 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **tokenCreateAgainstRoleRequest** | [**TokenCreateAgainstRoleRequest**](TokenCreateAgainstRoleRequest.md) | | + **format** | **string** | Return json formatted output | (empty response body) @@ -14880,9 +15055,9 @@ Name | Type | Description | Notes -## TokenListRoles +## TokenCreateOrphan -This endpoint lists configured roles. +The token create path is used to create new orphan tokens. ### Example @@ -14895,6 +15070,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14905,8 +15081,12 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.TokenListRoles( + request := schema.NewTokenCreateOrphanRequestWithDefaults() + format := "format_example" // string | Return json formatted output + resp, err := client.Auth.TokenCreateOrphan( context.Background(), + request, + format, vault.WithToken("my-token"), ) if err != nil { @@ -14920,17 +15100,14 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - + **tokenCreateOrphanRequest** | [**TokenCreateOrphanRequest**](TokenCreateOrphanRequest.md) | | + **format** | **string** | Return json formatted output | (empty response body) @@ -14939,9 +15116,9 @@ Name | Type | Description | Notes -## TokenReadLookup +## TokenDeleteRole + -This endpoint will lookup a token and its properties. ### Example @@ -14964,8 +15141,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.TokenReadLookup( + roleName := "roleName_example" // string | Name of the role + resp, err := client.Auth.TokenDeleteRole( context.Background(), + roleName, vault.WithToken("my-token"), ) if err != nil { @@ -14982,6 +15161,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role | ### Other Parameters @@ -14997,9 +15177,9 @@ Name | Type | Description | Notes -## TokenReadLookupSelf +## TokenListAccessors -This endpoint will lookup a token and its properties. +List token accessors, which can then be be used to iterate and discover their properties or revoke them. Because this can be used to cause a denial of service, this endpoint requires 'sudo' capability in addition to 'list'. ### Example @@ -15022,7 +15202,7 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.TokenReadLookupSelf( + resp, err := client.Auth.TokenListAccessors( context.Background(), vault.WithToken("my-token"), ) @@ -15037,16 +15217,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -15055,9 +15232,9 @@ Name | Type | Description | Notes -## TokenReadRole - +## TokenListRoles +This endpoint lists configured roles. ### Example @@ -15080,10 +15257,8 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role - resp, err := client.Auth.TokenReadRole( + resp, err := client.Auth.TokenListRoles( context.Background(), - roleName, vault.WithToken("my-token"), ) if err != nil { @@ -15097,18 +15272,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - + **list** | **string** | Must be set to `true` | (empty response body) @@ -15117,9 +15287,9 @@ Name | Type | Description | Notes -## TokenRenew +## TokenLookUp + -This endpoint will renew the given token and prevent expiration. ### Example @@ -15143,8 +15313,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenRenewRequestWithDefaults() - resp, err := client.Auth.TokenRenew( + request := schema.NewTokenLookUpRequestWithDefaults() + resp, err := client.Auth.TokenLookUp( context.Background(), request, vault.WithToken("my-token"), @@ -15160,17 +15330,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tokenRenewRequest** | [**TokenRenewRequest**](TokenRenewRequest.md) | | - + **tokenLookUpRequest** | [**TokenLookUpRequest**](TokenLookUpRequest.md) | | (empty response body) @@ -15179,9 +15345,9 @@ Name | Type | Description | Notes -## TokenRenewAccessor +## TokenLookUpAccessor -This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID. +This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID. ### Example @@ -15205,8 +15371,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenRenewAccessorRequestWithDefaults() - resp, err := client.Auth.TokenRenewAccessor( + request := schema.NewTokenLookUpAccessorRequestWithDefaults() + resp, err := client.Auth.TokenLookUpAccessor( context.Background(), request, vault.WithToken("my-token"), @@ -15222,17 +15388,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tokenRenewAccessorRequest** | [**TokenRenewAccessorRequest**](TokenRenewAccessorRequest.md) | | - + **tokenLookUpAccessorRequest** | [**TokenLookUpAccessorRequest**](TokenLookUpAccessorRequest.md) | | (empty response body) @@ -15241,9 +15403,9 @@ Name | Type | Description | Notes -## TokenRenewSelf +## TokenLookUpSelf + -This endpoint will renew the token used to call it and prevent expiration. ### Example @@ -15256,7 +15418,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15267,10 +15428,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenRenewSelfRequestWithDefaults() - resp, err := client.Auth.TokenRenewSelf( + resp, err := client.Auth.TokenLookUpSelf( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -15283,18 +15442,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **tokenRenewSelfRequest** | [**TokenRenewSelfRequest**](TokenRenewSelfRequest.md) | | - (empty response body) @@ -15303,9 +15455,9 @@ Name | Type | Description | Notes -## TokenRevoke +## TokenLookUpSelf2 + -This endpoint will delete the given token and all of its child tokens. ### Example @@ -15329,8 +15481,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenRevokeRequestWithDefaults() - resp, err := client.Auth.TokenRevoke( + request := schema.NewTokenLookUpSelf2RequestWithDefaults() + resp, err := client.Auth.TokenLookUpSelf2( context.Background(), request, vault.WithToken("my-token"), @@ -15346,17 +15498,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tokenRevokeRequest** | [**TokenRevokeRequest**](TokenRevokeRequest.md) | | - + **tokenLookUpSelf2Request** | [**TokenLookUpSelf2Request**](TokenLookUpSelf2Request.md) | | (empty response body) @@ -15365,9 +15513,9 @@ Name | Type | Description | Notes -## TokenRevokeAccessor +## TokenLookUpSelf3 + -This endpoint will delete the token associated with the accessor and all of its child tokens. ### Example @@ -15380,7 +15528,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15391,10 +15538,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenRevokeAccessorRequestWithDefaults() - resp, err := client.Auth.TokenRevokeAccessor( + resp, err := client.Auth.TokenLookUpSelf3( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -15407,18 +15552,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **tokenRevokeAccessorRequest** | [**TokenRevokeAccessorRequest**](TokenRevokeAccessorRequest.md) | | - (empty response body) @@ -15427,9 +15565,9 @@ Name | Type | Description | Notes -## TokenRevokeOrphan +## TokenReadRole + -This endpoint will delete the token and orphan its child tokens. ### Example @@ -15442,7 +15580,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15453,10 +15590,10 @@ func main() { log.Fatal(err) } - request := schema.NewTokenRevokeOrphanRequestWithDefaults() - resp, err := client.Auth.TokenRevokeOrphan( + roleName := "roleName_example" // string | Name of the role + resp, err := client.Auth.TokenReadRole( context.Background(), - request, + roleName, vault.WithToken("my-token"), ) if err != nil { @@ -15473,13 +15610,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleName** | **string** | Name of the role | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tokenRevokeOrphanRequest** | [**TokenRevokeOrphanRequest**](TokenRevokeOrphanRequest.md) | | (empty response body) @@ -15489,9 +15626,9 @@ Name | Type | Description | Notes -## TokenRevokeSelf +## TokenRenew -This endpoint will delete the token used to call it and all of its child tokens. +This endpoint will renew the given token and prevent expiration. ### Example @@ -15504,6 +15641,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15514,8 +15652,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.TokenRevokeSelf( + request := schema.NewTokenRenewRequestWithDefaults() + resp, err := client.Auth.TokenRenew( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -15529,16 +15669,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **tokenRenewRequest** | [**TokenRenewRequest**](TokenRenewRequest.md) | | (empty response body) @@ -15547,9 +15684,9 @@ Name | Type | Description | Notes -## TokenTidy +## TokenRenewAccessor -This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. +This endpoint will renew a token associated with the given accessor and its properties. Response will not contain the token ID. ### Example @@ -15562,6 +15699,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15572,8 +15710,10 @@ func main() { log.Fatal(err) } - resp, err := client.Auth.TokenTidy( + request := schema.NewTokenRenewAccessorRequestWithDefaults() + resp, err := client.Auth.TokenRenewAccessor( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -15587,16 +15727,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **tokenRenewAccessorRequest** | [**TokenRenewAccessorRequest**](TokenRenewAccessorRequest.md) | | (empty response body) @@ -15605,9 +15742,9 @@ Name | Type | Description | Notes -## TokenWriteCreate +## TokenRenewSelf -The token create path is used to create new tokens. +This endpoint will renew the token used to call it and prevent expiration. ### Example @@ -15631,12 +15768,10 @@ func main() { log.Fatal(err) } - request := schema.NewTokenWriteCreateRequestWithDefaults() - format := "format_example" // string | Return json formatted output - resp, err := client.Auth.TokenWriteCreate( + request := schema.NewTokenRenewSelfRequestWithDefaults() + resp, err := client.Auth.TokenRenewSelf( context.Background(), request, - format, vault.WithToken("my-token"), ) if err != nil { @@ -15650,18 +15785,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tokenWriteCreateRequest** | [**TokenWriteCreateRequest**](TokenWriteCreateRequest.md) | | - **format** | **string** | Return json formatted output | - + **tokenRenewSelfRequest** | [**TokenRenewSelfRequest**](TokenRenewSelfRequest.md) | | (empty response body) @@ -15670,9 +15800,9 @@ Name | Type | Description | Notes -## TokenWriteCreateOrphan +## TokenRevoke -The token create path is used to create new orphan tokens. +This endpoint will delete the given token and all of its child tokens. ### Example @@ -15696,12 +15826,10 @@ func main() { log.Fatal(err) } - request := schema.NewTokenWriteCreateOrphanRequestWithDefaults() - format := "format_example" // string | Return json formatted output - resp, err := client.Auth.TokenWriteCreateOrphan( + request := schema.NewTokenRevokeRequestWithDefaults() + resp, err := client.Auth.TokenRevoke( context.Background(), request, - format, vault.WithToken("my-token"), ) if err != nil { @@ -15715,18 +15843,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tokenWriteCreateOrphanRequest** | [**TokenWriteCreateOrphanRequest**](TokenWriteCreateOrphanRequest.md) | | - **format** | **string** | Return json formatted output | - + **tokenRevokeRequest** | [**TokenRevokeRequest**](TokenRevokeRequest.md) | | (empty response body) @@ -15735,9 +15858,9 @@ Name | Type | Description | Notes -## TokenWriteCreateWithRole +## TokenRevokeAccessor -This token create path is used to create new tokens adhering to the given role. +This endpoint will delete the token associated with the accessor and all of its child tokens. ### Example @@ -15761,14 +15884,10 @@ func main() { log.Fatal(err) } - roleName := "roleName_example" // string | Name of the role - request := schema.NewTokenWriteCreateWithRoleRequestWithDefaults() - format := "format_example" // string | Return json formatted output - resp, err := client.Auth.TokenWriteCreateWithRole( + request := schema.NewTokenRevokeAccessorRequestWithDefaults() + resp, err := client.Auth.TokenRevokeAccessor( context.Background(), - roleName, request, - format, vault.WithToken("my-token"), ) if err != nil { @@ -15782,20 +15901,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**roleName** | **string** | Name of the role | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **tokenWriteCreateWithRoleRequest** | [**TokenWriteCreateWithRoleRequest**](TokenWriteCreateWithRoleRequest.md) | | - **format** | **string** | Return json formatted output | - + **tokenRevokeAccessorRequest** | [**TokenRevokeAccessorRequest**](TokenRevokeAccessorRequest.md) | | (empty response body) @@ -15804,9 +15916,9 @@ Name | Type | Description | Notes -## TokenWriteLookup +## TokenRevokeOrphan -This endpoint will lookup a token and its properties. +This endpoint will delete the token and orphan its child tokens. ### Example @@ -15830,8 +15942,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenWriteLookupRequestWithDefaults() - resp, err := client.Auth.TokenWriteLookup( + request := schema.NewTokenRevokeOrphanRequestWithDefaults() + resp, err := client.Auth.TokenRevokeOrphan( context.Background(), request, vault.WithToken("my-token"), @@ -15847,17 +15959,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tokenWriteLookupRequest** | [**TokenWriteLookupRequest**](TokenWriteLookupRequest.md) | | - + **tokenRevokeOrphanRequest** | [**TokenRevokeOrphanRequest**](TokenRevokeOrphanRequest.md) | | (empty response body) @@ -15866,9 +15974,9 @@ Name | Type | Description | Notes -## TokenWriteLookupAccessor +## TokenRevokeSelf -This endpoint will lookup a token associated with the given accessor and its properties. Response will not contain the token ID. +This endpoint will delete the token used to call it and all of its child tokens. ### Example @@ -15881,7 +15989,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15892,10 +15999,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenWriteLookupAccessorRequestWithDefaults() - resp, err := client.Auth.TokenWriteLookupAccessor( + resp, err := client.Auth.TokenRevokeSelf( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -15908,18 +16013,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **tokenWriteLookupAccessorRequest** | [**TokenWriteLookupAccessorRequest**](TokenWriteLookupAccessorRequest.md) | | - (empty response body) @@ -15928,9 +16026,9 @@ Name | Type | Description | Notes -## TokenWriteLookupSelf +## TokenTidy -This endpoint will lookup a token and its properties. +This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. ### Example @@ -15943,7 +16041,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15954,10 +16051,8 @@ func main() { log.Fatal(err) } - request := schema.NewTokenWriteLookupSelfRequestWithDefaults() - resp, err := client.Auth.TokenWriteLookupSelf( + resp, err := client.Auth.TokenTidy( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -15970,18 +16065,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **tokenWriteLookupSelfRequest** | [**TokenWriteLookupSelfRequest**](TokenWriteLookupSelfRequest.md) | | - (empty response body) @@ -16048,7 +16136,6 @@ Name | Type | Description | Notes **tokenWriteRoleRequest** | [**TokenWriteRoleRequest**](TokenWriteRoleRequest.md) | | - (empty response body) [[Back to top]](#) @@ -16082,9 +16169,11 @@ func main() { } username := "username_example" // string | Username for this user. + userpassMountPath := "userpassMountPath_example" // string | Path that the backend was mounted at (defaults to "userpass") resp, err := client.Auth.UserpassDeleteUser( context.Background(), username, + userpassMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -16102,6 +16191,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **username** | **string** | Username for this user. | +**userpassMountPath** | **string** | Path that the backend was mounted at | [default to "userpass"] ### Other Parameters @@ -16143,8 +16233,10 @@ func main() { log.Fatal(err) } + userpassMountPath := "userpassMountPath_example" // string | Path that the backend was mounted at (defaults to "userpass") resp, err := client.Auth.UserpassListUsers( context.Background(), + userpassMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -16161,14 +16253,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**userpassMountPath** | **string** | Path that the backend was mounted at | [default to "userpass"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -16204,10 +16297,12 @@ func main() { } username := "username_example" // string | Username of the user. + userpassMountPath := "userpassMountPath_example" // string | Path that the backend was mounted at (defaults to "userpass") request := schema.NewUserpassLoginRequestWithDefaults() resp, err := client.Auth.UserpassLogin( context.Background(), username, + userpassMountPath, request, vault.WithToken("my-token"), ) @@ -16226,6 +16321,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **username** | **string** | Username of the user. | +**userpassMountPath** | **string** | Path that the backend was mounted at | [default to "userpass"] ### Other Parameters @@ -16233,8 +16329,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **userpassLoginRequest** | [**UserpassLoginRequest**](UserpassLoginRequest.md) | | + **userpassLoginRequest** | [**UserpassLoginRequest**](UserpassLoginRequest.md) | | (empty response body) @@ -16269,9 +16365,11 @@ func main() { } username := "username_example" // string | Username for this user. + userpassMountPath := "userpassMountPath_example" // string | Path that the backend was mounted at (defaults to "userpass") resp, err := client.Auth.UserpassReadUser( context.Background(), username, + userpassMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -16289,6 +16387,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **username** | **string** | Username for this user. | +**userpassMountPath** | **string** | Path that the backend was mounted at | [default to "userpass"] ### Other Parameters @@ -16305,9 +16404,9 @@ Name | Type | Description | Notes -## UserpassWriteUser +## UserpassResetPassword -Manage users allowed to authenticate. +Reset user's password. ### Example @@ -16332,10 +16431,12 @@ func main() { } username := "username_example" // string | Username for this user. - request := schema.NewUserpassWriteUserRequestWithDefaults() - resp, err := client.Auth.UserpassWriteUser( + userpassMountPath := "userpassMountPath_example" // string | Path that the backend was mounted at (defaults to "userpass") + request := schema.NewUserpassResetPasswordRequestWithDefaults() + resp, err := client.Auth.UserpassResetPassword( context.Background(), username, + userpassMountPath, request, vault.WithToken("my-token"), ) @@ -16354,6 +16455,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **username** | **string** | Username for this user. | +**userpassMountPath** | **string** | Path that the backend was mounted at | [default to "userpass"] ### Other Parameters @@ -16361,8 +16463,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **userpassWriteUserRequest** | [**UserpassWriteUserRequest**](UserpassWriteUserRequest.md) | | + **userpassResetPasswordRequest** | [**UserpassResetPasswordRequest**](UserpassResetPasswordRequest.md) | | (empty response body) @@ -16371,9 +16473,9 @@ Name | Type | Description | Notes -## UserpassWriteUserPassword +## UserpassUpdatePolicies -Reset user's password. +Update the policies associated with the username. ### Example @@ -16398,10 +16500,12 @@ func main() { } username := "username_example" // string | Username for this user. - request := schema.NewUserpassWriteUserPasswordRequestWithDefaults() - resp, err := client.Auth.UserpassWriteUserPassword( + userpassMountPath := "userpassMountPath_example" // string | Path that the backend was mounted at (defaults to "userpass") + request := schema.NewUserpassUpdatePoliciesRequestWithDefaults() + resp, err := client.Auth.UserpassUpdatePolicies( context.Background(), username, + userpassMountPath, request, vault.WithToken("my-token"), ) @@ -16420,6 +16524,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **username** | **string** | Username for this user. | +**userpassMountPath** | **string** | Path that the backend was mounted at | [default to "userpass"] ### Other Parameters @@ -16427,8 +16532,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **userpassWriteUserPasswordRequest** | [**UserpassWriteUserPasswordRequest**](UserpassWriteUserPasswordRequest.md) | | + **userpassUpdatePoliciesRequest** | [**UserpassUpdatePoliciesRequest**](UserpassUpdatePoliciesRequest.md) | | (empty response body) @@ -16437,9 +16542,9 @@ Name | Type | Description | Notes -## UserpassWriteUserPolicies +## UserpassWriteUser -Update the policies associated with the username. +Manage users allowed to authenticate. ### Example @@ -16464,10 +16569,12 @@ func main() { } username := "username_example" // string | Username for this user. - request := schema.NewUserpassWriteUserPoliciesRequestWithDefaults() - resp, err := client.Auth.UserpassWriteUserPolicies( + userpassMountPath := "userpassMountPath_example" // string | Path that the backend was mounted at (defaults to "userpass") + request := schema.NewUserpassWriteUserRequestWithDefaults() + resp, err := client.Auth.UserpassWriteUser( context.Background(), username, + userpassMountPath, request, vault.WithToken("my-token"), ) @@ -16486,6 +16593,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **username** | **string** | Username for this user. | +**userpassMountPath** | **string** | Path that the backend was mounted at | [default to "userpass"] ### Other Parameters @@ -16493,8 +16601,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **userpassWriteUserPoliciesRequest** | [**UserpassWriteUserPoliciesRequest**](UserpassWriteUserPoliciesRequest.md) | | + **userpassWriteUserRequest** | [**UserpassWriteUserRequest**](UserpassWriteUserRequest.md) | | (empty response body) diff --git a/docs/WriteAuthMethodRequest.md b/docs/AuthEnableMethodRequest.md similarity index 68% rename from docs/WriteAuthMethodRequest.md rename to docs/AuthEnableMethodRequest.md index 69aefd18..3c071a34 100644 --- a/docs/WriteAuthMethodRequest.md +++ b/docs/AuthEnableMethodRequest.md @@ -1,4 +1,4 @@ -# WriteAuthMethodRequest +# AuthEnableMethodRequest ## Properties @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteAuthMethodRequest +### NewAuthEnableMethodRequest -`func NewWriteAuthMethodRequest() *WriteAuthMethodRequest` +`func NewAuthEnableMethodRequest() *AuthEnableMethodRequest` -NewWriteAuthMethodRequest instantiates a new WriteAuthMethodRequest object +NewAuthEnableMethodRequest instantiates a new AuthEnableMethodRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteAuthMethodRequestWithDefaults +### NewAuthEnableMethodRequestWithDefaults -`func NewWriteAuthMethodRequestWithDefaults() *WriteAuthMethodRequest` +`func NewAuthEnableMethodRequestWithDefaults() *AuthEnableMethodRequest` -NewWriteAuthMethodRequestWithDefaults instantiates a new WriteAuthMethodRequest object +NewAuthEnableMethodRequestWithDefaults instantiates a new AuthEnableMethodRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetConfig -`func (o *WriteAuthMethodRequest) GetConfig() map[string]interface{}` +`func (o *AuthEnableMethodRequest) GetConfig() map[string]interface{}` GetConfig returns the Config field if non-nil, zero value otherwise. ### GetConfigOk -`func (o *WriteAuthMethodRequest) GetConfigOk() (*map[string]interface{}, bool)` +`func (o *AuthEnableMethodRequest) GetConfigOk() (*map[string]interface{}, bool)` GetConfigOk returns a tuple with the Config field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetConfig -`func (o *WriteAuthMethodRequest) SetConfig(v map[string]interface{})` +`func (o *AuthEnableMethodRequest) SetConfig(v map[string]interface{})` SetConfig sets Config field to given value. ### HasConfig -`func (o *WriteAuthMethodRequest) HasConfig() bool` +`func (o *AuthEnableMethodRequest) HasConfig() bool` HasConfig returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasConfig returns a boolean if a field has been set. ### GetDescription -`func (o *WriteAuthMethodRequest) GetDescription() string` +`func (o *AuthEnableMethodRequest) GetDescription() string` GetDescription returns the Description field if non-nil, zero value otherwise. ### GetDescriptionOk -`func (o *WriteAuthMethodRequest) GetDescriptionOk() (*string, bool)` +`func (o *AuthEnableMethodRequest) GetDescriptionOk() (*string, bool)` GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDescription -`func (o *WriteAuthMethodRequest) SetDescription(v string)` +`func (o *AuthEnableMethodRequest) SetDescription(v string)` SetDescription sets Description field to given value. ### HasDescription -`func (o *WriteAuthMethodRequest) HasDescription() bool` +`func (o *AuthEnableMethodRequest) HasDescription() bool` HasDescription returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasDescription returns a boolean if a field has been set. ### GetExternalEntropyAccess -`func (o *WriteAuthMethodRequest) GetExternalEntropyAccess() bool` +`func (o *AuthEnableMethodRequest) GetExternalEntropyAccess() bool` GetExternalEntropyAccess returns the ExternalEntropyAccess field if non-nil, zero value otherwise. ### GetExternalEntropyAccessOk -`func (o *WriteAuthMethodRequest) GetExternalEntropyAccessOk() (*bool, bool)` +`func (o *AuthEnableMethodRequest) GetExternalEntropyAccessOk() (*bool, bool)` GetExternalEntropyAccessOk returns a tuple with the ExternalEntropyAccess field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExternalEntropyAccess -`func (o *WriteAuthMethodRequest) SetExternalEntropyAccess(v bool)` +`func (o *AuthEnableMethodRequest) SetExternalEntropyAccess(v bool)` SetExternalEntropyAccess sets ExternalEntropyAccess field to given value. ### HasExternalEntropyAccess -`func (o *WriteAuthMethodRequest) HasExternalEntropyAccess() bool` +`func (o *AuthEnableMethodRequest) HasExternalEntropyAccess() bool` HasExternalEntropyAccess returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasExternalEntropyAccess returns a boolean if a field has been set. ### GetLocal -`func (o *WriteAuthMethodRequest) GetLocal() bool` +`func (o *AuthEnableMethodRequest) GetLocal() bool` GetLocal returns the Local field if non-nil, zero value otherwise. ### GetLocalOk -`func (o *WriteAuthMethodRequest) GetLocalOk() (*bool, bool)` +`func (o *AuthEnableMethodRequest) GetLocalOk() (*bool, bool)` GetLocalOk returns a tuple with the Local field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocal -`func (o *WriteAuthMethodRequest) SetLocal(v bool)` +`func (o *AuthEnableMethodRequest) SetLocal(v bool)` SetLocal sets Local field to given value. ### HasLocal -`func (o *WriteAuthMethodRequest) HasLocal() bool` +`func (o *AuthEnableMethodRequest) HasLocal() bool` HasLocal returns a boolean if a field has been set. @@ -156,27 +156,27 @@ HasLocal returns a boolean if a field has been set. ### GetOptions -`func (o *WriteAuthMethodRequest) GetOptions() map[string]interface{}` +`func (o *AuthEnableMethodRequest) GetOptions() map[string]interface{}` GetOptions returns the Options field if non-nil, zero value otherwise. ### GetOptionsOk -`func (o *WriteAuthMethodRequest) GetOptionsOk() (*map[string]interface{}, bool)` +`func (o *AuthEnableMethodRequest) GetOptionsOk() (*map[string]interface{}, bool)` GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOptions -`func (o *WriteAuthMethodRequest) SetOptions(v map[string]interface{})` +`func (o *AuthEnableMethodRequest) SetOptions(v map[string]interface{})` SetOptions sets Options field to given value. ### HasOptions -`func (o *WriteAuthMethodRequest) HasOptions() bool` +`func (o *AuthEnableMethodRequest) HasOptions() bool` HasOptions returns a boolean if a field has been set. @@ -185,27 +185,27 @@ HasOptions returns a boolean if a field has been set. ### GetPluginName -`func (o *WriteAuthMethodRequest) GetPluginName() string` +`func (o *AuthEnableMethodRequest) GetPluginName() string` GetPluginName returns the PluginName field if non-nil, zero value otherwise. ### GetPluginNameOk -`func (o *WriteAuthMethodRequest) GetPluginNameOk() (*string, bool)` +`func (o *AuthEnableMethodRequest) GetPluginNameOk() (*string, bool)` GetPluginNameOk returns a tuple with the PluginName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginName -`func (o *WriteAuthMethodRequest) SetPluginName(v string)` +`func (o *AuthEnableMethodRequest) SetPluginName(v string)` SetPluginName sets PluginName field to given value. ### HasPluginName -`func (o *WriteAuthMethodRequest) HasPluginName() bool` +`func (o *AuthEnableMethodRequest) HasPluginName() bool` HasPluginName returns a boolean if a field has been set. @@ -214,27 +214,27 @@ HasPluginName returns a boolean if a field has been set. ### GetPluginVersion -`func (o *WriteAuthMethodRequest) GetPluginVersion() string` +`func (o *AuthEnableMethodRequest) GetPluginVersion() string` GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. ### GetPluginVersionOk -`func (o *WriteAuthMethodRequest) GetPluginVersionOk() (*string, bool)` +`func (o *AuthEnableMethodRequest) GetPluginVersionOk() (*string, bool)` GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginVersion -`func (o *WriteAuthMethodRequest) SetPluginVersion(v string)` +`func (o *AuthEnableMethodRequest) SetPluginVersion(v string)` SetPluginVersion sets PluginVersion field to given value. ### HasPluginVersion -`func (o *WriteAuthMethodRequest) HasPluginVersion() bool` +`func (o *AuthEnableMethodRequest) HasPluginVersion() bool` HasPluginVersion returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasPluginVersion returns a boolean if a field has been set. ### GetSealWrap -`func (o *WriteAuthMethodRequest) GetSealWrap() bool` +`func (o *AuthEnableMethodRequest) GetSealWrap() bool` GetSealWrap returns the SealWrap field if non-nil, zero value otherwise. ### GetSealWrapOk -`func (o *WriteAuthMethodRequest) GetSealWrapOk() (*bool, bool)` +`func (o *AuthEnableMethodRequest) GetSealWrapOk() (*bool, bool)` GetSealWrapOk returns a tuple with the SealWrap field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSealWrap -`func (o *WriteAuthMethodRequest) SetSealWrap(v bool)` +`func (o *AuthEnableMethodRequest) SetSealWrap(v bool)` SetSealWrap sets SealWrap field to given value. ### HasSealWrap -`func (o *WriteAuthMethodRequest) HasSealWrap() bool` +`func (o *AuthEnableMethodRequest) HasSealWrap() bool` HasSealWrap returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasSealWrap returns a boolean if a field has been set. ### GetType -`func (o *WriteAuthMethodRequest) GetType() string` +`func (o *AuthEnableMethodRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *WriteAuthMethodRequest) GetTypeOk() (*string, bool)` +`func (o *AuthEnableMethodRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *WriteAuthMethodRequest) SetType(v string)` +`func (o *AuthEnableMethodRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *WriteAuthMethodRequest) HasType() bool` +`func (o *AuthEnableMethodRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/AuthReadConfigurationResponse.md b/docs/AuthReadConfigurationResponse.md new file mode 100644 index 00000000..2e2b7615 --- /dev/null +++ b/docs/AuthReadConfigurationResponse.md @@ -0,0 +1,429 @@ +# AuthReadConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Accessor** | Pointer to **string** | | [optional] +**Config** | Pointer to **map[string]interface{}** | | [optional] +**DeprecationStatus** | Pointer to **string** | | [optional] +**Description** | Pointer to **string** | | [optional] +**ExternalEntropyAccess** | Pointer to **bool** | | [optional] +**Local** | Pointer to **bool** | | [optional] +**Options** | Pointer to **map[string]interface{}** | | [optional] +**PluginVersion** | Pointer to **string** | | [optional] +**RunningPluginVersion** | Pointer to **string** | | [optional] +**RunningSha256** | Pointer to **string** | | [optional] +**SealWrap** | Pointer to **bool** | | [optional] +**Type** | Pointer to **string** | | [optional] +**Uuid** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewAuthReadConfigurationResponse + +`func NewAuthReadConfigurationResponse() *AuthReadConfigurationResponse` + +NewAuthReadConfigurationResponse instantiates a new AuthReadConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewAuthReadConfigurationResponseWithDefaults + +`func NewAuthReadConfigurationResponseWithDefaults() *AuthReadConfigurationResponse` + +NewAuthReadConfigurationResponseWithDefaults instantiates a new AuthReadConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAccessor + +`func (o *AuthReadConfigurationResponse) GetAccessor() string` + +GetAccessor returns the Accessor field if non-nil, zero value otherwise. + +### GetAccessorOk + +`func (o *AuthReadConfigurationResponse) GetAccessorOk() (*string, bool)` + +GetAccessorOk returns a tuple with the Accessor field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAccessor + +`func (o *AuthReadConfigurationResponse) SetAccessor(v string)` + +SetAccessor sets Accessor field to given value. + + +### HasAccessor + +`func (o *AuthReadConfigurationResponse) HasAccessor() bool` + +HasAccessor returns a boolean if a field has been set. + + + + +### GetConfig + +`func (o *AuthReadConfigurationResponse) GetConfig() map[string]interface{}` + +GetConfig returns the Config field if non-nil, zero value otherwise. + +### GetConfigOk + +`func (o *AuthReadConfigurationResponse) GetConfigOk() (*map[string]interface{}, bool)` + +GetConfigOk returns a tuple with the Config field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetConfig + +`func (o *AuthReadConfigurationResponse) SetConfig(v map[string]interface{})` + +SetConfig sets Config field to given value. + + +### HasConfig + +`func (o *AuthReadConfigurationResponse) HasConfig() bool` + +HasConfig returns a boolean if a field has been set. + + + + +### GetDeprecationStatus + +`func (o *AuthReadConfigurationResponse) GetDeprecationStatus() string` + +GetDeprecationStatus returns the DeprecationStatus field if non-nil, zero value otherwise. + +### GetDeprecationStatusOk + +`func (o *AuthReadConfigurationResponse) GetDeprecationStatusOk() (*string, bool)` + +GetDeprecationStatusOk returns a tuple with the DeprecationStatus field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeprecationStatus + +`func (o *AuthReadConfigurationResponse) SetDeprecationStatus(v string)` + +SetDeprecationStatus sets DeprecationStatus field to given value. + + +### HasDeprecationStatus + +`func (o *AuthReadConfigurationResponse) HasDeprecationStatus() bool` + +HasDeprecationStatus returns a boolean if a field has been set. + + + + +### GetDescription + +`func (o *AuthReadConfigurationResponse) GetDescription() string` + +GetDescription returns the Description field if non-nil, zero value otherwise. + +### GetDescriptionOk + +`func (o *AuthReadConfigurationResponse) GetDescriptionOk() (*string, bool)` + +GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDescription + +`func (o *AuthReadConfigurationResponse) SetDescription(v string)` + +SetDescription sets Description field to given value. + + +### HasDescription + +`func (o *AuthReadConfigurationResponse) HasDescription() bool` + +HasDescription returns a boolean if a field has been set. + + + + +### GetExternalEntropyAccess + +`func (o *AuthReadConfigurationResponse) GetExternalEntropyAccess() bool` + +GetExternalEntropyAccess returns the ExternalEntropyAccess field if non-nil, zero value otherwise. + +### GetExternalEntropyAccessOk + +`func (o *AuthReadConfigurationResponse) GetExternalEntropyAccessOk() (*bool, bool)` + +GetExternalEntropyAccessOk returns a tuple with the ExternalEntropyAccess field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExternalEntropyAccess + +`func (o *AuthReadConfigurationResponse) SetExternalEntropyAccess(v bool)` + +SetExternalEntropyAccess sets ExternalEntropyAccess field to given value. + + +### HasExternalEntropyAccess + +`func (o *AuthReadConfigurationResponse) HasExternalEntropyAccess() bool` + +HasExternalEntropyAccess returns a boolean if a field has been set. + + + + +### GetLocal + +`func (o *AuthReadConfigurationResponse) GetLocal() bool` + +GetLocal returns the Local field if non-nil, zero value otherwise. + +### GetLocalOk + +`func (o *AuthReadConfigurationResponse) GetLocalOk() (*bool, bool)` + +GetLocalOk returns a tuple with the Local field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLocal + +`func (o *AuthReadConfigurationResponse) SetLocal(v bool)` + +SetLocal sets Local field to given value. + + +### HasLocal + +`func (o *AuthReadConfigurationResponse) HasLocal() bool` + +HasLocal returns a boolean if a field has been set. + + + + +### GetOptions + +`func (o *AuthReadConfigurationResponse) GetOptions() map[string]interface{}` + +GetOptions returns the Options field if non-nil, zero value otherwise. + +### GetOptionsOk + +`func (o *AuthReadConfigurationResponse) GetOptionsOk() (*map[string]interface{}, bool)` + +GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOptions + +`func (o *AuthReadConfigurationResponse) SetOptions(v map[string]interface{})` + +SetOptions sets Options field to given value. + + +### HasOptions + +`func (o *AuthReadConfigurationResponse) HasOptions() bool` + +HasOptions returns a boolean if a field has been set. + + + + +### GetPluginVersion + +`func (o *AuthReadConfigurationResponse) GetPluginVersion() string` + +GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. + +### GetPluginVersionOk + +`func (o *AuthReadConfigurationResponse) GetPluginVersionOk() (*string, bool)` + +GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPluginVersion + +`func (o *AuthReadConfigurationResponse) SetPluginVersion(v string)` + +SetPluginVersion sets PluginVersion field to given value. + + +### HasPluginVersion + +`func (o *AuthReadConfigurationResponse) HasPluginVersion() bool` + +HasPluginVersion returns a boolean if a field has been set. + + + + +### GetRunningPluginVersion + +`func (o *AuthReadConfigurationResponse) GetRunningPluginVersion() string` + +GetRunningPluginVersion returns the RunningPluginVersion field if non-nil, zero value otherwise. + +### GetRunningPluginVersionOk + +`func (o *AuthReadConfigurationResponse) GetRunningPluginVersionOk() (*string, bool)` + +GetRunningPluginVersionOk returns a tuple with the RunningPluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRunningPluginVersion + +`func (o *AuthReadConfigurationResponse) SetRunningPluginVersion(v string)` + +SetRunningPluginVersion sets RunningPluginVersion field to given value. + + +### HasRunningPluginVersion + +`func (o *AuthReadConfigurationResponse) HasRunningPluginVersion() bool` + +HasRunningPluginVersion returns a boolean if a field has been set. + + + + +### GetRunningSha256 + +`func (o *AuthReadConfigurationResponse) GetRunningSha256() string` + +GetRunningSha256 returns the RunningSha256 field if non-nil, zero value otherwise. + +### GetRunningSha256Ok + +`func (o *AuthReadConfigurationResponse) GetRunningSha256Ok() (*string, bool)` + +GetRunningSha256Ok returns a tuple with the RunningSha256 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRunningSha256 + +`func (o *AuthReadConfigurationResponse) SetRunningSha256(v string)` + +SetRunningSha256 sets RunningSha256 field to given value. + + +### HasRunningSha256 + +`func (o *AuthReadConfigurationResponse) HasRunningSha256() bool` + +HasRunningSha256 returns a boolean if a field has been set. + + + + +### GetSealWrap + +`func (o *AuthReadConfigurationResponse) GetSealWrap() bool` + +GetSealWrap returns the SealWrap field if non-nil, zero value otherwise. + +### GetSealWrapOk + +`func (o *AuthReadConfigurationResponse) GetSealWrapOk() (*bool, bool)` + +GetSealWrapOk returns a tuple with the SealWrap field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSealWrap + +`func (o *AuthReadConfigurationResponse) SetSealWrap(v bool)` + +SetSealWrap sets SealWrap field to given value. + + +### HasSealWrap + +`func (o *AuthReadConfigurationResponse) HasSealWrap() bool` + +HasSealWrap returns a boolean if a field has been set. + + + + +### GetType + +`func (o *AuthReadConfigurationResponse) GetType() string` + +GetType returns the Type field if non-nil, zero value otherwise. + +### GetTypeOk + +`func (o *AuthReadConfigurationResponse) GetTypeOk() (*string, bool)` + +GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetType + +`func (o *AuthReadConfigurationResponse) SetType(v string)` + +SetType sets Type field to given value. + + +### HasType + +`func (o *AuthReadConfigurationResponse) HasType() bool` + +HasType returns a boolean if a field has been set. + + + + +### GetUuid + +`func (o *AuthReadConfigurationResponse) GetUuid() string` + +GetUuid returns the Uuid field if non-nil, zero value otherwise. + +### GetUuidOk + +`func (o *AuthReadConfigurationResponse) GetUuidOk() (*string, bool)` + +GetUuidOk returns a tuple with the Uuid field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUuid + +`func (o *AuthReadConfigurationResponse) SetUuid(v string)` + +SetUuid sets Uuid field to given value. + + +### HasUuid + +`func (o *AuthReadConfigurationResponse) HasUuid() bool` + +HasUuid returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AuthReadTuningInformationResponse.md b/docs/AuthReadTuningInformationResponse.md new file mode 100644 index 00000000..aed95a0b --- /dev/null +++ b/docs/AuthReadTuningInformationResponse.md @@ -0,0 +1,579 @@ +# AuthReadTuningInformationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AllowedManagedKeys** | Pointer to **[]string** | | [optional] +**AllowedResponseHeaders** | Pointer to **[]string** | | [optional] +**AuditNonHmacRequestKeys** | Pointer to **[]string** | | [optional] +**AuditNonHmacResponseKeys** | Pointer to **[]string** | | [optional] +**DefaultLeaseTtl** | Pointer to **int32** | | [optional] +**Description** | Pointer to **string** | | [optional] +**ExternalEntropyAccess** | Pointer to **bool** | | [optional] +**ForceNoCache** | Pointer to **bool** | | [optional] +**ListingVisibility** | Pointer to **string** | | [optional] +**MaxLeaseTtl** | Pointer to **int32** | | [optional] +**Options** | Pointer to **map[string]interface{}** | | [optional] +**PassthroughRequestHeaders** | Pointer to **[]string** | | [optional] +**PluginVersion** | Pointer to **string** | | [optional] +**TokenType** | Pointer to **string** | | [optional] +**UserLockoutCounterResetDuration** | Pointer to **int64** | | [optional] +**UserLockoutDisable** | Pointer to **bool** | | [optional] +**UserLockoutDuration** | Pointer to **int64** | | [optional] +**UserLockoutThreshold** | Pointer to **int64** | | [optional] + + + +## Methods + + +### NewAuthReadTuningInformationResponse + +`func NewAuthReadTuningInformationResponse() *AuthReadTuningInformationResponse` + +NewAuthReadTuningInformationResponse instantiates a new AuthReadTuningInformationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewAuthReadTuningInformationResponseWithDefaults + +`func NewAuthReadTuningInformationResponseWithDefaults() *AuthReadTuningInformationResponse` + +NewAuthReadTuningInformationResponseWithDefaults instantiates a new AuthReadTuningInformationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAllowedManagedKeys + +`func (o *AuthReadTuningInformationResponse) GetAllowedManagedKeys() []string` + +GetAllowedManagedKeys returns the AllowedManagedKeys field if non-nil, zero value otherwise. + +### GetAllowedManagedKeysOk + +`func (o *AuthReadTuningInformationResponse) GetAllowedManagedKeysOk() (*[]string, bool)` + +GetAllowedManagedKeysOk returns a tuple with the AllowedManagedKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedManagedKeys + +`func (o *AuthReadTuningInformationResponse) SetAllowedManagedKeys(v []string)` + +SetAllowedManagedKeys sets AllowedManagedKeys field to given value. + + +### HasAllowedManagedKeys + +`func (o *AuthReadTuningInformationResponse) HasAllowedManagedKeys() bool` + +HasAllowedManagedKeys returns a boolean if a field has been set. + + + + +### GetAllowedResponseHeaders + +`func (o *AuthReadTuningInformationResponse) GetAllowedResponseHeaders() []string` + +GetAllowedResponseHeaders returns the AllowedResponseHeaders field if non-nil, zero value otherwise. + +### GetAllowedResponseHeadersOk + +`func (o *AuthReadTuningInformationResponse) GetAllowedResponseHeadersOk() (*[]string, bool)` + +GetAllowedResponseHeadersOk returns a tuple with the AllowedResponseHeaders field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedResponseHeaders + +`func (o *AuthReadTuningInformationResponse) SetAllowedResponseHeaders(v []string)` + +SetAllowedResponseHeaders sets AllowedResponseHeaders field to given value. + + +### HasAllowedResponseHeaders + +`func (o *AuthReadTuningInformationResponse) HasAllowedResponseHeaders() bool` + +HasAllowedResponseHeaders returns a boolean if a field has been set. + + + + +### GetAuditNonHmacRequestKeys + +`func (o *AuthReadTuningInformationResponse) GetAuditNonHmacRequestKeys() []string` + +GetAuditNonHmacRequestKeys returns the AuditNonHmacRequestKeys field if non-nil, zero value otherwise. + +### GetAuditNonHmacRequestKeysOk + +`func (o *AuthReadTuningInformationResponse) GetAuditNonHmacRequestKeysOk() (*[]string, bool)` + +GetAuditNonHmacRequestKeysOk returns a tuple with the AuditNonHmacRequestKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAuditNonHmacRequestKeys + +`func (o *AuthReadTuningInformationResponse) SetAuditNonHmacRequestKeys(v []string)` + +SetAuditNonHmacRequestKeys sets AuditNonHmacRequestKeys field to given value. + + +### HasAuditNonHmacRequestKeys + +`func (o *AuthReadTuningInformationResponse) HasAuditNonHmacRequestKeys() bool` + +HasAuditNonHmacRequestKeys returns a boolean if a field has been set. + + + + +### GetAuditNonHmacResponseKeys + +`func (o *AuthReadTuningInformationResponse) GetAuditNonHmacResponseKeys() []string` + +GetAuditNonHmacResponseKeys returns the AuditNonHmacResponseKeys field if non-nil, zero value otherwise. + +### GetAuditNonHmacResponseKeysOk + +`func (o *AuthReadTuningInformationResponse) GetAuditNonHmacResponseKeysOk() (*[]string, bool)` + +GetAuditNonHmacResponseKeysOk returns a tuple with the AuditNonHmacResponseKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAuditNonHmacResponseKeys + +`func (o *AuthReadTuningInformationResponse) SetAuditNonHmacResponseKeys(v []string)` + +SetAuditNonHmacResponseKeys sets AuditNonHmacResponseKeys field to given value. + + +### HasAuditNonHmacResponseKeys + +`func (o *AuthReadTuningInformationResponse) HasAuditNonHmacResponseKeys() bool` + +HasAuditNonHmacResponseKeys returns a boolean if a field has been set. + + + + +### GetDefaultLeaseTtl + +`func (o *AuthReadTuningInformationResponse) GetDefaultLeaseTtl() int32` + +GetDefaultLeaseTtl returns the DefaultLeaseTtl field if non-nil, zero value otherwise. + +### GetDefaultLeaseTtlOk + +`func (o *AuthReadTuningInformationResponse) GetDefaultLeaseTtlOk() (*int32, bool)` + +GetDefaultLeaseTtlOk returns a tuple with the DefaultLeaseTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefaultLeaseTtl + +`func (o *AuthReadTuningInformationResponse) SetDefaultLeaseTtl(v int32)` + +SetDefaultLeaseTtl sets DefaultLeaseTtl field to given value. + + +### HasDefaultLeaseTtl + +`func (o *AuthReadTuningInformationResponse) HasDefaultLeaseTtl() bool` + +HasDefaultLeaseTtl returns a boolean if a field has been set. + + + + +### GetDescription + +`func (o *AuthReadTuningInformationResponse) GetDescription() string` + +GetDescription returns the Description field if non-nil, zero value otherwise. + +### GetDescriptionOk + +`func (o *AuthReadTuningInformationResponse) GetDescriptionOk() (*string, bool)` + +GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDescription + +`func (o *AuthReadTuningInformationResponse) SetDescription(v string)` + +SetDescription sets Description field to given value. + + +### HasDescription + +`func (o *AuthReadTuningInformationResponse) HasDescription() bool` + +HasDescription returns a boolean if a field has been set. + + + + +### GetExternalEntropyAccess + +`func (o *AuthReadTuningInformationResponse) GetExternalEntropyAccess() bool` + +GetExternalEntropyAccess returns the ExternalEntropyAccess field if non-nil, zero value otherwise. + +### GetExternalEntropyAccessOk + +`func (o *AuthReadTuningInformationResponse) GetExternalEntropyAccessOk() (*bool, bool)` + +GetExternalEntropyAccessOk returns a tuple with the ExternalEntropyAccess field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExternalEntropyAccess + +`func (o *AuthReadTuningInformationResponse) SetExternalEntropyAccess(v bool)` + +SetExternalEntropyAccess sets ExternalEntropyAccess field to given value. + + +### HasExternalEntropyAccess + +`func (o *AuthReadTuningInformationResponse) HasExternalEntropyAccess() bool` + +HasExternalEntropyAccess returns a boolean if a field has been set. + + + + +### GetForceNoCache + +`func (o *AuthReadTuningInformationResponse) GetForceNoCache() bool` + +GetForceNoCache returns the ForceNoCache field if non-nil, zero value otherwise. + +### GetForceNoCacheOk + +`func (o *AuthReadTuningInformationResponse) GetForceNoCacheOk() (*bool, bool)` + +GetForceNoCacheOk returns a tuple with the ForceNoCache field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetForceNoCache + +`func (o *AuthReadTuningInformationResponse) SetForceNoCache(v bool)` + +SetForceNoCache sets ForceNoCache field to given value. + + +### HasForceNoCache + +`func (o *AuthReadTuningInformationResponse) HasForceNoCache() bool` + +HasForceNoCache returns a boolean if a field has been set. + + + + +### GetListingVisibility + +`func (o *AuthReadTuningInformationResponse) GetListingVisibility() string` + +GetListingVisibility returns the ListingVisibility field if non-nil, zero value otherwise. + +### GetListingVisibilityOk + +`func (o *AuthReadTuningInformationResponse) GetListingVisibilityOk() (*string, bool)` + +GetListingVisibilityOk returns a tuple with the ListingVisibility field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetListingVisibility + +`func (o *AuthReadTuningInformationResponse) SetListingVisibility(v string)` + +SetListingVisibility sets ListingVisibility field to given value. + + +### HasListingVisibility + +`func (o *AuthReadTuningInformationResponse) HasListingVisibility() bool` + +HasListingVisibility returns a boolean if a field has been set. + + + + +### GetMaxLeaseTtl + +`func (o *AuthReadTuningInformationResponse) GetMaxLeaseTtl() int32` + +GetMaxLeaseTtl returns the MaxLeaseTtl field if non-nil, zero value otherwise. + +### GetMaxLeaseTtlOk + +`func (o *AuthReadTuningInformationResponse) GetMaxLeaseTtlOk() (*int32, bool)` + +GetMaxLeaseTtlOk returns a tuple with the MaxLeaseTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxLeaseTtl + +`func (o *AuthReadTuningInformationResponse) SetMaxLeaseTtl(v int32)` + +SetMaxLeaseTtl sets MaxLeaseTtl field to given value. + + +### HasMaxLeaseTtl + +`func (o *AuthReadTuningInformationResponse) HasMaxLeaseTtl() bool` + +HasMaxLeaseTtl returns a boolean if a field has been set. + + + + +### GetOptions + +`func (o *AuthReadTuningInformationResponse) GetOptions() map[string]interface{}` + +GetOptions returns the Options field if non-nil, zero value otherwise. + +### GetOptionsOk + +`func (o *AuthReadTuningInformationResponse) GetOptionsOk() (*map[string]interface{}, bool)` + +GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOptions + +`func (o *AuthReadTuningInformationResponse) SetOptions(v map[string]interface{})` + +SetOptions sets Options field to given value. + + +### HasOptions + +`func (o *AuthReadTuningInformationResponse) HasOptions() bool` + +HasOptions returns a boolean if a field has been set. + + + + +### GetPassthroughRequestHeaders + +`func (o *AuthReadTuningInformationResponse) GetPassthroughRequestHeaders() []string` + +GetPassthroughRequestHeaders returns the PassthroughRequestHeaders field if non-nil, zero value otherwise. + +### GetPassthroughRequestHeadersOk + +`func (o *AuthReadTuningInformationResponse) GetPassthroughRequestHeadersOk() (*[]string, bool)` + +GetPassthroughRequestHeadersOk returns a tuple with the PassthroughRequestHeaders field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPassthroughRequestHeaders + +`func (o *AuthReadTuningInformationResponse) SetPassthroughRequestHeaders(v []string)` + +SetPassthroughRequestHeaders sets PassthroughRequestHeaders field to given value. + + +### HasPassthroughRequestHeaders + +`func (o *AuthReadTuningInformationResponse) HasPassthroughRequestHeaders() bool` + +HasPassthroughRequestHeaders returns a boolean if a field has been set. + + + + +### GetPluginVersion + +`func (o *AuthReadTuningInformationResponse) GetPluginVersion() string` + +GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. + +### GetPluginVersionOk + +`func (o *AuthReadTuningInformationResponse) GetPluginVersionOk() (*string, bool)` + +GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPluginVersion + +`func (o *AuthReadTuningInformationResponse) SetPluginVersion(v string)` + +SetPluginVersion sets PluginVersion field to given value. + + +### HasPluginVersion + +`func (o *AuthReadTuningInformationResponse) HasPluginVersion() bool` + +HasPluginVersion returns a boolean if a field has been set. + + + + +### GetTokenType + +`func (o *AuthReadTuningInformationResponse) GetTokenType() string` + +GetTokenType returns the TokenType field if non-nil, zero value otherwise. + +### GetTokenTypeOk + +`func (o *AuthReadTuningInformationResponse) GetTokenTypeOk() (*string, bool)` + +GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTokenType + +`func (o *AuthReadTuningInformationResponse) SetTokenType(v string)` + +SetTokenType sets TokenType field to given value. + + +### HasTokenType + +`func (o *AuthReadTuningInformationResponse) HasTokenType() bool` + +HasTokenType returns a boolean if a field has been set. + + + + +### GetUserLockoutCounterResetDuration + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutCounterResetDuration() int64` + +GetUserLockoutCounterResetDuration returns the UserLockoutCounterResetDuration field if non-nil, zero value otherwise. + +### GetUserLockoutCounterResetDurationOk + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutCounterResetDurationOk() (*int64, bool)` + +GetUserLockoutCounterResetDurationOk returns a tuple with the UserLockoutCounterResetDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutCounterResetDuration + +`func (o *AuthReadTuningInformationResponse) SetUserLockoutCounterResetDuration(v int64)` + +SetUserLockoutCounterResetDuration sets UserLockoutCounterResetDuration field to given value. + + +### HasUserLockoutCounterResetDuration + +`func (o *AuthReadTuningInformationResponse) HasUserLockoutCounterResetDuration() bool` + +HasUserLockoutCounterResetDuration returns a boolean if a field has been set. + + + + +### GetUserLockoutDisable + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutDisable() bool` + +GetUserLockoutDisable returns the UserLockoutDisable field if non-nil, zero value otherwise. + +### GetUserLockoutDisableOk + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutDisableOk() (*bool, bool)` + +GetUserLockoutDisableOk returns a tuple with the UserLockoutDisable field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutDisable + +`func (o *AuthReadTuningInformationResponse) SetUserLockoutDisable(v bool)` + +SetUserLockoutDisable sets UserLockoutDisable field to given value. + + +### HasUserLockoutDisable + +`func (o *AuthReadTuningInformationResponse) HasUserLockoutDisable() bool` + +HasUserLockoutDisable returns a boolean if a field has been set. + + + + +### GetUserLockoutDuration + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutDuration() int64` + +GetUserLockoutDuration returns the UserLockoutDuration field if non-nil, zero value otherwise. + +### GetUserLockoutDurationOk + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutDurationOk() (*int64, bool)` + +GetUserLockoutDurationOk returns a tuple with the UserLockoutDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutDuration + +`func (o *AuthReadTuningInformationResponse) SetUserLockoutDuration(v int64)` + +SetUserLockoutDuration sets UserLockoutDuration field to given value. + + +### HasUserLockoutDuration + +`func (o *AuthReadTuningInformationResponse) HasUserLockoutDuration() bool` + +HasUserLockoutDuration returns a boolean if a field has been set. + + + + +### GetUserLockoutThreshold + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutThreshold() int64` + +GetUserLockoutThreshold returns the UserLockoutThreshold field if non-nil, zero value otherwise. + +### GetUserLockoutThresholdOk + +`func (o *AuthReadTuningInformationResponse) GetUserLockoutThresholdOk() (*int64, bool)` + +GetUserLockoutThresholdOk returns a tuple with the UserLockoutThreshold field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutThreshold + +`func (o *AuthReadTuningInformationResponse) SetUserLockoutThreshold(v int64)` + +SetUserLockoutThreshold sets UserLockoutThreshold field to given value. + + +### HasUserLockoutThreshold + +`func (o *AuthReadTuningInformationResponse) HasUserLockoutThreshold() bool` + +HasUserLockoutThreshold returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteAuthMethodTuneRequest.md b/docs/AuthTuneConfigurationParametersRequest.md similarity index 64% rename from docs/WriteAuthMethodTuneRequest.md rename to docs/AuthTuneConfigurationParametersRequest.md index c5ff78e2..999e9210 100644 --- a/docs/WriteAuthMethodTuneRequest.md +++ b/docs/AuthTuneConfigurationParametersRequest.md @@ -1,4 +1,4 @@ -# WriteAuthMethodTuneRequest +# AuthTuneConfigurationParametersRequest ## Properties @@ -23,47 +23,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteAuthMethodTuneRequest +### NewAuthTuneConfigurationParametersRequest -`func NewWriteAuthMethodTuneRequest() *WriteAuthMethodTuneRequest` +`func NewAuthTuneConfigurationParametersRequest() *AuthTuneConfigurationParametersRequest` -NewWriteAuthMethodTuneRequest instantiates a new WriteAuthMethodTuneRequest object +NewAuthTuneConfigurationParametersRequest instantiates a new AuthTuneConfigurationParametersRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteAuthMethodTuneRequestWithDefaults +### NewAuthTuneConfigurationParametersRequestWithDefaults -`func NewWriteAuthMethodTuneRequestWithDefaults() *WriteAuthMethodTuneRequest` +`func NewAuthTuneConfigurationParametersRequestWithDefaults() *AuthTuneConfigurationParametersRequest` -NewWriteAuthMethodTuneRequestWithDefaults instantiates a new WriteAuthMethodTuneRequest object +NewAuthTuneConfigurationParametersRequestWithDefaults instantiates a new AuthTuneConfigurationParametersRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowedResponseHeaders -`func (o *WriteAuthMethodTuneRequest) GetAllowedResponseHeaders() []string` +`func (o *AuthTuneConfigurationParametersRequest) GetAllowedResponseHeaders() []string` GetAllowedResponseHeaders returns the AllowedResponseHeaders field if non-nil, zero value otherwise. ### GetAllowedResponseHeadersOk -`func (o *WriteAuthMethodTuneRequest) GetAllowedResponseHeadersOk() (*[]string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetAllowedResponseHeadersOk() (*[]string, bool)` GetAllowedResponseHeadersOk returns a tuple with the AllowedResponseHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedResponseHeaders -`func (o *WriteAuthMethodTuneRequest) SetAllowedResponseHeaders(v []string)` +`func (o *AuthTuneConfigurationParametersRequest) SetAllowedResponseHeaders(v []string)` SetAllowedResponseHeaders sets AllowedResponseHeaders field to given value. ### HasAllowedResponseHeaders -`func (o *WriteAuthMethodTuneRequest) HasAllowedResponseHeaders() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasAllowedResponseHeaders() bool` HasAllowedResponseHeaders returns a boolean if a field has been set. @@ -72,27 +72,27 @@ HasAllowedResponseHeaders returns a boolean if a field has been set. ### GetAuditNonHmacRequestKeys -`func (o *WriteAuthMethodTuneRequest) GetAuditNonHmacRequestKeys() []string` +`func (o *AuthTuneConfigurationParametersRequest) GetAuditNonHmacRequestKeys() []string` GetAuditNonHmacRequestKeys returns the AuditNonHmacRequestKeys field if non-nil, zero value otherwise. ### GetAuditNonHmacRequestKeysOk -`func (o *WriteAuthMethodTuneRequest) GetAuditNonHmacRequestKeysOk() (*[]string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetAuditNonHmacRequestKeysOk() (*[]string, bool)` GetAuditNonHmacRequestKeysOk returns a tuple with the AuditNonHmacRequestKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAuditNonHmacRequestKeys -`func (o *WriteAuthMethodTuneRequest) SetAuditNonHmacRequestKeys(v []string)` +`func (o *AuthTuneConfigurationParametersRequest) SetAuditNonHmacRequestKeys(v []string)` SetAuditNonHmacRequestKeys sets AuditNonHmacRequestKeys field to given value. ### HasAuditNonHmacRequestKeys -`func (o *WriteAuthMethodTuneRequest) HasAuditNonHmacRequestKeys() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasAuditNonHmacRequestKeys() bool` HasAuditNonHmacRequestKeys returns a boolean if a field has been set. @@ -101,27 +101,27 @@ HasAuditNonHmacRequestKeys returns a boolean if a field has been set. ### GetAuditNonHmacResponseKeys -`func (o *WriteAuthMethodTuneRequest) GetAuditNonHmacResponseKeys() []string` +`func (o *AuthTuneConfigurationParametersRequest) GetAuditNonHmacResponseKeys() []string` GetAuditNonHmacResponseKeys returns the AuditNonHmacResponseKeys field if non-nil, zero value otherwise. ### GetAuditNonHmacResponseKeysOk -`func (o *WriteAuthMethodTuneRequest) GetAuditNonHmacResponseKeysOk() (*[]string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetAuditNonHmacResponseKeysOk() (*[]string, bool)` GetAuditNonHmacResponseKeysOk returns a tuple with the AuditNonHmacResponseKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAuditNonHmacResponseKeys -`func (o *WriteAuthMethodTuneRequest) SetAuditNonHmacResponseKeys(v []string)` +`func (o *AuthTuneConfigurationParametersRequest) SetAuditNonHmacResponseKeys(v []string)` SetAuditNonHmacResponseKeys sets AuditNonHmacResponseKeys field to given value. ### HasAuditNonHmacResponseKeys -`func (o *WriteAuthMethodTuneRequest) HasAuditNonHmacResponseKeys() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasAuditNonHmacResponseKeys() bool` HasAuditNonHmacResponseKeys returns a boolean if a field has been set. @@ -130,27 +130,27 @@ HasAuditNonHmacResponseKeys returns a boolean if a field has been set. ### GetDefaultLeaseTtl -`func (o *WriteAuthMethodTuneRequest) GetDefaultLeaseTtl() string` +`func (o *AuthTuneConfigurationParametersRequest) GetDefaultLeaseTtl() string` GetDefaultLeaseTtl returns the DefaultLeaseTtl field if non-nil, zero value otherwise. ### GetDefaultLeaseTtlOk -`func (o *WriteAuthMethodTuneRequest) GetDefaultLeaseTtlOk() (*string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetDefaultLeaseTtlOk() (*string, bool)` GetDefaultLeaseTtlOk returns a tuple with the DefaultLeaseTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultLeaseTtl -`func (o *WriteAuthMethodTuneRequest) SetDefaultLeaseTtl(v string)` +`func (o *AuthTuneConfigurationParametersRequest) SetDefaultLeaseTtl(v string)` SetDefaultLeaseTtl sets DefaultLeaseTtl field to given value. ### HasDefaultLeaseTtl -`func (o *WriteAuthMethodTuneRequest) HasDefaultLeaseTtl() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasDefaultLeaseTtl() bool` HasDefaultLeaseTtl returns a boolean if a field has been set. @@ -159,27 +159,27 @@ HasDefaultLeaseTtl returns a boolean if a field has been set. ### GetDescription -`func (o *WriteAuthMethodTuneRequest) GetDescription() string` +`func (o *AuthTuneConfigurationParametersRequest) GetDescription() string` GetDescription returns the Description field if non-nil, zero value otherwise. ### GetDescriptionOk -`func (o *WriteAuthMethodTuneRequest) GetDescriptionOk() (*string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetDescriptionOk() (*string, bool)` GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDescription -`func (o *WriteAuthMethodTuneRequest) SetDescription(v string)` +`func (o *AuthTuneConfigurationParametersRequest) SetDescription(v string)` SetDescription sets Description field to given value. ### HasDescription -`func (o *WriteAuthMethodTuneRequest) HasDescription() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasDescription() bool` HasDescription returns a boolean if a field has been set. @@ -188,27 +188,27 @@ HasDescription returns a boolean if a field has been set. ### GetListingVisibility -`func (o *WriteAuthMethodTuneRequest) GetListingVisibility() string` +`func (o *AuthTuneConfigurationParametersRequest) GetListingVisibility() string` GetListingVisibility returns the ListingVisibility field if non-nil, zero value otherwise. ### GetListingVisibilityOk -`func (o *WriteAuthMethodTuneRequest) GetListingVisibilityOk() (*string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetListingVisibilityOk() (*string, bool)` GetListingVisibilityOk returns a tuple with the ListingVisibility field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetListingVisibility -`func (o *WriteAuthMethodTuneRequest) SetListingVisibility(v string)` +`func (o *AuthTuneConfigurationParametersRequest) SetListingVisibility(v string)` SetListingVisibility sets ListingVisibility field to given value. ### HasListingVisibility -`func (o *WriteAuthMethodTuneRequest) HasListingVisibility() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasListingVisibility() bool` HasListingVisibility returns a boolean if a field has been set. @@ -217,27 +217,27 @@ HasListingVisibility returns a boolean if a field has been set. ### GetMaxLeaseTtl -`func (o *WriteAuthMethodTuneRequest) GetMaxLeaseTtl() string` +`func (o *AuthTuneConfigurationParametersRequest) GetMaxLeaseTtl() string` GetMaxLeaseTtl returns the MaxLeaseTtl field if non-nil, zero value otherwise. ### GetMaxLeaseTtlOk -`func (o *WriteAuthMethodTuneRequest) GetMaxLeaseTtlOk() (*string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetMaxLeaseTtlOk() (*string, bool)` GetMaxLeaseTtlOk returns a tuple with the MaxLeaseTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxLeaseTtl -`func (o *WriteAuthMethodTuneRequest) SetMaxLeaseTtl(v string)` +`func (o *AuthTuneConfigurationParametersRequest) SetMaxLeaseTtl(v string)` SetMaxLeaseTtl sets MaxLeaseTtl field to given value. ### HasMaxLeaseTtl -`func (o *WriteAuthMethodTuneRequest) HasMaxLeaseTtl() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasMaxLeaseTtl() bool` HasMaxLeaseTtl returns a boolean if a field has been set. @@ -246,27 +246,27 @@ HasMaxLeaseTtl returns a boolean if a field has been set. ### GetOptions -`func (o *WriteAuthMethodTuneRequest) GetOptions() map[string]interface{}` +`func (o *AuthTuneConfigurationParametersRequest) GetOptions() map[string]interface{}` GetOptions returns the Options field if non-nil, zero value otherwise. ### GetOptionsOk -`func (o *WriteAuthMethodTuneRequest) GetOptionsOk() (*map[string]interface{}, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetOptionsOk() (*map[string]interface{}, bool)` GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOptions -`func (o *WriteAuthMethodTuneRequest) SetOptions(v map[string]interface{})` +`func (o *AuthTuneConfigurationParametersRequest) SetOptions(v map[string]interface{})` SetOptions sets Options field to given value. ### HasOptions -`func (o *WriteAuthMethodTuneRequest) HasOptions() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasOptions() bool` HasOptions returns a boolean if a field has been set. @@ -275,27 +275,27 @@ HasOptions returns a boolean if a field has been set. ### GetPassthroughRequestHeaders -`func (o *WriteAuthMethodTuneRequest) GetPassthroughRequestHeaders() []string` +`func (o *AuthTuneConfigurationParametersRequest) GetPassthroughRequestHeaders() []string` GetPassthroughRequestHeaders returns the PassthroughRequestHeaders field if non-nil, zero value otherwise. ### GetPassthroughRequestHeadersOk -`func (o *WriteAuthMethodTuneRequest) GetPassthroughRequestHeadersOk() (*[]string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetPassthroughRequestHeadersOk() (*[]string, bool)` GetPassthroughRequestHeadersOk returns a tuple with the PassthroughRequestHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPassthroughRequestHeaders -`func (o *WriteAuthMethodTuneRequest) SetPassthroughRequestHeaders(v []string)` +`func (o *AuthTuneConfigurationParametersRequest) SetPassthroughRequestHeaders(v []string)` SetPassthroughRequestHeaders sets PassthroughRequestHeaders field to given value. ### HasPassthroughRequestHeaders -`func (o *WriteAuthMethodTuneRequest) HasPassthroughRequestHeaders() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasPassthroughRequestHeaders() bool` HasPassthroughRequestHeaders returns a boolean if a field has been set. @@ -304,27 +304,27 @@ HasPassthroughRequestHeaders returns a boolean if a field has been set. ### GetPluginVersion -`func (o *WriteAuthMethodTuneRequest) GetPluginVersion() string` +`func (o *AuthTuneConfigurationParametersRequest) GetPluginVersion() string` GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. ### GetPluginVersionOk -`func (o *WriteAuthMethodTuneRequest) GetPluginVersionOk() (*string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetPluginVersionOk() (*string, bool)` GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginVersion -`func (o *WriteAuthMethodTuneRequest) SetPluginVersion(v string)` +`func (o *AuthTuneConfigurationParametersRequest) SetPluginVersion(v string)` SetPluginVersion sets PluginVersion field to given value. ### HasPluginVersion -`func (o *WriteAuthMethodTuneRequest) HasPluginVersion() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasPluginVersion() bool` HasPluginVersion returns a boolean if a field has been set. @@ -333,27 +333,27 @@ HasPluginVersion returns a boolean if a field has been set. ### GetTokenType -`func (o *WriteAuthMethodTuneRequest) GetTokenType() string` +`func (o *AuthTuneConfigurationParametersRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *WriteAuthMethodTuneRequest) GetTokenTypeOk() (*string, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *WriteAuthMethodTuneRequest) SetTokenType(v string)` +`func (o *AuthTuneConfigurationParametersRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *WriteAuthMethodTuneRequest) HasTokenType() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -362,27 +362,27 @@ HasTokenType returns a boolean if a field has been set. ### GetUserLockoutConfig -`func (o *WriteAuthMethodTuneRequest) GetUserLockoutConfig() map[string]interface{}` +`func (o *AuthTuneConfigurationParametersRequest) GetUserLockoutConfig() map[string]interface{}` GetUserLockoutConfig returns the UserLockoutConfig field if non-nil, zero value otherwise. ### GetUserLockoutConfigOk -`func (o *WriteAuthMethodTuneRequest) GetUserLockoutConfigOk() (*map[string]interface{}, bool)` +`func (o *AuthTuneConfigurationParametersRequest) GetUserLockoutConfigOk() (*map[string]interface{}, bool)` GetUserLockoutConfigOk returns a tuple with the UserLockoutConfig field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserLockoutConfig -`func (o *WriteAuthMethodTuneRequest) SetUserLockoutConfig(v map[string]interface{})` +`func (o *AuthTuneConfigurationParametersRequest) SetUserLockoutConfig(v map[string]interface{})` SetUserLockoutConfig sets UserLockoutConfig field to given value. ### HasUserLockoutConfig -`func (o *WriteAuthMethodTuneRequest) HasUserLockoutConfig() bool` +`func (o *AuthTuneConfigurationParametersRequest) HasUserLockoutConfig() bool` HasUserLockoutConfig returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteCertificateRequest.md b/docs/AwsConfigureCertificateRequest.md similarity index 66% rename from docs/AWSConfigWriteCertificateRequest.md rename to docs/AwsConfigureCertificateRequest.md index 5df93128..b06399b8 100644 --- a/docs/AWSConfigWriteCertificateRequest.md +++ b/docs/AwsConfigureCertificateRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteCertificateRequest +# AwsConfigureCertificateRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteCertificateRequest +### NewAwsConfigureCertificateRequest -`func NewAWSConfigWriteCertificateRequest() *AWSConfigWriteCertificateRequest` +`func NewAwsConfigureCertificateRequest() *AwsConfigureCertificateRequest` -NewAWSConfigWriteCertificateRequest instantiates a new AWSConfigWriteCertificateRequest object +NewAwsConfigureCertificateRequest instantiates a new AwsConfigureCertificateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteCertificateRequestWithDefaults +### NewAwsConfigureCertificateRequestWithDefaults -`func NewAWSConfigWriteCertificateRequestWithDefaults() *AWSConfigWriteCertificateRequest` +`func NewAwsConfigureCertificateRequestWithDefaults() *AwsConfigureCertificateRequest` -NewAWSConfigWriteCertificateRequestWithDefaults instantiates a new AWSConfigWriteCertificateRequest object +NewAwsConfigureCertificateRequestWithDefaults instantiates a new AwsConfigureCertificateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAwsPublicCert -`func (o *AWSConfigWriteCertificateRequest) GetAwsPublicCert() string` +`func (o *AwsConfigureCertificateRequest) GetAwsPublicCert() string` GetAwsPublicCert returns the AwsPublicCert field if non-nil, zero value otherwise. ### GetAwsPublicCertOk -`func (o *AWSConfigWriteCertificateRequest) GetAwsPublicCertOk() (*string, bool)` +`func (o *AwsConfigureCertificateRequest) GetAwsPublicCertOk() (*string, bool)` GetAwsPublicCertOk returns a tuple with the AwsPublicCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAwsPublicCert -`func (o *AWSConfigWriteCertificateRequest) SetAwsPublicCert(v string)` +`func (o *AwsConfigureCertificateRequest) SetAwsPublicCert(v string)` SetAwsPublicCert sets AwsPublicCert field to given value. ### HasAwsPublicCert -`func (o *AWSConfigWriteCertificateRequest) HasAwsPublicCert() bool` +`func (o *AwsConfigureCertificateRequest) HasAwsPublicCert() bool` HasAwsPublicCert returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasAwsPublicCert returns a boolean if a field has been set. ### GetType -`func (o *AWSConfigWriteCertificateRequest) GetType() string` +`func (o *AwsConfigureCertificateRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *AWSConfigWriteCertificateRequest) GetTypeOk() (*string, bool)` +`func (o *AwsConfigureCertificateRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *AWSConfigWriteCertificateRequest) SetType(v string)` +`func (o *AwsConfigureCertificateRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *AWSConfigWriteCertificateRequest) HasType() bool` +`func (o *AwsConfigureCertificateRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteClientRequest.md b/docs/AwsConfigureClientRequest.md similarity index 67% rename from docs/AWSConfigWriteClientRequest.md rename to docs/AwsConfigureClientRequest.md index add6c9af..a8602bfd 100644 --- a/docs/AWSConfigWriteClientRequest.md +++ b/docs/AwsConfigureClientRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteClientRequest +# AwsConfigureClientRequest ## Properties @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteClientRequest +### NewAwsConfigureClientRequest -`func NewAWSConfigWriteClientRequest() *AWSConfigWriteClientRequest` +`func NewAwsConfigureClientRequest() *AwsConfigureClientRequest` -NewAWSConfigWriteClientRequest instantiates a new AWSConfigWriteClientRequest object +NewAwsConfigureClientRequest instantiates a new AwsConfigureClientRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteClientRequestWithDefaults +### NewAwsConfigureClientRequestWithDefaults -`func NewAWSConfigWriteClientRequestWithDefaults() *AWSConfigWriteClientRequest` +`func NewAwsConfigureClientRequestWithDefaults() *AwsConfigureClientRequest` -NewAWSConfigWriteClientRequestWithDefaults instantiates a new AWSConfigWriteClientRequest object +NewAwsConfigureClientRequestWithDefaults instantiates a new AwsConfigureClientRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAccessKey -`func (o *AWSConfigWriteClientRequest) GetAccessKey() string` +`func (o *AwsConfigureClientRequest) GetAccessKey() string` GetAccessKey returns the AccessKey field if non-nil, zero value otherwise. ### GetAccessKeyOk -`func (o *AWSConfigWriteClientRequest) GetAccessKeyOk() (*string, bool)` +`func (o *AwsConfigureClientRequest) GetAccessKeyOk() (*string, bool)` GetAccessKeyOk returns a tuple with the AccessKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAccessKey -`func (o *AWSConfigWriteClientRequest) SetAccessKey(v string)` +`func (o *AwsConfigureClientRequest) SetAccessKey(v string)` SetAccessKey sets AccessKey field to given value. ### HasAccessKey -`func (o *AWSConfigWriteClientRequest) HasAccessKey() bool` +`func (o *AwsConfigureClientRequest) HasAccessKey() bool` HasAccessKey returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasAccessKey returns a boolean if a field has been set. ### GetAllowedStsHeaderValues -`func (o *AWSConfigWriteClientRequest) GetAllowedStsHeaderValues() []string` +`func (o *AwsConfigureClientRequest) GetAllowedStsHeaderValues() []string` GetAllowedStsHeaderValues returns the AllowedStsHeaderValues field if non-nil, zero value otherwise. ### GetAllowedStsHeaderValuesOk -`func (o *AWSConfigWriteClientRequest) GetAllowedStsHeaderValuesOk() (*[]string, bool)` +`func (o *AwsConfigureClientRequest) GetAllowedStsHeaderValuesOk() (*[]string, bool)` GetAllowedStsHeaderValuesOk returns a tuple with the AllowedStsHeaderValues field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedStsHeaderValues -`func (o *AWSConfigWriteClientRequest) SetAllowedStsHeaderValues(v []string)` +`func (o *AwsConfigureClientRequest) SetAllowedStsHeaderValues(v []string)` SetAllowedStsHeaderValues sets AllowedStsHeaderValues field to given value. ### HasAllowedStsHeaderValues -`func (o *AWSConfigWriteClientRequest) HasAllowedStsHeaderValues() bool` +`func (o *AwsConfigureClientRequest) HasAllowedStsHeaderValues() bool` HasAllowedStsHeaderValues returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasAllowedStsHeaderValues returns a boolean if a field has been set. ### GetEndpoint -`func (o *AWSConfigWriteClientRequest) GetEndpoint() string` +`func (o *AwsConfigureClientRequest) GetEndpoint() string` GetEndpoint returns the Endpoint field if non-nil, zero value otherwise. ### GetEndpointOk -`func (o *AWSConfigWriteClientRequest) GetEndpointOk() (*string, bool)` +`func (o *AwsConfigureClientRequest) GetEndpointOk() (*string, bool)` GetEndpointOk returns a tuple with the Endpoint field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEndpoint -`func (o *AWSConfigWriteClientRequest) SetEndpoint(v string)` +`func (o *AwsConfigureClientRequest) SetEndpoint(v string)` SetEndpoint sets Endpoint field to given value. ### HasEndpoint -`func (o *AWSConfigWriteClientRequest) HasEndpoint() bool` +`func (o *AwsConfigureClientRequest) HasEndpoint() bool` HasEndpoint returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasEndpoint returns a boolean if a field has been set. ### GetIamEndpoint -`func (o *AWSConfigWriteClientRequest) GetIamEndpoint() string` +`func (o *AwsConfigureClientRequest) GetIamEndpoint() string` GetIamEndpoint returns the IamEndpoint field if non-nil, zero value otherwise. ### GetIamEndpointOk -`func (o *AWSConfigWriteClientRequest) GetIamEndpointOk() (*string, bool)` +`func (o *AwsConfigureClientRequest) GetIamEndpointOk() (*string, bool)` GetIamEndpointOk returns a tuple with the IamEndpoint field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamEndpoint -`func (o *AWSConfigWriteClientRequest) SetIamEndpoint(v string)` +`func (o *AwsConfigureClientRequest) SetIamEndpoint(v string)` SetIamEndpoint sets IamEndpoint field to given value. ### HasIamEndpoint -`func (o *AWSConfigWriteClientRequest) HasIamEndpoint() bool` +`func (o *AwsConfigureClientRequest) HasIamEndpoint() bool` HasIamEndpoint returns a boolean if a field has been set. @@ -156,27 +156,27 @@ HasIamEndpoint returns a boolean if a field has been set. ### GetIamServerIdHeaderValue -`func (o *AWSConfigWriteClientRequest) GetIamServerIdHeaderValue() string` +`func (o *AwsConfigureClientRequest) GetIamServerIdHeaderValue() string` GetIamServerIdHeaderValue returns the IamServerIdHeaderValue field if non-nil, zero value otherwise. ### GetIamServerIdHeaderValueOk -`func (o *AWSConfigWriteClientRequest) GetIamServerIdHeaderValueOk() (*string, bool)` +`func (o *AwsConfigureClientRequest) GetIamServerIdHeaderValueOk() (*string, bool)` GetIamServerIdHeaderValueOk returns a tuple with the IamServerIdHeaderValue field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamServerIdHeaderValue -`func (o *AWSConfigWriteClientRequest) SetIamServerIdHeaderValue(v string)` +`func (o *AwsConfigureClientRequest) SetIamServerIdHeaderValue(v string)` SetIamServerIdHeaderValue sets IamServerIdHeaderValue field to given value. ### HasIamServerIdHeaderValue -`func (o *AWSConfigWriteClientRequest) HasIamServerIdHeaderValue() bool` +`func (o *AwsConfigureClientRequest) HasIamServerIdHeaderValue() bool` HasIamServerIdHeaderValue returns a boolean if a field has been set. @@ -185,27 +185,27 @@ HasIamServerIdHeaderValue returns a boolean if a field has been set. ### GetMaxRetries -`func (o *AWSConfigWriteClientRequest) GetMaxRetries() int32` +`func (o *AwsConfigureClientRequest) GetMaxRetries() int32` GetMaxRetries returns the MaxRetries field if non-nil, zero value otherwise. ### GetMaxRetriesOk -`func (o *AWSConfigWriteClientRequest) GetMaxRetriesOk() (*int32, bool)` +`func (o *AwsConfigureClientRequest) GetMaxRetriesOk() (*int32, bool)` GetMaxRetriesOk returns a tuple with the MaxRetries field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxRetries -`func (o *AWSConfigWriteClientRequest) SetMaxRetries(v int32)` +`func (o *AwsConfigureClientRequest) SetMaxRetries(v int32)` SetMaxRetries sets MaxRetries field to given value. ### HasMaxRetries -`func (o *AWSConfigWriteClientRequest) HasMaxRetries() bool` +`func (o *AwsConfigureClientRequest) HasMaxRetries() bool` HasMaxRetries returns a boolean if a field has been set. @@ -214,27 +214,27 @@ HasMaxRetries returns a boolean if a field has been set. ### GetSecretKey -`func (o *AWSConfigWriteClientRequest) GetSecretKey() string` +`func (o *AwsConfigureClientRequest) GetSecretKey() string` GetSecretKey returns the SecretKey field if non-nil, zero value otherwise. ### GetSecretKeyOk -`func (o *AWSConfigWriteClientRequest) GetSecretKeyOk() (*string, bool)` +`func (o *AwsConfigureClientRequest) GetSecretKeyOk() (*string, bool)` GetSecretKeyOk returns a tuple with the SecretKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretKey -`func (o *AWSConfigWriteClientRequest) SetSecretKey(v string)` +`func (o *AwsConfigureClientRequest) SetSecretKey(v string)` SetSecretKey sets SecretKey field to given value. ### HasSecretKey -`func (o *AWSConfigWriteClientRequest) HasSecretKey() bool` +`func (o *AwsConfigureClientRequest) HasSecretKey() bool` HasSecretKey returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasSecretKey returns a boolean if a field has been set. ### GetStsEndpoint -`func (o *AWSConfigWriteClientRequest) GetStsEndpoint() string` +`func (o *AwsConfigureClientRequest) GetStsEndpoint() string` GetStsEndpoint returns the StsEndpoint field if non-nil, zero value otherwise. ### GetStsEndpointOk -`func (o *AWSConfigWriteClientRequest) GetStsEndpointOk() (*string, bool)` +`func (o *AwsConfigureClientRequest) GetStsEndpointOk() (*string, bool)` GetStsEndpointOk returns a tuple with the StsEndpoint field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStsEndpoint -`func (o *AWSConfigWriteClientRequest) SetStsEndpoint(v string)` +`func (o *AwsConfigureClientRequest) SetStsEndpoint(v string)` SetStsEndpoint sets StsEndpoint field to given value. ### HasStsEndpoint -`func (o *AWSConfigWriteClientRequest) HasStsEndpoint() bool` +`func (o *AwsConfigureClientRequest) HasStsEndpoint() bool` HasStsEndpoint returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasStsEndpoint returns a boolean if a field has been set. ### GetStsRegion -`func (o *AWSConfigWriteClientRequest) GetStsRegion() string` +`func (o *AwsConfigureClientRequest) GetStsRegion() string` GetStsRegion returns the StsRegion field if non-nil, zero value otherwise. ### GetStsRegionOk -`func (o *AWSConfigWriteClientRequest) GetStsRegionOk() (*string, bool)` +`func (o *AwsConfigureClientRequest) GetStsRegionOk() (*string, bool)` GetStsRegionOk returns a tuple with the StsRegion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStsRegion -`func (o *AWSConfigWriteClientRequest) SetStsRegion(v string)` +`func (o *AwsConfigureClientRequest) SetStsRegion(v string)` SetStsRegion sets StsRegion field to given value. ### HasStsRegion -`func (o *AWSConfigWriteClientRequest) HasStsRegion() bool` +`func (o *AwsConfigureClientRequest) HasStsRegion() bool` HasStsRegion returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteIdentityAccessListRequest.md b/docs/AwsConfigureIdentityAccessListTidyOperationRequest.md similarity index 58% rename from docs/AWSConfigWriteIdentityAccessListRequest.md rename to docs/AwsConfigureIdentityAccessListTidyOperationRequest.md index 23cea465..bcab63e0 100644 --- a/docs/AWSConfigWriteIdentityAccessListRequest.md +++ b/docs/AwsConfigureIdentityAccessListTidyOperationRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteIdentityAccessListRequest +# AwsConfigureIdentityAccessListTidyOperationRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteIdentityAccessListRequest +### NewAwsConfigureIdentityAccessListTidyOperationRequest -`func NewAWSConfigWriteIdentityAccessListRequest() *AWSConfigWriteIdentityAccessListRequest` +`func NewAwsConfigureIdentityAccessListTidyOperationRequest() *AwsConfigureIdentityAccessListTidyOperationRequest` -NewAWSConfigWriteIdentityAccessListRequest instantiates a new AWSConfigWriteIdentityAccessListRequest object +NewAwsConfigureIdentityAccessListTidyOperationRequest instantiates a new AwsConfigureIdentityAccessListTidyOperationRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteIdentityAccessListRequestWithDefaults +### NewAwsConfigureIdentityAccessListTidyOperationRequestWithDefaults -`func NewAWSConfigWriteIdentityAccessListRequestWithDefaults() *AWSConfigWriteIdentityAccessListRequest` +`func NewAwsConfigureIdentityAccessListTidyOperationRequestWithDefaults() *AwsConfigureIdentityAccessListTidyOperationRequest` -NewAWSConfigWriteIdentityAccessListRequestWithDefaults instantiates a new AWSConfigWriteIdentityAccessListRequest object +NewAwsConfigureIdentityAccessListTidyOperationRequestWithDefaults instantiates a new AwsConfigureIdentityAccessListTidyOperationRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisablePeriodicTidy -`func (o *AWSConfigWriteIdentityAccessListRequest) GetDisablePeriodicTidy() bool` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) GetDisablePeriodicTidy() bool` GetDisablePeriodicTidy returns the DisablePeriodicTidy field if non-nil, zero value otherwise. ### GetDisablePeriodicTidyOk -`func (o *AWSConfigWriteIdentityAccessListRequest) GetDisablePeriodicTidyOk() (*bool, bool)` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) GetDisablePeriodicTidyOk() (*bool, bool)` GetDisablePeriodicTidyOk returns a tuple with the DisablePeriodicTidy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisablePeriodicTidy -`func (o *AWSConfigWriteIdentityAccessListRequest) SetDisablePeriodicTidy(v bool)` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) SetDisablePeriodicTidy(v bool)` SetDisablePeriodicTidy sets DisablePeriodicTidy field to given value. ### HasDisablePeriodicTidy -`func (o *AWSConfigWriteIdentityAccessListRequest) HasDisablePeriodicTidy() bool` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) HasDisablePeriodicTidy() bool` HasDisablePeriodicTidy returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasDisablePeriodicTidy returns a boolean if a field has been set. ### GetSafetyBuffer -`func (o *AWSConfigWriteIdentityAccessListRequest) GetSafetyBuffer() int32` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSConfigWriteIdentityAccessListRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSConfigWriteIdentityAccessListRequest) SetSafetyBuffer(v int32)` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSConfigWriteIdentityAccessListRequest) HasSafetyBuffer() bool` +`func (o *AwsConfigureIdentityAccessListTidyOperationRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteIdentityRequest.md b/docs/AwsConfigureIdentityIntegrationRequest.md similarity index 69% rename from docs/AWSConfigWriteIdentityRequest.md rename to docs/AwsConfigureIdentityIntegrationRequest.md index 6c8bdb0e..76c705f7 100644 --- a/docs/AWSConfigWriteIdentityRequest.md +++ b/docs/AwsConfigureIdentityIntegrationRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteIdentityRequest +# AwsConfigureIdentityIntegrationRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteIdentityRequest +### NewAwsConfigureIdentityIntegrationRequest -`func NewAWSConfigWriteIdentityRequest() *AWSConfigWriteIdentityRequest` +`func NewAwsConfigureIdentityIntegrationRequest() *AwsConfigureIdentityIntegrationRequest` -NewAWSConfigWriteIdentityRequest instantiates a new AWSConfigWriteIdentityRequest object +NewAwsConfigureIdentityIntegrationRequest instantiates a new AwsConfigureIdentityIntegrationRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteIdentityRequestWithDefaults +### NewAwsConfigureIdentityIntegrationRequestWithDefaults -`func NewAWSConfigWriteIdentityRequestWithDefaults() *AWSConfigWriteIdentityRequest` +`func NewAwsConfigureIdentityIntegrationRequestWithDefaults() *AwsConfigureIdentityIntegrationRequest` -NewAWSConfigWriteIdentityRequestWithDefaults instantiates a new AWSConfigWriteIdentityRequest object +NewAwsConfigureIdentityIntegrationRequestWithDefaults instantiates a new AwsConfigureIdentityIntegrationRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEc2Alias -`func (o *AWSConfigWriteIdentityRequest) GetEc2Alias() string` +`func (o *AwsConfigureIdentityIntegrationRequest) GetEc2Alias() string` GetEc2Alias returns the Ec2Alias field if non-nil, zero value otherwise. ### GetEc2AliasOk -`func (o *AWSConfigWriteIdentityRequest) GetEc2AliasOk() (*string, bool)` +`func (o *AwsConfigureIdentityIntegrationRequest) GetEc2AliasOk() (*string, bool)` GetEc2AliasOk returns a tuple with the Ec2Alias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEc2Alias -`func (o *AWSConfigWriteIdentityRequest) SetEc2Alias(v string)` +`func (o *AwsConfigureIdentityIntegrationRequest) SetEc2Alias(v string)` SetEc2Alias sets Ec2Alias field to given value. ### HasEc2Alias -`func (o *AWSConfigWriteIdentityRequest) HasEc2Alias() bool` +`func (o *AwsConfigureIdentityIntegrationRequest) HasEc2Alias() bool` HasEc2Alias returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasEc2Alias returns a boolean if a field has been set. ### GetEc2Metadata -`func (o *AWSConfigWriteIdentityRequest) GetEc2Metadata() []string` +`func (o *AwsConfigureIdentityIntegrationRequest) GetEc2Metadata() []string` GetEc2Metadata returns the Ec2Metadata field if non-nil, zero value otherwise. ### GetEc2MetadataOk -`func (o *AWSConfigWriteIdentityRequest) GetEc2MetadataOk() (*[]string, bool)` +`func (o *AwsConfigureIdentityIntegrationRequest) GetEc2MetadataOk() (*[]string, bool)` GetEc2MetadataOk returns a tuple with the Ec2Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEc2Metadata -`func (o *AWSConfigWriteIdentityRequest) SetEc2Metadata(v []string)` +`func (o *AwsConfigureIdentityIntegrationRequest) SetEc2Metadata(v []string)` SetEc2Metadata sets Ec2Metadata field to given value. ### HasEc2Metadata -`func (o *AWSConfigWriteIdentityRequest) HasEc2Metadata() bool` +`func (o *AwsConfigureIdentityIntegrationRequest) HasEc2Metadata() bool` HasEc2Metadata returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasEc2Metadata returns a boolean if a field has been set. ### GetIamAlias -`func (o *AWSConfigWriteIdentityRequest) GetIamAlias() string` +`func (o *AwsConfigureIdentityIntegrationRequest) GetIamAlias() string` GetIamAlias returns the IamAlias field if non-nil, zero value otherwise. ### GetIamAliasOk -`func (o *AWSConfigWriteIdentityRequest) GetIamAliasOk() (*string, bool)` +`func (o *AwsConfigureIdentityIntegrationRequest) GetIamAliasOk() (*string, bool)` GetIamAliasOk returns a tuple with the IamAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamAlias -`func (o *AWSConfigWriteIdentityRequest) SetIamAlias(v string)` +`func (o *AwsConfigureIdentityIntegrationRequest) SetIamAlias(v string)` SetIamAlias sets IamAlias field to given value. ### HasIamAlias -`func (o *AWSConfigWriteIdentityRequest) HasIamAlias() bool` +`func (o *AwsConfigureIdentityIntegrationRequest) HasIamAlias() bool` HasIamAlias returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasIamAlias returns a boolean if a field has been set. ### GetIamMetadata -`func (o *AWSConfigWriteIdentityRequest) GetIamMetadata() []string` +`func (o *AwsConfigureIdentityIntegrationRequest) GetIamMetadata() []string` GetIamMetadata returns the IamMetadata field if non-nil, zero value otherwise. ### GetIamMetadataOk -`func (o *AWSConfigWriteIdentityRequest) GetIamMetadataOk() (*[]string, bool)` +`func (o *AwsConfigureIdentityIntegrationRequest) GetIamMetadataOk() (*[]string, bool)` GetIamMetadataOk returns a tuple with the IamMetadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamMetadata -`func (o *AWSConfigWriteIdentityRequest) SetIamMetadata(v []string)` +`func (o *AwsConfigureIdentityIntegrationRequest) SetIamMetadata(v []string)` SetIamMetadata sets IamMetadata field to given value. ### HasIamMetadata -`func (o *AWSConfigWriteIdentityRequest) HasIamMetadata() bool` +`func (o *AwsConfigureIdentityIntegrationRequest) HasIamMetadata() bool` HasIamMetadata returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteIdentityWhiteListRequest.md b/docs/AwsConfigureIdentityWhitelistTidyOperationRequest.md similarity index 59% rename from docs/AWSConfigWriteIdentityWhiteListRequest.md rename to docs/AwsConfigureIdentityWhitelistTidyOperationRequest.md index a11deca4..2d872fd7 100644 --- a/docs/AWSConfigWriteIdentityWhiteListRequest.md +++ b/docs/AwsConfigureIdentityWhitelistTidyOperationRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteIdentityWhiteListRequest +# AwsConfigureIdentityWhitelistTidyOperationRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteIdentityWhiteListRequest +### NewAwsConfigureIdentityWhitelistTidyOperationRequest -`func NewAWSConfigWriteIdentityWhiteListRequest() *AWSConfigWriteIdentityWhiteListRequest` +`func NewAwsConfigureIdentityWhitelistTidyOperationRequest() *AwsConfigureIdentityWhitelistTidyOperationRequest` -NewAWSConfigWriteIdentityWhiteListRequest instantiates a new AWSConfigWriteIdentityWhiteListRequest object +NewAwsConfigureIdentityWhitelistTidyOperationRequest instantiates a new AwsConfigureIdentityWhitelistTidyOperationRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteIdentityWhiteListRequestWithDefaults +### NewAwsConfigureIdentityWhitelistTidyOperationRequestWithDefaults -`func NewAWSConfigWriteIdentityWhiteListRequestWithDefaults() *AWSConfigWriteIdentityWhiteListRequest` +`func NewAwsConfigureIdentityWhitelistTidyOperationRequestWithDefaults() *AwsConfigureIdentityWhitelistTidyOperationRequest` -NewAWSConfigWriteIdentityWhiteListRequestWithDefaults instantiates a new AWSConfigWriteIdentityWhiteListRequest object +NewAwsConfigureIdentityWhitelistTidyOperationRequestWithDefaults instantiates a new AwsConfigureIdentityWhitelistTidyOperationRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisablePeriodicTidy -`func (o *AWSConfigWriteIdentityWhiteListRequest) GetDisablePeriodicTidy() bool` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) GetDisablePeriodicTidy() bool` GetDisablePeriodicTidy returns the DisablePeriodicTidy field if non-nil, zero value otherwise. ### GetDisablePeriodicTidyOk -`func (o *AWSConfigWriteIdentityWhiteListRequest) GetDisablePeriodicTidyOk() (*bool, bool)` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) GetDisablePeriodicTidyOk() (*bool, bool)` GetDisablePeriodicTidyOk returns a tuple with the DisablePeriodicTidy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisablePeriodicTidy -`func (o *AWSConfigWriteIdentityWhiteListRequest) SetDisablePeriodicTidy(v bool)` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) SetDisablePeriodicTidy(v bool)` SetDisablePeriodicTidy sets DisablePeriodicTidy field to given value. ### HasDisablePeriodicTidy -`func (o *AWSConfigWriteIdentityWhiteListRequest) HasDisablePeriodicTidy() bool` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) HasDisablePeriodicTidy() bool` HasDisablePeriodicTidy returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasDisablePeriodicTidy returns a boolean if a field has been set. ### GetSafetyBuffer -`func (o *AWSConfigWriteIdentityWhiteListRequest) GetSafetyBuffer() int32` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSConfigWriteIdentityWhiteListRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSConfigWriteIdentityWhiteListRequest) SetSafetyBuffer(v int32)` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSConfigWriteIdentityWhiteListRequest) HasSafetyBuffer() bool` +`func (o *AwsConfigureIdentityWhitelistTidyOperationRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteLeaseRequest.md b/docs/AwsConfigureLeaseRequest.md similarity index 63% rename from docs/AWSConfigWriteLeaseRequest.md rename to docs/AwsConfigureLeaseRequest.md index eab8cdeb..27f93e19 100644 --- a/docs/AWSConfigWriteLeaseRequest.md +++ b/docs/AwsConfigureLeaseRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteLeaseRequest +# AwsConfigureLeaseRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteLeaseRequest +### NewAwsConfigureLeaseRequest -`func NewAWSConfigWriteLeaseRequest() *AWSConfigWriteLeaseRequest` +`func NewAwsConfigureLeaseRequest() *AwsConfigureLeaseRequest` -NewAWSConfigWriteLeaseRequest instantiates a new AWSConfigWriteLeaseRequest object +NewAwsConfigureLeaseRequest instantiates a new AwsConfigureLeaseRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteLeaseRequestWithDefaults +### NewAwsConfigureLeaseRequestWithDefaults -`func NewAWSConfigWriteLeaseRequestWithDefaults() *AWSConfigWriteLeaseRequest` +`func NewAwsConfigureLeaseRequestWithDefaults() *AwsConfigureLeaseRequest` -NewAWSConfigWriteLeaseRequestWithDefaults instantiates a new AWSConfigWriteLeaseRequest object +NewAwsConfigureLeaseRequestWithDefaults instantiates a new AwsConfigureLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLease -`func (o *AWSConfigWriteLeaseRequest) GetLease() string` +`func (o *AwsConfigureLeaseRequest) GetLease() string` GetLease returns the Lease field if non-nil, zero value otherwise. ### GetLeaseOk -`func (o *AWSConfigWriteLeaseRequest) GetLeaseOk() (*string, bool)` +`func (o *AwsConfigureLeaseRequest) GetLeaseOk() (*string, bool)` GetLeaseOk returns a tuple with the Lease field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLease -`func (o *AWSConfigWriteLeaseRequest) SetLease(v string)` +`func (o *AwsConfigureLeaseRequest) SetLease(v string)` SetLease sets Lease field to given value. ### HasLease -`func (o *AWSConfigWriteLeaseRequest) HasLease() bool` +`func (o *AwsConfigureLeaseRequest) HasLease() bool` HasLease returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasLease returns a boolean if a field has been set. ### GetLeaseMax -`func (o *AWSConfigWriteLeaseRequest) GetLeaseMax() string` +`func (o *AwsConfigureLeaseRequest) GetLeaseMax() string` GetLeaseMax returns the LeaseMax field if non-nil, zero value otherwise. ### GetLeaseMaxOk -`func (o *AWSConfigWriteLeaseRequest) GetLeaseMaxOk() (*string, bool)` +`func (o *AwsConfigureLeaseRequest) GetLeaseMaxOk() (*string, bool)` GetLeaseMaxOk returns a tuple with the LeaseMax field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseMax -`func (o *AWSConfigWriteLeaseRequest) SetLeaseMax(v string)` +`func (o *AwsConfigureLeaseRequest) SetLeaseMax(v string)` SetLeaseMax sets LeaseMax field to given value. ### HasLeaseMax -`func (o *AWSConfigWriteLeaseRequest) HasLeaseMax() bool` +`func (o *AwsConfigureLeaseRequest) HasLeaseMax() bool` HasLeaseMax returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteRoleTagDenyListRequest.md b/docs/AwsConfigureRoleTagBlacklistTidyOperationRequest.md similarity index 59% rename from docs/AWSConfigWriteRoleTagDenyListRequest.md rename to docs/AwsConfigureRoleTagBlacklistTidyOperationRequest.md index 499e805e..b097079a 100644 --- a/docs/AWSConfigWriteRoleTagDenyListRequest.md +++ b/docs/AwsConfigureRoleTagBlacklistTidyOperationRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteRoleTagDenyListRequest +# AwsConfigureRoleTagBlacklistTidyOperationRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteRoleTagDenyListRequest +### NewAwsConfigureRoleTagBlacklistTidyOperationRequest -`func NewAWSConfigWriteRoleTagDenyListRequest() *AWSConfigWriteRoleTagDenyListRequest` +`func NewAwsConfigureRoleTagBlacklistTidyOperationRequest() *AwsConfigureRoleTagBlacklistTidyOperationRequest` -NewAWSConfigWriteRoleTagDenyListRequest instantiates a new AWSConfigWriteRoleTagDenyListRequest object +NewAwsConfigureRoleTagBlacklistTidyOperationRequest instantiates a new AwsConfigureRoleTagBlacklistTidyOperationRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteRoleTagDenyListRequestWithDefaults +### NewAwsConfigureRoleTagBlacklistTidyOperationRequestWithDefaults -`func NewAWSConfigWriteRoleTagDenyListRequestWithDefaults() *AWSConfigWriteRoleTagDenyListRequest` +`func NewAwsConfigureRoleTagBlacklistTidyOperationRequestWithDefaults() *AwsConfigureRoleTagBlacklistTidyOperationRequest` -NewAWSConfigWriteRoleTagDenyListRequestWithDefaults instantiates a new AWSConfigWriteRoleTagDenyListRequest object +NewAwsConfigureRoleTagBlacklistTidyOperationRequestWithDefaults instantiates a new AwsConfigureRoleTagBlacklistTidyOperationRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisablePeriodicTidy -`func (o *AWSConfigWriteRoleTagDenyListRequest) GetDisablePeriodicTidy() bool` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) GetDisablePeriodicTidy() bool` GetDisablePeriodicTidy returns the DisablePeriodicTidy field if non-nil, zero value otherwise. ### GetDisablePeriodicTidyOk -`func (o *AWSConfigWriteRoleTagDenyListRequest) GetDisablePeriodicTidyOk() (*bool, bool)` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) GetDisablePeriodicTidyOk() (*bool, bool)` GetDisablePeriodicTidyOk returns a tuple with the DisablePeriodicTidy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisablePeriodicTidy -`func (o *AWSConfigWriteRoleTagDenyListRequest) SetDisablePeriodicTidy(v bool)` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) SetDisablePeriodicTidy(v bool)` SetDisablePeriodicTidy sets DisablePeriodicTidy field to given value. ### HasDisablePeriodicTidy -`func (o *AWSConfigWriteRoleTagDenyListRequest) HasDisablePeriodicTidy() bool` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) HasDisablePeriodicTidy() bool` HasDisablePeriodicTidy returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasDisablePeriodicTidy returns a boolean if a field has been set. ### GetSafetyBuffer -`func (o *AWSConfigWriteRoleTagDenyListRequest) GetSafetyBuffer() int32` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSConfigWriteRoleTagDenyListRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSConfigWriteRoleTagDenyListRequest) SetSafetyBuffer(v int32)` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSConfigWriteRoleTagDenyListRequest) HasSafetyBuffer() bool` +`func (o *AwsConfigureRoleTagBlacklistTidyOperationRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteRoleTagBlackListRequest.md b/docs/AwsConfigureRoleTagDenyListTidyOperationRequest.md similarity index 59% rename from docs/AWSConfigWriteRoleTagBlackListRequest.md rename to docs/AwsConfigureRoleTagDenyListTidyOperationRequest.md index ce5926b6..b48a858a 100644 --- a/docs/AWSConfigWriteRoleTagBlackListRequest.md +++ b/docs/AwsConfigureRoleTagDenyListTidyOperationRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteRoleTagBlackListRequest +# AwsConfigureRoleTagDenyListTidyOperationRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteRoleTagBlackListRequest +### NewAwsConfigureRoleTagDenyListTidyOperationRequest -`func NewAWSConfigWriteRoleTagBlackListRequest() *AWSConfigWriteRoleTagBlackListRequest` +`func NewAwsConfigureRoleTagDenyListTidyOperationRequest() *AwsConfigureRoleTagDenyListTidyOperationRequest` -NewAWSConfigWriteRoleTagBlackListRequest instantiates a new AWSConfigWriteRoleTagBlackListRequest object +NewAwsConfigureRoleTagDenyListTidyOperationRequest instantiates a new AwsConfigureRoleTagDenyListTidyOperationRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteRoleTagBlackListRequestWithDefaults +### NewAwsConfigureRoleTagDenyListTidyOperationRequestWithDefaults -`func NewAWSConfigWriteRoleTagBlackListRequestWithDefaults() *AWSConfigWriteRoleTagBlackListRequest` +`func NewAwsConfigureRoleTagDenyListTidyOperationRequestWithDefaults() *AwsConfigureRoleTagDenyListTidyOperationRequest` -NewAWSConfigWriteRoleTagBlackListRequestWithDefaults instantiates a new AWSConfigWriteRoleTagBlackListRequest object +NewAwsConfigureRoleTagDenyListTidyOperationRequestWithDefaults instantiates a new AwsConfigureRoleTagDenyListTidyOperationRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisablePeriodicTidy -`func (o *AWSConfigWriteRoleTagBlackListRequest) GetDisablePeriodicTidy() bool` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) GetDisablePeriodicTidy() bool` GetDisablePeriodicTidy returns the DisablePeriodicTidy field if non-nil, zero value otherwise. ### GetDisablePeriodicTidyOk -`func (o *AWSConfigWriteRoleTagBlackListRequest) GetDisablePeriodicTidyOk() (*bool, bool)` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) GetDisablePeriodicTidyOk() (*bool, bool)` GetDisablePeriodicTidyOk returns a tuple with the DisablePeriodicTidy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisablePeriodicTidy -`func (o *AWSConfigWriteRoleTagBlackListRequest) SetDisablePeriodicTidy(v bool)` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) SetDisablePeriodicTidy(v bool)` SetDisablePeriodicTidy sets DisablePeriodicTidy field to given value. ### HasDisablePeriodicTidy -`func (o *AWSConfigWriteRoleTagBlackListRequest) HasDisablePeriodicTidy() bool` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) HasDisablePeriodicTidy() bool` HasDisablePeriodicTidy returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasDisablePeriodicTidy returns a boolean if a field has been set. ### GetSafetyBuffer -`func (o *AWSConfigWriteRoleTagBlackListRequest) GetSafetyBuffer() int32` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSConfigWriteRoleTagBlackListRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSConfigWriteRoleTagBlackListRequest) SetSafetyBuffer(v int32)` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSConfigWriteRoleTagBlackListRequest) HasSafetyBuffer() bool` +`func (o *AwsConfigureRoleTagDenyListTidyOperationRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteRootIAMCredentialsRequest.md b/docs/AwsConfigureRootIamCredentialsRequest.md similarity index 62% rename from docs/AWSConfigWriteRootIAMCredentialsRequest.md rename to docs/AwsConfigureRootIamCredentialsRequest.md index e8001925..fc7f503b 100644 --- a/docs/AWSConfigWriteRootIAMCredentialsRequest.md +++ b/docs/AwsConfigureRootIamCredentialsRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteRootIAMCredentialsRequest +# AwsConfigureRootIamCredentialsRequest ## Properties @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteRootIAMCredentialsRequest +### NewAwsConfigureRootIamCredentialsRequest -`func NewAWSConfigWriteRootIAMCredentialsRequest() *AWSConfigWriteRootIAMCredentialsRequest` +`func NewAwsConfigureRootIamCredentialsRequest() *AwsConfigureRootIamCredentialsRequest` -NewAWSConfigWriteRootIAMCredentialsRequest instantiates a new AWSConfigWriteRootIAMCredentialsRequest object +NewAwsConfigureRootIamCredentialsRequest instantiates a new AwsConfigureRootIamCredentialsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults +### NewAwsConfigureRootIamCredentialsRequestWithDefaults -`func NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults() *AWSConfigWriteRootIAMCredentialsRequest` +`func NewAwsConfigureRootIamCredentialsRequestWithDefaults() *AwsConfigureRootIamCredentialsRequest` -NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults instantiates a new AWSConfigWriteRootIAMCredentialsRequest object +NewAwsConfigureRootIamCredentialsRequestWithDefaults instantiates a new AwsConfigureRootIamCredentialsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAccessKey -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetAccessKey() string` +`func (o *AwsConfigureRootIamCredentialsRequest) GetAccessKey() string` GetAccessKey returns the AccessKey field if non-nil, zero value otherwise. ### GetAccessKeyOk -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetAccessKeyOk() (*string, bool)` +`func (o *AwsConfigureRootIamCredentialsRequest) GetAccessKeyOk() (*string, bool)` GetAccessKeyOk returns a tuple with the AccessKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAccessKey -`func (o *AWSConfigWriteRootIAMCredentialsRequest) SetAccessKey(v string)` +`func (o *AwsConfigureRootIamCredentialsRequest) SetAccessKey(v string)` SetAccessKey sets AccessKey field to given value. ### HasAccessKey -`func (o *AWSConfigWriteRootIAMCredentialsRequest) HasAccessKey() bool` +`func (o *AwsConfigureRootIamCredentialsRequest) HasAccessKey() bool` HasAccessKey returns a boolean if a field has been set. @@ -67,27 +67,27 @@ HasAccessKey returns a boolean if a field has been set. ### GetIamEndpoint -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetIamEndpoint() string` +`func (o *AwsConfigureRootIamCredentialsRequest) GetIamEndpoint() string` GetIamEndpoint returns the IamEndpoint field if non-nil, zero value otherwise. ### GetIamEndpointOk -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetIamEndpointOk() (*string, bool)` +`func (o *AwsConfigureRootIamCredentialsRequest) GetIamEndpointOk() (*string, bool)` GetIamEndpointOk returns a tuple with the IamEndpoint field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamEndpoint -`func (o *AWSConfigWriteRootIAMCredentialsRequest) SetIamEndpoint(v string)` +`func (o *AwsConfigureRootIamCredentialsRequest) SetIamEndpoint(v string)` SetIamEndpoint sets IamEndpoint field to given value. ### HasIamEndpoint -`func (o *AWSConfigWriteRootIAMCredentialsRequest) HasIamEndpoint() bool` +`func (o *AwsConfigureRootIamCredentialsRequest) HasIamEndpoint() bool` HasIamEndpoint returns a boolean if a field has been set. @@ -96,27 +96,27 @@ HasIamEndpoint returns a boolean if a field has been set. ### GetMaxRetries -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetMaxRetries() int32` +`func (o *AwsConfigureRootIamCredentialsRequest) GetMaxRetries() int32` GetMaxRetries returns the MaxRetries field if non-nil, zero value otherwise. ### GetMaxRetriesOk -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetMaxRetriesOk() (*int32, bool)` +`func (o *AwsConfigureRootIamCredentialsRequest) GetMaxRetriesOk() (*int32, bool)` GetMaxRetriesOk returns a tuple with the MaxRetries field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxRetries -`func (o *AWSConfigWriteRootIAMCredentialsRequest) SetMaxRetries(v int32)` +`func (o *AwsConfigureRootIamCredentialsRequest) SetMaxRetries(v int32)` SetMaxRetries sets MaxRetries field to given value. ### HasMaxRetries -`func (o *AWSConfigWriteRootIAMCredentialsRequest) HasMaxRetries() bool` +`func (o *AwsConfigureRootIamCredentialsRequest) HasMaxRetries() bool` HasMaxRetries returns a boolean if a field has been set. @@ -125,27 +125,27 @@ HasMaxRetries returns a boolean if a field has been set. ### GetRegion -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetRegion() string` +`func (o *AwsConfigureRootIamCredentialsRequest) GetRegion() string` GetRegion returns the Region field if non-nil, zero value otherwise. ### GetRegionOk -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetRegionOk() (*string, bool)` +`func (o *AwsConfigureRootIamCredentialsRequest) GetRegionOk() (*string, bool)` GetRegionOk returns a tuple with the Region field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRegion -`func (o *AWSConfigWriteRootIAMCredentialsRequest) SetRegion(v string)` +`func (o *AwsConfigureRootIamCredentialsRequest) SetRegion(v string)` SetRegion sets Region field to given value. ### HasRegion -`func (o *AWSConfigWriteRootIAMCredentialsRequest) HasRegion() bool` +`func (o *AwsConfigureRootIamCredentialsRequest) HasRegion() bool` HasRegion returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasRegion returns a boolean if a field has been set. ### GetSecretKey -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetSecretKey() string` +`func (o *AwsConfigureRootIamCredentialsRequest) GetSecretKey() string` GetSecretKey returns the SecretKey field if non-nil, zero value otherwise. ### GetSecretKeyOk -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetSecretKeyOk() (*string, bool)` +`func (o *AwsConfigureRootIamCredentialsRequest) GetSecretKeyOk() (*string, bool)` GetSecretKeyOk returns a tuple with the SecretKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretKey -`func (o *AWSConfigWriteRootIAMCredentialsRequest) SetSecretKey(v string)` +`func (o *AwsConfigureRootIamCredentialsRequest) SetSecretKey(v string)` SetSecretKey sets SecretKey field to given value. ### HasSecretKey -`func (o *AWSConfigWriteRootIAMCredentialsRequest) HasSecretKey() bool` +`func (o *AwsConfigureRootIamCredentialsRequest) HasSecretKey() bool` HasSecretKey returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasSecretKey returns a boolean if a field has been set. ### GetStsEndpoint -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetStsEndpoint() string` +`func (o *AwsConfigureRootIamCredentialsRequest) GetStsEndpoint() string` GetStsEndpoint returns the StsEndpoint field if non-nil, zero value otherwise. ### GetStsEndpointOk -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetStsEndpointOk() (*string, bool)` +`func (o *AwsConfigureRootIamCredentialsRequest) GetStsEndpointOk() (*string, bool)` GetStsEndpointOk returns a tuple with the StsEndpoint field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStsEndpoint -`func (o *AWSConfigWriteRootIAMCredentialsRequest) SetStsEndpoint(v string)` +`func (o *AwsConfigureRootIamCredentialsRequest) SetStsEndpoint(v string)` SetStsEndpoint sets StsEndpoint field to given value. ### HasStsEndpoint -`func (o *AWSConfigWriteRootIAMCredentialsRequest) HasStsEndpoint() bool` +`func (o *AwsConfigureRootIamCredentialsRequest) HasStsEndpoint() bool` HasStsEndpoint returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasStsEndpoint returns a boolean if a field has been set. ### GetUsernameTemplate -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetUsernameTemplate() string` +`func (o *AwsConfigureRootIamCredentialsRequest) GetUsernameTemplate() string` GetUsernameTemplate returns the UsernameTemplate field if non-nil, zero value otherwise. ### GetUsernameTemplateOk -`func (o *AWSConfigWriteRootIAMCredentialsRequest) GetUsernameTemplateOk() (*string, bool)` +`func (o *AwsConfigureRootIamCredentialsRequest) GetUsernameTemplateOk() (*string, bool)` GetUsernameTemplateOk returns a tuple with the UsernameTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameTemplate -`func (o *AWSConfigWriteRootIAMCredentialsRequest) SetUsernameTemplate(v string)` +`func (o *AwsConfigureRootIamCredentialsRequest) SetUsernameTemplate(v string)` SetUsernameTemplate sets UsernameTemplate field to given value. ### HasUsernameTemplate -`func (o *AWSConfigWriteRootIAMCredentialsRequest) HasUsernameTemplate() bool` +`func (o *AwsConfigureRootIamCredentialsRequest) HasUsernameTemplate() bool` HasUsernameTemplate returns a boolean if a field has been set. diff --git a/docs/AWSWriteCredentialsRequest.md b/docs/AwsGenerateCredentials2Request.md similarity index 54% rename from docs/AWSWriteCredentialsRequest.md rename to docs/AwsGenerateCredentials2Request.md index dec098d1..b0d7342e 100644 --- a/docs/AWSWriteCredentialsRequest.md +++ b/docs/AwsGenerateCredentials2Request.md @@ -1,11 +1,10 @@ -# AWSWriteCredentialsRequest +# AwsGenerateCredentials2Request ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**Name** | Pointer to **string** | Name of the role | [optional] **RoleArn** | Pointer to **string** | ARN of role to assume when credential_type is assumed_role | [optional] **RoleSessionName** | Pointer to **string** | Session name to use when assuming role. Max chars: 64 | [optional] **Ttl** | Pointer to **int32** | Lifetime of the returned credentials in seconds | [optional] [default to 3600] @@ -15,76 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteCredentialsRequest +### NewAwsGenerateCredentials2Request -`func NewAWSWriteCredentialsRequest() *AWSWriteCredentialsRequest` +`func NewAwsGenerateCredentials2Request() *AwsGenerateCredentials2Request` -NewAWSWriteCredentialsRequest instantiates a new AWSWriteCredentialsRequest object +NewAwsGenerateCredentials2Request instantiates a new AwsGenerateCredentials2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteCredentialsRequestWithDefaults +### NewAwsGenerateCredentials2RequestWithDefaults -`func NewAWSWriteCredentialsRequestWithDefaults() *AWSWriteCredentialsRequest` +`func NewAwsGenerateCredentials2RequestWithDefaults() *AwsGenerateCredentials2Request` -NewAWSWriteCredentialsRequestWithDefaults instantiates a new AWSWriteCredentialsRequest object +NewAwsGenerateCredentials2RequestWithDefaults instantiates a new AwsGenerateCredentials2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set -### GetName - -`func (o *AWSWriteCredentialsRequest) GetName() string` - -GetName returns the Name field if non-nil, zero value otherwise. - -### GetNameOk - -`func (o *AWSWriteCredentialsRequest) GetNameOk() (*string, bool)` - -GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetName - -`func (o *AWSWriteCredentialsRequest) SetName(v string)` - -SetName sets Name field to given value. - - -### HasName - -`func (o *AWSWriteCredentialsRequest) HasName() bool` - -HasName returns a boolean if a field has been set. - - - - ### GetRoleArn -`func (o *AWSWriteCredentialsRequest) GetRoleArn() string` +`func (o *AwsGenerateCredentials2Request) GetRoleArn() string` GetRoleArn returns the RoleArn field if non-nil, zero value otherwise. ### GetRoleArnOk -`func (o *AWSWriteCredentialsRequest) GetRoleArnOk() (*string, bool)` +`func (o *AwsGenerateCredentials2Request) GetRoleArnOk() (*string, bool)` GetRoleArnOk returns a tuple with the RoleArn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleArn -`func (o *AWSWriteCredentialsRequest) SetRoleArn(v string)` +`func (o *AwsGenerateCredentials2Request) SetRoleArn(v string)` SetRoleArn sets RoleArn field to given value. ### HasRoleArn -`func (o *AWSWriteCredentialsRequest) HasRoleArn() bool` +`func (o *AwsGenerateCredentials2Request) HasRoleArn() bool` HasRoleArn returns a boolean if a field has been set. @@ -93,27 +63,27 @@ HasRoleArn returns a boolean if a field has been set. ### GetRoleSessionName -`func (o *AWSWriteCredentialsRequest) GetRoleSessionName() string` +`func (o *AwsGenerateCredentials2Request) GetRoleSessionName() string` GetRoleSessionName returns the RoleSessionName field if non-nil, zero value otherwise. ### GetRoleSessionNameOk -`func (o *AWSWriteCredentialsRequest) GetRoleSessionNameOk() (*string, bool)` +`func (o *AwsGenerateCredentials2Request) GetRoleSessionNameOk() (*string, bool)` GetRoleSessionNameOk returns a tuple with the RoleSessionName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleSessionName -`func (o *AWSWriteCredentialsRequest) SetRoleSessionName(v string)` +`func (o *AwsGenerateCredentials2Request) SetRoleSessionName(v string)` SetRoleSessionName sets RoleSessionName field to given value. ### HasRoleSessionName -`func (o *AWSWriteCredentialsRequest) HasRoleSessionName() bool` +`func (o *AwsGenerateCredentials2Request) HasRoleSessionName() bool` HasRoleSessionName returns a boolean if a field has been set. @@ -122,27 +92,27 @@ HasRoleSessionName returns a boolean if a field has been set. ### GetTtl -`func (o *AWSWriteCredentialsRequest) GetTtl() int32` +`func (o *AwsGenerateCredentials2Request) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *AWSWriteCredentialsRequest) GetTtlOk() (*int32, bool)` +`func (o *AwsGenerateCredentials2Request) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *AWSWriteCredentialsRequest) SetTtl(v int32)` +`func (o *AwsGenerateCredentials2Request) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *AWSWriteCredentialsRequest) HasTtl() bool` +`func (o *AwsGenerateCredentials2Request) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/AWSWriteSecurityTokenServiceRequest.md b/docs/AwsGenerateStsCredentials2Request.md similarity index 61% rename from docs/AWSWriteSecurityTokenServiceRequest.md rename to docs/AwsGenerateStsCredentials2Request.md index e8ba56aa..b525429f 100644 --- a/docs/AWSWriteSecurityTokenServiceRequest.md +++ b/docs/AwsGenerateStsCredentials2Request.md @@ -1,4 +1,4 @@ -# AWSWriteSecurityTokenServiceRequest +# AwsGenerateStsCredentials2Request ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteSecurityTokenServiceRequest +### NewAwsGenerateStsCredentials2Request -`func NewAWSWriteSecurityTokenServiceRequest() *AWSWriteSecurityTokenServiceRequest` +`func NewAwsGenerateStsCredentials2Request() *AwsGenerateStsCredentials2Request` -NewAWSWriteSecurityTokenServiceRequest instantiates a new AWSWriteSecurityTokenServiceRequest object +NewAwsGenerateStsCredentials2Request instantiates a new AwsGenerateStsCredentials2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteSecurityTokenServiceRequestWithDefaults +### NewAwsGenerateStsCredentials2RequestWithDefaults -`func NewAWSWriteSecurityTokenServiceRequestWithDefaults() *AWSWriteSecurityTokenServiceRequest` +`func NewAwsGenerateStsCredentials2RequestWithDefaults() *AwsGenerateStsCredentials2Request` -NewAWSWriteSecurityTokenServiceRequestWithDefaults instantiates a new AWSWriteSecurityTokenServiceRequest object +NewAwsGenerateStsCredentials2RequestWithDefaults instantiates a new AwsGenerateStsCredentials2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetRoleArn -`func (o *AWSWriteSecurityTokenServiceRequest) GetRoleArn() string` +`func (o *AwsGenerateStsCredentials2Request) GetRoleArn() string` GetRoleArn returns the RoleArn field if non-nil, zero value otherwise. ### GetRoleArnOk -`func (o *AWSWriteSecurityTokenServiceRequest) GetRoleArnOk() (*string, bool)` +`func (o *AwsGenerateStsCredentials2Request) GetRoleArnOk() (*string, bool)` GetRoleArnOk returns a tuple with the RoleArn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleArn -`func (o *AWSWriteSecurityTokenServiceRequest) SetRoleArn(v string)` +`func (o *AwsGenerateStsCredentials2Request) SetRoleArn(v string)` SetRoleArn sets RoleArn field to given value. ### HasRoleArn -`func (o *AWSWriteSecurityTokenServiceRequest) HasRoleArn() bool` +`func (o *AwsGenerateStsCredentials2Request) HasRoleArn() bool` HasRoleArn returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasRoleArn returns a boolean if a field has been set. ### GetRoleSessionName -`func (o *AWSWriteSecurityTokenServiceRequest) GetRoleSessionName() string` +`func (o *AwsGenerateStsCredentials2Request) GetRoleSessionName() string` GetRoleSessionName returns the RoleSessionName field if non-nil, zero value otherwise. ### GetRoleSessionNameOk -`func (o *AWSWriteSecurityTokenServiceRequest) GetRoleSessionNameOk() (*string, bool)` +`func (o *AwsGenerateStsCredentials2Request) GetRoleSessionNameOk() (*string, bool)` GetRoleSessionNameOk returns a tuple with the RoleSessionName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleSessionName -`func (o *AWSWriteSecurityTokenServiceRequest) SetRoleSessionName(v string)` +`func (o *AwsGenerateStsCredentials2Request) SetRoleSessionName(v string)` SetRoleSessionName sets RoleSessionName field to given value. ### HasRoleSessionName -`func (o *AWSWriteSecurityTokenServiceRequest) HasRoleSessionName() bool` +`func (o *AwsGenerateStsCredentials2Request) HasRoleSessionName() bool` HasRoleSessionName returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasRoleSessionName returns a boolean if a field has been set. ### GetTtl -`func (o *AWSWriteSecurityTokenServiceRequest) GetTtl() int32` +`func (o *AwsGenerateStsCredentials2Request) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *AWSWriteSecurityTokenServiceRequest) GetTtlOk() (*int32, bool)` +`func (o *AwsGenerateStsCredentials2Request) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *AWSWriteSecurityTokenServiceRequest) SetTtl(v int32)` +`func (o *AwsGenerateStsCredentials2Request) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *AWSWriteSecurityTokenServiceRequest) HasTtl() bool` +`func (o *AwsGenerateStsCredentials2Request) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/AWSWriteIdentityWhiteListTidySettingsRequest.md b/docs/AwsTidyIdentityAccessListRequest.md similarity index 57% rename from docs/AWSWriteIdentityWhiteListTidySettingsRequest.md rename to docs/AwsTidyIdentityAccessListRequest.md index 8b5512ab..b2737ede 100644 --- a/docs/AWSWriteIdentityWhiteListTidySettingsRequest.md +++ b/docs/AwsTidyIdentityAccessListRequest.md @@ -1,4 +1,4 @@ -# AWSWriteIdentityWhiteListTidySettingsRequest +# AwsTidyIdentityAccessListRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteIdentityWhiteListTidySettingsRequest +### NewAwsTidyIdentityAccessListRequest -`func NewAWSWriteIdentityWhiteListTidySettingsRequest() *AWSWriteIdentityWhiteListTidySettingsRequest` +`func NewAwsTidyIdentityAccessListRequest() *AwsTidyIdentityAccessListRequest` -NewAWSWriteIdentityWhiteListTidySettingsRequest instantiates a new AWSWriteIdentityWhiteListTidySettingsRequest object +NewAwsTidyIdentityAccessListRequest instantiates a new AwsTidyIdentityAccessListRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults +### NewAwsTidyIdentityAccessListRequestWithDefaults -`func NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults() *AWSWriteIdentityWhiteListTidySettingsRequest` +`func NewAwsTidyIdentityAccessListRequestWithDefaults() *AwsTidyIdentityAccessListRequest` -NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults instantiates a new AWSWriteIdentityWhiteListTidySettingsRequest object +NewAwsTidyIdentityAccessListRequestWithDefaults instantiates a new AwsTidyIdentityAccessListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSafetyBuffer -`func (o *AWSWriteIdentityWhiteListTidySettingsRequest) GetSafetyBuffer() int32` +`func (o *AwsTidyIdentityAccessListRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSWriteIdentityWhiteListTidySettingsRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsTidyIdentityAccessListRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSWriteIdentityWhiteListTidySettingsRequest) SetSafetyBuffer(v int32)` +`func (o *AwsTidyIdentityAccessListRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSWriteIdentityWhiteListTidySettingsRequest) HasSafetyBuffer() bool` +`func (o *AwsTidyIdentityAccessListRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSWriteIdentityAccessListTidySettingsRequest.md b/docs/AwsTidyIdentityWhitelistRequest.md similarity index 57% rename from docs/AWSWriteIdentityAccessListTidySettingsRequest.md rename to docs/AwsTidyIdentityWhitelistRequest.md index eba7bc2f..66b368eb 100644 --- a/docs/AWSWriteIdentityAccessListTidySettingsRequest.md +++ b/docs/AwsTidyIdentityWhitelistRequest.md @@ -1,4 +1,4 @@ -# AWSWriteIdentityAccessListTidySettingsRequest +# AwsTidyIdentityWhitelistRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteIdentityAccessListTidySettingsRequest +### NewAwsTidyIdentityWhitelistRequest -`func NewAWSWriteIdentityAccessListTidySettingsRequest() *AWSWriteIdentityAccessListTidySettingsRequest` +`func NewAwsTidyIdentityWhitelistRequest() *AwsTidyIdentityWhitelistRequest` -NewAWSWriteIdentityAccessListTidySettingsRequest instantiates a new AWSWriteIdentityAccessListTidySettingsRequest object +NewAwsTidyIdentityWhitelistRequest instantiates a new AwsTidyIdentityWhitelistRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults +### NewAwsTidyIdentityWhitelistRequestWithDefaults -`func NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults() *AWSWriteIdentityAccessListTidySettingsRequest` +`func NewAwsTidyIdentityWhitelistRequestWithDefaults() *AwsTidyIdentityWhitelistRequest` -NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults instantiates a new AWSWriteIdentityAccessListTidySettingsRequest object +NewAwsTidyIdentityWhitelistRequestWithDefaults instantiates a new AwsTidyIdentityWhitelistRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSafetyBuffer -`func (o *AWSWriteIdentityAccessListTidySettingsRequest) GetSafetyBuffer() int32` +`func (o *AwsTidyIdentityWhitelistRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSWriteIdentityAccessListTidySettingsRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsTidyIdentityWhitelistRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSWriteIdentityAccessListTidySettingsRequest) SetSafetyBuffer(v int32)` +`func (o *AwsTidyIdentityWhitelistRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSWriteIdentityAccessListTidySettingsRequest) HasSafetyBuffer() bool` +`func (o *AwsTidyIdentityWhitelistRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSWriteRoleTagDenyListTidySettingsRequest.md b/docs/AwsTidyRoleTagBlacklistRequest.md similarity index 58% rename from docs/AWSWriteRoleTagDenyListTidySettingsRequest.md rename to docs/AwsTidyRoleTagBlacklistRequest.md index 0d6d480a..6a8e62ff 100644 --- a/docs/AWSWriteRoleTagDenyListTidySettingsRequest.md +++ b/docs/AwsTidyRoleTagBlacklistRequest.md @@ -1,4 +1,4 @@ -# AWSWriteRoleTagDenyListTidySettingsRequest +# AwsTidyRoleTagBlacklistRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteRoleTagDenyListTidySettingsRequest +### NewAwsTidyRoleTagBlacklistRequest -`func NewAWSWriteRoleTagDenyListTidySettingsRequest() *AWSWriteRoleTagDenyListTidySettingsRequest` +`func NewAwsTidyRoleTagBlacklistRequest() *AwsTidyRoleTagBlacklistRequest` -NewAWSWriteRoleTagDenyListTidySettingsRequest instantiates a new AWSWriteRoleTagDenyListTidySettingsRequest object +NewAwsTidyRoleTagBlacklistRequest instantiates a new AwsTidyRoleTagBlacklistRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults +### NewAwsTidyRoleTagBlacklistRequestWithDefaults -`func NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults() *AWSWriteRoleTagDenyListTidySettingsRequest` +`func NewAwsTidyRoleTagBlacklistRequestWithDefaults() *AwsTidyRoleTagBlacklistRequest` -NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults instantiates a new AWSWriteRoleTagDenyListTidySettingsRequest object +NewAwsTidyRoleTagBlacklistRequestWithDefaults instantiates a new AwsTidyRoleTagBlacklistRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSafetyBuffer -`func (o *AWSWriteRoleTagDenyListTidySettingsRequest) GetSafetyBuffer() int32` +`func (o *AwsTidyRoleTagBlacklistRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSWriteRoleTagDenyListTidySettingsRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsTidyRoleTagBlacklistRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSWriteRoleTagDenyListTidySettingsRequest) SetSafetyBuffer(v int32)` +`func (o *AwsTidyRoleTagBlacklistRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSWriteRoleTagDenyListTidySettingsRequest) HasSafetyBuffer() bool` +`func (o *AwsTidyRoleTagBlacklistRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSWriteRoleTagBlackListTidySettingsRequest.md b/docs/AwsTidyRoleTagDenyListRequest.md similarity index 58% rename from docs/AWSWriteRoleTagBlackListTidySettingsRequest.md rename to docs/AwsTidyRoleTagDenyListRequest.md index d3c7089f..86f31583 100644 --- a/docs/AWSWriteRoleTagBlackListTidySettingsRequest.md +++ b/docs/AwsTidyRoleTagDenyListRequest.md @@ -1,4 +1,4 @@ -# AWSWriteRoleTagBlackListTidySettingsRequest +# AwsTidyRoleTagDenyListRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteRoleTagBlackListTidySettingsRequest +### NewAwsTidyRoleTagDenyListRequest -`func NewAWSWriteRoleTagBlackListTidySettingsRequest() *AWSWriteRoleTagBlackListTidySettingsRequest` +`func NewAwsTidyRoleTagDenyListRequest() *AwsTidyRoleTagDenyListRequest` -NewAWSWriteRoleTagBlackListTidySettingsRequest instantiates a new AWSWriteRoleTagBlackListTidySettingsRequest object +NewAwsTidyRoleTagDenyListRequest instantiates a new AwsTidyRoleTagDenyListRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults +### NewAwsTidyRoleTagDenyListRequestWithDefaults -`func NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults() *AWSWriteRoleTagBlackListTidySettingsRequest` +`func NewAwsTidyRoleTagDenyListRequestWithDefaults() *AwsTidyRoleTagDenyListRequest` -NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults instantiates a new AWSWriteRoleTagBlackListTidySettingsRequest object +NewAwsTidyRoleTagDenyListRequestWithDefaults instantiates a new AwsTidyRoleTagDenyListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSafetyBuffer -`func (o *AWSWriteRoleTagBlackListTidySettingsRequest) GetSafetyBuffer() int32` +`func (o *AwsTidyRoleTagDenyListRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *AWSWriteRoleTagBlackListTidySettingsRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *AwsTidyRoleTagDenyListRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *AWSWriteRoleTagBlackListTidySettingsRequest) SetSafetyBuffer(v int32)` +`func (o *AwsTidyRoleTagDenyListRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *AWSWriteRoleTagBlackListTidySettingsRequest) HasSafetyBuffer() bool` +`func (o *AwsTidyRoleTagDenyListRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. diff --git a/docs/AWSWriteAuthRoleTagRequest.md b/docs/AwsWriteRoleTagRequest.md similarity index 70% rename from docs/AWSWriteAuthRoleTagRequest.md rename to docs/AwsWriteRoleTagRequest.md index c7a2699e..6d511182 100644 --- a/docs/AWSWriteAuthRoleTagRequest.md +++ b/docs/AwsWriteRoleTagRequest.md @@ -1,4 +1,4 @@ -# AWSWriteAuthRoleTagRequest +# AwsWriteRoleTagRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSWriteAuthRoleTagRequest +### NewAwsWriteRoleTagRequest -`func NewAWSWriteAuthRoleTagRequest() *AWSWriteAuthRoleTagRequest` +`func NewAwsWriteRoleTagRequest() *AwsWriteRoleTagRequest` -NewAWSWriteAuthRoleTagRequest instantiates a new AWSWriteAuthRoleTagRequest object +NewAwsWriteRoleTagRequest instantiates a new AwsWriteRoleTagRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSWriteAuthRoleTagRequestWithDefaults +### NewAwsWriteRoleTagRequestWithDefaults -`func NewAWSWriteAuthRoleTagRequestWithDefaults() *AWSWriteAuthRoleTagRequest` +`func NewAwsWriteRoleTagRequestWithDefaults() *AwsWriteRoleTagRequest` -NewAWSWriteAuthRoleTagRequestWithDefaults instantiates a new AWSWriteAuthRoleTagRequest object +NewAwsWriteRoleTagRequestWithDefaults instantiates a new AwsWriteRoleTagRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowInstanceMigration -`func (o *AWSWriteAuthRoleTagRequest) GetAllowInstanceMigration() bool` +`func (o *AwsWriteRoleTagRequest) GetAllowInstanceMigration() bool` GetAllowInstanceMigration returns the AllowInstanceMigration field if non-nil, zero value otherwise. ### GetAllowInstanceMigrationOk -`func (o *AWSWriteAuthRoleTagRequest) GetAllowInstanceMigrationOk() (*bool, bool)` +`func (o *AwsWriteRoleTagRequest) GetAllowInstanceMigrationOk() (*bool, bool)` GetAllowInstanceMigrationOk returns a tuple with the AllowInstanceMigration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowInstanceMigration -`func (o *AWSWriteAuthRoleTagRequest) SetAllowInstanceMigration(v bool)` +`func (o *AwsWriteRoleTagRequest) SetAllowInstanceMigration(v bool)` SetAllowInstanceMigration sets AllowInstanceMigration field to given value. ### HasAllowInstanceMigration -`func (o *AWSWriteAuthRoleTagRequest) HasAllowInstanceMigration() bool` +`func (o *AwsWriteRoleTagRequest) HasAllowInstanceMigration() bool` HasAllowInstanceMigration returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasAllowInstanceMigration returns a boolean if a field has been set. ### GetDisallowReauthentication -`func (o *AWSWriteAuthRoleTagRequest) GetDisallowReauthentication() bool` +`func (o *AwsWriteRoleTagRequest) GetDisallowReauthentication() bool` GetDisallowReauthentication returns the DisallowReauthentication field if non-nil, zero value otherwise. ### GetDisallowReauthenticationOk -`func (o *AWSWriteAuthRoleTagRequest) GetDisallowReauthenticationOk() (*bool, bool)` +`func (o *AwsWriteRoleTagRequest) GetDisallowReauthenticationOk() (*bool, bool)` GetDisallowReauthenticationOk returns a tuple with the DisallowReauthentication field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisallowReauthentication -`func (o *AWSWriteAuthRoleTagRequest) SetDisallowReauthentication(v bool)` +`func (o *AwsWriteRoleTagRequest) SetDisallowReauthentication(v bool)` SetDisallowReauthentication sets DisallowReauthentication field to given value. ### HasDisallowReauthentication -`func (o *AWSWriteAuthRoleTagRequest) HasDisallowReauthentication() bool` +`func (o *AwsWriteRoleTagRequest) HasDisallowReauthentication() bool` HasDisallowReauthentication returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasDisallowReauthentication returns a boolean if a field has been set. ### GetInstanceId -`func (o *AWSWriteAuthRoleTagRequest) GetInstanceId() string` +`func (o *AwsWriteRoleTagRequest) GetInstanceId() string` GetInstanceId returns the InstanceId field if non-nil, zero value otherwise. ### GetInstanceIdOk -`func (o *AWSWriteAuthRoleTagRequest) GetInstanceIdOk() (*string, bool)` +`func (o *AwsWriteRoleTagRequest) GetInstanceIdOk() (*string, bool)` GetInstanceIdOk returns a tuple with the InstanceId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInstanceId -`func (o *AWSWriteAuthRoleTagRequest) SetInstanceId(v string)` +`func (o *AwsWriteRoleTagRequest) SetInstanceId(v string)` SetInstanceId sets InstanceId field to given value. ### HasInstanceId -`func (o *AWSWriteAuthRoleTagRequest) HasInstanceId() bool` +`func (o *AwsWriteRoleTagRequest) HasInstanceId() bool` HasInstanceId returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasInstanceId returns a boolean if a field has been set. ### GetMaxTtl -`func (o *AWSWriteAuthRoleTagRequest) GetMaxTtl() int32` +`func (o *AwsWriteRoleTagRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *AWSWriteAuthRoleTagRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *AwsWriteRoleTagRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *AWSWriteAuthRoleTagRequest) SetMaxTtl(v int32)` +`func (o *AwsWriteRoleTagRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *AWSWriteAuthRoleTagRequest) HasMaxTtl() bool` +`func (o *AwsWriteRoleTagRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetPolicies -`func (o *AWSWriteAuthRoleTagRequest) GetPolicies() []string` +`func (o *AwsWriteRoleTagRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *AWSWriteAuthRoleTagRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *AwsWriteRoleTagRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *AWSWriteAuthRoleTagRequest) SetPolicies(v []string)` +`func (o *AwsWriteRoleTagRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *AWSWriteAuthRoleTagRequest) HasPolicies() bool` +`func (o *AwsWriteRoleTagRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. diff --git a/docs/AWSConfigWriteSecurityTokenServiceAccountRequest.md b/docs/AwsWriteStsRoleRequest.md similarity index 55% rename from docs/AWSConfigWriteSecurityTokenServiceAccountRequest.md rename to docs/AwsWriteStsRoleRequest.md index b04ff7fe..c9b6e034 100644 --- a/docs/AWSConfigWriteSecurityTokenServiceAccountRequest.md +++ b/docs/AwsWriteStsRoleRequest.md @@ -1,4 +1,4 @@ -# AWSConfigWriteSecurityTokenServiceAccountRequest +# AwsWriteStsRoleRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAWSConfigWriteSecurityTokenServiceAccountRequest +### NewAwsWriteStsRoleRequest -`func NewAWSConfigWriteSecurityTokenServiceAccountRequest() *AWSConfigWriteSecurityTokenServiceAccountRequest` +`func NewAwsWriteStsRoleRequest() *AwsWriteStsRoleRequest` -NewAWSConfigWriteSecurityTokenServiceAccountRequest instantiates a new AWSConfigWriteSecurityTokenServiceAccountRequest object +NewAwsWriteStsRoleRequest instantiates a new AwsWriteStsRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults +### NewAwsWriteStsRoleRequestWithDefaults -`func NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults() *AWSConfigWriteSecurityTokenServiceAccountRequest` +`func NewAwsWriteStsRoleRequestWithDefaults() *AwsWriteStsRoleRequest` -NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults instantiates a new AWSConfigWriteSecurityTokenServiceAccountRequest object +NewAwsWriteStsRoleRequestWithDefaults instantiates a new AwsWriteStsRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetStsRole -`func (o *AWSConfigWriteSecurityTokenServiceAccountRequest) GetStsRole() string` +`func (o *AwsWriteStsRoleRequest) GetStsRole() string` GetStsRole returns the StsRole field if non-nil, zero value otherwise. ### GetStsRoleOk -`func (o *AWSConfigWriteSecurityTokenServiceAccountRequest) GetStsRoleOk() (*string, bool)` +`func (o *AwsWriteStsRoleRequest) GetStsRoleOk() (*string, bool)` GetStsRoleOk returns a tuple with the StsRole field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStsRole -`func (o *AWSConfigWriteSecurityTokenServiceAccountRequest) SetStsRole(v string)` +`func (o *AwsWriteStsRoleRequest) SetStsRole(v string)` SetStsRole sets StsRole field to given value. ### HasStsRole -`func (o *AWSConfigWriteSecurityTokenServiceAccountRequest) HasStsRole() bool` +`func (o *AwsWriteStsRoleRequest) HasStsRole() bool` HasStsRole returns a boolean if a field has been set. diff --git a/docs/AzureWriteAuthConfigRequest.md b/docs/AzureConfigureAuthRequest.md similarity index 59% rename from docs/AzureWriteAuthConfigRequest.md rename to docs/AzureConfigureAuthRequest.md index d9e55ef4..0d95bc3d 100644 --- a/docs/AzureWriteAuthConfigRequest.md +++ b/docs/AzureConfigureAuthRequest.md @@ -1,4 +1,4 @@ -# AzureWriteAuthConfigRequest +# AzureConfigureAuthRequest ## Properties @@ -9,6 +9,7 @@ Name | Type | Description | Notes **ClientSecret** | Pointer to **string** | The OAuth2 client secret to connection to Azure. This value can also be provided with the AZURE_CLIENT_SECRET environment variable. | [optional] **Environment** | Pointer to **string** | The Azure environment name. If not provided, AzurePublicCloud is used. This value can also be provided with the AZURE_ENVIRONMENT environment variable. | [optional] **Resource** | Pointer to **string** | The resource URL for the vault application in Azure Active Directory. This value can also be provided with the AZURE_AD_RESOURCE environment variable. | [optional] +**RootPasswordTtl** | Pointer to **int32** | The TTL of the root password in Azure. This can be either a number of seconds or a time formatted duration (ex: 24h, 48ds) | [optional] **TenantId** | Pointer to **string** | The tenant id for the Azure Active Directory. This is sometimes referred to as Directory ID in AD. This value can also be provided with the AZURE_TENANT_ID environment variable. | [optional] @@ -16,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewAzureWriteAuthConfigRequest +### NewAzureConfigureAuthRequest -`func NewAzureWriteAuthConfigRequest() *AzureWriteAuthConfigRequest` +`func NewAzureConfigureAuthRequest() *AzureConfigureAuthRequest` -NewAzureWriteAuthConfigRequest instantiates a new AzureWriteAuthConfigRequest object +NewAzureConfigureAuthRequest instantiates a new AzureConfigureAuthRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAzureWriteAuthConfigRequestWithDefaults +### NewAzureConfigureAuthRequestWithDefaults -`func NewAzureWriteAuthConfigRequestWithDefaults() *AzureWriteAuthConfigRequest` +`func NewAzureConfigureAuthRequestWithDefaults() *AzureConfigureAuthRequest` -NewAzureWriteAuthConfigRequestWithDefaults instantiates a new AzureWriteAuthConfigRequest object +NewAzureConfigureAuthRequestWithDefaults instantiates a new AzureConfigureAuthRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientId -`func (o *AzureWriteAuthConfigRequest) GetClientId() string` +`func (o *AzureConfigureAuthRequest) GetClientId() string` GetClientId returns the ClientId field if non-nil, zero value otherwise. ### GetClientIdOk -`func (o *AzureWriteAuthConfigRequest) GetClientIdOk() (*string, bool)` +`func (o *AzureConfigureAuthRequest) GetClientIdOk() (*string, bool)` GetClientIdOk returns a tuple with the ClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientId -`func (o *AzureWriteAuthConfigRequest) SetClientId(v string)` +`func (o *AzureConfigureAuthRequest) SetClientId(v string)` SetClientId sets ClientId field to given value. ### HasClientId -`func (o *AzureWriteAuthConfigRequest) HasClientId() bool` +`func (o *AzureConfigureAuthRequest) HasClientId() bool` HasClientId returns a boolean if a field has been set. @@ -65,27 +66,27 @@ HasClientId returns a boolean if a field has been set. ### GetClientSecret -`func (o *AzureWriteAuthConfigRequest) GetClientSecret() string` +`func (o *AzureConfigureAuthRequest) GetClientSecret() string` GetClientSecret returns the ClientSecret field if non-nil, zero value otherwise. ### GetClientSecretOk -`func (o *AzureWriteAuthConfigRequest) GetClientSecretOk() (*string, bool)` +`func (o *AzureConfigureAuthRequest) GetClientSecretOk() (*string, bool)` GetClientSecretOk returns a tuple with the ClientSecret field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientSecret -`func (o *AzureWriteAuthConfigRequest) SetClientSecret(v string)` +`func (o *AzureConfigureAuthRequest) SetClientSecret(v string)` SetClientSecret sets ClientSecret field to given value. ### HasClientSecret -`func (o *AzureWriteAuthConfigRequest) HasClientSecret() bool` +`func (o *AzureConfigureAuthRequest) HasClientSecret() bool` HasClientSecret returns a boolean if a field has been set. @@ -94,27 +95,27 @@ HasClientSecret returns a boolean if a field has been set. ### GetEnvironment -`func (o *AzureWriteAuthConfigRequest) GetEnvironment() string` +`func (o *AzureConfigureAuthRequest) GetEnvironment() string` GetEnvironment returns the Environment field if non-nil, zero value otherwise. ### GetEnvironmentOk -`func (o *AzureWriteAuthConfigRequest) GetEnvironmentOk() (*string, bool)` +`func (o *AzureConfigureAuthRequest) GetEnvironmentOk() (*string, bool)` GetEnvironmentOk returns a tuple with the Environment field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnvironment -`func (o *AzureWriteAuthConfigRequest) SetEnvironment(v string)` +`func (o *AzureConfigureAuthRequest) SetEnvironment(v string)` SetEnvironment sets Environment field to given value. ### HasEnvironment -`func (o *AzureWriteAuthConfigRequest) HasEnvironment() bool` +`func (o *AzureConfigureAuthRequest) HasEnvironment() bool` HasEnvironment returns a boolean if a field has been set. @@ -123,56 +124,85 @@ HasEnvironment returns a boolean if a field has been set. ### GetResource -`func (o *AzureWriteAuthConfigRequest) GetResource() string` +`func (o *AzureConfigureAuthRequest) GetResource() string` GetResource returns the Resource field if non-nil, zero value otherwise. ### GetResourceOk -`func (o *AzureWriteAuthConfigRequest) GetResourceOk() (*string, bool)` +`func (o *AzureConfigureAuthRequest) GetResourceOk() (*string, bool)` GetResourceOk returns a tuple with the Resource field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetResource -`func (o *AzureWriteAuthConfigRequest) SetResource(v string)` +`func (o *AzureConfigureAuthRequest) SetResource(v string)` SetResource sets Resource field to given value. ### HasResource -`func (o *AzureWriteAuthConfigRequest) HasResource() bool` +`func (o *AzureConfigureAuthRequest) HasResource() bool` HasResource returns a boolean if a field has been set. +### GetRootPasswordTtl + +`func (o *AzureConfigureAuthRequest) GetRootPasswordTtl() int32` + +GetRootPasswordTtl returns the RootPasswordTtl field if non-nil, zero value otherwise. + +### GetRootPasswordTtlOk + +`func (o *AzureConfigureAuthRequest) GetRootPasswordTtlOk() (*int32, bool)` + +GetRootPasswordTtlOk returns a tuple with the RootPasswordTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRootPasswordTtl + +`func (o *AzureConfigureAuthRequest) SetRootPasswordTtl(v int32)` + +SetRootPasswordTtl sets RootPasswordTtl field to given value. + + +### HasRootPasswordTtl + +`func (o *AzureConfigureAuthRequest) HasRootPasswordTtl() bool` + +HasRootPasswordTtl returns a boolean if a field has been set. + + + + ### GetTenantId -`func (o *AzureWriteAuthConfigRequest) GetTenantId() string` +`func (o *AzureConfigureAuthRequest) GetTenantId() string` GetTenantId returns the TenantId field if non-nil, zero value otherwise. ### GetTenantIdOk -`func (o *AzureWriteAuthConfigRequest) GetTenantIdOk() (*string, bool)` +`func (o *AzureConfigureAuthRequest) GetTenantIdOk() (*string, bool)` GetTenantIdOk returns a tuple with the TenantId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTenantId -`func (o *AzureWriteAuthConfigRequest) SetTenantId(v string)` +`func (o *AzureConfigureAuthRequest) SetTenantId(v string)` SetTenantId sets TenantId field to given value. ### HasTenantId -`func (o *AzureWriteAuthConfigRequest) HasTenantId() bool` +`func (o *AzureConfigureAuthRequest) HasTenantId() bool` HasTenantId returns a boolean if a field has been set. diff --git a/docs/AzureWriteConfigRequest.md b/docs/AzureConfigureRequest.md similarity index 69% rename from docs/AzureWriteConfigRequest.md rename to docs/AzureConfigureRequest.md index 2ca9f3d4..18638b06 100644 --- a/docs/AzureWriteConfigRequest.md +++ b/docs/AzureConfigureRequest.md @@ -1,4 +1,4 @@ -# AzureWriteConfigRequest +# AzureConfigureRequest ## Properties @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewAzureWriteConfigRequest +### NewAzureConfigureRequest -`func NewAzureWriteConfigRequest() *AzureWriteConfigRequest` +`func NewAzureConfigureRequest() *AzureConfigureRequest` -NewAzureWriteConfigRequest instantiates a new AzureWriteConfigRequest object +NewAzureConfigureRequest instantiates a new AzureConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAzureWriteConfigRequestWithDefaults +### NewAzureConfigureRequestWithDefaults -`func NewAzureWriteConfigRequestWithDefaults() *AzureWriteConfigRequest` +`func NewAzureConfigureRequestWithDefaults() *AzureConfigureRequest` -NewAzureWriteConfigRequestWithDefaults instantiates a new AzureWriteConfigRequest object +NewAzureConfigureRequestWithDefaults instantiates a new AzureConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientId -`func (o *AzureWriteConfigRequest) GetClientId() string` +`func (o *AzureConfigureRequest) GetClientId() string` GetClientId returns the ClientId field if non-nil, zero value otherwise. ### GetClientIdOk -`func (o *AzureWriteConfigRequest) GetClientIdOk() (*string, bool)` +`func (o *AzureConfigureRequest) GetClientIdOk() (*string, bool)` GetClientIdOk returns a tuple with the ClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientId -`func (o *AzureWriteConfigRequest) SetClientId(v string)` +`func (o *AzureConfigureRequest) SetClientId(v string)` SetClientId sets ClientId field to given value. ### HasClientId -`func (o *AzureWriteConfigRequest) HasClientId() bool` +`func (o *AzureConfigureRequest) HasClientId() bool` HasClientId returns a boolean if a field has been set. @@ -67,27 +67,27 @@ HasClientId returns a boolean if a field has been set. ### GetClientSecret -`func (o *AzureWriteConfigRequest) GetClientSecret() string` +`func (o *AzureConfigureRequest) GetClientSecret() string` GetClientSecret returns the ClientSecret field if non-nil, zero value otherwise. ### GetClientSecretOk -`func (o *AzureWriteConfigRequest) GetClientSecretOk() (*string, bool)` +`func (o *AzureConfigureRequest) GetClientSecretOk() (*string, bool)` GetClientSecretOk returns a tuple with the ClientSecret field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientSecret -`func (o *AzureWriteConfigRequest) SetClientSecret(v string)` +`func (o *AzureConfigureRequest) SetClientSecret(v string)` SetClientSecret sets ClientSecret field to given value. ### HasClientSecret -`func (o *AzureWriteConfigRequest) HasClientSecret() bool` +`func (o *AzureConfigureRequest) HasClientSecret() bool` HasClientSecret returns a boolean if a field has been set. @@ -96,27 +96,27 @@ HasClientSecret returns a boolean if a field has been set. ### GetEnvironment -`func (o *AzureWriteConfigRequest) GetEnvironment() string` +`func (o *AzureConfigureRequest) GetEnvironment() string` GetEnvironment returns the Environment field if non-nil, zero value otherwise. ### GetEnvironmentOk -`func (o *AzureWriteConfigRequest) GetEnvironmentOk() (*string, bool)` +`func (o *AzureConfigureRequest) GetEnvironmentOk() (*string, bool)` GetEnvironmentOk returns a tuple with the Environment field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnvironment -`func (o *AzureWriteConfigRequest) SetEnvironment(v string)` +`func (o *AzureConfigureRequest) SetEnvironment(v string)` SetEnvironment sets Environment field to given value. ### HasEnvironment -`func (o *AzureWriteConfigRequest) HasEnvironment() bool` +`func (o *AzureConfigureRequest) HasEnvironment() bool` HasEnvironment returns a boolean if a field has been set. @@ -125,27 +125,27 @@ HasEnvironment returns a boolean if a field has been set. ### GetPasswordPolicy -`func (o *AzureWriteConfigRequest) GetPasswordPolicy() string` +`func (o *AzureConfigureRequest) GetPasswordPolicy() string` GetPasswordPolicy returns the PasswordPolicy field if non-nil, zero value otherwise. ### GetPasswordPolicyOk -`func (o *AzureWriteConfigRequest) GetPasswordPolicyOk() (*string, bool)` +`func (o *AzureConfigureRequest) GetPasswordPolicyOk() (*string, bool)` GetPasswordPolicyOk returns a tuple with the PasswordPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPasswordPolicy -`func (o *AzureWriteConfigRequest) SetPasswordPolicy(v string)` +`func (o *AzureConfigureRequest) SetPasswordPolicy(v string)` SetPasswordPolicy sets PasswordPolicy field to given value. ### HasPasswordPolicy -`func (o *AzureWriteConfigRequest) HasPasswordPolicy() bool` +`func (o *AzureConfigureRequest) HasPasswordPolicy() bool` HasPasswordPolicy returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasPasswordPolicy returns a boolean if a field has been set. ### GetRootPasswordTtl -`func (o *AzureWriteConfigRequest) GetRootPasswordTtl() int32` +`func (o *AzureConfigureRequest) GetRootPasswordTtl() int32` GetRootPasswordTtl returns the RootPasswordTtl field if non-nil, zero value otherwise. ### GetRootPasswordTtlOk -`func (o *AzureWriteConfigRequest) GetRootPasswordTtlOk() (*int32, bool)` +`func (o *AzureConfigureRequest) GetRootPasswordTtlOk() (*int32, bool)` GetRootPasswordTtlOk returns a tuple with the RootPasswordTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRootPasswordTtl -`func (o *AzureWriteConfigRequest) SetRootPasswordTtl(v int32)` +`func (o *AzureConfigureRequest) SetRootPasswordTtl(v int32)` SetRootPasswordTtl sets RootPasswordTtl field to given value. ### HasRootPasswordTtl -`func (o *AzureWriteConfigRequest) HasRootPasswordTtl() bool` +`func (o *AzureConfigureRequest) HasRootPasswordTtl() bool` HasRootPasswordTtl returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasRootPasswordTtl returns a boolean if a field has been set. ### GetSubscriptionId -`func (o *AzureWriteConfigRequest) GetSubscriptionId() string` +`func (o *AzureConfigureRequest) GetSubscriptionId() string` GetSubscriptionId returns the SubscriptionId field if non-nil, zero value otherwise. ### GetSubscriptionIdOk -`func (o *AzureWriteConfigRequest) GetSubscriptionIdOk() (*string, bool)` +`func (o *AzureConfigureRequest) GetSubscriptionIdOk() (*string, bool)` GetSubscriptionIdOk returns a tuple with the SubscriptionId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSubscriptionId -`func (o *AzureWriteConfigRequest) SetSubscriptionId(v string)` +`func (o *AzureConfigureRequest) SetSubscriptionId(v string)` SetSubscriptionId sets SubscriptionId field to given value. ### HasSubscriptionId -`func (o *AzureWriteConfigRequest) HasSubscriptionId() bool` +`func (o *AzureConfigureRequest) HasSubscriptionId() bool` HasSubscriptionId returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasSubscriptionId returns a boolean if a field has been set. ### GetTenantId -`func (o *AzureWriteConfigRequest) GetTenantId() string` +`func (o *AzureConfigureRequest) GetTenantId() string` GetTenantId returns the TenantId field if non-nil, zero value otherwise. ### GetTenantIdOk -`func (o *AzureWriteConfigRequest) GetTenantIdOk() (*string, bool)` +`func (o *AzureConfigureRequest) GetTenantIdOk() (*string, bool)` GetTenantIdOk returns a tuple with the TenantId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTenantId -`func (o *AzureWriteConfigRequest) SetTenantId(v string)` +`func (o *AzureConfigureRequest) SetTenantId(v string)` SetTenantId sets TenantId field to given value. ### HasTenantId -`func (o *AzureWriteConfigRequest) HasTenantId() bool` +`func (o *AzureConfigureRequest) HasTenantId() bool` HasTenantId returns a boolean if a field has been set. diff --git a/docs/AzureLoginRequest.md b/docs/AzureLoginRequest.md index 6b78f75c..5f53b871 100644 --- a/docs/AzureLoginRequest.md +++ b/docs/AzureLoginRequest.md @@ -7,6 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Jwt** | Pointer to **string** | A signed JWT | [optional] **ResourceGroupName** | Pointer to **string** | The resource group from the instance. | [optional] +**ResourceId** | Pointer to **string** | The fully qualified ID of the resource, includingthe resource name and resource type. Use the format, /subscriptions/{guid}/resourceGroups/{resource-group-name}/{resource-provider-namespace}/{resource-type}/{resource-name}. This value is ignored if vm_name or vmss_name is specified. | [optional] **Role** | Pointer to **string** | The token role. | [optional] **SubscriptionId** | Pointer to **string** | The subscription id for the instance. | [optional] **VmName** | Pointer to **string** | The name of the virtual machine. This value is ignored if vmss_name is specified. | [optional] @@ -93,6 +94,35 @@ HasResourceGroupName returns a boolean if a field has been set. +### GetResourceId + +`func (o *AzureLoginRequest) GetResourceId() string` + +GetResourceId returns the ResourceId field if non-nil, zero value otherwise. + +### GetResourceIdOk + +`func (o *AzureLoginRequest) GetResourceIdOk() (*string, bool)` + +GetResourceIdOk returns a tuple with the ResourceId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetResourceId + +`func (o *AzureLoginRequest) SetResourceId(v string)` + +SetResourceId sets ResourceId field to given value. + + +### HasResourceId + +`func (o *AzureLoginRequest) HasResourceId() bool` + +HasResourceId returns a boolean if a field has been set. + + + + ### GetRole `func (o *AzureLoginRequest) GetRole() string` diff --git a/docs/AzureWriteRoleRequest.md b/docs/AzureWriteRoleRequest.md index aa520a9a..e15aff9f 100644 --- a/docs/AzureWriteRoleRequest.md +++ b/docs/AzureWriteRoleRequest.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes **AzureRoles** | Pointer to **string** | JSON list of Azure roles to assign. | [optional] **MaxTtl** | Pointer to **int32** | Maximum time a service principal. If not set or set to 0, will use system default. | [optional] **PermanentlyDelete** | Pointer to **bool** | Indicates whether new application objects should be permanently deleted. If not set, objects will not be permanently deleted. | [optional] [default to false] +**PersistApp** | Pointer to **bool** | Persist the app between generated credentials. Useful if the app needs to maintain owner ship of resources it creates | [optional] [default to false] **Ttl** | Pointer to **int32** | Default lease for generated credentials. If not set or set to 0, will use system default. | [optional] @@ -180,6 +181,35 @@ HasPermanentlyDelete returns a boolean if a field has been set. +### GetPersistApp + +`func (o *AzureWriteRoleRequest) GetPersistApp() bool` + +GetPersistApp returns the PersistApp field if non-nil, zero value otherwise. + +### GetPersistAppOk + +`func (o *AzureWriteRoleRequest) GetPersistAppOk() (*bool, bool)` + +GetPersistAppOk returns a tuple with the PersistApp field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPersistApp + +`func (o *AzureWriteRoleRequest) SetPersistApp(v bool)` + +SetPersistApp sets PersistApp field to given value. + + +### HasPersistApp + +`func (o *AzureWriteRoleRequest) HasPersistApp() bool` + +HasPersistApp returns a boolean if a field has been set. + + + + ### GetTtl `func (o *AzureWriteRoleRequest) GetTtl() int32` diff --git a/docs/CentrifyWriteConfigRequest.md b/docs/CentrifyConfigureRequest.md similarity index 67% rename from docs/CentrifyWriteConfigRequest.md rename to docs/CentrifyConfigureRequest.md index 775b3f22..8d34d732 100644 --- a/docs/CentrifyWriteConfigRequest.md +++ b/docs/CentrifyConfigureRequest.md @@ -1,4 +1,4 @@ -# CentrifyWriteConfigRequest +# CentrifyConfigureRequest ## Properties @@ -23,47 +23,47 @@ Name | Type | Description | Notes ## Methods -### NewCentrifyWriteConfigRequest +### NewCentrifyConfigureRequest -`func NewCentrifyWriteConfigRequest() *CentrifyWriteConfigRequest` +`func NewCentrifyConfigureRequest() *CentrifyConfigureRequest` -NewCentrifyWriteConfigRequest instantiates a new CentrifyWriteConfigRequest object +NewCentrifyConfigureRequest instantiates a new CentrifyConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewCentrifyWriteConfigRequestWithDefaults +### NewCentrifyConfigureRequestWithDefaults -`func NewCentrifyWriteConfigRequestWithDefaults() *CentrifyWriteConfigRequest` +`func NewCentrifyConfigureRequestWithDefaults() *CentrifyConfigureRequest` -NewCentrifyWriteConfigRequestWithDefaults instantiates a new CentrifyWriteConfigRequest object +NewCentrifyConfigureRequestWithDefaults instantiates a new CentrifyConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAppId -`func (o *CentrifyWriteConfigRequest) GetAppId() string` +`func (o *CentrifyConfigureRequest) GetAppId() string` GetAppId returns the AppId field if non-nil, zero value otherwise. ### GetAppIdOk -`func (o *CentrifyWriteConfigRequest) GetAppIdOk() (*string, bool)` +`func (o *CentrifyConfigureRequest) GetAppIdOk() (*string, bool)` GetAppIdOk returns a tuple with the AppId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAppId -`func (o *CentrifyWriteConfigRequest) SetAppId(v string)` +`func (o *CentrifyConfigureRequest) SetAppId(v string)` SetAppId sets AppId field to given value. ### HasAppId -`func (o *CentrifyWriteConfigRequest) HasAppId() bool` +`func (o *CentrifyConfigureRequest) HasAppId() bool` HasAppId returns a boolean if a field has been set. @@ -72,27 +72,27 @@ HasAppId returns a boolean if a field has been set. ### GetClientId -`func (o *CentrifyWriteConfigRequest) GetClientId() string` +`func (o *CentrifyConfigureRequest) GetClientId() string` GetClientId returns the ClientId field if non-nil, zero value otherwise. ### GetClientIdOk -`func (o *CentrifyWriteConfigRequest) GetClientIdOk() (*string, bool)` +`func (o *CentrifyConfigureRequest) GetClientIdOk() (*string, bool)` GetClientIdOk returns a tuple with the ClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientId -`func (o *CentrifyWriteConfigRequest) SetClientId(v string)` +`func (o *CentrifyConfigureRequest) SetClientId(v string)` SetClientId sets ClientId field to given value. ### HasClientId -`func (o *CentrifyWriteConfigRequest) HasClientId() bool` +`func (o *CentrifyConfigureRequest) HasClientId() bool` HasClientId returns a boolean if a field has been set. @@ -101,27 +101,27 @@ HasClientId returns a boolean if a field has been set. ### GetClientSecret -`func (o *CentrifyWriteConfigRequest) GetClientSecret() string` +`func (o *CentrifyConfigureRequest) GetClientSecret() string` GetClientSecret returns the ClientSecret field if non-nil, zero value otherwise. ### GetClientSecretOk -`func (o *CentrifyWriteConfigRequest) GetClientSecretOk() (*string, bool)` +`func (o *CentrifyConfigureRequest) GetClientSecretOk() (*string, bool)` GetClientSecretOk returns a tuple with the ClientSecret field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientSecret -`func (o *CentrifyWriteConfigRequest) SetClientSecret(v string)` +`func (o *CentrifyConfigureRequest) SetClientSecret(v string)` SetClientSecret sets ClientSecret field to given value. ### HasClientSecret -`func (o *CentrifyWriteConfigRequest) HasClientSecret() bool` +`func (o *CentrifyConfigureRequest) HasClientSecret() bool` HasClientSecret returns a boolean if a field has been set. @@ -130,27 +130,27 @@ HasClientSecret returns a boolean if a field has been set. ### GetPolicies -`func (o *CentrifyWriteConfigRequest) GetPolicies() []string` +`func (o *CentrifyConfigureRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *CentrifyWriteConfigRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *CentrifyConfigureRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *CentrifyWriteConfigRequest) SetPolicies(v []string)` +`func (o *CentrifyConfigureRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *CentrifyWriteConfigRequest) HasPolicies() bool` +`func (o *CentrifyConfigureRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -159,27 +159,27 @@ HasPolicies returns a boolean if a field has been set. ### GetScope -`func (o *CentrifyWriteConfigRequest) GetScope() string` +`func (o *CentrifyConfigureRequest) GetScope() string` GetScope returns the Scope field if non-nil, zero value otherwise. ### GetScopeOk -`func (o *CentrifyWriteConfigRequest) GetScopeOk() (*string, bool)` +`func (o *CentrifyConfigureRequest) GetScopeOk() (*string, bool)` GetScopeOk returns a tuple with the Scope field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetScope -`func (o *CentrifyWriteConfigRequest) SetScope(v string)` +`func (o *CentrifyConfigureRequest) SetScope(v string)` SetScope sets Scope field to given value. ### HasScope -`func (o *CentrifyWriteConfigRequest) HasScope() bool` +`func (o *CentrifyConfigureRequest) HasScope() bool` HasScope returns a boolean if a field has been set. @@ -188,27 +188,27 @@ HasScope returns a boolean if a field has been set. ### GetServiceUrl -`func (o *CentrifyWriteConfigRequest) GetServiceUrl() string` +`func (o *CentrifyConfigureRequest) GetServiceUrl() string` GetServiceUrl returns the ServiceUrl field if non-nil, zero value otherwise. ### GetServiceUrlOk -`func (o *CentrifyWriteConfigRequest) GetServiceUrlOk() (*string, bool)` +`func (o *CentrifyConfigureRequest) GetServiceUrlOk() (*string, bool)` GetServiceUrlOk returns a tuple with the ServiceUrl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetServiceUrl -`func (o *CentrifyWriteConfigRequest) SetServiceUrl(v string)` +`func (o *CentrifyConfigureRequest) SetServiceUrl(v string)` SetServiceUrl sets ServiceUrl field to given value. ### HasServiceUrl -`func (o *CentrifyWriteConfigRequest) HasServiceUrl() bool` +`func (o *CentrifyConfigureRequest) HasServiceUrl() bool` HasServiceUrl returns a boolean if a field has been set. @@ -217,27 +217,27 @@ HasServiceUrl returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *CentrifyWriteConfigRequest) GetTokenBoundCidrs() []string` +`func (o *CentrifyConfigureRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *CentrifyWriteConfigRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *CentrifyConfigureRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *CentrifyWriteConfigRequest) SetTokenBoundCidrs(v []string)` +`func (o *CentrifyConfigureRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *CentrifyWriteConfigRequest) HasTokenBoundCidrs() bool` +`func (o *CentrifyConfigureRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -246,27 +246,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *CentrifyWriteConfigRequest) GetTokenNoDefaultPolicy() bool` +`func (o *CentrifyConfigureRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *CentrifyWriteConfigRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *CentrifyConfigureRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *CentrifyWriteConfigRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *CentrifyConfigureRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *CentrifyWriteConfigRequest) HasTokenNoDefaultPolicy() bool` +`func (o *CentrifyConfigureRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -275,27 +275,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *CentrifyWriteConfigRequest) GetTokenNumUses() int32` +`func (o *CentrifyConfigureRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *CentrifyWriteConfigRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *CentrifyConfigureRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *CentrifyWriteConfigRequest) SetTokenNumUses(v int32)` +`func (o *CentrifyConfigureRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *CentrifyWriteConfigRequest) HasTokenNumUses() bool` +`func (o *CentrifyConfigureRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -304,27 +304,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *CentrifyWriteConfigRequest) GetTokenPolicies() []string` +`func (o *CentrifyConfigureRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *CentrifyWriteConfigRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *CentrifyConfigureRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *CentrifyWriteConfigRequest) SetTokenPolicies(v []string)` +`func (o *CentrifyConfigureRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *CentrifyWriteConfigRequest) HasTokenPolicies() bool` +`func (o *CentrifyConfigureRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -333,27 +333,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *CentrifyWriteConfigRequest) GetTokenTtl() int32` +`func (o *CentrifyConfigureRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *CentrifyWriteConfigRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *CentrifyConfigureRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *CentrifyWriteConfigRequest) SetTokenTtl(v int32)` +`func (o *CentrifyConfigureRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *CentrifyWriteConfigRequest) HasTokenTtl() bool` +`func (o *CentrifyConfigureRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -362,27 +362,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *CentrifyWriteConfigRequest) GetTokenType() string` +`func (o *CentrifyConfigureRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *CentrifyWriteConfigRequest) GetTokenTypeOk() (*string, bool)` +`func (o *CentrifyConfigureRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *CentrifyWriteConfigRequest) SetTokenType(v string)` +`func (o *CentrifyConfigureRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *CentrifyWriteConfigRequest) HasTokenType() bool` +`func (o *CentrifyConfigureRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. diff --git a/docs/CertificatesWriteConfigRequest.md b/docs/CertConfigureRequest.md similarity index 67% rename from docs/CertificatesWriteConfigRequest.md rename to docs/CertConfigureRequest.md index 20730a17..86b2b71b 100644 --- a/docs/CertificatesWriteConfigRequest.md +++ b/docs/CertConfigureRequest.md @@ -1,4 +1,4 @@ -# CertificatesWriteConfigRequest +# CertConfigureRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewCertificatesWriteConfigRequest +### NewCertConfigureRequest -`func NewCertificatesWriteConfigRequest() *CertificatesWriteConfigRequest` +`func NewCertConfigureRequest() *CertConfigureRequest` -NewCertificatesWriteConfigRequest instantiates a new CertificatesWriteConfigRequest object +NewCertConfigureRequest instantiates a new CertConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewCertificatesWriteConfigRequestWithDefaults +### NewCertConfigureRequestWithDefaults -`func NewCertificatesWriteConfigRequestWithDefaults() *CertificatesWriteConfigRequest` +`func NewCertConfigureRequestWithDefaults() *CertConfigureRequest` -NewCertificatesWriteConfigRequestWithDefaults instantiates a new CertificatesWriteConfigRequest object +NewCertConfigureRequestWithDefaults instantiates a new CertConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisableBinding -`func (o *CertificatesWriteConfigRequest) GetDisableBinding() bool` +`func (o *CertConfigureRequest) GetDisableBinding() bool` GetDisableBinding returns the DisableBinding field if non-nil, zero value otherwise. ### GetDisableBindingOk -`func (o *CertificatesWriteConfigRequest) GetDisableBindingOk() (*bool, bool)` +`func (o *CertConfigureRequest) GetDisableBindingOk() (*bool, bool)` GetDisableBindingOk returns a tuple with the DisableBinding field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisableBinding -`func (o *CertificatesWriteConfigRequest) SetDisableBinding(v bool)` +`func (o *CertConfigureRequest) SetDisableBinding(v bool)` SetDisableBinding sets DisableBinding field to given value. ### HasDisableBinding -`func (o *CertificatesWriteConfigRequest) HasDisableBinding() bool` +`func (o *CertConfigureRequest) HasDisableBinding() bool` HasDisableBinding returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasDisableBinding returns a boolean if a field has been set. ### GetEnableIdentityAliasMetadata -`func (o *CertificatesWriteConfigRequest) GetEnableIdentityAliasMetadata() bool` +`func (o *CertConfigureRequest) GetEnableIdentityAliasMetadata() bool` GetEnableIdentityAliasMetadata returns the EnableIdentityAliasMetadata field if non-nil, zero value otherwise. ### GetEnableIdentityAliasMetadataOk -`func (o *CertificatesWriteConfigRequest) GetEnableIdentityAliasMetadataOk() (*bool, bool)` +`func (o *CertConfigureRequest) GetEnableIdentityAliasMetadataOk() (*bool, bool)` GetEnableIdentityAliasMetadataOk returns a tuple with the EnableIdentityAliasMetadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnableIdentityAliasMetadata -`func (o *CertificatesWriteConfigRequest) SetEnableIdentityAliasMetadata(v bool)` +`func (o *CertConfigureRequest) SetEnableIdentityAliasMetadata(v bool)` SetEnableIdentityAliasMetadata sets EnableIdentityAliasMetadata field to given value. ### HasEnableIdentityAliasMetadata -`func (o *CertificatesWriteConfigRequest) HasEnableIdentityAliasMetadata() bool` +`func (o *CertConfigureRequest) HasEnableIdentityAliasMetadata() bool` HasEnableIdentityAliasMetadata returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasEnableIdentityAliasMetadata returns a boolean if a field has been set. ### GetOcspCacheSize -`func (o *CertificatesWriteConfigRequest) GetOcspCacheSize() int32` +`func (o *CertConfigureRequest) GetOcspCacheSize() int32` GetOcspCacheSize returns the OcspCacheSize field if non-nil, zero value otherwise. ### GetOcspCacheSizeOk -`func (o *CertificatesWriteConfigRequest) GetOcspCacheSizeOk() (*int32, bool)` +`func (o *CertConfigureRequest) GetOcspCacheSizeOk() (*int32, bool)` GetOcspCacheSizeOk returns a tuple with the OcspCacheSize field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspCacheSize -`func (o *CertificatesWriteConfigRequest) SetOcspCacheSize(v int32)` +`func (o *CertConfigureRequest) SetOcspCacheSize(v int32)` SetOcspCacheSize sets OcspCacheSize field to given value. ### HasOcspCacheSize -`func (o *CertificatesWriteConfigRequest) HasOcspCacheSize() bool` +`func (o *CertConfigureRequest) HasOcspCacheSize() bool` HasOcspCacheSize returns a boolean if a field has been set. diff --git a/docs/CertificatesLoginRequest.md b/docs/CertLoginRequest.md similarity index 63% rename from docs/CertificatesLoginRequest.md rename to docs/CertLoginRequest.md index ce475b15..2c64f8e7 100644 --- a/docs/CertificatesLoginRequest.md +++ b/docs/CertLoginRequest.md @@ -1,4 +1,4 @@ -# CertificatesLoginRequest +# CertLoginRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewCertificatesLoginRequest +### NewCertLoginRequest -`func NewCertificatesLoginRequest() *CertificatesLoginRequest` +`func NewCertLoginRequest() *CertLoginRequest` -NewCertificatesLoginRequest instantiates a new CertificatesLoginRequest object +NewCertLoginRequest instantiates a new CertLoginRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewCertificatesLoginRequestWithDefaults +### NewCertLoginRequestWithDefaults -`func NewCertificatesLoginRequestWithDefaults() *CertificatesLoginRequest` +`func NewCertLoginRequestWithDefaults() *CertLoginRequest` -NewCertificatesLoginRequestWithDefaults instantiates a new CertificatesLoginRequest object +NewCertLoginRequestWithDefaults instantiates a new CertLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetName -`func (o *CertificatesLoginRequest) GetName() string` +`func (o *CertLoginRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *CertificatesLoginRequest) GetNameOk() (*string, bool)` +`func (o *CertLoginRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *CertificatesLoginRequest) SetName(v string)` +`func (o *CertLoginRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *CertificatesLoginRequest) HasName() bool` +`func (o *CertLoginRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/CertificatesWriteRequest.md b/docs/CertWriteCertificateRequest.md similarity index 70% rename from docs/CertificatesWriteRequest.md rename to docs/CertWriteCertificateRequest.md index 88aff5f5..98861a2b 100644 --- a/docs/CertificatesWriteRequest.md +++ b/docs/CertWriteCertificateRequest.md @@ -1,4 +1,4 @@ -# CertificatesWriteRequest +# CertWriteCertificateRequest ## Properties @@ -41,47 +41,47 @@ Name | Type | Description | Notes ## Methods -### NewCertificatesWriteRequest +### NewCertWriteCertificateRequest -`func NewCertificatesWriteRequest() *CertificatesWriteRequest` +`func NewCertWriteCertificateRequest() *CertWriteCertificateRequest` -NewCertificatesWriteRequest instantiates a new CertificatesWriteRequest object +NewCertWriteCertificateRequest instantiates a new CertWriteCertificateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewCertificatesWriteRequestWithDefaults +### NewCertWriteCertificateRequestWithDefaults -`func NewCertificatesWriteRequestWithDefaults() *CertificatesWriteRequest` +`func NewCertWriteCertificateRequestWithDefaults() *CertWriteCertificateRequest` -NewCertificatesWriteRequestWithDefaults instantiates a new CertificatesWriteRequest object +NewCertWriteCertificateRequestWithDefaults instantiates a new CertWriteCertificateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowedCommonNames -`func (o *CertificatesWriteRequest) GetAllowedCommonNames() []string` +`func (o *CertWriteCertificateRequest) GetAllowedCommonNames() []string` GetAllowedCommonNames returns the AllowedCommonNames field if non-nil, zero value otherwise. ### GetAllowedCommonNamesOk -`func (o *CertificatesWriteRequest) GetAllowedCommonNamesOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetAllowedCommonNamesOk() (*[]string, bool)` GetAllowedCommonNamesOk returns a tuple with the AllowedCommonNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedCommonNames -`func (o *CertificatesWriteRequest) SetAllowedCommonNames(v []string)` +`func (o *CertWriteCertificateRequest) SetAllowedCommonNames(v []string)` SetAllowedCommonNames sets AllowedCommonNames field to given value. ### HasAllowedCommonNames -`func (o *CertificatesWriteRequest) HasAllowedCommonNames() bool` +`func (o *CertWriteCertificateRequest) HasAllowedCommonNames() bool` HasAllowedCommonNames returns a boolean if a field has been set. @@ -90,27 +90,27 @@ HasAllowedCommonNames returns a boolean if a field has been set. ### GetAllowedDnsSans -`func (o *CertificatesWriteRequest) GetAllowedDnsSans() []string` +`func (o *CertWriteCertificateRequest) GetAllowedDnsSans() []string` GetAllowedDnsSans returns the AllowedDnsSans field if non-nil, zero value otherwise. ### GetAllowedDnsSansOk -`func (o *CertificatesWriteRequest) GetAllowedDnsSansOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetAllowedDnsSansOk() (*[]string, bool)` GetAllowedDnsSansOk returns a tuple with the AllowedDnsSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedDnsSans -`func (o *CertificatesWriteRequest) SetAllowedDnsSans(v []string)` +`func (o *CertWriteCertificateRequest) SetAllowedDnsSans(v []string)` SetAllowedDnsSans sets AllowedDnsSans field to given value. ### HasAllowedDnsSans -`func (o *CertificatesWriteRequest) HasAllowedDnsSans() bool` +`func (o *CertWriteCertificateRequest) HasAllowedDnsSans() bool` HasAllowedDnsSans returns a boolean if a field has been set. @@ -119,27 +119,27 @@ HasAllowedDnsSans returns a boolean if a field has been set. ### GetAllowedEmailSans -`func (o *CertificatesWriteRequest) GetAllowedEmailSans() []string` +`func (o *CertWriteCertificateRequest) GetAllowedEmailSans() []string` GetAllowedEmailSans returns the AllowedEmailSans field if non-nil, zero value otherwise. ### GetAllowedEmailSansOk -`func (o *CertificatesWriteRequest) GetAllowedEmailSansOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetAllowedEmailSansOk() (*[]string, bool)` GetAllowedEmailSansOk returns a tuple with the AllowedEmailSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedEmailSans -`func (o *CertificatesWriteRequest) SetAllowedEmailSans(v []string)` +`func (o *CertWriteCertificateRequest) SetAllowedEmailSans(v []string)` SetAllowedEmailSans sets AllowedEmailSans field to given value. ### HasAllowedEmailSans -`func (o *CertificatesWriteRequest) HasAllowedEmailSans() bool` +`func (o *CertWriteCertificateRequest) HasAllowedEmailSans() bool` HasAllowedEmailSans returns a boolean if a field has been set. @@ -148,27 +148,27 @@ HasAllowedEmailSans returns a boolean if a field has been set. ### GetAllowedMetadataExtensions -`func (o *CertificatesWriteRequest) GetAllowedMetadataExtensions() []string` +`func (o *CertWriteCertificateRequest) GetAllowedMetadataExtensions() []string` GetAllowedMetadataExtensions returns the AllowedMetadataExtensions field if non-nil, zero value otherwise. ### GetAllowedMetadataExtensionsOk -`func (o *CertificatesWriteRequest) GetAllowedMetadataExtensionsOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetAllowedMetadataExtensionsOk() (*[]string, bool)` GetAllowedMetadataExtensionsOk returns a tuple with the AllowedMetadataExtensions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedMetadataExtensions -`func (o *CertificatesWriteRequest) SetAllowedMetadataExtensions(v []string)` +`func (o *CertWriteCertificateRequest) SetAllowedMetadataExtensions(v []string)` SetAllowedMetadataExtensions sets AllowedMetadataExtensions field to given value. ### HasAllowedMetadataExtensions -`func (o *CertificatesWriteRequest) HasAllowedMetadataExtensions() bool` +`func (o *CertWriteCertificateRequest) HasAllowedMetadataExtensions() bool` HasAllowedMetadataExtensions returns a boolean if a field has been set. @@ -177,27 +177,27 @@ HasAllowedMetadataExtensions returns a boolean if a field has been set. ### GetAllowedNames -`func (o *CertificatesWriteRequest) GetAllowedNames() []string` +`func (o *CertWriteCertificateRequest) GetAllowedNames() []string` GetAllowedNames returns the AllowedNames field if non-nil, zero value otherwise. ### GetAllowedNamesOk -`func (o *CertificatesWriteRequest) GetAllowedNamesOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetAllowedNamesOk() (*[]string, bool)` GetAllowedNamesOk returns a tuple with the AllowedNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedNames -`func (o *CertificatesWriteRequest) SetAllowedNames(v []string)` +`func (o *CertWriteCertificateRequest) SetAllowedNames(v []string)` SetAllowedNames sets AllowedNames field to given value. ### HasAllowedNames -`func (o *CertificatesWriteRequest) HasAllowedNames() bool` +`func (o *CertWriteCertificateRequest) HasAllowedNames() bool` HasAllowedNames returns a boolean if a field has been set. @@ -206,27 +206,27 @@ HasAllowedNames returns a boolean if a field has been set. ### GetAllowedOrganizationalUnits -`func (o *CertificatesWriteRequest) GetAllowedOrganizationalUnits() []string` +`func (o *CertWriteCertificateRequest) GetAllowedOrganizationalUnits() []string` GetAllowedOrganizationalUnits returns the AllowedOrganizationalUnits field if non-nil, zero value otherwise. ### GetAllowedOrganizationalUnitsOk -`func (o *CertificatesWriteRequest) GetAllowedOrganizationalUnitsOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetAllowedOrganizationalUnitsOk() (*[]string, bool)` GetAllowedOrganizationalUnitsOk returns a tuple with the AllowedOrganizationalUnits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedOrganizationalUnits -`func (o *CertificatesWriteRequest) SetAllowedOrganizationalUnits(v []string)` +`func (o *CertWriteCertificateRequest) SetAllowedOrganizationalUnits(v []string)` SetAllowedOrganizationalUnits sets AllowedOrganizationalUnits field to given value. ### HasAllowedOrganizationalUnits -`func (o *CertificatesWriteRequest) HasAllowedOrganizationalUnits() bool` +`func (o *CertWriteCertificateRequest) HasAllowedOrganizationalUnits() bool` HasAllowedOrganizationalUnits returns a boolean if a field has been set. @@ -235,27 +235,27 @@ HasAllowedOrganizationalUnits returns a boolean if a field has been set. ### GetAllowedUriSans -`func (o *CertificatesWriteRequest) GetAllowedUriSans() []string` +`func (o *CertWriteCertificateRequest) GetAllowedUriSans() []string` GetAllowedUriSans returns the AllowedUriSans field if non-nil, zero value otherwise. ### GetAllowedUriSansOk -`func (o *CertificatesWriteRequest) GetAllowedUriSansOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetAllowedUriSansOk() (*[]string, bool)` GetAllowedUriSansOk returns a tuple with the AllowedUriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedUriSans -`func (o *CertificatesWriteRequest) SetAllowedUriSans(v []string)` +`func (o *CertWriteCertificateRequest) SetAllowedUriSans(v []string)` SetAllowedUriSans sets AllowedUriSans field to given value. ### HasAllowedUriSans -`func (o *CertificatesWriteRequest) HasAllowedUriSans() bool` +`func (o *CertWriteCertificateRequest) HasAllowedUriSans() bool` HasAllowedUriSans returns a boolean if a field has been set. @@ -264,27 +264,27 @@ HasAllowedUriSans returns a boolean if a field has been set. ### GetBoundCidrs -`func (o *CertificatesWriteRequest) GetBoundCidrs() []string` +`func (o *CertWriteCertificateRequest) GetBoundCidrs() []string` GetBoundCidrs returns the BoundCidrs field if non-nil, zero value otherwise. ### GetBoundCidrsOk -`func (o *CertificatesWriteRequest) GetBoundCidrsOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetBoundCidrsOk() (*[]string, bool)` GetBoundCidrsOk returns a tuple with the BoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundCidrs -`func (o *CertificatesWriteRequest) SetBoundCidrs(v []string)` +`func (o *CertWriteCertificateRequest) SetBoundCidrs(v []string)` SetBoundCidrs sets BoundCidrs field to given value. ### HasBoundCidrs -`func (o *CertificatesWriteRequest) HasBoundCidrs() bool` +`func (o *CertWriteCertificateRequest) HasBoundCidrs() bool` HasBoundCidrs returns a boolean if a field has been set. @@ -293,27 +293,27 @@ HasBoundCidrs returns a boolean if a field has been set. ### GetCertificate -`func (o *CertificatesWriteRequest) GetCertificate() string` +`func (o *CertWriteCertificateRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *CertificatesWriteRequest) GetCertificateOk() (*string, bool)` +`func (o *CertWriteCertificateRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *CertificatesWriteRequest) SetCertificate(v string)` +`func (o *CertWriteCertificateRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *CertificatesWriteRequest) HasCertificate() bool` +`func (o *CertWriteCertificateRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -322,27 +322,27 @@ HasCertificate returns a boolean if a field has been set. ### GetDisplayName -`func (o *CertificatesWriteRequest) GetDisplayName() string` +`func (o *CertWriteCertificateRequest) GetDisplayName() string` GetDisplayName returns the DisplayName field if non-nil, zero value otherwise. ### GetDisplayNameOk -`func (o *CertificatesWriteRequest) GetDisplayNameOk() (*string, bool)` +`func (o *CertWriteCertificateRequest) GetDisplayNameOk() (*string, bool)` GetDisplayNameOk returns a tuple with the DisplayName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisplayName -`func (o *CertificatesWriteRequest) SetDisplayName(v string)` +`func (o *CertWriteCertificateRequest) SetDisplayName(v string)` SetDisplayName sets DisplayName field to given value. ### HasDisplayName -`func (o *CertificatesWriteRequest) HasDisplayName() bool` +`func (o *CertWriteCertificateRequest) HasDisplayName() bool` HasDisplayName returns a boolean if a field has been set. @@ -351,27 +351,27 @@ HasDisplayName returns a boolean if a field has been set. ### GetLease -`func (o *CertificatesWriteRequest) GetLease() int32` +`func (o *CertWriteCertificateRequest) GetLease() int32` GetLease returns the Lease field if non-nil, zero value otherwise. ### GetLeaseOk -`func (o *CertificatesWriteRequest) GetLeaseOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetLeaseOk() (*int32, bool)` GetLeaseOk returns a tuple with the Lease field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLease -`func (o *CertificatesWriteRequest) SetLease(v int32)` +`func (o *CertWriteCertificateRequest) SetLease(v int32)` SetLease sets Lease field to given value. ### HasLease -`func (o *CertificatesWriteRequest) HasLease() bool` +`func (o *CertWriteCertificateRequest) HasLease() bool` HasLease returns a boolean if a field has been set. @@ -380,27 +380,27 @@ HasLease returns a boolean if a field has been set. ### GetMaxTtl -`func (o *CertificatesWriteRequest) GetMaxTtl() int32` +`func (o *CertWriteCertificateRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *CertificatesWriteRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *CertificatesWriteRequest) SetMaxTtl(v int32)` +`func (o *CertWriteCertificateRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *CertificatesWriteRequest) HasMaxTtl() bool` +`func (o *CertWriteCertificateRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -409,27 +409,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetOcspCaCertificates -`func (o *CertificatesWriteRequest) GetOcspCaCertificates() string` +`func (o *CertWriteCertificateRequest) GetOcspCaCertificates() string` GetOcspCaCertificates returns the OcspCaCertificates field if non-nil, zero value otherwise. ### GetOcspCaCertificatesOk -`func (o *CertificatesWriteRequest) GetOcspCaCertificatesOk() (*string, bool)` +`func (o *CertWriteCertificateRequest) GetOcspCaCertificatesOk() (*string, bool)` GetOcspCaCertificatesOk returns a tuple with the OcspCaCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspCaCertificates -`func (o *CertificatesWriteRequest) SetOcspCaCertificates(v string)` +`func (o *CertWriteCertificateRequest) SetOcspCaCertificates(v string)` SetOcspCaCertificates sets OcspCaCertificates field to given value. ### HasOcspCaCertificates -`func (o *CertificatesWriteRequest) HasOcspCaCertificates() bool` +`func (o *CertWriteCertificateRequest) HasOcspCaCertificates() bool` HasOcspCaCertificates returns a boolean if a field has been set. @@ -438,27 +438,27 @@ HasOcspCaCertificates returns a boolean if a field has been set. ### GetOcspEnabled -`func (o *CertificatesWriteRequest) GetOcspEnabled() bool` +`func (o *CertWriteCertificateRequest) GetOcspEnabled() bool` GetOcspEnabled returns the OcspEnabled field if non-nil, zero value otherwise. ### GetOcspEnabledOk -`func (o *CertificatesWriteRequest) GetOcspEnabledOk() (*bool, bool)` +`func (o *CertWriteCertificateRequest) GetOcspEnabledOk() (*bool, bool)` GetOcspEnabledOk returns a tuple with the OcspEnabled field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspEnabled -`func (o *CertificatesWriteRequest) SetOcspEnabled(v bool)` +`func (o *CertWriteCertificateRequest) SetOcspEnabled(v bool)` SetOcspEnabled sets OcspEnabled field to given value. ### HasOcspEnabled -`func (o *CertificatesWriteRequest) HasOcspEnabled() bool` +`func (o *CertWriteCertificateRequest) HasOcspEnabled() bool` HasOcspEnabled returns a boolean if a field has been set. @@ -467,27 +467,27 @@ HasOcspEnabled returns a boolean if a field has been set. ### GetOcspFailOpen -`func (o *CertificatesWriteRequest) GetOcspFailOpen() bool` +`func (o *CertWriteCertificateRequest) GetOcspFailOpen() bool` GetOcspFailOpen returns the OcspFailOpen field if non-nil, zero value otherwise. ### GetOcspFailOpenOk -`func (o *CertificatesWriteRequest) GetOcspFailOpenOk() (*bool, bool)` +`func (o *CertWriteCertificateRequest) GetOcspFailOpenOk() (*bool, bool)` GetOcspFailOpenOk returns a tuple with the OcspFailOpen field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspFailOpen -`func (o *CertificatesWriteRequest) SetOcspFailOpen(v bool)` +`func (o *CertWriteCertificateRequest) SetOcspFailOpen(v bool)` SetOcspFailOpen sets OcspFailOpen field to given value. ### HasOcspFailOpen -`func (o *CertificatesWriteRequest) HasOcspFailOpen() bool` +`func (o *CertWriteCertificateRequest) HasOcspFailOpen() bool` HasOcspFailOpen returns a boolean if a field has been set. @@ -496,27 +496,27 @@ HasOcspFailOpen returns a boolean if a field has been set. ### GetOcspQueryAllServers -`func (o *CertificatesWriteRequest) GetOcspQueryAllServers() bool` +`func (o *CertWriteCertificateRequest) GetOcspQueryAllServers() bool` GetOcspQueryAllServers returns the OcspQueryAllServers field if non-nil, zero value otherwise. ### GetOcspQueryAllServersOk -`func (o *CertificatesWriteRequest) GetOcspQueryAllServersOk() (*bool, bool)` +`func (o *CertWriteCertificateRequest) GetOcspQueryAllServersOk() (*bool, bool)` GetOcspQueryAllServersOk returns a tuple with the OcspQueryAllServers field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspQueryAllServers -`func (o *CertificatesWriteRequest) SetOcspQueryAllServers(v bool)` +`func (o *CertWriteCertificateRequest) SetOcspQueryAllServers(v bool)` SetOcspQueryAllServers sets OcspQueryAllServers field to given value. ### HasOcspQueryAllServers -`func (o *CertificatesWriteRequest) HasOcspQueryAllServers() bool` +`func (o *CertWriteCertificateRequest) HasOcspQueryAllServers() bool` HasOcspQueryAllServers returns a boolean if a field has been set. @@ -525,27 +525,27 @@ HasOcspQueryAllServers returns a boolean if a field has been set. ### GetOcspServersOverride -`func (o *CertificatesWriteRequest) GetOcspServersOverride() []string` +`func (o *CertWriteCertificateRequest) GetOcspServersOverride() []string` GetOcspServersOverride returns the OcspServersOverride field if non-nil, zero value otherwise. ### GetOcspServersOverrideOk -`func (o *CertificatesWriteRequest) GetOcspServersOverrideOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetOcspServersOverrideOk() (*[]string, bool)` GetOcspServersOverrideOk returns a tuple with the OcspServersOverride field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspServersOverride -`func (o *CertificatesWriteRequest) SetOcspServersOverride(v []string)` +`func (o *CertWriteCertificateRequest) SetOcspServersOverride(v []string)` SetOcspServersOverride sets OcspServersOverride field to given value. ### HasOcspServersOverride -`func (o *CertificatesWriteRequest) HasOcspServersOverride() bool` +`func (o *CertWriteCertificateRequest) HasOcspServersOverride() bool` HasOcspServersOverride returns a boolean if a field has been set. @@ -554,27 +554,27 @@ HasOcspServersOverride returns a boolean if a field has been set. ### GetPeriod -`func (o *CertificatesWriteRequest) GetPeriod() int32` +`func (o *CertWriteCertificateRequest) GetPeriod() int32` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *CertificatesWriteRequest) GetPeriodOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetPeriodOk() (*int32, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *CertificatesWriteRequest) SetPeriod(v int32)` +`func (o *CertWriteCertificateRequest) SetPeriod(v int32)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *CertificatesWriteRequest) HasPeriod() bool` +`func (o *CertWriteCertificateRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -583,27 +583,27 @@ HasPeriod returns a boolean if a field has been set. ### GetPolicies -`func (o *CertificatesWriteRequest) GetPolicies() []string` +`func (o *CertWriteCertificateRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *CertificatesWriteRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *CertificatesWriteRequest) SetPolicies(v []string)` +`func (o *CertWriteCertificateRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *CertificatesWriteRequest) HasPolicies() bool` +`func (o *CertWriteCertificateRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -612,27 +612,27 @@ HasPolicies returns a boolean if a field has been set. ### GetRequiredExtensions -`func (o *CertificatesWriteRequest) GetRequiredExtensions() []string` +`func (o *CertWriteCertificateRequest) GetRequiredExtensions() []string` GetRequiredExtensions returns the RequiredExtensions field if non-nil, zero value otherwise. ### GetRequiredExtensionsOk -`func (o *CertificatesWriteRequest) GetRequiredExtensionsOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetRequiredExtensionsOk() (*[]string, bool)` GetRequiredExtensionsOk returns a tuple with the RequiredExtensions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequiredExtensions -`func (o *CertificatesWriteRequest) SetRequiredExtensions(v []string)` +`func (o *CertWriteCertificateRequest) SetRequiredExtensions(v []string)` SetRequiredExtensions sets RequiredExtensions field to given value. ### HasRequiredExtensions -`func (o *CertificatesWriteRequest) HasRequiredExtensions() bool` +`func (o *CertWriteCertificateRequest) HasRequiredExtensions() bool` HasRequiredExtensions returns a boolean if a field has been set. @@ -641,27 +641,27 @@ HasRequiredExtensions returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *CertificatesWriteRequest) GetTokenBoundCidrs() []string` +`func (o *CertWriteCertificateRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *CertificatesWriteRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *CertificatesWriteRequest) SetTokenBoundCidrs(v []string)` +`func (o *CertWriteCertificateRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *CertificatesWriteRequest) HasTokenBoundCidrs() bool` +`func (o *CertWriteCertificateRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -670,27 +670,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *CertificatesWriteRequest) GetTokenExplicitMaxTtl() int32` +`func (o *CertWriteCertificateRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *CertificatesWriteRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *CertificatesWriteRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *CertWriteCertificateRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *CertificatesWriteRequest) HasTokenExplicitMaxTtl() bool` +`func (o *CertWriteCertificateRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -699,27 +699,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *CertificatesWriteRequest) GetTokenMaxTtl() int32` +`func (o *CertWriteCertificateRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *CertificatesWriteRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *CertificatesWriteRequest) SetTokenMaxTtl(v int32)` +`func (o *CertWriteCertificateRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *CertificatesWriteRequest) HasTokenMaxTtl() bool` +`func (o *CertWriteCertificateRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -728,27 +728,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *CertificatesWriteRequest) GetTokenNoDefaultPolicy() bool` +`func (o *CertWriteCertificateRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *CertificatesWriteRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *CertWriteCertificateRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *CertificatesWriteRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *CertWriteCertificateRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *CertificatesWriteRequest) HasTokenNoDefaultPolicy() bool` +`func (o *CertWriteCertificateRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -757,27 +757,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *CertificatesWriteRequest) GetTokenNumUses() int32` +`func (o *CertWriteCertificateRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *CertificatesWriteRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *CertificatesWriteRequest) SetTokenNumUses(v int32)` +`func (o *CertWriteCertificateRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *CertificatesWriteRequest) HasTokenNumUses() bool` +`func (o *CertWriteCertificateRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -786,27 +786,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *CertificatesWriteRequest) GetTokenPeriod() int32` +`func (o *CertWriteCertificateRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *CertificatesWriteRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *CertificatesWriteRequest) SetTokenPeriod(v int32)` +`func (o *CertWriteCertificateRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *CertificatesWriteRequest) HasTokenPeriod() bool` +`func (o *CertWriteCertificateRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -815,27 +815,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *CertificatesWriteRequest) GetTokenPolicies() []string` +`func (o *CertWriteCertificateRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *CertificatesWriteRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *CertWriteCertificateRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *CertificatesWriteRequest) SetTokenPolicies(v []string)` +`func (o *CertWriteCertificateRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *CertificatesWriteRequest) HasTokenPolicies() bool` +`func (o *CertWriteCertificateRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -844,27 +844,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *CertificatesWriteRequest) GetTokenTtl() int32` +`func (o *CertWriteCertificateRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *CertificatesWriteRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *CertificatesWriteRequest) SetTokenTtl(v int32)` +`func (o *CertWriteCertificateRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *CertificatesWriteRequest) HasTokenTtl() bool` +`func (o *CertWriteCertificateRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -873,27 +873,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *CertificatesWriteRequest) GetTokenType() string` +`func (o *CertWriteCertificateRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *CertificatesWriteRequest) GetTokenTypeOk() (*string, bool)` +`func (o *CertWriteCertificateRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *CertificatesWriteRequest) SetTokenType(v string)` +`func (o *CertWriteCertificateRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *CertificatesWriteRequest) HasTokenType() bool` +`func (o *CertWriteCertificateRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -902,27 +902,27 @@ HasTokenType returns a boolean if a field has been set. ### GetTtl -`func (o *CertificatesWriteRequest) GetTtl() int32` +`func (o *CertWriteCertificateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *CertificatesWriteRequest) GetTtlOk() (*int32, bool)` +`func (o *CertWriteCertificateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *CertificatesWriteRequest) SetTtl(v int32)` +`func (o *CertWriteCertificateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *CertificatesWriteRequest) HasTtl() bool` +`func (o *CertWriteCertificateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/CertificatesWriteCRLRequest.md b/docs/CertWriteCrlRequest.md similarity index 66% rename from docs/CertificatesWriteCRLRequest.md rename to docs/CertWriteCrlRequest.md index 7cd76714..31e9a5d4 100644 --- a/docs/CertificatesWriteCRLRequest.md +++ b/docs/CertWriteCrlRequest.md @@ -1,4 +1,4 @@ -# CertificatesWriteCRLRequest +# CertWriteCrlRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewCertificatesWriteCRLRequest +### NewCertWriteCrlRequest -`func NewCertificatesWriteCRLRequest() *CertificatesWriteCRLRequest` +`func NewCertWriteCrlRequest() *CertWriteCrlRequest` -NewCertificatesWriteCRLRequest instantiates a new CertificatesWriteCRLRequest object +NewCertWriteCrlRequest instantiates a new CertWriteCrlRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewCertificatesWriteCRLRequestWithDefaults +### NewCertWriteCrlRequestWithDefaults -`func NewCertificatesWriteCRLRequestWithDefaults() *CertificatesWriteCRLRequest` +`func NewCertWriteCrlRequestWithDefaults() *CertWriteCrlRequest` -NewCertificatesWriteCRLRequestWithDefaults instantiates a new CertificatesWriteCRLRequest object +NewCertWriteCrlRequestWithDefaults instantiates a new CertWriteCrlRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCrl -`func (o *CertificatesWriteCRLRequest) GetCrl() string` +`func (o *CertWriteCrlRequest) GetCrl() string` GetCrl returns the Crl field if non-nil, zero value otherwise. ### GetCrlOk -`func (o *CertificatesWriteCRLRequest) GetCrlOk() (*string, bool)` +`func (o *CertWriteCrlRequest) GetCrlOk() (*string, bool)` GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCrl -`func (o *CertificatesWriteCRLRequest) SetCrl(v string)` +`func (o *CertWriteCrlRequest) SetCrl(v string)` SetCrl sets Crl field to given value. ### HasCrl -`func (o *CertificatesWriteCRLRequest) HasCrl() bool` +`func (o *CertWriteCrlRequest) HasCrl() bool` HasCrl returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasCrl returns a boolean if a field has been set. ### GetUrl -`func (o *CertificatesWriteCRLRequest) GetUrl() string` +`func (o *CertWriteCrlRequest) GetUrl() string` GetUrl returns the Url field if non-nil, zero value otherwise. ### GetUrlOk -`func (o *CertificatesWriteCRLRequest) GetUrlOk() (*string, bool)` +`func (o *CertWriteCrlRequest) GetUrlOk() (*string, bool)` GetUrlOk returns a tuple with the Url field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrl -`func (o *CertificatesWriteCRLRequest) SetUrl(v string)` +`func (o *CertWriteCrlRequest) SetUrl(v string)` SetUrl sets Url field to given value. ### HasUrl -`func (o *CertificatesWriteCRLRequest) HasUrl() bool` +`func (o *CertWriteCrlRequest) HasUrl() bool` HasUrl returns a boolean if a field has been set. diff --git a/docs/CloudFoundryWriteConfigRequest.md b/docs/CloudFoundryConfigureRequest.md similarity index 67% rename from docs/CloudFoundryWriteConfigRequest.md rename to docs/CloudFoundryConfigureRequest.md index 27c1f65f..d3a0f25b 100644 --- a/docs/CloudFoundryWriteConfigRequest.md +++ b/docs/CloudFoundryConfigureRequest.md @@ -1,4 +1,4 @@ -# CloudFoundryWriteConfigRequest +# CloudFoundryConfigureRequest ## Properties @@ -26,47 +26,47 @@ Name | Type | Description | Notes ## Methods -### NewCloudFoundryWriteConfigRequest +### NewCloudFoundryConfigureRequest -`func NewCloudFoundryWriteConfigRequest() *CloudFoundryWriteConfigRequest` +`func NewCloudFoundryConfigureRequest() *CloudFoundryConfigureRequest` -NewCloudFoundryWriteConfigRequest instantiates a new CloudFoundryWriteConfigRequest object +NewCloudFoundryConfigureRequest instantiates a new CloudFoundryConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewCloudFoundryWriteConfigRequestWithDefaults +### NewCloudFoundryConfigureRequestWithDefaults -`func NewCloudFoundryWriteConfigRequestWithDefaults() *CloudFoundryWriteConfigRequest` +`func NewCloudFoundryConfigureRequestWithDefaults() *CloudFoundryConfigureRequest` -NewCloudFoundryWriteConfigRequestWithDefaults instantiates a new CloudFoundryWriteConfigRequest object +NewCloudFoundryConfigureRequestWithDefaults instantiates a new CloudFoundryConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCfApiAddr -`func (o *CloudFoundryWriteConfigRequest) GetCfApiAddr() string` +`func (o *CloudFoundryConfigureRequest) GetCfApiAddr() string` GetCfApiAddr returns the CfApiAddr field if non-nil, zero value otherwise. ### GetCfApiAddrOk -`func (o *CloudFoundryWriteConfigRequest) GetCfApiAddrOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfApiAddrOk() (*string, bool)` GetCfApiAddrOk returns a tuple with the CfApiAddr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfApiAddr -`func (o *CloudFoundryWriteConfigRequest) SetCfApiAddr(v string)` +`func (o *CloudFoundryConfigureRequest) SetCfApiAddr(v string)` SetCfApiAddr sets CfApiAddr field to given value. ### HasCfApiAddr -`func (o *CloudFoundryWriteConfigRequest) HasCfApiAddr() bool` +`func (o *CloudFoundryConfigureRequest) HasCfApiAddr() bool` HasCfApiAddr returns a boolean if a field has been set. @@ -75,27 +75,27 @@ HasCfApiAddr returns a boolean if a field has been set. ### GetCfApiMutualTlsCertificate -`func (o *CloudFoundryWriteConfigRequest) GetCfApiMutualTlsCertificate() string` +`func (o *CloudFoundryConfigureRequest) GetCfApiMutualTlsCertificate() string` GetCfApiMutualTlsCertificate returns the CfApiMutualTlsCertificate field if non-nil, zero value otherwise. ### GetCfApiMutualTlsCertificateOk -`func (o *CloudFoundryWriteConfigRequest) GetCfApiMutualTlsCertificateOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfApiMutualTlsCertificateOk() (*string, bool)` GetCfApiMutualTlsCertificateOk returns a tuple with the CfApiMutualTlsCertificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfApiMutualTlsCertificate -`func (o *CloudFoundryWriteConfigRequest) SetCfApiMutualTlsCertificate(v string)` +`func (o *CloudFoundryConfigureRequest) SetCfApiMutualTlsCertificate(v string)` SetCfApiMutualTlsCertificate sets CfApiMutualTlsCertificate field to given value. ### HasCfApiMutualTlsCertificate -`func (o *CloudFoundryWriteConfigRequest) HasCfApiMutualTlsCertificate() bool` +`func (o *CloudFoundryConfigureRequest) HasCfApiMutualTlsCertificate() bool` HasCfApiMutualTlsCertificate returns a boolean if a field has been set. @@ -104,27 +104,27 @@ HasCfApiMutualTlsCertificate returns a boolean if a field has been set. ### GetCfApiMutualTlsKey -`func (o *CloudFoundryWriteConfigRequest) GetCfApiMutualTlsKey() string` +`func (o *CloudFoundryConfigureRequest) GetCfApiMutualTlsKey() string` GetCfApiMutualTlsKey returns the CfApiMutualTlsKey field if non-nil, zero value otherwise. ### GetCfApiMutualTlsKeyOk -`func (o *CloudFoundryWriteConfigRequest) GetCfApiMutualTlsKeyOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfApiMutualTlsKeyOk() (*string, bool)` GetCfApiMutualTlsKeyOk returns a tuple with the CfApiMutualTlsKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfApiMutualTlsKey -`func (o *CloudFoundryWriteConfigRequest) SetCfApiMutualTlsKey(v string)` +`func (o *CloudFoundryConfigureRequest) SetCfApiMutualTlsKey(v string)` SetCfApiMutualTlsKey sets CfApiMutualTlsKey field to given value. ### HasCfApiMutualTlsKey -`func (o *CloudFoundryWriteConfigRequest) HasCfApiMutualTlsKey() bool` +`func (o *CloudFoundryConfigureRequest) HasCfApiMutualTlsKey() bool` HasCfApiMutualTlsKey returns a boolean if a field has been set. @@ -133,27 +133,27 @@ HasCfApiMutualTlsKey returns a boolean if a field has been set. ### GetCfApiTrustedCertificates -`func (o *CloudFoundryWriteConfigRequest) GetCfApiTrustedCertificates() []string` +`func (o *CloudFoundryConfigureRequest) GetCfApiTrustedCertificates() []string` GetCfApiTrustedCertificates returns the CfApiTrustedCertificates field if non-nil, zero value otherwise. ### GetCfApiTrustedCertificatesOk -`func (o *CloudFoundryWriteConfigRequest) GetCfApiTrustedCertificatesOk() (*[]string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfApiTrustedCertificatesOk() (*[]string, bool)` GetCfApiTrustedCertificatesOk returns a tuple with the CfApiTrustedCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfApiTrustedCertificates -`func (o *CloudFoundryWriteConfigRequest) SetCfApiTrustedCertificates(v []string)` +`func (o *CloudFoundryConfigureRequest) SetCfApiTrustedCertificates(v []string)` SetCfApiTrustedCertificates sets CfApiTrustedCertificates field to given value. ### HasCfApiTrustedCertificates -`func (o *CloudFoundryWriteConfigRequest) HasCfApiTrustedCertificates() bool` +`func (o *CloudFoundryConfigureRequest) HasCfApiTrustedCertificates() bool` HasCfApiTrustedCertificates returns a boolean if a field has been set. @@ -162,27 +162,27 @@ HasCfApiTrustedCertificates returns a boolean if a field has been set. ### GetCfClientId -`func (o *CloudFoundryWriteConfigRequest) GetCfClientId() string` +`func (o *CloudFoundryConfigureRequest) GetCfClientId() string` GetCfClientId returns the CfClientId field if non-nil, zero value otherwise. ### GetCfClientIdOk -`func (o *CloudFoundryWriteConfigRequest) GetCfClientIdOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfClientIdOk() (*string, bool)` GetCfClientIdOk returns a tuple with the CfClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfClientId -`func (o *CloudFoundryWriteConfigRequest) SetCfClientId(v string)` +`func (o *CloudFoundryConfigureRequest) SetCfClientId(v string)` SetCfClientId sets CfClientId field to given value. ### HasCfClientId -`func (o *CloudFoundryWriteConfigRequest) HasCfClientId() bool` +`func (o *CloudFoundryConfigureRequest) HasCfClientId() bool` HasCfClientId returns a boolean if a field has been set. @@ -191,27 +191,27 @@ HasCfClientId returns a boolean if a field has been set. ### GetCfClientSecret -`func (o *CloudFoundryWriteConfigRequest) GetCfClientSecret() string` +`func (o *CloudFoundryConfigureRequest) GetCfClientSecret() string` GetCfClientSecret returns the CfClientSecret field if non-nil, zero value otherwise. ### GetCfClientSecretOk -`func (o *CloudFoundryWriteConfigRequest) GetCfClientSecretOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfClientSecretOk() (*string, bool)` GetCfClientSecretOk returns a tuple with the CfClientSecret field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfClientSecret -`func (o *CloudFoundryWriteConfigRequest) SetCfClientSecret(v string)` +`func (o *CloudFoundryConfigureRequest) SetCfClientSecret(v string)` SetCfClientSecret sets CfClientSecret field to given value. ### HasCfClientSecret -`func (o *CloudFoundryWriteConfigRequest) HasCfClientSecret() bool` +`func (o *CloudFoundryConfigureRequest) HasCfClientSecret() bool` HasCfClientSecret returns a boolean if a field has been set. @@ -220,27 +220,27 @@ HasCfClientSecret returns a boolean if a field has been set. ### GetCfPassword -`func (o *CloudFoundryWriteConfigRequest) GetCfPassword() string` +`func (o *CloudFoundryConfigureRequest) GetCfPassword() string` GetCfPassword returns the CfPassword field if non-nil, zero value otherwise. ### GetCfPasswordOk -`func (o *CloudFoundryWriteConfigRequest) GetCfPasswordOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfPasswordOk() (*string, bool)` GetCfPasswordOk returns a tuple with the CfPassword field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfPassword -`func (o *CloudFoundryWriteConfigRequest) SetCfPassword(v string)` +`func (o *CloudFoundryConfigureRequest) SetCfPassword(v string)` SetCfPassword sets CfPassword field to given value. ### HasCfPassword -`func (o *CloudFoundryWriteConfigRequest) HasCfPassword() bool` +`func (o *CloudFoundryConfigureRequest) HasCfPassword() bool` HasCfPassword returns a boolean if a field has been set. @@ -249,27 +249,27 @@ HasCfPassword returns a boolean if a field has been set. ### GetCfUsername -`func (o *CloudFoundryWriteConfigRequest) GetCfUsername() string` +`func (o *CloudFoundryConfigureRequest) GetCfUsername() string` GetCfUsername returns the CfUsername field if non-nil, zero value otherwise. ### GetCfUsernameOk -`func (o *CloudFoundryWriteConfigRequest) GetCfUsernameOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetCfUsernameOk() (*string, bool)` GetCfUsernameOk returns a tuple with the CfUsername field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCfUsername -`func (o *CloudFoundryWriteConfigRequest) SetCfUsername(v string)` +`func (o *CloudFoundryConfigureRequest) SetCfUsername(v string)` SetCfUsername sets CfUsername field to given value. ### HasCfUsername -`func (o *CloudFoundryWriteConfigRequest) HasCfUsername() bool` +`func (o *CloudFoundryConfigureRequest) HasCfUsername() bool` HasCfUsername returns a boolean if a field has been set. @@ -278,27 +278,27 @@ HasCfUsername returns a boolean if a field has been set. ### GetIdentityCaCertificates -`func (o *CloudFoundryWriteConfigRequest) GetIdentityCaCertificates() []string` +`func (o *CloudFoundryConfigureRequest) GetIdentityCaCertificates() []string` GetIdentityCaCertificates returns the IdentityCaCertificates field if non-nil, zero value otherwise. ### GetIdentityCaCertificatesOk -`func (o *CloudFoundryWriteConfigRequest) GetIdentityCaCertificatesOk() (*[]string, bool)` +`func (o *CloudFoundryConfigureRequest) GetIdentityCaCertificatesOk() (*[]string, bool)` GetIdentityCaCertificatesOk returns a tuple with the IdentityCaCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIdentityCaCertificates -`func (o *CloudFoundryWriteConfigRequest) SetIdentityCaCertificates(v []string)` +`func (o *CloudFoundryConfigureRequest) SetIdentityCaCertificates(v []string)` SetIdentityCaCertificates sets IdentityCaCertificates field to given value. ### HasIdentityCaCertificates -`func (o *CloudFoundryWriteConfigRequest) HasIdentityCaCertificates() bool` +`func (o *CloudFoundryConfigureRequest) HasIdentityCaCertificates() bool` HasIdentityCaCertificates returns a boolean if a field has been set. @@ -307,27 +307,27 @@ HasIdentityCaCertificates returns a boolean if a field has been set. ### GetLoginMaxSecondsNotAfter -`func (o *CloudFoundryWriteConfigRequest) GetLoginMaxSecondsNotAfter() int32` +`func (o *CloudFoundryConfigureRequest) GetLoginMaxSecondsNotAfter() int32` GetLoginMaxSecondsNotAfter returns the LoginMaxSecondsNotAfter field if non-nil, zero value otherwise. ### GetLoginMaxSecondsNotAfterOk -`func (o *CloudFoundryWriteConfigRequest) GetLoginMaxSecondsNotAfterOk() (*int32, bool)` +`func (o *CloudFoundryConfigureRequest) GetLoginMaxSecondsNotAfterOk() (*int32, bool)` GetLoginMaxSecondsNotAfterOk returns a tuple with the LoginMaxSecondsNotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLoginMaxSecondsNotAfter -`func (o *CloudFoundryWriteConfigRequest) SetLoginMaxSecondsNotAfter(v int32)` +`func (o *CloudFoundryConfigureRequest) SetLoginMaxSecondsNotAfter(v int32)` SetLoginMaxSecondsNotAfter sets LoginMaxSecondsNotAfter field to given value. ### HasLoginMaxSecondsNotAfter -`func (o *CloudFoundryWriteConfigRequest) HasLoginMaxSecondsNotAfter() bool` +`func (o *CloudFoundryConfigureRequest) HasLoginMaxSecondsNotAfter() bool` HasLoginMaxSecondsNotAfter returns a boolean if a field has been set. @@ -336,27 +336,27 @@ HasLoginMaxSecondsNotAfter returns a boolean if a field has been set. ### GetLoginMaxSecondsNotBefore -`func (o *CloudFoundryWriteConfigRequest) GetLoginMaxSecondsNotBefore() int32` +`func (o *CloudFoundryConfigureRequest) GetLoginMaxSecondsNotBefore() int32` GetLoginMaxSecondsNotBefore returns the LoginMaxSecondsNotBefore field if non-nil, zero value otherwise. ### GetLoginMaxSecondsNotBeforeOk -`func (o *CloudFoundryWriteConfigRequest) GetLoginMaxSecondsNotBeforeOk() (*int32, bool)` +`func (o *CloudFoundryConfigureRequest) GetLoginMaxSecondsNotBeforeOk() (*int32, bool)` GetLoginMaxSecondsNotBeforeOk returns a tuple with the LoginMaxSecondsNotBefore field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLoginMaxSecondsNotBefore -`func (o *CloudFoundryWriteConfigRequest) SetLoginMaxSecondsNotBefore(v int32)` +`func (o *CloudFoundryConfigureRequest) SetLoginMaxSecondsNotBefore(v int32)` SetLoginMaxSecondsNotBefore sets LoginMaxSecondsNotBefore field to given value. ### HasLoginMaxSecondsNotBefore -`func (o *CloudFoundryWriteConfigRequest) HasLoginMaxSecondsNotBefore() bool` +`func (o *CloudFoundryConfigureRequest) HasLoginMaxSecondsNotBefore() bool` HasLoginMaxSecondsNotBefore returns a boolean if a field has been set. @@ -365,27 +365,27 @@ HasLoginMaxSecondsNotBefore returns a boolean if a field has been set. ### GetPcfApiAddr -`func (o *CloudFoundryWriteConfigRequest) GetPcfApiAddr() string` +`func (o *CloudFoundryConfigureRequest) GetPcfApiAddr() string` GetPcfApiAddr returns the PcfApiAddr field if non-nil, zero value otherwise. ### GetPcfApiAddrOk -`func (o *CloudFoundryWriteConfigRequest) GetPcfApiAddrOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetPcfApiAddrOk() (*string, bool)` GetPcfApiAddrOk returns a tuple with the PcfApiAddr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPcfApiAddr -`func (o *CloudFoundryWriteConfigRequest) SetPcfApiAddr(v string)` +`func (o *CloudFoundryConfigureRequest) SetPcfApiAddr(v string)` SetPcfApiAddr sets PcfApiAddr field to given value. ### HasPcfApiAddr -`func (o *CloudFoundryWriteConfigRequest) HasPcfApiAddr() bool` +`func (o *CloudFoundryConfigureRequest) HasPcfApiAddr() bool` HasPcfApiAddr returns a boolean if a field has been set. @@ -394,27 +394,27 @@ HasPcfApiAddr returns a boolean if a field has been set. ### GetPcfApiTrustedCertificates -`func (o *CloudFoundryWriteConfigRequest) GetPcfApiTrustedCertificates() []string` +`func (o *CloudFoundryConfigureRequest) GetPcfApiTrustedCertificates() []string` GetPcfApiTrustedCertificates returns the PcfApiTrustedCertificates field if non-nil, zero value otherwise. ### GetPcfApiTrustedCertificatesOk -`func (o *CloudFoundryWriteConfigRequest) GetPcfApiTrustedCertificatesOk() (*[]string, bool)` +`func (o *CloudFoundryConfigureRequest) GetPcfApiTrustedCertificatesOk() (*[]string, bool)` GetPcfApiTrustedCertificatesOk returns a tuple with the PcfApiTrustedCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPcfApiTrustedCertificates -`func (o *CloudFoundryWriteConfigRequest) SetPcfApiTrustedCertificates(v []string)` +`func (o *CloudFoundryConfigureRequest) SetPcfApiTrustedCertificates(v []string)` SetPcfApiTrustedCertificates sets PcfApiTrustedCertificates field to given value. ### HasPcfApiTrustedCertificates -`func (o *CloudFoundryWriteConfigRequest) HasPcfApiTrustedCertificates() bool` +`func (o *CloudFoundryConfigureRequest) HasPcfApiTrustedCertificates() bool` HasPcfApiTrustedCertificates returns a boolean if a field has been set. @@ -423,27 +423,27 @@ HasPcfApiTrustedCertificates returns a boolean if a field has been set. ### GetPcfPassword -`func (o *CloudFoundryWriteConfigRequest) GetPcfPassword() string` +`func (o *CloudFoundryConfigureRequest) GetPcfPassword() string` GetPcfPassword returns the PcfPassword field if non-nil, zero value otherwise. ### GetPcfPasswordOk -`func (o *CloudFoundryWriteConfigRequest) GetPcfPasswordOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetPcfPasswordOk() (*string, bool)` GetPcfPasswordOk returns a tuple with the PcfPassword field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPcfPassword -`func (o *CloudFoundryWriteConfigRequest) SetPcfPassword(v string)` +`func (o *CloudFoundryConfigureRequest) SetPcfPassword(v string)` SetPcfPassword sets PcfPassword field to given value. ### HasPcfPassword -`func (o *CloudFoundryWriteConfigRequest) HasPcfPassword() bool` +`func (o *CloudFoundryConfigureRequest) HasPcfPassword() bool` HasPcfPassword returns a boolean if a field has been set. @@ -452,27 +452,27 @@ HasPcfPassword returns a boolean if a field has been set. ### GetPcfUsername -`func (o *CloudFoundryWriteConfigRequest) GetPcfUsername() string` +`func (o *CloudFoundryConfigureRequest) GetPcfUsername() string` GetPcfUsername returns the PcfUsername field if non-nil, zero value otherwise. ### GetPcfUsernameOk -`func (o *CloudFoundryWriteConfigRequest) GetPcfUsernameOk() (*string, bool)` +`func (o *CloudFoundryConfigureRequest) GetPcfUsernameOk() (*string, bool)` GetPcfUsernameOk returns a tuple with the PcfUsername field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPcfUsername -`func (o *CloudFoundryWriteConfigRequest) SetPcfUsername(v string)` +`func (o *CloudFoundryConfigureRequest) SetPcfUsername(v string)` SetPcfUsername sets PcfUsername field to given value. ### HasPcfUsername -`func (o *CloudFoundryWriteConfigRequest) HasPcfUsername() bool` +`func (o *CloudFoundryConfigureRequest) HasPcfUsername() bool` HasPcfUsername returns a boolean if a field has been set. diff --git a/docs/CollectHostInformationResponse.md b/docs/CollectHostInformationResponse.md new file mode 100644 index 00000000..df5851e8 --- /dev/null +++ b/docs/CollectHostInformationResponse.md @@ -0,0 +1,219 @@ +# CollectHostInformationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Cpu** | Pointer to **[]map[string]interface{}** | | [optional] +**CpuTimes** | Pointer to **[]map[string]interface{}** | | [optional] +**Disk** | Pointer to **[]map[string]interface{}** | | [optional] +**Host** | Pointer to **map[string]interface{}** | | [optional] +**Memory** | Pointer to **map[string]interface{}** | | [optional] +**Timestamp** | Pointer to **time.Time** | | [optional] + + + +## Methods + + +### NewCollectHostInformationResponse + +`func NewCollectHostInformationResponse() *CollectHostInformationResponse` + +NewCollectHostInformationResponse instantiates a new CollectHostInformationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewCollectHostInformationResponseWithDefaults + +`func NewCollectHostInformationResponseWithDefaults() *CollectHostInformationResponse` + +NewCollectHostInformationResponseWithDefaults instantiates a new CollectHostInformationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCpu + +`func (o *CollectHostInformationResponse) GetCpu() []map[string]interface{}` + +GetCpu returns the Cpu field if non-nil, zero value otherwise. + +### GetCpuOk + +`func (o *CollectHostInformationResponse) GetCpuOk() (*[]map[string]interface{}, bool)` + +GetCpuOk returns a tuple with the Cpu field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCpu + +`func (o *CollectHostInformationResponse) SetCpu(v []map[string]interface{})` + +SetCpu sets Cpu field to given value. + + +### HasCpu + +`func (o *CollectHostInformationResponse) HasCpu() bool` + +HasCpu returns a boolean if a field has been set. + + + + +### GetCpuTimes + +`func (o *CollectHostInformationResponse) GetCpuTimes() []map[string]interface{}` + +GetCpuTimes returns the CpuTimes field if non-nil, zero value otherwise. + +### GetCpuTimesOk + +`func (o *CollectHostInformationResponse) GetCpuTimesOk() (*[]map[string]interface{}, bool)` + +GetCpuTimesOk returns a tuple with the CpuTimes field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCpuTimes + +`func (o *CollectHostInformationResponse) SetCpuTimes(v []map[string]interface{})` + +SetCpuTimes sets CpuTimes field to given value. + + +### HasCpuTimes + +`func (o *CollectHostInformationResponse) HasCpuTimes() bool` + +HasCpuTimes returns a boolean if a field has been set. + + + + +### GetDisk + +`func (o *CollectHostInformationResponse) GetDisk() []map[string]interface{}` + +GetDisk returns the Disk field if non-nil, zero value otherwise. + +### GetDiskOk + +`func (o *CollectHostInformationResponse) GetDiskOk() (*[]map[string]interface{}, bool)` + +GetDiskOk returns a tuple with the Disk field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDisk + +`func (o *CollectHostInformationResponse) SetDisk(v []map[string]interface{})` + +SetDisk sets Disk field to given value. + + +### HasDisk + +`func (o *CollectHostInformationResponse) HasDisk() bool` + +HasDisk returns a boolean if a field has been set. + + + + +### GetHost + +`func (o *CollectHostInformationResponse) GetHost() map[string]interface{}` + +GetHost returns the Host field if non-nil, zero value otherwise. + +### GetHostOk + +`func (o *CollectHostInformationResponse) GetHostOk() (*map[string]interface{}, bool)` + +GetHostOk returns a tuple with the Host field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHost + +`func (o *CollectHostInformationResponse) SetHost(v map[string]interface{})` + +SetHost sets Host field to given value. + + +### HasHost + +`func (o *CollectHostInformationResponse) HasHost() bool` + +HasHost returns a boolean if a field has been set. + + + + +### GetMemory + +`func (o *CollectHostInformationResponse) GetMemory() map[string]interface{}` + +GetMemory returns the Memory field if non-nil, zero value otherwise. + +### GetMemoryOk + +`func (o *CollectHostInformationResponse) GetMemoryOk() (*map[string]interface{}, bool)` + +GetMemoryOk returns a tuple with the Memory field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMemory + +`func (o *CollectHostInformationResponse) SetMemory(v map[string]interface{})` + +SetMemory sets Memory field to given value. + + +### HasMemory + +`func (o *CollectHostInformationResponse) HasMemory() bool` + +HasMemory returns a boolean if a field has been set. + + + + +### GetTimestamp + +`func (o *CollectHostInformationResponse) GetTimestamp() time.Time` + +GetTimestamp returns the Timestamp field if non-nil, zero value otherwise. + +### GetTimestampOk + +`func (o *CollectHostInformationResponse) GetTimestampOk() (*time.Time, bool)` + +GetTimestampOk returns a tuple with the Timestamp field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTimestamp + +`func (o *CollectHostInformationResponse) SetTimestamp(v time.Time)` + +SetTimestamp sets Timestamp field to given value. + + +### HasTimestamp + +`func (o *CollectHostInformationResponse) HasTimestamp() bool` + +HasTimestamp returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/ConsulWriteAccessConfigRequest.md b/docs/ConsulConfigureAccessRequest.md similarity index 65% rename from docs/ConsulWriteAccessConfigRequest.md rename to docs/ConsulConfigureAccessRequest.md index ccda1d9b..9144200f 100644 --- a/docs/ConsulWriteAccessConfigRequest.md +++ b/docs/ConsulConfigureAccessRequest.md @@ -1,4 +1,4 @@ -# ConsulWriteAccessConfigRequest +# ConsulConfigureAccessRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewConsulWriteAccessConfigRequest +### NewConsulConfigureAccessRequest -`func NewConsulWriteAccessConfigRequest() *ConsulWriteAccessConfigRequest` +`func NewConsulConfigureAccessRequest() *ConsulConfigureAccessRequest` -NewConsulWriteAccessConfigRequest instantiates a new ConsulWriteAccessConfigRequest object +NewConsulConfigureAccessRequest instantiates a new ConsulConfigureAccessRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewConsulWriteAccessConfigRequestWithDefaults +### NewConsulConfigureAccessRequestWithDefaults -`func NewConsulWriteAccessConfigRequestWithDefaults() *ConsulWriteAccessConfigRequest` +`func NewConsulConfigureAccessRequestWithDefaults() *ConsulConfigureAccessRequest` -NewConsulWriteAccessConfigRequestWithDefaults instantiates a new ConsulWriteAccessConfigRequest object +NewConsulConfigureAccessRequestWithDefaults instantiates a new ConsulConfigureAccessRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAddress -`func (o *ConsulWriteAccessConfigRequest) GetAddress() string` +`func (o *ConsulConfigureAccessRequest) GetAddress() string` GetAddress returns the Address field if non-nil, zero value otherwise. ### GetAddressOk -`func (o *ConsulWriteAccessConfigRequest) GetAddressOk() (*string, bool)` +`func (o *ConsulConfigureAccessRequest) GetAddressOk() (*string, bool)` GetAddressOk returns a tuple with the Address field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAddress -`func (o *ConsulWriteAccessConfigRequest) SetAddress(v string)` +`func (o *ConsulConfigureAccessRequest) SetAddress(v string)` SetAddress sets Address field to given value. ### HasAddress -`func (o *ConsulWriteAccessConfigRequest) HasAddress() bool` +`func (o *ConsulConfigureAccessRequest) HasAddress() bool` HasAddress returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasAddress returns a boolean if a field has been set. ### GetCaCert -`func (o *ConsulWriteAccessConfigRequest) GetCaCert() string` +`func (o *ConsulConfigureAccessRequest) GetCaCert() string` GetCaCert returns the CaCert field if non-nil, zero value otherwise. ### GetCaCertOk -`func (o *ConsulWriteAccessConfigRequest) GetCaCertOk() (*string, bool)` +`func (o *ConsulConfigureAccessRequest) GetCaCertOk() (*string, bool)` GetCaCertOk returns a tuple with the CaCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCaCert -`func (o *ConsulWriteAccessConfigRequest) SetCaCert(v string)` +`func (o *ConsulConfigureAccessRequest) SetCaCert(v string)` SetCaCert sets CaCert field to given value. ### HasCaCert -`func (o *ConsulWriteAccessConfigRequest) HasCaCert() bool` +`func (o *ConsulConfigureAccessRequest) HasCaCert() bool` HasCaCert returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasCaCert returns a boolean if a field has been set. ### GetClientCert -`func (o *ConsulWriteAccessConfigRequest) GetClientCert() string` +`func (o *ConsulConfigureAccessRequest) GetClientCert() string` GetClientCert returns the ClientCert field if non-nil, zero value otherwise. ### GetClientCertOk -`func (o *ConsulWriteAccessConfigRequest) GetClientCertOk() (*string, bool)` +`func (o *ConsulConfigureAccessRequest) GetClientCertOk() (*string, bool)` GetClientCertOk returns a tuple with the ClientCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientCert -`func (o *ConsulWriteAccessConfigRequest) SetClientCert(v string)` +`func (o *ConsulConfigureAccessRequest) SetClientCert(v string)` SetClientCert sets ClientCert field to given value. ### HasClientCert -`func (o *ConsulWriteAccessConfigRequest) HasClientCert() bool` +`func (o *ConsulConfigureAccessRequest) HasClientCert() bool` HasClientCert returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasClientCert returns a boolean if a field has been set. ### GetClientKey -`func (o *ConsulWriteAccessConfigRequest) GetClientKey() string` +`func (o *ConsulConfigureAccessRequest) GetClientKey() string` GetClientKey returns the ClientKey field if non-nil, zero value otherwise. ### GetClientKeyOk -`func (o *ConsulWriteAccessConfigRequest) GetClientKeyOk() (*string, bool)` +`func (o *ConsulConfigureAccessRequest) GetClientKeyOk() (*string, bool)` GetClientKeyOk returns a tuple with the ClientKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientKey -`func (o *ConsulWriteAccessConfigRequest) SetClientKey(v string)` +`func (o *ConsulConfigureAccessRequest) SetClientKey(v string)` SetClientKey sets ClientKey field to given value. ### HasClientKey -`func (o *ConsulWriteAccessConfigRequest) HasClientKey() bool` +`func (o *ConsulConfigureAccessRequest) HasClientKey() bool` HasClientKey returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasClientKey returns a boolean if a field has been set. ### GetScheme -`func (o *ConsulWriteAccessConfigRequest) GetScheme() string` +`func (o *ConsulConfigureAccessRequest) GetScheme() string` GetScheme returns the Scheme field if non-nil, zero value otherwise. ### GetSchemeOk -`func (o *ConsulWriteAccessConfigRequest) GetSchemeOk() (*string, bool)` +`func (o *ConsulConfigureAccessRequest) GetSchemeOk() (*string, bool)` GetSchemeOk returns a tuple with the Scheme field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetScheme -`func (o *ConsulWriteAccessConfigRequest) SetScheme(v string)` +`func (o *ConsulConfigureAccessRequest) SetScheme(v string)` SetScheme sets Scheme field to given value. ### HasScheme -`func (o *ConsulWriteAccessConfigRequest) HasScheme() bool` +`func (o *ConsulConfigureAccessRequest) HasScheme() bool` HasScheme returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasScheme returns a boolean if a field has been set. ### GetToken -`func (o *ConsulWriteAccessConfigRequest) GetToken() string` +`func (o *ConsulConfigureAccessRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *ConsulWriteAccessConfigRequest) GetTokenOk() (*string, bool)` +`func (o *ConsulConfigureAccessRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *ConsulWriteAccessConfigRequest) SetToken(v string)` +`func (o *ConsulConfigureAccessRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *ConsulWriteAccessConfigRequest) HasToken() bool` +`func (o *ConsulConfigureAccessRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/WriteConfigCORSRequest.md b/docs/CorsConfigureRequest.md similarity index 67% rename from docs/WriteConfigCORSRequest.md rename to docs/CorsConfigureRequest.md index c71fd683..74116709 100644 --- a/docs/WriteConfigCORSRequest.md +++ b/docs/CorsConfigureRequest.md @@ -1,4 +1,4 @@ -# WriteConfigCORSRequest +# CorsConfigureRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteConfigCORSRequest +### NewCorsConfigureRequest -`func NewWriteConfigCORSRequest() *WriteConfigCORSRequest` +`func NewCorsConfigureRequest() *CorsConfigureRequest` -NewWriteConfigCORSRequest instantiates a new WriteConfigCORSRequest object +NewCorsConfigureRequest instantiates a new CorsConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteConfigCORSRequestWithDefaults +### NewCorsConfigureRequestWithDefaults -`func NewWriteConfigCORSRequestWithDefaults() *WriteConfigCORSRequest` +`func NewCorsConfigureRequestWithDefaults() *CorsConfigureRequest` -NewWriteConfigCORSRequestWithDefaults instantiates a new WriteConfigCORSRequest object +NewCorsConfigureRequestWithDefaults instantiates a new CorsConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowedHeaders -`func (o *WriteConfigCORSRequest) GetAllowedHeaders() []string` +`func (o *CorsConfigureRequest) GetAllowedHeaders() []string` GetAllowedHeaders returns the AllowedHeaders field if non-nil, zero value otherwise. ### GetAllowedHeadersOk -`func (o *WriteConfigCORSRequest) GetAllowedHeadersOk() (*[]string, bool)` +`func (o *CorsConfigureRequest) GetAllowedHeadersOk() (*[]string, bool)` GetAllowedHeadersOk returns a tuple with the AllowedHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedHeaders -`func (o *WriteConfigCORSRequest) SetAllowedHeaders(v []string)` +`func (o *CorsConfigureRequest) SetAllowedHeaders(v []string)` SetAllowedHeaders sets AllowedHeaders field to given value. ### HasAllowedHeaders -`func (o *WriteConfigCORSRequest) HasAllowedHeaders() bool` +`func (o *CorsConfigureRequest) HasAllowedHeaders() bool` HasAllowedHeaders returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAllowedHeaders returns a boolean if a field has been set. ### GetAllowedOrigins -`func (o *WriteConfigCORSRequest) GetAllowedOrigins() []string` +`func (o *CorsConfigureRequest) GetAllowedOrigins() []string` GetAllowedOrigins returns the AllowedOrigins field if non-nil, zero value otherwise. ### GetAllowedOriginsOk -`func (o *WriteConfigCORSRequest) GetAllowedOriginsOk() (*[]string, bool)` +`func (o *CorsConfigureRequest) GetAllowedOriginsOk() (*[]string, bool)` GetAllowedOriginsOk returns a tuple with the AllowedOrigins field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedOrigins -`func (o *WriteConfigCORSRequest) SetAllowedOrigins(v []string)` +`func (o *CorsConfigureRequest) SetAllowedOrigins(v []string)` SetAllowedOrigins sets AllowedOrigins field to given value. ### HasAllowedOrigins -`func (o *WriteConfigCORSRequest) HasAllowedOrigins() bool` +`func (o *CorsConfigureRequest) HasAllowedOrigins() bool` HasAllowedOrigins returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasAllowedOrigins returns a boolean if a field has been set. ### GetEnable -`func (o *WriteConfigCORSRequest) GetEnable() bool` +`func (o *CorsConfigureRequest) GetEnable() bool` GetEnable returns the Enable field if non-nil, zero value otherwise. ### GetEnableOk -`func (o *WriteConfigCORSRequest) GetEnableOk() (*bool, bool)` +`func (o *CorsConfigureRequest) GetEnableOk() (*bool, bool)` GetEnableOk returns a tuple with the Enable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnable -`func (o *WriteConfigCORSRequest) SetEnable(v bool)` +`func (o *CorsConfigureRequest) SetEnable(v bool)` SetEnable sets Enable field to given value. ### HasEnable -`func (o *WriteConfigCORSRequest) HasEnable() bool` +`func (o *CorsConfigureRequest) HasEnable() bool` HasEnable returns a boolean if a field has been set. diff --git a/docs/CorsReadConfigurationResponse.md b/docs/CorsReadConfigurationResponse.md new file mode 100644 index 00000000..4a6847d9 --- /dev/null +++ b/docs/CorsReadConfigurationResponse.md @@ -0,0 +1,129 @@ +# CorsReadConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AllowedHeaders** | Pointer to **[]string** | | [optional] +**AllowedOrigins** | Pointer to **[]string** | | [optional] +**Enabled** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewCorsReadConfigurationResponse + +`func NewCorsReadConfigurationResponse() *CorsReadConfigurationResponse` + +NewCorsReadConfigurationResponse instantiates a new CorsReadConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewCorsReadConfigurationResponseWithDefaults + +`func NewCorsReadConfigurationResponseWithDefaults() *CorsReadConfigurationResponse` + +NewCorsReadConfigurationResponseWithDefaults instantiates a new CorsReadConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAllowedHeaders + +`func (o *CorsReadConfigurationResponse) GetAllowedHeaders() []string` + +GetAllowedHeaders returns the AllowedHeaders field if non-nil, zero value otherwise. + +### GetAllowedHeadersOk + +`func (o *CorsReadConfigurationResponse) GetAllowedHeadersOk() (*[]string, bool)` + +GetAllowedHeadersOk returns a tuple with the AllowedHeaders field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedHeaders + +`func (o *CorsReadConfigurationResponse) SetAllowedHeaders(v []string)` + +SetAllowedHeaders sets AllowedHeaders field to given value. + + +### HasAllowedHeaders + +`func (o *CorsReadConfigurationResponse) HasAllowedHeaders() bool` + +HasAllowedHeaders returns a boolean if a field has been set. + + + + +### GetAllowedOrigins + +`func (o *CorsReadConfigurationResponse) GetAllowedOrigins() []string` + +GetAllowedOrigins returns the AllowedOrigins field if non-nil, zero value otherwise. + +### GetAllowedOriginsOk + +`func (o *CorsReadConfigurationResponse) GetAllowedOriginsOk() (*[]string, bool)` + +GetAllowedOriginsOk returns a tuple with the AllowedOrigins field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedOrigins + +`func (o *CorsReadConfigurationResponse) SetAllowedOrigins(v []string)` + +SetAllowedOrigins sets AllowedOrigins field to given value. + + +### HasAllowedOrigins + +`func (o *CorsReadConfigurationResponse) HasAllowedOrigins() bool` + +HasAllowedOrigins returns a boolean if a field has been set. + + + + +### GetEnabled + +`func (o *CorsReadConfigurationResponse) GetEnabled() bool` + +GetEnabled returns the Enabled field if non-nil, zero value otherwise. + +### GetEnabledOk + +`func (o *CorsReadConfigurationResponse) GetEnabledOk() (*bool, bool)` + +GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnabled + +`func (o *CorsReadConfigurationResponse) SetEnabled(v bool)` + +SetEnabled sets Enabled field to given value. + + +### HasEnabled + +`func (o *CorsReadConfigurationResponse) HasEnabled() bool` + +HasEnabled returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/DatabaseWriteConfigRequest.md b/docs/DatabaseConfigureConnectionRequest.md similarity index 65% rename from docs/DatabaseWriteConfigRequest.md rename to docs/DatabaseConfigureConnectionRequest.md index 3052d726..9301a8c0 100644 --- a/docs/DatabaseWriteConfigRequest.md +++ b/docs/DatabaseConfigureConnectionRequest.md @@ -1,4 +1,4 @@ -# DatabaseWriteConfigRequest +# DatabaseConfigureConnectionRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewDatabaseWriteConfigRequest +### NewDatabaseConfigureConnectionRequest -`func NewDatabaseWriteConfigRequest() *DatabaseWriteConfigRequest` +`func NewDatabaseConfigureConnectionRequest() *DatabaseConfigureConnectionRequest` -NewDatabaseWriteConfigRequest instantiates a new DatabaseWriteConfigRequest object +NewDatabaseConfigureConnectionRequest instantiates a new DatabaseConfigureConnectionRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewDatabaseWriteConfigRequestWithDefaults +### NewDatabaseConfigureConnectionRequestWithDefaults -`func NewDatabaseWriteConfigRequestWithDefaults() *DatabaseWriteConfigRequest` +`func NewDatabaseConfigureConnectionRequestWithDefaults() *DatabaseConfigureConnectionRequest` -NewDatabaseWriteConfigRequestWithDefaults instantiates a new DatabaseWriteConfigRequest object +NewDatabaseConfigureConnectionRequestWithDefaults instantiates a new DatabaseConfigureConnectionRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowedRoles -`func (o *DatabaseWriteConfigRequest) GetAllowedRoles() []string` +`func (o *DatabaseConfigureConnectionRequest) GetAllowedRoles() []string` GetAllowedRoles returns the AllowedRoles field if non-nil, zero value otherwise. ### GetAllowedRolesOk -`func (o *DatabaseWriteConfigRequest) GetAllowedRolesOk() (*[]string, bool)` +`func (o *DatabaseConfigureConnectionRequest) GetAllowedRolesOk() (*[]string, bool)` GetAllowedRolesOk returns a tuple with the AllowedRoles field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedRoles -`func (o *DatabaseWriteConfigRequest) SetAllowedRoles(v []string)` +`func (o *DatabaseConfigureConnectionRequest) SetAllowedRoles(v []string)` SetAllowedRoles sets AllowedRoles field to given value. ### HasAllowedRoles -`func (o *DatabaseWriteConfigRequest) HasAllowedRoles() bool` +`func (o *DatabaseConfigureConnectionRequest) HasAllowedRoles() bool` HasAllowedRoles returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasAllowedRoles returns a boolean if a field has been set. ### GetPasswordPolicy -`func (o *DatabaseWriteConfigRequest) GetPasswordPolicy() string` +`func (o *DatabaseConfigureConnectionRequest) GetPasswordPolicy() string` GetPasswordPolicy returns the PasswordPolicy field if non-nil, zero value otherwise. ### GetPasswordPolicyOk -`func (o *DatabaseWriteConfigRequest) GetPasswordPolicyOk() (*string, bool)` +`func (o *DatabaseConfigureConnectionRequest) GetPasswordPolicyOk() (*string, bool)` GetPasswordPolicyOk returns a tuple with the PasswordPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPasswordPolicy -`func (o *DatabaseWriteConfigRequest) SetPasswordPolicy(v string)` +`func (o *DatabaseConfigureConnectionRequest) SetPasswordPolicy(v string)` SetPasswordPolicy sets PasswordPolicy field to given value. ### HasPasswordPolicy -`func (o *DatabaseWriteConfigRequest) HasPasswordPolicy() bool` +`func (o *DatabaseConfigureConnectionRequest) HasPasswordPolicy() bool` HasPasswordPolicy returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasPasswordPolicy returns a boolean if a field has been set. ### GetPluginName -`func (o *DatabaseWriteConfigRequest) GetPluginName() string` +`func (o *DatabaseConfigureConnectionRequest) GetPluginName() string` GetPluginName returns the PluginName field if non-nil, zero value otherwise. ### GetPluginNameOk -`func (o *DatabaseWriteConfigRequest) GetPluginNameOk() (*string, bool)` +`func (o *DatabaseConfigureConnectionRequest) GetPluginNameOk() (*string, bool)` GetPluginNameOk returns a tuple with the PluginName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginName -`func (o *DatabaseWriteConfigRequest) SetPluginName(v string)` +`func (o *DatabaseConfigureConnectionRequest) SetPluginName(v string)` SetPluginName sets PluginName field to given value. ### HasPluginName -`func (o *DatabaseWriteConfigRequest) HasPluginName() bool` +`func (o *DatabaseConfigureConnectionRequest) HasPluginName() bool` HasPluginName returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasPluginName returns a boolean if a field has been set. ### GetPluginVersion -`func (o *DatabaseWriteConfigRequest) GetPluginVersion() string` +`func (o *DatabaseConfigureConnectionRequest) GetPluginVersion() string` GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. ### GetPluginVersionOk -`func (o *DatabaseWriteConfigRequest) GetPluginVersionOk() (*string, bool)` +`func (o *DatabaseConfigureConnectionRequest) GetPluginVersionOk() (*string, bool)` GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginVersion -`func (o *DatabaseWriteConfigRequest) SetPluginVersion(v string)` +`func (o *DatabaseConfigureConnectionRequest) SetPluginVersion(v string)` SetPluginVersion sets PluginVersion field to given value. ### HasPluginVersion -`func (o *DatabaseWriteConfigRequest) HasPluginVersion() bool` +`func (o *DatabaseConfigureConnectionRequest) HasPluginVersion() bool` HasPluginVersion returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasPluginVersion returns a boolean if a field has been set. ### GetRootRotationStatements -`func (o *DatabaseWriteConfigRequest) GetRootRotationStatements() []string` +`func (o *DatabaseConfigureConnectionRequest) GetRootRotationStatements() []string` GetRootRotationStatements returns the RootRotationStatements field if non-nil, zero value otherwise. ### GetRootRotationStatementsOk -`func (o *DatabaseWriteConfigRequest) GetRootRotationStatementsOk() (*[]string, bool)` +`func (o *DatabaseConfigureConnectionRequest) GetRootRotationStatementsOk() (*[]string, bool)` GetRootRotationStatementsOk returns a tuple with the RootRotationStatements field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRootRotationStatements -`func (o *DatabaseWriteConfigRequest) SetRootRotationStatements(v []string)` +`func (o *DatabaseConfigureConnectionRequest) SetRootRotationStatements(v []string)` SetRootRotationStatements sets RootRotationStatements field to given value. ### HasRootRotationStatements -`func (o *DatabaseWriteConfigRequest) HasRootRotationStatements() bool` +`func (o *DatabaseConfigureConnectionRequest) HasRootRotationStatements() bool` HasRootRotationStatements returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasRootRotationStatements returns a boolean if a field has been set. ### GetVerifyConnection -`func (o *DatabaseWriteConfigRequest) GetVerifyConnection() bool` +`func (o *DatabaseConfigureConnectionRequest) GetVerifyConnection() bool` GetVerifyConnection returns the VerifyConnection field if non-nil, zero value otherwise. ### GetVerifyConnectionOk -`func (o *DatabaseWriteConfigRequest) GetVerifyConnectionOk() (*bool, bool)` +`func (o *DatabaseConfigureConnectionRequest) GetVerifyConnectionOk() (*bool, bool)` GetVerifyConnectionOk returns a tuple with the VerifyConnection field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVerifyConnection -`func (o *DatabaseWriteConfigRequest) SetVerifyConnection(v bool)` +`func (o *DatabaseConfigureConnectionRequest) SetVerifyConnection(v bool)` SetVerifyConnection sets VerifyConnection field to given value. ### HasVerifyConnection -`func (o *DatabaseWriteConfigRequest) HasVerifyConnection() bool` +`func (o *DatabaseConfigureConnectionRequest) HasVerifyConnection() bool` HasVerifyConnection returns a boolean if a field has been set. diff --git a/docs/WriteRotateConfigRequest.md b/docs/EncryptionKeyConfigureRotationRequest.md similarity index 61% rename from docs/WriteRotateConfigRequest.md rename to docs/EncryptionKeyConfigureRotationRequest.md index 3451dfd7..0ac7d0c1 100644 --- a/docs/WriteRotateConfigRequest.md +++ b/docs/EncryptionKeyConfigureRotationRequest.md @@ -1,4 +1,4 @@ -# WriteRotateConfigRequest +# EncryptionKeyConfigureRotationRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteRotateConfigRequest +### NewEncryptionKeyConfigureRotationRequest -`func NewWriteRotateConfigRequest() *WriteRotateConfigRequest` +`func NewEncryptionKeyConfigureRotationRequest() *EncryptionKeyConfigureRotationRequest` -NewWriteRotateConfigRequest instantiates a new WriteRotateConfigRequest object +NewEncryptionKeyConfigureRotationRequest instantiates a new EncryptionKeyConfigureRotationRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteRotateConfigRequestWithDefaults +### NewEncryptionKeyConfigureRotationRequestWithDefaults -`func NewWriteRotateConfigRequestWithDefaults() *WriteRotateConfigRequest` +`func NewEncryptionKeyConfigureRotationRequestWithDefaults() *EncryptionKeyConfigureRotationRequest` -NewWriteRotateConfigRequestWithDefaults instantiates a new WriteRotateConfigRequest object +NewEncryptionKeyConfigureRotationRequestWithDefaults instantiates a new EncryptionKeyConfigureRotationRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEnabled -`func (o *WriteRotateConfigRequest) GetEnabled() bool` +`func (o *EncryptionKeyConfigureRotationRequest) GetEnabled() bool` GetEnabled returns the Enabled field if non-nil, zero value otherwise. ### GetEnabledOk -`func (o *WriteRotateConfigRequest) GetEnabledOk() (*bool, bool)` +`func (o *EncryptionKeyConfigureRotationRequest) GetEnabledOk() (*bool, bool)` GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnabled -`func (o *WriteRotateConfigRequest) SetEnabled(v bool)` +`func (o *EncryptionKeyConfigureRotationRequest) SetEnabled(v bool)` SetEnabled sets Enabled field to given value. ### HasEnabled -`func (o *WriteRotateConfigRequest) HasEnabled() bool` +`func (o *EncryptionKeyConfigureRotationRequest) HasEnabled() bool` HasEnabled returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasEnabled returns a boolean if a field has been set. ### GetInterval -`func (o *WriteRotateConfigRequest) GetInterval() int32` +`func (o *EncryptionKeyConfigureRotationRequest) GetInterval() int32` GetInterval returns the Interval field if non-nil, zero value otherwise. ### GetIntervalOk -`func (o *WriteRotateConfigRequest) GetIntervalOk() (*int32, bool)` +`func (o *EncryptionKeyConfigureRotationRequest) GetIntervalOk() (*int32, bool)` GetIntervalOk returns a tuple with the Interval field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInterval -`func (o *WriteRotateConfigRequest) SetInterval(v int32)` +`func (o *EncryptionKeyConfigureRotationRequest) SetInterval(v int32)` SetInterval sets Interval field to given value. ### HasInterval -`func (o *WriteRotateConfigRequest) HasInterval() bool` +`func (o *EncryptionKeyConfigureRotationRequest) HasInterval() bool` HasInterval returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasInterval returns a boolean if a field has been set. ### GetMaxOperations -`func (o *WriteRotateConfigRequest) GetMaxOperations() int64` +`func (o *EncryptionKeyConfigureRotationRequest) GetMaxOperations() int64` GetMaxOperations returns the MaxOperations field if non-nil, zero value otherwise. ### GetMaxOperationsOk -`func (o *WriteRotateConfigRequest) GetMaxOperationsOk() (*int64, bool)` +`func (o *EncryptionKeyConfigureRotationRequest) GetMaxOperationsOk() (*int64, bool)` GetMaxOperationsOk returns a tuple with the MaxOperations field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxOperations -`func (o *WriteRotateConfigRequest) SetMaxOperations(v int64)` +`func (o *EncryptionKeyConfigureRotationRequest) SetMaxOperations(v int64)` SetMaxOperations sets MaxOperations field to given value. ### HasMaxOperations -`func (o *WriteRotateConfigRequest) HasMaxOperations() bool` +`func (o *EncryptionKeyConfigureRotationRequest) HasMaxOperations() bool` HasMaxOperations returns a boolean if a field has been set. diff --git a/docs/EncryptionKeyReadRotationConfigurationResponse.md b/docs/EncryptionKeyReadRotationConfigurationResponse.md new file mode 100644 index 00000000..9a91cde1 --- /dev/null +++ b/docs/EncryptionKeyReadRotationConfigurationResponse.md @@ -0,0 +1,129 @@ +# EncryptionKeyReadRotationConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Enabled** | Pointer to **bool** | | [optional] +**Interval** | Pointer to **int32** | | [optional] +**MaxOperations** | Pointer to **int64** | | [optional] + + + +## Methods + + +### NewEncryptionKeyReadRotationConfigurationResponse + +`func NewEncryptionKeyReadRotationConfigurationResponse() *EncryptionKeyReadRotationConfigurationResponse` + +NewEncryptionKeyReadRotationConfigurationResponse instantiates a new EncryptionKeyReadRotationConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewEncryptionKeyReadRotationConfigurationResponseWithDefaults + +`func NewEncryptionKeyReadRotationConfigurationResponseWithDefaults() *EncryptionKeyReadRotationConfigurationResponse` + +NewEncryptionKeyReadRotationConfigurationResponseWithDefaults instantiates a new EncryptionKeyReadRotationConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetEnabled + +`func (o *EncryptionKeyReadRotationConfigurationResponse) GetEnabled() bool` + +GetEnabled returns the Enabled field if non-nil, zero value otherwise. + +### GetEnabledOk + +`func (o *EncryptionKeyReadRotationConfigurationResponse) GetEnabledOk() (*bool, bool)` + +GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnabled + +`func (o *EncryptionKeyReadRotationConfigurationResponse) SetEnabled(v bool)` + +SetEnabled sets Enabled field to given value. + + +### HasEnabled + +`func (o *EncryptionKeyReadRotationConfigurationResponse) HasEnabled() bool` + +HasEnabled returns a boolean if a field has been set. + + + + +### GetInterval + +`func (o *EncryptionKeyReadRotationConfigurationResponse) GetInterval() int32` + +GetInterval returns the Interval field if non-nil, zero value otherwise. + +### GetIntervalOk + +`func (o *EncryptionKeyReadRotationConfigurationResponse) GetIntervalOk() (*int32, bool)` + +GetIntervalOk returns a tuple with the Interval field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetInterval + +`func (o *EncryptionKeyReadRotationConfigurationResponse) SetInterval(v int32)` + +SetInterval sets Interval field to given value. + + +### HasInterval + +`func (o *EncryptionKeyReadRotationConfigurationResponse) HasInterval() bool` + +HasInterval returns a boolean if a field has been set. + + + + +### GetMaxOperations + +`func (o *EncryptionKeyReadRotationConfigurationResponse) GetMaxOperations() int64` + +GetMaxOperations returns the MaxOperations field if non-nil, zero value otherwise. + +### GetMaxOperationsOk + +`func (o *EncryptionKeyReadRotationConfigurationResponse) GetMaxOperationsOk() (*int64, bool)` + +GetMaxOperationsOk returns a tuple with the MaxOperations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxOperations + +`func (o *EncryptionKeyReadRotationConfigurationResponse) SetMaxOperations(v int64)` + +SetMaxOperations sets MaxOperations field to given value. + + +### HasMaxOperations + +`func (o *EncryptionKeyReadRotationConfigurationResponse) HasMaxOperations() bool` + +HasMaxOperations returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/EntityWriteAliasRequest.md b/docs/EntityCreateAliasRequest.md similarity index 66% rename from docs/EntityWriteAliasRequest.md rename to docs/EntityCreateAliasRequest.md index f1a57a1e..0b7e99f2 100644 --- a/docs/EntityWriteAliasRequest.md +++ b/docs/EntityCreateAliasRequest.md @@ -1,4 +1,4 @@ -# EntityWriteAliasRequest +# EntityCreateAliasRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewEntityWriteAliasRequest +### NewEntityCreateAliasRequest -`func NewEntityWriteAliasRequest() *EntityWriteAliasRequest` +`func NewEntityCreateAliasRequest() *EntityCreateAliasRequest` -NewEntityWriteAliasRequest instantiates a new EntityWriteAliasRequest object +NewEntityCreateAliasRequest instantiates a new EntityCreateAliasRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewEntityWriteAliasRequestWithDefaults +### NewEntityCreateAliasRequestWithDefaults -`func NewEntityWriteAliasRequestWithDefaults() *EntityWriteAliasRequest` +`func NewEntityCreateAliasRequestWithDefaults() *EntityCreateAliasRequest` -NewEntityWriteAliasRequestWithDefaults instantiates a new EntityWriteAliasRequest object +NewEntityCreateAliasRequestWithDefaults instantiates a new EntityCreateAliasRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCanonicalId -`func (o *EntityWriteAliasRequest) GetCanonicalId() string` +`func (o *EntityCreateAliasRequest) GetCanonicalId() string` GetCanonicalId returns the CanonicalId field if non-nil, zero value otherwise. ### GetCanonicalIdOk -`func (o *EntityWriteAliasRequest) GetCanonicalIdOk() (*string, bool)` +`func (o *EntityCreateAliasRequest) GetCanonicalIdOk() (*string, bool)` GetCanonicalIdOk returns a tuple with the CanonicalId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCanonicalId -`func (o *EntityWriteAliasRequest) SetCanonicalId(v string)` +`func (o *EntityCreateAliasRequest) SetCanonicalId(v string)` SetCanonicalId sets CanonicalId field to given value. ### HasCanonicalId -`func (o *EntityWriteAliasRequest) HasCanonicalId() bool` +`func (o *EntityCreateAliasRequest) HasCanonicalId() bool` HasCanonicalId returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasCanonicalId returns a boolean if a field has been set. ### GetCustomMetadata -`func (o *EntityWriteAliasRequest) GetCustomMetadata() map[string]interface{}` +`func (o *EntityCreateAliasRequest) GetCustomMetadata() map[string]interface{}` GetCustomMetadata returns the CustomMetadata field if non-nil, zero value otherwise. ### GetCustomMetadataOk -`func (o *EntityWriteAliasRequest) GetCustomMetadataOk() (*map[string]interface{}, bool)` +`func (o *EntityCreateAliasRequest) GetCustomMetadataOk() (*map[string]interface{}, bool)` GetCustomMetadataOk returns a tuple with the CustomMetadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCustomMetadata -`func (o *EntityWriteAliasRequest) SetCustomMetadata(v map[string]interface{})` +`func (o *EntityCreateAliasRequest) SetCustomMetadata(v map[string]interface{})` SetCustomMetadata sets CustomMetadata field to given value. ### HasCustomMetadata -`func (o *EntityWriteAliasRequest) HasCustomMetadata() bool` +`func (o *EntityCreateAliasRequest) HasCustomMetadata() bool` HasCustomMetadata returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasCustomMetadata returns a boolean if a field has been set. ### GetEntityId -`func (o *EntityWriteAliasRequest) GetEntityId() string` +`func (o *EntityCreateAliasRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *EntityWriteAliasRequest) GetEntityIdOk() (*string, bool)` +`func (o *EntityCreateAliasRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *EntityWriteAliasRequest) SetEntityId(v string)` +`func (o *EntityCreateAliasRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. ### HasEntityId -`func (o *EntityWriteAliasRequest) HasEntityId() bool` +`func (o *EntityCreateAliasRequest) HasEntityId() bool` HasEntityId returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasEntityId returns a boolean if a field has been set. ### GetId -`func (o *EntityWriteAliasRequest) GetId() string` +`func (o *EntityCreateAliasRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *EntityWriteAliasRequest) GetIdOk() (*string, bool)` +`func (o *EntityCreateAliasRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *EntityWriteAliasRequest) SetId(v string)` +`func (o *EntityCreateAliasRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *EntityWriteAliasRequest) HasId() bool` +`func (o *EntityCreateAliasRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasId returns a boolean if a field has been set. ### GetMountAccessor -`func (o *EntityWriteAliasRequest) GetMountAccessor() string` +`func (o *EntityCreateAliasRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *EntityWriteAliasRequest) GetMountAccessorOk() (*string, bool)` +`func (o *EntityCreateAliasRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *EntityWriteAliasRequest) SetMountAccessor(v string)` +`func (o *EntityCreateAliasRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *EntityWriteAliasRequest) HasMountAccessor() bool` +`func (o *EntityCreateAliasRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *EntityWriteAliasRequest) GetName() string` +`func (o *EntityCreateAliasRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *EntityWriteAliasRequest) GetNameOk() (*string, bool)` +`func (o *EntityCreateAliasRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *EntityWriteAliasRequest) SetName(v string)` +`func (o *EntityCreateAliasRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *EntityWriteAliasRequest) HasName() bool` +`func (o *EntityCreateAliasRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/EntityWriteRequest.md b/docs/EntityCreateRequest.md similarity index 69% rename from docs/EntityWriteRequest.md rename to docs/EntityCreateRequest.md index c5e4f079..35bf50ee 100644 --- a/docs/EntityWriteRequest.md +++ b/docs/EntityCreateRequest.md @@ -1,4 +1,4 @@ -# EntityWriteRequest +# EntityCreateRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewEntityWriteRequest +### NewEntityCreateRequest -`func NewEntityWriteRequest() *EntityWriteRequest` +`func NewEntityCreateRequest() *EntityCreateRequest` -NewEntityWriteRequest instantiates a new EntityWriteRequest object +NewEntityCreateRequest instantiates a new EntityCreateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewEntityWriteRequestWithDefaults +### NewEntityCreateRequestWithDefaults -`func NewEntityWriteRequestWithDefaults() *EntityWriteRequest` +`func NewEntityCreateRequestWithDefaults() *EntityCreateRequest` -NewEntityWriteRequestWithDefaults instantiates a new EntityWriteRequest object +NewEntityCreateRequestWithDefaults instantiates a new EntityCreateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisabled -`func (o *EntityWriteRequest) GetDisabled() bool` +`func (o *EntityCreateRequest) GetDisabled() bool` GetDisabled returns the Disabled field if non-nil, zero value otherwise. ### GetDisabledOk -`func (o *EntityWriteRequest) GetDisabledOk() (*bool, bool)` +`func (o *EntityCreateRequest) GetDisabledOk() (*bool, bool)` GetDisabledOk returns a tuple with the Disabled field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisabled -`func (o *EntityWriteRequest) SetDisabled(v bool)` +`func (o *EntityCreateRequest) SetDisabled(v bool)` SetDisabled sets Disabled field to given value. ### HasDisabled -`func (o *EntityWriteRequest) HasDisabled() bool` +`func (o *EntityCreateRequest) HasDisabled() bool` HasDisabled returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasDisabled returns a boolean if a field has been set. ### GetId -`func (o *EntityWriteRequest) GetId() string` +`func (o *EntityCreateRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *EntityWriteRequest) GetIdOk() (*string, bool)` +`func (o *EntityCreateRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *EntityWriteRequest) SetId(v string)` +`func (o *EntityCreateRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *EntityWriteRequest) HasId() bool` +`func (o *EntityCreateRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasId returns a boolean if a field has been set. ### GetMetadata -`func (o *EntityWriteRequest) GetMetadata() map[string]interface{}` +`func (o *EntityCreateRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *EntityWriteRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *EntityCreateRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *EntityWriteRequest) SetMetadata(v map[string]interface{})` +`func (o *EntityCreateRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *EntityWriteRequest) HasMetadata() bool` +`func (o *EntityCreateRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasMetadata returns a boolean if a field has been set. ### GetName -`func (o *EntityWriteRequest) GetName() string` +`func (o *EntityCreateRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *EntityWriteRequest) GetNameOk() (*string, bool)` +`func (o *EntityCreateRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *EntityWriteRequest) SetName(v string)` +`func (o *EntityCreateRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *EntityWriteRequest) HasName() bool` +`func (o *EntityCreateRequest) HasName() bool` HasName returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasName returns a boolean if a field has been set. ### GetPolicies -`func (o *EntityWriteRequest) GetPolicies() []string` +`func (o *EntityCreateRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *EntityWriteRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *EntityCreateRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *EntityWriteRequest) SetPolicies(v []string)` +`func (o *EntityCreateRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *EntityWriteRequest) HasPolicies() bool` +`func (o *EntityCreateRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. diff --git a/docs/EntityLookupRequest.md b/docs/EntityLookupRequest.md index 677eda06..2cf1ca79 100644 --- a/docs/EntityLookupRequest.md +++ b/docs/EntityLookupRequest.md @@ -1,4 +1,4 @@ -# EntityLookupRequest +# EntityLookUpRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewEntityLookupRequest +### NewEntityLookUpRequest -`func NewEntityLookupRequest() *EntityLookupRequest` +`func NewEntityLookUpRequest() *EntityLookUpRequest` -NewEntityLookupRequest instantiates a new EntityLookupRequest object +NewEntityLookUpRequest instantiates a new EntityLookUpRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewEntityLookupRequestWithDefaults +### NewEntityLookUpRequestWithDefaults -`func NewEntityLookupRequestWithDefaults() *EntityLookupRequest` +`func NewEntityLookUpRequestWithDefaults() *EntityLookUpRequest` -NewEntityLookupRequestWithDefaults instantiates a new EntityLookupRequest object +NewEntityLookUpRequestWithDefaults instantiates a new EntityLookUpRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAliasId -`func (o *EntityLookupRequest) GetAliasId() string` +`func (o *EntityLookUpRequest) GetAliasId() string` GetAliasId returns the AliasId field if non-nil, zero value otherwise. ### GetAliasIdOk -`func (o *EntityLookupRequest) GetAliasIdOk() (*string, bool)` +`func (o *EntityLookUpRequest) GetAliasIdOk() (*string, bool)` GetAliasIdOk returns a tuple with the AliasId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAliasId -`func (o *EntityLookupRequest) SetAliasId(v string)` +`func (o *EntityLookUpRequest) SetAliasId(v string)` SetAliasId sets AliasId field to given value. ### HasAliasId -`func (o *EntityLookupRequest) HasAliasId() bool` +`func (o *EntityLookUpRequest) HasAliasId() bool` HasAliasId returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasAliasId returns a boolean if a field has been set. ### GetAliasMountAccessor -`func (o *EntityLookupRequest) GetAliasMountAccessor() string` +`func (o *EntityLookUpRequest) GetAliasMountAccessor() string` GetAliasMountAccessor returns the AliasMountAccessor field if non-nil, zero value otherwise. ### GetAliasMountAccessorOk -`func (o *EntityLookupRequest) GetAliasMountAccessorOk() (*string, bool)` +`func (o *EntityLookUpRequest) GetAliasMountAccessorOk() (*string, bool)` GetAliasMountAccessorOk returns a tuple with the AliasMountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAliasMountAccessor -`func (o *EntityLookupRequest) SetAliasMountAccessor(v string)` +`func (o *EntityLookUpRequest) SetAliasMountAccessor(v string)` SetAliasMountAccessor sets AliasMountAccessor field to given value. ### HasAliasMountAccessor -`func (o *EntityLookupRequest) HasAliasMountAccessor() bool` +`func (o *EntityLookUpRequest) HasAliasMountAccessor() bool` HasAliasMountAccessor returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasAliasMountAccessor returns a boolean if a field has been set. ### GetAliasName -`func (o *EntityLookupRequest) GetAliasName() string` +`func (o *EntityLookUpRequest) GetAliasName() string` GetAliasName returns the AliasName field if non-nil, zero value otherwise. ### GetAliasNameOk -`func (o *EntityLookupRequest) GetAliasNameOk() (*string, bool)` +`func (o *EntityLookUpRequest) GetAliasNameOk() (*string, bool)` GetAliasNameOk returns a tuple with the AliasName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAliasName -`func (o *EntityLookupRequest) SetAliasName(v string)` +`func (o *EntityLookUpRequest) SetAliasName(v string)` SetAliasName sets AliasName field to given value. ### HasAliasName -`func (o *EntityLookupRequest) HasAliasName() bool` +`func (o *EntityLookUpRequest) HasAliasName() bool` HasAliasName returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasAliasName returns a boolean if a field has been set. ### GetId -`func (o *EntityLookupRequest) GetId() string` +`func (o *EntityLookUpRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *EntityLookupRequest) GetIdOk() (*string, bool)` +`func (o *EntityLookUpRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *EntityLookupRequest) SetId(v string)` +`func (o *EntityLookUpRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *EntityLookupRequest) HasId() bool` +`func (o *EntityLookUpRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasId returns a boolean if a field has been set. ### GetName -`func (o *EntityLookupRequest) GetName() string` +`func (o *EntityLookUpRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *EntityLookupRequest) GetNameOk() (*string, bool)` +`func (o *EntityLookUpRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *EntityLookupRequest) SetName(v string)` +`func (o *EntityLookUpRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *EntityLookupRequest) HasName() bool` +`func (o *EntityLookUpRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/EntityWriteAliasByIDRequest.md b/docs/EntityUpdateAliasByIdRequest.md similarity index 64% rename from docs/EntityWriteAliasByIDRequest.md rename to docs/EntityUpdateAliasByIdRequest.md index 8e603a3e..68b34fc5 100644 --- a/docs/EntityWriteAliasByIDRequest.md +++ b/docs/EntityUpdateAliasByIdRequest.md @@ -1,4 +1,4 @@ -# EntityWriteAliasByIDRequest +# EntityUpdateAliasByIdRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewEntityWriteAliasByIDRequest +### NewEntityUpdateAliasByIdRequest -`func NewEntityWriteAliasByIDRequest() *EntityWriteAliasByIDRequest` +`func NewEntityUpdateAliasByIdRequest() *EntityUpdateAliasByIdRequest` -NewEntityWriteAliasByIDRequest instantiates a new EntityWriteAliasByIDRequest object +NewEntityUpdateAliasByIdRequest instantiates a new EntityUpdateAliasByIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewEntityWriteAliasByIDRequestWithDefaults +### NewEntityUpdateAliasByIdRequestWithDefaults -`func NewEntityWriteAliasByIDRequestWithDefaults() *EntityWriteAliasByIDRequest` +`func NewEntityUpdateAliasByIdRequestWithDefaults() *EntityUpdateAliasByIdRequest` -NewEntityWriteAliasByIDRequestWithDefaults instantiates a new EntityWriteAliasByIDRequest object +NewEntityUpdateAliasByIdRequestWithDefaults instantiates a new EntityUpdateAliasByIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCanonicalId -`func (o *EntityWriteAliasByIDRequest) GetCanonicalId() string` +`func (o *EntityUpdateAliasByIdRequest) GetCanonicalId() string` GetCanonicalId returns the CanonicalId field if non-nil, zero value otherwise. ### GetCanonicalIdOk -`func (o *EntityWriteAliasByIDRequest) GetCanonicalIdOk() (*string, bool)` +`func (o *EntityUpdateAliasByIdRequest) GetCanonicalIdOk() (*string, bool)` GetCanonicalIdOk returns a tuple with the CanonicalId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCanonicalId -`func (o *EntityWriteAliasByIDRequest) SetCanonicalId(v string)` +`func (o *EntityUpdateAliasByIdRequest) SetCanonicalId(v string)` SetCanonicalId sets CanonicalId field to given value. ### HasCanonicalId -`func (o *EntityWriteAliasByIDRequest) HasCanonicalId() bool` +`func (o *EntityUpdateAliasByIdRequest) HasCanonicalId() bool` HasCanonicalId returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasCanonicalId returns a boolean if a field has been set. ### GetCustomMetadata -`func (o *EntityWriteAliasByIDRequest) GetCustomMetadata() map[string]interface{}` +`func (o *EntityUpdateAliasByIdRequest) GetCustomMetadata() map[string]interface{}` GetCustomMetadata returns the CustomMetadata field if non-nil, zero value otherwise. ### GetCustomMetadataOk -`func (o *EntityWriteAliasByIDRequest) GetCustomMetadataOk() (*map[string]interface{}, bool)` +`func (o *EntityUpdateAliasByIdRequest) GetCustomMetadataOk() (*map[string]interface{}, bool)` GetCustomMetadataOk returns a tuple with the CustomMetadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCustomMetadata -`func (o *EntityWriteAliasByIDRequest) SetCustomMetadata(v map[string]interface{})` +`func (o *EntityUpdateAliasByIdRequest) SetCustomMetadata(v map[string]interface{})` SetCustomMetadata sets CustomMetadata field to given value. ### HasCustomMetadata -`func (o *EntityWriteAliasByIDRequest) HasCustomMetadata() bool` +`func (o *EntityUpdateAliasByIdRequest) HasCustomMetadata() bool` HasCustomMetadata returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasCustomMetadata returns a boolean if a field has been set. ### GetEntityId -`func (o *EntityWriteAliasByIDRequest) GetEntityId() string` +`func (o *EntityUpdateAliasByIdRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *EntityWriteAliasByIDRequest) GetEntityIdOk() (*string, bool)` +`func (o *EntityUpdateAliasByIdRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *EntityWriteAliasByIDRequest) SetEntityId(v string)` +`func (o *EntityUpdateAliasByIdRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. ### HasEntityId -`func (o *EntityWriteAliasByIDRequest) HasEntityId() bool` +`func (o *EntityUpdateAliasByIdRequest) HasEntityId() bool` HasEntityId returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasEntityId returns a boolean if a field has been set. ### GetMountAccessor -`func (o *EntityWriteAliasByIDRequest) GetMountAccessor() string` +`func (o *EntityUpdateAliasByIdRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *EntityWriteAliasByIDRequest) GetMountAccessorOk() (*string, bool)` +`func (o *EntityUpdateAliasByIdRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *EntityWriteAliasByIDRequest) SetMountAccessor(v string)` +`func (o *EntityUpdateAliasByIdRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *EntityWriteAliasByIDRequest) HasMountAccessor() bool` +`func (o *EntityUpdateAliasByIdRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *EntityWriteAliasByIDRequest) GetName() string` +`func (o *EntityUpdateAliasByIdRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *EntityWriteAliasByIDRequest) GetNameOk() (*string, bool)` +`func (o *EntityUpdateAliasByIdRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *EntityWriteAliasByIDRequest) SetName(v string)` +`func (o *EntityUpdateAliasByIdRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *EntityWriteAliasByIDRequest) HasName() bool` +`func (o *EntityUpdateAliasByIdRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/EntityWriteByIDRequest.md b/docs/EntityUpdateByIdRequest.md similarity index 67% rename from docs/EntityWriteByIDRequest.md rename to docs/EntityUpdateByIdRequest.md index 88c7735c..22427ecf 100644 --- a/docs/EntityWriteByIDRequest.md +++ b/docs/EntityUpdateByIdRequest.md @@ -1,4 +1,4 @@ -# EntityWriteByIDRequest +# EntityUpdateByIdRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewEntityWriteByIDRequest +### NewEntityUpdateByIdRequest -`func NewEntityWriteByIDRequest() *EntityWriteByIDRequest` +`func NewEntityUpdateByIdRequest() *EntityUpdateByIdRequest` -NewEntityWriteByIDRequest instantiates a new EntityWriteByIDRequest object +NewEntityUpdateByIdRequest instantiates a new EntityUpdateByIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewEntityWriteByIDRequestWithDefaults +### NewEntityUpdateByIdRequestWithDefaults -`func NewEntityWriteByIDRequestWithDefaults() *EntityWriteByIDRequest` +`func NewEntityUpdateByIdRequestWithDefaults() *EntityUpdateByIdRequest` -NewEntityWriteByIDRequestWithDefaults instantiates a new EntityWriteByIDRequest object +NewEntityUpdateByIdRequestWithDefaults instantiates a new EntityUpdateByIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisabled -`func (o *EntityWriteByIDRequest) GetDisabled() bool` +`func (o *EntityUpdateByIdRequest) GetDisabled() bool` GetDisabled returns the Disabled field if non-nil, zero value otherwise. ### GetDisabledOk -`func (o *EntityWriteByIDRequest) GetDisabledOk() (*bool, bool)` +`func (o *EntityUpdateByIdRequest) GetDisabledOk() (*bool, bool)` GetDisabledOk returns a tuple with the Disabled field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisabled -`func (o *EntityWriteByIDRequest) SetDisabled(v bool)` +`func (o *EntityUpdateByIdRequest) SetDisabled(v bool)` SetDisabled sets Disabled field to given value. ### HasDisabled -`func (o *EntityWriteByIDRequest) HasDisabled() bool` +`func (o *EntityUpdateByIdRequest) HasDisabled() bool` HasDisabled returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasDisabled returns a boolean if a field has been set. ### GetMetadata -`func (o *EntityWriteByIDRequest) GetMetadata() map[string]interface{}` +`func (o *EntityUpdateByIdRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *EntityWriteByIDRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *EntityUpdateByIdRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *EntityWriteByIDRequest) SetMetadata(v map[string]interface{})` +`func (o *EntityUpdateByIdRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *EntityWriteByIDRequest) HasMetadata() bool` +`func (o *EntityUpdateByIdRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasMetadata returns a boolean if a field has been set. ### GetName -`func (o *EntityWriteByIDRequest) GetName() string` +`func (o *EntityUpdateByIdRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *EntityWriteByIDRequest) GetNameOk() (*string, bool)` +`func (o *EntityUpdateByIdRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *EntityWriteByIDRequest) SetName(v string)` +`func (o *EntityUpdateByIdRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *EntityWriteByIDRequest) HasName() bool` +`func (o *EntityUpdateByIdRequest) HasName() bool` HasName returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasName returns a boolean if a field has been set. ### GetPolicies -`func (o *EntityWriteByIDRequest) GetPolicies() []string` +`func (o *EntityUpdateByIdRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *EntityWriteByIDRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *EntityUpdateByIdRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *EntityWriteByIDRequest) SetPolicies(v []string)` +`func (o *EntityUpdateByIdRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *EntityWriteByIDRequest) HasPolicies() bool` +`func (o *EntityUpdateByIdRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. diff --git a/docs/EntityWriteByNameRequest.md b/docs/EntityUpdateByNameRequest.md similarity index 66% rename from docs/EntityWriteByNameRequest.md rename to docs/EntityUpdateByNameRequest.md index 42297a65..4a90f257 100644 --- a/docs/EntityWriteByNameRequest.md +++ b/docs/EntityUpdateByNameRequest.md @@ -1,4 +1,4 @@ -# EntityWriteByNameRequest +# EntityUpdateByNameRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewEntityWriteByNameRequest +### NewEntityUpdateByNameRequest -`func NewEntityWriteByNameRequest() *EntityWriteByNameRequest` +`func NewEntityUpdateByNameRequest() *EntityUpdateByNameRequest` -NewEntityWriteByNameRequest instantiates a new EntityWriteByNameRequest object +NewEntityUpdateByNameRequest instantiates a new EntityUpdateByNameRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewEntityWriteByNameRequestWithDefaults +### NewEntityUpdateByNameRequestWithDefaults -`func NewEntityWriteByNameRequestWithDefaults() *EntityWriteByNameRequest` +`func NewEntityUpdateByNameRequestWithDefaults() *EntityUpdateByNameRequest` -NewEntityWriteByNameRequestWithDefaults instantiates a new EntityWriteByNameRequest object +NewEntityUpdateByNameRequestWithDefaults instantiates a new EntityUpdateByNameRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisabled -`func (o *EntityWriteByNameRequest) GetDisabled() bool` +`func (o *EntityUpdateByNameRequest) GetDisabled() bool` GetDisabled returns the Disabled field if non-nil, zero value otherwise. ### GetDisabledOk -`func (o *EntityWriteByNameRequest) GetDisabledOk() (*bool, bool)` +`func (o *EntityUpdateByNameRequest) GetDisabledOk() (*bool, bool)` GetDisabledOk returns a tuple with the Disabled field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisabled -`func (o *EntityWriteByNameRequest) SetDisabled(v bool)` +`func (o *EntityUpdateByNameRequest) SetDisabled(v bool)` SetDisabled sets Disabled field to given value. ### HasDisabled -`func (o *EntityWriteByNameRequest) HasDisabled() bool` +`func (o *EntityUpdateByNameRequest) HasDisabled() bool` HasDisabled returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasDisabled returns a boolean if a field has been set. ### GetId -`func (o *EntityWriteByNameRequest) GetId() string` +`func (o *EntityUpdateByNameRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *EntityWriteByNameRequest) GetIdOk() (*string, bool)` +`func (o *EntityUpdateByNameRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *EntityWriteByNameRequest) SetId(v string)` +`func (o *EntityUpdateByNameRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *EntityWriteByNameRequest) HasId() bool` +`func (o *EntityUpdateByNameRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasId returns a boolean if a field has been set. ### GetMetadata -`func (o *EntityWriteByNameRequest) GetMetadata() map[string]interface{}` +`func (o *EntityUpdateByNameRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *EntityWriteByNameRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *EntityUpdateByNameRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *EntityWriteByNameRequest) SetMetadata(v map[string]interface{})` +`func (o *EntityUpdateByNameRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *EntityWriteByNameRequest) HasMetadata() bool` +`func (o *EntityUpdateByNameRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasMetadata returns a boolean if a field has been set. ### GetPolicies -`func (o *EntityWriteByNameRequest) GetPolicies() []string` +`func (o *EntityUpdateByNameRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *EntityWriteByNameRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *EntityUpdateByNameRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *EntityWriteByNameRequest) SetPolicies(v []string)` +`func (o *EntityUpdateByNameRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *EntityWriteByNameRequest) HasPolicies() bool` +`func (o *EntityUpdateByNameRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. diff --git a/docs/ToolsHashRequest.md b/docs/GenerateHashRequest.md similarity index 69% rename from docs/ToolsHashRequest.md rename to docs/GenerateHashRequest.md index 827a7849..a44dd64a 100644 --- a/docs/ToolsHashRequest.md +++ b/docs/GenerateHashRequest.md @@ -1,4 +1,4 @@ -# ToolsHashRequest +# GenerateHashRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewToolsHashRequest +### NewGenerateHashRequest -`func NewToolsHashRequest() *ToolsHashRequest` +`func NewGenerateHashRequest() *GenerateHashRequest` -NewToolsHashRequest instantiates a new ToolsHashRequest object +NewGenerateHashRequest instantiates a new GenerateHashRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewToolsHashRequestWithDefaults +### NewGenerateHashRequestWithDefaults -`func NewToolsHashRequestWithDefaults() *ToolsHashRequest` +`func NewGenerateHashRequestWithDefaults() *GenerateHashRequest` -NewToolsHashRequestWithDefaults instantiates a new ToolsHashRequest object +NewGenerateHashRequestWithDefaults instantiates a new GenerateHashRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAlgorithm -`func (o *ToolsHashRequest) GetAlgorithm() string` +`func (o *GenerateHashRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *ToolsHashRequest) GetAlgorithmOk() (*string, bool)` +`func (o *GenerateHashRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *ToolsHashRequest) SetAlgorithm(v string)` +`func (o *GenerateHashRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *ToolsHashRequest) HasAlgorithm() bool` +`func (o *GenerateHashRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasAlgorithm returns a boolean if a field has been set. ### GetFormat -`func (o *ToolsHashRequest) GetFormat() string` +`func (o *GenerateHashRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *ToolsHashRequest) GetFormatOk() (*string, bool)` +`func (o *GenerateHashRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *ToolsHashRequest) SetFormat(v string)` +`func (o *GenerateHashRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *ToolsHashRequest) HasFormat() bool` +`func (o *GenerateHashRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasFormat returns a boolean if a field has been set. ### GetInput -`func (o *ToolsHashRequest) GetInput() string` +`func (o *GenerateHashRequest) GetInput() string` GetInput returns the Input field if non-nil, zero value otherwise. ### GetInputOk -`func (o *ToolsHashRequest) GetInputOk() (*string, bool)` +`func (o *GenerateHashRequest) GetInputOk() (*string, bool)` GetInputOk returns a tuple with the Input field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInput -`func (o *ToolsHashRequest) SetInput(v string)` +`func (o *GenerateHashRequest) SetInput(v string)` SetInput sets Input field to given value. ### HasInput -`func (o *ToolsHashRequest) HasInput() bool` +`func (o *GenerateHashRequest) HasInput() bool` HasInput returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasInput returns a boolean if a field has been set. ### GetUrlalgorithm -`func (o *ToolsHashRequest) GetUrlalgorithm() string` +`func (o *GenerateHashRequest) GetUrlalgorithm() string` GetUrlalgorithm returns the Urlalgorithm field if non-nil, zero value otherwise. ### GetUrlalgorithmOk -`func (o *ToolsHashRequest) GetUrlalgorithmOk() (*string, bool)` +`func (o *GenerateHashRequest) GetUrlalgorithmOk() (*string, bool)` GetUrlalgorithmOk returns a tuple with the Urlalgorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlalgorithm -`func (o *ToolsHashRequest) SetUrlalgorithm(v string)` +`func (o *GenerateHashRequest) SetUrlalgorithm(v string)` SetUrlalgorithm sets Urlalgorithm field to given value. ### HasUrlalgorithm -`func (o *ToolsHashRequest) HasUrlalgorithm() bool` +`func (o *GenerateHashRequest) HasUrlalgorithm() bool` HasUrlalgorithm returns a boolean if a field has been set. diff --git a/docs/GenerateHashResponse.md b/docs/GenerateHashResponse.md new file mode 100644 index 00000000..8ccf5e41 --- /dev/null +++ b/docs/GenerateHashResponse.md @@ -0,0 +1,69 @@ +# GenerateHashResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Sum** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewGenerateHashResponse + +`func NewGenerateHashResponse() *GenerateHashResponse` + +NewGenerateHashResponse instantiates a new GenerateHashResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewGenerateHashResponseWithDefaults + +`func NewGenerateHashResponseWithDefaults() *GenerateHashResponse` + +NewGenerateHashResponseWithDefaults instantiates a new GenerateHashResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetSum + +`func (o *GenerateHashResponse) GetSum() string` + +GetSum returns the Sum field if non-nil, zero value otherwise. + +### GetSumOk + +`func (o *GenerateHashResponse) GetSumOk() (*string, bool)` + +GetSumOk returns a tuple with the Sum field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSum + +`func (o *GenerateHashResponse) SetSum(v string)` + +SetSum sets Sum field to given value. + + +### HasSum + +`func (o *GenerateHashResponse) HasSum() bool` + +HasSum returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/ToolsHashWithRequest.md b/docs/GenerateHashWithAlgorithmRequest.md similarity index 63% rename from docs/ToolsHashWithRequest.md rename to docs/GenerateHashWithAlgorithmRequest.md index 564319e5..59e9542f 100644 --- a/docs/ToolsHashWithRequest.md +++ b/docs/GenerateHashWithAlgorithmRequest.md @@ -1,4 +1,4 @@ -# ToolsHashWithRequest +# GenerateHashWithAlgorithmRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewToolsHashWithRequest +### NewGenerateHashWithAlgorithmRequest -`func NewToolsHashWithRequest() *ToolsHashWithRequest` +`func NewGenerateHashWithAlgorithmRequest() *GenerateHashWithAlgorithmRequest` -NewToolsHashWithRequest instantiates a new ToolsHashWithRequest object +NewGenerateHashWithAlgorithmRequest instantiates a new GenerateHashWithAlgorithmRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewToolsHashWithRequestWithDefaults +### NewGenerateHashWithAlgorithmRequestWithDefaults -`func NewToolsHashWithRequestWithDefaults() *ToolsHashWithRequest` +`func NewGenerateHashWithAlgorithmRequestWithDefaults() *GenerateHashWithAlgorithmRequest` -NewToolsHashWithRequestWithDefaults instantiates a new ToolsHashWithRequest object +NewGenerateHashWithAlgorithmRequestWithDefaults instantiates a new GenerateHashWithAlgorithmRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAlgorithm -`func (o *ToolsHashWithRequest) GetAlgorithm() string` +`func (o *GenerateHashWithAlgorithmRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *ToolsHashWithRequest) GetAlgorithmOk() (*string, bool)` +`func (o *GenerateHashWithAlgorithmRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *ToolsHashWithRequest) SetAlgorithm(v string)` +`func (o *GenerateHashWithAlgorithmRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *ToolsHashWithRequest) HasAlgorithm() bool` +`func (o *GenerateHashWithAlgorithmRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAlgorithm returns a boolean if a field has been set. ### GetFormat -`func (o *ToolsHashWithRequest) GetFormat() string` +`func (o *GenerateHashWithAlgorithmRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *ToolsHashWithRequest) GetFormatOk() (*string, bool)` +`func (o *GenerateHashWithAlgorithmRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *ToolsHashWithRequest) SetFormat(v string)` +`func (o *GenerateHashWithAlgorithmRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *ToolsHashWithRequest) HasFormat() bool` +`func (o *GenerateHashWithAlgorithmRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasFormat returns a boolean if a field has been set. ### GetInput -`func (o *ToolsHashWithRequest) GetInput() string` +`func (o *GenerateHashWithAlgorithmRequest) GetInput() string` GetInput returns the Input field if non-nil, zero value otherwise. ### GetInputOk -`func (o *ToolsHashWithRequest) GetInputOk() (*string, bool)` +`func (o *GenerateHashWithAlgorithmRequest) GetInputOk() (*string, bool)` GetInputOk returns a tuple with the Input field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInput -`func (o *ToolsHashWithRequest) SetInput(v string)` +`func (o *GenerateHashWithAlgorithmRequest) SetInput(v string)` SetInput sets Input field to given value. ### HasInput -`func (o *ToolsHashWithRequest) HasInput() bool` +`func (o *GenerateHashWithAlgorithmRequest) HasInput() bool` HasInput returns a boolean if a field has been set. diff --git a/docs/GenerateHashWithAlgorithmResponse.md b/docs/GenerateHashWithAlgorithmResponse.md new file mode 100644 index 00000000..953075fe --- /dev/null +++ b/docs/GenerateHashWithAlgorithmResponse.md @@ -0,0 +1,69 @@ +# GenerateHashWithAlgorithmResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Sum** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewGenerateHashWithAlgorithmResponse + +`func NewGenerateHashWithAlgorithmResponse() *GenerateHashWithAlgorithmResponse` + +NewGenerateHashWithAlgorithmResponse instantiates a new GenerateHashWithAlgorithmResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewGenerateHashWithAlgorithmResponseWithDefaults + +`func NewGenerateHashWithAlgorithmResponseWithDefaults() *GenerateHashWithAlgorithmResponse` + +NewGenerateHashWithAlgorithmResponseWithDefaults instantiates a new GenerateHashWithAlgorithmResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetSum + +`func (o *GenerateHashWithAlgorithmResponse) GetSum() string` + +GetSum returns the Sum field if non-nil, zero value otherwise. + +### GetSumOk + +`func (o *GenerateHashWithAlgorithmResponse) GetSumOk() (*string, bool)` + +GetSumOk returns a tuple with the Sum field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSum + +`func (o *GenerateHashWithAlgorithmResponse) SetSum(v string)` + +SetSum sets Sum field to given value. + + +### HasSum + +`func (o *GenerateHashWithAlgorithmResponse) HasSum() bool` + +HasSum returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/ToolsGenerateRandomRequest.md b/docs/GenerateRandomRequest.md similarity index 66% rename from docs/ToolsGenerateRandomRequest.md rename to docs/GenerateRandomRequest.md index ea8d9ff1..ff0752ce 100644 --- a/docs/ToolsGenerateRandomRequest.md +++ b/docs/GenerateRandomRequest.md @@ -1,4 +1,4 @@ -# ToolsGenerateRandomRequest +# GenerateRandomRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewToolsGenerateRandomRequest +### NewGenerateRandomRequest -`func NewToolsGenerateRandomRequest() *ToolsGenerateRandomRequest` +`func NewGenerateRandomRequest() *GenerateRandomRequest` -NewToolsGenerateRandomRequest instantiates a new ToolsGenerateRandomRequest object +NewGenerateRandomRequest instantiates a new GenerateRandomRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewToolsGenerateRandomRequestWithDefaults +### NewGenerateRandomRequestWithDefaults -`func NewToolsGenerateRandomRequestWithDefaults() *ToolsGenerateRandomRequest` +`func NewGenerateRandomRequestWithDefaults() *GenerateRandomRequest` -NewToolsGenerateRandomRequestWithDefaults instantiates a new ToolsGenerateRandomRequest object +NewGenerateRandomRequestWithDefaults instantiates a new GenerateRandomRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBytes -`func (o *ToolsGenerateRandomRequest) GetBytes() int32` +`func (o *GenerateRandomRequest) GetBytes() int32` GetBytes returns the Bytes field if non-nil, zero value otherwise. ### GetBytesOk -`func (o *ToolsGenerateRandomRequest) GetBytesOk() (*int32, bool)` +`func (o *GenerateRandomRequest) GetBytesOk() (*int32, bool)` GetBytesOk returns a tuple with the Bytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBytes -`func (o *ToolsGenerateRandomRequest) SetBytes(v int32)` +`func (o *GenerateRandomRequest) SetBytes(v int32)` SetBytes sets Bytes field to given value. ### HasBytes -`func (o *ToolsGenerateRandomRequest) HasBytes() bool` +`func (o *GenerateRandomRequest) HasBytes() bool` HasBytes returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasBytes returns a boolean if a field has been set. ### GetFormat -`func (o *ToolsGenerateRandomRequest) GetFormat() string` +`func (o *GenerateRandomRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *ToolsGenerateRandomRequest) GetFormatOk() (*string, bool)` +`func (o *GenerateRandomRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *ToolsGenerateRandomRequest) SetFormat(v string)` +`func (o *GenerateRandomRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *ToolsGenerateRandomRequest) HasFormat() bool` +`func (o *GenerateRandomRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasFormat returns a boolean if a field has been set. ### GetSource -`func (o *ToolsGenerateRandomRequest) GetSource() string` +`func (o *GenerateRandomRequest) GetSource() string` GetSource returns the Source field if non-nil, zero value otherwise. ### GetSourceOk -`func (o *ToolsGenerateRandomRequest) GetSourceOk() (*string, bool)` +`func (o *GenerateRandomRequest) GetSourceOk() (*string, bool)` GetSourceOk returns a tuple with the Source field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSource -`func (o *ToolsGenerateRandomRequest) SetSource(v string)` +`func (o *GenerateRandomRequest) SetSource(v string)` SetSource sets Source field to given value. ### HasSource -`func (o *ToolsGenerateRandomRequest) HasSource() bool` +`func (o *GenerateRandomRequest) HasSource() bool` HasSource returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasSource returns a boolean if a field has been set. ### GetUrlbytes -`func (o *ToolsGenerateRandomRequest) GetUrlbytes() string` +`func (o *GenerateRandomRequest) GetUrlbytes() string` GetUrlbytes returns the Urlbytes field if non-nil, zero value otherwise. ### GetUrlbytesOk -`func (o *ToolsGenerateRandomRequest) GetUrlbytesOk() (*string, bool)` +`func (o *GenerateRandomRequest) GetUrlbytesOk() (*string, bool)` GetUrlbytesOk returns a tuple with the Urlbytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlbytes -`func (o *ToolsGenerateRandomRequest) SetUrlbytes(v string)` +`func (o *GenerateRandomRequest) SetUrlbytes(v string)` SetUrlbytes sets Urlbytes field to given value. ### HasUrlbytes -`func (o *ToolsGenerateRandomRequest) HasUrlbytes() bool` +`func (o *GenerateRandomRequest) HasUrlbytes() bool` HasUrlbytes returns a boolean if a field has been set. diff --git a/docs/GenerateRandomResponse.md b/docs/GenerateRandomResponse.md new file mode 100644 index 00000000..a3f3a1ed --- /dev/null +++ b/docs/GenerateRandomResponse.md @@ -0,0 +1,69 @@ +# GenerateRandomResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**RandomBytes** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewGenerateRandomResponse + +`func NewGenerateRandomResponse() *GenerateRandomResponse` + +NewGenerateRandomResponse instantiates a new GenerateRandomResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewGenerateRandomResponseWithDefaults + +`func NewGenerateRandomResponseWithDefaults() *GenerateRandomResponse` + +NewGenerateRandomResponseWithDefaults instantiates a new GenerateRandomResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetRandomBytes + +`func (o *GenerateRandomResponse) GetRandomBytes() string` + +GetRandomBytes returns the RandomBytes field if non-nil, zero value otherwise. + +### GetRandomBytesOk + +`func (o *GenerateRandomResponse) GetRandomBytesOk() (*string, bool)` + +GetRandomBytesOk returns a tuple with the RandomBytes field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRandomBytes + +`func (o *GenerateRandomResponse) SetRandomBytes(v string)` + +SetRandomBytes sets RandomBytes field to given value. + + +### HasRandomBytes + +`func (o *GenerateRandomResponse) HasRandomBytes() bool` + +HasRandomBytes returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SysWriteToolsRandomUrlbytesRequest.md b/docs/GenerateRandomWithBytesRequest.md similarity index 65% rename from docs/SysWriteToolsRandomUrlbytesRequest.md rename to docs/GenerateRandomWithBytesRequest.md index 88b44760..b7b6ad1c 100644 --- a/docs/SysWriteToolsRandomUrlbytesRequest.md +++ b/docs/GenerateRandomWithBytesRequest.md @@ -1,4 +1,4 @@ -# SysWriteToolsRandomUrlbytesRequest +# GenerateRandomWithBytesRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewSysWriteToolsRandomUrlbytesRequest +### NewGenerateRandomWithBytesRequest -`func NewSysWriteToolsRandomUrlbytesRequest() *SysWriteToolsRandomUrlbytesRequest` +`func NewGenerateRandomWithBytesRequest() *GenerateRandomWithBytesRequest` -NewSysWriteToolsRandomUrlbytesRequest instantiates a new SysWriteToolsRandomUrlbytesRequest object +NewGenerateRandomWithBytesRequest instantiates a new GenerateRandomWithBytesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSysWriteToolsRandomUrlbytesRequestWithDefaults +### NewGenerateRandomWithBytesRequestWithDefaults -`func NewSysWriteToolsRandomUrlbytesRequestWithDefaults() *SysWriteToolsRandomUrlbytesRequest` +`func NewGenerateRandomWithBytesRequestWithDefaults() *GenerateRandomWithBytesRequest` -NewSysWriteToolsRandomUrlbytesRequestWithDefaults instantiates a new SysWriteToolsRandomUrlbytesRequest object +NewGenerateRandomWithBytesRequestWithDefaults instantiates a new GenerateRandomWithBytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBytes -`func (o *SysWriteToolsRandomUrlbytesRequest) GetBytes() int32` +`func (o *GenerateRandomWithBytesRequest) GetBytes() int32` GetBytes returns the Bytes field if non-nil, zero value otherwise. ### GetBytesOk -`func (o *SysWriteToolsRandomUrlbytesRequest) GetBytesOk() (*int32, bool)` +`func (o *GenerateRandomWithBytesRequest) GetBytesOk() (*int32, bool)` GetBytesOk returns a tuple with the Bytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBytes -`func (o *SysWriteToolsRandomUrlbytesRequest) SetBytes(v int32)` +`func (o *GenerateRandomWithBytesRequest) SetBytes(v int32)` SetBytes sets Bytes field to given value. ### HasBytes -`func (o *SysWriteToolsRandomUrlbytesRequest) HasBytes() bool` +`func (o *GenerateRandomWithBytesRequest) HasBytes() bool` HasBytes returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasBytes returns a boolean if a field has been set. ### GetFormat -`func (o *SysWriteToolsRandomUrlbytesRequest) GetFormat() string` +`func (o *GenerateRandomWithBytesRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *SysWriteToolsRandomUrlbytesRequest) GetFormatOk() (*string, bool)` +`func (o *GenerateRandomWithBytesRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *SysWriteToolsRandomUrlbytesRequest) SetFormat(v string)` +`func (o *GenerateRandomWithBytesRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *SysWriteToolsRandomUrlbytesRequest) HasFormat() bool` +`func (o *GenerateRandomWithBytesRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasFormat returns a boolean if a field has been set. ### GetSource -`func (o *SysWriteToolsRandomUrlbytesRequest) GetSource() string` +`func (o *GenerateRandomWithBytesRequest) GetSource() string` GetSource returns the Source field if non-nil, zero value otherwise. ### GetSourceOk -`func (o *SysWriteToolsRandomUrlbytesRequest) GetSourceOk() (*string, bool)` +`func (o *GenerateRandomWithBytesRequest) GetSourceOk() (*string, bool)` GetSourceOk returns a tuple with the Source field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSource -`func (o *SysWriteToolsRandomUrlbytesRequest) SetSource(v string)` +`func (o *GenerateRandomWithBytesRequest) SetSource(v string)` SetSource sets Source field to given value. ### HasSource -`func (o *SysWriteToolsRandomUrlbytesRequest) HasSource() bool` +`func (o *GenerateRandomWithBytesRequest) HasSource() bool` HasSource returns a boolean if a field has been set. diff --git a/docs/GenerateRandomWithBytesResponse.md b/docs/GenerateRandomWithBytesResponse.md new file mode 100644 index 00000000..97fc9102 --- /dev/null +++ b/docs/GenerateRandomWithBytesResponse.md @@ -0,0 +1,69 @@ +# GenerateRandomWithBytesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**RandomBytes** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewGenerateRandomWithBytesResponse + +`func NewGenerateRandomWithBytesResponse() *GenerateRandomWithBytesResponse` + +NewGenerateRandomWithBytesResponse instantiates a new GenerateRandomWithBytesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewGenerateRandomWithBytesResponseWithDefaults + +`func NewGenerateRandomWithBytesResponseWithDefaults() *GenerateRandomWithBytesResponse` + +NewGenerateRandomWithBytesResponseWithDefaults instantiates a new GenerateRandomWithBytesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetRandomBytes + +`func (o *GenerateRandomWithBytesResponse) GetRandomBytes() string` + +GetRandomBytes returns the RandomBytes field if non-nil, zero value otherwise. + +### GetRandomBytesOk + +`func (o *GenerateRandomWithBytesResponse) GetRandomBytesOk() (*string, bool)` + +GetRandomBytesOk returns a tuple with the RandomBytes field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRandomBytes + +`func (o *GenerateRandomWithBytesResponse) SetRandomBytes(v string)` + +SetRandomBytes sets RandomBytes field to given value. + + +### HasRandomBytes + +`func (o *GenerateRandomWithBytesResponse) HasRandomBytes() bool` + +HasRandomBytes returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/TransitGenerateRandomSourceBytesRequest.md b/docs/GenerateRandomWithSourceAndBytesRequest.md similarity index 62% rename from docs/TransitGenerateRandomSourceBytesRequest.md rename to docs/GenerateRandomWithSourceAndBytesRequest.md index cd15110d..8759479c 100644 --- a/docs/TransitGenerateRandomSourceBytesRequest.md +++ b/docs/GenerateRandomWithSourceAndBytesRequest.md @@ -1,4 +1,4 @@ -# TransitGenerateRandomSourceBytesRequest +# GenerateRandomWithSourceAndBytesRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewTransitGenerateRandomSourceBytesRequest +### NewGenerateRandomWithSourceAndBytesRequest -`func NewTransitGenerateRandomSourceBytesRequest() *TransitGenerateRandomSourceBytesRequest` +`func NewGenerateRandomWithSourceAndBytesRequest() *GenerateRandomWithSourceAndBytesRequest` -NewTransitGenerateRandomSourceBytesRequest instantiates a new TransitGenerateRandomSourceBytesRequest object +NewGenerateRandomWithSourceAndBytesRequest instantiates a new GenerateRandomWithSourceAndBytesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitGenerateRandomSourceBytesRequestWithDefaults +### NewGenerateRandomWithSourceAndBytesRequestWithDefaults -`func NewTransitGenerateRandomSourceBytesRequestWithDefaults() *TransitGenerateRandomSourceBytesRequest` +`func NewGenerateRandomWithSourceAndBytesRequestWithDefaults() *GenerateRandomWithSourceAndBytesRequest` -NewTransitGenerateRandomSourceBytesRequestWithDefaults instantiates a new TransitGenerateRandomSourceBytesRequest object +NewGenerateRandomWithSourceAndBytesRequestWithDefaults instantiates a new GenerateRandomWithSourceAndBytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBytes -`func (o *TransitGenerateRandomSourceBytesRequest) GetBytes() int32` +`func (o *GenerateRandomWithSourceAndBytesRequest) GetBytes() int32` GetBytes returns the Bytes field if non-nil, zero value otherwise. ### GetBytesOk -`func (o *TransitGenerateRandomSourceBytesRequest) GetBytesOk() (*int32, bool)` +`func (o *GenerateRandomWithSourceAndBytesRequest) GetBytesOk() (*int32, bool)` GetBytesOk returns a tuple with the Bytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBytes -`func (o *TransitGenerateRandomSourceBytesRequest) SetBytes(v int32)` +`func (o *GenerateRandomWithSourceAndBytesRequest) SetBytes(v int32)` SetBytes sets Bytes field to given value. ### HasBytes -`func (o *TransitGenerateRandomSourceBytesRequest) HasBytes() bool` +`func (o *GenerateRandomWithSourceAndBytesRequest) HasBytes() bool` HasBytes returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasBytes returns a boolean if a field has been set. ### GetFormat -`func (o *TransitGenerateRandomSourceBytesRequest) GetFormat() string` +`func (o *GenerateRandomWithSourceAndBytesRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *TransitGenerateRandomSourceBytesRequest) GetFormatOk() (*string, bool)` +`func (o *GenerateRandomWithSourceAndBytesRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *TransitGenerateRandomSourceBytesRequest) SetFormat(v string)` +`func (o *GenerateRandomWithSourceAndBytesRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *TransitGenerateRandomSourceBytesRequest) HasFormat() bool` +`func (o *GenerateRandomWithSourceAndBytesRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. diff --git a/docs/GenerateRandomWithSourceAndBytesResponse.md b/docs/GenerateRandomWithSourceAndBytesResponse.md new file mode 100644 index 00000000..db419f9a --- /dev/null +++ b/docs/GenerateRandomWithSourceAndBytesResponse.md @@ -0,0 +1,69 @@ +# GenerateRandomWithSourceAndBytesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**RandomBytes** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewGenerateRandomWithSourceAndBytesResponse + +`func NewGenerateRandomWithSourceAndBytesResponse() *GenerateRandomWithSourceAndBytesResponse` + +NewGenerateRandomWithSourceAndBytesResponse instantiates a new GenerateRandomWithSourceAndBytesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewGenerateRandomWithSourceAndBytesResponseWithDefaults + +`func NewGenerateRandomWithSourceAndBytesResponseWithDefaults() *GenerateRandomWithSourceAndBytesResponse` + +NewGenerateRandomWithSourceAndBytesResponseWithDefaults instantiates a new GenerateRandomWithSourceAndBytesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetRandomBytes + +`func (o *GenerateRandomWithSourceAndBytesResponse) GetRandomBytes() string` + +GetRandomBytes returns the RandomBytes field if non-nil, zero value otherwise. + +### GetRandomBytesOk + +`func (o *GenerateRandomWithSourceAndBytesResponse) GetRandomBytesOk() (*string, bool)` + +GetRandomBytesOk returns a tuple with the RandomBytes field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRandomBytes + +`func (o *GenerateRandomWithSourceAndBytesResponse) SetRandomBytes(v string)` + +SetRandomBytes sets RandomBytes field to given value. + + +### HasRandomBytes + +`func (o *GenerateRandomWithSourceAndBytesResponse) HasRandomBytes() bool` + +HasRandomBytes returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/ToolsGenerateRandomSourceRequest.md b/docs/GenerateRandomWithSourceRequest.md similarity index 63% rename from docs/ToolsGenerateRandomSourceRequest.md rename to docs/GenerateRandomWithSourceRequest.md index 7f247708..8ba4fb9a 100644 --- a/docs/ToolsGenerateRandomSourceRequest.md +++ b/docs/GenerateRandomWithSourceRequest.md @@ -1,4 +1,4 @@ -# ToolsGenerateRandomSourceRequest +# GenerateRandomWithSourceRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewToolsGenerateRandomSourceRequest +### NewGenerateRandomWithSourceRequest -`func NewToolsGenerateRandomSourceRequest() *ToolsGenerateRandomSourceRequest` +`func NewGenerateRandomWithSourceRequest() *GenerateRandomWithSourceRequest` -NewToolsGenerateRandomSourceRequest instantiates a new ToolsGenerateRandomSourceRequest object +NewGenerateRandomWithSourceRequest instantiates a new GenerateRandomWithSourceRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewToolsGenerateRandomSourceRequestWithDefaults +### NewGenerateRandomWithSourceRequestWithDefaults -`func NewToolsGenerateRandomSourceRequestWithDefaults() *ToolsGenerateRandomSourceRequest` +`func NewGenerateRandomWithSourceRequestWithDefaults() *GenerateRandomWithSourceRequest` -NewToolsGenerateRandomSourceRequestWithDefaults instantiates a new ToolsGenerateRandomSourceRequest object +NewGenerateRandomWithSourceRequestWithDefaults instantiates a new GenerateRandomWithSourceRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBytes -`func (o *ToolsGenerateRandomSourceRequest) GetBytes() int32` +`func (o *GenerateRandomWithSourceRequest) GetBytes() int32` GetBytes returns the Bytes field if non-nil, zero value otherwise. ### GetBytesOk -`func (o *ToolsGenerateRandomSourceRequest) GetBytesOk() (*int32, bool)` +`func (o *GenerateRandomWithSourceRequest) GetBytesOk() (*int32, bool)` GetBytesOk returns a tuple with the Bytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBytes -`func (o *ToolsGenerateRandomSourceRequest) SetBytes(v int32)` +`func (o *GenerateRandomWithSourceRequest) SetBytes(v int32)` SetBytes sets Bytes field to given value. ### HasBytes -`func (o *ToolsGenerateRandomSourceRequest) HasBytes() bool` +`func (o *GenerateRandomWithSourceRequest) HasBytes() bool` HasBytes returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasBytes returns a boolean if a field has been set. ### GetFormat -`func (o *ToolsGenerateRandomSourceRequest) GetFormat() string` +`func (o *GenerateRandomWithSourceRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *ToolsGenerateRandomSourceRequest) GetFormatOk() (*string, bool)` +`func (o *GenerateRandomWithSourceRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *ToolsGenerateRandomSourceRequest) SetFormat(v string)` +`func (o *GenerateRandomWithSourceRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *ToolsGenerateRandomSourceRequest) HasFormat() bool` +`func (o *GenerateRandomWithSourceRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasFormat returns a boolean if a field has been set. ### GetUrlbytes -`func (o *ToolsGenerateRandomSourceRequest) GetUrlbytes() string` +`func (o *GenerateRandomWithSourceRequest) GetUrlbytes() string` GetUrlbytes returns the Urlbytes field if non-nil, zero value otherwise. ### GetUrlbytesOk -`func (o *ToolsGenerateRandomSourceRequest) GetUrlbytesOk() (*string, bool)` +`func (o *GenerateRandomWithSourceRequest) GetUrlbytesOk() (*string, bool)` GetUrlbytesOk returns a tuple with the Urlbytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlbytes -`func (o *ToolsGenerateRandomSourceRequest) SetUrlbytes(v string)` +`func (o *GenerateRandomWithSourceRequest) SetUrlbytes(v string)` SetUrlbytes sets Urlbytes field to given value. ### HasUrlbytes -`func (o *ToolsGenerateRandomSourceRequest) HasUrlbytes() bool` +`func (o *GenerateRandomWithSourceRequest) HasUrlbytes() bool` HasUrlbytes returns a boolean if a field has been set. diff --git a/docs/GenerateRandomWithSourceResponse.md b/docs/GenerateRandomWithSourceResponse.md new file mode 100644 index 00000000..c6c6d652 --- /dev/null +++ b/docs/GenerateRandomWithSourceResponse.md @@ -0,0 +1,69 @@ +# GenerateRandomWithSourceResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**RandomBytes** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewGenerateRandomWithSourceResponse + +`func NewGenerateRandomWithSourceResponse() *GenerateRandomWithSourceResponse` + +NewGenerateRandomWithSourceResponse instantiates a new GenerateRandomWithSourceResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewGenerateRandomWithSourceResponseWithDefaults + +`func NewGenerateRandomWithSourceResponseWithDefaults() *GenerateRandomWithSourceResponse` + +NewGenerateRandomWithSourceResponseWithDefaults instantiates a new GenerateRandomWithSourceResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetRandomBytes + +`func (o *GenerateRandomWithSourceResponse) GetRandomBytes() string` + +GetRandomBytes returns the RandomBytes field if non-nil, zero value otherwise. + +### GetRandomBytesOk + +`func (o *GenerateRandomWithSourceResponse) GetRandomBytesOk() (*string, bool)` + +GetRandomBytesOk returns a tuple with the RandomBytes field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRandomBytes + +`func (o *GenerateRandomWithSourceResponse) SetRandomBytes(v string)` + +SetRandomBytes sets RandomBytes field to given value. + + +### HasRandomBytes + +`func (o *GenerateRandomWithSourceResponse) HasRandomBytes() bool` + +HasRandomBytes returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/GitHubWriteConfigRequest.md b/docs/GithubConfigureRequest.md similarity index 70% rename from docs/GitHubWriteConfigRequest.md rename to docs/GithubConfigureRequest.md index bd326fa9..8c164a45 100644 --- a/docs/GitHubWriteConfigRequest.md +++ b/docs/GithubConfigureRequest.md @@ -1,4 +1,4 @@ -# GitHubWriteConfigRequest +# GithubConfigureRequest ## Properties @@ -25,47 +25,47 @@ Name | Type | Description | Notes ## Methods -### NewGitHubWriteConfigRequest +### NewGithubConfigureRequest -`func NewGitHubWriteConfigRequest(organization string, ) *GitHubWriteConfigRequest` +`func NewGithubConfigureRequest(organization string, ) *GithubConfigureRequest` -NewGitHubWriteConfigRequest instantiates a new GitHubWriteConfigRequest object +NewGithubConfigureRequest instantiates a new GithubConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGitHubWriteConfigRequestWithDefaults +### NewGithubConfigureRequestWithDefaults -`func NewGitHubWriteConfigRequestWithDefaults() *GitHubWriteConfigRequest` +`func NewGithubConfigureRequestWithDefaults() *GithubConfigureRequest` -NewGitHubWriteConfigRequestWithDefaults instantiates a new GitHubWriteConfigRequest object +NewGithubConfigureRequestWithDefaults instantiates a new GithubConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBaseUrl -`func (o *GitHubWriteConfigRequest) GetBaseUrl() string` +`func (o *GithubConfigureRequest) GetBaseUrl() string` GetBaseUrl returns the BaseUrl field if non-nil, zero value otherwise. ### GetBaseUrlOk -`func (o *GitHubWriteConfigRequest) GetBaseUrlOk() (*string, bool)` +`func (o *GithubConfigureRequest) GetBaseUrlOk() (*string, bool)` GetBaseUrlOk returns a tuple with the BaseUrl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBaseUrl -`func (o *GitHubWriteConfigRequest) SetBaseUrl(v string)` +`func (o *GithubConfigureRequest) SetBaseUrl(v string)` SetBaseUrl sets BaseUrl field to given value. ### HasBaseUrl -`func (o *GitHubWriteConfigRequest) HasBaseUrl() bool` +`func (o *GithubConfigureRequest) HasBaseUrl() bool` HasBaseUrl returns a boolean if a field has been set. @@ -74,27 +74,27 @@ HasBaseUrl returns a boolean if a field has been set. ### GetMaxTtl -`func (o *GitHubWriteConfigRequest) GetMaxTtl() int32` +`func (o *GithubConfigureRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *GitHubWriteConfigRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *GithubConfigureRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *GitHubWriteConfigRequest) SetMaxTtl(v int32)` +`func (o *GithubConfigureRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *GitHubWriteConfigRequest) HasMaxTtl() bool` +`func (o *GithubConfigureRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -103,20 +103,20 @@ HasMaxTtl returns a boolean if a field has been set. ### GetOrganization -`func (o *GitHubWriteConfigRequest) GetOrganization() string` +`func (o *GithubConfigureRequest) GetOrganization() string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *GitHubWriteConfigRequest) GetOrganizationOk() (*string, bool)` +`func (o *GithubConfigureRequest) GetOrganizationOk() (*string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *GitHubWriteConfigRequest) SetOrganization(v string)` +`func (o *GithubConfigureRequest) SetOrganization(v string)` SetOrganization sets Organization field to given value. @@ -126,27 +126,27 @@ SetOrganization sets Organization field to given value. ### GetOrganizationId -`func (o *GitHubWriteConfigRequest) GetOrganizationId() int64` +`func (o *GithubConfigureRequest) GetOrganizationId() int64` GetOrganizationId returns the OrganizationId field if non-nil, zero value otherwise. ### GetOrganizationIdOk -`func (o *GitHubWriteConfigRequest) GetOrganizationIdOk() (*int64, bool)` +`func (o *GithubConfigureRequest) GetOrganizationIdOk() (*int64, bool)` GetOrganizationIdOk returns a tuple with the OrganizationId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganizationId -`func (o *GitHubWriteConfigRequest) SetOrganizationId(v int64)` +`func (o *GithubConfigureRequest) SetOrganizationId(v int64)` SetOrganizationId sets OrganizationId field to given value. ### HasOrganizationId -`func (o *GitHubWriteConfigRequest) HasOrganizationId() bool` +`func (o *GithubConfigureRequest) HasOrganizationId() bool` HasOrganizationId returns a boolean if a field has been set. @@ -155,27 +155,27 @@ HasOrganizationId returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *GitHubWriteConfigRequest) GetTokenBoundCidrs() []string` +`func (o *GithubConfigureRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *GitHubWriteConfigRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *GithubConfigureRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *GitHubWriteConfigRequest) SetTokenBoundCidrs(v []string)` +`func (o *GithubConfigureRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *GitHubWriteConfigRequest) HasTokenBoundCidrs() bool` +`func (o *GithubConfigureRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -184,27 +184,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *GitHubWriteConfigRequest) GetTokenExplicitMaxTtl() int32` +`func (o *GithubConfigureRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *GitHubWriteConfigRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *GithubConfigureRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *GitHubWriteConfigRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *GithubConfigureRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *GitHubWriteConfigRequest) HasTokenExplicitMaxTtl() bool` +`func (o *GithubConfigureRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -213,27 +213,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *GitHubWriteConfigRequest) GetTokenMaxTtl() int32` +`func (o *GithubConfigureRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *GitHubWriteConfigRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *GithubConfigureRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *GitHubWriteConfigRequest) SetTokenMaxTtl(v int32)` +`func (o *GithubConfigureRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *GitHubWriteConfigRequest) HasTokenMaxTtl() bool` +`func (o *GithubConfigureRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -242,27 +242,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *GitHubWriteConfigRequest) GetTokenNoDefaultPolicy() bool` +`func (o *GithubConfigureRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *GitHubWriteConfigRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *GithubConfigureRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *GitHubWriteConfigRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *GithubConfigureRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *GitHubWriteConfigRequest) HasTokenNoDefaultPolicy() bool` +`func (o *GithubConfigureRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -271,27 +271,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *GitHubWriteConfigRequest) GetTokenNumUses() int32` +`func (o *GithubConfigureRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *GitHubWriteConfigRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *GithubConfigureRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *GitHubWriteConfigRequest) SetTokenNumUses(v int32)` +`func (o *GithubConfigureRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *GitHubWriteConfigRequest) HasTokenNumUses() bool` +`func (o *GithubConfigureRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -300,27 +300,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *GitHubWriteConfigRequest) GetTokenPeriod() int32` +`func (o *GithubConfigureRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *GitHubWriteConfigRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *GithubConfigureRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *GitHubWriteConfigRequest) SetTokenPeriod(v int32)` +`func (o *GithubConfigureRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *GitHubWriteConfigRequest) HasTokenPeriod() bool` +`func (o *GithubConfigureRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -329,27 +329,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *GitHubWriteConfigRequest) GetTokenPolicies() []string` +`func (o *GithubConfigureRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *GitHubWriteConfigRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *GithubConfigureRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *GitHubWriteConfigRequest) SetTokenPolicies(v []string)` +`func (o *GithubConfigureRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *GitHubWriteConfigRequest) HasTokenPolicies() bool` +`func (o *GithubConfigureRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -358,27 +358,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *GitHubWriteConfigRequest) GetTokenTtl() int32` +`func (o *GithubConfigureRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *GitHubWriteConfigRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *GithubConfigureRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *GitHubWriteConfigRequest) SetTokenTtl(v int32)` +`func (o *GithubConfigureRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *GitHubWriteConfigRequest) HasTokenTtl() bool` +`func (o *GithubConfigureRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -387,27 +387,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *GitHubWriteConfigRequest) GetTokenType() string` +`func (o *GithubConfigureRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *GitHubWriteConfigRequest) GetTokenTypeOk() (*string, bool)` +`func (o *GithubConfigureRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *GitHubWriteConfigRequest) SetTokenType(v string)` +`func (o *GithubConfigureRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *GitHubWriteConfigRequest) HasTokenType() bool` +`func (o *GithubConfigureRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -416,27 +416,27 @@ HasTokenType returns a boolean if a field has been set. ### GetTtl -`func (o *GitHubWriteConfigRequest) GetTtl() int32` +`func (o *GithubConfigureRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *GitHubWriteConfigRequest) GetTtlOk() (*int32, bool)` +`func (o *GithubConfigureRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *GitHubWriteConfigRequest) SetTtl(v int32)` +`func (o *GithubConfigureRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *GitHubWriteConfigRequest) HasTtl() bool` +`func (o *GithubConfigureRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/GithubLoginRequest.md b/docs/GithubLoginRequest.md index 418b5f2f..282c6da7 100644 --- a/docs/GithubLoginRequest.md +++ b/docs/GithubLoginRequest.md @@ -1,4 +1,4 @@ -# GitHubLoginRequest +# GithubLoginRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewGitHubLoginRequest +### NewGithubLoginRequest -`func NewGitHubLoginRequest() *GitHubLoginRequest` +`func NewGithubLoginRequest() *GithubLoginRequest` -NewGitHubLoginRequest instantiates a new GitHubLoginRequest object +NewGithubLoginRequest instantiates a new GithubLoginRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGitHubLoginRequestWithDefaults +### NewGithubLoginRequestWithDefaults -`func NewGitHubLoginRequestWithDefaults() *GitHubLoginRequest` +`func NewGithubLoginRequestWithDefaults() *GithubLoginRequest` -NewGitHubLoginRequestWithDefaults instantiates a new GitHubLoginRequest object +NewGithubLoginRequestWithDefaults instantiates a new GithubLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetToken -`func (o *GitHubLoginRequest) GetToken() string` +`func (o *GithubLoginRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *GitHubLoginRequest) GetTokenOk() (*string, bool)` +`func (o *GithubLoginRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *GitHubLoginRequest) SetToken(v string)` +`func (o *GithubLoginRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *GitHubLoginRequest) HasToken() bool` +`func (o *GithubLoginRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/GitHubWriteMapTeamRequest.md b/docs/GithubWriteTeamMappingRequest.md similarity index 60% rename from docs/GitHubWriteMapTeamRequest.md rename to docs/GithubWriteTeamMappingRequest.md index 8eec3345..bb2970dd 100644 --- a/docs/GitHubWriteMapTeamRequest.md +++ b/docs/GithubWriteTeamMappingRequest.md @@ -1,4 +1,4 @@ -# GitHubWriteMapTeamRequest +# GithubWriteTeamMappingRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewGitHubWriteMapTeamRequest +### NewGithubWriteTeamMappingRequest -`func NewGitHubWriteMapTeamRequest() *GitHubWriteMapTeamRequest` +`func NewGithubWriteTeamMappingRequest() *GithubWriteTeamMappingRequest` -NewGitHubWriteMapTeamRequest instantiates a new GitHubWriteMapTeamRequest object +NewGithubWriteTeamMappingRequest instantiates a new GithubWriteTeamMappingRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGitHubWriteMapTeamRequestWithDefaults +### NewGithubWriteTeamMappingRequestWithDefaults -`func NewGitHubWriteMapTeamRequestWithDefaults() *GitHubWriteMapTeamRequest` +`func NewGithubWriteTeamMappingRequestWithDefaults() *GithubWriteTeamMappingRequest` -NewGitHubWriteMapTeamRequestWithDefaults instantiates a new GitHubWriteMapTeamRequest object +NewGithubWriteTeamMappingRequestWithDefaults instantiates a new GithubWriteTeamMappingRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetValue -`func (o *GitHubWriteMapTeamRequest) GetValue() string` +`func (o *GithubWriteTeamMappingRequest) GetValue() string` GetValue returns the Value field if non-nil, zero value otherwise. ### GetValueOk -`func (o *GitHubWriteMapTeamRequest) GetValueOk() (*string, bool)` +`func (o *GithubWriteTeamMappingRequest) GetValueOk() (*string, bool)` GetValueOk returns a tuple with the Value field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetValue -`func (o *GitHubWriteMapTeamRequest) SetValue(v string)` +`func (o *GithubWriteTeamMappingRequest) SetValue(v string)` SetValue sets Value field to given value. ### HasValue -`func (o *GitHubWriteMapTeamRequest) HasValue() bool` +`func (o *GithubWriteTeamMappingRequest) HasValue() bool` HasValue returns a boolean if a field has been set. diff --git a/docs/GitHubWriteMapUserRequest.md b/docs/GithubWriteUserMappingRequest.md similarity index 60% rename from docs/GitHubWriteMapUserRequest.md rename to docs/GithubWriteUserMappingRequest.md index c426212d..05520c70 100644 --- a/docs/GitHubWriteMapUserRequest.md +++ b/docs/GithubWriteUserMappingRequest.md @@ -1,4 +1,4 @@ -# GitHubWriteMapUserRequest +# GithubWriteUserMappingRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewGitHubWriteMapUserRequest +### NewGithubWriteUserMappingRequest -`func NewGitHubWriteMapUserRequest() *GitHubWriteMapUserRequest` +`func NewGithubWriteUserMappingRequest() *GithubWriteUserMappingRequest` -NewGitHubWriteMapUserRequest instantiates a new GitHubWriteMapUserRequest object +NewGithubWriteUserMappingRequest instantiates a new GithubWriteUserMappingRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGitHubWriteMapUserRequestWithDefaults +### NewGithubWriteUserMappingRequestWithDefaults -`func NewGitHubWriteMapUserRequestWithDefaults() *GitHubWriteMapUserRequest` +`func NewGithubWriteUserMappingRequestWithDefaults() *GithubWriteUserMappingRequest` -NewGitHubWriteMapUserRequestWithDefaults instantiates a new GitHubWriteMapUserRequest object +NewGithubWriteUserMappingRequestWithDefaults instantiates a new GithubWriteUserMappingRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetValue -`func (o *GitHubWriteMapUserRequest) GetValue() string` +`func (o *GithubWriteUserMappingRequest) GetValue() string` GetValue returns the Value field if non-nil, zero value otherwise. ### GetValueOk -`func (o *GitHubWriteMapUserRequest) GetValueOk() (*string, bool)` +`func (o *GithubWriteUserMappingRequest) GetValueOk() (*string, bool)` GetValueOk returns a tuple with the Value field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetValue -`func (o *GitHubWriteMapUserRequest) SetValue(v string)` +`func (o *GithubWriteUserMappingRequest) SetValue(v string)` SetValue sets Value field to given value. ### HasValue -`func (o *GitHubWriteMapUserRequest) HasValue() bool` +`func (o *GithubWriteUserMappingRequest) HasValue() bool` HasValue returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteAuthConfigRequest.md b/docs/GoogleCloudConfigureAuthRequest.md similarity index 68% rename from docs/GoogleCloudWriteAuthConfigRequest.md rename to docs/GoogleCloudConfigureAuthRequest.md index 8d4658c9..610e7f70 100644 --- a/docs/GoogleCloudWriteAuthConfigRequest.md +++ b/docs/GoogleCloudConfigureAuthRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudWriteAuthConfigRequest +# GoogleCloudConfigureAuthRequest ## Properties @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudWriteAuthConfigRequest +### NewGoogleCloudConfigureAuthRequest -`func NewGoogleCloudWriteAuthConfigRequest() *GoogleCloudWriteAuthConfigRequest` +`func NewGoogleCloudConfigureAuthRequest() *GoogleCloudConfigureAuthRequest` -NewGoogleCloudWriteAuthConfigRequest instantiates a new GoogleCloudWriteAuthConfigRequest object +NewGoogleCloudConfigureAuthRequest instantiates a new GoogleCloudConfigureAuthRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudWriteAuthConfigRequestWithDefaults +### NewGoogleCloudConfigureAuthRequestWithDefaults -`func NewGoogleCloudWriteAuthConfigRequestWithDefaults() *GoogleCloudWriteAuthConfigRequest` +`func NewGoogleCloudConfigureAuthRequestWithDefaults() *GoogleCloudConfigureAuthRequest` -NewGoogleCloudWriteAuthConfigRequestWithDefaults instantiates a new GoogleCloudWriteAuthConfigRequest object +NewGoogleCloudConfigureAuthRequestWithDefaults instantiates a new GoogleCloudConfigureAuthRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCredentials -`func (o *GoogleCloudWriteAuthConfigRequest) GetCredentials() string` +`func (o *GoogleCloudConfigureAuthRequest) GetCredentials() string` GetCredentials returns the Credentials field if non-nil, zero value otherwise. ### GetCredentialsOk -`func (o *GoogleCloudWriteAuthConfigRequest) GetCredentialsOk() (*string, bool)` +`func (o *GoogleCloudConfigureAuthRequest) GetCredentialsOk() (*string, bool)` GetCredentialsOk returns a tuple with the Credentials field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCredentials -`func (o *GoogleCloudWriteAuthConfigRequest) SetCredentials(v string)` +`func (o *GoogleCloudConfigureAuthRequest) SetCredentials(v string)` SetCredentials sets Credentials field to given value. ### HasCredentials -`func (o *GoogleCloudWriteAuthConfigRequest) HasCredentials() bool` +`func (o *GoogleCloudConfigureAuthRequest) HasCredentials() bool` HasCredentials returns a boolean if a field has been set. @@ -67,27 +67,27 @@ HasCredentials returns a boolean if a field has been set. ### GetCustomEndpoint -`func (o *GoogleCloudWriteAuthConfigRequest) GetCustomEndpoint() map[string]interface{}` +`func (o *GoogleCloudConfigureAuthRequest) GetCustomEndpoint() map[string]interface{}` GetCustomEndpoint returns the CustomEndpoint field if non-nil, zero value otherwise. ### GetCustomEndpointOk -`func (o *GoogleCloudWriteAuthConfigRequest) GetCustomEndpointOk() (*map[string]interface{}, bool)` +`func (o *GoogleCloudConfigureAuthRequest) GetCustomEndpointOk() (*map[string]interface{}, bool)` GetCustomEndpointOk returns a tuple with the CustomEndpoint field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCustomEndpoint -`func (o *GoogleCloudWriteAuthConfigRequest) SetCustomEndpoint(v map[string]interface{})` +`func (o *GoogleCloudConfigureAuthRequest) SetCustomEndpoint(v map[string]interface{})` SetCustomEndpoint sets CustomEndpoint field to given value. ### HasCustomEndpoint -`func (o *GoogleCloudWriteAuthConfigRequest) HasCustomEndpoint() bool` +`func (o *GoogleCloudConfigureAuthRequest) HasCustomEndpoint() bool` HasCustomEndpoint returns a boolean if a field has been set. @@ -96,27 +96,27 @@ HasCustomEndpoint returns a boolean if a field has been set. ### GetGceAlias -`func (o *GoogleCloudWriteAuthConfigRequest) GetGceAlias() string` +`func (o *GoogleCloudConfigureAuthRequest) GetGceAlias() string` GetGceAlias returns the GceAlias field if non-nil, zero value otherwise. ### GetGceAliasOk -`func (o *GoogleCloudWriteAuthConfigRequest) GetGceAliasOk() (*string, bool)` +`func (o *GoogleCloudConfigureAuthRequest) GetGceAliasOk() (*string, bool)` GetGceAliasOk returns a tuple with the GceAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGceAlias -`func (o *GoogleCloudWriteAuthConfigRequest) SetGceAlias(v string)` +`func (o *GoogleCloudConfigureAuthRequest) SetGceAlias(v string)` SetGceAlias sets GceAlias field to given value. ### HasGceAlias -`func (o *GoogleCloudWriteAuthConfigRequest) HasGceAlias() bool` +`func (o *GoogleCloudConfigureAuthRequest) HasGceAlias() bool` HasGceAlias returns a boolean if a field has been set. @@ -125,27 +125,27 @@ HasGceAlias returns a boolean if a field has been set. ### GetGceMetadata -`func (o *GoogleCloudWriteAuthConfigRequest) GetGceMetadata() []string` +`func (o *GoogleCloudConfigureAuthRequest) GetGceMetadata() []string` GetGceMetadata returns the GceMetadata field if non-nil, zero value otherwise. ### GetGceMetadataOk -`func (o *GoogleCloudWriteAuthConfigRequest) GetGceMetadataOk() (*[]string, bool)` +`func (o *GoogleCloudConfigureAuthRequest) GetGceMetadataOk() (*[]string, bool)` GetGceMetadataOk returns a tuple with the GceMetadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGceMetadata -`func (o *GoogleCloudWriteAuthConfigRequest) SetGceMetadata(v []string)` +`func (o *GoogleCloudConfigureAuthRequest) SetGceMetadata(v []string)` SetGceMetadata sets GceMetadata field to given value. ### HasGceMetadata -`func (o *GoogleCloudWriteAuthConfigRequest) HasGceMetadata() bool` +`func (o *GoogleCloudConfigureAuthRequest) HasGceMetadata() bool` HasGceMetadata returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasGceMetadata returns a boolean if a field has been set. ### GetGoogleCertsEndpoint -`func (o *GoogleCloudWriteAuthConfigRequest) GetGoogleCertsEndpoint() string` +`func (o *GoogleCloudConfigureAuthRequest) GetGoogleCertsEndpoint() string` GetGoogleCertsEndpoint returns the GoogleCertsEndpoint field if non-nil, zero value otherwise. ### GetGoogleCertsEndpointOk -`func (o *GoogleCloudWriteAuthConfigRequest) GetGoogleCertsEndpointOk() (*string, bool)` +`func (o *GoogleCloudConfigureAuthRequest) GetGoogleCertsEndpointOk() (*string, bool)` GetGoogleCertsEndpointOk returns a tuple with the GoogleCertsEndpoint field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGoogleCertsEndpoint -`func (o *GoogleCloudWriteAuthConfigRequest) SetGoogleCertsEndpoint(v string)` +`func (o *GoogleCloudConfigureAuthRequest) SetGoogleCertsEndpoint(v string)` SetGoogleCertsEndpoint sets GoogleCertsEndpoint field to given value. ### HasGoogleCertsEndpoint -`func (o *GoogleCloudWriteAuthConfigRequest) HasGoogleCertsEndpoint() bool` +`func (o *GoogleCloudConfigureAuthRequest) HasGoogleCertsEndpoint() bool` HasGoogleCertsEndpoint returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasGoogleCertsEndpoint returns a boolean if a field has been set. ### GetIamAlias -`func (o *GoogleCloudWriteAuthConfigRequest) GetIamAlias() string` +`func (o *GoogleCloudConfigureAuthRequest) GetIamAlias() string` GetIamAlias returns the IamAlias field if non-nil, zero value otherwise. ### GetIamAliasOk -`func (o *GoogleCloudWriteAuthConfigRequest) GetIamAliasOk() (*string, bool)` +`func (o *GoogleCloudConfigureAuthRequest) GetIamAliasOk() (*string, bool)` GetIamAliasOk returns a tuple with the IamAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamAlias -`func (o *GoogleCloudWriteAuthConfigRequest) SetIamAlias(v string)` +`func (o *GoogleCloudConfigureAuthRequest) SetIamAlias(v string)` SetIamAlias sets IamAlias field to given value. ### HasIamAlias -`func (o *GoogleCloudWriteAuthConfigRequest) HasIamAlias() bool` +`func (o *GoogleCloudConfigureAuthRequest) HasIamAlias() bool` HasIamAlias returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasIamAlias returns a boolean if a field has been set. ### GetIamMetadata -`func (o *GoogleCloudWriteAuthConfigRequest) GetIamMetadata() []string` +`func (o *GoogleCloudConfigureAuthRequest) GetIamMetadata() []string` GetIamMetadata returns the IamMetadata field if non-nil, zero value otherwise. ### GetIamMetadataOk -`func (o *GoogleCloudWriteAuthConfigRequest) GetIamMetadataOk() (*[]string, bool)` +`func (o *GoogleCloudConfigureAuthRequest) GetIamMetadataOk() (*[]string, bool)` GetIamMetadataOk returns a tuple with the IamMetadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIamMetadata -`func (o *GoogleCloudWriteAuthConfigRequest) SetIamMetadata(v []string)` +`func (o *GoogleCloudConfigureAuthRequest) SetIamMetadata(v []string)` SetIamMetadata sets IamMetadata field to given value. ### HasIamMetadata -`func (o *GoogleCloudWriteAuthConfigRequest) HasIamMetadata() bool` +`func (o *GoogleCloudConfigureAuthRequest) HasIamMetadata() bool` HasIamMetadata returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteConfigRequest.md b/docs/GoogleCloudConfigureRequest.md similarity index 64% rename from docs/GoogleCloudWriteConfigRequest.md rename to docs/GoogleCloudConfigureRequest.md index 13672028..1f4bfd79 100644 --- a/docs/GoogleCloudWriteConfigRequest.md +++ b/docs/GoogleCloudConfigureRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudWriteConfigRequest +# GoogleCloudConfigureRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudWriteConfigRequest +### NewGoogleCloudConfigureRequest -`func NewGoogleCloudWriteConfigRequest() *GoogleCloudWriteConfigRequest` +`func NewGoogleCloudConfigureRequest() *GoogleCloudConfigureRequest` -NewGoogleCloudWriteConfigRequest instantiates a new GoogleCloudWriteConfigRequest object +NewGoogleCloudConfigureRequest instantiates a new GoogleCloudConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudWriteConfigRequestWithDefaults +### NewGoogleCloudConfigureRequestWithDefaults -`func NewGoogleCloudWriteConfigRequestWithDefaults() *GoogleCloudWriteConfigRequest` +`func NewGoogleCloudConfigureRequestWithDefaults() *GoogleCloudConfigureRequest` -NewGoogleCloudWriteConfigRequestWithDefaults instantiates a new GoogleCloudWriteConfigRequest object +NewGoogleCloudConfigureRequestWithDefaults instantiates a new GoogleCloudConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCredentials -`func (o *GoogleCloudWriteConfigRequest) GetCredentials() string` +`func (o *GoogleCloudConfigureRequest) GetCredentials() string` GetCredentials returns the Credentials field if non-nil, zero value otherwise. ### GetCredentialsOk -`func (o *GoogleCloudWriteConfigRequest) GetCredentialsOk() (*string, bool)` +`func (o *GoogleCloudConfigureRequest) GetCredentialsOk() (*string, bool)` GetCredentialsOk returns a tuple with the Credentials field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCredentials -`func (o *GoogleCloudWriteConfigRequest) SetCredentials(v string)` +`func (o *GoogleCloudConfigureRequest) SetCredentials(v string)` SetCredentials sets Credentials field to given value. ### HasCredentials -`func (o *GoogleCloudWriteConfigRequest) HasCredentials() bool` +`func (o *GoogleCloudConfigureRequest) HasCredentials() bool` HasCredentials returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasCredentials returns a boolean if a field has been set. ### GetMaxTtl -`func (o *GoogleCloudWriteConfigRequest) GetMaxTtl() int32` +`func (o *GoogleCloudConfigureRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *GoogleCloudWriteConfigRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *GoogleCloudConfigureRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *GoogleCloudWriteConfigRequest) SetMaxTtl(v int32)` +`func (o *GoogleCloudConfigureRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *GoogleCloudWriteConfigRequest) HasMaxTtl() bool` +`func (o *GoogleCloudConfigureRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetTtl -`func (o *GoogleCloudWriteConfigRequest) GetTtl() int32` +`func (o *GoogleCloudConfigureRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *GoogleCloudWriteConfigRequest) GetTtlOk() (*int32, bool)` +`func (o *GoogleCloudConfigureRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *GoogleCloudWriteConfigRequest) SetTtl(v int32)` +`func (o *GoogleCloudConfigureRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *GoogleCloudWriteConfigRequest) HasTtl() bool` +`func (o *GoogleCloudConfigureRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteRoleLabelsRequest.md b/docs/GoogleCloudEditLabelsForRoleRequest.md similarity index 58% rename from docs/GoogleCloudWriteRoleLabelsRequest.md rename to docs/GoogleCloudEditLabelsForRoleRequest.md index 8a5141f0..72d7829e 100644 --- a/docs/GoogleCloudWriteRoleLabelsRequest.md +++ b/docs/GoogleCloudEditLabelsForRoleRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudWriteRoleLabelsRequest +# GoogleCloudEditLabelsForRoleRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudWriteRoleLabelsRequest +### NewGoogleCloudEditLabelsForRoleRequest -`func NewGoogleCloudWriteRoleLabelsRequest() *GoogleCloudWriteRoleLabelsRequest` +`func NewGoogleCloudEditLabelsForRoleRequest() *GoogleCloudEditLabelsForRoleRequest` -NewGoogleCloudWriteRoleLabelsRequest instantiates a new GoogleCloudWriteRoleLabelsRequest object +NewGoogleCloudEditLabelsForRoleRequest instantiates a new GoogleCloudEditLabelsForRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudWriteRoleLabelsRequestWithDefaults +### NewGoogleCloudEditLabelsForRoleRequestWithDefaults -`func NewGoogleCloudWriteRoleLabelsRequestWithDefaults() *GoogleCloudWriteRoleLabelsRequest` +`func NewGoogleCloudEditLabelsForRoleRequestWithDefaults() *GoogleCloudEditLabelsForRoleRequest` -NewGoogleCloudWriteRoleLabelsRequestWithDefaults instantiates a new GoogleCloudWriteRoleLabelsRequest object +NewGoogleCloudEditLabelsForRoleRequestWithDefaults instantiates a new GoogleCloudEditLabelsForRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAdd -`func (o *GoogleCloudWriteRoleLabelsRequest) GetAdd() []string` +`func (o *GoogleCloudEditLabelsForRoleRequest) GetAdd() []string` GetAdd returns the Add field if non-nil, zero value otherwise. ### GetAddOk -`func (o *GoogleCloudWriteRoleLabelsRequest) GetAddOk() (*[]string, bool)` +`func (o *GoogleCloudEditLabelsForRoleRequest) GetAddOk() (*[]string, bool)` GetAddOk returns a tuple with the Add field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAdd -`func (o *GoogleCloudWriteRoleLabelsRequest) SetAdd(v []string)` +`func (o *GoogleCloudEditLabelsForRoleRequest) SetAdd(v []string)` SetAdd sets Add field to given value. ### HasAdd -`func (o *GoogleCloudWriteRoleLabelsRequest) HasAdd() bool` +`func (o *GoogleCloudEditLabelsForRoleRequest) HasAdd() bool` HasAdd returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasAdd returns a boolean if a field has been set. ### GetRemove -`func (o *GoogleCloudWriteRoleLabelsRequest) GetRemove() []string` +`func (o *GoogleCloudEditLabelsForRoleRequest) GetRemove() []string` GetRemove returns the Remove field if non-nil, zero value otherwise. ### GetRemoveOk -`func (o *GoogleCloudWriteRoleLabelsRequest) GetRemoveOk() (*[]string, bool)` +`func (o *GoogleCloudEditLabelsForRoleRequest) GetRemoveOk() (*[]string, bool)` GetRemoveOk returns a tuple with the Remove field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemove -`func (o *GoogleCloudWriteRoleLabelsRequest) SetRemove(v []string)` +`func (o *GoogleCloudEditLabelsForRoleRequest) SetRemove(v []string)` SetRemove sets Remove field to given value. ### HasRemove -`func (o *GoogleCloudWriteRoleLabelsRequest) HasRemove() bool` +`func (o *GoogleCloudEditLabelsForRoleRequest) HasRemove() bool` HasRemove returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteRoleServiceAccountsRequest.md b/docs/GoogleCloudEditServiceAccountsForRoleRequest.md similarity index 55% rename from docs/GoogleCloudWriteRoleServiceAccountsRequest.md rename to docs/GoogleCloudEditServiceAccountsForRoleRequest.md index a1cff0bc..a5b2024b 100644 --- a/docs/GoogleCloudWriteRoleServiceAccountsRequest.md +++ b/docs/GoogleCloudEditServiceAccountsForRoleRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudWriteRoleServiceAccountsRequest +# GoogleCloudEditServiceAccountsForRoleRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudWriteRoleServiceAccountsRequest +### NewGoogleCloudEditServiceAccountsForRoleRequest -`func NewGoogleCloudWriteRoleServiceAccountsRequest() *GoogleCloudWriteRoleServiceAccountsRequest` +`func NewGoogleCloudEditServiceAccountsForRoleRequest() *GoogleCloudEditServiceAccountsForRoleRequest` -NewGoogleCloudWriteRoleServiceAccountsRequest instantiates a new GoogleCloudWriteRoleServiceAccountsRequest object +NewGoogleCloudEditServiceAccountsForRoleRequest instantiates a new GoogleCloudEditServiceAccountsForRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults +### NewGoogleCloudEditServiceAccountsForRoleRequestWithDefaults -`func NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults() *GoogleCloudWriteRoleServiceAccountsRequest` +`func NewGoogleCloudEditServiceAccountsForRoleRequestWithDefaults() *GoogleCloudEditServiceAccountsForRoleRequest` -NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults instantiates a new GoogleCloudWriteRoleServiceAccountsRequest object +NewGoogleCloudEditServiceAccountsForRoleRequestWithDefaults instantiates a new GoogleCloudEditServiceAccountsForRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAdd -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) GetAdd() []string` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) GetAdd() []string` GetAdd returns the Add field if non-nil, zero value otherwise. ### GetAddOk -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) GetAddOk() (*[]string, bool)` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) GetAddOk() (*[]string, bool)` GetAddOk returns a tuple with the Add field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAdd -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) SetAdd(v []string)` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) SetAdd(v []string)` SetAdd sets Add field to given value. ### HasAdd -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) HasAdd() bool` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) HasAdd() bool` HasAdd returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasAdd returns a boolean if a field has been set. ### GetRemove -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) GetRemove() []string` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) GetRemove() []string` GetRemove returns the Remove field if non-nil, zero value otherwise. ### GetRemoveOk -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) GetRemoveOk() (*[]string, bool)` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) GetRemoveOk() (*[]string, bool)` GetRemoveOk returns a tuple with the Remove field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemove -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) SetRemove(v []string)` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) SetRemove(v []string)` SetRemove sets Remove field to given value. ### HasRemove -`func (o *GoogleCloudWriteRoleServiceAccountsRequest) HasRemove() bool` +`func (o *GoogleCloudEditServiceAccountsForRoleRequest) HasRemove() bool` HasRemove returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteKeyRequest.md b/docs/GoogleCloudGenerateRolesetKeyWithParameters2Request.md similarity index 56% rename from docs/GoogleCloudWriteKeyRequest.md rename to docs/GoogleCloudGenerateRolesetKeyWithParameters2Request.md index 69b72a47..bdebdf8b 100644 --- a/docs/GoogleCloudWriteKeyRequest.md +++ b/docs/GoogleCloudGenerateRolesetKeyWithParameters2Request.md @@ -1,4 +1,4 @@ -# GoogleCloudWriteKeyRequest +# GoogleCloudGenerateRolesetKeyWithParameters2Request ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudWriteKeyRequest +### NewGoogleCloudGenerateRolesetKeyWithParameters2Request -`func NewGoogleCloudWriteKeyRequest() *GoogleCloudWriteKeyRequest` +`func NewGoogleCloudGenerateRolesetKeyWithParameters2Request() *GoogleCloudGenerateRolesetKeyWithParameters2Request` -NewGoogleCloudWriteKeyRequest instantiates a new GoogleCloudWriteKeyRequest object +NewGoogleCloudGenerateRolesetKeyWithParameters2Request instantiates a new GoogleCloudGenerateRolesetKeyWithParameters2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudWriteKeyRequestWithDefaults +### NewGoogleCloudGenerateRolesetKeyWithParameters2RequestWithDefaults -`func NewGoogleCloudWriteKeyRequestWithDefaults() *GoogleCloudWriteKeyRequest` +`func NewGoogleCloudGenerateRolesetKeyWithParameters2RequestWithDefaults() *GoogleCloudGenerateRolesetKeyWithParameters2Request` -NewGoogleCloudWriteKeyRequestWithDefaults instantiates a new GoogleCloudWriteKeyRequest object +NewGoogleCloudGenerateRolesetKeyWithParameters2RequestWithDefaults instantiates a new GoogleCloudGenerateRolesetKeyWithParameters2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeyAlgorithm -`func (o *GoogleCloudWriteKeyRequest) GetKeyAlgorithm() string` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) GetKeyAlgorithm() string` GetKeyAlgorithm returns the KeyAlgorithm field if non-nil, zero value otherwise. ### GetKeyAlgorithmOk -`func (o *GoogleCloudWriteKeyRequest) GetKeyAlgorithmOk() (*string, bool)` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) GetKeyAlgorithmOk() (*string, bool)` GetKeyAlgorithmOk returns a tuple with the KeyAlgorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyAlgorithm -`func (o *GoogleCloudWriteKeyRequest) SetKeyAlgorithm(v string)` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) SetKeyAlgorithm(v string)` SetKeyAlgorithm sets KeyAlgorithm field to given value. ### HasKeyAlgorithm -`func (o *GoogleCloudWriteKeyRequest) HasKeyAlgorithm() bool` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) HasKeyAlgorithm() bool` HasKeyAlgorithm returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasKeyAlgorithm returns a boolean if a field has been set. ### GetKeyType -`func (o *GoogleCloudWriteKeyRequest) GetKeyType() string` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *GoogleCloudWriteKeyRequest) GetKeyTypeOk() (*string, bool)` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *GoogleCloudWriteKeyRequest) SetKeyType(v string)` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *GoogleCloudWriteKeyRequest) HasKeyType() bool` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasKeyType returns a boolean if a field has been set. ### GetTtl -`func (o *GoogleCloudWriteKeyRequest) GetTtl() int32` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *GoogleCloudWriteKeyRequest) GetTtlOk() (*int32, bool)` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *GoogleCloudWriteKeyRequest) SetTtl(v int32)` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *GoogleCloudWriteKeyRequest) HasTtl() bool` +`func (o *GoogleCloudGenerateRolesetKeyWithParameters2Request) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteRolesetKeyRequest.md b/docs/GoogleCloudGenerateRolesetKeyWithParametersRequest.md similarity index 57% rename from docs/GoogleCloudWriteRolesetKeyRequest.md rename to docs/GoogleCloudGenerateRolesetKeyWithParametersRequest.md index 187b516f..c40fc73e 100644 --- a/docs/GoogleCloudWriteRolesetKeyRequest.md +++ b/docs/GoogleCloudGenerateRolesetKeyWithParametersRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudWriteRolesetKeyRequest +# GoogleCloudGenerateRolesetKeyWithParametersRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudWriteRolesetKeyRequest +### NewGoogleCloudGenerateRolesetKeyWithParametersRequest -`func NewGoogleCloudWriteRolesetKeyRequest() *GoogleCloudWriteRolesetKeyRequest` +`func NewGoogleCloudGenerateRolesetKeyWithParametersRequest() *GoogleCloudGenerateRolesetKeyWithParametersRequest` -NewGoogleCloudWriteRolesetKeyRequest instantiates a new GoogleCloudWriteRolesetKeyRequest object +NewGoogleCloudGenerateRolesetKeyWithParametersRequest instantiates a new GoogleCloudGenerateRolesetKeyWithParametersRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudWriteRolesetKeyRequestWithDefaults +### NewGoogleCloudGenerateRolesetKeyWithParametersRequestWithDefaults -`func NewGoogleCloudWriteRolesetKeyRequestWithDefaults() *GoogleCloudWriteRolesetKeyRequest` +`func NewGoogleCloudGenerateRolesetKeyWithParametersRequestWithDefaults() *GoogleCloudGenerateRolesetKeyWithParametersRequest` -NewGoogleCloudWriteRolesetKeyRequestWithDefaults instantiates a new GoogleCloudWriteRolesetKeyRequest object +NewGoogleCloudGenerateRolesetKeyWithParametersRequestWithDefaults instantiates a new GoogleCloudGenerateRolesetKeyWithParametersRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeyAlgorithm -`func (o *GoogleCloudWriteRolesetKeyRequest) GetKeyAlgorithm() string` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) GetKeyAlgorithm() string` GetKeyAlgorithm returns the KeyAlgorithm field if non-nil, zero value otherwise. ### GetKeyAlgorithmOk -`func (o *GoogleCloudWriteRolesetKeyRequest) GetKeyAlgorithmOk() (*string, bool)` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) GetKeyAlgorithmOk() (*string, bool)` GetKeyAlgorithmOk returns a tuple with the KeyAlgorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyAlgorithm -`func (o *GoogleCloudWriteRolesetKeyRequest) SetKeyAlgorithm(v string)` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) SetKeyAlgorithm(v string)` SetKeyAlgorithm sets KeyAlgorithm field to given value. ### HasKeyAlgorithm -`func (o *GoogleCloudWriteRolesetKeyRequest) HasKeyAlgorithm() bool` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) HasKeyAlgorithm() bool` HasKeyAlgorithm returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasKeyAlgorithm returns a boolean if a field has been set. ### GetKeyType -`func (o *GoogleCloudWriteRolesetKeyRequest) GetKeyType() string` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *GoogleCloudWriteRolesetKeyRequest) GetKeyTypeOk() (*string, bool)` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *GoogleCloudWriteRolesetKeyRequest) SetKeyType(v string)` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *GoogleCloudWriteRolesetKeyRequest) HasKeyType() bool` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasKeyType returns a boolean if a field has been set. ### GetTtl -`func (o *GoogleCloudWriteRolesetKeyRequest) GetTtl() int32` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *GoogleCloudWriteRolesetKeyRequest) GetTtlOk() (*int32, bool)` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *GoogleCloudWriteRolesetKeyRequest) SetTtl(v int32)` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *GoogleCloudWriteRolesetKeyRequest) HasTtl() bool` +`func (o *GoogleCloudGenerateRolesetKeyWithParametersRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteStaticAccountKeyRequest.md b/docs/GoogleCloudGenerateStaticAccountKeyWithParametersRequest.md similarity index 55% rename from docs/GoogleCloudWriteStaticAccountKeyRequest.md rename to docs/GoogleCloudGenerateStaticAccountKeyWithParametersRequest.md index 7821045f..1700a41d 100644 --- a/docs/GoogleCloudWriteStaticAccountKeyRequest.md +++ b/docs/GoogleCloudGenerateStaticAccountKeyWithParametersRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudWriteStaticAccountKeyRequest +# GoogleCloudGenerateStaticAccountKeyWithParametersRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudWriteStaticAccountKeyRequest +### NewGoogleCloudGenerateStaticAccountKeyWithParametersRequest -`func NewGoogleCloudWriteStaticAccountKeyRequest() *GoogleCloudWriteStaticAccountKeyRequest` +`func NewGoogleCloudGenerateStaticAccountKeyWithParametersRequest() *GoogleCloudGenerateStaticAccountKeyWithParametersRequest` -NewGoogleCloudWriteStaticAccountKeyRequest instantiates a new GoogleCloudWriteStaticAccountKeyRequest object +NewGoogleCloudGenerateStaticAccountKeyWithParametersRequest instantiates a new GoogleCloudGenerateStaticAccountKeyWithParametersRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults +### NewGoogleCloudGenerateStaticAccountKeyWithParametersRequestWithDefaults -`func NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults() *GoogleCloudWriteStaticAccountKeyRequest` +`func NewGoogleCloudGenerateStaticAccountKeyWithParametersRequestWithDefaults() *GoogleCloudGenerateStaticAccountKeyWithParametersRequest` -NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults instantiates a new GoogleCloudWriteStaticAccountKeyRequest object +NewGoogleCloudGenerateStaticAccountKeyWithParametersRequestWithDefaults instantiates a new GoogleCloudGenerateStaticAccountKeyWithParametersRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeyAlgorithm -`func (o *GoogleCloudWriteStaticAccountKeyRequest) GetKeyAlgorithm() string` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) GetKeyAlgorithm() string` GetKeyAlgorithm returns the KeyAlgorithm field if non-nil, zero value otherwise. ### GetKeyAlgorithmOk -`func (o *GoogleCloudWriteStaticAccountKeyRequest) GetKeyAlgorithmOk() (*string, bool)` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) GetKeyAlgorithmOk() (*string, bool)` GetKeyAlgorithmOk returns a tuple with the KeyAlgorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyAlgorithm -`func (o *GoogleCloudWriteStaticAccountKeyRequest) SetKeyAlgorithm(v string)` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) SetKeyAlgorithm(v string)` SetKeyAlgorithm sets KeyAlgorithm field to given value. ### HasKeyAlgorithm -`func (o *GoogleCloudWriteStaticAccountKeyRequest) HasKeyAlgorithm() bool` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) HasKeyAlgorithm() bool` HasKeyAlgorithm returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasKeyAlgorithm returns a boolean if a field has been set. ### GetKeyType -`func (o *GoogleCloudWriteStaticAccountKeyRequest) GetKeyType() string` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *GoogleCloudWriteStaticAccountKeyRequest) GetKeyTypeOk() (*string, bool)` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *GoogleCloudWriteStaticAccountKeyRequest) SetKeyType(v string)` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *GoogleCloudWriteStaticAccountKeyRequest) HasKeyType() bool` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasKeyType returns a boolean if a field has been set. ### GetTtl -`func (o *GoogleCloudWriteStaticAccountKeyRequest) GetTtl() int32` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *GoogleCloudWriteStaticAccountKeyRequest) GetTtlOk() (*int32, bool)` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *GoogleCloudWriteStaticAccountKeyRequest) SetTtl(v int32)` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *GoogleCloudWriteStaticAccountKeyRequest) HasTtl() bool` +`func (o *GoogleCloudGenerateStaticAccountKeyWithParametersRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSDecryptRequest.md b/docs/GoogleCloudKMSDecryptRequest.md index e6710000..257cca52 100644 --- a/docs/GoogleCloudKMSDecryptRequest.md +++ b/docs/GoogleCloudKMSDecryptRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSDecryptRequest +# GoogleCloudKmsDecryptRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSDecryptRequest +### NewGoogleCloudKmsDecryptRequest -`func NewGoogleCloudKMSDecryptRequest() *GoogleCloudKMSDecryptRequest` +`func NewGoogleCloudKmsDecryptRequest() *GoogleCloudKmsDecryptRequest` -NewGoogleCloudKMSDecryptRequest instantiates a new GoogleCloudKMSDecryptRequest object +NewGoogleCloudKmsDecryptRequest instantiates a new GoogleCloudKmsDecryptRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSDecryptRequestWithDefaults +### NewGoogleCloudKmsDecryptRequestWithDefaults -`func NewGoogleCloudKMSDecryptRequestWithDefaults() *GoogleCloudKMSDecryptRequest` +`func NewGoogleCloudKmsDecryptRequestWithDefaults() *GoogleCloudKmsDecryptRequest` -NewGoogleCloudKMSDecryptRequestWithDefaults instantiates a new GoogleCloudKMSDecryptRequest object +NewGoogleCloudKmsDecryptRequestWithDefaults instantiates a new GoogleCloudKmsDecryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAdditionalAuthenticatedData -`func (o *GoogleCloudKMSDecryptRequest) GetAdditionalAuthenticatedData() string` +`func (o *GoogleCloudKmsDecryptRequest) GetAdditionalAuthenticatedData() string` GetAdditionalAuthenticatedData returns the AdditionalAuthenticatedData field if non-nil, zero value otherwise. ### GetAdditionalAuthenticatedDataOk -`func (o *GoogleCloudKMSDecryptRequest) GetAdditionalAuthenticatedDataOk() (*string, bool)` +`func (o *GoogleCloudKmsDecryptRequest) GetAdditionalAuthenticatedDataOk() (*string, bool)` GetAdditionalAuthenticatedDataOk returns a tuple with the AdditionalAuthenticatedData field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAdditionalAuthenticatedData -`func (o *GoogleCloudKMSDecryptRequest) SetAdditionalAuthenticatedData(v string)` +`func (o *GoogleCloudKmsDecryptRequest) SetAdditionalAuthenticatedData(v string)` SetAdditionalAuthenticatedData sets AdditionalAuthenticatedData field to given value. ### HasAdditionalAuthenticatedData -`func (o *GoogleCloudKMSDecryptRequest) HasAdditionalAuthenticatedData() bool` +`func (o *GoogleCloudKmsDecryptRequest) HasAdditionalAuthenticatedData() bool` HasAdditionalAuthenticatedData returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAdditionalAuthenticatedData returns a boolean if a field has been set. ### GetCiphertext -`func (o *GoogleCloudKMSDecryptRequest) GetCiphertext() string` +`func (o *GoogleCloudKmsDecryptRequest) GetCiphertext() string` GetCiphertext returns the Ciphertext field if non-nil, zero value otherwise. ### GetCiphertextOk -`func (o *GoogleCloudKMSDecryptRequest) GetCiphertextOk() (*string, bool)` +`func (o *GoogleCloudKmsDecryptRequest) GetCiphertextOk() (*string, bool)` GetCiphertextOk returns a tuple with the Ciphertext field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCiphertext -`func (o *GoogleCloudKMSDecryptRequest) SetCiphertext(v string)` +`func (o *GoogleCloudKmsDecryptRequest) SetCiphertext(v string)` SetCiphertext sets Ciphertext field to given value. ### HasCiphertext -`func (o *GoogleCloudKMSDecryptRequest) HasCiphertext() bool` +`func (o *GoogleCloudKmsDecryptRequest) HasCiphertext() bool` HasCiphertext returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasCiphertext returns a boolean if a field has been set. ### GetKeyVersion -`func (o *GoogleCloudKMSDecryptRequest) GetKeyVersion() int32` +`func (o *GoogleCloudKmsDecryptRequest) GetKeyVersion() int32` GetKeyVersion returns the KeyVersion field if non-nil, zero value otherwise. ### GetKeyVersionOk -`func (o *GoogleCloudKMSDecryptRequest) GetKeyVersionOk() (*int32, bool)` +`func (o *GoogleCloudKmsDecryptRequest) GetKeyVersionOk() (*int32, bool)` GetKeyVersionOk returns a tuple with the KeyVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyVersion -`func (o *GoogleCloudKMSDecryptRequest) SetKeyVersion(v int32)` +`func (o *GoogleCloudKmsDecryptRequest) SetKeyVersion(v int32)` SetKeyVersion sets KeyVersion field to given value. ### HasKeyVersion -`func (o *GoogleCloudKMSDecryptRequest) HasKeyVersion() bool` +`func (o *GoogleCloudKmsDecryptRequest) HasKeyVersion() bool` HasKeyVersion returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSEncryptRequest.md b/docs/GoogleCloudKMSEncryptRequest.md index fc108c60..618c2828 100644 --- a/docs/GoogleCloudKMSEncryptRequest.md +++ b/docs/GoogleCloudKMSEncryptRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSEncryptRequest +# GoogleCloudKmsEncryptRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSEncryptRequest +### NewGoogleCloudKmsEncryptRequest -`func NewGoogleCloudKMSEncryptRequest() *GoogleCloudKMSEncryptRequest` +`func NewGoogleCloudKmsEncryptRequest() *GoogleCloudKmsEncryptRequest` -NewGoogleCloudKMSEncryptRequest instantiates a new GoogleCloudKMSEncryptRequest object +NewGoogleCloudKmsEncryptRequest instantiates a new GoogleCloudKmsEncryptRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSEncryptRequestWithDefaults +### NewGoogleCloudKmsEncryptRequestWithDefaults -`func NewGoogleCloudKMSEncryptRequestWithDefaults() *GoogleCloudKMSEncryptRequest` +`func NewGoogleCloudKmsEncryptRequestWithDefaults() *GoogleCloudKmsEncryptRequest` -NewGoogleCloudKMSEncryptRequestWithDefaults instantiates a new GoogleCloudKMSEncryptRequest object +NewGoogleCloudKmsEncryptRequestWithDefaults instantiates a new GoogleCloudKmsEncryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAdditionalAuthenticatedData -`func (o *GoogleCloudKMSEncryptRequest) GetAdditionalAuthenticatedData() string` +`func (o *GoogleCloudKmsEncryptRequest) GetAdditionalAuthenticatedData() string` GetAdditionalAuthenticatedData returns the AdditionalAuthenticatedData field if non-nil, zero value otherwise. ### GetAdditionalAuthenticatedDataOk -`func (o *GoogleCloudKMSEncryptRequest) GetAdditionalAuthenticatedDataOk() (*string, bool)` +`func (o *GoogleCloudKmsEncryptRequest) GetAdditionalAuthenticatedDataOk() (*string, bool)` GetAdditionalAuthenticatedDataOk returns a tuple with the AdditionalAuthenticatedData field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAdditionalAuthenticatedData -`func (o *GoogleCloudKMSEncryptRequest) SetAdditionalAuthenticatedData(v string)` +`func (o *GoogleCloudKmsEncryptRequest) SetAdditionalAuthenticatedData(v string)` SetAdditionalAuthenticatedData sets AdditionalAuthenticatedData field to given value. ### HasAdditionalAuthenticatedData -`func (o *GoogleCloudKMSEncryptRequest) HasAdditionalAuthenticatedData() bool` +`func (o *GoogleCloudKmsEncryptRequest) HasAdditionalAuthenticatedData() bool` HasAdditionalAuthenticatedData returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAdditionalAuthenticatedData returns a boolean if a field has been set. ### GetKeyVersion -`func (o *GoogleCloudKMSEncryptRequest) GetKeyVersion() int32` +`func (o *GoogleCloudKmsEncryptRequest) GetKeyVersion() int32` GetKeyVersion returns the KeyVersion field if non-nil, zero value otherwise. ### GetKeyVersionOk -`func (o *GoogleCloudKMSEncryptRequest) GetKeyVersionOk() (*int32, bool)` +`func (o *GoogleCloudKmsEncryptRequest) GetKeyVersionOk() (*int32, bool)` GetKeyVersionOk returns a tuple with the KeyVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyVersion -`func (o *GoogleCloudKMSEncryptRequest) SetKeyVersion(v int32)` +`func (o *GoogleCloudKmsEncryptRequest) SetKeyVersion(v int32)` SetKeyVersion sets KeyVersion field to given value. ### HasKeyVersion -`func (o *GoogleCloudKMSEncryptRequest) HasKeyVersion() bool` +`func (o *GoogleCloudKmsEncryptRequest) HasKeyVersion() bool` HasKeyVersion returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasKeyVersion returns a boolean if a field has been set. ### GetPlaintext -`func (o *GoogleCloudKMSEncryptRequest) GetPlaintext() string` +`func (o *GoogleCloudKmsEncryptRequest) GetPlaintext() string` GetPlaintext returns the Plaintext field if non-nil, zero value otherwise. ### GetPlaintextOk -`func (o *GoogleCloudKMSEncryptRequest) GetPlaintextOk() (*string, bool)` +`func (o *GoogleCloudKmsEncryptRequest) GetPlaintextOk() (*string, bool)` GetPlaintextOk returns a tuple with the Plaintext field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPlaintext -`func (o *GoogleCloudKMSEncryptRequest) SetPlaintext(v string)` +`func (o *GoogleCloudKmsEncryptRequest) SetPlaintext(v string)` SetPlaintext sets Plaintext field to given value. ### HasPlaintext -`func (o *GoogleCloudKMSEncryptRequest) HasPlaintext() bool` +`func (o *GoogleCloudKmsEncryptRequest) HasPlaintext() bool` HasPlaintext returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSReencryptRequest.md b/docs/GoogleCloudKMSReencryptRequest.md index cdc7df22..115e7cff 100644 --- a/docs/GoogleCloudKMSReencryptRequest.md +++ b/docs/GoogleCloudKMSReencryptRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSReencryptRequest +# GoogleCloudKmsReencryptRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSReencryptRequest +### NewGoogleCloudKmsReencryptRequest -`func NewGoogleCloudKMSReencryptRequest() *GoogleCloudKMSReencryptRequest` +`func NewGoogleCloudKmsReencryptRequest() *GoogleCloudKmsReencryptRequest` -NewGoogleCloudKMSReencryptRequest instantiates a new GoogleCloudKMSReencryptRequest object +NewGoogleCloudKmsReencryptRequest instantiates a new GoogleCloudKmsReencryptRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSReencryptRequestWithDefaults +### NewGoogleCloudKmsReencryptRequestWithDefaults -`func NewGoogleCloudKMSReencryptRequestWithDefaults() *GoogleCloudKMSReencryptRequest` +`func NewGoogleCloudKmsReencryptRequestWithDefaults() *GoogleCloudKmsReencryptRequest` -NewGoogleCloudKMSReencryptRequestWithDefaults instantiates a new GoogleCloudKMSReencryptRequest object +NewGoogleCloudKmsReencryptRequestWithDefaults instantiates a new GoogleCloudKmsReencryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAdditionalAuthenticatedData -`func (o *GoogleCloudKMSReencryptRequest) GetAdditionalAuthenticatedData() string` +`func (o *GoogleCloudKmsReencryptRequest) GetAdditionalAuthenticatedData() string` GetAdditionalAuthenticatedData returns the AdditionalAuthenticatedData field if non-nil, zero value otherwise. ### GetAdditionalAuthenticatedDataOk -`func (o *GoogleCloudKMSReencryptRequest) GetAdditionalAuthenticatedDataOk() (*string, bool)` +`func (o *GoogleCloudKmsReencryptRequest) GetAdditionalAuthenticatedDataOk() (*string, bool)` GetAdditionalAuthenticatedDataOk returns a tuple with the AdditionalAuthenticatedData field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAdditionalAuthenticatedData -`func (o *GoogleCloudKMSReencryptRequest) SetAdditionalAuthenticatedData(v string)` +`func (o *GoogleCloudKmsReencryptRequest) SetAdditionalAuthenticatedData(v string)` SetAdditionalAuthenticatedData sets AdditionalAuthenticatedData field to given value. ### HasAdditionalAuthenticatedData -`func (o *GoogleCloudKMSReencryptRequest) HasAdditionalAuthenticatedData() bool` +`func (o *GoogleCloudKmsReencryptRequest) HasAdditionalAuthenticatedData() bool` HasAdditionalAuthenticatedData returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAdditionalAuthenticatedData returns a boolean if a field has been set. ### GetCiphertext -`func (o *GoogleCloudKMSReencryptRequest) GetCiphertext() string` +`func (o *GoogleCloudKmsReencryptRequest) GetCiphertext() string` GetCiphertext returns the Ciphertext field if non-nil, zero value otherwise. ### GetCiphertextOk -`func (o *GoogleCloudKMSReencryptRequest) GetCiphertextOk() (*string, bool)` +`func (o *GoogleCloudKmsReencryptRequest) GetCiphertextOk() (*string, bool)` GetCiphertextOk returns a tuple with the Ciphertext field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCiphertext -`func (o *GoogleCloudKMSReencryptRequest) SetCiphertext(v string)` +`func (o *GoogleCloudKmsReencryptRequest) SetCiphertext(v string)` SetCiphertext sets Ciphertext field to given value. ### HasCiphertext -`func (o *GoogleCloudKMSReencryptRequest) HasCiphertext() bool` +`func (o *GoogleCloudKmsReencryptRequest) HasCiphertext() bool` HasCiphertext returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasCiphertext returns a boolean if a field has been set. ### GetKeyVersion -`func (o *GoogleCloudKMSReencryptRequest) GetKeyVersion() int32` +`func (o *GoogleCloudKmsReencryptRequest) GetKeyVersion() int32` GetKeyVersion returns the KeyVersion field if non-nil, zero value otherwise. ### GetKeyVersionOk -`func (o *GoogleCloudKMSReencryptRequest) GetKeyVersionOk() (*int32, bool)` +`func (o *GoogleCloudKmsReencryptRequest) GetKeyVersionOk() (*int32, bool)` GetKeyVersionOk returns a tuple with the KeyVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyVersion -`func (o *GoogleCloudKMSReencryptRequest) SetKeyVersion(v int32)` +`func (o *GoogleCloudKmsReencryptRequest) SetKeyVersion(v int32)` SetKeyVersion sets KeyVersion field to given value. ### HasKeyVersion -`func (o *GoogleCloudKMSReencryptRequest) HasKeyVersion() bool` +`func (o *GoogleCloudKmsReencryptRequest) HasKeyVersion() bool` HasKeyVersion returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSRegisterKeyRequest.md b/docs/GoogleCloudKMSRegisterKeyRequest.md index 16237391..a6d2a6ec 100644 --- a/docs/GoogleCloudKMSRegisterKeyRequest.md +++ b/docs/GoogleCloudKMSRegisterKeyRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSRegisterKeyRequest +# GoogleCloudKmsRegisterKeyRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSRegisterKeyRequest +### NewGoogleCloudKmsRegisterKeyRequest -`func NewGoogleCloudKMSRegisterKeyRequest() *GoogleCloudKMSRegisterKeyRequest` +`func NewGoogleCloudKmsRegisterKeyRequest() *GoogleCloudKmsRegisterKeyRequest` -NewGoogleCloudKMSRegisterKeyRequest instantiates a new GoogleCloudKMSRegisterKeyRequest object +NewGoogleCloudKmsRegisterKeyRequest instantiates a new GoogleCloudKmsRegisterKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSRegisterKeyRequestWithDefaults +### NewGoogleCloudKmsRegisterKeyRequestWithDefaults -`func NewGoogleCloudKMSRegisterKeyRequestWithDefaults() *GoogleCloudKMSRegisterKeyRequest` +`func NewGoogleCloudKmsRegisterKeyRequestWithDefaults() *GoogleCloudKmsRegisterKeyRequest` -NewGoogleCloudKMSRegisterKeyRequestWithDefaults instantiates a new GoogleCloudKMSRegisterKeyRequest object +NewGoogleCloudKmsRegisterKeyRequestWithDefaults instantiates a new GoogleCloudKmsRegisterKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCryptoKey -`func (o *GoogleCloudKMSRegisterKeyRequest) GetCryptoKey() string` +`func (o *GoogleCloudKmsRegisterKeyRequest) GetCryptoKey() string` GetCryptoKey returns the CryptoKey field if non-nil, zero value otherwise. ### GetCryptoKeyOk -`func (o *GoogleCloudKMSRegisterKeyRequest) GetCryptoKeyOk() (*string, bool)` +`func (o *GoogleCloudKmsRegisterKeyRequest) GetCryptoKeyOk() (*string, bool)` GetCryptoKeyOk returns a tuple with the CryptoKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCryptoKey -`func (o *GoogleCloudKMSRegisterKeyRequest) SetCryptoKey(v string)` +`func (o *GoogleCloudKmsRegisterKeyRequest) SetCryptoKey(v string)` SetCryptoKey sets CryptoKey field to given value. ### HasCryptoKey -`func (o *GoogleCloudKMSRegisterKeyRequest) HasCryptoKey() bool` +`func (o *GoogleCloudKmsRegisterKeyRequest) HasCryptoKey() bool` HasCryptoKey returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasCryptoKey returns a boolean if a field has been set. ### GetVerify -`func (o *GoogleCloudKMSRegisterKeyRequest) GetVerify() bool` +`func (o *GoogleCloudKmsRegisterKeyRequest) GetVerify() bool` GetVerify returns the Verify field if non-nil, zero value otherwise. ### GetVerifyOk -`func (o *GoogleCloudKMSRegisterKeyRequest) GetVerifyOk() (*bool, bool)` +`func (o *GoogleCloudKmsRegisterKeyRequest) GetVerifyOk() (*bool, bool)` GetVerifyOk returns a tuple with the Verify field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVerify -`func (o *GoogleCloudKMSRegisterKeyRequest) SetVerify(v bool)` +`func (o *GoogleCloudKmsRegisterKeyRequest) SetVerify(v bool)` SetVerify sets Verify field to given value. ### HasVerify -`func (o *GoogleCloudKMSRegisterKeyRequest) HasVerify() bool` +`func (o *GoogleCloudKmsRegisterKeyRequest) HasVerify() bool` HasVerify returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSSignRequest.md b/docs/GoogleCloudKMSSignRequest.md index cd5d46fc..31ba3f30 100644 --- a/docs/GoogleCloudKMSSignRequest.md +++ b/docs/GoogleCloudKMSSignRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSSignRequest +# GoogleCloudKmsSignRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSSignRequest +### NewGoogleCloudKmsSignRequest -`func NewGoogleCloudKMSSignRequest() *GoogleCloudKMSSignRequest` +`func NewGoogleCloudKmsSignRequest() *GoogleCloudKmsSignRequest` -NewGoogleCloudKMSSignRequest instantiates a new GoogleCloudKMSSignRequest object +NewGoogleCloudKmsSignRequest instantiates a new GoogleCloudKmsSignRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSSignRequestWithDefaults +### NewGoogleCloudKmsSignRequestWithDefaults -`func NewGoogleCloudKMSSignRequestWithDefaults() *GoogleCloudKMSSignRequest` +`func NewGoogleCloudKmsSignRequestWithDefaults() *GoogleCloudKmsSignRequest` -NewGoogleCloudKMSSignRequestWithDefaults instantiates a new GoogleCloudKMSSignRequest object +NewGoogleCloudKmsSignRequestWithDefaults instantiates a new GoogleCloudKmsSignRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDigest -`func (o *GoogleCloudKMSSignRequest) GetDigest() string` +`func (o *GoogleCloudKmsSignRequest) GetDigest() string` GetDigest returns the Digest field if non-nil, zero value otherwise. ### GetDigestOk -`func (o *GoogleCloudKMSSignRequest) GetDigestOk() (*string, bool)` +`func (o *GoogleCloudKmsSignRequest) GetDigestOk() (*string, bool)` GetDigestOk returns a tuple with the Digest field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDigest -`func (o *GoogleCloudKMSSignRequest) SetDigest(v string)` +`func (o *GoogleCloudKmsSignRequest) SetDigest(v string)` SetDigest sets Digest field to given value. ### HasDigest -`func (o *GoogleCloudKMSSignRequest) HasDigest() bool` +`func (o *GoogleCloudKmsSignRequest) HasDigest() bool` HasDigest returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasDigest returns a boolean if a field has been set. ### GetKeyVersion -`func (o *GoogleCloudKMSSignRequest) GetKeyVersion() int32` +`func (o *GoogleCloudKmsSignRequest) GetKeyVersion() int32` GetKeyVersion returns the KeyVersion field if non-nil, zero value otherwise. ### GetKeyVersionOk -`func (o *GoogleCloudKMSSignRequest) GetKeyVersionOk() (*int32, bool)` +`func (o *GoogleCloudKmsSignRequest) GetKeyVersionOk() (*int32, bool)` GetKeyVersionOk returns a tuple with the KeyVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyVersion -`func (o *GoogleCloudKMSSignRequest) SetKeyVersion(v int32)` +`func (o *GoogleCloudKmsSignRequest) SetKeyVersion(v int32)` SetKeyVersion sets KeyVersion field to given value. ### HasKeyVersion -`func (o *GoogleCloudKMSSignRequest) HasKeyVersion() bool` +`func (o *GoogleCloudKmsSignRequest) HasKeyVersion() bool` HasKeyVersion returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSVerifyRequest.md b/docs/GoogleCloudKMSVerifyRequest.md index 93b18b67..30beb486 100644 --- a/docs/GoogleCloudKMSVerifyRequest.md +++ b/docs/GoogleCloudKMSVerifyRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSVerifyRequest +# GoogleCloudKmsVerifyRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSVerifyRequest +### NewGoogleCloudKmsVerifyRequest -`func NewGoogleCloudKMSVerifyRequest() *GoogleCloudKMSVerifyRequest` +`func NewGoogleCloudKmsVerifyRequest() *GoogleCloudKmsVerifyRequest` -NewGoogleCloudKMSVerifyRequest instantiates a new GoogleCloudKMSVerifyRequest object +NewGoogleCloudKmsVerifyRequest instantiates a new GoogleCloudKmsVerifyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSVerifyRequestWithDefaults +### NewGoogleCloudKmsVerifyRequestWithDefaults -`func NewGoogleCloudKMSVerifyRequestWithDefaults() *GoogleCloudKMSVerifyRequest` +`func NewGoogleCloudKmsVerifyRequestWithDefaults() *GoogleCloudKmsVerifyRequest` -NewGoogleCloudKMSVerifyRequestWithDefaults instantiates a new GoogleCloudKMSVerifyRequest object +NewGoogleCloudKmsVerifyRequestWithDefaults instantiates a new GoogleCloudKmsVerifyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDigest -`func (o *GoogleCloudKMSVerifyRequest) GetDigest() string` +`func (o *GoogleCloudKmsVerifyRequest) GetDigest() string` GetDigest returns the Digest field if non-nil, zero value otherwise. ### GetDigestOk -`func (o *GoogleCloudKMSVerifyRequest) GetDigestOk() (*string, bool)` +`func (o *GoogleCloudKmsVerifyRequest) GetDigestOk() (*string, bool)` GetDigestOk returns a tuple with the Digest field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDigest -`func (o *GoogleCloudKMSVerifyRequest) SetDigest(v string)` +`func (o *GoogleCloudKmsVerifyRequest) SetDigest(v string)` SetDigest sets Digest field to given value. ### HasDigest -`func (o *GoogleCloudKMSVerifyRequest) HasDigest() bool` +`func (o *GoogleCloudKmsVerifyRequest) HasDigest() bool` HasDigest returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasDigest returns a boolean if a field has been set. ### GetKeyVersion -`func (o *GoogleCloudKMSVerifyRequest) GetKeyVersion() int32` +`func (o *GoogleCloudKmsVerifyRequest) GetKeyVersion() int32` GetKeyVersion returns the KeyVersion field if non-nil, zero value otherwise. ### GetKeyVersionOk -`func (o *GoogleCloudKMSVerifyRequest) GetKeyVersionOk() (*int32, bool)` +`func (o *GoogleCloudKmsVerifyRequest) GetKeyVersionOk() (*int32, bool)` GetKeyVersionOk returns a tuple with the KeyVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyVersion -`func (o *GoogleCloudKMSVerifyRequest) SetKeyVersion(v int32)` +`func (o *GoogleCloudKmsVerifyRequest) SetKeyVersion(v int32)` SetKeyVersion sets KeyVersion field to given value. ### HasKeyVersion -`func (o *GoogleCloudKMSVerifyRequest) HasKeyVersion() bool` +`func (o *GoogleCloudKmsVerifyRequest) HasKeyVersion() bool` HasKeyVersion returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasKeyVersion returns a boolean if a field has been set. ### GetSignature -`func (o *GoogleCloudKMSVerifyRequest) GetSignature() string` +`func (o *GoogleCloudKmsVerifyRequest) GetSignature() string` GetSignature returns the Signature field if non-nil, zero value otherwise. ### GetSignatureOk -`func (o *GoogleCloudKMSVerifyRequest) GetSignatureOk() (*string, bool)` +`func (o *GoogleCloudKmsVerifyRequest) GetSignatureOk() (*string, bool)` GetSignatureOk returns a tuple with the Signature field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignature -`func (o *GoogleCloudKMSVerifyRequest) SetSignature(v string)` +`func (o *GoogleCloudKmsVerifyRequest) SetSignature(v string)` SetSignature sets Signature field to given value. ### HasSignature -`func (o *GoogleCloudKMSVerifyRequest) HasSignature() bool` +`func (o *GoogleCloudKmsVerifyRequest) HasSignature() bool` HasSignature returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSWriteKeyRequest.md b/docs/GoogleCloudKMSWriteKeyRequest.md index cc3ea941..5e36f005 100644 --- a/docs/GoogleCloudKMSWriteKeyRequest.md +++ b/docs/GoogleCloudKMSWriteKeyRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSWriteKeyRequest +# GoogleCloudKmsWriteKeyRequest ## Properties @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSWriteKeyRequest +### NewGoogleCloudKmsWriteKeyRequest -`func NewGoogleCloudKMSWriteKeyRequest() *GoogleCloudKMSWriteKeyRequest` +`func NewGoogleCloudKmsWriteKeyRequest() *GoogleCloudKmsWriteKeyRequest` -NewGoogleCloudKMSWriteKeyRequest instantiates a new GoogleCloudKMSWriteKeyRequest object +NewGoogleCloudKmsWriteKeyRequest instantiates a new GoogleCloudKmsWriteKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSWriteKeyRequestWithDefaults +### NewGoogleCloudKmsWriteKeyRequestWithDefaults -`func NewGoogleCloudKMSWriteKeyRequestWithDefaults() *GoogleCloudKMSWriteKeyRequest` +`func NewGoogleCloudKmsWriteKeyRequestWithDefaults() *GoogleCloudKmsWriteKeyRequest` -NewGoogleCloudKMSWriteKeyRequestWithDefaults instantiates a new GoogleCloudKMSWriteKeyRequest object +NewGoogleCloudKmsWriteKeyRequestWithDefaults instantiates a new GoogleCloudKmsWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAlgorithm -`func (o *GoogleCloudKMSWriteKeyRequest) GetAlgorithm() string` +`func (o *GoogleCloudKmsWriteKeyRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *GoogleCloudKMSWriteKeyRequest) GetAlgorithmOk() (*string, bool)` +`func (o *GoogleCloudKmsWriteKeyRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *GoogleCloudKMSWriteKeyRequest) SetAlgorithm(v string)` +`func (o *GoogleCloudKmsWriteKeyRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *GoogleCloudKMSWriteKeyRequest) HasAlgorithm() bool` +`func (o *GoogleCloudKmsWriteKeyRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. @@ -67,27 +67,27 @@ HasAlgorithm returns a boolean if a field has been set. ### GetCryptoKey -`func (o *GoogleCloudKMSWriteKeyRequest) GetCryptoKey() string` +`func (o *GoogleCloudKmsWriteKeyRequest) GetCryptoKey() string` GetCryptoKey returns the CryptoKey field if non-nil, zero value otherwise. ### GetCryptoKeyOk -`func (o *GoogleCloudKMSWriteKeyRequest) GetCryptoKeyOk() (*string, bool)` +`func (o *GoogleCloudKmsWriteKeyRequest) GetCryptoKeyOk() (*string, bool)` GetCryptoKeyOk returns a tuple with the CryptoKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCryptoKey -`func (o *GoogleCloudKMSWriteKeyRequest) SetCryptoKey(v string)` +`func (o *GoogleCloudKmsWriteKeyRequest) SetCryptoKey(v string)` SetCryptoKey sets CryptoKey field to given value. ### HasCryptoKey -`func (o *GoogleCloudKMSWriteKeyRequest) HasCryptoKey() bool` +`func (o *GoogleCloudKmsWriteKeyRequest) HasCryptoKey() bool` HasCryptoKey returns a boolean if a field has been set. @@ -96,27 +96,27 @@ HasCryptoKey returns a boolean if a field has been set. ### GetKeyRing -`func (o *GoogleCloudKMSWriteKeyRequest) GetKeyRing() string` +`func (o *GoogleCloudKmsWriteKeyRequest) GetKeyRing() string` GetKeyRing returns the KeyRing field if non-nil, zero value otherwise. ### GetKeyRingOk -`func (o *GoogleCloudKMSWriteKeyRequest) GetKeyRingOk() (*string, bool)` +`func (o *GoogleCloudKmsWriteKeyRequest) GetKeyRingOk() (*string, bool)` GetKeyRingOk returns a tuple with the KeyRing field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyRing -`func (o *GoogleCloudKMSWriteKeyRequest) SetKeyRing(v string)` +`func (o *GoogleCloudKmsWriteKeyRequest) SetKeyRing(v string)` SetKeyRing sets KeyRing field to given value. ### HasKeyRing -`func (o *GoogleCloudKMSWriteKeyRequest) HasKeyRing() bool` +`func (o *GoogleCloudKmsWriteKeyRequest) HasKeyRing() bool` HasKeyRing returns a boolean if a field has been set. @@ -125,27 +125,27 @@ HasKeyRing returns a boolean if a field has been set. ### GetLabels -`func (o *GoogleCloudKMSWriteKeyRequest) GetLabels() map[string]interface{}` +`func (o *GoogleCloudKmsWriteKeyRequest) GetLabels() map[string]interface{}` GetLabels returns the Labels field if non-nil, zero value otherwise. ### GetLabelsOk -`func (o *GoogleCloudKMSWriteKeyRequest) GetLabelsOk() (*map[string]interface{}, bool)` +`func (o *GoogleCloudKmsWriteKeyRequest) GetLabelsOk() (*map[string]interface{}, bool)` GetLabelsOk returns a tuple with the Labels field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLabels -`func (o *GoogleCloudKMSWriteKeyRequest) SetLabels(v map[string]interface{})` +`func (o *GoogleCloudKmsWriteKeyRequest) SetLabels(v map[string]interface{})` SetLabels sets Labels field to given value. ### HasLabels -`func (o *GoogleCloudKMSWriteKeyRequest) HasLabels() bool` +`func (o *GoogleCloudKmsWriteKeyRequest) HasLabels() bool` HasLabels returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasLabels returns a boolean if a field has been set. ### GetProtectionLevel -`func (o *GoogleCloudKMSWriteKeyRequest) GetProtectionLevel() string` +`func (o *GoogleCloudKmsWriteKeyRequest) GetProtectionLevel() string` GetProtectionLevel returns the ProtectionLevel field if non-nil, zero value otherwise. ### GetProtectionLevelOk -`func (o *GoogleCloudKMSWriteKeyRequest) GetProtectionLevelOk() (*string, bool)` +`func (o *GoogleCloudKmsWriteKeyRequest) GetProtectionLevelOk() (*string, bool)` GetProtectionLevelOk returns a tuple with the ProtectionLevel field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProtectionLevel -`func (o *GoogleCloudKMSWriteKeyRequest) SetProtectionLevel(v string)` +`func (o *GoogleCloudKmsWriteKeyRequest) SetProtectionLevel(v string)` SetProtectionLevel sets ProtectionLevel field to given value. ### HasProtectionLevel -`func (o *GoogleCloudKMSWriteKeyRequest) HasProtectionLevel() bool` +`func (o *GoogleCloudKmsWriteKeyRequest) HasProtectionLevel() bool` HasProtectionLevel returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasProtectionLevel returns a boolean if a field has been set. ### GetPurpose -`func (o *GoogleCloudKMSWriteKeyRequest) GetPurpose() string` +`func (o *GoogleCloudKmsWriteKeyRequest) GetPurpose() string` GetPurpose returns the Purpose field if non-nil, zero value otherwise. ### GetPurposeOk -`func (o *GoogleCloudKMSWriteKeyRequest) GetPurposeOk() (*string, bool)` +`func (o *GoogleCloudKmsWriteKeyRequest) GetPurposeOk() (*string, bool)` GetPurposeOk returns a tuple with the Purpose field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPurpose -`func (o *GoogleCloudKMSWriteKeyRequest) SetPurpose(v string)` +`func (o *GoogleCloudKmsWriteKeyRequest) SetPurpose(v string)` SetPurpose sets Purpose field to given value. ### HasPurpose -`func (o *GoogleCloudKMSWriteKeyRequest) HasPurpose() bool` +`func (o *GoogleCloudKmsWriteKeyRequest) HasPurpose() bool` HasPurpose returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasPurpose returns a boolean if a field has been set. ### GetRotationPeriod -`func (o *GoogleCloudKMSWriteKeyRequest) GetRotationPeriod() int32` +`func (o *GoogleCloudKmsWriteKeyRequest) GetRotationPeriod() int32` GetRotationPeriod returns the RotationPeriod field if non-nil, zero value otherwise. ### GetRotationPeriodOk -`func (o *GoogleCloudKMSWriteKeyRequest) GetRotationPeriodOk() (*int32, bool)` +`func (o *GoogleCloudKmsWriteKeyRequest) GetRotationPeriodOk() (*int32, bool)` GetRotationPeriodOk returns a tuple with the RotationPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRotationPeriod -`func (o *GoogleCloudKMSWriteKeyRequest) SetRotationPeriod(v int32)` +`func (o *GoogleCloudKmsWriteKeyRequest) SetRotationPeriod(v int32)` SetRotationPeriod sets RotationPeriod field to given value. ### HasRotationPeriod -`func (o *GoogleCloudKMSWriteKeyRequest) HasRotationPeriod() bool` +`func (o *GoogleCloudKmsWriteKeyRequest) HasRotationPeriod() bool` HasRotationPeriod returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSWriteKeyConfigRequest.md b/docs/GoogleCloudKmsConfigureKeyRequest.md similarity index 66% rename from docs/GoogleCloudKMSWriteKeyConfigRequest.md rename to docs/GoogleCloudKmsConfigureKeyRequest.md index 5decf54d..824bfff5 100644 --- a/docs/GoogleCloudKMSWriteKeyConfigRequest.md +++ b/docs/GoogleCloudKmsConfigureKeyRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSWriteKeyConfigRequest +# GoogleCloudKmsConfigureKeyRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSWriteKeyConfigRequest +### NewGoogleCloudKmsConfigureKeyRequest -`func NewGoogleCloudKMSWriteKeyConfigRequest() *GoogleCloudKMSWriteKeyConfigRequest` +`func NewGoogleCloudKmsConfigureKeyRequest() *GoogleCloudKmsConfigureKeyRequest` -NewGoogleCloudKMSWriteKeyConfigRequest instantiates a new GoogleCloudKMSWriteKeyConfigRequest object +NewGoogleCloudKmsConfigureKeyRequest instantiates a new GoogleCloudKmsConfigureKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults +### NewGoogleCloudKmsConfigureKeyRequestWithDefaults -`func NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults() *GoogleCloudKMSWriteKeyConfigRequest` +`func NewGoogleCloudKmsConfigureKeyRequestWithDefaults() *GoogleCloudKmsConfigureKeyRequest` -NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults instantiates a new GoogleCloudKMSWriteKeyConfigRequest object +NewGoogleCloudKmsConfigureKeyRequestWithDefaults instantiates a new GoogleCloudKmsConfigureKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMaxVersion -`func (o *GoogleCloudKMSWriteKeyConfigRequest) GetMaxVersion() int32` +`func (o *GoogleCloudKmsConfigureKeyRequest) GetMaxVersion() int32` GetMaxVersion returns the MaxVersion field if non-nil, zero value otherwise. ### GetMaxVersionOk -`func (o *GoogleCloudKMSWriteKeyConfigRequest) GetMaxVersionOk() (*int32, bool)` +`func (o *GoogleCloudKmsConfigureKeyRequest) GetMaxVersionOk() (*int32, bool)` GetMaxVersionOk returns a tuple with the MaxVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxVersion -`func (o *GoogleCloudKMSWriteKeyConfigRequest) SetMaxVersion(v int32)` +`func (o *GoogleCloudKmsConfigureKeyRequest) SetMaxVersion(v int32)` SetMaxVersion sets MaxVersion field to given value. ### HasMaxVersion -`func (o *GoogleCloudKMSWriteKeyConfigRequest) HasMaxVersion() bool` +`func (o *GoogleCloudKmsConfigureKeyRequest) HasMaxVersion() bool` HasMaxVersion returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasMaxVersion returns a boolean if a field has been set. ### GetMinVersion -`func (o *GoogleCloudKMSWriteKeyConfigRequest) GetMinVersion() int32` +`func (o *GoogleCloudKmsConfigureKeyRequest) GetMinVersion() int32` GetMinVersion returns the MinVersion field if non-nil, zero value otherwise. ### GetMinVersionOk -`func (o *GoogleCloudKMSWriteKeyConfigRequest) GetMinVersionOk() (*int32, bool)` +`func (o *GoogleCloudKmsConfigureKeyRequest) GetMinVersionOk() (*int32, bool)` GetMinVersionOk returns a tuple with the MinVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMinVersion -`func (o *GoogleCloudKMSWriteKeyConfigRequest) SetMinVersion(v int32)` +`func (o *GoogleCloudKmsConfigureKeyRequest) SetMinVersion(v int32)` SetMinVersion sets MinVersion field to given value. ### HasMinVersion -`func (o *GoogleCloudKMSWriteKeyConfigRequest) HasMinVersion() bool` +`func (o *GoogleCloudKmsConfigureKeyRequest) HasMinVersion() bool` HasMinVersion returns a boolean if a field has been set. diff --git a/docs/GoogleCloudKMSWriteConfigRequest.md b/docs/GoogleCloudKmsConfigureRequest.md similarity index 63% rename from docs/GoogleCloudKMSWriteConfigRequest.md rename to docs/GoogleCloudKmsConfigureRequest.md index d6f7753a..8e630f84 100644 --- a/docs/GoogleCloudKMSWriteConfigRequest.md +++ b/docs/GoogleCloudKmsConfigureRequest.md @@ -1,4 +1,4 @@ -# GoogleCloudKMSWriteConfigRequest +# GoogleCloudKmsConfigureRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewGoogleCloudKMSWriteConfigRequest +### NewGoogleCloudKmsConfigureRequest -`func NewGoogleCloudKMSWriteConfigRequest() *GoogleCloudKMSWriteConfigRequest` +`func NewGoogleCloudKmsConfigureRequest() *GoogleCloudKmsConfigureRequest` -NewGoogleCloudKMSWriteConfigRequest instantiates a new GoogleCloudKMSWriteConfigRequest object +NewGoogleCloudKmsConfigureRequest instantiates a new GoogleCloudKmsConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGoogleCloudKMSWriteConfigRequestWithDefaults +### NewGoogleCloudKmsConfigureRequestWithDefaults -`func NewGoogleCloudKMSWriteConfigRequestWithDefaults() *GoogleCloudKMSWriteConfigRequest` +`func NewGoogleCloudKmsConfigureRequestWithDefaults() *GoogleCloudKmsConfigureRequest` -NewGoogleCloudKMSWriteConfigRequestWithDefaults instantiates a new GoogleCloudKMSWriteConfigRequest object +NewGoogleCloudKmsConfigureRequestWithDefaults instantiates a new GoogleCloudKmsConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCredentials -`func (o *GoogleCloudKMSWriteConfigRequest) GetCredentials() string` +`func (o *GoogleCloudKmsConfigureRequest) GetCredentials() string` GetCredentials returns the Credentials field if non-nil, zero value otherwise. ### GetCredentialsOk -`func (o *GoogleCloudKMSWriteConfigRequest) GetCredentialsOk() (*string, bool)` +`func (o *GoogleCloudKmsConfigureRequest) GetCredentialsOk() (*string, bool)` GetCredentialsOk returns a tuple with the Credentials field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCredentials -`func (o *GoogleCloudKMSWriteConfigRequest) SetCredentials(v string)` +`func (o *GoogleCloudKmsConfigureRequest) SetCredentials(v string)` SetCredentials sets Credentials field to given value. ### HasCredentials -`func (o *GoogleCloudKMSWriteConfigRequest) HasCredentials() bool` +`func (o *GoogleCloudKmsConfigureRequest) HasCredentials() bool` HasCredentials returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasCredentials returns a boolean if a field has been set. ### GetScopes -`func (o *GoogleCloudKMSWriteConfigRequest) GetScopes() []string` +`func (o *GoogleCloudKmsConfigureRequest) GetScopes() []string` GetScopes returns the Scopes field if non-nil, zero value otherwise. ### GetScopesOk -`func (o *GoogleCloudKMSWriteConfigRequest) GetScopesOk() (*[]string, bool)` +`func (o *GoogleCloudKmsConfigureRequest) GetScopesOk() (*[]string, bool)` GetScopesOk returns a tuple with the Scopes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetScopes -`func (o *GoogleCloudKMSWriteConfigRequest) SetScopes(v []string)` +`func (o *GoogleCloudKmsConfigureRequest) SetScopes(v []string)` SetScopes sets Scopes field to given value. ### HasScopes -`func (o *GoogleCloudKMSWriteConfigRequest) HasScopes() bool` +`func (o *GoogleCloudKmsConfigureRequest) HasScopes() bool` HasScopes returns a boolean if a field has been set. diff --git a/docs/GoogleCloudWriteImpersonatedAccountRequest.md b/docs/GoogleCloudWriteImpersonatedAccountRequest.md new file mode 100644 index 00000000..bc13e4ed --- /dev/null +++ b/docs/GoogleCloudWriteImpersonatedAccountRequest.md @@ -0,0 +1,129 @@ +# GoogleCloudWriteImpersonatedAccountRequest + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ServiceAccountEmail** | Pointer to **string** | Required. Email of the GCP service account to manage. Cannot be updated. | [optional] +**TokenScopes** | Pointer to **[]string** | List of OAuth scopes to assign to access tokens generated under this account. | [optional] +**Ttl** | Pointer to **int32** | Lifetime of the token for the impersonated account. | [optional] + + + +## Methods + + +### NewGoogleCloudWriteImpersonatedAccountRequest + +`func NewGoogleCloudWriteImpersonatedAccountRequest() *GoogleCloudWriteImpersonatedAccountRequest` + +NewGoogleCloudWriteImpersonatedAccountRequest instantiates a new GoogleCloudWriteImpersonatedAccountRequest object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewGoogleCloudWriteImpersonatedAccountRequestWithDefaults + +`func NewGoogleCloudWriteImpersonatedAccountRequestWithDefaults() *GoogleCloudWriteImpersonatedAccountRequest` + +NewGoogleCloudWriteImpersonatedAccountRequestWithDefaults instantiates a new GoogleCloudWriteImpersonatedAccountRequest object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetServiceAccountEmail + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) GetServiceAccountEmail() string` + +GetServiceAccountEmail returns the ServiceAccountEmail field if non-nil, zero value otherwise. + +### GetServiceAccountEmailOk + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) GetServiceAccountEmailOk() (*string, bool)` + +GetServiceAccountEmailOk returns a tuple with the ServiceAccountEmail field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetServiceAccountEmail + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) SetServiceAccountEmail(v string)` + +SetServiceAccountEmail sets ServiceAccountEmail field to given value. + + +### HasServiceAccountEmail + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) HasServiceAccountEmail() bool` + +HasServiceAccountEmail returns a boolean if a field has been set. + + + + +### GetTokenScopes + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) GetTokenScopes() []string` + +GetTokenScopes returns the TokenScopes field if non-nil, zero value otherwise. + +### GetTokenScopesOk + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) GetTokenScopesOk() (*[]string, bool)` + +GetTokenScopesOk returns a tuple with the TokenScopes field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTokenScopes + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) SetTokenScopes(v []string)` + +SetTokenScopes sets TokenScopes field to given value. + + +### HasTokenScopes + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) HasTokenScopes() bool` + +HasTokenScopes returns a boolean if a field has been set. + + + + +### GetTtl + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) GetTtl() int32` + +GetTtl returns the Ttl field if non-nil, zero value otherwise. + +### GetTtlOk + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) GetTtlOk() (*int32, bool)` + +GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTtl + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) SetTtl(v int32)` + +SetTtl sets Ttl field to given value. + + +### HasTtl + +`func (o *GoogleCloudWriteImpersonatedAccountRequest) HasTtl() bool` + +HasTtl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/GroupWriteAliasRequest.md b/docs/GroupCreateAliasRequest.md similarity index 65% rename from docs/GroupWriteAliasRequest.md rename to docs/GroupCreateAliasRequest.md index 3302cf11..5d2341e0 100644 --- a/docs/GroupWriteAliasRequest.md +++ b/docs/GroupCreateAliasRequest.md @@ -1,4 +1,4 @@ -# GroupWriteAliasRequest +# GroupCreateAliasRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewGroupWriteAliasRequest +### NewGroupCreateAliasRequest -`func NewGroupWriteAliasRequest() *GroupWriteAliasRequest` +`func NewGroupCreateAliasRequest() *GroupCreateAliasRequest` -NewGroupWriteAliasRequest instantiates a new GroupWriteAliasRequest object +NewGroupCreateAliasRequest instantiates a new GroupCreateAliasRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGroupWriteAliasRequestWithDefaults +### NewGroupCreateAliasRequestWithDefaults -`func NewGroupWriteAliasRequestWithDefaults() *GroupWriteAliasRequest` +`func NewGroupCreateAliasRequestWithDefaults() *GroupCreateAliasRequest` -NewGroupWriteAliasRequestWithDefaults instantiates a new GroupWriteAliasRequest object +NewGroupCreateAliasRequestWithDefaults instantiates a new GroupCreateAliasRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCanonicalId -`func (o *GroupWriteAliasRequest) GetCanonicalId() string` +`func (o *GroupCreateAliasRequest) GetCanonicalId() string` GetCanonicalId returns the CanonicalId field if non-nil, zero value otherwise. ### GetCanonicalIdOk -`func (o *GroupWriteAliasRequest) GetCanonicalIdOk() (*string, bool)` +`func (o *GroupCreateAliasRequest) GetCanonicalIdOk() (*string, bool)` GetCanonicalIdOk returns a tuple with the CanonicalId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCanonicalId -`func (o *GroupWriteAliasRequest) SetCanonicalId(v string)` +`func (o *GroupCreateAliasRequest) SetCanonicalId(v string)` SetCanonicalId sets CanonicalId field to given value. ### HasCanonicalId -`func (o *GroupWriteAliasRequest) HasCanonicalId() bool` +`func (o *GroupCreateAliasRequest) HasCanonicalId() bool` HasCanonicalId returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasCanonicalId returns a boolean if a field has been set. ### GetId -`func (o *GroupWriteAliasRequest) GetId() string` +`func (o *GroupCreateAliasRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *GroupWriteAliasRequest) GetIdOk() (*string, bool)` +`func (o *GroupCreateAliasRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *GroupWriteAliasRequest) SetId(v string)` +`func (o *GroupCreateAliasRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *GroupWriteAliasRequest) HasId() bool` +`func (o *GroupCreateAliasRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasId returns a boolean if a field has been set. ### GetMountAccessor -`func (o *GroupWriteAliasRequest) GetMountAccessor() string` +`func (o *GroupCreateAliasRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *GroupWriteAliasRequest) GetMountAccessorOk() (*string, bool)` +`func (o *GroupCreateAliasRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *GroupWriteAliasRequest) SetMountAccessor(v string)` +`func (o *GroupCreateAliasRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *GroupWriteAliasRequest) HasMountAccessor() bool` +`func (o *GroupCreateAliasRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *GroupWriteAliasRequest) GetName() string` +`func (o *GroupCreateAliasRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *GroupWriteAliasRequest) GetNameOk() (*string, bool)` +`func (o *GroupCreateAliasRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *GroupWriteAliasRequest) SetName(v string)` +`func (o *GroupCreateAliasRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *GroupWriteAliasRequest) HasName() bool` +`func (o *GroupCreateAliasRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/GroupWriteRequest.md b/docs/GroupCreateRequest.md similarity index 69% rename from docs/GroupWriteRequest.md rename to docs/GroupCreateRequest.md index 7d4b172a..83ef6fd9 100644 --- a/docs/GroupWriteRequest.md +++ b/docs/GroupCreateRequest.md @@ -1,4 +1,4 @@ -# GroupWriteRequest +# GroupCreateRequest ## Properties @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewGroupWriteRequest +### NewGroupCreateRequest -`func NewGroupWriteRequest() *GroupWriteRequest` +`func NewGroupCreateRequest() *GroupCreateRequest` -NewGroupWriteRequest instantiates a new GroupWriteRequest object +NewGroupCreateRequest instantiates a new GroupCreateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGroupWriteRequestWithDefaults +### NewGroupCreateRequestWithDefaults -`func NewGroupWriteRequestWithDefaults() *GroupWriteRequest` +`func NewGroupCreateRequestWithDefaults() *GroupCreateRequest` -NewGroupWriteRequestWithDefaults instantiates a new GroupWriteRequest object +NewGroupCreateRequestWithDefaults instantiates a new GroupCreateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetId -`func (o *GroupWriteRequest) GetId() string` +`func (o *GroupCreateRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *GroupWriteRequest) GetIdOk() (*string, bool)` +`func (o *GroupCreateRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *GroupWriteRequest) SetId(v string)` +`func (o *GroupCreateRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *GroupWriteRequest) HasId() bool` +`func (o *GroupCreateRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -67,27 +67,27 @@ HasId returns a boolean if a field has been set. ### GetMemberEntityIds -`func (o *GroupWriteRequest) GetMemberEntityIds() []string` +`func (o *GroupCreateRequest) GetMemberEntityIds() []string` GetMemberEntityIds returns the MemberEntityIds field if non-nil, zero value otherwise. ### GetMemberEntityIdsOk -`func (o *GroupWriteRequest) GetMemberEntityIdsOk() (*[]string, bool)` +`func (o *GroupCreateRequest) GetMemberEntityIdsOk() (*[]string, bool)` GetMemberEntityIdsOk returns a tuple with the MemberEntityIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMemberEntityIds -`func (o *GroupWriteRequest) SetMemberEntityIds(v []string)` +`func (o *GroupCreateRequest) SetMemberEntityIds(v []string)` SetMemberEntityIds sets MemberEntityIds field to given value. ### HasMemberEntityIds -`func (o *GroupWriteRequest) HasMemberEntityIds() bool` +`func (o *GroupCreateRequest) HasMemberEntityIds() bool` HasMemberEntityIds returns a boolean if a field has been set. @@ -96,27 +96,27 @@ HasMemberEntityIds returns a boolean if a field has been set. ### GetMemberGroupIds -`func (o *GroupWriteRequest) GetMemberGroupIds() []string` +`func (o *GroupCreateRequest) GetMemberGroupIds() []string` GetMemberGroupIds returns the MemberGroupIds field if non-nil, zero value otherwise. ### GetMemberGroupIdsOk -`func (o *GroupWriteRequest) GetMemberGroupIdsOk() (*[]string, bool)` +`func (o *GroupCreateRequest) GetMemberGroupIdsOk() (*[]string, bool)` GetMemberGroupIdsOk returns a tuple with the MemberGroupIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMemberGroupIds -`func (o *GroupWriteRequest) SetMemberGroupIds(v []string)` +`func (o *GroupCreateRequest) SetMemberGroupIds(v []string)` SetMemberGroupIds sets MemberGroupIds field to given value. ### HasMemberGroupIds -`func (o *GroupWriteRequest) HasMemberGroupIds() bool` +`func (o *GroupCreateRequest) HasMemberGroupIds() bool` HasMemberGroupIds returns a boolean if a field has been set. @@ -125,27 +125,27 @@ HasMemberGroupIds returns a boolean if a field has been set. ### GetMetadata -`func (o *GroupWriteRequest) GetMetadata() map[string]interface{}` +`func (o *GroupCreateRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *GroupWriteRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *GroupCreateRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *GroupWriteRequest) SetMetadata(v map[string]interface{})` +`func (o *GroupCreateRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *GroupWriteRequest) HasMetadata() bool` +`func (o *GroupCreateRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasMetadata returns a boolean if a field has been set. ### GetName -`func (o *GroupWriteRequest) GetName() string` +`func (o *GroupCreateRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *GroupWriteRequest) GetNameOk() (*string, bool)` +`func (o *GroupCreateRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *GroupWriteRequest) SetName(v string)` +`func (o *GroupCreateRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *GroupWriteRequest) HasName() bool` +`func (o *GroupCreateRequest) HasName() bool` HasName returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasName returns a boolean if a field has been set. ### GetPolicies -`func (o *GroupWriteRequest) GetPolicies() []string` +`func (o *GroupCreateRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *GroupWriteRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *GroupCreateRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *GroupWriteRequest) SetPolicies(v []string)` +`func (o *GroupCreateRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *GroupWriteRequest) HasPolicies() bool` +`func (o *GroupCreateRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasPolicies returns a boolean if a field has been set. ### GetType -`func (o *GroupWriteRequest) GetType() string` +`func (o *GroupCreateRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *GroupWriteRequest) GetTypeOk() (*string, bool)` +`func (o *GroupCreateRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *GroupWriteRequest) SetType(v string)` +`func (o *GroupCreateRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *GroupWriteRequest) HasType() bool` +`func (o *GroupCreateRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/GroupLookupRequest.md b/docs/GroupLookupRequest.md index d60ec5aa..f0da1171 100644 --- a/docs/GroupLookupRequest.md +++ b/docs/GroupLookupRequest.md @@ -1,4 +1,4 @@ -# GroupLookupRequest +# GroupLookUpRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewGroupLookupRequest +### NewGroupLookUpRequest -`func NewGroupLookupRequest() *GroupLookupRequest` +`func NewGroupLookUpRequest() *GroupLookUpRequest` -NewGroupLookupRequest instantiates a new GroupLookupRequest object +NewGroupLookUpRequest instantiates a new GroupLookUpRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGroupLookupRequestWithDefaults +### NewGroupLookUpRequestWithDefaults -`func NewGroupLookupRequestWithDefaults() *GroupLookupRequest` +`func NewGroupLookUpRequestWithDefaults() *GroupLookUpRequest` -NewGroupLookupRequestWithDefaults instantiates a new GroupLookupRequest object +NewGroupLookUpRequestWithDefaults instantiates a new GroupLookUpRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAliasId -`func (o *GroupLookupRequest) GetAliasId() string` +`func (o *GroupLookUpRequest) GetAliasId() string` GetAliasId returns the AliasId field if non-nil, zero value otherwise. ### GetAliasIdOk -`func (o *GroupLookupRequest) GetAliasIdOk() (*string, bool)` +`func (o *GroupLookUpRequest) GetAliasIdOk() (*string, bool)` GetAliasIdOk returns a tuple with the AliasId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAliasId -`func (o *GroupLookupRequest) SetAliasId(v string)` +`func (o *GroupLookUpRequest) SetAliasId(v string)` SetAliasId sets AliasId field to given value. ### HasAliasId -`func (o *GroupLookupRequest) HasAliasId() bool` +`func (o *GroupLookUpRequest) HasAliasId() bool` HasAliasId returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasAliasId returns a boolean if a field has been set. ### GetAliasMountAccessor -`func (o *GroupLookupRequest) GetAliasMountAccessor() string` +`func (o *GroupLookUpRequest) GetAliasMountAccessor() string` GetAliasMountAccessor returns the AliasMountAccessor field if non-nil, zero value otherwise. ### GetAliasMountAccessorOk -`func (o *GroupLookupRequest) GetAliasMountAccessorOk() (*string, bool)` +`func (o *GroupLookUpRequest) GetAliasMountAccessorOk() (*string, bool)` GetAliasMountAccessorOk returns a tuple with the AliasMountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAliasMountAccessor -`func (o *GroupLookupRequest) SetAliasMountAccessor(v string)` +`func (o *GroupLookUpRequest) SetAliasMountAccessor(v string)` SetAliasMountAccessor sets AliasMountAccessor field to given value. ### HasAliasMountAccessor -`func (o *GroupLookupRequest) HasAliasMountAccessor() bool` +`func (o *GroupLookUpRequest) HasAliasMountAccessor() bool` HasAliasMountAccessor returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasAliasMountAccessor returns a boolean if a field has been set. ### GetAliasName -`func (o *GroupLookupRequest) GetAliasName() string` +`func (o *GroupLookUpRequest) GetAliasName() string` GetAliasName returns the AliasName field if non-nil, zero value otherwise. ### GetAliasNameOk -`func (o *GroupLookupRequest) GetAliasNameOk() (*string, bool)` +`func (o *GroupLookUpRequest) GetAliasNameOk() (*string, bool)` GetAliasNameOk returns a tuple with the AliasName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAliasName -`func (o *GroupLookupRequest) SetAliasName(v string)` +`func (o *GroupLookUpRequest) SetAliasName(v string)` SetAliasName sets AliasName field to given value. ### HasAliasName -`func (o *GroupLookupRequest) HasAliasName() bool` +`func (o *GroupLookUpRequest) HasAliasName() bool` HasAliasName returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasAliasName returns a boolean if a field has been set. ### GetId -`func (o *GroupLookupRequest) GetId() string` +`func (o *GroupLookUpRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *GroupLookupRequest) GetIdOk() (*string, bool)` +`func (o *GroupLookUpRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *GroupLookupRequest) SetId(v string)` +`func (o *GroupLookUpRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *GroupLookupRequest) HasId() bool` +`func (o *GroupLookUpRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasId returns a boolean if a field has been set. ### GetName -`func (o *GroupLookupRequest) GetName() string` +`func (o *GroupLookUpRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *GroupLookupRequest) GetNameOk() (*string, bool)` +`func (o *GroupLookUpRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *GroupLookupRequest) SetName(v string)` +`func (o *GroupLookUpRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *GroupLookupRequest) HasName() bool` +`func (o *GroupLookUpRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/GroupWriteAliasByIDRequest.md b/docs/GroupUpdateAliasByIdRequest.md similarity index 64% rename from docs/GroupWriteAliasByIDRequest.md rename to docs/GroupUpdateAliasByIdRequest.md index 2054ca2b..7bb7b93e 100644 --- a/docs/GroupWriteAliasByIDRequest.md +++ b/docs/GroupUpdateAliasByIdRequest.md @@ -1,4 +1,4 @@ -# GroupWriteAliasByIDRequest +# GroupUpdateAliasByIdRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewGroupWriteAliasByIDRequest +### NewGroupUpdateAliasByIdRequest -`func NewGroupWriteAliasByIDRequest() *GroupWriteAliasByIDRequest` +`func NewGroupUpdateAliasByIdRequest() *GroupUpdateAliasByIdRequest` -NewGroupWriteAliasByIDRequest instantiates a new GroupWriteAliasByIDRequest object +NewGroupUpdateAliasByIdRequest instantiates a new GroupUpdateAliasByIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGroupWriteAliasByIDRequestWithDefaults +### NewGroupUpdateAliasByIdRequestWithDefaults -`func NewGroupWriteAliasByIDRequestWithDefaults() *GroupWriteAliasByIDRequest` +`func NewGroupUpdateAliasByIdRequestWithDefaults() *GroupUpdateAliasByIdRequest` -NewGroupWriteAliasByIDRequestWithDefaults instantiates a new GroupWriteAliasByIDRequest object +NewGroupUpdateAliasByIdRequestWithDefaults instantiates a new GroupUpdateAliasByIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCanonicalId -`func (o *GroupWriteAliasByIDRequest) GetCanonicalId() string` +`func (o *GroupUpdateAliasByIdRequest) GetCanonicalId() string` GetCanonicalId returns the CanonicalId field if non-nil, zero value otherwise. ### GetCanonicalIdOk -`func (o *GroupWriteAliasByIDRequest) GetCanonicalIdOk() (*string, bool)` +`func (o *GroupUpdateAliasByIdRequest) GetCanonicalIdOk() (*string, bool)` GetCanonicalIdOk returns a tuple with the CanonicalId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCanonicalId -`func (o *GroupWriteAliasByIDRequest) SetCanonicalId(v string)` +`func (o *GroupUpdateAliasByIdRequest) SetCanonicalId(v string)` SetCanonicalId sets CanonicalId field to given value. ### HasCanonicalId -`func (o *GroupWriteAliasByIDRequest) HasCanonicalId() bool` +`func (o *GroupUpdateAliasByIdRequest) HasCanonicalId() bool` HasCanonicalId returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasCanonicalId returns a boolean if a field has been set. ### GetMountAccessor -`func (o *GroupWriteAliasByIDRequest) GetMountAccessor() string` +`func (o *GroupUpdateAliasByIdRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *GroupWriteAliasByIDRequest) GetMountAccessorOk() (*string, bool)` +`func (o *GroupUpdateAliasByIdRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *GroupWriteAliasByIDRequest) SetMountAccessor(v string)` +`func (o *GroupUpdateAliasByIdRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *GroupWriteAliasByIDRequest) HasMountAccessor() bool` +`func (o *GroupUpdateAliasByIdRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *GroupWriteAliasByIDRequest) GetName() string` +`func (o *GroupUpdateAliasByIdRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *GroupWriteAliasByIDRequest) GetNameOk() (*string, bool)` +`func (o *GroupUpdateAliasByIdRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *GroupWriteAliasByIDRequest) SetName(v string)` +`func (o *GroupUpdateAliasByIdRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *GroupWriteAliasByIDRequest) HasName() bool` +`func (o *GroupUpdateAliasByIdRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/GroupWriteByIDRequest.md b/docs/GroupUpdateByIdRequest.md similarity index 67% rename from docs/GroupWriteByIDRequest.md rename to docs/GroupUpdateByIdRequest.md index 5a84a089..b26a942a 100644 --- a/docs/GroupWriteByIDRequest.md +++ b/docs/GroupUpdateByIdRequest.md @@ -1,4 +1,4 @@ -# GroupWriteByIDRequest +# GroupUpdateByIdRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewGroupWriteByIDRequest +### NewGroupUpdateByIdRequest -`func NewGroupWriteByIDRequest() *GroupWriteByIDRequest` +`func NewGroupUpdateByIdRequest() *GroupUpdateByIdRequest` -NewGroupWriteByIDRequest instantiates a new GroupWriteByIDRequest object +NewGroupUpdateByIdRequest instantiates a new GroupUpdateByIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGroupWriteByIDRequestWithDefaults +### NewGroupUpdateByIdRequestWithDefaults -`func NewGroupWriteByIDRequestWithDefaults() *GroupWriteByIDRequest` +`func NewGroupUpdateByIdRequestWithDefaults() *GroupUpdateByIdRequest` -NewGroupWriteByIDRequestWithDefaults instantiates a new GroupWriteByIDRequest object +NewGroupUpdateByIdRequestWithDefaults instantiates a new GroupUpdateByIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMemberEntityIds -`func (o *GroupWriteByIDRequest) GetMemberEntityIds() []string` +`func (o *GroupUpdateByIdRequest) GetMemberEntityIds() []string` GetMemberEntityIds returns the MemberEntityIds field if non-nil, zero value otherwise. ### GetMemberEntityIdsOk -`func (o *GroupWriteByIDRequest) GetMemberEntityIdsOk() (*[]string, bool)` +`func (o *GroupUpdateByIdRequest) GetMemberEntityIdsOk() (*[]string, bool)` GetMemberEntityIdsOk returns a tuple with the MemberEntityIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMemberEntityIds -`func (o *GroupWriteByIDRequest) SetMemberEntityIds(v []string)` +`func (o *GroupUpdateByIdRequest) SetMemberEntityIds(v []string)` SetMemberEntityIds sets MemberEntityIds field to given value. ### HasMemberEntityIds -`func (o *GroupWriteByIDRequest) HasMemberEntityIds() bool` +`func (o *GroupUpdateByIdRequest) HasMemberEntityIds() bool` HasMemberEntityIds returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasMemberEntityIds returns a boolean if a field has been set. ### GetMemberGroupIds -`func (o *GroupWriteByIDRequest) GetMemberGroupIds() []string` +`func (o *GroupUpdateByIdRequest) GetMemberGroupIds() []string` GetMemberGroupIds returns the MemberGroupIds field if non-nil, zero value otherwise. ### GetMemberGroupIdsOk -`func (o *GroupWriteByIDRequest) GetMemberGroupIdsOk() (*[]string, bool)` +`func (o *GroupUpdateByIdRequest) GetMemberGroupIdsOk() (*[]string, bool)` GetMemberGroupIdsOk returns a tuple with the MemberGroupIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMemberGroupIds -`func (o *GroupWriteByIDRequest) SetMemberGroupIds(v []string)` +`func (o *GroupUpdateByIdRequest) SetMemberGroupIds(v []string)` SetMemberGroupIds sets MemberGroupIds field to given value. ### HasMemberGroupIds -`func (o *GroupWriteByIDRequest) HasMemberGroupIds() bool` +`func (o *GroupUpdateByIdRequest) HasMemberGroupIds() bool` HasMemberGroupIds returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasMemberGroupIds returns a boolean if a field has been set. ### GetMetadata -`func (o *GroupWriteByIDRequest) GetMetadata() map[string]interface{}` +`func (o *GroupUpdateByIdRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *GroupWriteByIDRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *GroupUpdateByIdRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *GroupWriteByIDRequest) SetMetadata(v map[string]interface{})` +`func (o *GroupUpdateByIdRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *GroupWriteByIDRequest) HasMetadata() bool` +`func (o *GroupUpdateByIdRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasMetadata returns a boolean if a field has been set. ### GetName -`func (o *GroupWriteByIDRequest) GetName() string` +`func (o *GroupUpdateByIdRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *GroupWriteByIDRequest) GetNameOk() (*string, bool)` +`func (o *GroupUpdateByIdRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *GroupWriteByIDRequest) SetName(v string)` +`func (o *GroupUpdateByIdRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *GroupWriteByIDRequest) HasName() bool` +`func (o *GroupUpdateByIdRequest) HasName() bool` HasName returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasName returns a boolean if a field has been set. ### GetPolicies -`func (o *GroupWriteByIDRequest) GetPolicies() []string` +`func (o *GroupUpdateByIdRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *GroupWriteByIDRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *GroupUpdateByIdRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *GroupWriteByIDRequest) SetPolicies(v []string)` +`func (o *GroupUpdateByIdRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *GroupWriteByIDRequest) HasPolicies() bool` +`func (o *GroupUpdateByIdRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasPolicies returns a boolean if a field has been set. ### GetType -`func (o *GroupWriteByIDRequest) GetType() string` +`func (o *GroupUpdateByIdRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *GroupWriteByIDRequest) GetTypeOk() (*string, bool)` +`func (o *GroupUpdateByIdRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *GroupWriteByIDRequest) SetType(v string)` +`func (o *GroupUpdateByIdRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *GroupWriteByIDRequest) HasType() bool` +`func (o *GroupUpdateByIdRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/GroupWriteByNameRequest.md b/docs/GroupUpdateByNameRequest.md similarity index 67% rename from docs/GroupWriteByNameRequest.md rename to docs/GroupUpdateByNameRequest.md index 0c19759b..c6aea635 100644 --- a/docs/GroupWriteByNameRequest.md +++ b/docs/GroupUpdateByNameRequest.md @@ -1,4 +1,4 @@ -# GroupWriteByNameRequest +# GroupUpdateByNameRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewGroupWriteByNameRequest +### NewGroupUpdateByNameRequest -`func NewGroupWriteByNameRequest() *GroupWriteByNameRequest` +`func NewGroupUpdateByNameRequest() *GroupUpdateByNameRequest` -NewGroupWriteByNameRequest instantiates a new GroupWriteByNameRequest object +NewGroupUpdateByNameRequest instantiates a new GroupUpdateByNameRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewGroupWriteByNameRequestWithDefaults +### NewGroupUpdateByNameRequestWithDefaults -`func NewGroupWriteByNameRequestWithDefaults() *GroupWriteByNameRequest` +`func NewGroupUpdateByNameRequestWithDefaults() *GroupUpdateByNameRequest` -NewGroupWriteByNameRequestWithDefaults instantiates a new GroupWriteByNameRequest object +NewGroupUpdateByNameRequestWithDefaults instantiates a new GroupUpdateByNameRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetId -`func (o *GroupWriteByNameRequest) GetId() string` +`func (o *GroupUpdateByNameRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *GroupWriteByNameRequest) GetIdOk() (*string, bool)` +`func (o *GroupUpdateByNameRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *GroupWriteByNameRequest) SetId(v string)` +`func (o *GroupUpdateByNameRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *GroupWriteByNameRequest) HasId() bool` +`func (o *GroupUpdateByNameRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasId returns a boolean if a field has been set. ### GetMemberEntityIds -`func (o *GroupWriteByNameRequest) GetMemberEntityIds() []string` +`func (o *GroupUpdateByNameRequest) GetMemberEntityIds() []string` GetMemberEntityIds returns the MemberEntityIds field if non-nil, zero value otherwise. ### GetMemberEntityIdsOk -`func (o *GroupWriteByNameRequest) GetMemberEntityIdsOk() (*[]string, bool)` +`func (o *GroupUpdateByNameRequest) GetMemberEntityIdsOk() (*[]string, bool)` GetMemberEntityIdsOk returns a tuple with the MemberEntityIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMemberEntityIds -`func (o *GroupWriteByNameRequest) SetMemberEntityIds(v []string)` +`func (o *GroupUpdateByNameRequest) SetMemberEntityIds(v []string)` SetMemberEntityIds sets MemberEntityIds field to given value. ### HasMemberEntityIds -`func (o *GroupWriteByNameRequest) HasMemberEntityIds() bool` +`func (o *GroupUpdateByNameRequest) HasMemberEntityIds() bool` HasMemberEntityIds returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasMemberEntityIds returns a boolean if a field has been set. ### GetMemberGroupIds -`func (o *GroupWriteByNameRequest) GetMemberGroupIds() []string` +`func (o *GroupUpdateByNameRequest) GetMemberGroupIds() []string` GetMemberGroupIds returns the MemberGroupIds field if non-nil, zero value otherwise. ### GetMemberGroupIdsOk -`func (o *GroupWriteByNameRequest) GetMemberGroupIdsOk() (*[]string, bool)` +`func (o *GroupUpdateByNameRequest) GetMemberGroupIdsOk() (*[]string, bool)` GetMemberGroupIdsOk returns a tuple with the MemberGroupIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMemberGroupIds -`func (o *GroupWriteByNameRequest) SetMemberGroupIds(v []string)` +`func (o *GroupUpdateByNameRequest) SetMemberGroupIds(v []string)` SetMemberGroupIds sets MemberGroupIds field to given value. ### HasMemberGroupIds -`func (o *GroupWriteByNameRequest) HasMemberGroupIds() bool` +`func (o *GroupUpdateByNameRequest) HasMemberGroupIds() bool` HasMemberGroupIds returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasMemberGroupIds returns a boolean if a field has been set. ### GetMetadata -`func (o *GroupWriteByNameRequest) GetMetadata() map[string]interface{}` +`func (o *GroupUpdateByNameRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *GroupWriteByNameRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *GroupUpdateByNameRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *GroupWriteByNameRequest) SetMetadata(v map[string]interface{})` +`func (o *GroupUpdateByNameRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *GroupWriteByNameRequest) HasMetadata() bool` +`func (o *GroupUpdateByNameRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasMetadata returns a boolean if a field has been set. ### GetPolicies -`func (o *GroupWriteByNameRequest) GetPolicies() []string` +`func (o *GroupUpdateByNameRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *GroupWriteByNameRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *GroupUpdateByNameRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *GroupWriteByNameRequest) SetPolicies(v []string)` +`func (o *GroupUpdateByNameRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *GroupWriteByNameRequest) HasPolicies() bool` +`func (o *GroupUpdateByNameRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasPolicies returns a boolean if a field has been set. ### GetType -`func (o *GroupWriteByNameRequest) GetType() string` +`func (o *GroupUpdateByNameRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *GroupWriteByNameRequest) GetTypeOk() (*string, bool)` +`func (o *GroupUpdateByNameRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *GroupWriteByNameRequest) SetType(v string)` +`func (o *GroupUpdateByNameRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *GroupWriteByNameRequest) HasType() bool` +`func (o *GroupUpdateByNameRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/HaStatusResponse.md b/docs/HaStatusResponse.md new file mode 100644 index 00000000..f393b4a5 --- /dev/null +++ b/docs/HaStatusResponse.md @@ -0,0 +1,69 @@ +# HaStatusResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Nodes** | Pointer to **[]map[string]interface{}** | | [optional] + + + +## Methods + + +### NewHaStatusResponse + +`func NewHaStatusResponse() *HaStatusResponse` + +NewHaStatusResponse instantiates a new HaStatusResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewHaStatusResponseWithDefaults + +`func NewHaStatusResponseWithDefaults() *HaStatusResponse` + +NewHaStatusResponseWithDefaults instantiates a new HaStatusResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetNodes + +`func (o *HaStatusResponse) GetNodes() []map[string]interface{}` + +GetNodes returns the Nodes field if non-nil, zero value otherwise. + +### GetNodesOk + +`func (o *HaStatusResponse) GetNodesOk() (*[]map[string]interface{}, bool)` + +GetNodesOk returns a tuple with the Nodes field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNodes + +`func (o *HaStatusResponse) SetNodes(v []map[string]interface{})` + +SetNodes sets Nodes field to given value. + + +### HasNodes + +`func (o *HaStatusResponse) HasNodes() bool` + +HasNodes returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/IdentityApi.md b/docs/IdentityApi.md index 847a30e4..6e93317a 100644 --- a/docs/IdentityApi.md +++ b/docs/IdentityApi.md @@ -2,119 +2,177 @@ Method | HTTP request | Description ------------- | ------------- | ------------- -[**AliasDeleteByID**](IdentityApi.md#AliasDeleteByID) | **Delete** /identity/alias/id/{id} | Update, read or delete an alias ID. -[**AliasListByID**](IdentityApi.md#AliasListByID) | **Get** /identity/alias/id | List all the alias IDs. -[**AliasReadByID**](IdentityApi.md#AliasReadByID) | **Get** /identity/alias/id/{id} | Update, read or delete an alias ID. -[**AliasWrite**](IdentityApi.md#AliasWrite) | **Post** /identity/alias | Create a new alias. -[**AliasWriteByID**](IdentityApi.md#AliasWriteByID) | **Post** /identity/alias/id/{id} | Update, read or delete an alias ID. +[**AliasCreate**](IdentityApi.md#AliasCreate) | **Post** /identity/alias | Create a new alias. +[**AliasDeleteById**](IdentityApi.md#AliasDeleteById) | **Delete** /identity/alias/id/{id} | +[**AliasListById**](IdentityApi.md#AliasListById) | **Get** /identity/alias/id | List all the alias IDs. +[**AliasReadById**](IdentityApi.md#AliasReadById) | **Get** /identity/alias/id/{id} | +[**AliasUpdateById**](IdentityApi.md#AliasUpdateById) | **Post** /identity/alias/id/{id} | [**EntityBatchDelete**](IdentityApi.md#EntityBatchDelete) | **Post** /identity/entity/batch-delete | Delete all of the entities provided -[**EntityDeleteAliasByID**](IdentityApi.md#EntityDeleteAliasByID) | **Delete** /identity/entity-alias/id/{id} | Update, read or delete an alias ID. -[**EntityDeleteByID**](IdentityApi.md#EntityDeleteByID) | **Delete** /identity/entity/id/{id} | Update, read or delete an entity using entity ID -[**EntityDeleteByName**](IdentityApi.md#EntityDeleteByName) | **Delete** /identity/entity/name/{name} | Update, read or delete an entity using entity name -[**EntityListAliasesByID**](IdentityApi.md#EntityListAliasesByID) | **Get** /identity/entity-alias/id | List all the alias IDs. -[**EntityListByID**](IdentityApi.md#EntityListByID) | **Get** /identity/entity/id | List all the entity IDs +[**EntityCreate**](IdentityApi.md#EntityCreate) | **Post** /identity/entity | Create a new entity +[**EntityCreateAlias**](IdentityApi.md#EntityCreateAlias) | **Post** /identity/entity-alias | Create a new alias. +[**EntityDeleteAliasById**](IdentityApi.md#EntityDeleteAliasById) | **Delete** /identity/entity-alias/id/{id} | +[**EntityDeleteById**](IdentityApi.md#EntityDeleteById) | **Delete** /identity/entity/id/{id} | +[**EntityDeleteByName**](IdentityApi.md#EntityDeleteByName) | **Delete** /identity/entity/name/{name} | +[**EntityListAliasesById**](IdentityApi.md#EntityListAliasesById) | **Get** /identity/entity-alias/id | List all the alias IDs. +[**EntityListById**](IdentityApi.md#EntityListById) | **Get** /identity/entity/id | List all the entity IDs [**EntityListByName**](IdentityApi.md#EntityListByName) | **Get** /identity/entity/name | List all the entity names -[**EntityLookup**](IdentityApi.md#EntityLookup) | **Post** /identity/lookup/entity | Query entities based on various properties. +[**EntityLookUp**](IdentityApi.md#EntityLookUp) | **Post** /identity/lookup/entity | Query entities based on various properties. [**EntityMerge**](IdentityApi.md#EntityMerge) | **Post** /identity/entity/merge | Merge two or more entities together -[**EntityReadAliasByID**](IdentityApi.md#EntityReadAliasByID) | **Get** /identity/entity-alias/id/{id} | Update, read or delete an alias ID. -[**EntityReadByID**](IdentityApi.md#EntityReadByID) | **Get** /identity/entity/id/{id} | Update, read or delete an entity using entity ID -[**EntityReadByName**](IdentityApi.md#EntityReadByName) | **Get** /identity/entity/name/{name} | Update, read or delete an entity using entity name -[**EntityWrite**](IdentityApi.md#EntityWrite) | **Post** /identity/entity | Create a new entity -[**EntityWriteAlias**](IdentityApi.md#EntityWriteAlias) | **Post** /identity/entity-alias | Create a new alias. -[**EntityWriteAliasByID**](IdentityApi.md#EntityWriteAliasByID) | **Post** /identity/entity-alias/id/{id} | Update, read or delete an alias ID. -[**EntityWriteByID**](IdentityApi.md#EntityWriteByID) | **Post** /identity/entity/id/{id} | Update, read or delete an entity using entity ID -[**EntityWriteByName**](IdentityApi.md#EntityWriteByName) | **Post** /identity/entity/name/{name} | Update, read or delete an entity using entity name -[**GroupDeleteAliasByID**](IdentityApi.md#GroupDeleteAliasByID) | **Delete** /identity/group-alias/id/{id} | -[**GroupDeleteByID**](IdentityApi.md#GroupDeleteByID) | **Delete** /identity/group/id/{id} | Update or delete an existing group using its ID. +[**EntityReadAliasById**](IdentityApi.md#EntityReadAliasById) | **Get** /identity/entity-alias/id/{id} | +[**EntityReadById**](IdentityApi.md#EntityReadById) | **Get** /identity/entity/id/{id} | +[**EntityReadByName**](IdentityApi.md#EntityReadByName) | **Get** /identity/entity/name/{name} | +[**EntityUpdateAliasById**](IdentityApi.md#EntityUpdateAliasById) | **Post** /identity/entity-alias/id/{id} | +[**EntityUpdateById**](IdentityApi.md#EntityUpdateById) | **Post** /identity/entity/id/{id} | +[**EntityUpdateByName**](IdentityApi.md#EntityUpdateByName) | **Post** /identity/entity/name/{name} | +[**GroupCreate**](IdentityApi.md#GroupCreate) | **Post** /identity/group | Create a new group. +[**GroupCreateAlias**](IdentityApi.md#GroupCreateAlias) | **Post** /identity/group-alias | Creates a new group alias, or updates an existing one. +[**GroupDeleteAliasById**](IdentityApi.md#GroupDeleteAliasById) | **Delete** /identity/group-alias/id/{id} | +[**GroupDeleteById**](IdentityApi.md#GroupDeleteById) | **Delete** /identity/group/id/{id} | [**GroupDeleteByName**](IdentityApi.md#GroupDeleteByName) | **Delete** /identity/group/name/{name} | -[**GroupListAliasesByID**](IdentityApi.md#GroupListAliasesByID) | **Get** /identity/group-alias/id | List all the group alias IDs. -[**GroupListByID**](IdentityApi.md#GroupListByID) | **Get** /identity/group/id | List all the group IDs. +[**GroupListAliasesById**](IdentityApi.md#GroupListAliasesById) | **Get** /identity/group-alias/id | List all the group alias IDs. +[**GroupListById**](IdentityApi.md#GroupListById) | **Get** /identity/group/id | List all the group IDs. [**GroupListByName**](IdentityApi.md#GroupListByName) | **Get** /identity/group/name | -[**GroupLookup**](IdentityApi.md#GroupLookup) | **Post** /identity/lookup/group | Query groups based on various properties. -[**GroupReadAliasByID**](IdentityApi.md#GroupReadAliasByID) | **Get** /identity/group-alias/id/{id} | -[**GroupReadByID**](IdentityApi.md#GroupReadByID) | **Get** /identity/group/id/{id} | Update or delete an existing group using its ID. +[**GroupLookUp**](IdentityApi.md#GroupLookUp) | **Post** /identity/lookup/group | Query groups based on various properties. +[**GroupReadAliasById**](IdentityApi.md#GroupReadAliasById) | **Get** /identity/group-alias/id/{id} | +[**GroupReadById**](IdentityApi.md#GroupReadById) | **Get** /identity/group/id/{id} | [**GroupReadByName**](IdentityApi.md#GroupReadByName) | **Get** /identity/group/name/{name} | -[**GroupWrite**](IdentityApi.md#GroupWrite) | **Post** /identity/group | Create a new group. -[**GroupWriteAlias**](IdentityApi.md#GroupWriteAlias) | **Post** /identity/group-alias | Creates a new group alias, or updates an existing one. -[**GroupWriteAliasByID**](IdentityApi.md#GroupWriteAliasByID) | **Post** /identity/group-alias/id/{id} | -[**GroupWriteByID**](IdentityApi.md#GroupWriteByID) | **Post** /identity/group/id/{id} | Update or delete an existing group using its ID. -[**GroupWriteByName**](IdentityApi.md#GroupWriteByName) | **Post** /identity/group/name/{name} | -[**MFADeleteLoginEnforcement**](IdentityApi.md#MFADeleteLoginEnforcement) | **Delete** /identity/mfa/login-enforcement/{name} | Delete a login enforcement -[**MFAListLoginEnforcements**](IdentityApi.md#MFAListLoginEnforcements) | **Get** /identity/mfa/login-enforcement | List login enforcements -[**MFAMethodAdminDestroyTOTP**](IdentityApi.md#MFAMethodAdminDestroyTOTP) | **Post** /identity/mfa/method/totp/admin-destroy | Destroys a TOTP secret for the given MFA method ID on the given entity -[**MFAMethodAdminGenerateTOTP**](IdentityApi.md#MFAMethodAdminGenerateTOTP) | **Post** /identity/mfa/method/totp/admin-generate | Update or create TOTP secret for the given method ID on the given entity. -[**MFAMethodDeleteDuo**](IdentityApi.md#MFAMethodDeleteDuo) | **Delete** /identity/mfa/method/duo/{method_id} | Delete a configuration for the given MFA method -[**MFAMethodDeleteOkta**](IdentityApi.md#MFAMethodDeleteOkta) | **Delete** /identity/mfa/method/okta/{method_id} | Delete a configuration for the given MFA method -[**MFAMethodDeletePingID**](IdentityApi.md#MFAMethodDeletePingID) | **Delete** /identity/mfa/method/pingid/{method_id} | Delete a configuration for the given MFA method -[**MFAMethodDeleteTOTP**](IdentityApi.md#MFAMethodDeleteTOTP) | **Delete** /identity/mfa/method/totp/{method_id} | Delete a configuration for the given MFA method -[**MFAMethodGenerateTOTP**](IdentityApi.md#MFAMethodGenerateTOTP) | **Post** /identity/mfa/method/totp/generate | Update or create TOTP secret for the given method ID on the given entity. -[**MFAMethodList**](IdentityApi.md#MFAMethodList) | **Get** /identity/mfa/method | List MFA method configurations for all MFA methods -[**MFAMethodListDuo**](IdentityApi.md#MFAMethodListDuo) | **Get** /identity/mfa/method/duo | List MFA method configurations for the given MFA method -[**MFAMethodListOkta**](IdentityApi.md#MFAMethodListOkta) | **Get** /identity/mfa/method/okta | List MFA method configurations for the given MFA method -[**MFAMethodListPingID**](IdentityApi.md#MFAMethodListPingID) | **Get** /identity/mfa/method/pingid | List MFA method configurations for the given MFA method -[**MFAMethodListTOTP**](IdentityApi.md#MFAMethodListTOTP) | **Get** /identity/mfa/method/totp | List MFA method configurations for the given MFA method -[**MFAMethodRead**](IdentityApi.md#MFAMethodRead) | **Get** /identity/mfa/method/{method_id} | Read the current configuration for the given ID regardless of the MFA method type -[**MFAMethodReadDuo**](IdentityApi.md#MFAMethodReadDuo) | **Get** /identity/mfa/method/duo/{method_id} | Read the current configuration for the given MFA method -[**MFAMethodReadOkta**](IdentityApi.md#MFAMethodReadOkta) | **Get** /identity/mfa/method/okta/{method_id} | Read the current configuration for the given MFA method -[**MFAMethodReadPingID**](IdentityApi.md#MFAMethodReadPingID) | **Get** /identity/mfa/method/pingid/{method_id} | Read the current configuration for the given MFA method -[**MFAMethodReadTOTP**](IdentityApi.md#MFAMethodReadTOTP) | **Get** /identity/mfa/method/totp/{method_id} | Read the current configuration for the given MFA method -[**MFAMethodWriteDuo**](IdentityApi.md#MFAMethodWriteDuo) | **Post** /identity/mfa/method/duo/{method_id} | Update or create a configuration for the given MFA method -[**MFAMethodWriteOkta**](IdentityApi.md#MFAMethodWriteOkta) | **Post** /identity/mfa/method/okta/{method_id} | Update or create a configuration for the given MFA method -[**MFAMethodWritePingID**](IdentityApi.md#MFAMethodWritePingID) | **Post** /identity/mfa/method/pingid/{method_id} | Update or create a configuration for the given MFA method -[**MFAMethodWriteTOTP**](IdentityApi.md#MFAMethodWriteTOTP) | **Post** /identity/mfa/method/totp/{method_id} | Update or create a configuration for the given MFA method -[**MFAReadLoginEnforcement**](IdentityApi.md#MFAReadLoginEnforcement) | **Get** /identity/mfa/login-enforcement/{name} | Read the current login enforcement -[**MFAWriteLoginEnforcement**](IdentityApi.md#MFAWriteLoginEnforcement) | **Post** /identity/mfa/login-enforcement/{name} | Create or update a login enforcement -[**OIDCDeleteAssignment**](IdentityApi.md#OIDCDeleteAssignment) | **Delete** /identity/oidc/assignment/{name} | -[**OIDCDeleteClient**](IdentityApi.md#OIDCDeleteClient) | **Delete** /identity/oidc/client/{name} | -[**OIDCDeleteKey**](IdentityApi.md#OIDCDeleteKey) | **Delete** /identity/oidc/key/{name} | CRUD operations for OIDC keys. -[**OIDCDeleteProvider**](IdentityApi.md#OIDCDeleteProvider) | **Delete** /identity/oidc/provider/{name} | -[**OIDCDeleteRole**](IdentityApi.md#OIDCDeleteRole) | **Delete** /identity/oidc/role/{name} | CRUD operations on OIDC Roles -[**OIDCDeleteScope**](IdentityApi.md#OIDCDeleteScope) | **Delete** /identity/oidc/scope/{name} | -[**OIDCIntrospect**](IdentityApi.md#OIDCIntrospect) | **Post** /identity/oidc/introspect | Verify the authenticity of an OIDC token -[**OIDCListAssignments**](IdentityApi.md#OIDCListAssignments) | **Get** /identity/oidc/assignment | -[**OIDCListClients**](IdentityApi.md#OIDCListClients) | **Get** /identity/oidc/client | -[**OIDCListKeys**](IdentityApi.md#OIDCListKeys) | **Get** /identity/oidc/key | List OIDC keys -[**OIDCListProviders**](IdentityApi.md#OIDCListProviders) | **Get** /identity/oidc/provider | -[**OIDCListRoles**](IdentityApi.md#OIDCListRoles) | **Get** /identity/oidc/role | List configured OIDC roles -[**OIDCListScopes**](IdentityApi.md#OIDCListScopes) | **Get** /identity/oidc/scope | -[**OIDCReadAssignment**](IdentityApi.md#OIDCReadAssignment) | **Get** /identity/oidc/assignment/{name} | -[**OIDCReadClient**](IdentityApi.md#OIDCReadClient) | **Get** /identity/oidc/client/{name} | -[**OIDCReadConfig**](IdentityApi.md#OIDCReadConfig) | **Get** /identity/oidc/config | OIDC configuration -[**OIDCReadKey**](IdentityApi.md#OIDCReadKey) | **Get** /identity/oidc/key/{name} | CRUD operations for OIDC keys. -[**OIDCReadProvider**](IdentityApi.md#OIDCReadProvider) | **Get** /identity/oidc/provider/{name} | -[**OIDCReadProviderAuthorize**](IdentityApi.md#OIDCReadProviderAuthorize) | **Get** /identity/oidc/provider/{name}/authorize | -[**OIDCReadProviderUserInfo**](IdentityApi.md#OIDCReadProviderUserInfo) | **Get** /identity/oidc/provider/{name}/userinfo | -[**OIDCReadProviderWellKnownKeys**](IdentityApi.md#OIDCReadProviderWellKnownKeys) | **Get** /identity/oidc/provider/{name}/.well-known/keys | -[**OIDCReadProviderWellKnownOpenIDConfiguration**](IdentityApi.md#OIDCReadProviderWellKnownOpenIDConfiguration) | **Get** /identity/oidc/provider/{name}/.well-known/openid-configuration | -[**OIDCReadRole**](IdentityApi.md#OIDCReadRole) | **Get** /identity/oidc/role/{name} | CRUD operations on OIDC Roles -[**OIDCReadScope**](IdentityApi.md#OIDCReadScope) | **Get** /identity/oidc/scope/{name} | -[**OIDCReadToken**](IdentityApi.md#OIDCReadToken) | **Get** /identity/oidc/token/{name} | Generate an OIDC token -[**OIDCReadWellKnownKeys**](IdentityApi.md#OIDCReadWellKnownKeys) | **Get** /identity/oidc/.well-known/keys | Retrieve public keys -[**OIDCReadWellKnownOpenIDConfiguration**](IdentityApi.md#OIDCReadWellKnownOpenIDConfiguration) | **Get** /identity/oidc/.well-known/openid-configuration | Query OIDC configurations -[**OIDCRotateKey**](IdentityApi.md#OIDCRotateKey) | **Post** /identity/oidc/key/{name}/rotate | Rotate a named OIDC key. -[**OIDCWriteAssignment**](IdentityApi.md#OIDCWriteAssignment) | **Post** /identity/oidc/assignment/{name} | -[**OIDCWriteClient**](IdentityApi.md#OIDCWriteClient) | **Post** /identity/oidc/client/{name} | -[**OIDCWriteConfig**](IdentityApi.md#OIDCWriteConfig) | **Post** /identity/oidc/config | OIDC configuration -[**OIDCWriteKey**](IdentityApi.md#OIDCWriteKey) | **Post** /identity/oidc/key/{name} | CRUD operations for OIDC keys. -[**OIDCWriteProvider**](IdentityApi.md#OIDCWriteProvider) | **Post** /identity/oidc/provider/{name} | -[**OIDCWriteProviderAuthorize**](IdentityApi.md#OIDCWriteProviderAuthorize) | **Post** /identity/oidc/provider/{name}/authorize | -[**OIDCWriteProviderToken**](IdentityApi.md#OIDCWriteProviderToken) | **Post** /identity/oidc/provider/{name}/token | -[**OIDCWriteProviderUserInfo**](IdentityApi.md#OIDCWriteProviderUserInfo) | **Post** /identity/oidc/provider/{name}/userinfo | -[**OIDCWriteRole**](IdentityApi.md#OIDCWriteRole) | **Post** /identity/oidc/role/{name} | CRUD operations on OIDC Roles -[**OIDCWriteScope**](IdentityApi.md#OIDCWriteScope) | **Post** /identity/oidc/scope/{name} | -[**PersonaIDDeleteByID**](IdentityApi.md#PersonaIDDeleteByID) | **Delete** /identity/persona/id/{id} | Update, read or delete an alias ID. -[**PersonaIDReadByID**](IdentityApi.md#PersonaIDReadByID) | **Get** /identity/persona/id/{id} | Update, read or delete an alias ID. -[**PersonaIDWriteByID**](IdentityApi.md#PersonaIDWriteByID) | **Post** /identity/persona/id/{id} | Update, read or delete an alias ID. -[**PersonaListByID**](IdentityApi.md#PersonaListByID) | **Get** /identity/persona/id | List all the alias IDs. -[**PersonaWrite**](IdentityApi.md#PersonaWrite) | **Post** /identity/persona | Create a new alias. - - - - - -## AliasDeleteByID - -Update, read or delete an alias ID. +[**GroupUpdateAliasById**](IdentityApi.md#GroupUpdateAliasById) | **Post** /identity/group-alias/id/{id} | +[**GroupUpdateById**](IdentityApi.md#GroupUpdateById) | **Post** /identity/group/id/{id} | +[**GroupUpdateByName**](IdentityApi.md#GroupUpdateByName) | **Post** /identity/group/name/{name} | +[**MfaAdminDestroyTotpSecret**](IdentityApi.md#MfaAdminDestroyTotpSecret) | **Post** /identity/mfa/method/totp/admin-destroy | Destroys a TOTP secret for the given MFA method ID on the given entity +[**MfaAdminGenerateTotpSecret**](IdentityApi.md#MfaAdminGenerateTotpSecret) | **Post** /identity/mfa/method/totp/admin-generate | Update or create TOTP secret for the given method ID on the given entity. +[**MfaConfigureDuoMethod**](IdentityApi.md#MfaConfigureDuoMethod) | **Post** /identity/mfa/method/duo/{method_id} | Update or create a configuration for the given MFA method +[**MfaConfigureOktaMethod**](IdentityApi.md#MfaConfigureOktaMethod) | **Post** /identity/mfa/method/okta/{method_id} | Update or create a configuration for the given MFA method +[**MfaConfigurePingIdMethod**](IdentityApi.md#MfaConfigurePingIdMethod) | **Post** /identity/mfa/method/pingid/{method_id} | Update or create a configuration for the given MFA method +[**MfaConfigureTotpMethod**](IdentityApi.md#MfaConfigureTotpMethod) | **Post** /identity/mfa/method/totp/{method_id} | Update or create a configuration for the given MFA method +[**MfaDeleteDuoMethod**](IdentityApi.md#MfaDeleteDuoMethod) | **Delete** /identity/mfa/method/duo/{method_id} | Delete a configuration for the given MFA method +[**MfaDeleteLoginEnforcement**](IdentityApi.md#MfaDeleteLoginEnforcement) | **Delete** /identity/mfa/login-enforcement/{name} | Delete a login enforcement +[**MfaDeleteOktaMethod**](IdentityApi.md#MfaDeleteOktaMethod) | **Delete** /identity/mfa/method/okta/{method_id} | Delete a configuration for the given MFA method +[**MfaDeletePingIdMethod**](IdentityApi.md#MfaDeletePingIdMethod) | **Delete** /identity/mfa/method/pingid/{method_id} | Delete a configuration for the given MFA method +[**MfaDeleteTotpMethod**](IdentityApi.md#MfaDeleteTotpMethod) | **Delete** /identity/mfa/method/totp/{method_id} | Delete a configuration for the given MFA method +[**MfaGenerateTotpSecret**](IdentityApi.md#MfaGenerateTotpSecret) | **Post** /identity/mfa/method/totp/generate | Update or create TOTP secret for the given method ID on the given entity. +[**MfaListDuoMethods**](IdentityApi.md#MfaListDuoMethods) | **Get** /identity/mfa/method/duo | List MFA method configurations for the given MFA method +[**MfaListLoginEnforcements**](IdentityApi.md#MfaListLoginEnforcements) | **Get** /identity/mfa/login-enforcement | List login enforcements +[**MfaListMethods**](IdentityApi.md#MfaListMethods) | **Get** /identity/mfa/method | List MFA method configurations for all MFA methods +[**MfaListOktaMethods**](IdentityApi.md#MfaListOktaMethods) | **Get** /identity/mfa/method/okta | List MFA method configurations for the given MFA method +[**MfaListPingIdMethods**](IdentityApi.md#MfaListPingIdMethods) | **Get** /identity/mfa/method/pingid | List MFA method configurations for the given MFA method +[**MfaListTotpMethods**](IdentityApi.md#MfaListTotpMethods) | **Get** /identity/mfa/method/totp | List MFA method configurations for the given MFA method +[**MfaReadDuoMethodConfiguration**](IdentityApi.md#MfaReadDuoMethodConfiguration) | **Get** /identity/mfa/method/duo/{method_id} | Read the current configuration for the given MFA method +[**MfaReadLoginEnforcement**](IdentityApi.md#MfaReadLoginEnforcement) | **Get** /identity/mfa/login-enforcement/{name} | Read the current login enforcement +[**MfaReadMethodConfiguration**](IdentityApi.md#MfaReadMethodConfiguration) | **Get** /identity/mfa/method/{method_id} | Read the current configuration for the given ID regardless of the MFA method type +[**MfaReadOktaMethodConfiguration**](IdentityApi.md#MfaReadOktaMethodConfiguration) | **Get** /identity/mfa/method/okta/{method_id} | Read the current configuration for the given MFA method +[**MfaReadPingIdMethodConfiguration**](IdentityApi.md#MfaReadPingIdMethodConfiguration) | **Get** /identity/mfa/method/pingid/{method_id} | Read the current configuration for the given MFA method +[**MfaReadTotpMethodConfiguration**](IdentityApi.md#MfaReadTotpMethodConfiguration) | **Get** /identity/mfa/method/totp/{method_id} | Read the current configuration for the given MFA method +[**MfaWriteLoginEnforcement**](IdentityApi.md#MfaWriteLoginEnforcement) | **Post** /identity/mfa/login-enforcement/{name} | Create or update a login enforcement +[**OidcConfigure**](IdentityApi.md#OidcConfigure) | **Post** /identity/oidc/config | +[**OidcDeleteAssignment**](IdentityApi.md#OidcDeleteAssignment) | **Delete** /identity/oidc/assignment/{name} | +[**OidcDeleteClient**](IdentityApi.md#OidcDeleteClient) | **Delete** /identity/oidc/client/{name} | +[**OidcDeleteKey**](IdentityApi.md#OidcDeleteKey) | **Delete** /identity/oidc/key/{name} | CRUD operations for OIDC keys. +[**OidcDeleteProvider**](IdentityApi.md#OidcDeleteProvider) | **Delete** /identity/oidc/provider/{name} | +[**OidcDeleteRole**](IdentityApi.md#OidcDeleteRole) | **Delete** /identity/oidc/role/{name} | CRUD operations on OIDC Roles +[**OidcDeleteScope**](IdentityApi.md#OidcDeleteScope) | **Delete** /identity/oidc/scope/{name} | +[**OidcGenerateToken**](IdentityApi.md#OidcGenerateToken) | **Get** /identity/oidc/token/{name} | Generate an OIDC token +[**OidcIntrospect**](IdentityApi.md#OidcIntrospect) | **Post** /identity/oidc/introspect | Verify the authenticity of an OIDC token +[**OidcListAssignments**](IdentityApi.md#OidcListAssignments) | **Get** /identity/oidc/assignment | +[**OidcListClients**](IdentityApi.md#OidcListClients) | **Get** /identity/oidc/client | +[**OidcListKeys**](IdentityApi.md#OidcListKeys) | **Get** /identity/oidc/key | List OIDC keys +[**OidcListProviders**](IdentityApi.md#OidcListProviders) | **Get** /identity/oidc/provider | +[**OidcListRoles**](IdentityApi.md#OidcListRoles) | **Get** /identity/oidc/role | List configured OIDC roles +[**OidcListScopes**](IdentityApi.md#OidcListScopes) | **Get** /identity/oidc/scope | +[**OidcProviderAuthorize**](IdentityApi.md#OidcProviderAuthorize) | **Get** /identity/oidc/provider/{name}/authorize | +[**OidcProviderAuthorize2**](IdentityApi.md#OidcProviderAuthorize2) | **Post** /identity/oidc/provider/{name}/authorize | +[**OidcProviderToken**](IdentityApi.md#OidcProviderToken) | **Post** /identity/oidc/provider/{name}/token | +[**OidcProviderUserInfo**](IdentityApi.md#OidcProviderUserInfo) | **Get** /identity/oidc/provider/{name}/userinfo | +[**OidcProviderUserInfo2**](IdentityApi.md#OidcProviderUserInfo2) | **Post** /identity/oidc/provider/{name}/userinfo | +[**OidcReadAssignment**](IdentityApi.md#OidcReadAssignment) | **Get** /identity/oidc/assignment/{name} | +[**OidcReadClient**](IdentityApi.md#OidcReadClient) | **Get** /identity/oidc/client/{name} | +[**OidcReadConfiguration**](IdentityApi.md#OidcReadConfiguration) | **Get** /identity/oidc/config | +[**OidcReadKey**](IdentityApi.md#OidcReadKey) | **Get** /identity/oidc/key/{name} | CRUD operations for OIDC keys. +[**OidcReadOpenIdConfiguration**](IdentityApi.md#OidcReadOpenIdConfiguration) | **Get** /identity/oidc/.well-known/openid-configuration | Query OIDC configurations +[**OidcReadProvider**](IdentityApi.md#OidcReadProvider) | **Get** /identity/oidc/provider/{name} | +[**OidcReadProviderOpenIdConfiguration**](IdentityApi.md#OidcReadProviderOpenIdConfiguration) | **Get** /identity/oidc/provider/{name}/.well-known/openid-configuration | +[**OidcReadProviderPublicKeys**](IdentityApi.md#OidcReadProviderPublicKeys) | **Get** /identity/oidc/provider/{name}/.well-known/keys | +[**OidcReadPublicKeys**](IdentityApi.md#OidcReadPublicKeys) | **Get** /identity/oidc/.well-known/keys | Retrieve public keys +[**OidcReadRole**](IdentityApi.md#OidcReadRole) | **Get** /identity/oidc/role/{name} | CRUD operations on OIDC Roles +[**OidcReadScope**](IdentityApi.md#OidcReadScope) | **Get** /identity/oidc/scope/{name} | +[**OidcRotateKey**](IdentityApi.md#OidcRotateKey) | **Post** /identity/oidc/key/{name}/rotate | Rotate a named OIDC key. +[**OidcWriteAssignment**](IdentityApi.md#OidcWriteAssignment) | **Post** /identity/oidc/assignment/{name} | +[**OidcWriteClient**](IdentityApi.md#OidcWriteClient) | **Post** /identity/oidc/client/{name} | +[**OidcWriteKey**](IdentityApi.md#OidcWriteKey) | **Post** /identity/oidc/key/{name} | CRUD operations for OIDC keys. +[**OidcWriteProvider**](IdentityApi.md#OidcWriteProvider) | **Post** /identity/oidc/provider/{name} | +[**OidcWriteRole**](IdentityApi.md#OidcWriteRole) | **Post** /identity/oidc/role/{name} | CRUD operations on OIDC Roles +[**OidcWriteScope**](IdentityApi.md#OidcWriteScope) | **Post** /identity/oidc/scope/{name} | +[**PersonaCreate**](IdentityApi.md#PersonaCreate) | **Post** /identity/persona | Create a new alias. +[**PersonaDeleteById**](IdentityApi.md#PersonaDeleteById) | **Delete** /identity/persona/id/{id} | +[**PersonaListById**](IdentityApi.md#PersonaListById) | **Get** /identity/persona/id | List all the alias IDs. +[**PersonaReadById**](IdentityApi.md#PersonaReadById) | **Get** /identity/persona/id/{id} | +[**PersonaUpdateById**](IdentityApi.md#PersonaUpdateById) | **Post** /identity/persona/id/{id} | + + + + + +## AliasCreate + +Create a new alias. + +### Example + +```go +package main + +import ( + "context" + "log" + "os" + + "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" +) + +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + request := schema.NewAliasCreateRequestWithDefaults() + resp, err := client.Identity.AliasCreate( + context.Background(), + request, + vault.WithToken("my-token"), + ) + if err != nil { + log.Fatal(err) + } + + log.Println(resp.Data) +} +``` + +### Path Parameters + + + +### Other Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **aliasCreateRequest** | [**AliasCreateRequest**](AliasCreateRequest.md) | | + + (empty response body) + +[[Back to top]](#) +[[Back to README]](../README.md) + + + +## AliasDeleteById + + ### Example @@ -138,7 +196,7 @@ func main() { } id := "id_example" // string | ID of the alias - resp, err := client.Identity.AliasDeleteByID( + resp, err := client.Identity.AliasDeleteById( context.Background(), id, vault.WithToken("my-token"), @@ -173,7 +231,7 @@ Name | Type | Description | Notes -## AliasListByID +## AliasListById List all the alias IDs. @@ -198,7 +256,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.AliasListByID( + resp, err := client.Identity.AliasListById( context.Background(), vault.WithToken("my-token"), ) @@ -228,9 +286,9 @@ Name | Type | Description | Notes -## AliasReadByID +## AliasReadById + -Update, read or delete an alias ID. ### Example @@ -254,7 +312,7 @@ func main() { } id := "id_example" // string | ID of the alias - resp, err := client.Identity.AliasReadByID( + resp, err := client.Identity.AliasReadById( context.Background(), id, vault.WithToken("my-token"), @@ -289,9 +347,9 @@ Name | Type | Description | Notes -## AliasWrite +## AliasUpdateById + -Create a new alias. ### Example @@ -315,9 +373,11 @@ func main() { log.Fatal(err) } - request := schema.NewAliasWriteRequestWithDefaults() - resp, err := client.Identity.AliasWrite( + id := "id_example" // string | ID of the alias + request := schema.NewAliasUpdateByIdRequestWithDefaults() + resp, err := client.Identity.AliasUpdateById( context.Background(), + id, request, vault.WithToken("my-token"), ) @@ -332,13 +392,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**id** | **string** | ID of the alias | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aliasWriteRequest** | [**AliasWriteRequest**](AliasWriteRequest.md) | | + + **aliasUpdateByIdRequest** | [**AliasUpdateByIdRequest**](AliasUpdateByIdRequest.md) | | (empty response body) @@ -347,9 +412,9 @@ Name | Type | Description | Notes -## AliasWriteByID +## EntityBatchDelete -Update, read or delete an alias ID. +Delete all of the entities provided ### Example @@ -373,11 +438,9 @@ func main() { log.Fatal(err) } - id := "id_example" // string | ID of the alias - request := schema.NewAliasWriteByIDRequestWithDefaults() - resp, err := client.Identity.AliasWriteByID( + request := schema.NewEntityBatchDeleteRequestWithDefaults() + resp, err := client.Identity.EntityBatchDelete( context.Background(), - id, request, vault.WithToken("my-token"), ) @@ -392,18 +455,71 @@ func main() { ### Path Parameters + +### Other Parameters + + Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**id** | **string** | ID of the alias | + **entityBatchDeleteRequest** | [**EntityBatchDeleteRequest**](EntityBatchDeleteRequest.md) | | + + (empty response body) + +[[Back to top]](#) +[[Back to README]](../README.md) + + + +## EntityCreate + +Create a new entity + +### Example + +```go +package main + +import ( + "context" + "log" + "os" + + "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" +) + +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + request := schema.NewEntityCreateRequestWithDefaults() + resp, err := client.Identity.EntityCreate( + context.Background(), + request, + vault.WithToken("my-token"), + ) + if err != nil { + log.Fatal(err) + } + + log.Println(resp.Data) +} +``` + +### Path Parameters + + ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **aliasWriteByIDRequest** | [**AliasWriteByIDRequest**](AliasWriteByIDRequest.md) | | + **entityCreateRequest** | [**EntityCreateRequest**](EntityCreateRequest.md) | | (empty response body) @@ -412,9 +528,9 @@ Name | Type | Description | Notes -## EntityBatchDelete +## EntityCreateAlias -Delete all of the entities provided +Create a new alias. ### Example @@ -438,8 +554,8 @@ func main() { log.Fatal(err) } - request := schema.NewEntityBatchDeleteRequestWithDefaults() - resp, err := client.Identity.EntityBatchDelete( + request := schema.NewEntityCreateAliasRequestWithDefaults() + resp, err := client.Identity.EntityCreateAlias( context.Background(), request, vault.WithToken("my-token"), @@ -461,7 +577,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **entityBatchDeleteRequest** | [**EntityBatchDeleteRequest**](EntityBatchDeleteRequest.md) | | + **entityCreateAliasRequest** | [**EntityCreateAliasRequest**](EntityCreateAliasRequest.md) | | (empty response body) @@ -470,9 +586,9 @@ Name | Type | Description | Notes -## EntityDeleteAliasByID +## EntityDeleteAliasById + -Update, read or delete an alias ID. ### Example @@ -496,7 +612,7 @@ func main() { } id := "id_example" // string | ID of the alias - resp, err := client.Identity.EntityDeleteAliasByID( + resp, err := client.Identity.EntityDeleteAliasById( context.Background(), id, vault.WithToken("my-token"), @@ -531,9 +647,9 @@ Name | Type | Description | Notes -## EntityDeleteByID +## EntityDeleteById + -Update, read or delete an entity using entity ID ### Example @@ -557,7 +673,7 @@ func main() { } id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. - resp, err := client.Identity.EntityDeleteByID( + resp, err := client.Identity.EntityDeleteById( context.Background(), id, vault.WithToken("my-token"), @@ -594,7 +710,7 @@ Name | Type | Description | Notes ## EntityDeleteByName -Update, read or delete an entity using entity name + ### Example @@ -653,7 +769,7 @@ Name | Type | Description | Notes -## EntityListAliasesByID +## EntityListAliasesById List all the alias IDs. @@ -678,7 +794,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.EntityListAliasesByID( + resp, err := client.Identity.EntityListAliasesById( context.Background(), vault.WithToken("my-token"), ) @@ -708,7 +824,7 @@ Name | Type | Description | Notes -## EntityListByID +## EntityListById List all the entity IDs @@ -733,7 +849,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.EntityListByID( + resp, err := client.Identity.EntityListById( context.Background(), vault.WithToken("my-token"), ) @@ -818,7 +934,7 @@ Name | Type | Description | Notes -## EntityLookup +## EntityLookUp Query entities based on various properties. @@ -844,8 +960,8 @@ func main() { log.Fatal(err) } - request := schema.NewEntityLookupRequestWithDefaults() - resp, err := client.Identity.EntityLookup( + request := schema.NewEntityLookUpRequestWithDefaults() + resp, err := client.Identity.EntityLookUp( context.Background(), request, vault.WithToken("my-token"), @@ -867,7 +983,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **entityLookupRequest** | [**EntityLookupRequest**](EntityLookupRequest.md) | | + **entityLookUpRequest** | [**EntityLookUpRequest**](EntityLookUpRequest.md) | | (empty response body) @@ -934,9 +1050,9 @@ Name | Type | Description | Notes -## EntityReadAliasByID +## EntityReadAliasById + -Update, read or delete an alias ID. ### Example @@ -960,7 +1076,7 @@ func main() { } id := "id_example" // string | ID of the alias - resp, err := client.Identity.EntityReadAliasByID( + resp, err := client.Identity.EntityReadAliasById( context.Background(), id, vault.WithToken("my-token"), @@ -995,9 +1111,9 @@ Name | Type | Description | Notes -## EntityReadByID +## EntityReadById + -Update, read or delete an entity using entity ID ### Example @@ -1021,7 +1137,7 @@ func main() { } id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. - resp, err := client.Identity.EntityReadByID( + resp, err := client.Identity.EntityReadById( context.Background(), id, vault.WithToken("my-token"), @@ -1058,7 +1174,7 @@ Name | Type | Description | Notes ## EntityReadByName -Update, read or delete an entity using entity name + ### Example @@ -1117,9 +1233,9 @@ Name | Type | Description | Notes -## EntityWrite +## EntityUpdateAliasById + -Create a new entity ### Example @@ -1143,9 +1259,11 @@ func main() { log.Fatal(err) } - request := schema.NewEntityWriteRequestWithDefaults() - resp, err := client.Identity.EntityWrite( + id := "id_example" // string | ID of the alias + request := schema.NewEntityUpdateAliasByIdRequestWithDefaults() + resp, err := client.Identity.EntityUpdateAliasById( context.Background(), + id, request, vault.WithToken("my-token"), ) @@ -1160,13 +1278,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**id** | **string** | ID of the alias | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **entityWriteRequest** | [**EntityWriteRequest**](EntityWriteRequest.md) | | + + **entityUpdateAliasByIdRequest** | [**EntityUpdateAliasByIdRequest**](EntityUpdateAliasByIdRequest.md) | | (empty response body) @@ -1175,9 +1298,9 @@ Name | Type | Description | Notes -## EntityWriteAlias +## EntityUpdateById + -Create a new alias. ### Example @@ -1201,9 +1324,11 @@ func main() { log.Fatal(err) } - request := schema.NewEntityWriteAliasRequestWithDefaults() - resp, err := client.Identity.EntityWriteAlias( + id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. + request := schema.NewEntityUpdateByIdRequestWithDefaults() + resp, err := client.Identity.EntityUpdateById( context.Background(), + id, request, vault.WithToken("my-token"), ) @@ -1218,13 +1343,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**id** | **string** | ID of the entity. If set, updates the corresponding existing entity. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **entityWriteAliasRequest** | [**EntityWriteAliasRequest**](EntityWriteAliasRequest.md) | | + + **entityUpdateByIdRequest** | [**EntityUpdateByIdRequest**](EntityUpdateByIdRequest.md) | | (empty response body) @@ -1233,9 +1363,9 @@ Name | Type | Description | Notes -## EntityWriteAliasByID +## EntityUpdateByName + -Update, read or delete an alias ID. ### Example @@ -1259,11 +1389,11 @@ func main() { log.Fatal(err) } - id := "id_example" // string | ID of the alias - request := schema.NewEntityWriteAliasByIDRequestWithDefaults() - resp, err := client.Identity.EntityWriteAliasByID( + name := "name_example" // string | Name of the entity + request := schema.NewEntityUpdateByNameRequestWithDefaults() + resp, err := client.Identity.EntityUpdateByName( context.Background(), - id, + name, request, vault.WithToken("my-token"), ) @@ -1281,7 +1411,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**id** | **string** | ID of the alias | +**name** | **string** | Name of the entity | ### Other Parameters @@ -1289,7 +1419,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **entityWriteAliasByIDRequest** | [**EntityWriteAliasByIDRequest**](EntityWriteAliasByIDRequest.md) | | + **entityUpdateByNameRequest** | [**EntityUpdateByNameRequest**](EntityUpdateByNameRequest.md) | | (empty response body) @@ -1298,9 +1428,9 @@ Name | Type | Description | Notes -## EntityWriteByID +## GroupCreate -Update, read or delete an entity using entity ID +Create a new group. ### Example @@ -1324,11 +1454,9 @@ func main() { log.Fatal(err) } - id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. - request := schema.NewEntityWriteByIDRequestWithDefaults() - resp, err := client.Identity.EntityWriteByID( + request := schema.NewGroupCreateRequestWithDefaults() + resp, err := client.Identity.GroupCreate( context.Background(), - id, request, vault.WithToken("my-token"), ) @@ -1343,18 +1471,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**id** | **string** | ID of the entity. If set, updates the corresponding existing entity. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **entityWriteByIDRequest** | [**EntityWriteByIDRequest**](EntityWriteByIDRequest.md) | | + **groupCreateRequest** | [**GroupCreateRequest**](GroupCreateRequest.md) | | (empty response body) @@ -1363,9 +1486,9 @@ Name | Type | Description | Notes -## EntityWriteByName +## GroupCreateAlias -Update, read or delete an entity using entity name +Creates a new group alias, or updates an existing one. ### Example @@ -1389,11 +1512,9 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the entity - request := schema.NewEntityWriteByNameRequestWithDefaults() - resp, err := client.Identity.EntityWriteByName( + request := schema.NewGroupCreateAliasRequestWithDefaults() + resp, err := client.Identity.GroupCreateAlias( context.Background(), - name, request, vault.WithToken("my-token"), ) @@ -1408,18 +1529,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the entity | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **entityWriteByNameRequest** | [**EntityWriteByNameRequest**](EntityWriteByNameRequest.md) | | + **groupCreateAliasRequest** | [**GroupCreateAliasRequest**](GroupCreateAliasRequest.md) | | (empty response body) @@ -1428,7 +1544,7 @@ Name | Type | Description | Notes -## GroupDeleteAliasByID +## GroupDeleteAliasById @@ -1454,7 +1570,7 @@ func main() { } id := "id_example" // string | ID of the group alias. - resp, err := client.Identity.GroupDeleteAliasByID( + resp, err := client.Identity.GroupDeleteAliasById( context.Background(), id, vault.WithToken("my-token"), @@ -1489,9 +1605,9 @@ Name | Type | Description | Notes -## GroupDeleteByID +## GroupDeleteById + -Update or delete an existing group using its ID. ### Example @@ -1515,7 +1631,7 @@ func main() { } id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. - resp, err := client.Identity.GroupDeleteByID( + resp, err := client.Identity.GroupDeleteById( context.Background(), id, vault.WithToken("my-token"), @@ -1611,7 +1727,7 @@ Name | Type | Description | Notes -## GroupListAliasesByID +## GroupListAliasesById List all the group alias IDs. @@ -1636,7 +1752,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.GroupListAliasesByID( + resp, err := client.Identity.GroupListAliasesById( context.Background(), vault.WithToken("my-token"), ) @@ -1666,7 +1782,7 @@ Name | Type | Description | Notes -## GroupListByID +## GroupListById List all the group IDs. @@ -1691,7 +1807,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.GroupListByID( + resp, err := client.Identity.GroupListById( context.Background(), vault.WithToken("my-token"), ) @@ -1776,7 +1892,7 @@ Name | Type | Description | Notes -## GroupLookup +## GroupLookUp Query groups based on various properties. @@ -1802,8 +1918,8 @@ func main() { log.Fatal(err) } - request := schema.NewGroupLookupRequestWithDefaults() - resp, err := client.Identity.GroupLookup( + request := schema.NewGroupLookUpRequestWithDefaults() + resp, err := client.Identity.GroupLookUp( context.Background(), request, vault.WithToken("my-token"), @@ -1825,7 +1941,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupLookupRequest** | [**GroupLookupRequest**](GroupLookupRequest.md) | | + **groupLookUpRequest** | [**GroupLookUpRequest**](GroupLookUpRequest.md) | | (empty response body) @@ -1834,7 +1950,7 @@ Name | Type | Description | Notes -## GroupReadAliasByID +## GroupReadAliasById @@ -1860,7 +1976,7 @@ func main() { } id := "id_example" // string | ID of the group alias. - resp, err := client.Identity.GroupReadAliasByID( + resp, err := client.Identity.GroupReadAliasById( context.Background(), id, vault.WithToken("my-token"), @@ -1895,9 +2011,9 @@ Name | Type | Description | Notes -## GroupReadByID +## GroupReadById + -Update or delete an existing group using its ID. ### Example @@ -1921,7 +2037,7 @@ func main() { } id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. - resp, err := client.Identity.GroupReadByID( + resp, err := client.Identity.GroupReadById( context.Background(), id, vault.WithToken("my-token"), @@ -2017,9 +2133,9 @@ Name | Type | Description | Notes -## GroupWrite +## GroupUpdateAliasById + -Create a new group. ### Example @@ -2043,9 +2159,11 @@ func main() { log.Fatal(err) } - request := schema.NewGroupWriteRequestWithDefaults() - resp, err := client.Identity.GroupWrite( + id := "id_example" // string | ID of the group alias. + request := schema.NewGroupUpdateAliasByIdRequestWithDefaults() + resp, err := client.Identity.GroupUpdateAliasById( context.Background(), + id, request, vault.WithToken("my-token"), ) @@ -2060,13 +2178,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**id** | **string** | ID of the group alias. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupWriteRequest** | [**GroupWriteRequest**](GroupWriteRequest.md) | | + + **groupUpdateAliasByIdRequest** | [**GroupUpdateAliasByIdRequest**](GroupUpdateAliasByIdRequest.md) | | (empty response body) @@ -2075,9 +2198,9 @@ Name | Type | Description | Notes -## GroupWriteAlias +## GroupUpdateById + -Creates a new group alias, or updates an existing one. ### Example @@ -2101,9 +2224,11 @@ func main() { log.Fatal(err) } - request := schema.NewGroupWriteAliasRequestWithDefaults() - resp, err := client.Identity.GroupWriteAlias( + id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. + request := schema.NewGroupUpdateByIdRequestWithDefaults() + resp, err := client.Identity.GroupUpdateById( context.Background(), + id, request, vault.WithToken("my-token"), ) @@ -2118,13 +2243,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**id** | **string** | ID of the group. If set, updates the corresponding existing group. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupWriteAliasRequest** | [**GroupWriteAliasRequest**](GroupWriteAliasRequest.md) | | + + **groupUpdateByIdRequest** | [**GroupUpdateByIdRequest**](GroupUpdateByIdRequest.md) | | (empty response body) @@ -2133,7 +2263,7 @@ Name | Type | Description | Notes -## GroupWriteAliasByID +## GroupUpdateByName @@ -2159,11 +2289,11 @@ func main() { log.Fatal(err) } - id := "id_example" // string | ID of the group alias. - request := schema.NewGroupWriteAliasByIDRequestWithDefaults() - resp, err := client.Identity.GroupWriteAliasByID( + name := "name_example" // string | Name of the group. + request := schema.NewGroupUpdateByNameRequestWithDefaults() + resp, err := client.Identity.GroupUpdateByName( context.Background(), - id, + name, request, vault.WithToken("my-token"), ) @@ -2181,7 +2311,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**id** | **string** | ID of the group alias. | +**name** | **string** | Name of the group. | ### Other Parameters @@ -2189,7 +2319,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupWriteAliasByIDRequest** | [**GroupWriteAliasByIDRequest**](GroupWriteAliasByIDRequest.md) | | + **groupUpdateByNameRequest** | [**GroupUpdateByNameRequest**](GroupUpdateByNameRequest.md) | | (empty response body) @@ -2198,9 +2328,9 @@ Name | Type | Description | Notes -## GroupWriteByID +## MfaAdminDestroyTotpSecret -Update or delete an existing group using its ID. +Destroys a TOTP secret for the given MFA method ID on the given entity ### Example @@ -2224,11 +2354,9 @@ func main() { log.Fatal(err) } - id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. - request := schema.NewGroupWriteByIDRequestWithDefaults() - resp, err := client.Identity.GroupWriteByID( + request := schema.NewMfaAdminDestroyTotpSecretRequestWithDefaults() + resp, err := client.Identity.MfaAdminDestroyTotpSecret( context.Background(), - id, request, vault.WithToken("my-token"), ) @@ -2243,18 +2371,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**id** | **string** | ID of the group. If set, updates the corresponding existing group. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **groupWriteByIDRequest** | [**GroupWriteByIDRequest**](GroupWriteByIDRequest.md) | | + **mfaAdminDestroyTotpSecretRequest** | [**MfaAdminDestroyTotpSecretRequest**](MfaAdminDestroyTotpSecretRequest.md) | | (empty response body) @@ -2263,9 +2386,9 @@ Name | Type | Description | Notes -## GroupWriteByName - +## MfaAdminGenerateTotpSecret +Update or create TOTP secret for the given method ID on the given entity. ### Example @@ -2289,11 +2412,9 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the group. - request := schema.NewGroupWriteByNameRequestWithDefaults() - resp, err := client.Identity.GroupWriteByName( + request := schema.NewMfaAdminGenerateTotpSecretRequestWithDefaults() + resp, err := client.Identity.MfaAdminGenerateTotpSecret( context.Background(), - name, request, vault.WithToken("my-token"), ) @@ -2308,18 +2429,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the group. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **groupWriteByNameRequest** | [**GroupWriteByNameRequest**](GroupWriteByNameRequest.md) | | + **mfaAdminGenerateTotpSecretRequest** | [**MfaAdminGenerateTotpSecretRequest**](MfaAdminGenerateTotpSecretRequest.md) | | (empty response body) @@ -2328,9 +2444,9 @@ Name | Type | Description | Notes -## MFADeleteLoginEnforcement +## MfaConfigureDuoMethod -Delete a login enforcement +Update or create a configuration for the given MFA method ### Example @@ -2343,6 +2459,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2353,10 +2470,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name for this login enforcement configuration - resp, err := client.Identity.MFADeleteLoginEnforcement( + methodId := "methodId_example" // string | The unique identifier for this MFA method. + request := schema.NewMfaConfigureDuoMethodRequestWithDefaults() + resp, err := client.Identity.MfaConfigureDuoMethod( context.Background(), - name, + methodId, + request, vault.WithToken("my-token"), ) if err != nil { @@ -2373,7 +2492,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name for this login enforcement configuration | +**methodId** | **string** | The unique identifier for this MFA method. | ### Other Parameters @@ -2381,6 +2500,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **mfaConfigureDuoMethodRequest** | [**MfaConfigureDuoMethodRequest**](MfaConfigureDuoMethodRequest.md) | | (empty response body) @@ -2389,9 +2509,9 @@ Name | Type | Description | Notes -## MFAListLoginEnforcements +## MfaConfigureOktaMethod -List login enforcements +Update or create a configuration for the given MFA method ### Example @@ -2404,6 +2524,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2414,8 +2535,12 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.MFAListLoginEnforcements( + methodId := "methodId_example" // string | The unique identifier for this MFA method. + request := schema.NewMfaConfigureOktaMethodRequestWithDefaults() + resp, err := client.Identity.MfaConfigureOktaMethod( context.Background(), + methodId, + request, vault.WithToken("my-token"), ) if err != nil { @@ -2429,13 +2554,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**methodId** | **string** | The unique identifier for this MFA method. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + + **mfaConfigureOktaMethodRequest** | [**MfaConfigureOktaMethodRequest**](MfaConfigureOktaMethodRequest.md) | | (empty response body) @@ -2444,9 +2574,9 @@ Name | Type | Description | Notes -## MFAMethodAdminDestroyTOTP +## MfaConfigurePingIdMethod -Destroys a TOTP secret for the given MFA method ID on the given entity +Update or create a configuration for the given MFA method ### Example @@ -2470,9 +2600,11 @@ func main() { log.Fatal(err) } - request := schema.NewMFAMethodAdminDestroyTOTPRequestWithDefaults() - resp, err := client.Identity.MFAMethodAdminDestroyTOTP( + methodId := "methodId_example" // string | The unique identifier for this MFA method. + request := schema.NewMfaConfigurePingIdMethodRequestWithDefaults() + resp, err := client.Identity.MfaConfigurePingIdMethod( context.Background(), + methodId, request, vault.WithToken("my-token"), ) @@ -2487,13 +2619,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**methodId** | **string** | The unique identifier for this MFA method. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAMethodAdminDestroyTOTPRequest** | [**MFAMethodAdminDestroyTOTPRequest**](MFAMethodAdminDestroyTOTPRequest.md) | | + + **mfaConfigurePingIdMethodRequest** | [**MfaConfigurePingIdMethodRequest**](MfaConfigurePingIdMethodRequest.md) | | (empty response body) @@ -2502,9 +2639,9 @@ Name | Type | Description | Notes -## MFAMethodAdminGenerateTOTP +## MfaConfigureTotpMethod -Update or create TOTP secret for the given method ID on the given entity. +Update or create a configuration for the given MFA method ### Example @@ -2528,9 +2665,11 @@ func main() { log.Fatal(err) } - request := schema.NewMFAMethodAdminGenerateTOTPRequestWithDefaults() - resp, err := client.Identity.MFAMethodAdminGenerateTOTP( + methodId := "methodId_example" // string | The unique identifier for this MFA method. + request := schema.NewMfaConfigureTotpMethodRequestWithDefaults() + resp, err := client.Identity.MfaConfigureTotpMethod( context.Background(), + methodId, request, vault.WithToken("my-token"), ) @@ -2545,13 +2684,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**methodId** | **string** | The unique identifier for this MFA method. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAMethodAdminGenerateTOTPRequest** | [**MFAMethodAdminGenerateTOTPRequest**](MFAMethodAdminGenerateTOTPRequest.md) | | + + **mfaConfigureTotpMethodRequest** | [**MfaConfigureTotpMethodRequest**](MfaConfigureTotpMethodRequest.md) | | (empty response body) @@ -2560,7 +2704,7 @@ Name | Type | Description | Notes -## MFAMethodDeleteDuo +## MfaDeleteDuoMethod Delete a configuration for the given MFA method @@ -2586,7 +2730,7 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodDeleteDuo( + resp, err := client.Identity.MfaDeleteDuoMethod( context.Background(), methodId, vault.WithToken("my-token"), @@ -2621,9 +2765,9 @@ Name | Type | Description | Notes -## MFAMethodDeleteOkta +## MfaDeleteLoginEnforcement -Delete a configuration for the given MFA method +Delete a login enforcement ### Example @@ -2646,10 +2790,10 @@ func main() { log.Fatal(err) } - methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodDeleteOkta( + name := "name_example" // string | Name for this login enforcement configuration + resp, err := client.Identity.MfaDeleteLoginEnforcement( context.Background(), - methodId, + name, vault.WithToken("my-token"), ) if err != nil { @@ -2666,7 +2810,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**methodId** | **string** | The unique identifier for this MFA method. | +**name** | **string** | Name for this login enforcement configuration | ### Other Parameters @@ -2682,7 +2826,7 @@ Name | Type | Description | Notes -## MFAMethodDeletePingID +## MfaDeleteOktaMethod Delete a configuration for the given MFA method @@ -2708,7 +2852,7 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodDeletePingID( + resp, err := client.Identity.MfaDeleteOktaMethod( context.Background(), methodId, vault.WithToken("my-token"), @@ -2743,7 +2887,7 @@ Name | Type | Description | Notes -## MFAMethodDeleteTOTP +## MfaDeletePingIdMethod Delete a configuration for the given MFA method @@ -2769,7 +2913,7 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodDeleteTOTP( + resp, err := client.Identity.MfaDeletePingIdMethod( context.Background(), methodId, vault.WithToken("my-token"), @@ -2804,9 +2948,9 @@ Name | Type | Description | Notes -## MFAMethodGenerateTOTP +## MfaDeleteTotpMethod -Update or create TOTP secret for the given method ID on the given entity. +Delete a configuration for the given MFA method ### Example @@ -2819,7 +2963,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2830,10 +2973,10 @@ func main() { log.Fatal(err) } - request := schema.NewMFAMethodGenerateTOTPRequestWithDefaults() - resp, err := client.Identity.MFAMethodGenerateTOTP( + methodId := "methodId_example" // string | The unique identifier for this MFA method. + resp, err := client.Identity.MfaDeleteTotpMethod( context.Background(), - request, + methodId, vault.WithToken("my-token"), ) if err != nil { @@ -2847,13 +2990,17 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**methodId** | **string** | The unique identifier for this MFA method. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAMethodGenerateTOTPRequest** | [**MFAMethodGenerateTOTPRequest**](MFAMethodGenerateTOTPRequest.md) | | + (empty response body) @@ -2862,9 +3009,9 @@ Name | Type | Description | Notes -## MFAMethodList +## MfaGenerateTotpSecret -List MFA method configurations for all MFA methods +Update or create TOTP secret for the given method ID on the given entity. ### Example @@ -2877,6 +3024,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2887,8 +3035,10 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.MFAMethodList( + request := schema.NewMfaGenerateTotpSecretRequestWithDefaults() + resp, err := client.Identity.MfaGenerateTotpSecret( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -2908,7 +3058,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **mfaGenerateTotpSecretRequest** | [**MfaGenerateTotpSecretRequest**](MfaGenerateTotpSecretRequest.md) | | (empty response body) @@ -2917,7 +3067,7 @@ Name | Type | Description | Notes -## MFAMethodListDuo +## MfaListDuoMethods List MFA method configurations for the given MFA method @@ -2942,7 +3092,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.MFAMethodListDuo( + resp, err := client.Identity.MfaListDuoMethods( context.Background(), vault.WithToken("my-token"), ) @@ -2972,9 +3122,9 @@ Name | Type | Description | Notes -## MFAMethodListOkta +## MfaListLoginEnforcements -List MFA method configurations for the given MFA method +List login enforcements ### Example @@ -2997,7 +3147,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.MFAMethodListOkta( + resp, err := client.Identity.MfaListLoginEnforcements( context.Background(), vault.WithToken("my-token"), ) @@ -3027,9 +3177,9 @@ Name | Type | Description | Notes -## MFAMethodListPingID +## MfaListMethods -List MFA method configurations for the given MFA method +List MFA method configurations for all MFA methods ### Example @@ -3052,7 +3202,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.MFAMethodListPingID( + resp, err := client.Identity.MfaListMethods( context.Background(), vault.WithToken("my-token"), ) @@ -3082,7 +3232,7 @@ Name | Type | Description | Notes -## MFAMethodListTOTP +## MfaListOktaMethods List MFA method configurations for the given MFA method @@ -3107,7 +3257,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.MFAMethodListTOTP( + resp, err := client.Identity.MfaListOktaMethods( context.Background(), vault.WithToken("my-token"), ) @@ -3137,9 +3287,9 @@ Name | Type | Description | Notes -## MFAMethodRead +## MfaListPingIdMethods -Read the current configuration for the given ID regardless of the MFA method type +List MFA method configurations for the given MFA method ### Example @@ -3162,10 +3312,8 @@ func main() { log.Fatal(err) } - methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodRead( + resp, err := client.Identity.MfaListPingIdMethods( context.Background(), - methodId, vault.WithToken("my-token"), ) if err != nil { @@ -3179,17 +3327,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**methodId** | **string** | The unique identifier for this MFA method. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -3198,9 +3342,9 @@ Name | Type | Description | Notes -## MFAMethodReadDuo +## MfaListTotpMethods -Read the current configuration for the given MFA method +List MFA method configurations for the given MFA method ### Example @@ -3223,10 +3367,8 @@ func main() { log.Fatal(err) } - methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodReadDuo( + resp, err := client.Identity.MfaListTotpMethods( context.Background(), - methodId, vault.WithToken("my-token"), ) if err != nil { @@ -3240,17 +3382,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**methodId** | **string** | The unique identifier for this MFA method. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -3259,7 +3397,7 @@ Name | Type | Description | Notes -## MFAMethodReadOkta +## MfaReadDuoMethodConfiguration Read the current configuration for the given MFA method @@ -3285,7 +3423,7 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodReadOkta( + resp, err := client.Identity.MfaReadDuoMethodConfiguration( context.Background(), methodId, vault.WithToken("my-token"), @@ -3320,9 +3458,9 @@ Name | Type | Description | Notes -## MFAMethodReadPingID +## MfaReadLoginEnforcement -Read the current configuration for the given MFA method +Read the current login enforcement ### Example @@ -3345,10 +3483,10 @@ func main() { log.Fatal(err) } - methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodReadPingID( + name := "name_example" // string | Name for this login enforcement configuration + resp, err := client.Identity.MfaReadLoginEnforcement( context.Background(), - methodId, + name, vault.WithToken("my-token"), ) if err != nil { @@ -3365,7 +3503,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**methodId** | **string** | The unique identifier for this MFA method. | +**name** | **string** | Name for this login enforcement configuration | ### Other Parameters @@ -3381,9 +3519,9 @@ Name | Type | Description | Notes -## MFAMethodReadTOTP +## MfaReadMethodConfiguration -Read the current configuration for the given MFA method +Read the current configuration for the given ID regardless of the MFA method type ### Example @@ -3407,7 +3545,7 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - resp, err := client.Identity.MFAMethodReadTOTP( + resp, err := client.Identity.MfaReadMethodConfiguration( context.Background(), methodId, vault.WithToken("my-token"), @@ -3442,9 +3580,9 @@ Name | Type | Description | Notes -## MFAMethodWriteDuo +## MfaReadOktaMethodConfiguration -Update or create a configuration for the given MFA method +Read the current configuration for the given MFA method ### Example @@ -3457,7 +3595,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3469,11 +3606,9 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - request := schema.NewMFAMethodWriteDuoRequestWithDefaults() - resp, err := client.Identity.MFAMethodWriteDuo( + resp, err := client.Identity.MfaReadOktaMethodConfiguration( context.Background(), methodId, - request, vault.WithToken("my-token"), ) if err != nil { @@ -3498,7 +3633,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAMethodWriteDuoRequest** | [**MFAMethodWriteDuoRequest**](MFAMethodWriteDuoRequest.md) | | (empty response body) @@ -3507,9 +3641,9 @@ Name | Type | Description | Notes -## MFAMethodWriteOkta +## MfaReadPingIdMethodConfiguration -Update or create a configuration for the given MFA method +Read the current configuration for the given MFA method ### Example @@ -3522,7 +3656,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3534,11 +3667,9 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - request := schema.NewMFAMethodWriteOktaRequestWithDefaults() - resp, err := client.Identity.MFAMethodWriteOkta( + resp, err := client.Identity.MfaReadPingIdMethodConfiguration( context.Background(), methodId, - request, vault.WithToken("my-token"), ) if err != nil { @@ -3563,7 +3694,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAMethodWriteOktaRequest** | [**MFAMethodWriteOktaRequest**](MFAMethodWriteOktaRequest.md) | | (empty response body) @@ -3572,9 +3702,9 @@ Name | Type | Description | Notes -## MFAMethodWritePingID +## MfaReadTotpMethodConfiguration -Update or create a configuration for the given MFA method +Read the current configuration for the given MFA method ### Example @@ -3587,7 +3717,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3599,11 +3728,9 @@ func main() { } methodId := "methodId_example" // string | The unique identifier for this MFA method. - request := schema.NewMFAMethodWritePingIDRequestWithDefaults() - resp, err := client.Identity.MFAMethodWritePingID( + resp, err := client.Identity.MfaReadTotpMethodConfiguration( context.Background(), methodId, - request, vault.WithToken("my-token"), ) if err != nil { @@ -3628,7 +3755,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAMethodWritePingIDRequest** | [**MFAMethodWritePingIDRequest**](MFAMethodWritePingIDRequest.md) | | (empty response body) @@ -3637,9 +3763,9 @@ Name | Type | Description | Notes -## MFAMethodWriteTOTP +## MfaWriteLoginEnforcement -Update or create a configuration for the given MFA method +Create or update a login enforcement ### Example @@ -3663,11 +3789,11 @@ func main() { log.Fatal(err) } - methodId := "methodId_example" // string | The unique identifier for this MFA method. - request := schema.NewMFAMethodWriteTOTPRequestWithDefaults() - resp, err := client.Identity.MFAMethodWriteTOTP( + name := "name_example" // string | Name for this login enforcement configuration + request := schema.NewMfaWriteLoginEnforcementRequestWithDefaults() + resp, err := client.Identity.MfaWriteLoginEnforcement( context.Background(), - methodId, + name, request, vault.WithToken("my-token"), ) @@ -3685,7 +3811,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**methodId** | **string** | The unique identifier for this MFA method. | +**name** | **string** | Name for this login enforcement configuration | ### Other Parameters @@ -3693,7 +3819,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAMethodWriteTOTPRequest** | [**MFAMethodWriteTOTPRequest**](MFAMethodWriteTOTPRequest.md) | | + **mfaWriteLoginEnforcementRequest** | [**MfaWriteLoginEnforcementRequest**](MfaWriteLoginEnforcementRequest.md) | | (empty response body) @@ -3702,9 +3828,9 @@ Name | Type | Description | Notes -## MFAReadLoginEnforcement +## OidcConfigure + -Read the current login enforcement ### Example @@ -3717,6 +3843,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3727,10 +3854,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name for this login enforcement configuration - resp, err := client.Identity.MFAReadLoginEnforcement( + request := schema.NewOidcConfigureRequestWithDefaults() + resp, err := client.Identity.OidcConfigure( context.Background(), - name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3744,17 +3871,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name for this login enforcement configuration | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **oidcConfigureRequest** | [**OidcConfigureRequest**](OidcConfigureRequest.md) | | (empty response body) @@ -3763,9 +3886,9 @@ Name | Type | Description | Notes -## MFAWriteLoginEnforcement +## OidcDeleteAssignment + -Create or update a login enforcement ### Example @@ -3778,7 +3901,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3789,12 +3911,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name for this login enforcement configuration - request := schema.NewMFAWriteLoginEnforcementRequestWithDefaults() - resp, err := client.Identity.MFAWriteLoginEnforcement( + name := "name_example" // string | Name of the assignment + resp, err := client.Identity.OidcDeleteAssignment( context.Background(), name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -3811,7 +3931,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name for this login enforcement configuration | +**name** | **string** | Name of the assignment | ### Other Parameters @@ -3819,7 +3939,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mFAWriteLoginEnforcementRequest** | [**MFAWriteLoginEnforcementRequest**](MFAWriteLoginEnforcementRequest.md) | | (empty response body) @@ -3828,7 +3947,7 @@ Name | Type | Description | Notes -## OIDCDeleteAssignment +## OidcDeleteClient @@ -3853,8 +3972,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the assignment - resp, err := client.Identity.OIDCDeleteAssignment( + name := "name_example" // string | Name of the client. + resp, err := client.Identity.OidcDeleteClient( context.Background(), name, vault.WithToken("my-token"), @@ -3873,7 +3992,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the assignment | +**name** | **string** | Name of the client. | ### Other Parameters @@ -3889,9 +4008,9 @@ Name | Type | Description | Notes -## OIDCDeleteClient - +## OidcDeleteKey +CRUD operations for OIDC keys. ### Example @@ -3914,8 +4033,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the client. - resp, err := client.Identity.OIDCDeleteClient( + name := "name_example" // string | Name of the key + resp, err := client.Identity.OidcDeleteKey( context.Background(), name, vault.WithToken("my-token"), @@ -3934,7 +4053,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the client. | +**name** | **string** | Name of the key | ### Other Parameters @@ -3950,9 +4069,9 @@ Name | Type | Description | Notes -## OIDCDeleteKey +## OidcDeleteProvider + -CRUD operations for OIDC keys. ### Example @@ -3975,8 +4094,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key - resp, err := client.Identity.OIDCDeleteKey( + name := "name_example" // string | Name of the provider + resp, err := client.Identity.OidcDeleteProvider( context.Background(), name, vault.WithToken("my-token"), @@ -3995,7 +4114,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | +**name** | **string** | Name of the provider | ### Other Parameters @@ -4011,9 +4130,9 @@ Name | Type | Description | Notes -## OIDCDeleteProvider - +## OidcDeleteRole +CRUD operations on OIDC Roles ### Example @@ -4036,8 +4155,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the provider - resp, err := client.Identity.OIDCDeleteProvider( + name := "name_example" // string | Name of the role + resp, err := client.Identity.OidcDeleteRole( context.Background(), name, vault.WithToken("my-token"), @@ -4056,7 +4175,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the provider | +**name** | **string** | Name of the role | ### Other Parameters @@ -4072,9 +4191,9 @@ Name | Type | Description | Notes -## OIDCDeleteRole +## OidcDeleteScope + -CRUD operations on OIDC Roles ### Example @@ -4097,8 +4216,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Identity.OIDCDeleteRole( + name := "name_example" // string | Name of the scope + resp, err := client.Identity.OidcDeleteScope( context.Background(), name, vault.WithToken("my-token"), @@ -4117,7 +4236,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**name** | **string** | Name of the scope | ### Other Parameters @@ -4133,9 +4252,9 @@ Name | Type | Description | Notes -## OIDCDeleteScope - +## OidcGenerateToken +Generate an OIDC token ### Example @@ -4158,8 +4277,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the scope - resp, err := client.Identity.OIDCDeleteScope( + name := "name_example" // string | Name of the role + resp, err := client.Identity.OidcGenerateToken( context.Background(), name, vault.WithToken("my-token"), @@ -4178,7 +4297,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the scope | +**name** | **string** | Name of the role | ### Other Parameters @@ -4194,7 +4313,7 @@ Name | Type | Description | Notes -## OIDCIntrospect +## OidcIntrospect Verify the authenticity of an OIDC token @@ -4220,8 +4339,8 @@ func main() { log.Fatal(err) } - request := schema.NewOIDCIntrospectRequestWithDefaults() - resp, err := client.Identity.OIDCIntrospect( + request := schema.NewOidcIntrospectRequestWithDefaults() + resp, err := client.Identity.OidcIntrospect( context.Background(), request, vault.WithToken("my-token"), @@ -4243,7 +4362,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCIntrospectRequest** | [**OIDCIntrospectRequest**](OIDCIntrospectRequest.md) | | + **oidcIntrospectRequest** | [**OidcIntrospectRequest**](OidcIntrospectRequest.md) | | (empty response body) @@ -4252,7 +4371,7 @@ Name | Type | Description | Notes -## OIDCListAssignments +## OidcListAssignments @@ -4277,7 +4396,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.OIDCListAssignments( + resp, err := client.Identity.OidcListAssignments( context.Background(), vault.WithToken("my-token"), ) @@ -4307,7 +4426,7 @@ Name | Type | Description | Notes -## OIDCListClients +## OidcListClients @@ -4332,7 +4451,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.OIDCListClients( + resp, err := client.Identity.OidcListClients( context.Background(), vault.WithToken("my-token"), ) @@ -4362,7 +4481,7 @@ Name | Type | Description | Notes -## OIDCListKeys +## OidcListKeys List OIDC keys @@ -4387,7 +4506,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.OIDCListKeys( + resp, err := client.Identity.OidcListKeys( context.Background(), vault.WithToken("my-token"), ) @@ -4417,7 +4536,7 @@ Name | Type | Description | Notes -## OIDCListProviders +## OidcListProviders @@ -4443,7 +4562,7 @@ func main() { } allowedClientId := "allowedClientId_example" // string | Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids. (defaults to "") - resp, err := client.Identity.OIDCListProviders( + resp, err := client.Identity.OidcListProviders( context.Background(), allowedClientId, vault.WithToken("my-token"), @@ -4475,7 +4594,7 @@ Name | Type | Description | Notes -## OIDCListRoles +## OidcListRoles List configured OIDC roles @@ -4500,7 +4619,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.OIDCListRoles( + resp, err := client.Identity.OidcListRoles( context.Background(), vault.WithToken("my-token"), ) @@ -4530,7 +4649,7 @@ Name | Type | Description | Notes -## OIDCListScopes +## OidcListScopes @@ -4555,7 +4674,7 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.OIDCListScopes( + resp, err := client.Identity.OidcListScopes( context.Background(), vault.WithToken("my-token"), ) @@ -4585,7 +4704,7 @@ Name | Type | Description | Notes -## OIDCReadAssignment +## OidcProviderAuthorize @@ -4610,8 +4729,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the assignment - resp, err := client.Identity.OIDCReadAssignment( + name := "name_example" // string | Name of the provider + resp, err := client.Identity.OidcProviderAuthorize( context.Background(), name, vault.WithToken("my-token"), @@ -4630,7 +4749,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the assignment | +**name** | **string** | Name of the provider | ### Other Parameters @@ -4646,7 +4765,7 @@ Name | Type | Description | Notes -## OIDCReadClient +## OidcProviderAuthorize2 @@ -4661,6 +4780,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4671,10 +4791,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the client. - resp, err := client.Identity.OIDCReadClient( + name := "name_example" // string | Name of the provider + request := schema.NewOidcProviderAuthorize2RequestWithDefaults() + resp, err := client.Identity.OidcProviderAuthorize2( context.Background(), name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4691,7 +4813,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the client. | +**name** | **string** | Name of the provider | ### Other Parameters @@ -4699,6 +4821,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **oidcProviderAuthorize2Request** | [**OidcProviderAuthorize2Request**](OidcProviderAuthorize2Request.md) | | (empty response body) @@ -4707,61 +4830,9 @@ Name | Type | Description | Notes -## OIDCReadConfig - -OIDC configuration - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } +## OidcProviderToken - resp, err := client.Identity.OIDCReadConfig( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - log.Println(resp.Data) -} -``` - -### Path Parameters - -This endpoint does not require any parameters. - -### Other Parameters - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OIDCReadKey - -CRUD operations for OIDC keys. ### Example @@ -4774,6 +4845,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4784,10 +4856,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key - resp, err := client.Identity.OIDCReadKey( + name := "name_example" // string | Name of the provider + request := schema.NewOidcProviderTokenRequestWithDefaults() + resp, err := client.Identity.OidcProviderToken( context.Background(), name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4804,7 +4878,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | +**name** | **string** | Name of the provider | ### Other Parameters @@ -4812,6 +4886,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **oidcProviderTokenRequest** | [**OidcProviderTokenRequest**](OidcProviderTokenRequest.md) | | (empty response body) @@ -4820,7 +4895,7 @@ Name | Type | Description | Notes -## OIDCReadProvider +## OidcProviderUserInfo @@ -4846,7 +4921,7 @@ func main() { } name := "name_example" // string | Name of the provider - resp, err := client.Identity.OIDCReadProvider( + resp, err := client.Identity.OidcProviderUserInfo( context.Background(), name, vault.WithToken("my-token"), @@ -4881,7 +4956,7 @@ Name | Type | Description | Notes -## OIDCReadProviderAuthorize +## OidcProviderUserInfo2 @@ -4907,7 +4982,7 @@ func main() { } name := "name_example" // string | Name of the provider - resp, err := client.Identity.OIDCReadProviderAuthorize( + resp, err := client.Identity.OidcProviderUserInfo2( context.Background(), name, vault.WithToken("my-token"), @@ -4942,7 +5017,7 @@ Name | Type | Description | Notes -## OIDCReadProviderUserInfo +## OidcReadAssignment @@ -4967,8 +5042,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the provider - resp, err := client.Identity.OIDCReadProviderUserInfo( + name := "name_example" // string | Name of the assignment + resp, err := client.Identity.OidcReadAssignment( context.Background(), name, vault.WithToken("my-token"), @@ -4987,7 +5062,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the provider | +**name** | **string** | Name of the assignment | ### Other Parameters @@ -5003,7 +5078,7 @@ Name | Type | Description | Notes -## OIDCReadProviderWellKnownKeys +## OidcReadClient @@ -5028,8 +5103,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the provider - resp, err := client.Identity.OIDCReadProviderWellKnownKeys( + name := "name_example" // string | Name of the client. + resp, err := client.Identity.OidcReadClient( context.Background(), name, vault.WithToken("my-token"), @@ -5048,7 +5123,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the provider | +**name** | **string** | Name of the client. | ### Other Parameters @@ -5064,7 +5139,7 @@ Name | Type | Description | Notes -## OIDCReadProviderWellKnownOpenIDConfiguration +## OidcReadConfiguration @@ -5089,10 +5164,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the provider - resp, err := client.Identity.OIDCReadProviderWellKnownOpenIDConfiguration( + resp, err := client.Identity.OidcReadConfiguration( context.Background(), - name, vault.WithToken("my-token"), ) if err != nil { @@ -5105,18 +5178,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the provider | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -5125,9 +5191,9 @@ Name | Type | Description | Notes -## OIDCReadRole +## OidcReadKey -CRUD operations on OIDC Roles +CRUD operations for OIDC keys. ### Example @@ -5150,8 +5216,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Identity.OIDCReadRole( + name := "name_example" // string | Name of the key + resp, err := client.Identity.OidcReadKey( context.Background(), name, vault.WithToken("my-token"), @@ -5170,7 +5236,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**name** | **string** | Name of the key | ### Other Parameters @@ -5186,9 +5252,9 @@ Name | Type | Description | Notes -## OIDCReadScope - +## OidcReadOpenIdConfiguration +Query OIDC configurations ### Example @@ -5211,10 +5277,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the scope - resp, err := client.Identity.OIDCReadScope( + resp, err := client.Identity.OidcReadOpenIdConfiguration( context.Background(), - name, vault.WithToken("my-token"), ) if err != nil { @@ -5227,18 +5291,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the scope | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -5247,9 +5304,9 @@ Name | Type | Description | Notes -## OIDCReadToken +## OidcReadProvider + -Generate an OIDC token ### Example @@ -5272,8 +5329,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Identity.OIDCReadToken( + name := "name_example" // string | Name of the provider + resp, err := client.Identity.OidcReadProvider( context.Background(), name, vault.WithToken("my-token"), @@ -5292,7 +5349,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**name** | **string** | Name of the provider | ### Other Parameters @@ -5308,61 +5365,9 @@ Name | Type | Description | Notes -## OIDCReadWellKnownKeys - -Retrieve public keys - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Identity.OIDCReadWellKnownKeys( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } +## OidcReadProviderOpenIdConfiguration - log.Println(resp.Data) -} -``` -### Path Parameters - -This endpoint does not require any parameters. - -### Other Parameters - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## OIDCReadWellKnownOpenIDConfiguration - -Query OIDC configurations ### Example @@ -5385,8 +5390,10 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.OIDCReadWellKnownOpenIDConfiguration( + name := "name_example" // string | Name of the provider + resp, err := client.Identity.OidcReadProviderOpenIdConfiguration( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -5399,11 +5406,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the provider | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -5412,9 +5426,9 @@ This endpoint does not require any parameters. -## OIDCRotateKey +## OidcReadProviderPublicKeys + -Rotate a named OIDC key. ### Example @@ -5427,7 +5441,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5438,12 +5451,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key - request := schema.NewOIDCRotateKeyRequestWithDefaults() - resp, err := client.Identity.OIDCRotateKey( + name := "name_example" // string | Name of the provider + resp, err := client.Identity.OidcReadProviderPublicKeys( context.Background(), name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -5460,7 +5471,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | +**name** | **string** | Name of the provider | ### Other Parameters @@ -5468,7 +5479,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCRotateKeyRequest** | [**OIDCRotateKeyRequest**](OIDCRotateKeyRequest.md) | | (empty response body) @@ -5477,9 +5487,9 @@ Name | Type | Description | Notes -## OIDCWriteAssignment - +## OidcReadPublicKeys +Retrieve public keys ### Example @@ -5492,7 +5502,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5503,12 +5512,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the assignment - request := schema.NewOIDCWriteAssignmentRequestWithDefaults() - resp, err := client.Identity.OIDCWriteAssignment( + resp, err := client.Identity.OidcReadPublicKeys( context.Background(), - name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -5521,19 +5526,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the assignment | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **oIDCWriteAssignmentRequest** | [**OIDCWriteAssignmentRequest**](OIDCWriteAssignmentRequest.md) | | (empty response body) @@ -5542,9 +5539,9 @@ Name | Type | Description | Notes -## OIDCWriteClient - +## OidcReadRole +CRUD operations on OIDC Roles ### Example @@ -5557,7 +5554,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5568,12 +5564,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the client. - request := schema.NewOIDCWriteClientRequestWithDefaults() - resp, err := client.Identity.OIDCWriteClient( + name := "name_example" // string | Name of the role + resp, err := client.Identity.OidcReadRole( context.Background(), name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -5590,7 +5584,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the client. | +**name** | **string** | Name of the role | ### Other Parameters @@ -5598,7 +5592,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteClientRequest** | [**OIDCWriteClientRequest**](OIDCWriteClientRequest.md) | | (empty response body) @@ -5607,9 +5600,9 @@ Name | Type | Description | Notes -## OIDCWriteConfig +## OidcReadScope + -OIDC configuration ### Example @@ -5622,7 +5615,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5633,10 +5625,10 @@ func main() { log.Fatal(err) } - request := schema.NewOIDCWriteConfigRequestWithDefaults() - resp, err := client.Identity.OIDCWriteConfig( + name := "name_example" // string | Name of the scope + resp, err := client.Identity.OidcReadScope( context.Background(), - request, + name, vault.WithToken("my-token"), ) if err != nil { @@ -5650,13 +5642,17 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the scope | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteConfigRequest** | [**OIDCWriteConfigRequest**](OIDCWriteConfigRequest.md) | | + (empty response body) @@ -5665,9 +5661,9 @@ Name | Type | Description | Notes -## OIDCWriteKey +## OidcRotateKey -CRUD operations for OIDC keys. +Rotate a named OIDC key. ### Example @@ -5692,8 +5688,8 @@ func main() { } name := "name_example" // string | Name of the key - request := schema.NewOIDCWriteKeyRequestWithDefaults() - resp, err := client.Identity.OIDCWriteKey( + request := schema.NewOidcRotateKeyRequestWithDefaults() + resp, err := client.Identity.OidcRotateKey( context.Background(), name, request, @@ -5721,7 +5717,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteKeyRequest** | [**OIDCWriteKeyRequest**](OIDCWriteKeyRequest.md) | | + **oidcRotateKeyRequest** | [**OidcRotateKeyRequest**](OidcRotateKeyRequest.md) | | (empty response body) @@ -5730,7 +5726,7 @@ Name | Type | Description | Notes -## OIDCWriteProvider +## OidcWriteAssignment @@ -5756,9 +5752,9 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the provider - request := schema.NewOIDCWriteProviderRequestWithDefaults() - resp, err := client.Identity.OIDCWriteProvider( + name := "name_example" // string | Name of the assignment + request := schema.NewOidcWriteAssignmentRequestWithDefaults() + resp, err := client.Identity.OidcWriteAssignment( context.Background(), name, request, @@ -5778,7 +5774,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the provider | +**name** | **string** | Name of the assignment | ### Other Parameters @@ -5786,7 +5782,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteProviderRequest** | [**OIDCWriteProviderRequest**](OIDCWriteProviderRequest.md) | | + **oidcWriteAssignmentRequest** | [**OidcWriteAssignmentRequest**](OidcWriteAssignmentRequest.md) | | (empty response body) @@ -5795,7 +5791,7 @@ Name | Type | Description | Notes -## OIDCWriteProviderAuthorize +## OidcWriteClient @@ -5821,9 +5817,9 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the provider - request := schema.NewOIDCWriteProviderAuthorizeRequestWithDefaults() - resp, err := client.Identity.OIDCWriteProviderAuthorize( + name := "name_example" // string | Name of the client. + request := schema.NewOidcWriteClientRequestWithDefaults() + resp, err := client.Identity.OidcWriteClient( context.Background(), name, request, @@ -5843,7 +5839,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the provider | +**name** | **string** | Name of the client. | ### Other Parameters @@ -5851,7 +5847,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteProviderAuthorizeRequest** | [**OIDCWriteProviderAuthorizeRequest**](OIDCWriteProviderAuthorizeRequest.md) | | + **oidcWriteClientRequest** | [**OidcWriteClientRequest**](OidcWriteClientRequest.md) | | (empty response body) @@ -5860,9 +5856,9 @@ Name | Type | Description | Notes -## OIDCWriteProviderToken - +## OidcWriteKey +CRUD operations for OIDC keys. ### Example @@ -5886,9 +5882,9 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the provider - request := schema.NewOIDCWriteProviderTokenRequestWithDefaults() - resp, err := client.Identity.OIDCWriteProviderToken( + name := "name_example" // string | Name of the key + request := schema.NewOidcWriteKeyRequestWithDefaults() + resp, err := client.Identity.OidcWriteKey( context.Background(), name, request, @@ -5908,7 +5904,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the provider | +**name** | **string** | Name of the key | ### Other Parameters @@ -5916,7 +5912,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteProviderTokenRequest** | [**OIDCWriteProviderTokenRequest**](OIDCWriteProviderTokenRequest.md) | | + **oidcWriteKeyRequest** | [**OidcWriteKeyRequest**](OidcWriteKeyRequest.md) | | (empty response body) @@ -5925,7 +5921,7 @@ Name | Type | Description | Notes -## OIDCWriteProviderUserInfo +## OidcWriteProvider @@ -5940,6 +5936,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5951,9 +5948,11 @@ func main() { } name := "name_example" // string | Name of the provider - resp, err := client.Identity.OIDCWriteProviderUserInfo( + request := schema.NewOidcWriteProviderRequestWithDefaults() + resp, err := client.Identity.OidcWriteProvider( context.Background(), name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -5978,6 +5977,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **oidcWriteProviderRequest** | [**OidcWriteProviderRequest**](OidcWriteProviderRequest.md) | | (empty response body) @@ -5986,7 +5986,7 @@ Name | Type | Description | Notes -## OIDCWriteRole +## OidcWriteRole CRUD operations on OIDC Roles @@ -6013,8 +6013,8 @@ func main() { } name := "name_example" // string | Name of the role - request := schema.NewOIDCWriteRoleRequestWithDefaults() - resp, err := client.Identity.OIDCWriteRole( + request := schema.NewOidcWriteRoleRequestWithDefaults() + resp, err := client.Identity.OidcWriteRole( context.Background(), name, request, @@ -6042,7 +6042,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteRoleRequest** | [**OIDCWriteRoleRequest**](OIDCWriteRoleRequest.md) | | + **oidcWriteRoleRequest** | [**OidcWriteRoleRequest**](OidcWriteRoleRequest.md) | | (empty response body) @@ -6051,7 +6051,7 @@ Name | Type | Description | Notes -## OIDCWriteScope +## OidcWriteScope @@ -6078,8 +6078,8 @@ func main() { } name := "name_example" // string | Name of the scope - request := schema.NewOIDCWriteScopeRequestWithDefaults() - resp, err := client.Identity.OIDCWriteScope( + request := schema.NewOidcWriteScopeRequestWithDefaults() + resp, err := client.Identity.OidcWriteScope( context.Background(), name, request, @@ -6107,7 +6107,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **oIDCWriteScopeRequest** | [**OIDCWriteScopeRequest**](OIDCWriteScopeRequest.md) | | + **oidcWriteScopeRequest** | [**OidcWriteScopeRequest**](OidcWriteScopeRequest.md) | | (empty response body) @@ -6116,9 +6116,9 @@ Name | Type | Description | Notes -## PersonaIDDeleteByID +## PersonaCreate -Update, read or delete an alias ID. +Create a new alias. ### Example @@ -6131,6 +6131,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6141,10 +6142,10 @@ func main() { log.Fatal(err) } - id := "id_example" // string | ID of the persona - resp, err := client.Identity.PersonaIDDeleteByID( + request := schema.NewPersonaCreateRequestWithDefaults() + resp, err := client.Identity.PersonaCreate( context.Background(), - id, + request, vault.WithToken("my-token"), ) if err != nil { @@ -6158,17 +6159,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**id** | **string** | ID of the persona | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **personaCreateRequest** | [**PersonaCreateRequest**](PersonaCreateRequest.md) | | (empty response body) @@ -6177,9 +6174,9 @@ Name | Type | Description | Notes -## PersonaIDReadByID +## PersonaDeleteById + -Update, read or delete an alias ID. ### Example @@ -6203,7 +6200,7 @@ func main() { } id := "id_example" // string | ID of the persona - resp, err := client.Identity.PersonaIDReadByID( + resp, err := client.Identity.PersonaDeleteById( context.Background(), id, vault.WithToken("my-token"), @@ -6238,9 +6235,9 @@ Name | Type | Description | Notes -## PersonaIDWriteByID +## PersonaListById -Update, read or delete an alias ID. +List all the alias IDs. ### Example @@ -6253,7 +6250,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6264,12 +6260,8 @@ func main() { log.Fatal(err) } - id := "id_example" // string | ID of the persona - request := schema.NewPersonaIDWriteByIDRequestWithDefaults() - resp, err := client.Identity.PersonaIDWriteByID( + resp, err := client.Identity.PersonaListById( context.Background(), - id, - request, vault.WithToken("my-token"), ) if err != nil { @@ -6283,18 +6275,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**id** | **string** | ID of the persona | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **personaIDWriteByIDRequest** | [**PersonaIDWriteByIDRequest**](PersonaIDWriteByIDRequest.md) | | + **list** | **string** | Must be set to `true` | (empty response body) @@ -6303,9 +6290,9 @@ Name | Type | Description | Notes -## PersonaListByID +## PersonaReadById + -List all the alias IDs. ### Example @@ -6328,8 +6315,10 @@ func main() { log.Fatal(err) } - resp, err := client.Identity.PersonaListByID( + id := "id_example" // string | ID of the persona + resp, err := client.Identity.PersonaReadById( context.Background(), + id, vault.WithToken("my-token"), ) if err != nil { @@ -6343,13 +6332,17 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**id** | **string** | ID of the persona | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -6358,9 +6351,9 @@ Name | Type | Description | Notes -## PersonaWrite +## PersonaUpdateById + -Create a new alias. ### Example @@ -6384,9 +6377,11 @@ func main() { log.Fatal(err) } - request := schema.NewPersonaWriteRequestWithDefaults() - resp, err := client.Identity.PersonaWrite( + id := "id_example" // string | ID of the persona + request := schema.NewPersonaUpdateByIdRequestWithDefaults() + resp, err := client.Identity.PersonaUpdateById( context.Background(), + id, request, vault.WithToken("my-token"), ) @@ -6401,13 +6396,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**id** | **string** | ID of the persona | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **personaWriteRequest** | [**PersonaWriteRequest**](PersonaWriteRequest.md) | | + + **personaUpdateByIdRequest** | [**PersonaUpdateByIdRequest**](PersonaUpdateByIdRequest.md) | | (empty response body) diff --git a/docs/WriteInitRequest.md b/docs/InitializeRequest.md similarity index 73% rename from docs/WriteInitRequest.md rename to docs/InitializeRequest.md index 9971d710..d550fef9 100644 --- a/docs/WriteInitRequest.md +++ b/docs/InitializeRequest.md @@ -1,4 +1,4 @@ -# WriteInitRequest +# InitializeRequest ## Properties @@ -19,47 +19,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteInitRequest +### NewInitializeRequest -`func NewWriteInitRequest() *WriteInitRequest` +`func NewInitializeRequest() *InitializeRequest` -NewWriteInitRequest instantiates a new WriteInitRequest object +NewInitializeRequest instantiates a new InitializeRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteInitRequestWithDefaults +### NewInitializeRequestWithDefaults -`func NewWriteInitRequestWithDefaults() *WriteInitRequest` +`func NewInitializeRequestWithDefaults() *InitializeRequest` -NewWriteInitRequestWithDefaults instantiates a new WriteInitRequest object +NewInitializeRequestWithDefaults instantiates a new InitializeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPgpKeys -`func (o *WriteInitRequest) GetPgpKeys() []string` +`func (o *InitializeRequest) GetPgpKeys() []string` GetPgpKeys returns the PgpKeys field if non-nil, zero value otherwise. ### GetPgpKeysOk -`func (o *WriteInitRequest) GetPgpKeysOk() (*[]string, bool)` +`func (o *InitializeRequest) GetPgpKeysOk() (*[]string, bool)` GetPgpKeysOk returns a tuple with the PgpKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPgpKeys -`func (o *WriteInitRequest) SetPgpKeys(v []string)` +`func (o *InitializeRequest) SetPgpKeys(v []string)` SetPgpKeys sets PgpKeys field to given value. ### HasPgpKeys -`func (o *WriteInitRequest) HasPgpKeys() bool` +`func (o *InitializeRequest) HasPgpKeys() bool` HasPgpKeys returns a boolean if a field has been set. @@ -68,27 +68,27 @@ HasPgpKeys returns a boolean if a field has been set. ### GetRecoveryPgpKeys -`func (o *WriteInitRequest) GetRecoveryPgpKeys() []string` +`func (o *InitializeRequest) GetRecoveryPgpKeys() []string` GetRecoveryPgpKeys returns the RecoveryPgpKeys field if non-nil, zero value otherwise. ### GetRecoveryPgpKeysOk -`func (o *WriteInitRequest) GetRecoveryPgpKeysOk() (*[]string, bool)` +`func (o *InitializeRequest) GetRecoveryPgpKeysOk() (*[]string, bool)` GetRecoveryPgpKeysOk returns a tuple with the RecoveryPgpKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRecoveryPgpKeys -`func (o *WriteInitRequest) SetRecoveryPgpKeys(v []string)` +`func (o *InitializeRequest) SetRecoveryPgpKeys(v []string)` SetRecoveryPgpKeys sets RecoveryPgpKeys field to given value. ### HasRecoveryPgpKeys -`func (o *WriteInitRequest) HasRecoveryPgpKeys() bool` +`func (o *InitializeRequest) HasRecoveryPgpKeys() bool` HasRecoveryPgpKeys returns a boolean if a field has been set. @@ -97,27 +97,27 @@ HasRecoveryPgpKeys returns a boolean if a field has been set. ### GetRecoveryShares -`func (o *WriteInitRequest) GetRecoveryShares() int32` +`func (o *InitializeRequest) GetRecoveryShares() int32` GetRecoveryShares returns the RecoveryShares field if non-nil, zero value otherwise. ### GetRecoverySharesOk -`func (o *WriteInitRequest) GetRecoverySharesOk() (*int32, bool)` +`func (o *InitializeRequest) GetRecoverySharesOk() (*int32, bool)` GetRecoverySharesOk returns a tuple with the RecoveryShares field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRecoveryShares -`func (o *WriteInitRequest) SetRecoveryShares(v int32)` +`func (o *InitializeRequest) SetRecoveryShares(v int32)` SetRecoveryShares sets RecoveryShares field to given value. ### HasRecoveryShares -`func (o *WriteInitRequest) HasRecoveryShares() bool` +`func (o *InitializeRequest) HasRecoveryShares() bool` HasRecoveryShares returns a boolean if a field has been set. @@ -126,27 +126,27 @@ HasRecoveryShares returns a boolean if a field has been set. ### GetRecoveryThreshold -`func (o *WriteInitRequest) GetRecoveryThreshold() int32` +`func (o *InitializeRequest) GetRecoveryThreshold() int32` GetRecoveryThreshold returns the RecoveryThreshold field if non-nil, zero value otherwise. ### GetRecoveryThresholdOk -`func (o *WriteInitRequest) GetRecoveryThresholdOk() (*int32, bool)` +`func (o *InitializeRequest) GetRecoveryThresholdOk() (*int32, bool)` GetRecoveryThresholdOk returns a tuple with the RecoveryThreshold field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRecoveryThreshold -`func (o *WriteInitRequest) SetRecoveryThreshold(v int32)` +`func (o *InitializeRequest) SetRecoveryThreshold(v int32)` SetRecoveryThreshold sets RecoveryThreshold field to given value. ### HasRecoveryThreshold -`func (o *WriteInitRequest) HasRecoveryThreshold() bool` +`func (o *InitializeRequest) HasRecoveryThreshold() bool` HasRecoveryThreshold returns a boolean if a field has been set. @@ -155,27 +155,27 @@ HasRecoveryThreshold returns a boolean if a field has been set. ### GetRootTokenPgpKey -`func (o *WriteInitRequest) GetRootTokenPgpKey() string` +`func (o *InitializeRequest) GetRootTokenPgpKey() string` GetRootTokenPgpKey returns the RootTokenPgpKey field if non-nil, zero value otherwise. ### GetRootTokenPgpKeyOk -`func (o *WriteInitRequest) GetRootTokenPgpKeyOk() (*string, bool)` +`func (o *InitializeRequest) GetRootTokenPgpKeyOk() (*string, bool)` GetRootTokenPgpKeyOk returns a tuple with the RootTokenPgpKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRootTokenPgpKey -`func (o *WriteInitRequest) SetRootTokenPgpKey(v string)` +`func (o *InitializeRequest) SetRootTokenPgpKey(v string)` SetRootTokenPgpKey sets RootTokenPgpKey field to given value. ### HasRootTokenPgpKey -`func (o *WriteInitRequest) HasRootTokenPgpKey() bool` +`func (o *InitializeRequest) HasRootTokenPgpKey() bool` HasRootTokenPgpKey returns a boolean if a field has been set. @@ -184,27 +184,27 @@ HasRootTokenPgpKey returns a boolean if a field has been set. ### GetSecretShares -`func (o *WriteInitRequest) GetSecretShares() int32` +`func (o *InitializeRequest) GetSecretShares() int32` GetSecretShares returns the SecretShares field if non-nil, zero value otherwise. ### GetSecretSharesOk -`func (o *WriteInitRequest) GetSecretSharesOk() (*int32, bool)` +`func (o *InitializeRequest) GetSecretSharesOk() (*int32, bool)` GetSecretSharesOk returns a tuple with the SecretShares field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretShares -`func (o *WriteInitRequest) SetSecretShares(v int32)` +`func (o *InitializeRequest) SetSecretShares(v int32)` SetSecretShares sets SecretShares field to given value. ### HasSecretShares -`func (o *WriteInitRequest) HasSecretShares() bool` +`func (o *InitializeRequest) HasSecretShares() bool` HasSecretShares returns a boolean if a field has been set. @@ -213,27 +213,27 @@ HasSecretShares returns a boolean if a field has been set. ### GetSecretThreshold -`func (o *WriteInitRequest) GetSecretThreshold() int32` +`func (o *InitializeRequest) GetSecretThreshold() int32` GetSecretThreshold returns the SecretThreshold field if non-nil, zero value otherwise. ### GetSecretThresholdOk -`func (o *WriteInitRequest) GetSecretThresholdOk() (*int32, bool)` +`func (o *InitializeRequest) GetSecretThresholdOk() (*int32, bool)` GetSecretThresholdOk returns a tuple with the SecretThreshold field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretThreshold -`func (o *WriteInitRequest) SetSecretThreshold(v int32)` +`func (o *InitializeRequest) SetSecretThreshold(v int32)` SetSecretThreshold sets SecretThreshold field to given value. ### HasSecretThreshold -`func (o *WriteInitRequest) HasSecretThreshold() bool` +`func (o *InitializeRequest) HasSecretThreshold() bool` HasSecretThreshold returns a boolean if a field has been set. @@ -242,27 +242,27 @@ HasSecretThreshold returns a boolean if a field has been set. ### GetStoredShares -`func (o *WriteInitRequest) GetStoredShares() int32` +`func (o *InitializeRequest) GetStoredShares() int32` GetStoredShares returns the StoredShares field if non-nil, zero value otherwise. ### GetStoredSharesOk -`func (o *WriteInitRequest) GetStoredSharesOk() (*int32, bool)` +`func (o *InitializeRequest) GetStoredSharesOk() (*int32, bool)` GetStoredSharesOk returns a tuple with the StoredShares field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStoredShares -`func (o *WriteInitRequest) SetStoredShares(v int32)` +`func (o *InitializeRequest) SetStoredShares(v int32)` SetStoredShares sets StoredShares field to given value. ### HasStoredShares -`func (o *WriteInitRequest) HasStoredShares() bool` +`func (o *InitializeRequest) HasStoredShares() bool` HasStoredShares returns a boolean if a field has been set. diff --git a/docs/WriteInternalCountersConfigRequest.md b/docs/InternalClientActivityConfigureRequest.md similarity index 63% rename from docs/WriteInternalCountersConfigRequest.md rename to docs/InternalClientActivityConfigureRequest.md index 6c61ba6f..86b087ed 100644 --- a/docs/WriteInternalCountersConfigRequest.md +++ b/docs/InternalClientActivityConfigureRequest.md @@ -1,4 +1,4 @@ -# WriteInternalCountersConfigRequest +# InternalClientActivityConfigureRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteInternalCountersConfigRequest +### NewInternalClientActivityConfigureRequest -`func NewWriteInternalCountersConfigRequest() *WriteInternalCountersConfigRequest` +`func NewInternalClientActivityConfigureRequest() *InternalClientActivityConfigureRequest` -NewWriteInternalCountersConfigRequest instantiates a new WriteInternalCountersConfigRequest object +NewInternalClientActivityConfigureRequest instantiates a new InternalClientActivityConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteInternalCountersConfigRequestWithDefaults +### NewInternalClientActivityConfigureRequestWithDefaults -`func NewWriteInternalCountersConfigRequestWithDefaults() *WriteInternalCountersConfigRequest` +`func NewInternalClientActivityConfigureRequestWithDefaults() *InternalClientActivityConfigureRequest` -NewWriteInternalCountersConfigRequestWithDefaults instantiates a new WriteInternalCountersConfigRequest object +NewInternalClientActivityConfigureRequestWithDefaults instantiates a new InternalClientActivityConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDefaultReportMonths -`func (o *WriteInternalCountersConfigRequest) GetDefaultReportMonths() int32` +`func (o *InternalClientActivityConfigureRequest) GetDefaultReportMonths() int32` GetDefaultReportMonths returns the DefaultReportMonths field if non-nil, zero value otherwise. ### GetDefaultReportMonthsOk -`func (o *WriteInternalCountersConfigRequest) GetDefaultReportMonthsOk() (*int32, bool)` +`func (o *InternalClientActivityConfigureRequest) GetDefaultReportMonthsOk() (*int32, bool)` GetDefaultReportMonthsOk returns a tuple with the DefaultReportMonths field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultReportMonths -`func (o *WriteInternalCountersConfigRequest) SetDefaultReportMonths(v int32)` +`func (o *InternalClientActivityConfigureRequest) SetDefaultReportMonths(v int32)` SetDefaultReportMonths sets DefaultReportMonths field to given value. ### HasDefaultReportMonths -`func (o *WriteInternalCountersConfigRequest) HasDefaultReportMonths() bool` +`func (o *InternalClientActivityConfigureRequest) HasDefaultReportMonths() bool` HasDefaultReportMonths returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasDefaultReportMonths returns a boolean if a field has been set. ### GetEnabled -`func (o *WriteInternalCountersConfigRequest) GetEnabled() string` +`func (o *InternalClientActivityConfigureRequest) GetEnabled() string` GetEnabled returns the Enabled field if non-nil, zero value otherwise. ### GetEnabledOk -`func (o *WriteInternalCountersConfigRequest) GetEnabledOk() (*string, bool)` +`func (o *InternalClientActivityConfigureRequest) GetEnabledOk() (*string, bool)` GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnabled -`func (o *WriteInternalCountersConfigRequest) SetEnabled(v string)` +`func (o *InternalClientActivityConfigureRequest) SetEnabled(v string)` SetEnabled sets Enabled field to given value. ### HasEnabled -`func (o *WriteInternalCountersConfigRequest) HasEnabled() bool` +`func (o *InternalClientActivityConfigureRequest) HasEnabled() bool` HasEnabled returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasEnabled returns a boolean if a field has been set. ### GetRetentionMonths -`func (o *WriteInternalCountersConfigRequest) GetRetentionMonths() int32` +`func (o *InternalClientActivityConfigureRequest) GetRetentionMonths() int32` GetRetentionMonths returns the RetentionMonths field if non-nil, zero value otherwise. ### GetRetentionMonthsOk -`func (o *WriteInternalCountersConfigRequest) GetRetentionMonthsOk() (*int32, bool)` +`func (o *InternalClientActivityConfigureRequest) GetRetentionMonthsOk() (*int32, bool)` GetRetentionMonthsOk returns a tuple with the RetentionMonths field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRetentionMonths -`func (o *WriteInternalCountersConfigRequest) SetRetentionMonths(v int32)` +`func (o *InternalClientActivityConfigureRequest) SetRetentionMonths(v int32)` SetRetentionMonths sets RetentionMonths field to given value. ### HasRetentionMonths -`func (o *WriteInternalCountersConfigRequest) HasRetentionMonths() bool` +`func (o *InternalClientActivityConfigureRequest) HasRetentionMonths() bool` HasRetentionMonths returns a boolean if a field has been set. diff --git a/docs/InternalCountEntitiesResponse.md b/docs/InternalCountEntitiesResponse.md new file mode 100644 index 00000000..434b51d8 --- /dev/null +++ b/docs/InternalCountEntitiesResponse.md @@ -0,0 +1,69 @@ +# InternalCountEntitiesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Counters** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewInternalCountEntitiesResponse + +`func NewInternalCountEntitiesResponse() *InternalCountEntitiesResponse` + +NewInternalCountEntitiesResponse instantiates a new InternalCountEntitiesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewInternalCountEntitiesResponseWithDefaults + +`func NewInternalCountEntitiesResponseWithDefaults() *InternalCountEntitiesResponse` + +NewInternalCountEntitiesResponseWithDefaults instantiates a new InternalCountEntitiesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCounters + +`func (o *InternalCountEntitiesResponse) GetCounters() map[string]interface{}` + +GetCounters returns the Counters field if non-nil, zero value otherwise. + +### GetCountersOk + +`func (o *InternalCountEntitiesResponse) GetCountersOk() (*map[string]interface{}, bool)` + +GetCountersOk returns a tuple with the Counters field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCounters + +`func (o *InternalCountEntitiesResponse) SetCounters(v map[string]interface{})` + +SetCounters sets Counters field to given value. + + +### HasCounters + +`func (o *InternalCountEntitiesResponse) HasCounters() bool` + +HasCounters returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/InternalCountTokensResponse.md b/docs/InternalCountTokensResponse.md new file mode 100644 index 00000000..6041277b --- /dev/null +++ b/docs/InternalCountTokensResponse.md @@ -0,0 +1,69 @@ +# InternalCountTokensResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Counters** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewInternalCountTokensResponse + +`func NewInternalCountTokensResponse() *InternalCountTokensResponse` + +NewInternalCountTokensResponse instantiates a new InternalCountTokensResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewInternalCountTokensResponseWithDefaults + +`func NewInternalCountTokensResponseWithDefaults() *InternalCountTokensResponse` + +NewInternalCountTokensResponseWithDefaults instantiates a new InternalCountTokensResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCounters + +`func (o *InternalCountTokensResponse) GetCounters() map[string]interface{}` + +GetCounters returns the Counters field if non-nil, zero value otherwise. + +### GetCountersOk + +`func (o *InternalCountTokensResponse) GetCountersOk() (*map[string]interface{}, bool)` + +GetCountersOk returns a tuple with the Counters field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCounters + +`func (o *InternalCountTokensResponse) SetCounters(v map[string]interface{})` + +SetCounters sets Counters field to given value. + + +### HasCounters + +`func (o *InternalCountTokensResponse) HasCounters() bool` + +HasCounters returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteInternalSpecsOpenAPIRequest.md b/docs/InternalGenerateOpenApiDocument2Request.md similarity index 56% rename from docs/WriteInternalSpecsOpenAPIRequest.md rename to docs/InternalGenerateOpenApiDocument2Request.md index 0409c3dc..8b133479 100644 --- a/docs/WriteInternalSpecsOpenAPIRequest.md +++ b/docs/InternalGenerateOpenApiDocument2Request.md @@ -1,4 +1,4 @@ -# WriteInternalSpecsOpenAPIRequest +# InternalGenerateOpenApiDocument2Request ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteInternalSpecsOpenAPIRequest +### NewInternalGenerateOpenApiDocument2Request -`func NewWriteInternalSpecsOpenAPIRequest() *WriteInternalSpecsOpenAPIRequest` +`func NewInternalGenerateOpenApiDocument2Request() *InternalGenerateOpenApiDocument2Request` -NewWriteInternalSpecsOpenAPIRequest instantiates a new WriteInternalSpecsOpenAPIRequest object +NewInternalGenerateOpenApiDocument2Request instantiates a new InternalGenerateOpenApiDocument2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteInternalSpecsOpenAPIRequestWithDefaults +### NewInternalGenerateOpenApiDocument2RequestWithDefaults -`func NewWriteInternalSpecsOpenAPIRequestWithDefaults() *WriteInternalSpecsOpenAPIRequest` +`func NewInternalGenerateOpenApiDocument2RequestWithDefaults() *InternalGenerateOpenApiDocument2Request` -NewWriteInternalSpecsOpenAPIRequestWithDefaults instantiates a new WriteInternalSpecsOpenAPIRequest object +NewInternalGenerateOpenApiDocument2RequestWithDefaults instantiates a new InternalGenerateOpenApiDocument2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetContext -`func (o *WriteInternalSpecsOpenAPIRequest) GetContext() string` +`func (o *InternalGenerateOpenApiDocument2Request) GetContext() string` GetContext returns the Context field if non-nil, zero value otherwise. ### GetContextOk -`func (o *WriteInternalSpecsOpenAPIRequest) GetContextOk() (*string, bool)` +`func (o *InternalGenerateOpenApiDocument2Request) GetContextOk() (*string, bool)` GetContextOk returns a tuple with the Context field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetContext -`func (o *WriteInternalSpecsOpenAPIRequest) SetContext(v string)` +`func (o *InternalGenerateOpenApiDocument2Request) SetContext(v string)` SetContext sets Context field to given value. ### HasContext -`func (o *WriteInternalSpecsOpenAPIRequest) HasContext() bool` +`func (o *InternalGenerateOpenApiDocument2Request) HasContext() bool` HasContext returns a boolean if a field has been set. diff --git a/docs/InternalUiListEnabledFeatureFlagsResponse.md b/docs/InternalUiListEnabledFeatureFlagsResponse.md new file mode 100644 index 00000000..5543fcf7 --- /dev/null +++ b/docs/InternalUiListEnabledFeatureFlagsResponse.md @@ -0,0 +1,69 @@ +# InternalUiListEnabledFeatureFlagsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**FeatureFlags** | Pointer to **[]string** | | [optional] + + + +## Methods + + +### NewInternalUiListEnabledFeatureFlagsResponse + +`func NewInternalUiListEnabledFeatureFlagsResponse() *InternalUiListEnabledFeatureFlagsResponse` + +NewInternalUiListEnabledFeatureFlagsResponse instantiates a new InternalUiListEnabledFeatureFlagsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewInternalUiListEnabledFeatureFlagsResponseWithDefaults + +`func NewInternalUiListEnabledFeatureFlagsResponseWithDefaults() *InternalUiListEnabledFeatureFlagsResponse` + +NewInternalUiListEnabledFeatureFlagsResponseWithDefaults instantiates a new InternalUiListEnabledFeatureFlagsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetFeatureFlags + +`func (o *InternalUiListEnabledFeatureFlagsResponse) GetFeatureFlags() []string` + +GetFeatureFlags returns the FeatureFlags field if non-nil, zero value otherwise. + +### GetFeatureFlagsOk + +`func (o *InternalUiListEnabledFeatureFlagsResponse) GetFeatureFlagsOk() (*[]string, bool)` + +GetFeatureFlagsOk returns a tuple with the FeatureFlags field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetFeatureFlags + +`func (o *InternalUiListEnabledFeatureFlagsResponse) SetFeatureFlags(v []string)` + +SetFeatureFlags sets FeatureFlags field to given value. + + +### HasFeatureFlags + +`func (o *InternalUiListEnabledFeatureFlagsResponse) HasFeatureFlags() bool` + +HasFeatureFlags returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/InternalUiListEnabledVisibleMountsResponse.md b/docs/InternalUiListEnabledVisibleMountsResponse.md new file mode 100644 index 00000000..785eb82b --- /dev/null +++ b/docs/InternalUiListEnabledVisibleMountsResponse.md @@ -0,0 +1,99 @@ +# InternalUiListEnabledVisibleMountsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Auth** | Pointer to **map[string]interface{}** | auth mounts | [optional] +**Secret** | Pointer to **map[string]interface{}** | secret mounts | [optional] + + + +## Methods + + +### NewInternalUiListEnabledVisibleMountsResponse + +`func NewInternalUiListEnabledVisibleMountsResponse() *InternalUiListEnabledVisibleMountsResponse` + +NewInternalUiListEnabledVisibleMountsResponse instantiates a new InternalUiListEnabledVisibleMountsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewInternalUiListEnabledVisibleMountsResponseWithDefaults + +`func NewInternalUiListEnabledVisibleMountsResponseWithDefaults() *InternalUiListEnabledVisibleMountsResponse` + +NewInternalUiListEnabledVisibleMountsResponseWithDefaults instantiates a new InternalUiListEnabledVisibleMountsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAuth + +`func (o *InternalUiListEnabledVisibleMountsResponse) GetAuth() map[string]interface{}` + +GetAuth returns the Auth field if non-nil, zero value otherwise. + +### GetAuthOk + +`func (o *InternalUiListEnabledVisibleMountsResponse) GetAuthOk() (*map[string]interface{}, bool)` + +GetAuthOk returns a tuple with the Auth field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAuth + +`func (o *InternalUiListEnabledVisibleMountsResponse) SetAuth(v map[string]interface{})` + +SetAuth sets Auth field to given value. + + +### HasAuth + +`func (o *InternalUiListEnabledVisibleMountsResponse) HasAuth() bool` + +HasAuth returns a boolean if a field has been set. + + + + +### GetSecret + +`func (o *InternalUiListEnabledVisibleMountsResponse) GetSecret() map[string]interface{}` + +GetSecret returns the Secret field if non-nil, zero value otherwise. + +### GetSecretOk + +`func (o *InternalUiListEnabledVisibleMountsResponse) GetSecretOk() (*map[string]interface{}, bool)` + +GetSecretOk returns a tuple with the Secret field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSecret + +`func (o *InternalUiListEnabledVisibleMountsResponse) SetSecret(v map[string]interface{})` + +SetSecret sets Secret field to given value. + + +### HasSecret + +`func (o *InternalUiListEnabledVisibleMountsResponse) HasSecret() bool` + +HasSecret returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/InternalUiListNamespacesResponse.md b/docs/InternalUiListNamespacesResponse.md new file mode 100644 index 00000000..d2543e77 --- /dev/null +++ b/docs/InternalUiListNamespacesResponse.md @@ -0,0 +1,69 @@ +# InternalUiListNamespacesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | field is only returned if there are one or more namespaces | [optional] + + + +## Methods + + +### NewInternalUiListNamespacesResponse + +`func NewInternalUiListNamespacesResponse() *InternalUiListNamespacesResponse` + +NewInternalUiListNamespacesResponse instantiates a new InternalUiListNamespacesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewInternalUiListNamespacesResponseWithDefaults + +`func NewInternalUiListNamespacesResponseWithDefaults() *InternalUiListNamespacesResponse` + +NewInternalUiListNamespacesResponseWithDefaults instantiates a new InternalUiListNamespacesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *InternalUiListNamespacesResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *InternalUiListNamespacesResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *InternalUiListNamespacesResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *InternalUiListNamespacesResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/InternalUiReadMountInformationResponse.md b/docs/InternalUiReadMountInformationResponse.md new file mode 100644 index 00000000..606eac61 --- /dev/null +++ b/docs/InternalUiReadMountInformationResponse.md @@ -0,0 +1,429 @@ +# InternalUiReadMountInformationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Accessor** | Pointer to **string** | | [optional] +**Config** | Pointer to **map[string]interface{}** | | [optional] +**Description** | Pointer to **string** | | [optional] +**ExternalEntropyAccess** | Pointer to **bool** | | [optional] +**Local** | Pointer to **bool** | | [optional] +**Options** | Pointer to **map[string]interface{}** | | [optional] +**Path** | Pointer to **string** | | [optional] +**PluginVersion** | Pointer to **string** | | [optional] +**RunningPluginVersion** | Pointer to **string** | | [optional] +**RunningSha256** | Pointer to **string** | | [optional] +**SealWrap** | Pointer to **bool** | | [optional] +**Type** | Pointer to **string** | | [optional] +**Uuid** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewInternalUiReadMountInformationResponse + +`func NewInternalUiReadMountInformationResponse() *InternalUiReadMountInformationResponse` + +NewInternalUiReadMountInformationResponse instantiates a new InternalUiReadMountInformationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewInternalUiReadMountInformationResponseWithDefaults + +`func NewInternalUiReadMountInformationResponseWithDefaults() *InternalUiReadMountInformationResponse` + +NewInternalUiReadMountInformationResponseWithDefaults instantiates a new InternalUiReadMountInformationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAccessor + +`func (o *InternalUiReadMountInformationResponse) GetAccessor() string` + +GetAccessor returns the Accessor field if non-nil, zero value otherwise. + +### GetAccessorOk + +`func (o *InternalUiReadMountInformationResponse) GetAccessorOk() (*string, bool)` + +GetAccessorOk returns a tuple with the Accessor field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAccessor + +`func (o *InternalUiReadMountInformationResponse) SetAccessor(v string)` + +SetAccessor sets Accessor field to given value. + + +### HasAccessor + +`func (o *InternalUiReadMountInformationResponse) HasAccessor() bool` + +HasAccessor returns a boolean if a field has been set. + + + + +### GetConfig + +`func (o *InternalUiReadMountInformationResponse) GetConfig() map[string]interface{}` + +GetConfig returns the Config field if non-nil, zero value otherwise. + +### GetConfigOk + +`func (o *InternalUiReadMountInformationResponse) GetConfigOk() (*map[string]interface{}, bool)` + +GetConfigOk returns a tuple with the Config field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetConfig + +`func (o *InternalUiReadMountInformationResponse) SetConfig(v map[string]interface{})` + +SetConfig sets Config field to given value. + + +### HasConfig + +`func (o *InternalUiReadMountInformationResponse) HasConfig() bool` + +HasConfig returns a boolean if a field has been set. + + + + +### GetDescription + +`func (o *InternalUiReadMountInformationResponse) GetDescription() string` + +GetDescription returns the Description field if non-nil, zero value otherwise. + +### GetDescriptionOk + +`func (o *InternalUiReadMountInformationResponse) GetDescriptionOk() (*string, bool)` + +GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDescription + +`func (o *InternalUiReadMountInformationResponse) SetDescription(v string)` + +SetDescription sets Description field to given value. + + +### HasDescription + +`func (o *InternalUiReadMountInformationResponse) HasDescription() bool` + +HasDescription returns a boolean if a field has been set. + + + + +### GetExternalEntropyAccess + +`func (o *InternalUiReadMountInformationResponse) GetExternalEntropyAccess() bool` + +GetExternalEntropyAccess returns the ExternalEntropyAccess field if non-nil, zero value otherwise. + +### GetExternalEntropyAccessOk + +`func (o *InternalUiReadMountInformationResponse) GetExternalEntropyAccessOk() (*bool, bool)` + +GetExternalEntropyAccessOk returns a tuple with the ExternalEntropyAccess field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExternalEntropyAccess + +`func (o *InternalUiReadMountInformationResponse) SetExternalEntropyAccess(v bool)` + +SetExternalEntropyAccess sets ExternalEntropyAccess field to given value. + + +### HasExternalEntropyAccess + +`func (o *InternalUiReadMountInformationResponse) HasExternalEntropyAccess() bool` + +HasExternalEntropyAccess returns a boolean if a field has been set. + + + + +### GetLocal + +`func (o *InternalUiReadMountInformationResponse) GetLocal() bool` + +GetLocal returns the Local field if non-nil, zero value otherwise. + +### GetLocalOk + +`func (o *InternalUiReadMountInformationResponse) GetLocalOk() (*bool, bool)` + +GetLocalOk returns a tuple with the Local field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLocal + +`func (o *InternalUiReadMountInformationResponse) SetLocal(v bool)` + +SetLocal sets Local field to given value. + + +### HasLocal + +`func (o *InternalUiReadMountInformationResponse) HasLocal() bool` + +HasLocal returns a boolean if a field has been set. + + + + +### GetOptions + +`func (o *InternalUiReadMountInformationResponse) GetOptions() map[string]interface{}` + +GetOptions returns the Options field if non-nil, zero value otherwise. + +### GetOptionsOk + +`func (o *InternalUiReadMountInformationResponse) GetOptionsOk() (*map[string]interface{}, bool)` + +GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOptions + +`func (o *InternalUiReadMountInformationResponse) SetOptions(v map[string]interface{})` + +SetOptions sets Options field to given value. + + +### HasOptions + +`func (o *InternalUiReadMountInformationResponse) HasOptions() bool` + +HasOptions returns a boolean if a field has been set. + + + + +### GetPath + +`func (o *InternalUiReadMountInformationResponse) GetPath() string` + +GetPath returns the Path field if non-nil, zero value otherwise. + +### GetPathOk + +`func (o *InternalUiReadMountInformationResponse) GetPathOk() (*string, bool)` + +GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPath + +`func (o *InternalUiReadMountInformationResponse) SetPath(v string)` + +SetPath sets Path field to given value. + + +### HasPath + +`func (o *InternalUiReadMountInformationResponse) HasPath() bool` + +HasPath returns a boolean if a field has been set. + + + + +### GetPluginVersion + +`func (o *InternalUiReadMountInformationResponse) GetPluginVersion() string` + +GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. + +### GetPluginVersionOk + +`func (o *InternalUiReadMountInformationResponse) GetPluginVersionOk() (*string, bool)` + +GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPluginVersion + +`func (o *InternalUiReadMountInformationResponse) SetPluginVersion(v string)` + +SetPluginVersion sets PluginVersion field to given value. + + +### HasPluginVersion + +`func (o *InternalUiReadMountInformationResponse) HasPluginVersion() bool` + +HasPluginVersion returns a boolean if a field has been set. + + + + +### GetRunningPluginVersion + +`func (o *InternalUiReadMountInformationResponse) GetRunningPluginVersion() string` + +GetRunningPluginVersion returns the RunningPluginVersion field if non-nil, zero value otherwise. + +### GetRunningPluginVersionOk + +`func (o *InternalUiReadMountInformationResponse) GetRunningPluginVersionOk() (*string, bool)` + +GetRunningPluginVersionOk returns a tuple with the RunningPluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRunningPluginVersion + +`func (o *InternalUiReadMountInformationResponse) SetRunningPluginVersion(v string)` + +SetRunningPluginVersion sets RunningPluginVersion field to given value. + + +### HasRunningPluginVersion + +`func (o *InternalUiReadMountInformationResponse) HasRunningPluginVersion() bool` + +HasRunningPluginVersion returns a boolean if a field has been set. + + + + +### GetRunningSha256 + +`func (o *InternalUiReadMountInformationResponse) GetRunningSha256() string` + +GetRunningSha256 returns the RunningSha256 field if non-nil, zero value otherwise. + +### GetRunningSha256Ok + +`func (o *InternalUiReadMountInformationResponse) GetRunningSha256Ok() (*string, bool)` + +GetRunningSha256Ok returns a tuple with the RunningSha256 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRunningSha256 + +`func (o *InternalUiReadMountInformationResponse) SetRunningSha256(v string)` + +SetRunningSha256 sets RunningSha256 field to given value. + + +### HasRunningSha256 + +`func (o *InternalUiReadMountInformationResponse) HasRunningSha256() bool` + +HasRunningSha256 returns a boolean if a field has been set. + + + + +### GetSealWrap + +`func (o *InternalUiReadMountInformationResponse) GetSealWrap() bool` + +GetSealWrap returns the SealWrap field if non-nil, zero value otherwise. + +### GetSealWrapOk + +`func (o *InternalUiReadMountInformationResponse) GetSealWrapOk() (*bool, bool)` + +GetSealWrapOk returns a tuple with the SealWrap field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSealWrap + +`func (o *InternalUiReadMountInformationResponse) SetSealWrap(v bool)` + +SetSealWrap sets SealWrap field to given value. + + +### HasSealWrap + +`func (o *InternalUiReadMountInformationResponse) HasSealWrap() bool` + +HasSealWrap returns a boolean if a field has been set. + + + + +### GetType + +`func (o *InternalUiReadMountInformationResponse) GetType() string` + +GetType returns the Type field if non-nil, zero value otherwise. + +### GetTypeOk + +`func (o *InternalUiReadMountInformationResponse) GetTypeOk() (*string, bool)` + +GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetType + +`func (o *InternalUiReadMountInformationResponse) SetType(v string)` + +SetType sets Type field to given value. + + +### HasType + +`func (o *InternalUiReadMountInformationResponse) HasType() bool` + +HasType returns a boolean if a field has been set. + + + + +### GetUuid + +`func (o *InternalUiReadMountInformationResponse) GetUuid() string` + +GetUuid returns the Uuid field if non-nil, zero value otherwise. + +### GetUuidOk + +`func (o *InternalUiReadMountInformationResponse) GetUuidOk() (*string, bool)` + +GetUuidOk returns a tuple with the Uuid field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUuid + +`func (o *InternalUiReadMountInformationResponse) SetUuid(v string)` + +SetUuid sets Uuid field to given value. + + +### HasUuid + +`func (o *InternalUiReadMountInformationResponse) HasUuid() bool` + +HasUuid returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/InternalUiReadResultantAclResponse.md b/docs/InternalUiReadResultantAclResponse.md new file mode 100644 index 00000000..d715d705 --- /dev/null +++ b/docs/InternalUiReadResultantAclResponse.md @@ -0,0 +1,129 @@ +# InternalUiReadResultantAclResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ExactPaths** | Pointer to **map[string]interface{}** | | [optional] +**GlobPaths** | Pointer to **map[string]interface{}** | | [optional] +**Root** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewInternalUiReadResultantAclResponse + +`func NewInternalUiReadResultantAclResponse() *InternalUiReadResultantAclResponse` + +NewInternalUiReadResultantAclResponse instantiates a new InternalUiReadResultantAclResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewInternalUiReadResultantAclResponseWithDefaults + +`func NewInternalUiReadResultantAclResponseWithDefaults() *InternalUiReadResultantAclResponse` + +NewInternalUiReadResultantAclResponseWithDefaults instantiates a new InternalUiReadResultantAclResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetExactPaths + +`func (o *InternalUiReadResultantAclResponse) GetExactPaths() map[string]interface{}` + +GetExactPaths returns the ExactPaths field if non-nil, zero value otherwise. + +### GetExactPathsOk + +`func (o *InternalUiReadResultantAclResponse) GetExactPathsOk() (*map[string]interface{}, bool)` + +GetExactPathsOk returns a tuple with the ExactPaths field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExactPaths + +`func (o *InternalUiReadResultantAclResponse) SetExactPaths(v map[string]interface{})` + +SetExactPaths sets ExactPaths field to given value. + + +### HasExactPaths + +`func (o *InternalUiReadResultantAclResponse) HasExactPaths() bool` + +HasExactPaths returns a boolean if a field has been set. + + + + +### GetGlobPaths + +`func (o *InternalUiReadResultantAclResponse) GetGlobPaths() map[string]interface{}` + +GetGlobPaths returns the GlobPaths field if non-nil, zero value otherwise. + +### GetGlobPathsOk + +`func (o *InternalUiReadResultantAclResponse) GetGlobPathsOk() (*map[string]interface{}, bool)` + +GetGlobPathsOk returns a tuple with the GlobPaths field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetGlobPaths + +`func (o *InternalUiReadResultantAclResponse) SetGlobPaths(v map[string]interface{})` + +SetGlobPaths sets GlobPaths field to given value. + + +### HasGlobPaths + +`func (o *InternalUiReadResultantAclResponse) HasGlobPaths() bool` + +HasGlobPaths returns a boolean if a field has been set. + + + + +### GetRoot + +`func (o *InternalUiReadResultantAclResponse) GetRoot() bool` + +GetRoot returns the Root field if non-nil, zero value otherwise. + +### GetRootOk + +`func (o *InternalUiReadResultantAclResponse) GetRootOk() (*bool, bool)` + +GetRootOk returns a tuple with the Root field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRoot + +`func (o *InternalUiReadResultantAclResponse) SetRoot(v bool)` + +SetRoot sets Root field to given value. + + +### HasRoot + +`func (o *InternalUiReadResultantAclResponse) HasRoot() bool` + +HasRoot returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/JWTWriteOIDCCallbackRequest.md b/docs/JWTWriteOIDCCallbackRequest.md deleted file mode 100644 index dfdb2954..00000000 --- a/docs/JWTWriteOIDCCallbackRequest.md +++ /dev/null @@ -1,159 +0,0 @@ -# JWTWriteOIDCCallbackRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ClientNonce** | Pointer to **string** | | [optional] -**Code** | Pointer to **string** | | [optional] -**IdToken** | Pointer to **string** | | [optional] -**State** | Pointer to **string** | | [optional] - - - -## Methods - - -### NewJWTWriteOIDCCallbackRequest - -`func NewJWTWriteOIDCCallbackRequest() *JWTWriteOIDCCallbackRequest` - -NewJWTWriteOIDCCallbackRequest instantiates a new JWTWriteOIDCCallbackRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewJWTWriteOIDCCallbackRequestWithDefaults - -`func NewJWTWriteOIDCCallbackRequestWithDefaults() *JWTWriteOIDCCallbackRequest` - -NewJWTWriteOIDCCallbackRequestWithDefaults instantiates a new JWTWriteOIDCCallbackRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetClientNonce - -`func (o *JWTWriteOIDCCallbackRequest) GetClientNonce() string` - -GetClientNonce returns the ClientNonce field if non-nil, zero value otherwise. - -### GetClientNonceOk - -`func (o *JWTWriteOIDCCallbackRequest) GetClientNonceOk() (*string, bool)` - -GetClientNonceOk returns a tuple with the ClientNonce field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClientNonce - -`func (o *JWTWriteOIDCCallbackRequest) SetClientNonce(v string)` - -SetClientNonce sets ClientNonce field to given value. - - -### HasClientNonce - -`func (o *JWTWriteOIDCCallbackRequest) HasClientNonce() bool` - -HasClientNonce returns a boolean if a field has been set. - - - - -### GetCode - -`func (o *JWTWriteOIDCCallbackRequest) GetCode() string` - -GetCode returns the Code field if non-nil, zero value otherwise. - -### GetCodeOk - -`func (o *JWTWriteOIDCCallbackRequest) GetCodeOk() (*string, bool)` - -GetCodeOk returns a tuple with the Code field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCode - -`func (o *JWTWriteOIDCCallbackRequest) SetCode(v string)` - -SetCode sets Code field to given value. - - -### HasCode - -`func (o *JWTWriteOIDCCallbackRequest) HasCode() bool` - -HasCode returns a boolean if a field has been set. - - - - -### GetIdToken - -`func (o *JWTWriteOIDCCallbackRequest) GetIdToken() string` - -GetIdToken returns the IdToken field if non-nil, zero value otherwise. - -### GetIdTokenOk - -`func (o *JWTWriteOIDCCallbackRequest) GetIdTokenOk() (*string, bool)` - -GetIdTokenOk returns a tuple with the IdToken field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetIdToken - -`func (o *JWTWriteOIDCCallbackRequest) SetIdToken(v string)` - -SetIdToken sets IdToken field to given value. - - -### HasIdToken - -`func (o *JWTWriteOIDCCallbackRequest) HasIdToken() bool` - -HasIdToken returns a boolean if a field has been set. - - - - -### GetState - -`func (o *JWTWriteOIDCCallbackRequest) GetState() string` - -GetState returns the State field if non-nil, zero value otherwise. - -### GetStateOk - -`func (o *JWTWriteOIDCCallbackRequest) GetStateOk() (*string, bool)` - -GetStateOk returns a tuple with the State field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetState - -`func (o *JWTWriteOIDCCallbackRequest) SetState(v string)` - -SetState sets State field to given value. - - -### HasState - -`func (o *JWTWriteOIDCCallbackRequest) HasState() bool` - -HasState returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/JWTWriteRoleRequest.md b/docs/JWTWriteRoleRequest.md index b26befb8..438eacd8 100644 --- a/docs/JWTWriteRoleRequest.md +++ b/docs/JWTWriteRoleRequest.md @@ -1,4 +1,4 @@ -# JWTWriteRoleRequest +# JwtWriteRoleRequest ## Properties @@ -42,47 +42,47 @@ Name | Type | Description | Notes ## Methods -### NewJWTWriteRoleRequest +### NewJwtWriteRoleRequest -`func NewJWTWriteRoleRequest() *JWTWriteRoleRequest` +`func NewJwtWriteRoleRequest() *JwtWriteRoleRequest` -NewJWTWriteRoleRequest instantiates a new JWTWriteRoleRequest object +NewJwtWriteRoleRequest instantiates a new JwtWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewJWTWriteRoleRequestWithDefaults +### NewJwtWriteRoleRequestWithDefaults -`func NewJWTWriteRoleRequestWithDefaults() *JWTWriteRoleRequest` +`func NewJwtWriteRoleRequestWithDefaults() *JwtWriteRoleRequest` -NewJWTWriteRoleRequestWithDefaults instantiates a new JWTWriteRoleRequest object +NewJwtWriteRoleRequestWithDefaults instantiates a new JwtWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowedRedirectUris -`func (o *JWTWriteRoleRequest) GetAllowedRedirectUris() []string` +`func (o *JwtWriteRoleRequest) GetAllowedRedirectUris() []string` GetAllowedRedirectUris returns the AllowedRedirectUris field if non-nil, zero value otherwise. ### GetAllowedRedirectUrisOk -`func (o *JWTWriteRoleRequest) GetAllowedRedirectUrisOk() (*[]string, bool)` +`func (o *JwtWriteRoleRequest) GetAllowedRedirectUrisOk() (*[]string, bool)` GetAllowedRedirectUrisOk returns a tuple with the AllowedRedirectUris field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedRedirectUris -`func (o *JWTWriteRoleRequest) SetAllowedRedirectUris(v []string)` +`func (o *JwtWriteRoleRequest) SetAllowedRedirectUris(v []string)` SetAllowedRedirectUris sets AllowedRedirectUris field to given value. ### HasAllowedRedirectUris -`func (o *JWTWriteRoleRequest) HasAllowedRedirectUris() bool` +`func (o *JwtWriteRoleRequest) HasAllowedRedirectUris() bool` HasAllowedRedirectUris returns a boolean if a field has been set. @@ -91,27 +91,27 @@ HasAllowedRedirectUris returns a boolean if a field has been set. ### GetBoundAudiences -`func (o *JWTWriteRoleRequest) GetBoundAudiences() []string` +`func (o *JwtWriteRoleRequest) GetBoundAudiences() []string` GetBoundAudiences returns the BoundAudiences field if non-nil, zero value otherwise. ### GetBoundAudiencesOk -`func (o *JWTWriteRoleRequest) GetBoundAudiencesOk() (*[]string, bool)` +`func (o *JwtWriteRoleRequest) GetBoundAudiencesOk() (*[]string, bool)` GetBoundAudiencesOk returns a tuple with the BoundAudiences field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundAudiences -`func (o *JWTWriteRoleRequest) SetBoundAudiences(v []string)` +`func (o *JwtWriteRoleRequest) SetBoundAudiences(v []string)` SetBoundAudiences sets BoundAudiences field to given value. ### HasBoundAudiences -`func (o *JWTWriteRoleRequest) HasBoundAudiences() bool` +`func (o *JwtWriteRoleRequest) HasBoundAudiences() bool` HasBoundAudiences returns a boolean if a field has been set. @@ -120,27 +120,27 @@ HasBoundAudiences returns a boolean if a field has been set. ### GetBoundCidrs -`func (o *JWTWriteRoleRequest) GetBoundCidrs() []string` +`func (o *JwtWriteRoleRequest) GetBoundCidrs() []string` GetBoundCidrs returns the BoundCidrs field if non-nil, zero value otherwise. ### GetBoundCidrsOk -`func (o *JWTWriteRoleRequest) GetBoundCidrsOk() (*[]string, bool)` +`func (o *JwtWriteRoleRequest) GetBoundCidrsOk() (*[]string, bool)` GetBoundCidrsOk returns a tuple with the BoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundCidrs -`func (o *JWTWriteRoleRequest) SetBoundCidrs(v []string)` +`func (o *JwtWriteRoleRequest) SetBoundCidrs(v []string)` SetBoundCidrs sets BoundCidrs field to given value. ### HasBoundCidrs -`func (o *JWTWriteRoleRequest) HasBoundCidrs() bool` +`func (o *JwtWriteRoleRequest) HasBoundCidrs() bool` HasBoundCidrs returns a boolean if a field has been set. @@ -149,27 +149,27 @@ HasBoundCidrs returns a boolean if a field has been set. ### GetBoundClaims -`func (o *JWTWriteRoleRequest) GetBoundClaims() map[string]interface{}` +`func (o *JwtWriteRoleRequest) GetBoundClaims() map[string]interface{}` GetBoundClaims returns the BoundClaims field if non-nil, zero value otherwise. ### GetBoundClaimsOk -`func (o *JWTWriteRoleRequest) GetBoundClaimsOk() (*map[string]interface{}, bool)` +`func (o *JwtWriteRoleRequest) GetBoundClaimsOk() (*map[string]interface{}, bool)` GetBoundClaimsOk returns a tuple with the BoundClaims field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundClaims -`func (o *JWTWriteRoleRequest) SetBoundClaims(v map[string]interface{})` +`func (o *JwtWriteRoleRequest) SetBoundClaims(v map[string]interface{})` SetBoundClaims sets BoundClaims field to given value. ### HasBoundClaims -`func (o *JWTWriteRoleRequest) HasBoundClaims() bool` +`func (o *JwtWriteRoleRequest) HasBoundClaims() bool` HasBoundClaims returns a boolean if a field has been set. @@ -178,27 +178,27 @@ HasBoundClaims returns a boolean if a field has been set. ### GetBoundClaimsType -`func (o *JWTWriteRoleRequest) GetBoundClaimsType() string` +`func (o *JwtWriteRoleRequest) GetBoundClaimsType() string` GetBoundClaimsType returns the BoundClaimsType field if non-nil, zero value otherwise. ### GetBoundClaimsTypeOk -`func (o *JWTWriteRoleRequest) GetBoundClaimsTypeOk() (*string, bool)` +`func (o *JwtWriteRoleRequest) GetBoundClaimsTypeOk() (*string, bool)` GetBoundClaimsTypeOk returns a tuple with the BoundClaimsType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundClaimsType -`func (o *JWTWriteRoleRequest) SetBoundClaimsType(v string)` +`func (o *JwtWriteRoleRequest) SetBoundClaimsType(v string)` SetBoundClaimsType sets BoundClaimsType field to given value. ### HasBoundClaimsType -`func (o *JWTWriteRoleRequest) HasBoundClaimsType() bool` +`func (o *JwtWriteRoleRequest) HasBoundClaimsType() bool` HasBoundClaimsType returns a boolean if a field has been set. @@ -207,27 +207,27 @@ HasBoundClaimsType returns a boolean if a field has been set. ### GetBoundSubject -`func (o *JWTWriteRoleRequest) GetBoundSubject() string` +`func (o *JwtWriteRoleRequest) GetBoundSubject() string` GetBoundSubject returns the BoundSubject field if non-nil, zero value otherwise. ### GetBoundSubjectOk -`func (o *JWTWriteRoleRequest) GetBoundSubjectOk() (*string, bool)` +`func (o *JwtWriteRoleRequest) GetBoundSubjectOk() (*string, bool)` GetBoundSubjectOk returns a tuple with the BoundSubject field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundSubject -`func (o *JWTWriteRoleRequest) SetBoundSubject(v string)` +`func (o *JwtWriteRoleRequest) SetBoundSubject(v string)` SetBoundSubject sets BoundSubject field to given value. ### HasBoundSubject -`func (o *JWTWriteRoleRequest) HasBoundSubject() bool` +`func (o *JwtWriteRoleRequest) HasBoundSubject() bool` HasBoundSubject returns a boolean if a field has been set. @@ -236,27 +236,27 @@ HasBoundSubject returns a boolean if a field has been set. ### GetClaimMappings -`func (o *JWTWriteRoleRequest) GetClaimMappings() map[string]interface{}` +`func (o *JwtWriteRoleRequest) GetClaimMappings() map[string]interface{}` GetClaimMappings returns the ClaimMappings field if non-nil, zero value otherwise. ### GetClaimMappingsOk -`func (o *JWTWriteRoleRequest) GetClaimMappingsOk() (*map[string]interface{}, bool)` +`func (o *JwtWriteRoleRequest) GetClaimMappingsOk() (*map[string]interface{}, bool)` GetClaimMappingsOk returns a tuple with the ClaimMappings field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClaimMappings -`func (o *JWTWriteRoleRequest) SetClaimMappings(v map[string]interface{})` +`func (o *JwtWriteRoleRequest) SetClaimMappings(v map[string]interface{})` SetClaimMappings sets ClaimMappings field to given value. ### HasClaimMappings -`func (o *JWTWriteRoleRequest) HasClaimMappings() bool` +`func (o *JwtWriteRoleRequest) HasClaimMappings() bool` HasClaimMappings returns a boolean if a field has been set. @@ -265,27 +265,27 @@ HasClaimMappings returns a boolean if a field has been set. ### GetClockSkewLeeway -`func (o *JWTWriteRoleRequest) GetClockSkewLeeway() int32` +`func (o *JwtWriteRoleRequest) GetClockSkewLeeway() int32` GetClockSkewLeeway returns the ClockSkewLeeway field if non-nil, zero value otherwise. ### GetClockSkewLeewayOk -`func (o *JWTWriteRoleRequest) GetClockSkewLeewayOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetClockSkewLeewayOk() (*int32, bool)` GetClockSkewLeewayOk returns a tuple with the ClockSkewLeeway field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClockSkewLeeway -`func (o *JWTWriteRoleRequest) SetClockSkewLeeway(v int32)` +`func (o *JwtWriteRoleRequest) SetClockSkewLeeway(v int32)` SetClockSkewLeeway sets ClockSkewLeeway field to given value. ### HasClockSkewLeeway -`func (o *JWTWriteRoleRequest) HasClockSkewLeeway() bool` +`func (o *JwtWriteRoleRequest) HasClockSkewLeeway() bool` HasClockSkewLeeway returns a boolean if a field has been set. @@ -294,27 +294,27 @@ HasClockSkewLeeway returns a boolean if a field has been set. ### GetExpirationLeeway -`func (o *JWTWriteRoleRequest) GetExpirationLeeway() int32` +`func (o *JwtWriteRoleRequest) GetExpirationLeeway() int32` GetExpirationLeeway returns the ExpirationLeeway field if non-nil, zero value otherwise. ### GetExpirationLeewayOk -`func (o *JWTWriteRoleRequest) GetExpirationLeewayOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetExpirationLeewayOk() (*int32, bool)` GetExpirationLeewayOk returns a tuple with the ExpirationLeeway field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExpirationLeeway -`func (o *JWTWriteRoleRequest) SetExpirationLeeway(v int32)` +`func (o *JwtWriteRoleRequest) SetExpirationLeeway(v int32)` SetExpirationLeeway sets ExpirationLeeway field to given value. ### HasExpirationLeeway -`func (o *JWTWriteRoleRequest) HasExpirationLeeway() bool` +`func (o *JwtWriteRoleRequest) HasExpirationLeeway() bool` HasExpirationLeeway returns a boolean if a field has been set. @@ -323,27 +323,27 @@ HasExpirationLeeway returns a boolean if a field has been set. ### GetGroupsClaim -`func (o *JWTWriteRoleRequest) GetGroupsClaim() string` +`func (o *JwtWriteRoleRequest) GetGroupsClaim() string` GetGroupsClaim returns the GroupsClaim field if non-nil, zero value otherwise. ### GetGroupsClaimOk -`func (o *JWTWriteRoleRequest) GetGroupsClaimOk() (*string, bool)` +`func (o *JwtWriteRoleRequest) GetGroupsClaimOk() (*string, bool)` GetGroupsClaimOk returns a tuple with the GroupsClaim field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupsClaim -`func (o *JWTWriteRoleRequest) SetGroupsClaim(v string)` +`func (o *JwtWriteRoleRequest) SetGroupsClaim(v string)` SetGroupsClaim sets GroupsClaim field to given value. ### HasGroupsClaim -`func (o *JWTWriteRoleRequest) HasGroupsClaim() bool` +`func (o *JwtWriteRoleRequest) HasGroupsClaim() bool` HasGroupsClaim returns a boolean if a field has been set. @@ -352,27 +352,27 @@ HasGroupsClaim returns a boolean if a field has been set. ### GetMaxAge -`func (o *JWTWriteRoleRequest) GetMaxAge() int32` +`func (o *JwtWriteRoleRequest) GetMaxAge() int32` GetMaxAge returns the MaxAge field if non-nil, zero value otherwise. ### GetMaxAgeOk -`func (o *JWTWriteRoleRequest) GetMaxAgeOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetMaxAgeOk() (*int32, bool)` GetMaxAgeOk returns a tuple with the MaxAge field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxAge -`func (o *JWTWriteRoleRequest) SetMaxAge(v int32)` +`func (o *JwtWriteRoleRequest) SetMaxAge(v int32)` SetMaxAge sets MaxAge field to given value. ### HasMaxAge -`func (o *JWTWriteRoleRequest) HasMaxAge() bool` +`func (o *JwtWriteRoleRequest) HasMaxAge() bool` HasMaxAge returns a boolean if a field has been set. @@ -381,27 +381,27 @@ HasMaxAge returns a boolean if a field has been set. ### GetMaxTtl -`func (o *JWTWriteRoleRequest) GetMaxTtl() int32` +`func (o *JwtWriteRoleRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *JWTWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *JWTWriteRoleRequest) SetMaxTtl(v int32)` +`func (o *JwtWriteRoleRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *JWTWriteRoleRequest) HasMaxTtl() bool` +`func (o *JwtWriteRoleRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -410,27 +410,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetNotBeforeLeeway -`func (o *JWTWriteRoleRequest) GetNotBeforeLeeway() int32` +`func (o *JwtWriteRoleRequest) GetNotBeforeLeeway() int32` GetNotBeforeLeeway returns the NotBeforeLeeway field if non-nil, zero value otherwise. ### GetNotBeforeLeewayOk -`func (o *JWTWriteRoleRequest) GetNotBeforeLeewayOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetNotBeforeLeewayOk() (*int32, bool)` GetNotBeforeLeewayOk returns a tuple with the NotBeforeLeeway field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeLeeway -`func (o *JWTWriteRoleRequest) SetNotBeforeLeeway(v int32)` +`func (o *JwtWriteRoleRequest) SetNotBeforeLeeway(v int32)` SetNotBeforeLeeway sets NotBeforeLeeway field to given value. ### HasNotBeforeLeeway -`func (o *JWTWriteRoleRequest) HasNotBeforeLeeway() bool` +`func (o *JwtWriteRoleRequest) HasNotBeforeLeeway() bool` HasNotBeforeLeeway returns a boolean if a field has been set. @@ -439,27 +439,27 @@ HasNotBeforeLeeway returns a boolean if a field has been set. ### GetNumUses -`func (o *JWTWriteRoleRequest) GetNumUses() int32` +`func (o *JwtWriteRoleRequest) GetNumUses() int32` GetNumUses returns the NumUses field if non-nil, zero value otherwise. ### GetNumUsesOk -`func (o *JWTWriteRoleRequest) GetNumUsesOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetNumUsesOk() (*int32, bool)` GetNumUsesOk returns a tuple with the NumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNumUses -`func (o *JWTWriteRoleRequest) SetNumUses(v int32)` +`func (o *JwtWriteRoleRequest) SetNumUses(v int32)` SetNumUses sets NumUses field to given value. ### HasNumUses -`func (o *JWTWriteRoleRequest) HasNumUses() bool` +`func (o *JwtWriteRoleRequest) HasNumUses() bool` HasNumUses returns a boolean if a field has been set. @@ -468,27 +468,27 @@ HasNumUses returns a boolean if a field has been set. ### GetOidcScopes -`func (o *JWTWriteRoleRequest) GetOidcScopes() []string` +`func (o *JwtWriteRoleRequest) GetOidcScopes() []string` GetOidcScopes returns the OidcScopes field if non-nil, zero value otherwise. ### GetOidcScopesOk -`func (o *JWTWriteRoleRequest) GetOidcScopesOk() (*[]string, bool)` +`func (o *JwtWriteRoleRequest) GetOidcScopesOk() (*[]string, bool)` GetOidcScopesOk returns a tuple with the OidcScopes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOidcScopes -`func (o *JWTWriteRoleRequest) SetOidcScopes(v []string)` +`func (o *JwtWriteRoleRequest) SetOidcScopes(v []string)` SetOidcScopes sets OidcScopes field to given value. ### HasOidcScopes -`func (o *JWTWriteRoleRequest) HasOidcScopes() bool` +`func (o *JwtWriteRoleRequest) HasOidcScopes() bool` HasOidcScopes returns a boolean if a field has been set. @@ -497,27 +497,27 @@ HasOidcScopes returns a boolean if a field has been set. ### GetPeriod -`func (o *JWTWriteRoleRequest) GetPeriod() int32` +`func (o *JwtWriteRoleRequest) GetPeriod() int32` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *JWTWriteRoleRequest) GetPeriodOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetPeriodOk() (*int32, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *JWTWriteRoleRequest) SetPeriod(v int32)` +`func (o *JwtWriteRoleRequest) SetPeriod(v int32)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *JWTWriteRoleRequest) HasPeriod() bool` +`func (o *JwtWriteRoleRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -526,27 +526,27 @@ HasPeriod returns a boolean if a field has been set. ### GetPolicies -`func (o *JWTWriteRoleRequest) GetPolicies() []string` +`func (o *JwtWriteRoleRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *JWTWriteRoleRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *JwtWriteRoleRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *JWTWriteRoleRequest) SetPolicies(v []string)` +`func (o *JwtWriteRoleRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *JWTWriteRoleRequest) HasPolicies() bool` +`func (o *JwtWriteRoleRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -555,27 +555,27 @@ HasPolicies returns a boolean if a field has been set. ### GetRoleType -`func (o *JWTWriteRoleRequest) GetRoleType() string` +`func (o *JwtWriteRoleRequest) GetRoleType() string` GetRoleType returns the RoleType field if non-nil, zero value otherwise. ### GetRoleTypeOk -`func (o *JWTWriteRoleRequest) GetRoleTypeOk() (*string, bool)` +`func (o *JwtWriteRoleRequest) GetRoleTypeOk() (*string, bool)` GetRoleTypeOk returns a tuple with the RoleType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleType -`func (o *JWTWriteRoleRequest) SetRoleType(v string)` +`func (o *JwtWriteRoleRequest) SetRoleType(v string)` SetRoleType sets RoleType field to given value. ### HasRoleType -`func (o *JWTWriteRoleRequest) HasRoleType() bool` +`func (o *JwtWriteRoleRequest) HasRoleType() bool` HasRoleType returns a boolean if a field has been set. @@ -584,27 +584,27 @@ HasRoleType returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *JWTWriteRoleRequest) GetTokenBoundCidrs() []string` +`func (o *JwtWriteRoleRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *JWTWriteRoleRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *JwtWriteRoleRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *JWTWriteRoleRequest) SetTokenBoundCidrs(v []string)` +`func (o *JwtWriteRoleRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *JWTWriteRoleRequest) HasTokenBoundCidrs() bool` +`func (o *JwtWriteRoleRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -613,27 +613,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *JWTWriteRoleRequest) GetTokenExplicitMaxTtl() int32` +`func (o *JwtWriteRoleRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *JWTWriteRoleRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *JWTWriteRoleRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *JwtWriteRoleRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *JWTWriteRoleRequest) HasTokenExplicitMaxTtl() bool` +`func (o *JwtWriteRoleRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -642,27 +642,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *JWTWriteRoleRequest) GetTokenMaxTtl() int32` +`func (o *JwtWriteRoleRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *JWTWriteRoleRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *JWTWriteRoleRequest) SetTokenMaxTtl(v int32)` +`func (o *JwtWriteRoleRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *JWTWriteRoleRequest) HasTokenMaxTtl() bool` +`func (o *JwtWriteRoleRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -671,27 +671,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *JWTWriteRoleRequest) GetTokenNoDefaultPolicy() bool` +`func (o *JwtWriteRoleRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *JWTWriteRoleRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *JwtWriteRoleRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *JWTWriteRoleRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *JwtWriteRoleRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *JWTWriteRoleRequest) HasTokenNoDefaultPolicy() bool` +`func (o *JwtWriteRoleRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -700,27 +700,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *JWTWriteRoleRequest) GetTokenNumUses() int32` +`func (o *JwtWriteRoleRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *JWTWriteRoleRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *JWTWriteRoleRequest) SetTokenNumUses(v int32)` +`func (o *JwtWriteRoleRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *JWTWriteRoleRequest) HasTokenNumUses() bool` +`func (o *JwtWriteRoleRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -729,27 +729,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *JWTWriteRoleRequest) GetTokenPeriod() int32` +`func (o *JwtWriteRoleRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *JWTWriteRoleRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *JWTWriteRoleRequest) SetTokenPeriod(v int32)` +`func (o *JwtWriteRoleRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *JWTWriteRoleRequest) HasTokenPeriod() bool` +`func (o *JwtWriteRoleRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -758,27 +758,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *JWTWriteRoleRequest) GetTokenPolicies() []string` +`func (o *JwtWriteRoleRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *JWTWriteRoleRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *JwtWriteRoleRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *JWTWriteRoleRequest) SetTokenPolicies(v []string)` +`func (o *JwtWriteRoleRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *JWTWriteRoleRequest) HasTokenPolicies() bool` +`func (o *JwtWriteRoleRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -787,27 +787,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *JWTWriteRoleRequest) GetTokenTtl() int32` +`func (o *JwtWriteRoleRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *JWTWriteRoleRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *JWTWriteRoleRequest) SetTokenTtl(v int32)` +`func (o *JwtWriteRoleRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *JWTWriteRoleRequest) HasTokenTtl() bool` +`func (o *JwtWriteRoleRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -816,27 +816,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *JWTWriteRoleRequest) GetTokenType() string` +`func (o *JwtWriteRoleRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *JWTWriteRoleRequest) GetTokenTypeOk() (*string, bool)` +`func (o *JwtWriteRoleRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *JWTWriteRoleRequest) SetTokenType(v string)` +`func (o *JwtWriteRoleRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *JWTWriteRoleRequest) HasTokenType() bool` +`func (o *JwtWriteRoleRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -845,27 +845,27 @@ HasTokenType returns a boolean if a field has been set. ### GetTtl -`func (o *JWTWriteRoleRequest) GetTtl() int32` +`func (o *JwtWriteRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *JWTWriteRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *JwtWriteRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *JWTWriteRoleRequest) SetTtl(v int32)` +`func (o *JwtWriteRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *JWTWriteRoleRequest) HasTtl() bool` +`func (o *JwtWriteRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -874,27 +874,27 @@ HasTtl returns a boolean if a field has been set. ### GetUserClaim -`func (o *JWTWriteRoleRequest) GetUserClaim() string` +`func (o *JwtWriteRoleRequest) GetUserClaim() string` GetUserClaim returns the UserClaim field if non-nil, zero value otherwise. ### GetUserClaimOk -`func (o *JWTWriteRoleRequest) GetUserClaimOk() (*string, bool)` +`func (o *JwtWriteRoleRequest) GetUserClaimOk() (*string, bool)` GetUserClaimOk returns a tuple with the UserClaim field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserClaim -`func (o *JWTWriteRoleRequest) SetUserClaim(v string)` +`func (o *JwtWriteRoleRequest) SetUserClaim(v string)` SetUserClaim sets UserClaim field to given value. ### HasUserClaim -`func (o *JWTWriteRoleRequest) HasUserClaim() bool` +`func (o *JwtWriteRoleRequest) HasUserClaim() bool` HasUserClaim returns a boolean if a field has been set. @@ -903,27 +903,27 @@ HasUserClaim returns a boolean if a field has been set. ### GetUserClaimJsonPointer -`func (o *JWTWriteRoleRequest) GetUserClaimJsonPointer() bool` +`func (o *JwtWriteRoleRequest) GetUserClaimJsonPointer() bool` GetUserClaimJsonPointer returns the UserClaimJsonPointer field if non-nil, zero value otherwise. ### GetUserClaimJsonPointerOk -`func (o *JWTWriteRoleRequest) GetUserClaimJsonPointerOk() (*bool, bool)` +`func (o *JwtWriteRoleRequest) GetUserClaimJsonPointerOk() (*bool, bool)` GetUserClaimJsonPointerOk returns a tuple with the UserClaimJsonPointer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserClaimJsonPointer -`func (o *JWTWriteRoleRequest) SetUserClaimJsonPointer(v bool)` +`func (o *JwtWriteRoleRequest) SetUserClaimJsonPointer(v bool)` SetUserClaimJsonPointer sets UserClaimJsonPointer field to given value. ### HasUserClaimJsonPointer -`func (o *JWTWriteRoleRequest) HasUserClaimJsonPointer() bool` +`func (o *JwtWriteRoleRequest) HasUserClaimJsonPointer() bool` HasUserClaimJsonPointer returns a boolean if a field has been set. @@ -932,27 +932,27 @@ HasUserClaimJsonPointer returns a boolean if a field has been set. ### GetVerboseOidcLogging -`func (o *JWTWriteRoleRequest) GetVerboseOidcLogging() bool` +`func (o *JwtWriteRoleRequest) GetVerboseOidcLogging() bool` GetVerboseOidcLogging returns the VerboseOidcLogging field if non-nil, zero value otherwise. ### GetVerboseOidcLoggingOk -`func (o *JWTWriteRoleRequest) GetVerboseOidcLoggingOk() (*bool, bool)` +`func (o *JwtWriteRoleRequest) GetVerboseOidcLoggingOk() (*bool, bool)` GetVerboseOidcLoggingOk returns a tuple with the VerboseOidcLogging field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVerboseOidcLogging -`func (o *JWTWriteRoleRequest) SetVerboseOidcLogging(v bool)` +`func (o *JwtWriteRoleRequest) SetVerboseOidcLogging(v bool)` SetVerboseOidcLogging sets VerboseOidcLogging field to given value. ### HasVerboseOidcLogging -`func (o *JWTWriteRoleRequest) HasVerboseOidcLogging() bool` +`func (o *JwtWriteRoleRequest) HasVerboseOidcLogging() bool` HasVerboseOidcLogging returns a boolean if a field has been set. diff --git a/docs/JWTWriteConfigRequest.md b/docs/JwtConfigureRequest.md similarity index 71% rename from docs/JWTWriteConfigRequest.md rename to docs/JwtConfigureRequest.md index 2077a87c..91e329bc 100644 --- a/docs/JWTWriteConfigRequest.md +++ b/docs/JwtConfigureRequest.md @@ -1,4 +1,4 @@ -# JWTWriteConfigRequest +# JwtConfigureRequest ## Properties @@ -25,47 +25,47 @@ Name | Type | Description | Notes ## Methods -### NewJWTWriteConfigRequest +### NewJwtConfigureRequest -`func NewJWTWriteConfigRequest() *JWTWriteConfigRequest` +`func NewJwtConfigureRequest() *JwtConfigureRequest` -NewJWTWriteConfigRequest instantiates a new JWTWriteConfigRequest object +NewJwtConfigureRequest instantiates a new JwtConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewJWTWriteConfigRequestWithDefaults +### NewJwtConfigureRequestWithDefaults -`func NewJWTWriteConfigRequestWithDefaults() *JWTWriteConfigRequest` +`func NewJwtConfigureRequestWithDefaults() *JwtConfigureRequest` -NewJWTWriteConfigRequestWithDefaults instantiates a new JWTWriteConfigRequest object +NewJwtConfigureRequestWithDefaults instantiates a new JwtConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBoundIssuer -`func (o *JWTWriteConfigRequest) GetBoundIssuer() string` +`func (o *JwtConfigureRequest) GetBoundIssuer() string` GetBoundIssuer returns the BoundIssuer field if non-nil, zero value otherwise. ### GetBoundIssuerOk -`func (o *JWTWriteConfigRequest) GetBoundIssuerOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetBoundIssuerOk() (*string, bool)` GetBoundIssuerOk returns a tuple with the BoundIssuer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBoundIssuer -`func (o *JWTWriteConfigRequest) SetBoundIssuer(v string)` +`func (o *JwtConfigureRequest) SetBoundIssuer(v string)` SetBoundIssuer sets BoundIssuer field to given value. ### HasBoundIssuer -`func (o *JWTWriteConfigRequest) HasBoundIssuer() bool` +`func (o *JwtConfigureRequest) HasBoundIssuer() bool` HasBoundIssuer returns a boolean if a field has been set. @@ -74,27 +74,27 @@ HasBoundIssuer returns a boolean if a field has been set. ### GetDefaultRole -`func (o *JWTWriteConfigRequest) GetDefaultRole() string` +`func (o *JwtConfigureRequest) GetDefaultRole() string` GetDefaultRole returns the DefaultRole field if non-nil, zero value otherwise. ### GetDefaultRoleOk -`func (o *JWTWriteConfigRequest) GetDefaultRoleOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetDefaultRoleOk() (*string, bool)` GetDefaultRoleOk returns a tuple with the DefaultRole field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultRole -`func (o *JWTWriteConfigRequest) SetDefaultRole(v string)` +`func (o *JwtConfigureRequest) SetDefaultRole(v string)` SetDefaultRole sets DefaultRole field to given value. ### HasDefaultRole -`func (o *JWTWriteConfigRequest) HasDefaultRole() bool` +`func (o *JwtConfigureRequest) HasDefaultRole() bool` HasDefaultRole returns a boolean if a field has been set. @@ -103,27 +103,27 @@ HasDefaultRole returns a boolean if a field has been set. ### GetJwksCaPem -`func (o *JWTWriteConfigRequest) GetJwksCaPem() string` +`func (o *JwtConfigureRequest) GetJwksCaPem() string` GetJwksCaPem returns the JwksCaPem field if non-nil, zero value otherwise. ### GetJwksCaPemOk -`func (o *JWTWriteConfigRequest) GetJwksCaPemOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetJwksCaPemOk() (*string, bool)` GetJwksCaPemOk returns a tuple with the JwksCaPem field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetJwksCaPem -`func (o *JWTWriteConfigRequest) SetJwksCaPem(v string)` +`func (o *JwtConfigureRequest) SetJwksCaPem(v string)` SetJwksCaPem sets JwksCaPem field to given value. ### HasJwksCaPem -`func (o *JWTWriteConfigRequest) HasJwksCaPem() bool` +`func (o *JwtConfigureRequest) HasJwksCaPem() bool` HasJwksCaPem returns a boolean if a field has been set. @@ -132,27 +132,27 @@ HasJwksCaPem returns a boolean if a field has been set. ### GetJwksUrl -`func (o *JWTWriteConfigRequest) GetJwksUrl() string` +`func (o *JwtConfigureRequest) GetJwksUrl() string` GetJwksUrl returns the JwksUrl field if non-nil, zero value otherwise. ### GetJwksUrlOk -`func (o *JWTWriteConfigRequest) GetJwksUrlOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetJwksUrlOk() (*string, bool)` GetJwksUrlOk returns a tuple with the JwksUrl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetJwksUrl -`func (o *JWTWriteConfigRequest) SetJwksUrl(v string)` +`func (o *JwtConfigureRequest) SetJwksUrl(v string)` SetJwksUrl sets JwksUrl field to given value. ### HasJwksUrl -`func (o *JWTWriteConfigRequest) HasJwksUrl() bool` +`func (o *JwtConfigureRequest) HasJwksUrl() bool` HasJwksUrl returns a boolean if a field has been set. @@ -161,27 +161,27 @@ HasJwksUrl returns a boolean if a field has been set. ### GetJwtSupportedAlgs -`func (o *JWTWriteConfigRequest) GetJwtSupportedAlgs() []string` +`func (o *JwtConfigureRequest) GetJwtSupportedAlgs() []string` GetJwtSupportedAlgs returns the JwtSupportedAlgs field if non-nil, zero value otherwise. ### GetJwtSupportedAlgsOk -`func (o *JWTWriteConfigRequest) GetJwtSupportedAlgsOk() (*[]string, bool)` +`func (o *JwtConfigureRequest) GetJwtSupportedAlgsOk() (*[]string, bool)` GetJwtSupportedAlgsOk returns a tuple with the JwtSupportedAlgs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetJwtSupportedAlgs -`func (o *JWTWriteConfigRequest) SetJwtSupportedAlgs(v []string)` +`func (o *JwtConfigureRequest) SetJwtSupportedAlgs(v []string)` SetJwtSupportedAlgs sets JwtSupportedAlgs field to given value. ### HasJwtSupportedAlgs -`func (o *JWTWriteConfigRequest) HasJwtSupportedAlgs() bool` +`func (o *JwtConfigureRequest) HasJwtSupportedAlgs() bool` HasJwtSupportedAlgs returns a boolean if a field has been set. @@ -190,27 +190,27 @@ HasJwtSupportedAlgs returns a boolean if a field has been set. ### GetJwtValidationPubkeys -`func (o *JWTWriteConfigRequest) GetJwtValidationPubkeys() []string` +`func (o *JwtConfigureRequest) GetJwtValidationPubkeys() []string` GetJwtValidationPubkeys returns the JwtValidationPubkeys field if non-nil, zero value otherwise. ### GetJwtValidationPubkeysOk -`func (o *JWTWriteConfigRequest) GetJwtValidationPubkeysOk() (*[]string, bool)` +`func (o *JwtConfigureRequest) GetJwtValidationPubkeysOk() (*[]string, bool)` GetJwtValidationPubkeysOk returns a tuple with the JwtValidationPubkeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetJwtValidationPubkeys -`func (o *JWTWriteConfigRequest) SetJwtValidationPubkeys(v []string)` +`func (o *JwtConfigureRequest) SetJwtValidationPubkeys(v []string)` SetJwtValidationPubkeys sets JwtValidationPubkeys field to given value. ### HasJwtValidationPubkeys -`func (o *JWTWriteConfigRequest) HasJwtValidationPubkeys() bool` +`func (o *JwtConfigureRequest) HasJwtValidationPubkeys() bool` HasJwtValidationPubkeys returns a boolean if a field has been set. @@ -219,27 +219,27 @@ HasJwtValidationPubkeys returns a boolean if a field has been set. ### GetNamespaceInState -`func (o *JWTWriteConfigRequest) GetNamespaceInState() bool` +`func (o *JwtConfigureRequest) GetNamespaceInState() bool` GetNamespaceInState returns the NamespaceInState field if non-nil, zero value otherwise. ### GetNamespaceInStateOk -`func (o *JWTWriteConfigRequest) GetNamespaceInStateOk() (*bool, bool)` +`func (o *JwtConfigureRequest) GetNamespaceInStateOk() (*bool, bool)` GetNamespaceInStateOk returns a tuple with the NamespaceInState field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNamespaceInState -`func (o *JWTWriteConfigRequest) SetNamespaceInState(v bool)` +`func (o *JwtConfigureRequest) SetNamespaceInState(v bool)` SetNamespaceInState sets NamespaceInState field to given value. ### HasNamespaceInState -`func (o *JWTWriteConfigRequest) HasNamespaceInState() bool` +`func (o *JwtConfigureRequest) HasNamespaceInState() bool` HasNamespaceInState returns a boolean if a field has been set. @@ -248,27 +248,27 @@ HasNamespaceInState returns a boolean if a field has been set. ### GetOidcClientId -`func (o *JWTWriteConfigRequest) GetOidcClientId() string` +`func (o *JwtConfigureRequest) GetOidcClientId() string` GetOidcClientId returns the OidcClientId field if non-nil, zero value otherwise. ### GetOidcClientIdOk -`func (o *JWTWriteConfigRequest) GetOidcClientIdOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetOidcClientIdOk() (*string, bool)` GetOidcClientIdOk returns a tuple with the OidcClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOidcClientId -`func (o *JWTWriteConfigRequest) SetOidcClientId(v string)` +`func (o *JwtConfigureRequest) SetOidcClientId(v string)` SetOidcClientId sets OidcClientId field to given value. ### HasOidcClientId -`func (o *JWTWriteConfigRequest) HasOidcClientId() bool` +`func (o *JwtConfigureRequest) HasOidcClientId() bool` HasOidcClientId returns a boolean if a field has been set. @@ -277,27 +277,27 @@ HasOidcClientId returns a boolean if a field has been set. ### GetOidcClientSecret -`func (o *JWTWriteConfigRequest) GetOidcClientSecret() string` +`func (o *JwtConfigureRequest) GetOidcClientSecret() string` GetOidcClientSecret returns the OidcClientSecret field if non-nil, zero value otherwise. ### GetOidcClientSecretOk -`func (o *JWTWriteConfigRequest) GetOidcClientSecretOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetOidcClientSecretOk() (*string, bool)` GetOidcClientSecretOk returns a tuple with the OidcClientSecret field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOidcClientSecret -`func (o *JWTWriteConfigRequest) SetOidcClientSecret(v string)` +`func (o *JwtConfigureRequest) SetOidcClientSecret(v string)` SetOidcClientSecret sets OidcClientSecret field to given value. ### HasOidcClientSecret -`func (o *JWTWriteConfigRequest) HasOidcClientSecret() bool` +`func (o *JwtConfigureRequest) HasOidcClientSecret() bool` HasOidcClientSecret returns a boolean if a field has been set. @@ -306,27 +306,27 @@ HasOidcClientSecret returns a boolean if a field has been set. ### GetOidcDiscoveryCaPem -`func (o *JWTWriteConfigRequest) GetOidcDiscoveryCaPem() string` +`func (o *JwtConfigureRequest) GetOidcDiscoveryCaPem() string` GetOidcDiscoveryCaPem returns the OidcDiscoveryCaPem field if non-nil, zero value otherwise. ### GetOidcDiscoveryCaPemOk -`func (o *JWTWriteConfigRequest) GetOidcDiscoveryCaPemOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetOidcDiscoveryCaPemOk() (*string, bool)` GetOidcDiscoveryCaPemOk returns a tuple with the OidcDiscoveryCaPem field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOidcDiscoveryCaPem -`func (o *JWTWriteConfigRequest) SetOidcDiscoveryCaPem(v string)` +`func (o *JwtConfigureRequest) SetOidcDiscoveryCaPem(v string)` SetOidcDiscoveryCaPem sets OidcDiscoveryCaPem field to given value. ### HasOidcDiscoveryCaPem -`func (o *JWTWriteConfigRequest) HasOidcDiscoveryCaPem() bool` +`func (o *JwtConfigureRequest) HasOidcDiscoveryCaPem() bool` HasOidcDiscoveryCaPem returns a boolean if a field has been set. @@ -335,27 +335,27 @@ HasOidcDiscoveryCaPem returns a boolean if a field has been set. ### GetOidcDiscoveryUrl -`func (o *JWTWriteConfigRequest) GetOidcDiscoveryUrl() string` +`func (o *JwtConfigureRequest) GetOidcDiscoveryUrl() string` GetOidcDiscoveryUrl returns the OidcDiscoveryUrl field if non-nil, zero value otherwise. ### GetOidcDiscoveryUrlOk -`func (o *JWTWriteConfigRequest) GetOidcDiscoveryUrlOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetOidcDiscoveryUrlOk() (*string, bool)` GetOidcDiscoveryUrlOk returns a tuple with the OidcDiscoveryUrl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOidcDiscoveryUrl -`func (o *JWTWriteConfigRequest) SetOidcDiscoveryUrl(v string)` +`func (o *JwtConfigureRequest) SetOidcDiscoveryUrl(v string)` SetOidcDiscoveryUrl sets OidcDiscoveryUrl field to given value. ### HasOidcDiscoveryUrl -`func (o *JWTWriteConfigRequest) HasOidcDiscoveryUrl() bool` +`func (o *JwtConfigureRequest) HasOidcDiscoveryUrl() bool` HasOidcDiscoveryUrl returns a boolean if a field has been set. @@ -364,27 +364,27 @@ HasOidcDiscoveryUrl returns a boolean if a field has been set. ### GetOidcResponseMode -`func (o *JWTWriteConfigRequest) GetOidcResponseMode() string` +`func (o *JwtConfigureRequest) GetOidcResponseMode() string` GetOidcResponseMode returns the OidcResponseMode field if non-nil, zero value otherwise. ### GetOidcResponseModeOk -`func (o *JWTWriteConfigRequest) GetOidcResponseModeOk() (*string, bool)` +`func (o *JwtConfigureRequest) GetOidcResponseModeOk() (*string, bool)` GetOidcResponseModeOk returns a tuple with the OidcResponseMode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOidcResponseMode -`func (o *JWTWriteConfigRequest) SetOidcResponseMode(v string)` +`func (o *JwtConfigureRequest) SetOidcResponseMode(v string)` SetOidcResponseMode sets OidcResponseMode field to given value. ### HasOidcResponseMode -`func (o *JWTWriteConfigRequest) HasOidcResponseMode() bool` +`func (o *JwtConfigureRequest) HasOidcResponseMode() bool` HasOidcResponseMode returns a boolean if a field has been set. @@ -393,27 +393,27 @@ HasOidcResponseMode returns a boolean if a field has been set. ### GetOidcResponseTypes -`func (o *JWTWriteConfigRequest) GetOidcResponseTypes() []string` +`func (o *JwtConfigureRequest) GetOidcResponseTypes() []string` GetOidcResponseTypes returns the OidcResponseTypes field if non-nil, zero value otherwise. ### GetOidcResponseTypesOk -`func (o *JWTWriteConfigRequest) GetOidcResponseTypesOk() (*[]string, bool)` +`func (o *JwtConfigureRequest) GetOidcResponseTypesOk() (*[]string, bool)` GetOidcResponseTypesOk returns a tuple with the OidcResponseTypes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOidcResponseTypes -`func (o *JWTWriteConfigRequest) SetOidcResponseTypes(v []string)` +`func (o *JwtConfigureRequest) SetOidcResponseTypes(v []string)` SetOidcResponseTypes sets OidcResponseTypes field to given value. ### HasOidcResponseTypes -`func (o *JWTWriteConfigRequest) HasOidcResponseTypes() bool` +`func (o *JwtConfigureRequest) HasOidcResponseTypes() bool` HasOidcResponseTypes returns a boolean if a field has been set. @@ -422,27 +422,27 @@ HasOidcResponseTypes returns a boolean if a field has been set. ### GetProviderConfig -`func (o *JWTWriteConfigRequest) GetProviderConfig() map[string]interface{}` +`func (o *JwtConfigureRequest) GetProviderConfig() map[string]interface{}` GetProviderConfig returns the ProviderConfig field if non-nil, zero value otherwise. ### GetProviderConfigOk -`func (o *JWTWriteConfigRequest) GetProviderConfigOk() (*map[string]interface{}, bool)` +`func (o *JwtConfigureRequest) GetProviderConfigOk() (*map[string]interface{}, bool)` GetProviderConfigOk returns a tuple with the ProviderConfig field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProviderConfig -`func (o *JWTWriteConfigRequest) SetProviderConfig(v map[string]interface{})` +`func (o *JwtConfigureRequest) SetProviderConfig(v map[string]interface{})` SetProviderConfig sets ProviderConfig field to given value. ### HasProviderConfig -`func (o *JWTWriteConfigRequest) HasProviderConfig() bool` +`func (o *JwtConfigureRequest) HasProviderConfig() bool` HasProviderConfig returns a boolean if a field has been set. diff --git a/docs/JwtLoginRequest.md b/docs/JwtLoginRequest.md index 305e0b06..16cb60f7 100644 --- a/docs/JwtLoginRequest.md +++ b/docs/JwtLoginRequest.md @@ -1,4 +1,4 @@ -# JWTLoginRequest +# JwtLoginRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewJWTLoginRequest +### NewJwtLoginRequest -`func NewJWTLoginRequest() *JWTLoginRequest` +`func NewJwtLoginRequest() *JwtLoginRequest` -NewJWTLoginRequest instantiates a new JWTLoginRequest object +NewJwtLoginRequest instantiates a new JwtLoginRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewJWTLoginRequestWithDefaults +### NewJwtLoginRequestWithDefaults -`func NewJWTLoginRequestWithDefaults() *JWTLoginRequest` +`func NewJwtLoginRequestWithDefaults() *JwtLoginRequest` -NewJWTLoginRequestWithDefaults instantiates a new JWTLoginRequest object +NewJwtLoginRequestWithDefaults instantiates a new JwtLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetJwt -`func (o *JWTLoginRequest) GetJwt() string` +`func (o *JwtLoginRequest) GetJwt() string` GetJwt returns the Jwt field if non-nil, zero value otherwise. ### GetJwtOk -`func (o *JWTLoginRequest) GetJwtOk() (*string, bool)` +`func (o *JwtLoginRequest) GetJwtOk() (*string, bool)` GetJwtOk returns a tuple with the Jwt field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetJwt -`func (o *JWTLoginRequest) SetJwt(v string)` +`func (o *JwtLoginRequest) SetJwt(v string)` SetJwt sets Jwt field to given value. ### HasJwt -`func (o *JWTLoginRequest) HasJwt() bool` +`func (o *JwtLoginRequest) HasJwt() bool` HasJwt returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasJwt returns a boolean if a field has been set. ### GetRole -`func (o *JWTLoginRequest) GetRole() string` +`func (o *JwtLoginRequest) GetRole() string` GetRole returns the Role field if non-nil, zero value otherwise. ### GetRoleOk -`func (o *JWTLoginRequest) GetRoleOk() (*string, bool)` +`func (o *JwtLoginRequest) GetRoleOk() (*string, bool)` GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRole -`func (o *JWTLoginRequest) SetRole(v string)` +`func (o *JwtLoginRequest) SetRole(v string)` SetRole sets Role field to given value. ### HasRole -`func (o *JWTLoginRequest) HasRole() bool` +`func (o *JwtLoginRequest) HasRole() bool` HasRole returns a boolean if a field has been set. diff --git a/docs/OIDCWriteCallbackRequest.md b/docs/JwtOidcCallbackWithParametersRequest.md similarity index 59% rename from docs/OIDCWriteCallbackRequest.md rename to docs/JwtOidcCallbackWithParametersRequest.md index 52dca461..a1210f40 100644 --- a/docs/OIDCWriteCallbackRequest.md +++ b/docs/JwtOidcCallbackWithParametersRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteCallbackRequest +# JwtOidcCallbackWithParametersRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteCallbackRequest +### NewJwtOidcCallbackWithParametersRequest -`func NewOIDCWriteCallbackRequest() *OIDCWriteCallbackRequest` +`func NewJwtOidcCallbackWithParametersRequest() *JwtOidcCallbackWithParametersRequest` -NewOIDCWriteCallbackRequest instantiates a new OIDCWriteCallbackRequest object +NewJwtOidcCallbackWithParametersRequest instantiates a new JwtOidcCallbackWithParametersRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteCallbackRequestWithDefaults +### NewJwtOidcCallbackWithParametersRequestWithDefaults -`func NewOIDCWriteCallbackRequestWithDefaults() *OIDCWriteCallbackRequest` +`func NewJwtOidcCallbackWithParametersRequestWithDefaults() *JwtOidcCallbackWithParametersRequest` -NewOIDCWriteCallbackRequestWithDefaults instantiates a new OIDCWriteCallbackRequest object +NewJwtOidcCallbackWithParametersRequestWithDefaults instantiates a new JwtOidcCallbackWithParametersRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientNonce -`func (o *OIDCWriteCallbackRequest) GetClientNonce() string` +`func (o *JwtOidcCallbackWithParametersRequest) GetClientNonce() string` GetClientNonce returns the ClientNonce field if non-nil, zero value otherwise. ### GetClientNonceOk -`func (o *OIDCWriteCallbackRequest) GetClientNonceOk() (*string, bool)` +`func (o *JwtOidcCallbackWithParametersRequest) GetClientNonceOk() (*string, bool)` GetClientNonceOk returns a tuple with the ClientNonce field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientNonce -`func (o *OIDCWriteCallbackRequest) SetClientNonce(v string)` +`func (o *JwtOidcCallbackWithParametersRequest) SetClientNonce(v string)` SetClientNonce sets ClientNonce field to given value. ### HasClientNonce -`func (o *OIDCWriteCallbackRequest) HasClientNonce() bool` +`func (o *JwtOidcCallbackWithParametersRequest) HasClientNonce() bool` HasClientNonce returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasClientNonce returns a boolean if a field has been set. ### GetCode -`func (o *OIDCWriteCallbackRequest) GetCode() string` +`func (o *JwtOidcCallbackWithParametersRequest) GetCode() string` GetCode returns the Code field if non-nil, zero value otherwise. ### GetCodeOk -`func (o *OIDCWriteCallbackRequest) GetCodeOk() (*string, bool)` +`func (o *JwtOidcCallbackWithParametersRequest) GetCodeOk() (*string, bool)` GetCodeOk returns a tuple with the Code field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCode -`func (o *OIDCWriteCallbackRequest) SetCode(v string)` +`func (o *JwtOidcCallbackWithParametersRequest) SetCode(v string)` SetCode sets Code field to given value. ### HasCode -`func (o *OIDCWriteCallbackRequest) HasCode() bool` +`func (o *JwtOidcCallbackWithParametersRequest) HasCode() bool` HasCode returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasCode returns a boolean if a field has been set. ### GetIdToken -`func (o *OIDCWriteCallbackRequest) GetIdToken() string` +`func (o *JwtOidcCallbackWithParametersRequest) GetIdToken() string` GetIdToken returns the IdToken field if non-nil, zero value otherwise. ### GetIdTokenOk -`func (o *OIDCWriteCallbackRequest) GetIdTokenOk() (*string, bool)` +`func (o *JwtOidcCallbackWithParametersRequest) GetIdTokenOk() (*string, bool)` GetIdTokenOk returns a tuple with the IdToken field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIdToken -`func (o *OIDCWriteCallbackRequest) SetIdToken(v string)` +`func (o *JwtOidcCallbackWithParametersRequest) SetIdToken(v string)` SetIdToken sets IdToken field to given value. ### HasIdToken -`func (o *OIDCWriteCallbackRequest) HasIdToken() bool` +`func (o *JwtOidcCallbackWithParametersRequest) HasIdToken() bool` HasIdToken returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasIdToken returns a boolean if a field has been set. ### GetState -`func (o *OIDCWriteCallbackRequest) GetState() string` +`func (o *JwtOidcCallbackWithParametersRequest) GetState() string` GetState returns the State field if non-nil, zero value otherwise. ### GetStateOk -`func (o *OIDCWriteCallbackRequest) GetStateOk() (*string, bool)` +`func (o *JwtOidcCallbackWithParametersRequest) GetStateOk() (*string, bool)` GetStateOk returns a tuple with the State field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetState -`func (o *OIDCWriteCallbackRequest) SetState(v string)` +`func (o *JwtOidcCallbackWithParametersRequest) SetState(v string)` SetState sets State field to given value. ### HasState -`func (o *OIDCWriteCallbackRequest) HasState() bool` +`func (o *JwtOidcCallbackWithParametersRequest) HasState() bool` HasState returns a boolean if a field has been set. diff --git a/docs/JWTWriteOIDCAuthURLRequest.md b/docs/JwtOidcRequestAuthorizationUrlRequest.md similarity index 60% rename from docs/JWTWriteOIDCAuthURLRequest.md rename to docs/JwtOidcRequestAuthorizationUrlRequest.md index e62e4701..2186b44e 100644 --- a/docs/JWTWriteOIDCAuthURLRequest.md +++ b/docs/JwtOidcRequestAuthorizationUrlRequest.md @@ -1,4 +1,4 @@ -# JWTWriteOIDCAuthURLRequest +# JwtOidcRequestAuthorizationUrlRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewJWTWriteOIDCAuthURLRequest +### NewJwtOidcRequestAuthorizationUrlRequest -`func NewJWTWriteOIDCAuthURLRequest() *JWTWriteOIDCAuthURLRequest` +`func NewJwtOidcRequestAuthorizationUrlRequest() *JwtOidcRequestAuthorizationUrlRequest` -NewJWTWriteOIDCAuthURLRequest instantiates a new JWTWriteOIDCAuthURLRequest object +NewJwtOidcRequestAuthorizationUrlRequest instantiates a new JwtOidcRequestAuthorizationUrlRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewJWTWriteOIDCAuthURLRequestWithDefaults +### NewJwtOidcRequestAuthorizationUrlRequestWithDefaults -`func NewJWTWriteOIDCAuthURLRequestWithDefaults() *JWTWriteOIDCAuthURLRequest` +`func NewJwtOidcRequestAuthorizationUrlRequestWithDefaults() *JwtOidcRequestAuthorizationUrlRequest` -NewJWTWriteOIDCAuthURLRequestWithDefaults instantiates a new JWTWriteOIDCAuthURLRequest object +NewJwtOidcRequestAuthorizationUrlRequestWithDefaults instantiates a new JwtOidcRequestAuthorizationUrlRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientNonce -`func (o *JWTWriteOIDCAuthURLRequest) GetClientNonce() string` +`func (o *JwtOidcRequestAuthorizationUrlRequest) GetClientNonce() string` GetClientNonce returns the ClientNonce field if non-nil, zero value otherwise. ### GetClientNonceOk -`func (o *JWTWriteOIDCAuthURLRequest) GetClientNonceOk() (*string, bool)` +`func (o *JwtOidcRequestAuthorizationUrlRequest) GetClientNonceOk() (*string, bool)` GetClientNonceOk returns a tuple with the ClientNonce field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientNonce -`func (o *JWTWriteOIDCAuthURLRequest) SetClientNonce(v string)` +`func (o *JwtOidcRequestAuthorizationUrlRequest) SetClientNonce(v string)` SetClientNonce sets ClientNonce field to given value. ### HasClientNonce -`func (o *JWTWriteOIDCAuthURLRequest) HasClientNonce() bool` +`func (o *JwtOidcRequestAuthorizationUrlRequest) HasClientNonce() bool` HasClientNonce returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasClientNonce returns a boolean if a field has been set. ### GetRedirectUri -`func (o *JWTWriteOIDCAuthURLRequest) GetRedirectUri() string` +`func (o *JwtOidcRequestAuthorizationUrlRequest) GetRedirectUri() string` GetRedirectUri returns the RedirectUri field if non-nil, zero value otherwise. ### GetRedirectUriOk -`func (o *JWTWriteOIDCAuthURLRequest) GetRedirectUriOk() (*string, bool)` +`func (o *JwtOidcRequestAuthorizationUrlRequest) GetRedirectUriOk() (*string, bool)` GetRedirectUriOk returns a tuple with the RedirectUri field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRedirectUri -`func (o *JWTWriteOIDCAuthURLRequest) SetRedirectUri(v string)` +`func (o *JwtOidcRequestAuthorizationUrlRequest) SetRedirectUri(v string)` SetRedirectUri sets RedirectUri field to given value. ### HasRedirectUri -`func (o *JWTWriteOIDCAuthURLRequest) HasRedirectUri() bool` +`func (o *JwtOidcRequestAuthorizationUrlRequest) HasRedirectUri() bool` HasRedirectUri returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasRedirectUri returns a boolean if a field has been set. ### GetRole -`func (o *JWTWriteOIDCAuthURLRequest) GetRole() string` +`func (o *JwtOidcRequestAuthorizationUrlRequest) GetRole() string` GetRole returns the Role field if non-nil, zero value otherwise. ### GetRoleOk -`func (o *JWTWriteOIDCAuthURLRequest) GetRoleOk() (*string, bool)` +`func (o *JwtOidcRequestAuthorizationUrlRequest) GetRoleOk() (*string, bool)` GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRole -`func (o *JWTWriteOIDCAuthURLRequest) SetRole(v string)` +`func (o *JwtOidcRequestAuthorizationUrlRequest) SetRole(v string)` SetRole sets Role field to given value. ### HasRole -`func (o *JWTWriteOIDCAuthURLRequest) HasRole() bool` +`func (o *JwtOidcRequestAuthorizationUrlRequest) HasRole() bool` HasRole returns a boolean if a field has been set. diff --git a/docs/KVv2DeleteVersionsRequest.md b/docs/KVv2DeleteVersionsRequest.md index 2a406aea..819f34c8 100644 --- a/docs/KVv2DeleteVersionsRequest.md +++ b/docs/KVv2DeleteVersionsRequest.md @@ -1,4 +1,4 @@ -# KVv2DeleteVersionsRequest +# KvV2DeleteVersionsRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewKVv2DeleteVersionsRequest +### NewKvV2DeleteVersionsRequest -`func NewKVv2DeleteVersionsRequest() *KVv2DeleteVersionsRequest` +`func NewKvV2DeleteVersionsRequest() *KvV2DeleteVersionsRequest` -NewKVv2DeleteVersionsRequest instantiates a new KVv2DeleteVersionsRequest object +NewKvV2DeleteVersionsRequest instantiates a new KvV2DeleteVersionsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKVv2DeleteVersionsRequestWithDefaults +### NewKvV2DeleteVersionsRequestWithDefaults -`func NewKVv2DeleteVersionsRequestWithDefaults() *KVv2DeleteVersionsRequest` +`func NewKvV2DeleteVersionsRequestWithDefaults() *KvV2DeleteVersionsRequest` -NewKVv2DeleteVersionsRequestWithDefaults instantiates a new KVv2DeleteVersionsRequest object +NewKvV2DeleteVersionsRequestWithDefaults instantiates a new KvV2DeleteVersionsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetVersions -`func (o *KVv2DeleteVersionsRequest) GetVersions() []int32` +`func (o *KvV2DeleteVersionsRequest) GetVersions() []int32` GetVersions returns the Versions field if non-nil, zero value otherwise. ### GetVersionsOk -`func (o *KVv2DeleteVersionsRequest) GetVersionsOk() (*[]int32, bool)` +`func (o *KvV2DeleteVersionsRequest) GetVersionsOk() (*[]int32, bool)` GetVersionsOk returns a tuple with the Versions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVersions -`func (o *KVv2DeleteVersionsRequest) SetVersions(v []int32)` +`func (o *KvV2DeleteVersionsRequest) SetVersions(v []int32)` SetVersions sets Versions field to given value. ### HasVersions -`func (o *KVv2DeleteVersionsRequest) HasVersions() bool` +`func (o *KvV2DeleteVersionsRequest) HasVersions() bool` HasVersions returns a boolean if a field has been set. diff --git a/docs/KVv2DestroyVersionsRequest.md b/docs/KVv2DestroyVersionsRequest.md index 82df4708..68bfa472 100644 --- a/docs/KVv2DestroyVersionsRequest.md +++ b/docs/KVv2DestroyVersionsRequest.md @@ -1,4 +1,4 @@ -# KVv2DestroyVersionsRequest +# KvV2DestroyVersionsRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewKVv2DestroyVersionsRequest +### NewKvV2DestroyVersionsRequest -`func NewKVv2DestroyVersionsRequest() *KVv2DestroyVersionsRequest` +`func NewKvV2DestroyVersionsRequest() *KvV2DestroyVersionsRequest` -NewKVv2DestroyVersionsRequest instantiates a new KVv2DestroyVersionsRequest object +NewKvV2DestroyVersionsRequest instantiates a new KvV2DestroyVersionsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKVv2DestroyVersionsRequestWithDefaults +### NewKvV2DestroyVersionsRequestWithDefaults -`func NewKVv2DestroyVersionsRequestWithDefaults() *KVv2DestroyVersionsRequest` +`func NewKvV2DestroyVersionsRequestWithDefaults() *KvV2DestroyVersionsRequest` -NewKVv2DestroyVersionsRequestWithDefaults instantiates a new KVv2DestroyVersionsRequest object +NewKvV2DestroyVersionsRequestWithDefaults instantiates a new KvV2DestroyVersionsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetVersions -`func (o *KVv2DestroyVersionsRequest) GetVersions() []int32` +`func (o *KvV2DestroyVersionsRequest) GetVersions() []int32` GetVersions returns the Versions field if non-nil, zero value otherwise. ### GetVersionsOk -`func (o *KVv2DestroyVersionsRequest) GetVersionsOk() (*[]int32, bool)` +`func (o *KvV2DestroyVersionsRequest) GetVersionsOk() (*[]int32, bool)` GetVersionsOk returns a tuple with the Versions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVersions -`func (o *KVv2DestroyVersionsRequest) SetVersions(v []int32)` +`func (o *KvV2DestroyVersionsRequest) SetVersions(v []int32)` SetVersions sets Versions field to given value. ### HasVersions -`func (o *KVv2DestroyVersionsRequest) HasVersions() bool` +`func (o *KvV2DestroyVersionsRequest) HasVersions() bool` HasVersions returns a boolean if a field has been set. diff --git a/docs/KVv2UndeleteVersionsRequest.md b/docs/KVv2UndeleteVersionsRequest.md index caf5c88c..21a902d2 100644 --- a/docs/KVv2UndeleteVersionsRequest.md +++ b/docs/KVv2UndeleteVersionsRequest.md @@ -1,4 +1,4 @@ -# KVv2UndeleteVersionsRequest +# KvV2UndeleteVersionsRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewKVv2UndeleteVersionsRequest +### NewKvV2UndeleteVersionsRequest -`func NewKVv2UndeleteVersionsRequest() *KVv2UndeleteVersionsRequest` +`func NewKvV2UndeleteVersionsRequest() *KvV2UndeleteVersionsRequest` -NewKVv2UndeleteVersionsRequest instantiates a new KVv2UndeleteVersionsRequest object +NewKvV2UndeleteVersionsRequest instantiates a new KvV2UndeleteVersionsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKVv2UndeleteVersionsRequestWithDefaults +### NewKvV2UndeleteVersionsRequestWithDefaults -`func NewKVv2UndeleteVersionsRequestWithDefaults() *KVv2UndeleteVersionsRequest` +`func NewKvV2UndeleteVersionsRequestWithDefaults() *KvV2UndeleteVersionsRequest` -NewKVv2UndeleteVersionsRequestWithDefaults instantiates a new KVv2UndeleteVersionsRequest object +NewKvV2UndeleteVersionsRequestWithDefaults instantiates a new KvV2UndeleteVersionsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetVersions -`func (o *KVv2UndeleteVersionsRequest) GetVersions() []int32` +`func (o *KvV2UndeleteVersionsRequest) GetVersions() []int32` GetVersions returns the Versions field if non-nil, zero value otherwise. ### GetVersionsOk -`func (o *KVv2UndeleteVersionsRequest) GetVersionsOk() (*[]int32, bool)` +`func (o *KvV2UndeleteVersionsRequest) GetVersionsOk() (*[]int32, bool)` GetVersionsOk returns a tuple with the Versions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVersions -`func (o *KVv2UndeleteVersionsRequest) SetVersions(v []int32)` +`func (o *KvV2UndeleteVersionsRequest) SetVersions(v []int32)` SetVersions sets Versions field to given value. ### HasVersions -`func (o *KVv2UndeleteVersionsRequest) HasVersions() bool` +`func (o *KvV2UndeleteVersionsRequest) HasVersions() bool` HasVersions returns a boolean if a field has been set. diff --git a/docs/KVv2WriteMetadataRequest.md b/docs/KVv2WriteMetadataRequest.md index 200d71e1..4e8ca7a9 100644 --- a/docs/KVv2WriteMetadataRequest.md +++ b/docs/KVv2WriteMetadataRequest.md @@ -1,4 +1,4 @@ -# KVv2WriteMetadataRequest +# KvV2WriteMetadataRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewKVv2WriteMetadataRequest +### NewKvV2WriteMetadataRequest -`func NewKVv2WriteMetadataRequest() *KVv2WriteMetadataRequest` +`func NewKvV2WriteMetadataRequest() *KvV2WriteMetadataRequest` -NewKVv2WriteMetadataRequest instantiates a new KVv2WriteMetadataRequest object +NewKvV2WriteMetadataRequest instantiates a new KvV2WriteMetadataRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKVv2WriteMetadataRequestWithDefaults +### NewKvV2WriteMetadataRequestWithDefaults -`func NewKVv2WriteMetadataRequestWithDefaults() *KVv2WriteMetadataRequest` +`func NewKvV2WriteMetadataRequestWithDefaults() *KvV2WriteMetadataRequest` -NewKVv2WriteMetadataRequestWithDefaults instantiates a new KVv2WriteMetadataRequest object +NewKvV2WriteMetadataRequestWithDefaults instantiates a new KvV2WriteMetadataRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCasRequired -`func (o *KVv2WriteMetadataRequest) GetCasRequired() bool` +`func (o *KvV2WriteMetadataRequest) GetCasRequired() bool` GetCasRequired returns the CasRequired field if non-nil, zero value otherwise. ### GetCasRequiredOk -`func (o *KVv2WriteMetadataRequest) GetCasRequiredOk() (*bool, bool)` +`func (o *KvV2WriteMetadataRequest) GetCasRequiredOk() (*bool, bool)` GetCasRequiredOk returns a tuple with the CasRequired field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCasRequired -`func (o *KVv2WriteMetadataRequest) SetCasRequired(v bool)` +`func (o *KvV2WriteMetadataRequest) SetCasRequired(v bool)` SetCasRequired sets CasRequired field to given value. ### HasCasRequired -`func (o *KVv2WriteMetadataRequest) HasCasRequired() bool` +`func (o *KvV2WriteMetadataRequest) HasCasRequired() bool` HasCasRequired returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasCasRequired returns a boolean if a field has been set. ### GetCustomMetadata -`func (o *KVv2WriteMetadataRequest) GetCustomMetadata() map[string]interface{}` +`func (o *KvV2WriteMetadataRequest) GetCustomMetadata() map[string]interface{}` GetCustomMetadata returns the CustomMetadata field if non-nil, zero value otherwise. ### GetCustomMetadataOk -`func (o *KVv2WriteMetadataRequest) GetCustomMetadataOk() (*map[string]interface{}, bool)` +`func (o *KvV2WriteMetadataRequest) GetCustomMetadataOk() (*map[string]interface{}, bool)` GetCustomMetadataOk returns a tuple with the CustomMetadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCustomMetadata -`func (o *KVv2WriteMetadataRequest) SetCustomMetadata(v map[string]interface{})` +`func (o *KvV2WriteMetadataRequest) SetCustomMetadata(v map[string]interface{})` SetCustomMetadata sets CustomMetadata field to given value. ### HasCustomMetadata -`func (o *KVv2WriteMetadataRequest) HasCustomMetadata() bool` +`func (o *KvV2WriteMetadataRequest) HasCustomMetadata() bool` HasCustomMetadata returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasCustomMetadata returns a boolean if a field has been set. ### GetDeleteVersionAfter -`func (o *KVv2WriteMetadataRequest) GetDeleteVersionAfter() int32` +`func (o *KvV2WriteMetadataRequest) GetDeleteVersionAfter() int32` GetDeleteVersionAfter returns the DeleteVersionAfter field if non-nil, zero value otherwise. ### GetDeleteVersionAfterOk -`func (o *KVv2WriteMetadataRequest) GetDeleteVersionAfterOk() (*int32, bool)` +`func (o *KvV2WriteMetadataRequest) GetDeleteVersionAfterOk() (*int32, bool)` GetDeleteVersionAfterOk returns a tuple with the DeleteVersionAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDeleteVersionAfter -`func (o *KVv2WriteMetadataRequest) SetDeleteVersionAfter(v int32)` +`func (o *KvV2WriteMetadataRequest) SetDeleteVersionAfter(v int32)` SetDeleteVersionAfter sets DeleteVersionAfter field to given value. ### HasDeleteVersionAfter -`func (o *KVv2WriteMetadataRequest) HasDeleteVersionAfter() bool` +`func (o *KvV2WriteMetadataRequest) HasDeleteVersionAfter() bool` HasDeleteVersionAfter returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasDeleteVersionAfter returns a boolean if a field has been set. ### GetMaxVersions -`func (o *KVv2WriteMetadataRequest) GetMaxVersions() int32` +`func (o *KvV2WriteMetadataRequest) GetMaxVersions() int32` GetMaxVersions returns the MaxVersions field if non-nil, zero value otherwise. ### GetMaxVersionsOk -`func (o *KVv2WriteMetadataRequest) GetMaxVersionsOk() (*int32, bool)` +`func (o *KvV2WriteMetadataRequest) GetMaxVersionsOk() (*int32, bool)` GetMaxVersionsOk returns a tuple with the MaxVersions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxVersions -`func (o *KVv2WriteMetadataRequest) SetMaxVersions(v int32)` +`func (o *KvV2WriteMetadataRequest) SetMaxVersions(v int32)` SetMaxVersions sets MaxVersions field to given value. ### HasMaxVersions -`func (o *KVv2WriteMetadataRequest) HasMaxVersions() bool` +`func (o *KvV2WriteMetadataRequest) HasMaxVersions() bool` HasMaxVersions returns a boolean if a field has been set. diff --git a/docs/KVv2WriteRequest.md b/docs/KVv2WriteRequest.md index 7f5e7f0b..c4d7bd19 100644 --- a/docs/KVv2WriteRequest.md +++ b/docs/KVv2WriteRequest.md @@ -1,4 +1,4 @@ -# KVv2WriteRequest +# KvV2WriteRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewKVv2WriteRequest +### NewKvV2WriteRequest -`func NewKVv2WriteRequest() *KVv2WriteRequest` +`func NewKvV2WriteRequest() *KvV2WriteRequest` -NewKVv2WriteRequest instantiates a new KVv2WriteRequest object +NewKvV2WriteRequest instantiates a new KvV2WriteRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKVv2WriteRequestWithDefaults +### NewKvV2WriteRequestWithDefaults -`func NewKVv2WriteRequestWithDefaults() *KVv2WriteRequest` +`func NewKvV2WriteRequestWithDefaults() *KvV2WriteRequest` -NewKVv2WriteRequestWithDefaults instantiates a new KVv2WriteRequest object +NewKvV2WriteRequestWithDefaults instantiates a new KvV2WriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetData -`func (o *KVv2WriteRequest) GetData() map[string]interface{}` +`func (o *KvV2WriteRequest) GetData() map[string]interface{}` GetData returns the Data field if non-nil, zero value otherwise. ### GetDataOk -`func (o *KVv2WriteRequest) GetDataOk() (*map[string]interface{}, bool)` +`func (o *KvV2WriteRequest) GetDataOk() (*map[string]interface{}, bool)` GetDataOk returns a tuple with the Data field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetData -`func (o *KVv2WriteRequest) SetData(v map[string]interface{})` +`func (o *KvV2WriteRequest) SetData(v map[string]interface{})` SetData sets Data field to given value. ### HasData -`func (o *KVv2WriteRequest) HasData() bool` +`func (o *KvV2WriteRequest) HasData() bool` HasData returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasData returns a boolean if a field has been set. ### GetOptions -`func (o *KVv2WriteRequest) GetOptions() map[string]interface{}` +`func (o *KvV2WriteRequest) GetOptions() map[string]interface{}` GetOptions returns the Options field if non-nil, zero value otherwise. ### GetOptionsOk -`func (o *KVv2WriteRequest) GetOptionsOk() (*map[string]interface{}, bool)` +`func (o *KvV2WriteRequest) GetOptionsOk() (*map[string]interface{}, bool)` GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOptions -`func (o *KVv2WriteRequest) SetOptions(v map[string]interface{})` +`func (o *KvV2WriteRequest) SetOptions(v map[string]interface{})` SetOptions sets Options field to given value. ### HasOptions -`func (o *KVv2WriteRequest) HasOptions() bool` +`func (o *KvV2WriteRequest) HasOptions() bool` HasOptions returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasOptions returns a boolean if a field has been set. ### GetVersion -`func (o *KVv2WriteRequest) GetVersion() int32` +`func (o *KvV2WriteRequest) GetVersion() int32` GetVersion returns the Version field if non-nil, zero value otherwise. ### GetVersionOk -`func (o *KVv2WriteRequest) GetVersionOk() (*int32, bool)` +`func (o *KvV2WriteRequest) GetVersionOk() (*int32, bool)` GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVersion -`func (o *KVv2WriteRequest) SetVersion(v int32)` +`func (o *KvV2WriteRequest) SetVersion(v int32)` SetVersion sets Version field to given value. ### HasVersion -`func (o *KVv2WriteRequest) HasVersion() bool` +`func (o *KvV2WriteRequest) HasVersion() bool` HasVersion returns a boolean if a field has been set. diff --git a/docs/KerberosWriteLDAPConfigRequest.md b/docs/KerberosConfigureLdapRequest.md similarity index 64% rename from docs/KerberosWriteLDAPConfigRequest.md rename to docs/KerberosConfigureLdapRequest.md index 7a001679..a0316c75 100644 --- a/docs/KerberosWriteLDAPConfigRequest.md +++ b/docs/KerberosConfigureLdapRequest.md @@ -1,4 +1,4 @@ -# KerberosWriteLDAPConfigRequest +# KerberosConfigureLdapRequest ## Properties @@ -12,12 +12,15 @@ Name | Type | Description | Notes **Certificate** | Pointer to **string** | CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) | [optional] **ClientTlsCert** | Pointer to **string** | Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] **ClientTlsKey** | Pointer to **string** | Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] +**ConnectionTimeout** | Pointer to **int32** | Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. | [optional] **DenyNullBind** | Pointer to **bool** | Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true | [optional] [default to true] +**DereferenceAliases** | Pointer to **string** | When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'. | [optional] [default to "never"] **Discoverdn** | Pointer to **bool** | Use anonymous bind to discover the bind DN of a user (optional) | [optional] **Groupattr** | Pointer to **string** | LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn | [optional] [default to "cn"] **Groupdn** | Pointer to **string** | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) | [optional] **Groupfilter** | Pointer to **string** | Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) | [optional] [default to "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))"] **InsecureTls** | Pointer to **bool** | Skip LDAP server SSL Certificate verification - VERY insecure (optional) | [optional] +**MaxPageSize** | Pointer to **int32** | The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged. | [optional] [default to 2147483647] **RequestTimeout** | Pointer to **int32** | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | [optional] **Starttls** | Pointer to **bool** | Issue a StartTLS command after establishing unencrypted connection (optional) | [optional] **TlsMaxVersion** | Pointer to **string** | Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' | [optional] [default to "tls12"] @@ -45,47 +48,47 @@ Name | Type | Description | Notes ## Methods -### NewKerberosWriteLDAPConfigRequest +### NewKerberosConfigureLdapRequest -`func NewKerberosWriteLDAPConfigRequest() *KerberosWriteLDAPConfigRequest` +`func NewKerberosConfigureLdapRequest() *KerberosConfigureLdapRequest` -NewKerberosWriteLDAPConfigRequest instantiates a new KerberosWriteLDAPConfigRequest object +NewKerberosConfigureLdapRequest instantiates a new KerberosConfigureLdapRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKerberosWriteLDAPConfigRequestWithDefaults +### NewKerberosConfigureLdapRequestWithDefaults -`func NewKerberosWriteLDAPConfigRequestWithDefaults() *KerberosWriteLDAPConfigRequest` +`func NewKerberosConfigureLdapRequestWithDefaults() *KerberosConfigureLdapRequest` -NewKerberosWriteLDAPConfigRequestWithDefaults instantiates a new KerberosWriteLDAPConfigRequest object +NewKerberosConfigureLdapRequestWithDefaults instantiates a new KerberosConfigureLdapRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAnonymousGroupSearch -`func (o *KerberosWriteLDAPConfigRequest) GetAnonymousGroupSearch() bool` +`func (o *KerberosConfigureLdapRequest) GetAnonymousGroupSearch() bool` GetAnonymousGroupSearch returns the AnonymousGroupSearch field if non-nil, zero value otherwise. ### GetAnonymousGroupSearchOk -`func (o *KerberosWriteLDAPConfigRequest) GetAnonymousGroupSearchOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetAnonymousGroupSearchOk() (*bool, bool)` GetAnonymousGroupSearchOk returns a tuple with the AnonymousGroupSearch field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAnonymousGroupSearch -`func (o *KerberosWriteLDAPConfigRequest) SetAnonymousGroupSearch(v bool)` +`func (o *KerberosConfigureLdapRequest) SetAnonymousGroupSearch(v bool)` SetAnonymousGroupSearch sets AnonymousGroupSearch field to given value. ### HasAnonymousGroupSearch -`func (o *KerberosWriteLDAPConfigRequest) HasAnonymousGroupSearch() bool` +`func (o *KerberosConfigureLdapRequest) HasAnonymousGroupSearch() bool` HasAnonymousGroupSearch returns a boolean if a field has been set. @@ -94,27 +97,27 @@ HasAnonymousGroupSearch returns a boolean if a field has been set. ### GetBinddn -`func (o *KerberosWriteLDAPConfigRequest) GetBinddn() string` +`func (o *KerberosConfigureLdapRequest) GetBinddn() string` GetBinddn returns the Binddn field if non-nil, zero value otherwise. ### GetBinddnOk -`func (o *KerberosWriteLDAPConfigRequest) GetBinddnOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetBinddnOk() (*string, bool)` GetBinddnOk returns a tuple with the Binddn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBinddn -`func (o *KerberosWriteLDAPConfigRequest) SetBinddn(v string)` +`func (o *KerberosConfigureLdapRequest) SetBinddn(v string)` SetBinddn sets Binddn field to given value. ### HasBinddn -`func (o *KerberosWriteLDAPConfigRequest) HasBinddn() bool` +`func (o *KerberosConfigureLdapRequest) HasBinddn() bool` HasBinddn returns a boolean if a field has been set. @@ -123,27 +126,27 @@ HasBinddn returns a boolean if a field has been set. ### GetBindpass -`func (o *KerberosWriteLDAPConfigRequest) GetBindpass() string` +`func (o *KerberosConfigureLdapRequest) GetBindpass() string` GetBindpass returns the Bindpass field if non-nil, zero value otherwise. ### GetBindpassOk -`func (o *KerberosWriteLDAPConfigRequest) GetBindpassOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetBindpassOk() (*string, bool)` GetBindpassOk returns a tuple with the Bindpass field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBindpass -`func (o *KerberosWriteLDAPConfigRequest) SetBindpass(v string)` +`func (o *KerberosConfigureLdapRequest) SetBindpass(v string)` SetBindpass sets Bindpass field to given value. ### HasBindpass -`func (o *KerberosWriteLDAPConfigRequest) HasBindpass() bool` +`func (o *KerberosConfigureLdapRequest) HasBindpass() bool` HasBindpass returns a boolean if a field has been set. @@ -152,27 +155,27 @@ HasBindpass returns a boolean if a field has been set. ### GetCaseSensitiveNames -`func (o *KerberosWriteLDAPConfigRequest) GetCaseSensitiveNames() bool` +`func (o *KerberosConfigureLdapRequest) GetCaseSensitiveNames() bool` GetCaseSensitiveNames returns the CaseSensitiveNames field if non-nil, zero value otherwise. ### GetCaseSensitiveNamesOk -`func (o *KerberosWriteLDAPConfigRequest) GetCaseSensitiveNamesOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetCaseSensitiveNamesOk() (*bool, bool)` GetCaseSensitiveNamesOk returns a tuple with the CaseSensitiveNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCaseSensitiveNames -`func (o *KerberosWriteLDAPConfigRequest) SetCaseSensitiveNames(v bool)` +`func (o *KerberosConfigureLdapRequest) SetCaseSensitiveNames(v bool)` SetCaseSensitiveNames sets CaseSensitiveNames field to given value. ### HasCaseSensitiveNames -`func (o *KerberosWriteLDAPConfigRequest) HasCaseSensitiveNames() bool` +`func (o *KerberosConfigureLdapRequest) HasCaseSensitiveNames() bool` HasCaseSensitiveNames returns a boolean if a field has been set. @@ -181,27 +184,27 @@ HasCaseSensitiveNames returns a boolean if a field has been set. ### GetCertificate -`func (o *KerberosWriteLDAPConfigRequest) GetCertificate() string` +`func (o *KerberosConfigureLdapRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *KerberosWriteLDAPConfigRequest) GetCertificateOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *KerberosWriteLDAPConfigRequest) SetCertificate(v string)` +`func (o *KerberosConfigureLdapRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *KerberosWriteLDAPConfigRequest) HasCertificate() bool` +`func (o *KerberosConfigureLdapRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -210,27 +213,27 @@ HasCertificate returns a boolean if a field has been set. ### GetClientTlsCert -`func (o *KerberosWriteLDAPConfigRequest) GetClientTlsCert() string` +`func (o *KerberosConfigureLdapRequest) GetClientTlsCert() string` GetClientTlsCert returns the ClientTlsCert field if non-nil, zero value otherwise. ### GetClientTlsCertOk -`func (o *KerberosWriteLDAPConfigRequest) GetClientTlsCertOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetClientTlsCertOk() (*string, bool)` GetClientTlsCertOk returns a tuple with the ClientTlsCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientTlsCert -`func (o *KerberosWriteLDAPConfigRequest) SetClientTlsCert(v string)` +`func (o *KerberosConfigureLdapRequest) SetClientTlsCert(v string)` SetClientTlsCert sets ClientTlsCert field to given value. ### HasClientTlsCert -`func (o *KerberosWriteLDAPConfigRequest) HasClientTlsCert() bool` +`func (o *KerberosConfigureLdapRequest) HasClientTlsCert() bool` HasClientTlsCert returns a boolean if a field has been set. @@ -239,85 +242,143 @@ HasClientTlsCert returns a boolean if a field has been set. ### GetClientTlsKey -`func (o *KerberosWriteLDAPConfigRequest) GetClientTlsKey() string` +`func (o *KerberosConfigureLdapRequest) GetClientTlsKey() string` GetClientTlsKey returns the ClientTlsKey field if non-nil, zero value otherwise. ### GetClientTlsKeyOk -`func (o *KerberosWriteLDAPConfigRequest) GetClientTlsKeyOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetClientTlsKeyOk() (*string, bool)` GetClientTlsKeyOk returns a tuple with the ClientTlsKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientTlsKey -`func (o *KerberosWriteLDAPConfigRequest) SetClientTlsKey(v string)` +`func (o *KerberosConfigureLdapRequest) SetClientTlsKey(v string)` SetClientTlsKey sets ClientTlsKey field to given value. ### HasClientTlsKey -`func (o *KerberosWriteLDAPConfigRequest) HasClientTlsKey() bool` +`func (o *KerberosConfigureLdapRequest) HasClientTlsKey() bool` HasClientTlsKey returns a boolean if a field has been set. +### GetConnectionTimeout + +`func (o *KerberosConfigureLdapRequest) GetConnectionTimeout() int32` + +GetConnectionTimeout returns the ConnectionTimeout field if non-nil, zero value otherwise. + +### GetConnectionTimeoutOk + +`func (o *KerberosConfigureLdapRequest) GetConnectionTimeoutOk() (*int32, bool)` + +GetConnectionTimeoutOk returns a tuple with the ConnectionTimeout field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetConnectionTimeout + +`func (o *KerberosConfigureLdapRequest) SetConnectionTimeout(v int32)` + +SetConnectionTimeout sets ConnectionTimeout field to given value. + + +### HasConnectionTimeout + +`func (o *KerberosConfigureLdapRequest) HasConnectionTimeout() bool` + +HasConnectionTimeout returns a boolean if a field has been set. + + + + ### GetDenyNullBind -`func (o *KerberosWriteLDAPConfigRequest) GetDenyNullBind() bool` +`func (o *KerberosConfigureLdapRequest) GetDenyNullBind() bool` GetDenyNullBind returns the DenyNullBind field if non-nil, zero value otherwise. ### GetDenyNullBindOk -`func (o *KerberosWriteLDAPConfigRequest) GetDenyNullBindOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetDenyNullBindOk() (*bool, bool)` GetDenyNullBindOk returns a tuple with the DenyNullBind field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDenyNullBind -`func (o *KerberosWriteLDAPConfigRequest) SetDenyNullBind(v bool)` +`func (o *KerberosConfigureLdapRequest) SetDenyNullBind(v bool)` SetDenyNullBind sets DenyNullBind field to given value. ### HasDenyNullBind -`func (o *KerberosWriteLDAPConfigRequest) HasDenyNullBind() bool` +`func (o *KerberosConfigureLdapRequest) HasDenyNullBind() bool` HasDenyNullBind returns a boolean if a field has been set. +### GetDereferenceAliases + +`func (o *KerberosConfigureLdapRequest) GetDereferenceAliases() string` + +GetDereferenceAliases returns the DereferenceAliases field if non-nil, zero value otherwise. + +### GetDereferenceAliasesOk + +`func (o *KerberosConfigureLdapRequest) GetDereferenceAliasesOk() (*string, bool)` + +GetDereferenceAliasesOk returns a tuple with the DereferenceAliases field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDereferenceAliases + +`func (o *KerberosConfigureLdapRequest) SetDereferenceAliases(v string)` + +SetDereferenceAliases sets DereferenceAliases field to given value. + + +### HasDereferenceAliases + +`func (o *KerberosConfigureLdapRequest) HasDereferenceAliases() bool` + +HasDereferenceAliases returns a boolean if a field has been set. + + + + ### GetDiscoverdn -`func (o *KerberosWriteLDAPConfigRequest) GetDiscoverdn() bool` +`func (o *KerberosConfigureLdapRequest) GetDiscoverdn() bool` GetDiscoverdn returns the Discoverdn field if non-nil, zero value otherwise. ### GetDiscoverdnOk -`func (o *KerberosWriteLDAPConfigRequest) GetDiscoverdnOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetDiscoverdnOk() (*bool, bool)` GetDiscoverdnOk returns a tuple with the Discoverdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDiscoverdn -`func (o *KerberosWriteLDAPConfigRequest) SetDiscoverdn(v bool)` +`func (o *KerberosConfigureLdapRequest) SetDiscoverdn(v bool)` SetDiscoverdn sets Discoverdn field to given value. ### HasDiscoverdn -`func (o *KerberosWriteLDAPConfigRequest) HasDiscoverdn() bool` +`func (o *KerberosConfigureLdapRequest) HasDiscoverdn() bool` HasDiscoverdn returns a boolean if a field has been set. @@ -326,27 +387,27 @@ HasDiscoverdn returns a boolean if a field has been set. ### GetGroupattr -`func (o *KerberosWriteLDAPConfigRequest) GetGroupattr() string` +`func (o *KerberosConfigureLdapRequest) GetGroupattr() string` GetGroupattr returns the Groupattr field if non-nil, zero value otherwise. ### GetGroupattrOk -`func (o *KerberosWriteLDAPConfigRequest) GetGroupattrOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetGroupattrOk() (*string, bool)` GetGroupattrOk returns a tuple with the Groupattr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupattr -`func (o *KerberosWriteLDAPConfigRequest) SetGroupattr(v string)` +`func (o *KerberosConfigureLdapRequest) SetGroupattr(v string)` SetGroupattr sets Groupattr field to given value. ### HasGroupattr -`func (o *KerberosWriteLDAPConfigRequest) HasGroupattr() bool` +`func (o *KerberosConfigureLdapRequest) HasGroupattr() bool` HasGroupattr returns a boolean if a field has been set. @@ -355,27 +416,27 @@ HasGroupattr returns a boolean if a field has been set. ### GetGroupdn -`func (o *KerberosWriteLDAPConfigRequest) GetGroupdn() string` +`func (o *KerberosConfigureLdapRequest) GetGroupdn() string` GetGroupdn returns the Groupdn field if non-nil, zero value otherwise. ### GetGroupdnOk -`func (o *KerberosWriteLDAPConfigRequest) GetGroupdnOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetGroupdnOk() (*string, bool)` GetGroupdnOk returns a tuple with the Groupdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupdn -`func (o *KerberosWriteLDAPConfigRequest) SetGroupdn(v string)` +`func (o *KerberosConfigureLdapRequest) SetGroupdn(v string)` SetGroupdn sets Groupdn field to given value. ### HasGroupdn -`func (o *KerberosWriteLDAPConfigRequest) HasGroupdn() bool` +`func (o *KerberosConfigureLdapRequest) HasGroupdn() bool` HasGroupdn returns a boolean if a field has been set. @@ -384,27 +445,27 @@ HasGroupdn returns a boolean if a field has been set. ### GetGroupfilter -`func (o *KerberosWriteLDAPConfigRequest) GetGroupfilter() string` +`func (o *KerberosConfigureLdapRequest) GetGroupfilter() string` GetGroupfilter returns the Groupfilter field if non-nil, zero value otherwise. ### GetGroupfilterOk -`func (o *KerberosWriteLDAPConfigRequest) GetGroupfilterOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetGroupfilterOk() (*string, bool)` GetGroupfilterOk returns a tuple with the Groupfilter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupfilter -`func (o *KerberosWriteLDAPConfigRequest) SetGroupfilter(v string)` +`func (o *KerberosConfigureLdapRequest) SetGroupfilter(v string)` SetGroupfilter sets Groupfilter field to given value. ### HasGroupfilter -`func (o *KerberosWriteLDAPConfigRequest) HasGroupfilter() bool` +`func (o *KerberosConfigureLdapRequest) HasGroupfilter() bool` HasGroupfilter returns a boolean if a field has been set. @@ -413,56 +474,85 @@ HasGroupfilter returns a boolean if a field has been set. ### GetInsecureTls -`func (o *KerberosWriteLDAPConfigRequest) GetInsecureTls() bool` +`func (o *KerberosConfigureLdapRequest) GetInsecureTls() bool` GetInsecureTls returns the InsecureTls field if non-nil, zero value otherwise. ### GetInsecureTlsOk -`func (o *KerberosWriteLDAPConfigRequest) GetInsecureTlsOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetInsecureTlsOk() (*bool, bool)` GetInsecureTlsOk returns a tuple with the InsecureTls field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInsecureTls -`func (o *KerberosWriteLDAPConfigRequest) SetInsecureTls(v bool)` +`func (o *KerberosConfigureLdapRequest) SetInsecureTls(v bool)` SetInsecureTls sets InsecureTls field to given value. ### HasInsecureTls -`func (o *KerberosWriteLDAPConfigRequest) HasInsecureTls() bool` +`func (o *KerberosConfigureLdapRequest) HasInsecureTls() bool` HasInsecureTls returns a boolean if a field has been set. +### GetMaxPageSize + +`func (o *KerberosConfigureLdapRequest) GetMaxPageSize() int32` + +GetMaxPageSize returns the MaxPageSize field if non-nil, zero value otherwise. + +### GetMaxPageSizeOk + +`func (o *KerberosConfigureLdapRequest) GetMaxPageSizeOk() (*int32, bool)` + +GetMaxPageSizeOk returns a tuple with the MaxPageSize field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxPageSize + +`func (o *KerberosConfigureLdapRequest) SetMaxPageSize(v int32)` + +SetMaxPageSize sets MaxPageSize field to given value. + + +### HasMaxPageSize + +`func (o *KerberosConfigureLdapRequest) HasMaxPageSize() bool` + +HasMaxPageSize returns a boolean if a field has been set. + + + + ### GetRequestTimeout -`func (o *KerberosWriteLDAPConfigRequest) GetRequestTimeout() int32` +`func (o *KerberosConfigureLdapRequest) GetRequestTimeout() int32` GetRequestTimeout returns the RequestTimeout field if non-nil, zero value otherwise. ### GetRequestTimeoutOk -`func (o *KerberosWriteLDAPConfigRequest) GetRequestTimeoutOk() (*int32, bool)` +`func (o *KerberosConfigureLdapRequest) GetRequestTimeoutOk() (*int32, bool)` GetRequestTimeoutOk returns a tuple with the RequestTimeout field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequestTimeout -`func (o *KerberosWriteLDAPConfigRequest) SetRequestTimeout(v int32)` +`func (o *KerberosConfigureLdapRequest) SetRequestTimeout(v int32)` SetRequestTimeout sets RequestTimeout field to given value. ### HasRequestTimeout -`func (o *KerberosWriteLDAPConfigRequest) HasRequestTimeout() bool` +`func (o *KerberosConfigureLdapRequest) HasRequestTimeout() bool` HasRequestTimeout returns a boolean if a field has been set. @@ -471,27 +561,27 @@ HasRequestTimeout returns a boolean if a field has been set. ### GetStarttls -`func (o *KerberosWriteLDAPConfigRequest) GetStarttls() bool` +`func (o *KerberosConfigureLdapRequest) GetStarttls() bool` GetStarttls returns the Starttls field if non-nil, zero value otherwise. ### GetStarttlsOk -`func (o *KerberosWriteLDAPConfigRequest) GetStarttlsOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetStarttlsOk() (*bool, bool)` GetStarttlsOk returns a tuple with the Starttls field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStarttls -`func (o *KerberosWriteLDAPConfigRequest) SetStarttls(v bool)` +`func (o *KerberosConfigureLdapRequest) SetStarttls(v bool)` SetStarttls sets Starttls field to given value. ### HasStarttls -`func (o *KerberosWriteLDAPConfigRequest) HasStarttls() bool` +`func (o *KerberosConfigureLdapRequest) HasStarttls() bool` HasStarttls returns a boolean if a field has been set. @@ -500,27 +590,27 @@ HasStarttls returns a boolean if a field has been set. ### GetTlsMaxVersion -`func (o *KerberosWriteLDAPConfigRequest) GetTlsMaxVersion() string` +`func (o *KerberosConfigureLdapRequest) GetTlsMaxVersion() string` GetTlsMaxVersion returns the TlsMaxVersion field if non-nil, zero value otherwise. ### GetTlsMaxVersionOk -`func (o *KerberosWriteLDAPConfigRequest) GetTlsMaxVersionOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetTlsMaxVersionOk() (*string, bool)` GetTlsMaxVersionOk returns a tuple with the TlsMaxVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTlsMaxVersion -`func (o *KerberosWriteLDAPConfigRequest) SetTlsMaxVersion(v string)` +`func (o *KerberosConfigureLdapRequest) SetTlsMaxVersion(v string)` SetTlsMaxVersion sets TlsMaxVersion field to given value. ### HasTlsMaxVersion -`func (o *KerberosWriteLDAPConfigRequest) HasTlsMaxVersion() bool` +`func (o *KerberosConfigureLdapRequest) HasTlsMaxVersion() bool` HasTlsMaxVersion returns a boolean if a field has been set. @@ -529,27 +619,27 @@ HasTlsMaxVersion returns a boolean if a field has been set. ### GetTlsMinVersion -`func (o *KerberosWriteLDAPConfigRequest) GetTlsMinVersion() string` +`func (o *KerberosConfigureLdapRequest) GetTlsMinVersion() string` GetTlsMinVersion returns the TlsMinVersion field if non-nil, zero value otherwise. ### GetTlsMinVersionOk -`func (o *KerberosWriteLDAPConfigRequest) GetTlsMinVersionOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetTlsMinVersionOk() (*string, bool)` GetTlsMinVersionOk returns a tuple with the TlsMinVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTlsMinVersion -`func (o *KerberosWriteLDAPConfigRequest) SetTlsMinVersion(v string)` +`func (o *KerberosConfigureLdapRequest) SetTlsMinVersion(v string)` SetTlsMinVersion sets TlsMinVersion field to given value. ### HasTlsMinVersion -`func (o *KerberosWriteLDAPConfigRequest) HasTlsMinVersion() bool` +`func (o *KerberosConfigureLdapRequest) HasTlsMinVersion() bool` HasTlsMinVersion returns a boolean if a field has been set. @@ -558,27 +648,27 @@ HasTlsMinVersion returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *KerberosWriteLDAPConfigRequest) GetTokenBoundCidrs() []string` +`func (o *KerberosConfigureLdapRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *KerberosWriteLDAPConfigRequest) SetTokenBoundCidrs(v []string)` +`func (o *KerberosConfigureLdapRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *KerberosWriteLDAPConfigRequest) HasTokenBoundCidrs() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -587,27 +677,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *KerberosWriteLDAPConfigRequest) GetTokenExplicitMaxTtl() int32` +`func (o *KerberosConfigureLdapRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *KerberosWriteLDAPConfigRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *KerberosConfigureLdapRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *KerberosWriteLDAPConfigRequest) HasTokenExplicitMaxTtl() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -616,27 +706,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *KerberosWriteLDAPConfigRequest) GetTokenMaxTtl() int32` +`func (o *KerberosConfigureLdapRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *KerberosWriteLDAPConfigRequest) SetTokenMaxTtl(v int32)` +`func (o *KerberosConfigureLdapRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *KerberosWriteLDAPConfigRequest) HasTokenMaxTtl() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -645,27 +735,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *KerberosWriteLDAPConfigRequest) GetTokenNoDefaultPolicy() bool` +`func (o *KerberosConfigureLdapRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *KerberosWriteLDAPConfigRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *KerberosConfigureLdapRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *KerberosWriteLDAPConfigRequest) HasTokenNoDefaultPolicy() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -674,27 +764,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *KerberosWriteLDAPConfigRequest) GetTokenNumUses() int32` +`func (o *KerberosConfigureLdapRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *KerberosWriteLDAPConfigRequest) SetTokenNumUses(v int32)` +`func (o *KerberosConfigureLdapRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *KerberosWriteLDAPConfigRequest) HasTokenNumUses() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -703,27 +793,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *KerberosWriteLDAPConfigRequest) GetTokenPeriod() int32` +`func (o *KerberosConfigureLdapRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *KerberosWriteLDAPConfigRequest) SetTokenPeriod(v int32)` +`func (o *KerberosConfigureLdapRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *KerberosWriteLDAPConfigRequest) HasTokenPeriod() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -732,27 +822,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *KerberosWriteLDAPConfigRequest) GetTokenPolicies() []string` +`func (o *KerberosConfigureLdapRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *KerberosWriteLDAPConfigRequest) SetTokenPolicies(v []string)` +`func (o *KerberosConfigureLdapRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *KerberosWriteLDAPConfigRequest) HasTokenPolicies() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -761,27 +851,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *KerberosWriteLDAPConfigRequest) GetTokenTtl() int32` +`func (o *KerberosConfigureLdapRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *KerberosWriteLDAPConfigRequest) SetTokenTtl(v int32)` +`func (o *KerberosConfigureLdapRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *KerberosWriteLDAPConfigRequest) HasTokenTtl() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -790,27 +880,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *KerberosWriteLDAPConfigRequest) GetTokenType() string` +`func (o *KerberosConfigureLdapRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *KerberosWriteLDAPConfigRequest) GetTokenTypeOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *KerberosWriteLDAPConfigRequest) SetTokenType(v string)` +`func (o *KerberosConfigureLdapRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *KerberosWriteLDAPConfigRequest) HasTokenType() bool` +`func (o *KerberosConfigureLdapRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -819,27 +909,27 @@ HasTokenType returns a boolean if a field has been set. ### GetUpndomain -`func (o *KerberosWriteLDAPConfigRequest) GetUpndomain() string` +`func (o *KerberosConfigureLdapRequest) GetUpndomain() string` GetUpndomain returns the Upndomain field if non-nil, zero value otherwise. ### GetUpndomainOk -`func (o *KerberosWriteLDAPConfigRequest) GetUpndomainOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetUpndomainOk() (*string, bool)` GetUpndomainOk returns a tuple with the Upndomain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUpndomain -`func (o *KerberosWriteLDAPConfigRequest) SetUpndomain(v string)` +`func (o *KerberosConfigureLdapRequest) SetUpndomain(v string)` SetUpndomain sets Upndomain field to given value. ### HasUpndomain -`func (o *KerberosWriteLDAPConfigRequest) HasUpndomain() bool` +`func (o *KerberosConfigureLdapRequest) HasUpndomain() bool` HasUpndomain returns a boolean if a field has been set. @@ -848,27 +938,27 @@ HasUpndomain returns a boolean if a field has been set. ### GetUrl -`func (o *KerberosWriteLDAPConfigRequest) GetUrl() string` +`func (o *KerberosConfigureLdapRequest) GetUrl() string` GetUrl returns the Url field if non-nil, zero value otherwise. ### GetUrlOk -`func (o *KerberosWriteLDAPConfigRequest) GetUrlOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetUrlOk() (*string, bool)` GetUrlOk returns a tuple with the Url field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrl -`func (o *KerberosWriteLDAPConfigRequest) SetUrl(v string)` +`func (o *KerberosConfigureLdapRequest) SetUrl(v string)` SetUrl sets Url field to given value. ### HasUrl -`func (o *KerberosWriteLDAPConfigRequest) HasUrl() bool` +`func (o *KerberosConfigureLdapRequest) HasUrl() bool` HasUrl returns a boolean if a field has been set. @@ -877,27 +967,27 @@ HasUrl returns a boolean if a field has been set. ### GetUsePre111GroupCnBehavior -`func (o *KerberosWriteLDAPConfigRequest) GetUsePre111GroupCnBehavior() bool` +`func (o *KerberosConfigureLdapRequest) GetUsePre111GroupCnBehavior() bool` GetUsePre111GroupCnBehavior returns the UsePre111GroupCnBehavior field if non-nil, zero value otherwise. ### GetUsePre111GroupCnBehaviorOk -`func (o *KerberosWriteLDAPConfigRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` GetUsePre111GroupCnBehaviorOk returns a tuple with the UsePre111GroupCnBehavior field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePre111GroupCnBehavior -`func (o *KerberosWriteLDAPConfigRequest) SetUsePre111GroupCnBehavior(v bool)` +`func (o *KerberosConfigureLdapRequest) SetUsePre111GroupCnBehavior(v bool)` SetUsePre111GroupCnBehavior sets UsePre111GroupCnBehavior field to given value. ### HasUsePre111GroupCnBehavior -`func (o *KerberosWriteLDAPConfigRequest) HasUsePre111GroupCnBehavior() bool` +`func (o *KerberosConfigureLdapRequest) HasUsePre111GroupCnBehavior() bool` HasUsePre111GroupCnBehavior returns a boolean if a field has been set. @@ -906,27 +996,27 @@ HasUsePre111GroupCnBehavior returns a boolean if a field has been set. ### GetUseTokenGroups -`func (o *KerberosWriteLDAPConfigRequest) GetUseTokenGroups() bool` +`func (o *KerberosConfigureLdapRequest) GetUseTokenGroups() bool` GetUseTokenGroups returns the UseTokenGroups field if non-nil, zero value otherwise. ### GetUseTokenGroupsOk -`func (o *KerberosWriteLDAPConfigRequest) GetUseTokenGroupsOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetUseTokenGroupsOk() (*bool, bool)` GetUseTokenGroupsOk returns a tuple with the UseTokenGroups field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUseTokenGroups -`func (o *KerberosWriteLDAPConfigRequest) SetUseTokenGroups(v bool)` +`func (o *KerberosConfigureLdapRequest) SetUseTokenGroups(v bool)` SetUseTokenGroups sets UseTokenGroups field to given value. ### HasUseTokenGroups -`func (o *KerberosWriteLDAPConfigRequest) HasUseTokenGroups() bool` +`func (o *KerberosConfigureLdapRequest) HasUseTokenGroups() bool` HasUseTokenGroups returns a boolean if a field has been set. @@ -935,27 +1025,27 @@ HasUseTokenGroups returns a boolean if a field has been set. ### GetUserattr -`func (o *KerberosWriteLDAPConfigRequest) GetUserattr() string` +`func (o *KerberosConfigureLdapRequest) GetUserattr() string` GetUserattr returns the Userattr field if non-nil, zero value otherwise. ### GetUserattrOk -`func (o *KerberosWriteLDAPConfigRequest) GetUserattrOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetUserattrOk() (*string, bool)` GetUserattrOk returns a tuple with the Userattr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserattr -`func (o *KerberosWriteLDAPConfigRequest) SetUserattr(v string)` +`func (o *KerberosConfigureLdapRequest) SetUserattr(v string)` SetUserattr sets Userattr field to given value. ### HasUserattr -`func (o *KerberosWriteLDAPConfigRequest) HasUserattr() bool` +`func (o *KerberosConfigureLdapRequest) HasUserattr() bool` HasUserattr returns a boolean if a field has been set. @@ -964,27 +1054,27 @@ HasUserattr returns a boolean if a field has been set. ### GetUserdn -`func (o *KerberosWriteLDAPConfigRequest) GetUserdn() string` +`func (o *KerberosConfigureLdapRequest) GetUserdn() string` GetUserdn returns the Userdn field if non-nil, zero value otherwise. ### GetUserdnOk -`func (o *KerberosWriteLDAPConfigRequest) GetUserdnOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetUserdnOk() (*string, bool)` GetUserdnOk returns a tuple with the Userdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserdn -`func (o *KerberosWriteLDAPConfigRequest) SetUserdn(v string)` +`func (o *KerberosConfigureLdapRequest) SetUserdn(v string)` SetUserdn sets Userdn field to given value. ### HasUserdn -`func (o *KerberosWriteLDAPConfigRequest) HasUserdn() bool` +`func (o *KerberosConfigureLdapRequest) HasUserdn() bool` HasUserdn returns a boolean if a field has been set. @@ -993,27 +1083,27 @@ HasUserdn returns a boolean if a field has been set. ### GetUserfilter -`func (o *KerberosWriteLDAPConfigRequest) GetUserfilter() string` +`func (o *KerberosConfigureLdapRequest) GetUserfilter() string` GetUserfilter returns the Userfilter field if non-nil, zero value otherwise. ### GetUserfilterOk -`func (o *KerberosWriteLDAPConfigRequest) GetUserfilterOk() (*string, bool)` +`func (o *KerberosConfigureLdapRequest) GetUserfilterOk() (*string, bool)` GetUserfilterOk returns a tuple with the Userfilter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserfilter -`func (o *KerberosWriteLDAPConfigRequest) SetUserfilter(v string)` +`func (o *KerberosConfigureLdapRequest) SetUserfilter(v string)` SetUserfilter sets Userfilter field to given value. ### HasUserfilter -`func (o *KerberosWriteLDAPConfigRequest) HasUserfilter() bool` +`func (o *KerberosConfigureLdapRequest) HasUserfilter() bool` HasUserfilter returns a boolean if a field has been set. @@ -1022,27 +1112,27 @@ HasUserfilter returns a boolean if a field has been set. ### GetUsernameAsAlias -`func (o *KerberosWriteLDAPConfigRequest) GetUsernameAsAlias() bool` +`func (o *KerberosConfigureLdapRequest) GetUsernameAsAlias() bool` GetUsernameAsAlias returns the UsernameAsAlias field if non-nil, zero value otherwise. ### GetUsernameAsAliasOk -`func (o *KerberosWriteLDAPConfigRequest) GetUsernameAsAliasOk() (*bool, bool)` +`func (o *KerberosConfigureLdapRequest) GetUsernameAsAliasOk() (*bool, bool)` GetUsernameAsAliasOk returns a tuple with the UsernameAsAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameAsAlias -`func (o *KerberosWriteLDAPConfigRequest) SetUsernameAsAlias(v bool)` +`func (o *KerberosConfigureLdapRequest) SetUsernameAsAlias(v bool)` SetUsernameAsAlias sets UsernameAsAlias field to given value. ### HasUsernameAsAlias -`func (o *KerberosWriteLDAPConfigRequest) HasUsernameAsAlias() bool` +`func (o *KerberosConfigureLdapRequest) HasUsernameAsAlias() bool` HasUsernameAsAlias returns a boolean if a field has been set. diff --git a/docs/KerberosWriteConfigRequest.md b/docs/KerberosConfigureRequest.md similarity index 65% rename from docs/KerberosWriteConfigRequest.md rename to docs/KerberosConfigureRequest.md index bcbf88c6..d952b357 100644 --- a/docs/KerberosWriteConfigRequest.md +++ b/docs/KerberosConfigureRequest.md @@ -1,4 +1,4 @@ -# KerberosWriteConfigRequest +# KerberosConfigureRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewKerberosWriteConfigRequest +### NewKerberosConfigureRequest -`func NewKerberosWriteConfigRequest() *KerberosWriteConfigRequest` +`func NewKerberosConfigureRequest() *KerberosConfigureRequest` -NewKerberosWriteConfigRequest instantiates a new KerberosWriteConfigRequest object +NewKerberosConfigureRequest instantiates a new KerberosConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKerberosWriteConfigRequestWithDefaults +### NewKerberosConfigureRequestWithDefaults -`func NewKerberosWriteConfigRequestWithDefaults() *KerberosWriteConfigRequest` +`func NewKerberosConfigureRequestWithDefaults() *KerberosConfigureRequest` -NewKerberosWriteConfigRequestWithDefaults instantiates a new KerberosWriteConfigRequest object +NewKerberosConfigureRequestWithDefaults instantiates a new KerberosConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAddGroupAliases -`func (o *KerberosWriteConfigRequest) GetAddGroupAliases() bool` +`func (o *KerberosConfigureRequest) GetAddGroupAliases() bool` GetAddGroupAliases returns the AddGroupAliases field if non-nil, zero value otherwise. ### GetAddGroupAliasesOk -`func (o *KerberosWriteConfigRequest) GetAddGroupAliasesOk() (*bool, bool)` +`func (o *KerberosConfigureRequest) GetAddGroupAliasesOk() (*bool, bool)` GetAddGroupAliasesOk returns a tuple with the AddGroupAliases field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAddGroupAliases -`func (o *KerberosWriteConfigRequest) SetAddGroupAliases(v bool)` +`func (o *KerberosConfigureRequest) SetAddGroupAliases(v bool)` SetAddGroupAliases sets AddGroupAliases field to given value. ### HasAddGroupAliases -`func (o *KerberosWriteConfigRequest) HasAddGroupAliases() bool` +`func (o *KerberosConfigureRequest) HasAddGroupAliases() bool` HasAddGroupAliases returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasAddGroupAliases returns a boolean if a field has been set. ### GetKeytab -`func (o *KerberosWriteConfigRequest) GetKeytab() string` +`func (o *KerberosConfigureRequest) GetKeytab() string` GetKeytab returns the Keytab field if non-nil, zero value otherwise. ### GetKeytabOk -`func (o *KerberosWriteConfigRequest) GetKeytabOk() (*string, bool)` +`func (o *KerberosConfigureRequest) GetKeytabOk() (*string, bool)` GetKeytabOk returns a tuple with the Keytab field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeytab -`func (o *KerberosWriteConfigRequest) SetKeytab(v string)` +`func (o *KerberosConfigureRequest) SetKeytab(v string)` SetKeytab sets Keytab field to given value. ### HasKeytab -`func (o *KerberosWriteConfigRequest) HasKeytab() bool` +`func (o *KerberosConfigureRequest) HasKeytab() bool` HasKeytab returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasKeytab returns a boolean if a field has been set. ### GetRemoveInstanceName -`func (o *KerberosWriteConfigRequest) GetRemoveInstanceName() bool` +`func (o *KerberosConfigureRequest) GetRemoveInstanceName() bool` GetRemoveInstanceName returns the RemoveInstanceName field if non-nil, zero value otherwise. ### GetRemoveInstanceNameOk -`func (o *KerberosWriteConfigRequest) GetRemoveInstanceNameOk() (*bool, bool)` +`func (o *KerberosConfigureRequest) GetRemoveInstanceNameOk() (*bool, bool)` GetRemoveInstanceNameOk returns a tuple with the RemoveInstanceName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveInstanceName -`func (o *KerberosWriteConfigRequest) SetRemoveInstanceName(v bool)` +`func (o *KerberosConfigureRequest) SetRemoveInstanceName(v bool)` SetRemoveInstanceName sets RemoveInstanceName field to given value. ### HasRemoveInstanceName -`func (o *KerberosWriteConfigRequest) HasRemoveInstanceName() bool` +`func (o *KerberosConfigureRequest) HasRemoveInstanceName() bool` HasRemoveInstanceName returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasRemoveInstanceName returns a boolean if a field has been set. ### GetServiceAccount -`func (o *KerberosWriteConfigRequest) GetServiceAccount() string` +`func (o *KerberosConfigureRequest) GetServiceAccount() string` GetServiceAccount returns the ServiceAccount field if non-nil, zero value otherwise. ### GetServiceAccountOk -`func (o *KerberosWriteConfigRequest) GetServiceAccountOk() (*string, bool)` +`func (o *KerberosConfigureRequest) GetServiceAccountOk() (*string, bool)` GetServiceAccountOk returns a tuple with the ServiceAccount field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetServiceAccount -`func (o *KerberosWriteConfigRequest) SetServiceAccount(v string)` +`func (o *KerberosConfigureRequest) SetServiceAccount(v string)` SetServiceAccount sets ServiceAccount field to given value. ### HasServiceAccount -`func (o *KerberosWriteConfigRequest) HasServiceAccount() bool` +`func (o *KerberosConfigureRequest) HasServiceAccount() bool` HasServiceAccount returns a boolean if a field has been set. diff --git a/docs/KubernetesWriteAuthConfigRequest.md b/docs/KubernetesConfigureAuthRequest.md similarity index 67% rename from docs/KubernetesWriteAuthConfigRequest.md rename to docs/KubernetesConfigureAuthRequest.md index 0fff8fb4..cb2dcab3 100644 --- a/docs/KubernetesWriteAuthConfigRequest.md +++ b/docs/KubernetesConfigureAuthRequest.md @@ -1,4 +1,4 @@ -# KubernetesWriteAuthConfigRequest +# KubernetesConfigureAuthRequest ## Properties @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewKubernetesWriteAuthConfigRequest +### NewKubernetesConfigureAuthRequest -`func NewKubernetesWriteAuthConfigRequest() *KubernetesWriteAuthConfigRequest` +`func NewKubernetesConfigureAuthRequest() *KubernetesConfigureAuthRequest` -NewKubernetesWriteAuthConfigRequest instantiates a new KubernetesWriteAuthConfigRequest object +NewKubernetesConfigureAuthRequest instantiates a new KubernetesConfigureAuthRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKubernetesWriteAuthConfigRequestWithDefaults +### NewKubernetesConfigureAuthRequestWithDefaults -`func NewKubernetesWriteAuthConfigRequestWithDefaults() *KubernetesWriteAuthConfigRequest` +`func NewKubernetesConfigureAuthRequestWithDefaults() *KubernetesConfigureAuthRequest` -NewKubernetesWriteAuthConfigRequestWithDefaults instantiates a new KubernetesWriteAuthConfigRequest object +NewKubernetesConfigureAuthRequestWithDefaults instantiates a new KubernetesConfigureAuthRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisableIssValidation -`func (o *KubernetesWriteAuthConfigRequest) GetDisableIssValidation() bool` +`func (o *KubernetesConfigureAuthRequest) GetDisableIssValidation() bool` GetDisableIssValidation returns the DisableIssValidation field if non-nil, zero value otherwise. ### GetDisableIssValidationOk -`func (o *KubernetesWriteAuthConfigRequest) GetDisableIssValidationOk() (*bool, bool)` +`func (o *KubernetesConfigureAuthRequest) GetDisableIssValidationOk() (*bool, bool)` GetDisableIssValidationOk returns a tuple with the DisableIssValidation field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisableIssValidation -`func (o *KubernetesWriteAuthConfigRequest) SetDisableIssValidation(v bool)` +`func (o *KubernetesConfigureAuthRequest) SetDisableIssValidation(v bool)` SetDisableIssValidation sets DisableIssValidation field to given value. ### HasDisableIssValidation -`func (o *KubernetesWriteAuthConfigRequest) HasDisableIssValidation() bool` +`func (o *KubernetesConfigureAuthRequest) HasDisableIssValidation() bool` HasDisableIssValidation returns a boolean if a field has been set. @@ -67,27 +67,27 @@ HasDisableIssValidation returns a boolean if a field has been set. ### GetDisableLocalCaJwt -`func (o *KubernetesWriteAuthConfigRequest) GetDisableLocalCaJwt() bool` +`func (o *KubernetesConfigureAuthRequest) GetDisableLocalCaJwt() bool` GetDisableLocalCaJwt returns the DisableLocalCaJwt field if non-nil, zero value otherwise. ### GetDisableLocalCaJwtOk -`func (o *KubernetesWriteAuthConfigRequest) GetDisableLocalCaJwtOk() (*bool, bool)` +`func (o *KubernetesConfigureAuthRequest) GetDisableLocalCaJwtOk() (*bool, bool)` GetDisableLocalCaJwtOk returns a tuple with the DisableLocalCaJwt field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisableLocalCaJwt -`func (o *KubernetesWriteAuthConfigRequest) SetDisableLocalCaJwt(v bool)` +`func (o *KubernetesConfigureAuthRequest) SetDisableLocalCaJwt(v bool)` SetDisableLocalCaJwt sets DisableLocalCaJwt field to given value. ### HasDisableLocalCaJwt -`func (o *KubernetesWriteAuthConfigRequest) HasDisableLocalCaJwt() bool` +`func (o *KubernetesConfigureAuthRequest) HasDisableLocalCaJwt() bool` HasDisableLocalCaJwt returns a boolean if a field has been set. @@ -96,27 +96,27 @@ HasDisableLocalCaJwt returns a boolean if a field has been set. ### GetIssuer -`func (o *KubernetesWriteAuthConfigRequest) GetIssuer() string` +`func (o *KubernetesConfigureAuthRequest) GetIssuer() string` GetIssuer returns the Issuer field if non-nil, zero value otherwise. ### GetIssuerOk -`func (o *KubernetesWriteAuthConfigRequest) GetIssuerOk() (*string, bool)` +`func (o *KubernetesConfigureAuthRequest) GetIssuerOk() (*string, bool)` GetIssuerOk returns a tuple with the Issuer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuer -`func (o *KubernetesWriteAuthConfigRequest) SetIssuer(v string)` +`func (o *KubernetesConfigureAuthRequest) SetIssuer(v string)` SetIssuer sets Issuer field to given value. ### HasIssuer -`func (o *KubernetesWriteAuthConfigRequest) HasIssuer() bool` +`func (o *KubernetesConfigureAuthRequest) HasIssuer() bool` HasIssuer returns a boolean if a field has been set. @@ -125,27 +125,27 @@ HasIssuer returns a boolean if a field has been set. ### GetKubernetesCaCert -`func (o *KubernetesWriteAuthConfigRequest) GetKubernetesCaCert() string` +`func (o *KubernetesConfigureAuthRequest) GetKubernetesCaCert() string` GetKubernetesCaCert returns the KubernetesCaCert field if non-nil, zero value otherwise. ### GetKubernetesCaCertOk -`func (o *KubernetesWriteAuthConfigRequest) GetKubernetesCaCertOk() (*string, bool)` +`func (o *KubernetesConfigureAuthRequest) GetKubernetesCaCertOk() (*string, bool)` GetKubernetesCaCertOk returns a tuple with the KubernetesCaCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKubernetesCaCert -`func (o *KubernetesWriteAuthConfigRequest) SetKubernetesCaCert(v string)` +`func (o *KubernetesConfigureAuthRequest) SetKubernetesCaCert(v string)` SetKubernetesCaCert sets KubernetesCaCert field to given value. ### HasKubernetesCaCert -`func (o *KubernetesWriteAuthConfigRequest) HasKubernetesCaCert() bool` +`func (o *KubernetesConfigureAuthRequest) HasKubernetesCaCert() bool` HasKubernetesCaCert returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasKubernetesCaCert returns a boolean if a field has been set. ### GetKubernetesHost -`func (o *KubernetesWriteAuthConfigRequest) GetKubernetesHost() string` +`func (o *KubernetesConfigureAuthRequest) GetKubernetesHost() string` GetKubernetesHost returns the KubernetesHost field if non-nil, zero value otherwise. ### GetKubernetesHostOk -`func (o *KubernetesWriteAuthConfigRequest) GetKubernetesHostOk() (*string, bool)` +`func (o *KubernetesConfigureAuthRequest) GetKubernetesHostOk() (*string, bool)` GetKubernetesHostOk returns a tuple with the KubernetesHost field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKubernetesHost -`func (o *KubernetesWriteAuthConfigRequest) SetKubernetesHost(v string)` +`func (o *KubernetesConfigureAuthRequest) SetKubernetesHost(v string)` SetKubernetesHost sets KubernetesHost field to given value. ### HasKubernetesHost -`func (o *KubernetesWriteAuthConfigRequest) HasKubernetesHost() bool` +`func (o *KubernetesConfigureAuthRequest) HasKubernetesHost() bool` HasKubernetesHost returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasKubernetesHost returns a boolean if a field has been set. ### GetPemKeys -`func (o *KubernetesWriteAuthConfigRequest) GetPemKeys() []string` +`func (o *KubernetesConfigureAuthRequest) GetPemKeys() []string` GetPemKeys returns the PemKeys field if non-nil, zero value otherwise. ### GetPemKeysOk -`func (o *KubernetesWriteAuthConfigRequest) GetPemKeysOk() (*[]string, bool)` +`func (o *KubernetesConfigureAuthRequest) GetPemKeysOk() (*[]string, bool)` GetPemKeysOk returns a tuple with the PemKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPemKeys -`func (o *KubernetesWriteAuthConfigRequest) SetPemKeys(v []string)` +`func (o *KubernetesConfigureAuthRequest) SetPemKeys(v []string)` SetPemKeys sets PemKeys field to given value. ### HasPemKeys -`func (o *KubernetesWriteAuthConfigRequest) HasPemKeys() bool` +`func (o *KubernetesConfigureAuthRequest) HasPemKeys() bool` HasPemKeys returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasPemKeys returns a boolean if a field has been set. ### GetTokenReviewerJwt -`func (o *KubernetesWriteAuthConfigRequest) GetTokenReviewerJwt() string` +`func (o *KubernetesConfigureAuthRequest) GetTokenReviewerJwt() string` GetTokenReviewerJwt returns the TokenReviewerJwt field if non-nil, zero value otherwise. ### GetTokenReviewerJwtOk -`func (o *KubernetesWriteAuthConfigRequest) GetTokenReviewerJwtOk() (*string, bool)` +`func (o *KubernetesConfigureAuthRequest) GetTokenReviewerJwtOk() (*string, bool)` GetTokenReviewerJwtOk returns a tuple with the TokenReviewerJwt field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenReviewerJwt -`func (o *KubernetesWriteAuthConfigRequest) SetTokenReviewerJwt(v string)` +`func (o *KubernetesConfigureAuthRequest) SetTokenReviewerJwt(v string)` SetTokenReviewerJwt sets TokenReviewerJwt field to given value. ### HasTokenReviewerJwt -`func (o *KubernetesWriteAuthConfigRequest) HasTokenReviewerJwt() bool` +`func (o *KubernetesConfigureAuthRequest) HasTokenReviewerJwt() bool` HasTokenReviewerJwt returns a boolean if a field has been set. diff --git a/docs/KubernetesWriteConfigRequest.md b/docs/KubernetesConfigureRequest.md similarity index 68% rename from docs/KubernetesWriteConfigRequest.md rename to docs/KubernetesConfigureRequest.md index d90a0b02..8c77f5f0 100644 --- a/docs/KubernetesWriteConfigRequest.md +++ b/docs/KubernetesConfigureRequest.md @@ -1,4 +1,4 @@ -# KubernetesWriteConfigRequest +# KubernetesConfigureRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewKubernetesWriteConfigRequest +### NewKubernetesConfigureRequest -`func NewKubernetesWriteConfigRequest() *KubernetesWriteConfigRequest` +`func NewKubernetesConfigureRequest() *KubernetesConfigureRequest` -NewKubernetesWriteConfigRequest instantiates a new KubernetesWriteConfigRequest object +NewKubernetesConfigureRequest instantiates a new KubernetesConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKubernetesWriteConfigRequestWithDefaults +### NewKubernetesConfigureRequestWithDefaults -`func NewKubernetesWriteConfigRequestWithDefaults() *KubernetesWriteConfigRequest` +`func NewKubernetesConfigureRequestWithDefaults() *KubernetesConfigureRequest` -NewKubernetesWriteConfigRequestWithDefaults instantiates a new KubernetesWriteConfigRequest object +NewKubernetesConfigureRequestWithDefaults instantiates a new KubernetesConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisableLocalCaJwt -`func (o *KubernetesWriteConfigRequest) GetDisableLocalCaJwt() bool` +`func (o *KubernetesConfigureRequest) GetDisableLocalCaJwt() bool` GetDisableLocalCaJwt returns the DisableLocalCaJwt field if non-nil, zero value otherwise. ### GetDisableLocalCaJwtOk -`func (o *KubernetesWriteConfigRequest) GetDisableLocalCaJwtOk() (*bool, bool)` +`func (o *KubernetesConfigureRequest) GetDisableLocalCaJwtOk() (*bool, bool)` GetDisableLocalCaJwtOk returns a tuple with the DisableLocalCaJwt field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisableLocalCaJwt -`func (o *KubernetesWriteConfigRequest) SetDisableLocalCaJwt(v bool)` +`func (o *KubernetesConfigureRequest) SetDisableLocalCaJwt(v bool)` SetDisableLocalCaJwt sets DisableLocalCaJwt field to given value. ### HasDisableLocalCaJwt -`func (o *KubernetesWriteConfigRequest) HasDisableLocalCaJwt() bool` +`func (o *KubernetesConfigureRequest) HasDisableLocalCaJwt() bool` HasDisableLocalCaJwt returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasDisableLocalCaJwt returns a boolean if a field has been set. ### GetKubernetesCaCert -`func (o *KubernetesWriteConfigRequest) GetKubernetesCaCert() string` +`func (o *KubernetesConfigureRequest) GetKubernetesCaCert() string` GetKubernetesCaCert returns the KubernetesCaCert field if non-nil, zero value otherwise. ### GetKubernetesCaCertOk -`func (o *KubernetesWriteConfigRequest) GetKubernetesCaCertOk() (*string, bool)` +`func (o *KubernetesConfigureRequest) GetKubernetesCaCertOk() (*string, bool)` GetKubernetesCaCertOk returns a tuple with the KubernetesCaCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKubernetesCaCert -`func (o *KubernetesWriteConfigRequest) SetKubernetesCaCert(v string)` +`func (o *KubernetesConfigureRequest) SetKubernetesCaCert(v string)` SetKubernetesCaCert sets KubernetesCaCert field to given value. ### HasKubernetesCaCert -`func (o *KubernetesWriteConfigRequest) HasKubernetesCaCert() bool` +`func (o *KubernetesConfigureRequest) HasKubernetesCaCert() bool` HasKubernetesCaCert returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasKubernetesCaCert returns a boolean if a field has been set. ### GetKubernetesHost -`func (o *KubernetesWriteConfigRequest) GetKubernetesHost() string` +`func (o *KubernetesConfigureRequest) GetKubernetesHost() string` GetKubernetesHost returns the KubernetesHost field if non-nil, zero value otherwise. ### GetKubernetesHostOk -`func (o *KubernetesWriteConfigRequest) GetKubernetesHostOk() (*string, bool)` +`func (o *KubernetesConfigureRequest) GetKubernetesHostOk() (*string, bool)` GetKubernetesHostOk returns a tuple with the KubernetesHost field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKubernetesHost -`func (o *KubernetesWriteConfigRequest) SetKubernetesHost(v string)` +`func (o *KubernetesConfigureRequest) SetKubernetesHost(v string)` SetKubernetesHost sets KubernetesHost field to given value. ### HasKubernetesHost -`func (o *KubernetesWriteConfigRequest) HasKubernetesHost() bool` +`func (o *KubernetesConfigureRequest) HasKubernetesHost() bool` HasKubernetesHost returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasKubernetesHost returns a boolean if a field has been set. ### GetServiceAccountJwt -`func (o *KubernetesWriteConfigRequest) GetServiceAccountJwt() string` +`func (o *KubernetesConfigureRequest) GetServiceAccountJwt() string` GetServiceAccountJwt returns the ServiceAccountJwt field if non-nil, zero value otherwise. ### GetServiceAccountJwtOk -`func (o *KubernetesWriteConfigRequest) GetServiceAccountJwtOk() (*string, bool)` +`func (o *KubernetesConfigureRequest) GetServiceAccountJwtOk() (*string, bool)` GetServiceAccountJwtOk returns a tuple with the ServiceAccountJwt field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetServiceAccountJwt -`func (o *KubernetesWriteConfigRequest) SetServiceAccountJwt(v string)` +`func (o *KubernetesConfigureRequest) SetServiceAccountJwt(v string)` SetServiceAccountJwt sets ServiceAccountJwt field to given value. ### HasServiceAccountJwt -`func (o *KubernetesWriteConfigRequest) HasServiceAccountJwt() bool` +`func (o *KubernetesConfigureRequest) HasServiceAccountJwt() bool` HasServiceAccountJwt returns a boolean if a field has been set. diff --git a/docs/KubernetesWriteCredentialsRequest.md b/docs/KubernetesGenerateCredentialsRequest.md similarity index 51% rename from docs/KubernetesWriteCredentialsRequest.md rename to docs/KubernetesGenerateCredentialsRequest.md index 72deebef..f0daf2e0 100644 --- a/docs/KubernetesWriteCredentialsRequest.md +++ b/docs/KubernetesGenerateCredentialsRequest.md @@ -1,10 +1,11 @@ -# KubernetesWriteCredentialsRequest +# KubernetesGenerateCredentialsRequest ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**Audiences** | Pointer to **[]string** | The intended audiences of the generated credentials | [optional] **ClusterRoleBinding** | Pointer to **bool** | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. Requires the Vault role to have kubernetes_role_type set to ClusterRole. | [optional] **KubernetesNamespace** | **string** | The name of the Kubernetes namespace in which to generate the credentials | **Ttl** | Pointer to **int32** | The TTL of the generated credentials | [optional] @@ -14,47 +15,76 @@ Name | Type | Description | Notes ## Methods -### NewKubernetesWriteCredentialsRequest +### NewKubernetesGenerateCredentialsRequest -`func NewKubernetesWriteCredentialsRequest(kubernetesNamespace string, ) *KubernetesWriteCredentialsRequest` +`func NewKubernetesGenerateCredentialsRequest(kubernetesNamespace string, ) *KubernetesGenerateCredentialsRequest` -NewKubernetesWriteCredentialsRequest instantiates a new KubernetesWriteCredentialsRequest object +NewKubernetesGenerateCredentialsRequest instantiates a new KubernetesGenerateCredentialsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKubernetesWriteCredentialsRequestWithDefaults +### NewKubernetesGenerateCredentialsRequestWithDefaults -`func NewKubernetesWriteCredentialsRequestWithDefaults() *KubernetesWriteCredentialsRequest` +`func NewKubernetesGenerateCredentialsRequestWithDefaults() *KubernetesGenerateCredentialsRequest` -NewKubernetesWriteCredentialsRequestWithDefaults instantiates a new KubernetesWriteCredentialsRequest object +NewKubernetesGenerateCredentialsRequestWithDefaults instantiates a new KubernetesGenerateCredentialsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set +### GetAudiences + +`func (o *KubernetesGenerateCredentialsRequest) GetAudiences() []string` + +GetAudiences returns the Audiences field if non-nil, zero value otherwise. + +### GetAudiencesOk + +`func (o *KubernetesGenerateCredentialsRequest) GetAudiencesOk() (*[]string, bool)` + +GetAudiencesOk returns a tuple with the Audiences field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAudiences + +`func (o *KubernetesGenerateCredentialsRequest) SetAudiences(v []string)` + +SetAudiences sets Audiences field to given value. + + +### HasAudiences + +`func (o *KubernetesGenerateCredentialsRequest) HasAudiences() bool` + +HasAudiences returns a boolean if a field has been set. + + + + ### GetClusterRoleBinding -`func (o *KubernetesWriteCredentialsRequest) GetClusterRoleBinding() bool` +`func (o *KubernetesGenerateCredentialsRequest) GetClusterRoleBinding() bool` GetClusterRoleBinding returns the ClusterRoleBinding field if non-nil, zero value otherwise. ### GetClusterRoleBindingOk -`func (o *KubernetesWriteCredentialsRequest) GetClusterRoleBindingOk() (*bool, bool)` +`func (o *KubernetesGenerateCredentialsRequest) GetClusterRoleBindingOk() (*bool, bool)` GetClusterRoleBindingOk returns a tuple with the ClusterRoleBinding field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClusterRoleBinding -`func (o *KubernetesWriteCredentialsRequest) SetClusterRoleBinding(v bool)` +`func (o *KubernetesGenerateCredentialsRequest) SetClusterRoleBinding(v bool)` SetClusterRoleBinding sets ClusterRoleBinding field to given value. ### HasClusterRoleBinding -`func (o *KubernetesWriteCredentialsRequest) HasClusterRoleBinding() bool` +`func (o *KubernetesGenerateCredentialsRequest) HasClusterRoleBinding() bool` HasClusterRoleBinding returns a boolean if a field has been set. @@ -63,20 +93,20 @@ HasClusterRoleBinding returns a boolean if a field has been set. ### GetKubernetesNamespace -`func (o *KubernetesWriteCredentialsRequest) GetKubernetesNamespace() string` +`func (o *KubernetesGenerateCredentialsRequest) GetKubernetesNamespace() string` GetKubernetesNamespace returns the KubernetesNamespace field if non-nil, zero value otherwise. ### GetKubernetesNamespaceOk -`func (o *KubernetesWriteCredentialsRequest) GetKubernetesNamespaceOk() (*string, bool)` +`func (o *KubernetesGenerateCredentialsRequest) GetKubernetesNamespaceOk() (*string, bool)` GetKubernetesNamespaceOk returns a tuple with the KubernetesNamespace field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKubernetesNamespace -`func (o *KubernetesWriteCredentialsRequest) SetKubernetesNamespace(v string)` +`func (o *KubernetesGenerateCredentialsRequest) SetKubernetesNamespace(v string)` SetKubernetesNamespace sets KubernetesNamespace field to given value. @@ -86,27 +116,27 @@ SetKubernetesNamespace sets KubernetesNamespace field to given value. ### GetTtl -`func (o *KubernetesWriteCredentialsRequest) GetTtl() int32` +`func (o *KubernetesGenerateCredentialsRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *KubernetesWriteCredentialsRequest) GetTtlOk() (*int32, bool)` +`func (o *KubernetesGenerateCredentialsRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *KubernetesWriteCredentialsRequest) SetTtl(v int32)` +`func (o *KubernetesGenerateCredentialsRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *KubernetesWriteCredentialsRequest) HasTtl() bool` +`func (o *KubernetesGenerateCredentialsRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/KubernetesWriteRoleRequest.md b/docs/KubernetesWriteRoleRequest.md index 67c37b92..f5a57ad0 100644 --- a/docs/KubernetesWriteRoleRequest.md +++ b/docs/KubernetesWriteRoleRequest.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **KubernetesRoleType** | Pointer to **string** | Specifies whether the Kubernetes role is a Role or ClusterRole. | [optional] [default to "Role"] **NameTemplate** | Pointer to **string** | The name template to use when generating service accounts, roles and role bindings. If unset, a default template is used. | [optional] **ServiceAccountName** | Pointer to **string** | The pre-existing service account to generate tokens for. Mutually exclusive with all role parameters. If set, only a Kubernetes service account token will be created. | [optional] +**TokenDefaultAudiences** | Pointer to **[]string** | The default audiences for generated Kubernetes service account tokens. If not set or set to \"\", will use k8s cluster default. | [optional] **TokenDefaultTtl** | Pointer to **int32** | The default ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default. | [optional] **TokenMaxTtl** | Pointer to **int32** | The maximum ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default. | [optional] @@ -301,6 +302,35 @@ HasServiceAccountName returns a boolean if a field has been set. +### GetTokenDefaultAudiences + +`func (o *KubernetesWriteRoleRequest) GetTokenDefaultAudiences() []string` + +GetTokenDefaultAudiences returns the TokenDefaultAudiences field if non-nil, zero value otherwise. + +### GetTokenDefaultAudiencesOk + +`func (o *KubernetesWriteRoleRequest) GetTokenDefaultAudiencesOk() (*[]string, bool)` + +GetTokenDefaultAudiencesOk returns a tuple with the TokenDefaultAudiences field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTokenDefaultAudiences + +`func (o *KubernetesWriteRoleRequest) SetTokenDefaultAudiences(v []string)` + +SetTokenDefaultAudiences sets TokenDefaultAudiences field to given value. + + +### HasTokenDefaultAudiences + +`func (o *KubernetesWriteRoleRequest) HasTokenDefaultAudiences() bool` + +HasTokenDefaultAudiences returns a boolean if a field has been set. + + + + ### GetTokenDefaultTtl `func (o *KubernetesWriteRoleRequest) GetTokenDefaultTtl() int32` diff --git a/docs/KVv2WriteConfigRequest.md b/docs/KvV2ConfigureRequest.md similarity index 69% rename from docs/KVv2WriteConfigRequest.md rename to docs/KvV2ConfigureRequest.md index cc6ac880..9afb3202 100644 --- a/docs/KVv2WriteConfigRequest.md +++ b/docs/KvV2ConfigureRequest.md @@ -1,4 +1,4 @@ -# KVv2WriteConfigRequest +# KvV2ConfigureRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewKVv2WriteConfigRequest +### NewKvV2ConfigureRequest -`func NewKVv2WriteConfigRequest() *KVv2WriteConfigRequest` +`func NewKvV2ConfigureRequest() *KvV2ConfigureRequest` -NewKVv2WriteConfigRequest instantiates a new KVv2WriteConfigRequest object +NewKvV2ConfigureRequest instantiates a new KvV2ConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewKVv2WriteConfigRequestWithDefaults +### NewKvV2ConfigureRequestWithDefaults -`func NewKVv2WriteConfigRequestWithDefaults() *KVv2WriteConfigRequest` +`func NewKvV2ConfigureRequestWithDefaults() *KvV2ConfigureRequest` -NewKVv2WriteConfigRequestWithDefaults instantiates a new KVv2WriteConfigRequest object +NewKvV2ConfigureRequestWithDefaults instantiates a new KvV2ConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCasRequired -`func (o *KVv2WriteConfigRequest) GetCasRequired() bool` +`func (o *KvV2ConfigureRequest) GetCasRequired() bool` GetCasRequired returns the CasRequired field if non-nil, zero value otherwise. ### GetCasRequiredOk -`func (o *KVv2WriteConfigRequest) GetCasRequiredOk() (*bool, bool)` +`func (o *KvV2ConfigureRequest) GetCasRequiredOk() (*bool, bool)` GetCasRequiredOk returns a tuple with the CasRequired field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCasRequired -`func (o *KVv2WriteConfigRequest) SetCasRequired(v bool)` +`func (o *KvV2ConfigureRequest) SetCasRequired(v bool)` SetCasRequired sets CasRequired field to given value. ### HasCasRequired -`func (o *KVv2WriteConfigRequest) HasCasRequired() bool` +`func (o *KvV2ConfigureRequest) HasCasRequired() bool` HasCasRequired returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasCasRequired returns a boolean if a field has been set. ### GetDeleteVersionAfter -`func (o *KVv2WriteConfigRequest) GetDeleteVersionAfter() int32` +`func (o *KvV2ConfigureRequest) GetDeleteVersionAfter() int32` GetDeleteVersionAfter returns the DeleteVersionAfter field if non-nil, zero value otherwise. ### GetDeleteVersionAfterOk -`func (o *KVv2WriteConfigRequest) GetDeleteVersionAfterOk() (*int32, bool)` +`func (o *KvV2ConfigureRequest) GetDeleteVersionAfterOk() (*int32, bool)` GetDeleteVersionAfterOk returns a tuple with the DeleteVersionAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDeleteVersionAfter -`func (o *KVv2WriteConfigRequest) SetDeleteVersionAfter(v int32)` +`func (o *KvV2ConfigureRequest) SetDeleteVersionAfter(v int32)` SetDeleteVersionAfter sets DeleteVersionAfter field to given value. ### HasDeleteVersionAfter -`func (o *KVv2WriteConfigRequest) HasDeleteVersionAfter() bool` +`func (o *KvV2ConfigureRequest) HasDeleteVersionAfter() bool` HasDeleteVersionAfter returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasDeleteVersionAfter returns a boolean if a field has been set. ### GetMaxVersions -`func (o *KVv2WriteConfigRequest) GetMaxVersions() int32` +`func (o *KvV2ConfigureRequest) GetMaxVersions() int32` GetMaxVersions returns the MaxVersions field if non-nil, zero value otherwise. ### GetMaxVersionsOk -`func (o *KVv2WriteConfigRequest) GetMaxVersionsOk() (*int32, bool)` +`func (o *KvV2ConfigureRequest) GetMaxVersionsOk() (*int32, bool)` GetMaxVersionsOk returns a tuple with the MaxVersions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxVersions -`func (o *KVv2WriteConfigRequest) SetMaxVersions(v int32)` +`func (o *KvV2ConfigureRequest) SetMaxVersions(v int32)` SetMaxVersions sets MaxVersions field to given value. ### HasMaxVersions -`func (o *KVv2WriteConfigRequest) HasMaxVersions() bool` +`func (o *KvV2ConfigureRequest) HasMaxVersions() bool` HasMaxVersions returns a boolean if a field has been set. diff --git a/docs/KvV2PatchResponse.md b/docs/KvV2PatchResponse.md new file mode 100644 index 00000000..44d36d0c --- /dev/null +++ b/docs/KvV2PatchResponse.md @@ -0,0 +1,189 @@ +# KvV2PatchResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CreatedTime** | Pointer to **time.Time** | | [optional] +**CustomMetadata** | Pointer to **map[string]interface{}** | | [optional] +**DeletionTime** | Pointer to **string** | | [optional] +**Destroyed** | Pointer to **bool** | | [optional] +**Version** | Pointer to **int64** | | [optional] + + + +## Methods + + +### NewKvV2PatchResponse + +`func NewKvV2PatchResponse() *KvV2PatchResponse` + +NewKvV2PatchResponse instantiates a new KvV2PatchResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewKvV2PatchResponseWithDefaults + +`func NewKvV2PatchResponseWithDefaults() *KvV2PatchResponse` + +NewKvV2PatchResponseWithDefaults instantiates a new KvV2PatchResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCreatedTime + +`func (o *KvV2PatchResponse) GetCreatedTime() time.Time` + +GetCreatedTime returns the CreatedTime field if non-nil, zero value otherwise. + +### GetCreatedTimeOk + +`func (o *KvV2PatchResponse) GetCreatedTimeOk() (*time.Time, bool)` + +GetCreatedTimeOk returns a tuple with the CreatedTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreatedTime + +`func (o *KvV2PatchResponse) SetCreatedTime(v time.Time)` + +SetCreatedTime sets CreatedTime field to given value. + + +### HasCreatedTime + +`func (o *KvV2PatchResponse) HasCreatedTime() bool` + +HasCreatedTime returns a boolean if a field has been set. + + + + +### GetCustomMetadata + +`func (o *KvV2PatchResponse) GetCustomMetadata() map[string]interface{}` + +GetCustomMetadata returns the CustomMetadata field if non-nil, zero value otherwise. + +### GetCustomMetadataOk + +`func (o *KvV2PatchResponse) GetCustomMetadataOk() (*map[string]interface{}, bool)` + +GetCustomMetadataOk returns a tuple with the CustomMetadata field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCustomMetadata + +`func (o *KvV2PatchResponse) SetCustomMetadata(v map[string]interface{})` + +SetCustomMetadata sets CustomMetadata field to given value. + + +### HasCustomMetadata + +`func (o *KvV2PatchResponse) HasCustomMetadata() bool` + +HasCustomMetadata returns a boolean if a field has been set. + + + + +### GetDeletionTime + +`func (o *KvV2PatchResponse) GetDeletionTime() string` + +GetDeletionTime returns the DeletionTime field if non-nil, zero value otherwise. + +### GetDeletionTimeOk + +`func (o *KvV2PatchResponse) GetDeletionTimeOk() (*string, bool)` + +GetDeletionTimeOk returns a tuple with the DeletionTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeletionTime + +`func (o *KvV2PatchResponse) SetDeletionTime(v string)` + +SetDeletionTime sets DeletionTime field to given value. + + +### HasDeletionTime + +`func (o *KvV2PatchResponse) HasDeletionTime() bool` + +HasDeletionTime returns a boolean if a field has been set. + + + + +### GetDestroyed + +`func (o *KvV2PatchResponse) GetDestroyed() bool` + +GetDestroyed returns the Destroyed field if non-nil, zero value otherwise. + +### GetDestroyedOk + +`func (o *KvV2PatchResponse) GetDestroyedOk() (*bool, bool)` + +GetDestroyedOk returns a tuple with the Destroyed field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDestroyed + +`func (o *KvV2PatchResponse) SetDestroyed(v bool)` + +SetDestroyed sets Destroyed field to given value. + + +### HasDestroyed + +`func (o *KvV2PatchResponse) HasDestroyed() bool` + +HasDestroyed returns a boolean if a field has been set. + + + + +### GetVersion + +`func (o *KvV2PatchResponse) GetVersion() int64` + +GetVersion returns the Version field if non-nil, zero value otherwise. + +### GetVersionOk + +`func (o *KvV2PatchResponse) GetVersionOk() (*int64, bool)` + +GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVersion + +`func (o *KvV2PatchResponse) SetVersion(v int64)` + +SetVersion sets Version field to given value. + + +### HasVersion + +`func (o *KvV2PatchResponse) HasVersion() bool` + +HasVersion returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KvV2ReadConfigurationResponse.md b/docs/KvV2ReadConfigurationResponse.md new file mode 100644 index 00000000..aa624c31 --- /dev/null +++ b/docs/KvV2ReadConfigurationResponse.md @@ -0,0 +1,129 @@ +# KvV2ReadConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CasRequired** | Pointer to **bool** | If true, the backend will require the cas parameter to be set for each write | [optional] +**DeleteVersionAfter** | Pointer to **int32** | The length of time before a version is deleted. | [optional] +**MaxVersions** | Pointer to **int32** | The number of versions to keep for each key. | [optional] + + + +## Methods + + +### NewKvV2ReadConfigurationResponse + +`func NewKvV2ReadConfigurationResponse() *KvV2ReadConfigurationResponse` + +NewKvV2ReadConfigurationResponse instantiates a new KvV2ReadConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewKvV2ReadConfigurationResponseWithDefaults + +`func NewKvV2ReadConfigurationResponseWithDefaults() *KvV2ReadConfigurationResponse` + +NewKvV2ReadConfigurationResponseWithDefaults instantiates a new KvV2ReadConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCasRequired + +`func (o *KvV2ReadConfigurationResponse) GetCasRequired() bool` + +GetCasRequired returns the CasRequired field if non-nil, zero value otherwise. + +### GetCasRequiredOk + +`func (o *KvV2ReadConfigurationResponse) GetCasRequiredOk() (*bool, bool)` + +GetCasRequiredOk returns a tuple with the CasRequired field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCasRequired + +`func (o *KvV2ReadConfigurationResponse) SetCasRequired(v bool)` + +SetCasRequired sets CasRequired field to given value. + + +### HasCasRequired + +`func (o *KvV2ReadConfigurationResponse) HasCasRequired() bool` + +HasCasRequired returns a boolean if a field has been set. + + + + +### GetDeleteVersionAfter + +`func (o *KvV2ReadConfigurationResponse) GetDeleteVersionAfter() int32` + +GetDeleteVersionAfter returns the DeleteVersionAfter field if non-nil, zero value otherwise. + +### GetDeleteVersionAfterOk + +`func (o *KvV2ReadConfigurationResponse) GetDeleteVersionAfterOk() (*int32, bool)` + +GetDeleteVersionAfterOk returns a tuple with the DeleteVersionAfter field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeleteVersionAfter + +`func (o *KvV2ReadConfigurationResponse) SetDeleteVersionAfter(v int32)` + +SetDeleteVersionAfter sets DeleteVersionAfter field to given value. + + +### HasDeleteVersionAfter + +`func (o *KvV2ReadConfigurationResponse) HasDeleteVersionAfter() bool` + +HasDeleteVersionAfter returns a boolean if a field has been set. + + + + +### GetMaxVersions + +`func (o *KvV2ReadConfigurationResponse) GetMaxVersions() int32` + +GetMaxVersions returns the MaxVersions field if non-nil, zero value otherwise. + +### GetMaxVersionsOk + +`func (o *KvV2ReadConfigurationResponse) GetMaxVersionsOk() (*int32, bool)` + +GetMaxVersionsOk returns a tuple with the MaxVersions field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxVersions + +`func (o *KvV2ReadConfigurationResponse) SetMaxVersions(v int32)` + +SetMaxVersions sets MaxVersions field to given value. + + +### HasMaxVersions + +`func (o *KvV2ReadConfigurationResponse) HasMaxVersions() bool` + +HasMaxVersions returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KvV2ReadMetadataResponse.md b/docs/KvV2ReadMetadataResponse.md new file mode 100644 index 00000000..5a1afa19 --- /dev/null +++ b/docs/KvV2ReadMetadataResponse.md @@ -0,0 +1,309 @@ +# KvV2ReadMetadataResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CasRequired** | Pointer to **bool** | | [optional] +**CreatedTime** | Pointer to **time.Time** | | [optional] +**CurrentVersion** | Pointer to **int64** | | [optional] +**CustomMetadata** | Pointer to **map[string]interface{}** | User-provided key-value pairs that are used to describe arbitrary and version-agnostic information about a secret. | [optional] +**DeleteVersionAfter** | Pointer to **int32** | The length of time before a version is deleted. | [optional] +**MaxVersions** | Pointer to **int64** | The number of versions to keep | [optional] +**OldestVersion** | Pointer to **int64** | | [optional] +**UpdatedTime** | Pointer to **time.Time** | | [optional] +**Versions** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewKvV2ReadMetadataResponse + +`func NewKvV2ReadMetadataResponse() *KvV2ReadMetadataResponse` + +NewKvV2ReadMetadataResponse instantiates a new KvV2ReadMetadataResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewKvV2ReadMetadataResponseWithDefaults + +`func NewKvV2ReadMetadataResponseWithDefaults() *KvV2ReadMetadataResponse` + +NewKvV2ReadMetadataResponseWithDefaults instantiates a new KvV2ReadMetadataResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCasRequired + +`func (o *KvV2ReadMetadataResponse) GetCasRequired() bool` + +GetCasRequired returns the CasRequired field if non-nil, zero value otherwise. + +### GetCasRequiredOk + +`func (o *KvV2ReadMetadataResponse) GetCasRequiredOk() (*bool, bool)` + +GetCasRequiredOk returns a tuple with the CasRequired field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCasRequired + +`func (o *KvV2ReadMetadataResponse) SetCasRequired(v bool)` + +SetCasRequired sets CasRequired field to given value. + + +### HasCasRequired + +`func (o *KvV2ReadMetadataResponse) HasCasRequired() bool` + +HasCasRequired returns a boolean if a field has been set. + + + + +### GetCreatedTime + +`func (o *KvV2ReadMetadataResponse) GetCreatedTime() time.Time` + +GetCreatedTime returns the CreatedTime field if non-nil, zero value otherwise. + +### GetCreatedTimeOk + +`func (o *KvV2ReadMetadataResponse) GetCreatedTimeOk() (*time.Time, bool)` + +GetCreatedTimeOk returns a tuple with the CreatedTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreatedTime + +`func (o *KvV2ReadMetadataResponse) SetCreatedTime(v time.Time)` + +SetCreatedTime sets CreatedTime field to given value. + + +### HasCreatedTime + +`func (o *KvV2ReadMetadataResponse) HasCreatedTime() bool` + +HasCreatedTime returns a boolean if a field has been set. + + + + +### GetCurrentVersion + +`func (o *KvV2ReadMetadataResponse) GetCurrentVersion() int64` + +GetCurrentVersion returns the CurrentVersion field if non-nil, zero value otherwise. + +### GetCurrentVersionOk + +`func (o *KvV2ReadMetadataResponse) GetCurrentVersionOk() (*int64, bool)` + +GetCurrentVersionOk returns a tuple with the CurrentVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCurrentVersion + +`func (o *KvV2ReadMetadataResponse) SetCurrentVersion(v int64)` + +SetCurrentVersion sets CurrentVersion field to given value. + + +### HasCurrentVersion + +`func (o *KvV2ReadMetadataResponse) HasCurrentVersion() bool` + +HasCurrentVersion returns a boolean if a field has been set. + + + + +### GetCustomMetadata + +`func (o *KvV2ReadMetadataResponse) GetCustomMetadata() map[string]interface{}` + +GetCustomMetadata returns the CustomMetadata field if non-nil, zero value otherwise. + +### GetCustomMetadataOk + +`func (o *KvV2ReadMetadataResponse) GetCustomMetadataOk() (*map[string]interface{}, bool)` + +GetCustomMetadataOk returns a tuple with the CustomMetadata field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCustomMetadata + +`func (o *KvV2ReadMetadataResponse) SetCustomMetadata(v map[string]interface{})` + +SetCustomMetadata sets CustomMetadata field to given value. + + +### HasCustomMetadata + +`func (o *KvV2ReadMetadataResponse) HasCustomMetadata() bool` + +HasCustomMetadata returns a boolean if a field has been set. + + + + +### GetDeleteVersionAfter + +`func (o *KvV2ReadMetadataResponse) GetDeleteVersionAfter() int32` + +GetDeleteVersionAfter returns the DeleteVersionAfter field if non-nil, zero value otherwise. + +### GetDeleteVersionAfterOk + +`func (o *KvV2ReadMetadataResponse) GetDeleteVersionAfterOk() (*int32, bool)` + +GetDeleteVersionAfterOk returns a tuple with the DeleteVersionAfter field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeleteVersionAfter + +`func (o *KvV2ReadMetadataResponse) SetDeleteVersionAfter(v int32)` + +SetDeleteVersionAfter sets DeleteVersionAfter field to given value. + + +### HasDeleteVersionAfter + +`func (o *KvV2ReadMetadataResponse) HasDeleteVersionAfter() bool` + +HasDeleteVersionAfter returns a boolean if a field has been set. + + + + +### GetMaxVersions + +`func (o *KvV2ReadMetadataResponse) GetMaxVersions() int64` + +GetMaxVersions returns the MaxVersions field if non-nil, zero value otherwise. + +### GetMaxVersionsOk + +`func (o *KvV2ReadMetadataResponse) GetMaxVersionsOk() (*int64, bool)` + +GetMaxVersionsOk returns a tuple with the MaxVersions field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxVersions + +`func (o *KvV2ReadMetadataResponse) SetMaxVersions(v int64)` + +SetMaxVersions sets MaxVersions field to given value. + + +### HasMaxVersions + +`func (o *KvV2ReadMetadataResponse) HasMaxVersions() bool` + +HasMaxVersions returns a boolean if a field has been set. + + + + +### GetOldestVersion + +`func (o *KvV2ReadMetadataResponse) GetOldestVersion() int64` + +GetOldestVersion returns the OldestVersion field if non-nil, zero value otherwise. + +### GetOldestVersionOk + +`func (o *KvV2ReadMetadataResponse) GetOldestVersionOk() (*int64, bool)` + +GetOldestVersionOk returns a tuple with the OldestVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOldestVersion + +`func (o *KvV2ReadMetadataResponse) SetOldestVersion(v int64)` + +SetOldestVersion sets OldestVersion field to given value. + + +### HasOldestVersion + +`func (o *KvV2ReadMetadataResponse) HasOldestVersion() bool` + +HasOldestVersion returns a boolean if a field has been set. + + + + +### GetUpdatedTime + +`func (o *KvV2ReadMetadataResponse) GetUpdatedTime() time.Time` + +GetUpdatedTime returns the UpdatedTime field if non-nil, zero value otherwise. + +### GetUpdatedTimeOk + +`func (o *KvV2ReadMetadataResponse) GetUpdatedTimeOk() (*time.Time, bool)` + +GetUpdatedTimeOk returns a tuple with the UpdatedTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUpdatedTime + +`func (o *KvV2ReadMetadataResponse) SetUpdatedTime(v time.Time)` + +SetUpdatedTime sets UpdatedTime field to given value. + + +### HasUpdatedTime + +`func (o *KvV2ReadMetadataResponse) HasUpdatedTime() bool` + +HasUpdatedTime returns a boolean if a field has been set. + + + + +### GetVersions + +`func (o *KvV2ReadMetadataResponse) GetVersions() map[string]interface{}` + +GetVersions returns the Versions field if non-nil, zero value otherwise. + +### GetVersionsOk + +`func (o *KvV2ReadMetadataResponse) GetVersionsOk() (*map[string]interface{}, bool)` + +GetVersionsOk returns a tuple with the Versions field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVersions + +`func (o *KvV2ReadMetadataResponse) SetVersions(v map[string]interface{})` + +SetVersions sets Versions field to given value. + + +### HasVersions + +`func (o *KvV2ReadMetadataResponse) HasVersions() bool` + +HasVersions returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KvV2ReadResponse.md b/docs/KvV2ReadResponse.md new file mode 100644 index 00000000..9adb9ea7 --- /dev/null +++ b/docs/KvV2ReadResponse.md @@ -0,0 +1,99 @@ +# KvV2ReadResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Data** | Pointer to **map[string]interface{}** | | [optional] +**Metadata** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewKvV2ReadResponse + +`func NewKvV2ReadResponse() *KvV2ReadResponse` + +NewKvV2ReadResponse instantiates a new KvV2ReadResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewKvV2ReadResponseWithDefaults + +`func NewKvV2ReadResponseWithDefaults() *KvV2ReadResponse` + +NewKvV2ReadResponseWithDefaults instantiates a new KvV2ReadResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetData + +`func (o *KvV2ReadResponse) GetData() map[string]interface{}` + +GetData returns the Data field if non-nil, zero value otherwise. + +### GetDataOk + +`func (o *KvV2ReadResponse) GetDataOk() (*map[string]interface{}, bool)` + +GetDataOk returns a tuple with the Data field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetData + +`func (o *KvV2ReadResponse) SetData(v map[string]interface{})` + +SetData sets Data field to given value. + + +### HasData + +`func (o *KvV2ReadResponse) HasData() bool` + +HasData returns a boolean if a field has been set. + + + + +### GetMetadata + +`func (o *KvV2ReadResponse) GetMetadata() map[string]interface{}` + +GetMetadata returns the Metadata field if non-nil, zero value otherwise. + +### GetMetadataOk + +`func (o *KvV2ReadResponse) GetMetadataOk() (*map[string]interface{}, bool)` + +GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMetadata + +`func (o *KvV2ReadResponse) SetMetadata(v map[string]interface{})` + +SetMetadata sets Metadata field to given value. + + +### HasMetadata + +`func (o *KvV2ReadResponse) HasMetadata() bool` + +HasMetadata returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KvV2ReadSubkeysResponse.md b/docs/KvV2ReadSubkeysResponse.md new file mode 100644 index 00000000..ddd994e5 --- /dev/null +++ b/docs/KvV2ReadSubkeysResponse.md @@ -0,0 +1,99 @@ +# KvV2ReadSubkeysResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Metadata** | Pointer to **map[string]interface{}** | | [optional] +**Subkeys** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewKvV2ReadSubkeysResponse + +`func NewKvV2ReadSubkeysResponse() *KvV2ReadSubkeysResponse` + +NewKvV2ReadSubkeysResponse instantiates a new KvV2ReadSubkeysResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewKvV2ReadSubkeysResponseWithDefaults + +`func NewKvV2ReadSubkeysResponseWithDefaults() *KvV2ReadSubkeysResponse` + +NewKvV2ReadSubkeysResponseWithDefaults instantiates a new KvV2ReadSubkeysResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetMetadata + +`func (o *KvV2ReadSubkeysResponse) GetMetadata() map[string]interface{}` + +GetMetadata returns the Metadata field if non-nil, zero value otherwise. + +### GetMetadataOk + +`func (o *KvV2ReadSubkeysResponse) GetMetadataOk() (*map[string]interface{}, bool)` + +GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMetadata + +`func (o *KvV2ReadSubkeysResponse) SetMetadata(v map[string]interface{})` + +SetMetadata sets Metadata field to given value. + + +### HasMetadata + +`func (o *KvV2ReadSubkeysResponse) HasMetadata() bool` + +HasMetadata returns a boolean if a field has been set. + + + + +### GetSubkeys + +`func (o *KvV2ReadSubkeysResponse) GetSubkeys() map[string]interface{}` + +GetSubkeys returns the Subkeys field if non-nil, zero value otherwise. + +### GetSubkeysOk + +`func (o *KvV2ReadSubkeysResponse) GetSubkeysOk() (*map[string]interface{}, bool)` + +GetSubkeysOk returns a tuple with the Subkeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSubkeys + +`func (o *KvV2ReadSubkeysResponse) SetSubkeys(v map[string]interface{})` + +SetSubkeys sets Subkeys field to given value. + + +### HasSubkeys + +`func (o *KvV2ReadSubkeysResponse) HasSubkeys() bool` + +HasSubkeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KvV2WriteResponse.md b/docs/KvV2WriteResponse.md new file mode 100644 index 00000000..98e819e6 --- /dev/null +++ b/docs/KvV2WriteResponse.md @@ -0,0 +1,189 @@ +# KvV2WriteResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CreatedTime** | Pointer to **time.Time** | | [optional] +**CustomMetadata** | Pointer to **map[string]interface{}** | | [optional] +**DeletionTime** | Pointer to **string** | | [optional] +**Destroyed** | Pointer to **bool** | | [optional] +**Version** | Pointer to **int64** | | [optional] + + + +## Methods + + +### NewKvV2WriteResponse + +`func NewKvV2WriteResponse() *KvV2WriteResponse` + +NewKvV2WriteResponse instantiates a new KvV2WriteResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewKvV2WriteResponseWithDefaults + +`func NewKvV2WriteResponseWithDefaults() *KvV2WriteResponse` + +NewKvV2WriteResponseWithDefaults instantiates a new KvV2WriteResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCreatedTime + +`func (o *KvV2WriteResponse) GetCreatedTime() time.Time` + +GetCreatedTime returns the CreatedTime field if non-nil, zero value otherwise. + +### GetCreatedTimeOk + +`func (o *KvV2WriteResponse) GetCreatedTimeOk() (*time.Time, bool)` + +GetCreatedTimeOk returns a tuple with the CreatedTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreatedTime + +`func (o *KvV2WriteResponse) SetCreatedTime(v time.Time)` + +SetCreatedTime sets CreatedTime field to given value. + + +### HasCreatedTime + +`func (o *KvV2WriteResponse) HasCreatedTime() bool` + +HasCreatedTime returns a boolean if a field has been set. + + + + +### GetCustomMetadata + +`func (o *KvV2WriteResponse) GetCustomMetadata() map[string]interface{}` + +GetCustomMetadata returns the CustomMetadata field if non-nil, zero value otherwise. + +### GetCustomMetadataOk + +`func (o *KvV2WriteResponse) GetCustomMetadataOk() (*map[string]interface{}, bool)` + +GetCustomMetadataOk returns a tuple with the CustomMetadata field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCustomMetadata + +`func (o *KvV2WriteResponse) SetCustomMetadata(v map[string]interface{})` + +SetCustomMetadata sets CustomMetadata field to given value. + + +### HasCustomMetadata + +`func (o *KvV2WriteResponse) HasCustomMetadata() bool` + +HasCustomMetadata returns a boolean if a field has been set. + + + + +### GetDeletionTime + +`func (o *KvV2WriteResponse) GetDeletionTime() string` + +GetDeletionTime returns the DeletionTime field if non-nil, zero value otherwise. + +### GetDeletionTimeOk + +`func (o *KvV2WriteResponse) GetDeletionTimeOk() (*string, bool)` + +GetDeletionTimeOk returns a tuple with the DeletionTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeletionTime + +`func (o *KvV2WriteResponse) SetDeletionTime(v string)` + +SetDeletionTime sets DeletionTime field to given value. + + +### HasDeletionTime + +`func (o *KvV2WriteResponse) HasDeletionTime() bool` + +HasDeletionTime returns a boolean if a field has been set. + + + + +### GetDestroyed + +`func (o *KvV2WriteResponse) GetDestroyed() bool` + +GetDestroyed returns the Destroyed field if non-nil, zero value otherwise. + +### GetDestroyedOk + +`func (o *KvV2WriteResponse) GetDestroyedOk() (*bool, bool)` + +GetDestroyedOk returns a tuple with the Destroyed field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDestroyed + +`func (o *KvV2WriteResponse) SetDestroyed(v bool)` + +SetDestroyed sets Destroyed field to given value. + + +### HasDestroyed + +`func (o *KvV2WriteResponse) HasDestroyed() bool` + +HasDestroyed returns a boolean if a field has been set. + + + + +### GetVersion + +`func (o *KvV2WriteResponse) GetVersion() int64` + +GetVersion returns the Version field if non-nil, zero value otherwise. + +### GetVersionOk + +`func (o *KvV2WriteResponse) GetVersionOk() (*int64, bool)` + +GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVersion + +`func (o *KvV2WriteResponse) SetVersion(v int64)` + +SetVersion sets Version field to given value. + + +### HasVersion + +`func (o *KvV2WriteResponse) HasVersion() bool` + +HasVersion returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/LDAPCheckInManageLibraryRequest.md b/docs/LDAPCheckInManageLibraryRequest.md deleted file mode 100644 index 3835cd50..00000000 --- a/docs/LDAPCheckInManageLibraryRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# LDAPCheckInManageLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ServiceAccountNames** | Pointer to **[]string** | The username/logon name for the service accounts to check in. | [optional] - - - -## Methods - - -### NewLDAPCheckInManageLibraryRequest - -`func NewLDAPCheckInManageLibraryRequest() *LDAPCheckInManageLibraryRequest` - -NewLDAPCheckInManageLibraryRequest instantiates a new LDAPCheckInManageLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewLDAPCheckInManageLibraryRequestWithDefaults - -`func NewLDAPCheckInManageLibraryRequestWithDefaults() *LDAPCheckInManageLibraryRequest` - -NewLDAPCheckInManageLibraryRequestWithDefaults instantiates a new LDAPCheckInManageLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetServiceAccountNames - -`func (o *LDAPCheckInManageLibraryRequest) GetServiceAccountNames() []string` - -GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. - -### GetServiceAccountNamesOk - -`func (o *LDAPCheckInManageLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` - -GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetServiceAccountNames - -`func (o *LDAPCheckInManageLibraryRequest) SetServiceAccountNames(v []string)` - -SetServiceAccountNames sets ServiceAccountNames field to given value. - - -### HasServiceAccountNames - -`func (o *LDAPCheckInManageLibraryRequest) HasServiceAccountNames() bool` - -HasServiceAccountNames returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/LDAPWriteConfigRequest.md b/docs/LDAPWriteConfigRequest.md deleted file mode 100644 index a0477396..00000000 --- a/docs/LDAPWriteConfigRequest.md +++ /dev/null @@ -1,939 +0,0 @@ -# LDAPWriteConfigRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**AnonymousGroupSearch** | Pointer to **bool** | Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). | [optional] [default to false] -**Binddn** | Pointer to **string** | LDAP DN for searching for the user DN (optional) | [optional] -**Bindpass** | Pointer to **string** | LDAP password for searching for the user DN (optional) | [optional] -**CaseSensitiveNames** | Pointer to **bool** | If true, case sensitivity will be used when comparing usernames and groups for matching policies. | [optional] -**Certificate** | Pointer to **string** | CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) | [optional] -**ClientTlsCert** | Pointer to **string** | Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] -**ClientTlsKey** | Pointer to **string** | Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] -**DenyNullBind** | Pointer to **bool** | Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true | [optional] [default to true] -**Discoverdn** | Pointer to **bool** | Use anonymous bind to discover the bind DN of a user (optional) | [optional] -**Groupattr** | Pointer to **string** | LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn | [optional] [default to "cn"] -**Groupdn** | Pointer to **string** | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) | [optional] -**Groupfilter** | Pointer to **string** | Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) | [optional] [default to "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))"] -**InsecureTls** | Pointer to **bool** | Skip LDAP server SSL Certificate verification - VERY insecure (optional) | [optional] -**Length** | Pointer to **int32** | The desired length of passwords that Vault generates. | [optional] -**MaxTtl** | Pointer to **int32** | The maximum password time-to-live. | [optional] -**PasswordPolicy** | Pointer to **string** | Password policy to use to generate passwords | [optional] -**RequestTimeout** | Pointer to **int32** | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | [optional] -**Schema** | Pointer to **string** | The desired LDAP schema used when modifying user account passwords. | [optional] [default to "openldap"] -**Starttls** | Pointer to **bool** | Issue a StartTLS command after establishing unencrypted connection (optional) | [optional] -**TlsMaxVersion** | Pointer to **string** | Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' | [optional] [default to "tls12"] -**TlsMinVersion** | Pointer to **string** | Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' | [optional] [default to "tls12"] -**Ttl** | Pointer to **int32** | The default password time-to-live. | [optional] -**Upndomain** | Pointer to **string** | Enables userPrincipalDomain login with [username]@UPNDomain (optional) | [optional] -**Url** | Pointer to **string** | LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. | [optional] [default to "ldap://127.0.0.1"] -**UsePre111GroupCnBehavior** | Pointer to **bool** | In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. | [optional] -**UseTokenGroups** | Pointer to **bool** | If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. | [optional] [default to false] -**Userattr** | Pointer to **string** | Attribute used for users (default: cn) | [optional] [default to "cn"] -**Userdn** | Pointer to **string** | LDAP domain to use for users (eg: ou=People,dc=example,dc=org) | [optional] -**Userfilter** | Pointer to **string** | Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) | [optional] [default to "({{.UserAttr}}={{.Username}})"] -**UsernameAsAlias** | Pointer to **bool** | If true, sets the alias name to the username | [optional] [default to false] - - - -## Methods - - -### NewLDAPWriteConfigRequest - -`func NewLDAPWriteConfigRequest() *LDAPWriteConfigRequest` - -NewLDAPWriteConfigRequest instantiates a new LDAPWriteConfigRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewLDAPWriteConfigRequestWithDefaults - -`func NewLDAPWriteConfigRequestWithDefaults() *LDAPWriteConfigRequest` - -NewLDAPWriteConfigRequestWithDefaults instantiates a new LDAPWriteConfigRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetAnonymousGroupSearch - -`func (o *LDAPWriteConfigRequest) GetAnonymousGroupSearch() bool` - -GetAnonymousGroupSearch returns the AnonymousGroupSearch field if non-nil, zero value otherwise. - -### GetAnonymousGroupSearchOk - -`func (o *LDAPWriteConfigRequest) GetAnonymousGroupSearchOk() (*bool, bool)` - -GetAnonymousGroupSearchOk returns a tuple with the AnonymousGroupSearch field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetAnonymousGroupSearch - -`func (o *LDAPWriteConfigRequest) SetAnonymousGroupSearch(v bool)` - -SetAnonymousGroupSearch sets AnonymousGroupSearch field to given value. - - -### HasAnonymousGroupSearch - -`func (o *LDAPWriteConfigRequest) HasAnonymousGroupSearch() bool` - -HasAnonymousGroupSearch returns a boolean if a field has been set. - - - - -### GetBinddn - -`func (o *LDAPWriteConfigRequest) GetBinddn() string` - -GetBinddn returns the Binddn field if non-nil, zero value otherwise. - -### GetBinddnOk - -`func (o *LDAPWriteConfigRequest) GetBinddnOk() (*string, bool)` - -GetBinddnOk returns a tuple with the Binddn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBinddn - -`func (o *LDAPWriteConfigRequest) SetBinddn(v string)` - -SetBinddn sets Binddn field to given value. - - -### HasBinddn - -`func (o *LDAPWriteConfigRequest) HasBinddn() bool` - -HasBinddn returns a boolean if a field has been set. - - - - -### GetBindpass - -`func (o *LDAPWriteConfigRequest) GetBindpass() string` - -GetBindpass returns the Bindpass field if non-nil, zero value otherwise. - -### GetBindpassOk - -`func (o *LDAPWriteConfigRequest) GetBindpassOk() (*string, bool)` - -GetBindpassOk returns a tuple with the Bindpass field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBindpass - -`func (o *LDAPWriteConfigRequest) SetBindpass(v string)` - -SetBindpass sets Bindpass field to given value. - - -### HasBindpass - -`func (o *LDAPWriteConfigRequest) HasBindpass() bool` - -HasBindpass returns a boolean if a field has been set. - - - - -### GetCaseSensitiveNames - -`func (o *LDAPWriteConfigRequest) GetCaseSensitiveNames() bool` - -GetCaseSensitiveNames returns the CaseSensitiveNames field if non-nil, zero value otherwise. - -### GetCaseSensitiveNamesOk - -`func (o *LDAPWriteConfigRequest) GetCaseSensitiveNamesOk() (*bool, bool)` - -GetCaseSensitiveNamesOk returns a tuple with the CaseSensitiveNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCaseSensitiveNames - -`func (o *LDAPWriteConfigRequest) SetCaseSensitiveNames(v bool)` - -SetCaseSensitiveNames sets CaseSensitiveNames field to given value. - - -### HasCaseSensitiveNames - -`func (o *LDAPWriteConfigRequest) HasCaseSensitiveNames() bool` - -HasCaseSensitiveNames returns a boolean if a field has been set. - - - - -### GetCertificate - -`func (o *LDAPWriteConfigRequest) GetCertificate() string` - -GetCertificate returns the Certificate field if non-nil, zero value otherwise. - -### GetCertificateOk - -`func (o *LDAPWriteConfigRequest) GetCertificateOk() (*string, bool)` - -GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCertificate - -`func (o *LDAPWriteConfigRequest) SetCertificate(v string)` - -SetCertificate sets Certificate field to given value. - - -### HasCertificate - -`func (o *LDAPWriteConfigRequest) HasCertificate() bool` - -HasCertificate returns a boolean if a field has been set. - - - - -### GetClientTlsCert - -`func (o *LDAPWriteConfigRequest) GetClientTlsCert() string` - -GetClientTlsCert returns the ClientTlsCert field if non-nil, zero value otherwise. - -### GetClientTlsCertOk - -`func (o *LDAPWriteConfigRequest) GetClientTlsCertOk() (*string, bool)` - -GetClientTlsCertOk returns a tuple with the ClientTlsCert field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClientTlsCert - -`func (o *LDAPWriteConfigRequest) SetClientTlsCert(v string)` - -SetClientTlsCert sets ClientTlsCert field to given value. - - -### HasClientTlsCert - -`func (o *LDAPWriteConfigRequest) HasClientTlsCert() bool` - -HasClientTlsCert returns a boolean if a field has been set. - - - - -### GetClientTlsKey - -`func (o *LDAPWriteConfigRequest) GetClientTlsKey() string` - -GetClientTlsKey returns the ClientTlsKey field if non-nil, zero value otherwise. - -### GetClientTlsKeyOk - -`func (o *LDAPWriteConfigRequest) GetClientTlsKeyOk() (*string, bool)` - -GetClientTlsKeyOk returns a tuple with the ClientTlsKey field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClientTlsKey - -`func (o *LDAPWriteConfigRequest) SetClientTlsKey(v string)` - -SetClientTlsKey sets ClientTlsKey field to given value. - - -### HasClientTlsKey - -`func (o *LDAPWriteConfigRequest) HasClientTlsKey() bool` - -HasClientTlsKey returns a boolean if a field has been set. - - - - -### GetDenyNullBind - -`func (o *LDAPWriteConfigRequest) GetDenyNullBind() bool` - -GetDenyNullBind returns the DenyNullBind field if non-nil, zero value otherwise. - -### GetDenyNullBindOk - -`func (o *LDAPWriteConfigRequest) GetDenyNullBindOk() (*bool, bool)` - -GetDenyNullBindOk returns a tuple with the DenyNullBind field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDenyNullBind - -`func (o *LDAPWriteConfigRequest) SetDenyNullBind(v bool)` - -SetDenyNullBind sets DenyNullBind field to given value. - - -### HasDenyNullBind - -`func (o *LDAPWriteConfigRequest) HasDenyNullBind() bool` - -HasDenyNullBind returns a boolean if a field has been set. - - - - -### GetDiscoverdn - -`func (o *LDAPWriteConfigRequest) GetDiscoverdn() bool` - -GetDiscoverdn returns the Discoverdn field if non-nil, zero value otherwise. - -### GetDiscoverdnOk - -`func (o *LDAPWriteConfigRequest) GetDiscoverdnOk() (*bool, bool)` - -GetDiscoverdnOk returns a tuple with the Discoverdn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDiscoverdn - -`func (o *LDAPWriteConfigRequest) SetDiscoverdn(v bool)` - -SetDiscoverdn sets Discoverdn field to given value. - - -### HasDiscoverdn - -`func (o *LDAPWriteConfigRequest) HasDiscoverdn() bool` - -HasDiscoverdn returns a boolean if a field has been set. - - - - -### GetGroupattr - -`func (o *LDAPWriteConfigRequest) GetGroupattr() string` - -GetGroupattr returns the Groupattr field if non-nil, zero value otherwise. - -### GetGroupattrOk - -`func (o *LDAPWriteConfigRequest) GetGroupattrOk() (*string, bool)` - -GetGroupattrOk returns a tuple with the Groupattr field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetGroupattr - -`func (o *LDAPWriteConfigRequest) SetGroupattr(v string)` - -SetGroupattr sets Groupattr field to given value. - - -### HasGroupattr - -`func (o *LDAPWriteConfigRequest) HasGroupattr() bool` - -HasGroupattr returns a boolean if a field has been set. - - - - -### GetGroupdn - -`func (o *LDAPWriteConfigRequest) GetGroupdn() string` - -GetGroupdn returns the Groupdn field if non-nil, zero value otherwise. - -### GetGroupdnOk - -`func (o *LDAPWriteConfigRequest) GetGroupdnOk() (*string, bool)` - -GetGroupdnOk returns a tuple with the Groupdn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetGroupdn - -`func (o *LDAPWriteConfigRequest) SetGroupdn(v string)` - -SetGroupdn sets Groupdn field to given value. - - -### HasGroupdn - -`func (o *LDAPWriteConfigRequest) HasGroupdn() bool` - -HasGroupdn returns a boolean if a field has been set. - - - - -### GetGroupfilter - -`func (o *LDAPWriteConfigRequest) GetGroupfilter() string` - -GetGroupfilter returns the Groupfilter field if non-nil, zero value otherwise. - -### GetGroupfilterOk - -`func (o *LDAPWriteConfigRequest) GetGroupfilterOk() (*string, bool)` - -GetGroupfilterOk returns a tuple with the Groupfilter field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetGroupfilter - -`func (o *LDAPWriteConfigRequest) SetGroupfilter(v string)` - -SetGroupfilter sets Groupfilter field to given value. - - -### HasGroupfilter - -`func (o *LDAPWriteConfigRequest) HasGroupfilter() bool` - -HasGroupfilter returns a boolean if a field has been set. - - - - -### GetInsecureTls - -`func (o *LDAPWriteConfigRequest) GetInsecureTls() bool` - -GetInsecureTls returns the InsecureTls field if non-nil, zero value otherwise. - -### GetInsecureTlsOk - -`func (o *LDAPWriteConfigRequest) GetInsecureTlsOk() (*bool, bool)` - -GetInsecureTlsOk returns a tuple with the InsecureTls field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetInsecureTls - -`func (o *LDAPWriteConfigRequest) SetInsecureTls(v bool)` - -SetInsecureTls sets InsecureTls field to given value. - - -### HasInsecureTls - -`func (o *LDAPWriteConfigRequest) HasInsecureTls() bool` - -HasInsecureTls returns a boolean if a field has been set. - - - - -### GetLength - -`func (o *LDAPWriteConfigRequest) GetLength() int32` - -GetLength returns the Length field if non-nil, zero value otherwise. - -### GetLengthOk - -`func (o *LDAPWriteConfigRequest) GetLengthOk() (*int32, bool)` - -GetLengthOk returns a tuple with the Length field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetLength - -`func (o *LDAPWriteConfigRequest) SetLength(v int32)` - -SetLength sets Length field to given value. - - -### HasLength - -`func (o *LDAPWriteConfigRequest) HasLength() bool` - -HasLength returns a boolean if a field has been set. - - - - -### GetMaxTtl - -`func (o *LDAPWriteConfigRequest) GetMaxTtl() int32` - -GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. - -### GetMaxTtlOk - -`func (o *LDAPWriteConfigRequest) GetMaxTtlOk() (*int32, bool)` - -GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetMaxTtl - -`func (o *LDAPWriteConfigRequest) SetMaxTtl(v int32)` - -SetMaxTtl sets MaxTtl field to given value. - - -### HasMaxTtl - -`func (o *LDAPWriteConfigRequest) HasMaxTtl() bool` - -HasMaxTtl returns a boolean if a field has been set. - - - - -### GetPasswordPolicy - -`func (o *LDAPWriteConfigRequest) GetPasswordPolicy() string` - -GetPasswordPolicy returns the PasswordPolicy field if non-nil, zero value otherwise. - -### GetPasswordPolicyOk - -`func (o *LDAPWriteConfigRequest) GetPasswordPolicyOk() (*string, bool)` - -GetPasswordPolicyOk returns a tuple with the PasswordPolicy field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetPasswordPolicy - -`func (o *LDAPWriteConfigRequest) SetPasswordPolicy(v string)` - -SetPasswordPolicy sets PasswordPolicy field to given value. - - -### HasPasswordPolicy - -`func (o *LDAPWriteConfigRequest) HasPasswordPolicy() bool` - -HasPasswordPolicy returns a boolean if a field has been set. - - - - -### GetRequestTimeout - -`func (o *LDAPWriteConfigRequest) GetRequestTimeout() int32` - -GetRequestTimeout returns the RequestTimeout field if non-nil, zero value otherwise. - -### GetRequestTimeoutOk - -`func (o *LDAPWriteConfigRequest) GetRequestTimeoutOk() (*int32, bool)` - -GetRequestTimeoutOk returns a tuple with the RequestTimeout field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRequestTimeout - -`func (o *LDAPWriteConfigRequest) SetRequestTimeout(v int32)` - -SetRequestTimeout sets RequestTimeout field to given value. - - -### HasRequestTimeout - -`func (o *LDAPWriteConfigRequest) HasRequestTimeout() bool` - -HasRequestTimeout returns a boolean if a field has been set. - - - - -### GetSchema - -`func (o *LDAPWriteConfigRequest) GetSchema() string` - -GetSchema returns the Schema field if non-nil, zero value otherwise. - -### GetSchemaOk - -`func (o *LDAPWriteConfigRequest) GetSchemaOk() (*string, bool)` - -GetSchemaOk returns a tuple with the Schema field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetSchema - -`func (o *LDAPWriteConfigRequest) SetSchema(v string)` - -SetSchema sets Schema field to given value. - - -### HasSchema - -`func (o *LDAPWriteConfigRequest) HasSchema() bool` - -HasSchema returns a boolean if a field has been set. - - - - -### GetStarttls - -`func (o *LDAPWriteConfigRequest) GetStarttls() bool` - -GetStarttls returns the Starttls field if non-nil, zero value otherwise. - -### GetStarttlsOk - -`func (o *LDAPWriteConfigRequest) GetStarttlsOk() (*bool, bool)` - -GetStarttlsOk returns a tuple with the Starttls field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetStarttls - -`func (o *LDAPWriteConfigRequest) SetStarttls(v bool)` - -SetStarttls sets Starttls field to given value. - - -### HasStarttls - -`func (o *LDAPWriteConfigRequest) HasStarttls() bool` - -HasStarttls returns a boolean if a field has been set. - - - - -### GetTlsMaxVersion - -`func (o *LDAPWriteConfigRequest) GetTlsMaxVersion() string` - -GetTlsMaxVersion returns the TlsMaxVersion field if non-nil, zero value otherwise. - -### GetTlsMaxVersionOk - -`func (o *LDAPWriteConfigRequest) GetTlsMaxVersionOk() (*string, bool)` - -GetTlsMaxVersionOk returns a tuple with the TlsMaxVersion field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTlsMaxVersion - -`func (o *LDAPWriteConfigRequest) SetTlsMaxVersion(v string)` - -SetTlsMaxVersion sets TlsMaxVersion field to given value. - - -### HasTlsMaxVersion - -`func (o *LDAPWriteConfigRequest) HasTlsMaxVersion() bool` - -HasTlsMaxVersion returns a boolean if a field has been set. - - - - -### GetTlsMinVersion - -`func (o *LDAPWriteConfigRequest) GetTlsMinVersion() string` - -GetTlsMinVersion returns the TlsMinVersion field if non-nil, zero value otherwise. - -### GetTlsMinVersionOk - -`func (o *LDAPWriteConfigRequest) GetTlsMinVersionOk() (*string, bool)` - -GetTlsMinVersionOk returns a tuple with the TlsMinVersion field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTlsMinVersion - -`func (o *LDAPWriteConfigRequest) SetTlsMinVersion(v string)` - -SetTlsMinVersion sets TlsMinVersion field to given value. - - -### HasTlsMinVersion - -`func (o *LDAPWriteConfigRequest) HasTlsMinVersion() bool` - -HasTlsMinVersion returns a boolean if a field has been set. - - - - -### GetTtl - -`func (o *LDAPWriteConfigRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *LDAPWriteConfigRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *LDAPWriteConfigRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *LDAPWriteConfigRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - -### GetUpndomain - -`func (o *LDAPWriteConfigRequest) GetUpndomain() string` - -GetUpndomain returns the Upndomain field if non-nil, zero value otherwise. - -### GetUpndomainOk - -`func (o *LDAPWriteConfigRequest) GetUpndomainOk() (*string, bool)` - -GetUpndomainOk returns a tuple with the Upndomain field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUpndomain - -`func (o *LDAPWriteConfigRequest) SetUpndomain(v string)` - -SetUpndomain sets Upndomain field to given value. - - -### HasUpndomain - -`func (o *LDAPWriteConfigRequest) HasUpndomain() bool` - -HasUpndomain returns a boolean if a field has been set. - - - - -### GetUrl - -`func (o *LDAPWriteConfigRequest) GetUrl() string` - -GetUrl returns the Url field if non-nil, zero value otherwise. - -### GetUrlOk - -`func (o *LDAPWriteConfigRequest) GetUrlOk() (*string, bool)` - -GetUrlOk returns a tuple with the Url field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUrl - -`func (o *LDAPWriteConfigRequest) SetUrl(v string)` - -SetUrl sets Url field to given value. - - -### HasUrl - -`func (o *LDAPWriteConfigRequest) HasUrl() bool` - -HasUrl returns a boolean if a field has been set. - - - - -### GetUsePre111GroupCnBehavior - -`func (o *LDAPWriteConfigRequest) GetUsePre111GroupCnBehavior() bool` - -GetUsePre111GroupCnBehavior returns the UsePre111GroupCnBehavior field if non-nil, zero value otherwise. - -### GetUsePre111GroupCnBehaviorOk - -`func (o *LDAPWriteConfigRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` - -GetUsePre111GroupCnBehaviorOk returns a tuple with the UsePre111GroupCnBehavior field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUsePre111GroupCnBehavior - -`func (o *LDAPWriteConfigRequest) SetUsePre111GroupCnBehavior(v bool)` - -SetUsePre111GroupCnBehavior sets UsePre111GroupCnBehavior field to given value. - - -### HasUsePre111GroupCnBehavior - -`func (o *LDAPWriteConfigRequest) HasUsePre111GroupCnBehavior() bool` - -HasUsePre111GroupCnBehavior returns a boolean if a field has been set. - - - - -### GetUseTokenGroups - -`func (o *LDAPWriteConfigRequest) GetUseTokenGroups() bool` - -GetUseTokenGroups returns the UseTokenGroups field if non-nil, zero value otherwise. - -### GetUseTokenGroupsOk - -`func (o *LDAPWriteConfigRequest) GetUseTokenGroupsOk() (*bool, bool)` - -GetUseTokenGroupsOk returns a tuple with the UseTokenGroups field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUseTokenGroups - -`func (o *LDAPWriteConfigRequest) SetUseTokenGroups(v bool)` - -SetUseTokenGroups sets UseTokenGroups field to given value. - - -### HasUseTokenGroups - -`func (o *LDAPWriteConfigRequest) HasUseTokenGroups() bool` - -HasUseTokenGroups returns a boolean if a field has been set. - - - - -### GetUserattr - -`func (o *LDAPWriteConfigRequest) GetUserattr() string` - -GetUserattr returns the Userattr field if non-nil, zero value otherwise. - -### GetUserattrOk - -`func (o *LDAPWriteConfigRequest) GetUserattrOk() (*string, bool)` - -GetUserattrOk returns a tuple with the Userattr field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserattr - -`func (o *LDAPWriteConfigRequest) SetUserattr(v string)` - -SetUserattr sets Userattr field to given value. - - -### HasUserattr - -`func (o *LDAPWriteConfigRequest) HasUserattr() bool` - -HasUserattr returns a boolean if a field has been set. - - - - -### GetUserdn - -`func (o *LDAPWriteConfigRequest) GetUserdn() string` - -GetUserdn returns the Userdn field if non-nil, zero value otherwise. - -### GetUserdnOk - -`func (o *LDAPWriteConfigRequest) GetUserdnOk() (*string, bool)` - -GetUserdnOk returns a tuple with the Userdn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserdn - -`func (o *LDAPWriteConfigRequest) SetUserdn(v string)` - -SetUserdn sets Userdn field to given value. - - -### HasUserdn - -`func (o *LDAPWriteConfigRequest) HasUserdn() bool` - -HasUserdn returns a boolean if a field has been set. - - - - -### GetUserfilter - -`func (o *LDAPWriteConfigRequest) GetUserfilter() string` - -GetUserfilter returns the Userfilter field if non-nil, zero value otherwise. - -### GetUserfilterOk - -`func (o *LDAPWriteConfigRequest) GetUserfilterOk() (*string, bool)` - -GetUserfilterOk returns a tuple with the Userfilter field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserfilter - -`func (o *LDAPWriteConfigRequest) SetUserfilter(v string)` - -SetUserfilter sets Userfilter field to given value. - - -### HasUserfilter - -`func (o *LDAPWriteConfigRequest) HasUserfilter() bool` - -HasUserfilter returns a boolean if a field has been set. - - - - -### GetUsernameAsAlias - -`func (o *LDAPWriteConfigRequest) GetUsernameAsAlias() bool` - -GetUsernameAsAlias returns the UsernameAsAlias field if non-nil, zero value otherwise. - -### GetUsernameAsAliasOk - -`func (o *LDAPWriteConfigRequest) GetUsernameAsAliasOk() (*bool, bool)` - -GetUsernameAsAliasOk returns a tuple with the UsernameAsAlias field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUsernameAsAlias - -`func (o *LDAPWriteConfigRequest) SetUsernameAsAlias(v bool)` - -SetUsernameAsAlias sets UsernameAsAlias field to given value. - - -### HasUsernameAsAlias - -`func (o *LDAPWriteConfigRequest) HasUsernameAsAlias() bool` - -HasUsernameAsAlias returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/LDAPWriteGroupRequest.md b/docs/LDAPWriteGroupRequest.md index 1b860b68..d59c9e53 100644 --- a/docs/LDAPWriteGroupRequest.md +++ b/docs/LDAPWriteGroupRequest.md @@ -1,4 +1,4 @@ -# LDAPWriteGroupRequest +# LdapWriteGroupRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewLDAPWriteGroupRequest +### NewLdapWriteGroupRequest -`func NewLDAPWriteGroupRequest() *LDAPWriteGroupRequest` +`func NewLdapWriteGroupRequest() *LdapWriteGroupRequest` -NewLDAPWriteGroupRequest instantiates a new LDAPWriteGroupRequest object +NewLdapWriteGroupRequest instantiates a new LdapWriteGroupRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPWriteGroupRequestWithDefaults +### NewLdapWriteGroupRequestWithDefaults -`func NewLDAPWriteGroupRequestWithDefaults() *LDAPWriteGroupRequest` +`func NewLdapWriteGroupRequestWithDefaults() *LdapWriteGroupRequest` -NewLDAPWriteGroupRequestWithDefaults instantiates a new LDAPWriteGroupRequest object +NewLdapWriteGroupRequestWithDefaults instantiates a new LdapWriteGroupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPolicies -`func (o *LDAPWriteGroupRequest) GetPolicies() []string` +`func (o *LdapWriteGroupRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *LDAPWriteGroupRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *LdapWriteGroupRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *LDAPWriteGroupRequest) SetPolicies(v []string)` +`func (o *LdapWriteGroupRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *LDAPWriteGroupRequest) HasPolicies() bool` +`func (o *LdapWriteGroupRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. diff --git a/docs/LDAPWriteLibraryRequest.md b/docs/LDAPWriteLibraryRequest.md deleted file mode 100644 index 70b54a3a..00000000 --- a/docs/LDAPWriteLibraryRequest.md +++ /dev/null @@ -1,159 +0,0 @@ -# LDAPWriteLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**DisableCheckInEnforcement** | Pointer to **bool** | Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. | [optional] [default to false] -**MaxTtl** | Pointer to **int32** | In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours. | [optional] [default to 86400] -**ServiceAccountNames** | Pointer to **[]string** | The username/logon name for the service accounts with which this set will be associated. | [optional] -**Ttl** | Pointer to **int32** | In seconds, the amount of time a check-out should last. Defaults to 24 hours. | [optional] [default to 86400] - - - -## Methods - - -### NewLDAPWriteLibraryRequest - -`func NewLDAPWriteLibraryRequest() *LDAPWriteLibraryRequest` - -NewLDAPWriteLibraryRequest instantiates a new LDAPWriteLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewLDAPWriteLibraryRequestWithDefaults - -`func NewLDAPWriteLibraryRequestWithDefaults() *LDAPWriteLibraryRequest` - -NewLDAPWriteLibraryRequestWithDefaults instantiates a new LDAPWriteLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetDisableCheckInEnforcement - -`func (o *LDAPWriteLibraryRequest) GetDisableCheckInEnforcement() bool` - -GetDisableCheckInEnforcement returns the DisableCheckInEnforcement field if non-nil, zero value otherwise. - -### GetDisableCheckInEnforcementOk - -`func (o *LDAPWriteLibraryRequest) GetDisableCheckInEnforcementOk() (*bool, bool)` - -GetDisableCheckInEnforcementOk returns a tuple with the DisableCheckInEnforcement field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDisableCheckInEnforcement - -`func (o *LDAPWriteLibraryRequest) SetDisableCheckInEnforcement(v bool)` - -SetDisableCheckInEnforcement sets DisableCheckInEnforcement field to given value. - - -### HasDisableCheckInEnforcement - -`func (o *LDAPWriteLibraryRequest) HasDisableCheckInEnforcement() bool` - -HasDisableCheckInEnforcement returns a boolean if a field has been set. - - - - -### GetMaxTtl - -`func (o *LDAPWriteLibraryRequest) GetMaxTtl() int32` - -GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. - -### GetMaxTtlOk - -`func (o *LDAPWriteLibraryRequest) GetMaxTtlOk() (*int32, bool)` - -GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetMaxTtl - -`func (o *LDAPWriteLibraryRequest) SetMaxTtl(v int32)` - -SetMaxTtl sets MaxTtl field to given value. - - -### HasMaxTtl - -`func (o *LDAPWriteLibraryRequest) HasMaxTtl() bool` - -HasMaxTtl returns a boolean if a field has been set. - - - - -### GetServiceAccountNames - -`func (o *LDAPWriteLibraryRequest) GetServiceAccountNames() []string` - -GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. - -### GetServiceAccountNamesOk - -`func (o *LDAPWriteLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` - -GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetServiceAccountNames - -`func (o *LDAPWriteLibraryRequest) SetServiceAccountNames(v []string)` - -SetServiceAccountNames sets ServiceAccountNames field to given value. - - -### HasServiceAccountNames - -`func (o *LDAPWriteLibraryRequest) HasServiceAccountNames() bool` - -HasServiceAccountNames returns a boolean if a field has been set. - - - - -### GetTtl - -`func (o *LDAPWriteLibraryRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *LDAPWriteLibraryRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *LDAPWriteLibraryRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *LDAPWriteLibraryRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/LDAPWriteStaticRoleRequest.md b/docs/LDAPWriteStaticRoleRequest.md index 16ab0993..d418b468 100644 --- a/docs/LDAPWriteStaticRoleRequest.md +++ b/docs/LDAPWriteStaticRoleRequest.md @@ -1,4 +1,4 @@ -# LDAPWriteStaticRoleRequest +# LdapWriteStaticRoleRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewLDAPWriteStaticRoleRequest +### NewLdapWriteStaticRoleRequest -`func NewLDAPWriteStaticRoleRequest() *LDAPWriteStaticRoleRequest` +`func NewLdapWriteStaticRoleRequest() *LdapWriteStaticRoleRequest` -NewLDAPWriteStaticRoleRequest instantiates a new LDAPWriteStaticRoleRequest object +NewLdapWriteStaticRoleRequest instantiates a new LdapWriteStaticRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPWriteStaticRoleRequestWithDefaults +### NewLdapWriteStaticRoleRequestWithDefaults -`func NewLDAPWriteStaticRoleRequestWithDefaults() *LDAPWriteStaticRoleRequest` +`func NewLdapWriteStaticRoleRequestWithDefaults() *LdapWriteStaticRoleRequest` -NewLDAPWriteStaticRoleRequestWithDefaults instantiates a new LDAPWriteStaticRoleRequest object +NewLdapWriteStaticRoleRequestWithDefaults instantiates a new LdapWriteStaticRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDn -`func (o *LDAPWriteStaticRoleRequest) GetDn() string` +`func (o *LdapWriteStaticRoleRequest) GetDn() string` GetDn returns the Dn field if non-nil, zero value otherwise. ### GetDnOk -`func (o *LDAPWriteStaticRoleRequest) GetDnOk() (*string, bool)` +`func (o *LdapWriteStaticRoleRequest) GetDnOk() (*string, bool)` GetDnOk returns a tuple with the Dn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDn -`func (o *LDAPWriteStaticRoleRequest) SetDn(v string)` +`func (o *LdapWriteStaticRoleRequest) SetDn(v string)` SetDn sets Dn field to given value. ### HasDn -`func (o *LDAPWriteStaticRoleRequest) HasDn() bool` +`func (o *LdapWriteStaticRoleRequest) HasDn() bool` HasDn returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasDn returns a boolean if a field has been set. ### GetRotationPeriod -`func (o *LDAPWriteStaticRoleRequest) GetRotationPeriod() int32` +`func (o *LdapWriteStaticRoleRequest) GetRotationPeriod() int32` GetRotationPeriod returns the RotationPeriod field if non-nil, zero value otherwise. ### GetRotationPeriodOk -`func (o *LDAPWriteStaticRoleRequest) GetRotationPeriodOk() (*int32, bool)` +`func (o *LdapWriteStaticRoleRequest) GetRotationPeriodOk() (*int32, bool)` GetRotationPeriodOk returns a tuple with the RotationPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRotationPeriod -`func (o *LDAPWriteStaticRoleRequest) SetRotationPeriod(v int32)` +`func (o *LdapWriteStaticRoleRequest) SetRotationPeriod(v int32)` SetRotationPeriod sets RotationPeriod field to given value. ### HasRotationPeriod -`func (o *LDAPWriteStaticRoleRequest) HasRotationPeriod() bool` +`func (o *LdapWriteStaticRoleRequest) HasRotationPeriod() bool` HasRotationPeriod returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasRotationPeriod returns a boolean if a field has been set. ### GetUsername -`func (o *LDAPWriteStaticRoleRequest) GetUsername() string` +`func (o *LdapWriteStaticRoleRequest) GetUsername() string` GetUsername returns the Username field if non-nil, zero value otherwise. ### GetUsernameOk -`func (o *LDAPWriteStaticRoleRequest) GetUsernameOk() (*string, bool)` +`func (o *LdapWriteStaticRoleRequest) GetUsernameOk() (*string, bool)` GetUsernameOk returns a tuple with the Username field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsername -`func (o *LDAPWriteStaticRoleRequest) SetUsername(v string)` +`func (o *LdapWriteStaticRoleRequest) SetUsername(v string)` SetUsername sets Username field to given value. ### HasUsername -`func (o *LDAPWriteStaticRoleRequest) HasUsername() bool` +`func (o *LdapWriteStaticRoleRequest) HasUsername() bool` HasUsername returns a boolean if a field has been set. diff --git a/docs/LDAPWriteUserRequest.md b/docs/LDAPWriteUserRequest.md index 88734bb1..77ba42f3 100644 --- a/docs/LDAPWriteUserRequest.md +++ b/docs/LDAPWriteUserRequest.md @@ -1,4 +1,4 @@ -# LDAPWriteUserRequest +# LdapWriteUserRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewLDAPWriteUserRequest +### NewLdapWriteUserRequest -`func NewLDAPWriteUserRequest() *LDAPWriteUserRequest` +`func NewLdapWriteUserRequest() *LdapWriteUserRequest` -NewLDAPWriteUserRequest instantiates a new LDAPWriteUserRequest object +NewLdapWriteUserRequest instantiates a new LdapWriteUserRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPWriteUserRequestWithDefaults +### NewLdapWriteUserRequestWithDefaults -`func NewLDAPWriteUserRequestWithDefaults() *LDAPWriteUserRequest` +`func NewLdapWriteUserRequestWithDefaults() *LdapWriteUserRequest` -NewLDAPWriteUserRequestWithDefaults instantiates a new LDAPWriteUserRequest object +NewLdapWriteUserRequestWithDefaults instantiates a new LdapWriteUserRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetGroups -`func (o *LDAPWriteUserRequest) GetGroups() []string` +`func (o *LdapWriteUserRequest) GetGroups() []string` GetGroups returns the Groups field if non-nil, zero value otherwise. ### GetGroupsOk -`func (o *LDAPWriteUserRequest) GetGroupsOk() (*[]string, bool)` +`func (o *LdapWriteUserRequest) GetGroupsOk() (*[]string, bool)` GetGroupsOk returns a tuple with the Groups field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroups -`func (o *LDAPWriteUserRequest) SetGroups(v []string)` +`func (o *LdapWriteUserRequest) SetGroups(v []string)` SetGroups sets Groups field to given value. ### HasGroups -`func (o *LDAPWriteUserRequest) HasGroups() bool` +`func (o *LdapWriteUserRequest) HasGroups() bool` HasGroups returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasGroups returns a boolean if a field has been set. ### GetPolicies -`func (o *LDAPWriteUserRequest) GetPolicies() []string` +`func (o *LdapWriteUserRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *LDAPWriteUserRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *LdapWriteUserRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *LDAPWriteUserRequest) SetPolicies(v []string)` +`func (o *LdapWriteUserRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *LDAPWriteUserRequest) HasPolicies() bool` +`func (o *LdapWriteUserRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. diff --git a/docs/LDAPWriteAuthConfigRequest.md b/docs/LdapConfigureAuthRequest.md similarity index 65% rename from docs/LDAPWriteAuthConfigRequest.md rename to docs/LdapConfigureAuthRequest.md index 1cbd9284..6fd64850 100644 --- a/docs/LDAPWriteAuthConfigRequest.md +++ b/docs/LdapConfigureAuthRequest.md @@ -1,4 +1,4 @@ -# LDAPWriteAuthConfigRequest +# LdapConfigureAuthRequest ## Properties @@ -12,12 +12,15 @@ Name | Type | Description | Notes **Certificate** | Pointer to **string** | CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) | [optional] **ClientTlsCert** | Pointer to **string** | Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] **ClientTlsKey** | Pointer to **string** | Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] +**ConnectionTimeout** | Pointer to **int32** | Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. | [optional] **DenyNullBind** | Pointer to **bool** | Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true | [optional] [default to true] +**DereferenceAliases** | Pointer to **string** | When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'. | [optional] [default to "never"] **Discoverdn** | Pointer to **bool** | Use anonymous bind to discover the bind DN of a user (optional) | [optional] **Groupattr** | Pointer to **string** | LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn | [optional] [default to "cn"] **Groupdn** | Pointer to **string** | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) | [optional] **Groupfilter** | Pointer to **string** | Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) | [optional] [default to "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))"] **InsecureTls** | Pointer to **bool** | Skip LDAP server SSL Certificate verification - VERY insecure (optional) | [optional] +**MaxPageSize** | Pointer to **int32** | The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged. | [optional] [default to 2147483647] **RequestTimeout** | Pointer to **int32** | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | [optional] **Starttls** | Pointer to **bool** | Issue a StartTLS command after establishing unencrypted connection (optional) | [optional] **TlsMaxVersion** | Pointer to **string** | Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' | [optional] [default to "tls12"] @@ -45,47 +48,47 @@ Name | Type | Description | Notes ## Methods -### NewLDAPWriteAuthConfigRequest +### NewLdapConfigureAuthRequest -`func NewLDAPWriteAuthConfigRequest() *LDAPWriteAuthConfigRequest` +`func NewLdapConfigureAuthRequest() *LdapConfigureAuthRequest` -NewLDAPWriteAuthConfigRequest instantiates a new LDAPWriteAuthConfigRequest object +NewLdapConfigureAuthRequest instantiates a new LdapConfigureAuthRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPWriteAuthConfigRequestWithDefaults +### NewLdapConfigureAuthRequestWithDefaults -`func NewLDAPWriteAuthConfigRequestWithDefaults() *LDAPWriteAuthConfigRequest` +`func NewLdapConfigureAuthRequestWithDefaults() *LdapConfigureAuthRequest` -NewLDAPWriteAuthConfigRequestWithDefaults instantiates a new LDAPWriteAuthConfigRequest object +NewLdapConfigureAuthRequestWithDefaults instantiates a new LdapConfigureAuthRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAnonymousGroupSearch -`func (o *LDAPWriteAuthConfigRequest) GetAnonymousGroupSearch() bool` +`func (o *LdapConfigureAuthRequest) GetAnonymousGroupSearch() bool` GetAnonymousGroupSearch returns the AnonymousGroupSearch field if non-nil, zero value otherwise. ### GetAnonymousGroupSearchOk -`func (o *LDAPWriteAuthConfigRequest) GetAnonymousGroupSearchOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetAnonymousGroupSearchOk() (*bool, bool)` GetAnonymousGroupSearchOk returns a tuple with the AnonymousGroupSearch field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAnonymousGroupSearch -`func (o *LDAPWriteAuthConfigRequest) SetAnonymousGroupSearch(v bool)` +`func (o *LdapConfigureAuthRequest) SetAnonymousGroupSearch(v bool)` SetAnonymousGroupSearch sets AnonymousGroupSearch field to given value. ### HasAnonymousGroupSearch -`func (o *LDAPWriteAuthConfigRequest) HasAnonymousGroupSearch() bool` +`func (o *LdapConfigureAuthRequest) HasAnonymousGroupSearch() bool` HasAnonymousGroupSearch returns a boolean if a field has been set. @@ -94,27 +97,27 @@ HasAnonymousGroupSearch returns a boolean if a field has been set. ### GetBinddn -`func (o *LDAPWriteAuthConfigRequest) GetBinddn() string` +`func (o *LdapConfigureAuthRequest) GetBinddn() string` GetBinddn returns the Binddn field if non-nil, zero value otherwise. ### GetBinddnOk -`func (o *LDAPWriteAuthConfigRequest) GetBinddnOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetBinddnOk() (*string, bool)` GetBinddnOk returns a tuple with the Binddn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBinddn -`func (o *LDAPWriteAuthConfigRequest) SetBinddn(v string)` +`func (o *LdapConfigureAuthRequest) SetBinddn(v string)` SetBinddn sets Binddn field to given value. ### HasBinddn -`func (o *LDAPWriteAuthConfigRequest) HasBinddn() bool` +`func (o *LdapConfigureAuthRequest) HasBinddn() bool` HasBinddn returns a boolean if a field has been set. @@ -123,27 +126,27 @@ HasBinddn returns a boolean if a field has been set. ### GetBindpass -`func (o *LDAPWriteAuthConfigRequest) GetBindpass() string` +`func (o *LdapConfigureAuthRequest) GetBindpass() string` GetBindpass returns the Bindpass field if non-nil, zero value otherwise. ### GetBindpassOk -`func (o *LDAPWriteAuthConfigRequest) GetBindpassOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetBindpassOk() (*string, bool)` GetBindpassOk returns a tuple with the Bindpass field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBindpass -`func (o *LDAPWriteAuthConfigRequest) SetBindpass(v string)` +`func (o *LdapConfigureAuthRequest) SetBindpass(v string)` SetBindpass sets Bindpass field to given value. ### HasBindpass -`func (o *LDAPWriteAuthConfigRequest) HasBindpass() bool` +`func (o *LdapConfigureAuthRequest) HasBindpass() bool` HasBindpass returns a boolean if a field has been set. @@ -152,27 +155,27 @@ HasBindpass returns a boolean if a field has been set. ### GetCaseSensitiveNames -`func (o *LDAPWriteAuthConfigRequest) GetCaseSensitiveNames() bool` +`func (o *LdapConfigureAuthRequest) GetCaseSensitiveNames() bool` GetCaseSensitiveNames returns the CaseSensitiveNames field if non-nil, zero value otherwise. ### GetCaseSensitiveNamesOk -`func (o *LDAPWriteAuthConfigRequest) GetCaseSensitiveNamesOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetCaseSensitiveNamesOk() (*bool, bool)` GetCaseSensitiveNamesOk returns a tuple with the CaseSensitiveNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCaseSensitiveNames -`func (o *LDAPWriteAuthConfigRequest) SetCaseSensitiveNames(v bool)` +`func (o *LdapConfigureAuthRequest) SetCaseSensitiveNames(v bool)` SetCaseSensitiveNames sets CaseSensitiveNames field to given value. ### HasCaseSensitiveNames -`func (o *LDAPWriteAuthConfigRequest) HasCaseSensitiveNames() bool` +`func (o *LdapConfigureAuthRequest) HasCaseSensitiveNames() bool` HasCaseSensitiveNames returns a boolean if a field has been set. @@ -181,27 +184,27 @@ HasCaseSensitiveNames returns a boolean if a field has been set. ### GetCertificate -`func (o *LDAPWriteAuthConfigRequest) GetCertificate() string` +`func (o *LdapConfigureAuthRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *LDAPWriteAuthConfigRequest) GetCertificateOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *LDAPWriteAuthConfigRequest) SetCertificate(v string)` +`func (o *LdapConfigureAuthRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *LDAPWriteAuthConfigRequest) HasCertificate() bool` +`func (o *LdapConfigureAuthRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -210,27 +213,27 @@ HasCertificate returns a boolean if a field has been set. ### GetClientTlsCert -`func (o *LDAPWriteAuthConfigRequest) GetClientTlsCert() string` +`func (o *LdapConfigureAuthRequest) GetClientTlsCert() string` GetClientTlsCert returns the ClientTlsCert field if non-nil, zero value otherwise. ### GetClientTlsCertOk -`func (o *LDAPWriteAuthConfigRequest) GetClientTlsCertOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetClientTlsCertOk() (*string, bool)` GetClientTlsCertOk returns a tuple with the ClientTlsCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientTlsCert -`func (o *LDAPWriteAuthConfigRequest) SetClientTlsCert(v string)` +`func (o *LdapConfigureAuthRequest) SetClientTlsCert(v string)` SetClientTlsCert sets ClientTlsCert field to given value. ### HasClientTlsCert -`func (o *LDAPWriteAuthConfigRequest) HasClientTlsCert() bool` +`func (o *LdapConfigureAuthRequest) HasClientTlsCert() bool` HasClientTlsCert returns a boolean if a field has been set. @@ -239,85 +242,143 @@ HasClientTlsCert returns a boolean if a field has been set. ### GetClientTlsKey -`func (o *LDAPWriteAuthConfigRequest) GetClientTlsKey() string` +`func (o *LdapConfigureAuthRequest) GetClientTlsKey() string` GetClientTlsKey returns the ClientTlsKey field if non-nil, zero value otherwise. ### GetClientTlsKeyOk -`func (o *LDAPWriteAuthConfigRequest) GetClientTlsKeyOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetClientTlsKeyOk() (*string, bool)` GetClientTlsKeyOk returns a tuple with the ClientTlsKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientTlsKey -`func (o *LDAPWriteAuthConfigRequest) SetClientTlsKey(v string)` +`func (o *LdapConfigureAuthRequest) SetClientTlsKey(v string)` SetClientTlsKey sets ClientTlsKey field to given value. ### HasClientTlsKey -`func (o *LDAPWriteAuthConfigRequest) HasClientTlsKey() bool` +`func (o *LdapConfigureAuthRequest) HasClientTlsKey() bool` HasClientTlsKey returns a boolean if a field has been set. +### GetConnectionTimeout + +`func (o *LdapConfigureAuthRequest) GetConnectionTimeout() int32` + +GetConnectionTimeout returns the ConnectionTimeout field if non-nil, zero value otherwise. + +### GetConnectionTimeoutOk + +`func (o *LdapConfigureAuthRequest) GetConnectionTimeoutOk() (*int32, bool)` + +GetConnectionTimeoutOk returns a tuple with the ConnectionTimeout field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetConnectionTimeout + +`func (o *LdapConfigureAuthRequest) SetConnectionTimeout(v int32)` + +SetConnectionTimeout sets ConnectionTimeout field to given value. + + +### HasConnectionTimeout + +`func (o *LdapConfigureAuthRequest) HasConnectionTimeout() bool` + +HasConnectionTimeout returns a boolean if a field has been set. + + + + ### GetDenyNullBind -`func (o *LDAPWriteAuthConfigRequest) GetDenyNullBind() bool` +`func (o *LdapConfigureAuthRequest) GetDenyNullBind() bool` GetDenyNullBind returns the DenyNullBind field if non-nil, zero value otherwise. ### GetDenyNullBindOk -`func (o *LDAPWriteAuthConfigRequest) GetDenyNullBindOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetDenyNullBindOk() (*bool, bool)` GetDenyNullBindOk returns a tuple with the DenyNullBind field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDenyNullBind -`func (o *LDAPWriteAuthConfigRequest) SetDenyNullBind(v bool)` +`func (o *LdapConfigureAuthRequest) SetDenyNullBind(v bool)` SetDenyNullBind sets DenyNullBind field to given value. ### HasDenyNullBind -`func (o *LDAPWriteAuthConfigRequest) HasDenyNullBind() bool` +`func (o *LdapConfigureAuthRequest) HasDenyNullBind() bool` HasDenyNullBind returns a boolean if a field has been set. +### GetDereferenceAliases + +`func (o *LdapConfigureAuthRequest) GetDereferenceAliases() string` + +GetDereferenceAliases returns the DereferenceAliases field if non-nil, zero value otherwise. + +### GetDereferenceAliasesOk + +`func (o *LdapConfigureAuthRequest) GetDereferenceAliasesOk() (*string, bool)` + +GetDereferenceAliasesOk returns a tuple with the DereferenceAliases field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDereferenceAliases + +`func (o *LdapConfigureAuthRequest) SetDereferenceAliases(v string)` + +SetDereferenceAliases sets DereferenceAliases field to given value. + + +### HasDereferenceAliases + +`func (o *LdapConfigureAuthRequest) HasDereferenceAliases() bool` + +HasDereferenceAliases returns a boolean if a field has been set. + + + + ### GetDiscoverdn -`func (o *LDAPWriteAuthConfigRequest) GetDiscoverdn() bool` +`func (o *LdapConfigureAuthRequest) GetDiscoverdn() bool` GetDiscoverdn returns the Discoverdn field if non-nil, zero value otherwise. ### GetDiscoverdnOk -`func (o *LDAPWriteAuthConfigRequest) GetDiscoverdnOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetDiscoverdnOk() (*bool, bool)` GetDiscoverdnOk returns a tuple with the Discoverdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDiscoverdn -`func (o *LDAPWriteAuthConfigRequest) SetDiscoverdn(v bool)` +`func (o *LdapConfigureAuthRequest) SetDiscoverdn(v bool)` SetDiscoverdn sets Discoverdn field to given value. ### HasDiscoverdn -`func (o *LDAPWriteAuthConfigRequest) HasDiscoverdn() bool` +`func (o *LdapConfigureAuthRequest) HasDiscoverdn() bool` HasDiscoverdn returns a boolean if a field has been set. @@ -326,27 +387,27 @@ HasDiscoverdn returns a boolean if a field has been set. ### GetGroupattr -`func (o *LDAPWriteAuthConfigRequest) GetGroupattr() string` +`func (o *LdapConfigureAuthRequest) GetGroupattr() string` GetGroupattr returns the Groupattr field if non-nil, zero value otherwise. ### GetGroupattrOk -`func (o *LDAPWriteAuthConfigRequest) GetGroupattrOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetGroupattrOk() (*string, bool)` GetGroupattrOk returns a tuple with the Groupattr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupattr -`func (o *LDAPWriteAuthConfigRequest) SetGroupattr(v string)` +`func (o *LdapConfigureAuthRequest) SetGroupattr(v string)` SetGroupattr sets Groupattr field to given value. ### HasGroupattr -`func (o *LDAPWriteAuthConfigRequest) HasGroupattr() bool` +`func (o *LdapConfigureAuthRequest) HasGroupattr() bool` HasGroupattr returns a boolean if a field has been set. @@ -355,27 +416,27 @@ HasGroupattr returns a boolean if a field has been set. ### GetGroupdn -`func (o *LDAPWriteAuthConfigRequest) GetGroupdn() string` +`func (o *LdapConfigureAuthRequest) GetGroupdn() string` GetGroupdn returns the Groupdn field if non-nil, zero value otherwise. ### GetGroupdnOk -`func (o *LDAPWriteAuthConfigRequest) GetGroupdnOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetGroupdnOk() (*string, bool)` GetGroupdnOk returns a tuple with the Groupdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupdn -`func (o *LDAPWriteAuthConfigRequest) SetGroupdn(v string)` +`func (o *LdapConfigureAuthRequest) SetGroupdn(v string)` SetGroupdn sets Groupdn field to given value. ### HasGroupdn -`func (o *LDAPWriteAuthConfigRequest) HasGroupdn() bool` +`func (o *LdapConfigureAuthRequest) HasGroupdn() bool` HasGroupdn returns a boolean if a field has been set. @@ -384,27 +445,27 @@ HasGroupdn returns a boolean if a field has been set. ### GetGroupfilter -`func (o *LDAPWriteAuthConfigRequest) GetGroupfilter() string` +`func (o *LdapConfigureAuthRequest) GetGroupfilter() string` GetGroupfilter returns the Groupfilter field if non-nil, zero value otherwise. ### GetGroupfilterOk -`func (o *LDAPWriteAuthConfigRequest) GetGroupfilterOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetGroupfilterOk() (*string, bool)` GetGroupfilterOk returns a tuple with the Groupfilter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupfilter -`func (o *LDAPWriteAuthConfigRequest) SetGroupfilter(v string)` +`func (o *LdapConfigureAuthRequest) SetGroupfilter(v string)` SetGroupfilter sets Groupfilter field to given value. ### HasGroupfilter -`func (o *LDAPWriteAuthConfigRequest) HasGroupfilter() bool` +`func (o *LdapConfigureAuthRequest) HasGroupfilter() bool` HasGroupfilter returns a boolean if a field has been set. @@ -413,56 +474,85 @@ HasGroupfilter returns a boolean if a field has been set. ### GetInsecureTls -`func (o *LDAPWriteAuthConfigRequest) GetInsecureTls() bool` +`func (o *LdapConfigureAuthRequest) GetInsecureTls() bool` GetInsecureTls returns the InsecureTls field if non-nil, zero value otherwise. ### GetInsecureTlsOk -`func (o *LDAPWriteAuthConfigRequest) GetInsecureTlsOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetInsecureTlsOk() (*bool, bool)` GetInsecureTlsOk returns a tuple with the InsecureTls field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInsecureTls -`func (o *LDAPWriteAuthConfigRequest) SetInsecureTls(v bool)` +`func (o *LdapConfigureAuthRequest) SetInsecureTls(v bool)` SetInsecureTls sets InsecureTls field to given value. ### HasInsecureTls -`func (o *LDAPWriteAuthConfigRequest) HasInsecureTls() bool` +`func (o *LdapConfigureAuthRequest) HasInsecureTls() bool` HasInsecureTls returns a boolean if a field has been set. +### GetMaxPageSize + +`func (o *LdapConfigureAuthRequest) GetMaxPageSize() int32` + +GetMaxPageSize returns the MaxPageSize field if non-nil, zero value otherwise. + +### GetMaxPageSizeOk + +`func (o *LdapConfigureAuthRequest) GetMaxPageSizeOk() (*int32, bool)` + +GetMaxPageSizeOk returns a tuple with the MaxPageSize field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxPageSize + +`func (o *LdapConfigureAuthRequest) SetMaxPageSize(v int32)` + +SetMaxPageSize sets MaxPageSize field to given value. + + +### HasMaxPageSize + +`func (o *LdapConfigureAuthRequest) HasMaxPageSize() bool` + +HasMaxPageSize returns a boolean if a field has been set. + + + + ### GetRequestTimeout -`func (o *LDAPWriteAuthConfigRequest) GetRequestTimeout() int32` +`func (o *LdapConfigureAuthRequest) GetRequestTimeout() int32` GetRequestTimeout returns the RequestTimeout field if non-nil, zero value otherwise. ### GetRequestTimeoutOk -`func (o *LDAPWriteAuthConfigRequest) GetRequestTimeoutOk() (*int32, bool)` +`func (o *LdapConfigureAuthRequest) GetRequestTimeoutOk() (*int32, bool)` GetRequestTimeoutOk returns a tuple with the RequestTimeout field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequestTimeout -`func (o *LDAPWriteAuthConfigRequest) SetRequestTimeout(v int32)` +`func (o *LdapConfigureAuthRequest) SetRequestTimeout(v int32)` SetRequestTimeout sets RequestTimeout field to given value. ### HasRequestTimeout -`func (o *LDAPWriteAuthConfigRequest) HasRequestTimeout() bool` +`func (o *LdapConfigureAuthRequest) HasRequestTimeout() bool` HasRequestTimeout returns a boolean if a field has been set. @@ -471,27 +561,27 @@ HasRequestTimeout returns a boolean if a field has been set. ### GetStarttls -`func (o *LDAPWriteAuthConfigRequest) GetStarttls() bool` +`func (o *LdapConfigureAuthRequest) GetStarttls() bool` GetStarttls returns the Starttls field if non-nil, zero value otherwise. ### GetStarttlsOk -`func (o *LDAPWriteAuthConfigRequest) GetStarttlsOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetStarttlsOk() (*bool, bool)` GetStarttlsOk returns a tuple with the Starttls field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStarttls -`func (o *LDAPWriteAuthConfigRequest) SetStarttls(v bool)` +`func (o *LdapConfigureAuthRequest) SetStarttls(v bool)` SetStarttls sets Starttls field to given value. ### HasStarttls -`func (o *LDAPWriteAuthConfigRequest) HasStarttls() bool` +`func (o *LdapConfigureAuthRequest) HasStarttls() bool` HasStarttls returns a boolean if a field has been set. @@ -500,27 +590,27 @@ HasStarttls returns a boolean if a field has been set. ### GetTlsMaxVersion -`func (o *LDAPWriteAuthConfigRequest) GetTlsMaxVersion() string` +`func (o *LdapConfigureAuthRequest) GetTlsMaxVersion() string` GetTlsMaxVersion returns the TlsMaxVersion field if non-nil, zero value otherwise. ### GetTlsMaxVersionOk -`func (o *LDAPWriteAuthConfigRequest) GetTlsMaxVersionOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetTlsMaxVersionOk() (*string, bool)` GetTlsMaxVersionOk returns a tuple with the TlsMaxVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTlsMaxVersion -`func (o *LDAPWriteAuthConfigRequest) SetTlsMaxVersion(v string)` +`func (o *LdapConfigureAuthRequest) SetTlsMaxVersion(v string)` SetTlsMaxVersion sets TlsMaxVersion field to given value. ### HasTlsMaxVersion -`func (o *LDAPWriteAuthConfigRequest) HasTlsMaxVersion() bool` +`func (o *LdapConfigureAuthRequest) HasTlsMaxVersion() bool` HasTlsMaxVersion returns a boolean if a field has been set. @@ -529,27 +619,27 @@ HasTlsMaxVersion returns a boolean if a field has been set. ### GetTlsMinVersion -`func (o *LDAPWriteAuthConfigRequest) GetTlsMinVersion() string` +`func (o *LdapConfigureAuthRequest) GetTlsMinVersion() string` GetTlsMinVersion returns the TlsMinVersion field if non-nil, zero value otherwise. ### GetTlsMinVersionOk -`func (o *LDAPWriteAuthConfigRequest) GetTlsMinVersionOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetTlsMinVersionOk() (*string, bool)` GetTlsMinVersionOk returns a tuple with the TlsMinVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTlsMinVersion -`func (o *LDAPWriteAuthConfigRequest) SetTlsMinVersion(v string)` +`func (o *LdapConfigureAuthRequest) SetTlsMinVersion(v string)` SetTlsMinVersion sets TlsMinVersion field to given value. ### HasTlsMinVersion -`func (o *LDAPWriteAuthConfigRequest) HasTlsMinVersion() bool` +`func (o *LdapConfigureAuthRequest) HasTlsMinVersion() bool` HasTlsMinVersion returns a boolean if a field has been set. @@ -558,27 +648,27 @@ HasTlsMinVersion returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *LDAPWriteAuthConfigRequest) GetTokenBoundCidrs() []string` +`func (o *LdapConfigureAuthRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *LDAPWriteAuthConfigRequest) SetTokenBoundCidrs(v []string)` +`func (o *LdapConfigureAuthRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *LDAPWriteAuthConfigRequest) HasTokenBoundCidrs() bool` +`func (o *LdapConfigureAuthRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -587,27 +677,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *LDAPWriteAuthConfigRequest) GetTokenExplicitMaxTtl() int32` +`func (o *LdapConfigureAuthRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *LDAPWriteAuthConfigRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *LdapConfigureAuthRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *LDAPWriteAuthConfigRequest) HasTokenExplicitMaxTtl() bool` +`func (o *LdapConfigureAuthRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -616,27 +706,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *LDAPWriteAuthConfigRequest) GetTokenMaxTtl() int32` +`func (o *LdapConfigureAuthRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *LDAPWriteAuthConfigRequest) SetTokenMaxTtl(v int32)` +`func (o *LdapConfigureAuthRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *LDAPWriteAuthConfigRequest) HasTokenMaxTtl() bool` +`func (o *LdapConfigureAuthRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -645,27 +735,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *LDAPWriteAuthConfigRequest) GetTokenNoDefaultPolicy() bool` +`func (o *LdapConfigureAuthRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *LDAPWriteAuthConfigRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *LdapConfigureAuthRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *LDAPWriteAuthConfigRequest) HasTokenNoDefaultPolicy() bool` +`func (o *LdapConfigureAuthRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -674,27 +764,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *LDAPWriteAuthConfigRequest) GetTokenNumUses() int32` +`func (o *LdapConfigureAuthRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *LDAPWriteAuthConfigRequest) SetTokenNumUses(v int32)` +`func (o *LdapConfigureAuthRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *LDAPWriteAuthConfigRequest) HasTokenNumUses() bool` +`func (o *LdapConfigureAuthRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -703,27 +793,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *LDAPWriteAuthConfigRequest) GetTokenPeriod() int32` +`func (o *LdapConfigureAuthRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *LDAPWriteAuthConfigRequest) SetTokenPeriod(v int32)` +`func (o *LdapConfigureAuthRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *LDAPWriteAuthConfigRequest) HasTokenPeriod() bool` +`func (o *LdapConfigureAuthRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -732,27 +822,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *LDAPWriteAuthConfigRequest) GetTokenPolicies() []string` +`func (o *LdapConfigureAuthRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *LDAPWriteAuthConfigRequest) SetTokenPolicies(v []string)` +`func (o *LdapConfigureAuthRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *LDAPWriteAuthConfigRequest) HasTokenPolicies() bool` +`func (o *LdapConfigureAuthRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -761,27 +851,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *LDAPWriteAuthConfigRequest) GetTokenTtl() int32` +`func (o *LdapConfigureAuthRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *LDAPWriteAuthConfigRequest) SetTokenTtl(v int32)` +`func (o *LdapConfigureAuthRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *LDAPWriteAuthConfigRequest) HasTokenTtl() bool` +`func (o *LdapConfigureAuthRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -790,27 +880,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *LDAPWriteAuthConfigRequest) GetTokenType() string` +`func (o *LdapConfigureAuthRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *LDAPWriteAuthConfigRequest) GetTokenTypeOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *LDAPWriteAuthConfigRequest) SetTokenType(v string)` +`func (o *LdapConfigureAuthRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *LDAPWriteAuthConfigRequest) HasTokenType() bool` +`func (o *LdapConfigureAuthRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -819,27 +909,27 @@ HasTokenType returns a boolean if a field has been set. ### GetUpndomain -`func (o *LDAPWriteAuthConfigRequest) GetUpndomain() string` +`func (o *LdapConfigureAuthRequest) GetUpndomain() string` GetUpndomain returns the Upndomain field if non-nil, zero value otherwise. ### GetUpndomainOk -`func (o *LDAPWriteAuthConfigRequest) GetUpndomainOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetUpndomainOk() (*string, bool)` GetUpndomainOk returns a tuple with the Upndomain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUpndomain -`func (o *LDAPWriteAuthConfigRequest) SetUpndomain(v string)` +`func (o *LdapConfigureAuthRequest) SetUpndomain(v string)` SetUpndomain sets Upndomain field to given value. ### HasUpndomain -`func (o *LDAPWriteAuthConfigRequest) HasUpndomain() bool` +`func (o *LdapConfigureAuthRequest) HasUpndomain() bool` HasUpndomain returns a boolean if a field has been set. @@ -848,27 +938,27 @@ HasUpndomain returns a boolean if a field has been set. ### GetUrl -`func (o *LDAPWriteAuthConfigRequest) GetUrl() string` +`func (o *LdapConfigureAuthRequest) GetUrl() string` GetUrl returns the Url field if non-nil, zero value otherwise. ### GetUrlOk -`func (o *LDAPWriteAuthConfigRequest) GetUrlOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetUrlOk() (*string, bool)` GetUrlOk returns a tuple with the Url field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrl -`func (o *LDAPWriteAuthConfigRequest) SetUrl(v string)` +`func (o *LdapConfigureAuthRequest) SetUrl(v string)` SetUrl sets Url field to given value. ### HasUrl -`func (o *LDAPWriteAuthConfigRequest) HasUrl() bool` +`func (o *LdapConfigureAuthRequest) HasUrl() bool` HasUrl returns a boolean if a field has been set. @@ -877,27 +967,27 @@ HasUrl returns a boolean if a field has been set. ### GetUsePre111GroupCnBehavior -`func (o *LDAPWriteAuthConfigRequest) GetUsePre111GroupCnBehavior() bool` +`func (o *LdapConfigureAuthRequest) GetUsePre111GroupCnBehavior() bool` GetUsePre111GroupCnBehavior returns the UsePre111GroupCnBehavior field if non-nil, zero value otherwise. ### GetUsePre111GroupCnBehaviorOk -`func (o *LDAPWriteAuthConfigRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` GetUsePre111GroupCnBehaviorOk returns a tuple with the UsePre111GroupCnBehavior field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePre111GroupCnBehavior -`func (o *LDAPWriteAuthConfigRequest) SetUsePre111GroupCnBehavior(v bool)` +`func (o *LdapConfigureAuthRequest) SetUsePre111GroupCnBehavior(v bool)` SetUsePre111GroupCnBehavior sets UsePre111GroupCnBehavior field to given value. ### HasUsePre111GroupCnBehavior -`func (o *LDAPWriteAuthConfigRequest) HasUsePre111GroupCnBehavior() bool` +`func (o *LdapConfigureAuthRequest) HasUsePre111GroupCnBehavior() bool` HasUsePre111GroupCnBehavior returns a boolean if a field has been set. @@ -906,27 +996,27 @@ HasUsePre111GroupCnBehavior returns a boolean if a field has been set. ### GetUseTokenGroups -`func (o *LDAPWriteAuthConfigRequest) GetUseTokenGroups() bool` +`func (o *LdapConfigureAuthRequest) GetUseTokenGroups() bool` GetUseTokenGroups returns the UseTokenGroups field if non-nil, zero value otherwise. ### GetUseTokenGroupsOk -`func (o *LDAPWriteAuthConfigRequest) GetUseTokenGroupsOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetUseTokenGroupsOk() (*bool, bool)` GetUseTokenGroupsOk returns a tuple with the UseTokenGroups field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUseTokenGroups -`func (o *LDAPWriteAuthConfigRequest) SetUseTokenGroups(v bool)` +`func (o *LdapConfigureAuthRequest) SetUseTokenGroups(v bool)` SetUseTokenGroups sets UseTokenGroups field to given value. ### HasUseTokenGroups -`func (o *LDAPWriteAuthConfigRequest) HasUseTokenGroups() bool` +`func (o *LdapConfigureAuthRequest) HasUseTokenGroups() bool` HasUseTokenGroups returns a boolean if a field has been set. @@ -935,27 +1025,27 @@ HasUseTokenGroups returns a boolean if a field has been set. ### GetUserattr -`func (o *LDAPWriteAuthConfigRequest) GetUserattr() string` +`func (o *LdapConfigureAuthRequest) GetUserattr() string` GetUserattr returns the Userattr field if non-nil, zero value otherwise. ### GetUserattrOk -`func (o *LDAPWriteAuthConfigRequest) GetUserattrOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetUserattrOk() (*string, bool)` GetUserattrOk returns a tuple with the Userattr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserattr -`func (o *LDAPWriteAuthConfigRequest) SetUserattr(v string)` +`func (o *LdapConfigureAuthRequest) SetUserattr(v string)` SetUserattr sets Userattr field to given value. ### HasUserattr -`func (o *LDAPWriteAuthConfigRequest) HasUserattr() bool` +`func (o *LdapConfigureAuthRequest) HasUserattr() bool` HasUserattr returns a boolean if a field has been set. @@ -964,27 +1054,27 @@ HasUserattr returns a boolean if a field has been set. ### GetUserdn -`func (o *LDAPWriteAuthConfigRequest) GetUserdn() string` +`func (o *LdapConfigureAuthRequest) GetUserdn() string` GetUserdn returns the Userdn field if non-nil, zero value otherwise. ### GetUserdnOk -`func (o *LDAPWriteAuthConfigRequest) GetUserdnOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetUserdnOk() (*string, bool)` GetUserdnOk returns a tuple with the Userdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserdn -`func (o *LDAPWriteAuthConfigRequest) SetUserdn(v string)` +`func (o *LdapConfigureAuthRequest) SetUserdn(v string)` SetUserdn sets Userdn field to given value. ### HasUserdn -`func (o *LDAPWriteAuthConfigRequest) HasUserdn() bool` +`func (o *LdapConfigureAuthRequest) HasUserdn() bool` HasUserdn returns a boolean if a field has been set. @@ -993,27 +1083,27 @@ HasUserdn returns a boolean if a field has been set. ### GetUserfilter -`func (o *LDAPWriteAuthConfigRequest) GetUserfilter() string` +`func (o *LdapConfigureAuthRequest) GetUserfilter() string` GetUserfilter returns the Userfilter field if non-nil, zero value otherwise. ### GetUserfilterOk -`func (o *LDAPWriteAuthConfigRequest) GetUserfilterOk() (*string, bool)` +`func (o *LdapConfigureAuthRequest) GetUserfilterOk() (*string, bool)` GetUserfilterOk returns a tuple with the Userfilter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserfilter -`func (o *LDAPWriteAuthConfigRequest) SetUserfilter(v string)` +`func (o *LdapConfigureAuthRequest) SetUserfilter(v string)` SetUserfilter sets Userfilter field to given value. ### HasUserfilter -`func (o *LDAPWriteAuthConfigRequest) HasUserfilter() bool` +`func (o *LdapConfigureAuthRequest) HasUserfilter() bool` HasUserfilter returns a boolean if a field has been set. @@ -1022,27 +1112,27 @@ HasUserfilter returns a boolean if a field has been set. ### GetUsernameAsAlias -`func (o *LDAPWriteAuthConfigRequest) GetUsernameAsAlias() bool` +`func (o *LdapConfigureAuthRequest) GetUsernameAsAlias() bool` GetUsernameAsAlias returns the UsernameAsAlias field if non-nil, zero value otherwise. ### GetUsernameAsAliasOk -`func (o *LDAPWriteAuthConfigRequest) GetUsernameAsAliasOk() (*bool, bool)` +`func (o *LdapConfigureAuthRequest) GetUsernameAsAliasOk() (*bool, bool)` GetUsernameAsAliasOk returns a tuple with the UsernameAsAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameAsAlias -`func (o *LDAPWriteAuthConfigRequest) SetUsernameAsAlias(v bool)` +`func (o *LdapConfigureAuthRequest) SetUsernameAsAlias(v bool)` SetUsernameAsAlias sets UsernameAsAlias field to given value. ### HasUsernameAsAlias -`func (o *LDAPWriteAuthConfigRequest) HasUsernameAsAlias() bool` +`func (o *LdapConfigureAuthRequest) HasUsernameAsAlias() bool` HasUsernameAsAlias returns a boolean if a field has been set. diff --git a/docs/OpenLDAPWriteConfigRequest.md b/docs/LdapConfigureRequest.md similarity index 64% rename from docs/OpenLDAPWriteConfigRequest.md rename to docs/LdapConfigureRequest.md index 2004a3c4..333c0ea1 100644 --- a/docs/OpenLDAPWriteConfigRequest.md +++ b/docs/LdapConfigureRequest.md @@ -1,4 +1,4 @@ -# OpenLDAPWriteConfigRequest +# LdapConfigureRequest ## Properties @@ -12,13 +12,16 @@ Name | Type | Description | Notes **Certificate** | Pointer to **string** | CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) | [optional] **ClientTlsCert** | Pointer to **string** | Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] **ClientTlsKey** | Pointer to **string** | Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) | [optional] +**ConnectionTimeout** | Pointer to **int32** | Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. | [optional] **DenyNullBind** | Pointer to **bool** | Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true | [optional] [default to true] +**DereferenceAliases** | Pointer to **string** | When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'. | [optional] [default to "never"] **Discoverdn** | Pointer to **bool** | Use anonymous bind to discover the bind DN of a user (optional) | [optional] **Groupattr** | Pointer to **string** | LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn | [optional] [default to "cn"] **Groupdn** | Pointer to **string** | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) | [optional] **Groupfilter** | Pointer to **string** | Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) | [optional] [default to "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))"] **InsecureTls** | Pointer to **bool** | Skip LDAP server SSL Certificate verification - VERY insecure (optional) | [optional] **Length** | Pointer to **int32** | The desired length of passwords that Vault generates. | [optional] +**MaxPageSize** | Pointer to **int32** | The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged. | [optional] [default to 2147483647] **MaxTtl** | Pointer to **int32** | The maximum password time-to-live. | [optional] **PasswordPolicy** | Pointer to **string** | Password policy to use to generate passwords | [optional] **RequestTimeout** | Pointer to **int32** | Timeout, in seconds, for the connection when making requests against the server before returning back an error. | [optional] @@ -41,47 +44,47 @@ Name | Type | Description | Notes ## Methods -### NewOpenLDAPWriteConfigRequest +### NewLdapConfigureRequest -`func NewOpenLDAPWriteConfigRequest() *OpenLDAPWriteConfigRequest` +`func NewLdapConfigureRequest() *LdapConfigureRequest` -NewOpenLDAPWriteConfigRequest instantiates a new OpenLDAPWriteConfigRequest object +NewLdapConfigureRequest instantiates a new LdapConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOpenLDAPWriteConfigRequestWithDefaults +### NewLdapConfigureRequestWithDefaults -`func NewOpenLDAPWriteConfigRequestWithDefaults() *OpenLDAPWriteConfigRequest` +`func NewLdapConfigureRequestWithDefaults() *LdapConfigureRequest` -NewOpenLDAPWriteConfigRequestWithDefaults instantiates a new OpenLDAPWriteConfigRequest object +NewLdapConfigureRequestWithDefaults instantiates a new LdapConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAnonymousGroupSearch -`func (o *OpenLDAPWriteConfigRequest) GetAnonymousGroupSearch() bool` +`func (o *LdapConfigureRequest) GetAnonymousGroupSearch() bool` GetAnonymousGroupSearch returns the AnonymousGroupSearch field if non-nil, zero value otherwise. ### GetAnonymousGroupSearchOk -`func (o *OpenLDAPWriteConfigRequest) GetAnonymousGroupSearchOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetAnonymousGroupSearchOk() (*bool, bool)` GetAnonymousGroupSearchOk returns a tuple with the AnonymousGroupSearch field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAnonymousGroupSearch -`func (o *OpenLDAPWriteConfigRequest) SetAnonymousGroupSearch(v bool)` +`func (o *LdapConfigureRequest) SetAnonymousGroupSearch(v bool)` SetAnonymousGroupSearch sets AnonymousGroupSearch field to given value. ### HasAnonymousGroupSearch -`func (o *OpenLDAPWriteConfigRequest) HasAnonymousGroupSearch() bool` +`func (o *LdapConfigureRequest) HasAnonymousGroupSearch() bool` HasAnonymousGroupSearch returns a boolean if a field has been set. @@ -90,27 +93,27 @@ HasAnonymousGroupSearch returns a boolean if a field has been set. ### GetBinddn -`func (o *OpenLDAPWriteConfigRequest) GetBinddn() string` +`func (o *LdapConfigureRequest) GetBinddn() string` GetBinddn returns the Binddn field if non-nil, zero value otherwise. ### GetBinddnOk -`func (o *OpenLDAPWriteConfigRequest) GetBinddnOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetBinddnOk() (*string, bool)` GetBinddnOk returns a tuple with the Binddn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBinddn -`func (o *OpenLDAPWriteConfigRequest) SetBinddn(v string)` +`func (o *LdapConfigureRequest) SetBinddn(v string)` SetBinddn sets Binddn field to given value. ### HasBinddn -`func (o *OpenLDAPWriteConfigRequest) HasBinddn() bool` +`func (o *LdapConfigureRequest) HasBinddn() bool` HasBinddn returns a boolean if a field has been set. @@ -119,27 +122,27 @@ HasBinddn returns a boolean if a field has been set. ### GetBindpass -`func (o *OpenLDAPWriteConfigRequest) GetBindpass() string` +`func (o *LdapConfigureRequest) GetBindpass() string` GetBindpass returns the Bindpass field if non-nil, zero value otherwise. ### GetBindpassOk -`func (o *OpenLDAPWriteConfigRequest) GetBindpassOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetBindpassOk() (*string, bool)` GetBindpassOk returns a tuple with the Bindpass field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBindpass -`func (o *OpenLDAPWriteConfigRequest) SetBindpass(v string)` +`func (o *LdapConfigureRequest) SetBindpass(v string)` SetBindpass sets Bindpass field to given value. ### HasBindpass -`func (o *OpenLDAPWriteConfigRequest) HasBindpass() bool` +`func (o *LdapConfigureRequest) HasBindpass() bool` HasBindpass returns a boolean if a field has been set. @@ -148,27 +151,27 @@ HasBindpass returns a boolean if a field has been set. ### GetCaseSensitiveNames -`func (o *OpenLDAPWriteConfigRequest) GetCaseSensitiveNames() bool` +`func (o *LdapConfigureRequest) GetCaseSensitiveNames() bool` GetCaseSensitiveNames returns the CaseSensitiveNames field if non-nil, zero value otherwise. ### GetCaseSensitiveNamesOk -`func (o *OpenLDAPWriteConfigRequest) GetCaseSensitiveNamesOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetCaseSensitiveNamesOk() (*bool, bool)` GetCaseSensitiveNamesOk returns a tuple with the CaseSensitiveNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCaseSensitiveNames -`func (o *OpenLDAPWriteConfigRequest) SetCaseSensitiveNames(v bool)` +`func (o *LdapConfigureRequest) SetCaseSensitiveNames(v bool)` SetCaseSensitiveNames sets CaseSensitiveNames field to given value. ### HasCaseSensitiveNames -`func (o *OpenLDAPWriteConfigRequest) HasCaseSensitiveNames() bool` +`func (o *LdapConfigureRequest) HasCaseSensitiveNames() bool` HasCaseSensitiveNames returns a boolean if a field has been set. @@ -177,27 +180,27 @@ HasCaseSensitiveNames returns a boolean if a field has been set. ### GetCertificate -`func (o *OpenLDAPWriteConfigRequest) GetCertificate() string` +`func (o *LdapConfigureRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *OpenLDAPWriteConfigRequest) GetCertificateOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *OpenLDAPWriteConfigRequest) SetCertificate(v string)` +`func (o *LdapConfigureRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *OpenLDAPWriteConfigRequest) HasCertificate() bool` +`func (o *LdapConfigureRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -206,27 +209,27 @@ HasCertificate returns a boolean if a field has been set. ### GetClientTlsCert -`func (o *OpenLDAPWriteConfigRequest) GetClientTlsCert() string` +`func (o *LdapConfigureRequest) GetClientTlsCert() string` GetClientTlsCert returns the ClientTlsCert field if non-nil, zero value otherwise. ### GetClientTlsCertOk -`func (o *OpenLDAPWriteConfigRequest) GetClientTlsCertOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetClientTlsCertOk() (*string, bool)` GetClientTlsCertOk returns a tuple with the ClientTlsCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientTlsCert -`func (o *OpenLDAPWriteConfigRequest) SetClientTlsCert(v string)` +`func (o *LdapConfigureRequest) SetClientTlsCert(v string)` SetClientTlsCert sets ClientTlsCert field to given value. ### HasClientTlsCert -`func (o *OpenLDAPWriteConfigRequest) HasClientTlsCert() bool` +`func (o *LdapConfigureRequest) HasClientTlsCert() bool` HasClientTlsCert returns a boolean if a field has been set. @@ -235,85 +238,143 @@ HasClientTlsCert returns a boolean if a field has been set. ### GetClientTlsKey -`func (o *OpenLDAPWriteConfigRequest) GetClientTlsKey() string` +`func (o *LdapConfigureRequest) GetClientTlsKey() string` GetClientTlsKey returns the ClientTlsKey field if non-nil, zero value otherwise. ### GetClientTlsKeyOk -`func (o *OpenLDAPWriteConfigRequest) GetClientTlsKeyOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetClientTlsKeyOk() (*string, bool)` GetClientTlsKeyOk returns a tuple with the ClientTlsKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientTlsKey -`func (o *OpenLDAPWriteConfigRequest) SetClientTlsKey(v string)` +`func (o *LdapConfigureRequest) SetClientTlsKey(v string)` SetClientTlsKey sets ClientTlsKey field to given value. ### HasClientTlsKey -`func (o *OpenLDAPWriteConfigRequest) HasClientTlsKey() bool` +`func (o *LdapConfigureRequest) HasClientTlsKey() bool` HasClientTlsKey returns a boolean if a field has been set. +### GetConnectionTimeout + +`func (o *LdapConfigureRequest) GetConnectionTimeout() int32` + +GetConnectionTimeout returns the ConnectionTimeout field if non-nil, zero value otherwise. + +### GetConnectionTimeoutOk + +`func (o *LdapConfigureRequest) GetConnectionTimeoutOk() (*int32, bool)` + +GetConnectionTimeoutOk returns a tuple with the ConnectionTimeout field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetConnectionTimeout + +`func (o *LdapConfigureRequest) SetConnectionTimeout(v int32)` + +SetConnectionTimeout sets ConnectionTimeout field to given value. + + +### HasConnectionTimeout + +`func (o *LdapConfigureRequest) HasConnectionTimeout() bool` + +HasConnectionTimeout returns a boolean if a field has been set. + + + + ### GetDenyNullBind -`func (o *OpenLDAPWriteConfigRequest) GetDenyNullBind() bool` +`func (o *LdapConfigureRequest) GetDenyNullBind() bool` GetDenyNullBind returns the DenyNullBind field if non-nil, zero value otherwise. ### GetDenyNullBindOk -`func (o *OpenLDAPWriteConfigRequest) GetDenyNullBindOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetDenyNullBindOk() (*bool, bool)` GetDenyNullBindOk returns a tuple with the DenyNullBind field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDenyNullBind -`func (o *OpenLDAPWriteConfigRequest) SetDenyNullBind(v bool)` +`func (o *LdapConfigureRequest) SetDenyNullBind(v bool)` SetDenyNullBind sets DenyNullBind field to given value. ### HasDenyNullBind -`func (o *OpenLDAPWriteConfigRequest) HasDenyNullBind() bool` +`func (o *LdapConfigureRequest) HasDenyNullBind() bool` HasDenyNullBind returns a boolean if a field has been set. +### GetDereferenceAliases + +`func (o *LdapConfigureRequest) GetDereferenceAliases() string` + +GetDereferenceAliases returns the DereferenceAliases field if non-nil, zero value otherwise. + +### GetDereferenceAliasesOk + +`func (o *LdapConfigureRequest) GetDereferenceAliasesOk() (*string, bool)` + +GetDereferenceAliasesOk returns a tuple with the DereferenceAliases field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDereferenceAliases + +`func (o *LdapConfigureRequest) SetDereferenceAliases(v string)` + +SetDereferenceAliases sets DereferenceAliases field to given value. + + +### HasDereferenceAliases + +`func (o *LdapConfigureRequest) HasDereferenceAliases() bool` + +HasDereferenceAliases returns a boolean if a field has been set. + + + + ### GetDiscoverdn -`func (o *OpenLDAPWriteConfigRequest) GetDiscoverdn() bool` +`func (o *LdapConfigureRequest) GetDiscoverdn() bool` GetDiscoverdn returns the Discoverdn field if non-nil, zero value otherwise. ### GetDiscoverdnOk -`func (o *OpenLDAPWriteConfigRequest) GetDiscoverdnOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetDiscoverdnOk() (*bool, bool)` GetDiscoverdnOk returns a tuple with the Discoverdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDiscoverdn -`func (o *OpenLDAPWriteConfigRequest) SetDiscoverdn(v bool)` +`func (o *LdapConfigureRequest) SetDiscoverdn(v bool)` SetDiscoverdn sets Discoverdn field to given value. ### HasDiscoverdn -`func (o *OpenLDAPWriteConfigRequest) HasDiscoverdn() bool` +`func (o *LdapConfigureRequest) HasDiscoverdn() bool` HasDiscoverdn returns a boolean if a field has been set. @@ -322,27 +383,27 @@ HasDiscoverdn returns a boolean if a field has been set. ### GetGroupattr -`func (o *OpenLDAPWriteConfigRequest) GetGroupattr() string` +`func (o *LdapConfigureRequest) GetGroupattr() string` GetGroupattr returns the Groupattr field if non-nil, zero value otherwise. ### GetGroupattrOk -`func (o *OpenLDAPWriteConfigRequest) GetGroupattrOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetGroupattrOk() (*string, bool)` GetGroupattrOk returns a tuple with the Groupattr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupattr -`func (o *OpenLDAPWriteConfigRequest) SetGroupattr(v string)` +`func (o *LdapConfigureRequest) SetGroupattr(v string)` SetGroupattr sets Groupattr field to given value. ### HasGroupattr -`func (o *OpenLDAPWriteConfigRequest) HasGroupattr() bool` +`func (o *LdapConfigureRequest) HasGroupattr() bool` HasGroupattr returns a boolean if a field has been set. @@ -351,27 +412,27 @@ HasGroupattr returns a boolean if a field has been set. ### GetGroupdn -`func (o *OpenLDAPWriteConfigRequest) GetGroupdn() string` +`func (o *LdapConfigureRequest) GetGroupdn() string` GetGroupdn returns the Groupdn field if non-nil, zero value otherwise. ### GetGroupdnOk -`func (o *OpenLDAPWriteConfigRequest) GetGroupdnOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetGroupdnOk() (*string, bool)` GetGroupdnOk returns a tuple with the Groupdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupdn -`func (o *OpenLDAPWriteConfigRequest) SetGroupdn(v string)` +`func (o *LdapConfigureRequest) SetGroupdn(v string)` SetGroupdn sets Groupdn field to given value. ### HasGroupdn -`func (o *OpenLDAPWriteConfigRequest) HasGroupdn() bool` +`func (o *LdapConfigureRequest) HasGroupdn() bool` HasGroupdn returns a boolean if a field has been set. @@ -380,27 +441,27 @@ HasGroupdn returns a boolean if a field has been set. ### GetGroupfilter -`func (o *OpenLDAPWriteConfigRequest) GetGroupfilter() string` +`func (o *LdapConfigureRequest) GetGroupfilter() string` GetGroupfilter returns the Groupfilter field if non-nil, zero value otherwise. ### GetGroupfilterOk -`func (o *OpenLDAPWriteConfigRequest) GetGroupfilterOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetGroupfilterOk() (*string, bool)` GetGroupfilterOk returns a tuple with the Groupfilter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupfilter -`func (o *OpenLDAPWriteConfigRequest) SetGroupfilter(v string)` +`func (o *LdapConfigureRequest) SetGroupfilter(v string)` SetGroupfilter sets Groupfilter field to given value. ### HasGroupfilter -`func (o *OpenLDAPWriteConfigRequest) HasGroupfilter() bool` +`func (o *LdapConfigureRequest) HasGroupfilter() bool` HasGroupfilter returns a boolean if a field has been set. @@ -409,27 +470,27 @@ HasGroupfilter returns a boolean if a field has been set. ### GetInsecureTls -`func (o *OpenLDAPWriteConfigRequest) GetInsecureTls() bool` +`func (o *LdapConfigureRequest) GetInsecureTls() bool` GetInsecureTls returns the InsecureTls field if non-nil, zero value otherwise. ### GetInsecureTlsOk -`func (o *OpenLDAPWriteConfigRequest) GetInsecureTlsOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetInsecureTlsOk() (*bool, bool)` GetInsecureTlsOk returns a tuple with the InsecureTls field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInsecureTls -`func (o *OpenLDAPWriteConfigRequest) SetInsecureTls(v bool)` +`func (o *LdapConfigureRequest) SetInsecureTls(v bool)` SetInsecureTls sets InsecureTls field to given value. ### HasInsecureTls -`func (o *OpenLDAPWriteConfigRequest) HasInsecureTls() bool` +`func (o *LdapConfigureRequest) HasInsecureTls() bool` HasInsecureTls returns a boolean if a field has been set. @@ -438,56 +499,85 @@ HasInsecureTls returns a boolean if a field has been set. ### GetLength -`func (o *OpenLDAPWriteConfigRequest) GetLength() int32` +`func (o *LdapConfigureRequest) GetLength() int32` GetLength returns the Length field if non-nil, zero value otherwise. ### GetLengthOk -`func (o *OpenLDAPWriteConfigRequest) GetLengthOk() (*int32, bool)` +`func (o *LdapConfigureRequest) GetLengthOk() (*int32, bool)` GetLengthOk returns a tuple with the Length field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLength -`func (o *OpenLDAPWriteConfigRequest) SetLength(v int32)` +`func (o *LdapConfigureRequest) SetLength(v int32)` SetLength sets Length field to given value. ### HasLength -`func (o *OpenLDAPWriteConfigRequest) HasLength() bool` +`func (o *LdapConfigureRequest) HasLength() bool` HasLength returns a boolean if a field has been set. +### GetMaxPageSize + +`func (o *LdapConfigureRequest) GetMaxPageSize() int32` + +GetMaxPageSize returns the MaxPageSize field if non-nil, zero value otherwise. + +### GetMaxPageSizeOk + +`func (o *LdapConfigureRequest) GetMaxPageSizeOk() (*int32, bool)` + +GetMaxPageSizeOk returns a tuple with the MaxPageSize field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxPageSize + +`func (o *LdapConfigureRequest) SetMaxPageSize(v int32)` + +SetMaxPageSize sets MaxPageSize field to given value. + + +### HasMaxPageSize + +`func (o *LdapConfigureRequest) HasMaxPageSize() bool` + +HasMaxPageSize returns a boolean if a field has been set. + + + + ### GetMaxTtl -`func (o *OpenLDAPWriteConfigRequest) GetMaxTtl() int32` +`func (o *LdapConfigureRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *OpenLDAPWriteConfigRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *LdapConfigureRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *OpenLDAPWriteConfigRequest) SetMaxTtl(v int32)` +`func (o *LdapConfigureRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *OpenLDAPWriteConfigRequest) HasMaxTtl() bool` +`func (o *LdapConfigureRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -496,27 +586,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetPasswordPolicy -`func (o *OpenLDAPWriteConfigRequest) GetPasswordPolicy() string` +`func (o *LdapConfigureRequest) GetPasswordPolicy() string` GetPasswordPolicy returns the PasswordPolicy field if non-nil, zero value otherwise. ### GetPasswordPolicyOk -`func (o *OpenLDAPWriteConfigRequest) GetPasswordPolicyOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetPasswordPolicyOk() (*string, bool)` GetPasswordPolicyOk returns a tuple with the PasswordPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPasswordPolicy -`func (o *OpenLDAPWriteConfigRequest) SetPasswordPolicy(v string)` +`func (o *LdapConfigureRequest) SetPasswordPolicy(v string)` SetPasswordPolicy sets PasswordPolicy field to given value. ### HasPasswordPolicy -`func (o *OpenLDAPWriteConfigRequest) HasPasswordPolicy() bool` +`func (o *LdapConfigureRequest) HasPasswordPolicy() bool` HasPasswordPolicy returns a boolean if a field has been set. @@ -525,27 +615,27 @@ HasPasswordPolicy returns a boolean if a field has been set. ### GetRequestTimeout -`func (o *OpenLDAPWriteConfigRequest) GetRequestTimeout() int32` +`func (o *LdapConfigureRequest) GetRequestTimeout() int32` GetRequestTimeout returns the RequestTimeout field if non-nil, zero value otherwise. ### GetRequestTimeoutOk -`func (o *OpenLDAPWriteConfigRequest) GetRequestTimeoutOk() (*int32, bool)` +`func (o *LdapConfigureRequest) GetRequestTimeoutOk() (*int32, bool)` GetRequestTimeoutOk returns a tuple with the RequestTimeout field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequestTimeout -`func (o *OpenLDAPWriteConfigRequest) SetRequestTimeout(v int32)` +`func (o *LdapConfigureRequest) SetRequestTimeout(v int32)` SetRequestTimeout sets RequestTimeout field to given value. ### HasRequestTimeout -`func (o *OpenLDAPWriteConfigRequest) HasRequestTimeout() bool` +`func (o *LdapConfigureRequest) HasRequestTimeout() bool` HasRequestTimeout returns a boolean if a field has been set. @@ -554,27 +644,27 @@ HasRequestTimeout returns a boolean if a field has been set. ### GetSchema -`func (o *OpenLDAPWriteConfigRequest) GetSchema() string` +`func (o *LdapConfigureRequest) GetSchema() string` GetSchema returns the Schema field if non-nil, zero value otherwise. ### GetSchemaOk -`func (o *OpenLDAPWriteConfigRequest) GetSchemaOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetSchemaOk() (*string, bool)` GetSchemaOk returns a tuple with the Schema field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSchema -`func (o *OpenLDAPWriteConfigRequest) SetSchema(v string)` +`func (o *LdapConfigureRequest) SetSchema(v string)` SetSchema sets Schema field to given value. ### HasSchema -`func (o *OpenLDAPWriteConfigRequest) HasSchema() bool` +`func (o *LdapConfigureRequest) HasSchema() bool` HasSchema returns a boolean if a field has been set. @@ -583,27 +673,27 @@ HasSchema returns a boolean if a field has been set. ### GetStarttls -`func (o *OpenLDAPWriteConfigRequest) GetStarttls() bool` +`func (o *LdapConfigureRequest) GetStarttls() bool` GetStarttls returns the Starttls field if non-nil, zero value otherwise. ### GetStarttlsOk -`func (o *OpenLDAPWriteConfigRequest) GetStarttlsOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetStarttlsOk() (*bool, bool)` GetStarttlsOk returns a tuple with the Starttls field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStarttls -`func (o *OpenLDAPWriteConfigRequest) SetStarttls(v bool)` +`func (o *LdapConfigureRequest) SetStarttls(v bool)` SetStarttls sets Starttls field to given value. ### HasStarttls -`func (o *OpenLDAPWriteConfigRequest) HasStarttls() bool` +`func (o *LdapConfigureRequest) HasStarttls() bool` HasStarttls returns a boolean if a field has been set. @@ -612,27 +702,27 @@ HasStarttls returns a boolean if a field has been set. ### GetTlsMaxVersion -`func (o *OpenLDAPWriteConfigRequest) GetTlsMaxVersion() string` +`func (o *LdapConfigureRequest) GetTlsMaxVersion() string` GetTlsMaxVersion returns the TlsMaxVersion field if non-nil, zero value otherwise. ### GetTlsMaxVersionOk -`func (o *OpenLDAPWriteConfigRequest) GetTlsMaxVersionOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetTlsMaxVersionOk() (*string, bool)` GetTlsMaxVersionOk returns a tuple with the TlsMaxVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTlsMaxVersion -`func (o *OpenLDAPWriteConfigRequest) SetTlsMaxVersion(v string)` +`func (o *LdapConfigureRequest) SetTlsMaxVersion(v string)` SetTlsMaxVersion sets TlsMaxVersion field to given value. ### HasTlsMaxVersion -`func (o *OpenLDAPWriteConfigRequest) HasTlsMaxVersion() bool` +`func (o *LdapConfigureRequest) HasTlsMaxVersion() bool` HasTlsMaxVersion returns a boolean if a field has been set. @@ -641,27 +731,27 @@ HasTlsMaxVersion returns a boolean if a field has been set. ### GetTlsMinVersion -`func (o *OpenLDAPWriteConfigRequest) GetTlsMinVersion() string` +`func (o *LdapConfigureRequest) GetTlsMinVersion() string` GetTlsMinVersion returns the TlsMinVersion field if non-nil, zero value otherwise. ### GetTlsMinVersionOk -`func (o *OpenLDAPWriteConfigRequest) GetTlsMinVersionOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetTlsMinVersionOk() (*string, bool)` GetTlsMinVersionOk returns a tuple with the TlsMinVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTlsMinVersion -`func (o *OpenLDAPWriteConfigRequest) SetTlsMinVersion(v string)` +`func (o *LdapConfigureRequest) SetTlsMinVersion(v string)` SetTlsMinVersion sets TlsMinVersion field to given value. ### HasTlsMinVersion -`func (o *OpenLDAPWriteConfigRequest) HasTlsMinVersion() bool` +`func (o *LdapConfigureRequest) HasTlsMinVersion() bool` HasTlsMinVersion returns a boolean if a field has been set. @@ -670,27 +760,27 @@ HasTlsMinVersion returns a boolean if a field has been set. ### GetTtl -`func (o *OpenLDAPWriteConfigRequest) GetTtl() int32` +`func (o *LdapConfigureRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *OpenLDAPWriteConfigRequest) GetTtlOk() (*int32, bool)` +`func (o *LdapConfigureRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *OpenLDAPWriteConfigRequest) SetTtl(v int32)` +`func (o *LdapConfigureRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *OpenLDAPWriteConfigRequest) HasTtl() bool` +`func (o *LdapConfigureRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -699,27 +789,27 @@ HasTtl returns a boolean if a field has been set. ### GetUpndomain -`func (o *OpenLDAPWriteConfigRequest) GetUpndomain() string` +`func (o *LdapConfigureRequest) GetUpndomain() string` GetUpndomain returns the Upndomain field if non-nil, zero value otherwise. ### GetUpndomainOk -`func (o *OpenLDAPWriteConfigRequest) GetUpndomainOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetUpndomainOk() (*string, bool)` GetUpndomainOk returns a tuple with the Upndomain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUpndomain -`func (o *OpenLDAPWriteConfigRequest) SetUpndomain(v string)` +`func (o *LdapConfigureRequest) SetUpndomain(v string)` SetUpndomain sets Upndomain field to given value. ### HasUpndomain -`func (o *OpenLDAPWriteConfigRequest) HasUpndomain() bool` +`func (o *LdapConfigureRequest) HasUpndomain() bool` HasUpndomain returns a boolean if a field has been set. @@ -728,27 +818,27 @@ HasUpndomain returns a boolean if a field has been set. ### GetUrl -`func (o *OpenLDAPWriteConfigRequest) GetUrl() string` +`func (o *LdapConfigureRequest) GetUrl() string` GetUrl returns the Url field if non-nil, zero value otherwise. ### GetUrlOk -`func (o *OpenLDAPWriteConfigRequest) GetUrlOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetUrlOk() (*string, bool)` GetUrlOk returns a tuple with the Url field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrl -`func (o *OpenLDAPWriteConfigRequest) SetUrl(v string)` +`func (o *LdapConfigureRequest) SetUrl(v string)` SetUrl sets Url field to given value. ### HasUrl -`func (o *OpenLDAPWriteConfigRequest) HasUrl() bool` +`func (o *LdapConfigureRequest) HasUrl() bool` HasUrl returns a boolean if a field has been set. @@ -757,27 +847,27 @@ HasUrl returns a boolean if a field has been set. ### GetUsePre111GroupCnBehavior -`func (o *OpenLDAPWriteConfigRequest) GetUsePre111GroupCnBehavior() bool` +`func (o *LdapConfigureRequest) GetUsePre111GroupCnBehavior() bool` GetUsePre111GroupCnBehavior returns the UsePre111GroupCnBehavior field if non-nil, zero value otherwise. ### GetUsePre111GroupCnBehaviorOk -`func (o *OpenLDAPWriteConfigRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetUsePre111GroupCnBehaviorOk() (*bool, bool)` GetUsePre111GroupCnBehaviorOk returns a tuple with the UsePre111GroupCnBehavior field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePre111GroupCnBehavior -`func (o *OpenLDAPWriteConfigRequest) SetUsePre111GroupCnBehavior(v bool)` +`func (o *LdapConfigureRequest) SetUsePre111GroupCnBehavior(v bool)` SetUsePre111GroupCnBehavior sets UsePre111GroupCnBehavior field to given value. ### HasUsePre111GroupCnBehavior -`func (o *OpenLDAPWriteConfigRequest) HasUsePre111GroupCnBehavior() bool` +`func (o *LdapConfigureRequest) HasUsePre111GroupCnBehavior() bool` HasUsePre111GroupCnBehavior returns a boolean if a field has been set. @@ -786,27 +876,27 @@ HasUsePre111GroupCnBehavior returns a boolean if a field has been set. ### GetUseTokenGroups -`func (o *OpenLDAPWriteConfigRequest) GetUseTokenGroups() bool` +`func (o *LdapConfigureRequest) GetUseTokenGroups() bool` GetUseTokenGroups returns the UseTokenGroups field if non-nil, zero value otherwise. ### GetUseTokenGroupsOk -`func (o *OpenLDAPWriteConfigRequest) GetUseTokenGroupsOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetUseTokenGroupsOk() (*bool, bool)` GetUseTokenGroupsOk returns a tuple with the UseTokenGroups field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUseTokenGroups -`func (o *OpenLDAPWriteConfigRequest) SetUseTokenGroups(v bool)` +`func (o *LdapConfigureRequest) SetUseTokenGroups(v bool)` SetUseTokenGroups sets UseTokenGroups field to given value. ### HasUseTokenGroups -`func (o *OpenLDAPWriteConfigRequest) HasUseTokenGroups() bool` +`func (o *LdapConfigureRequest) HasUseTokenGroups() bool` HasUseTokenGroups returns a boolean if a field has been set. @@ -815,27 +905,27 @@ HasUseTokenGroups returns a boolean if a field has been set. ### GetUserattr -`func (o *OpenLDAPWriteConfigRequest) GetUserattr() string` +`func (o *LdapConfigureRequest) GetUserattr() string` GetUserattr returns the Userattr field if non-nil, zero value otherwise. ### GetUserattrOk -`func (o *OpenLDAPWriteConfigRequest) GetUserattrOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetUserattrOk() (*string, bool)` GetUserattrOk returns a tuple with the Userattr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserattr -`func (o *OpenLDAPWriteConfigRequest) SetUserattr(v string)` +`func (o *LdapConfigureRequest) SetUserattr(v string)` SetUserattr sets Userattr field to given value. ### HasUserattr -`func (o *OpenLDAPWriteConfigRequest) HasUserattr() bool` +`func (o *LdapConfigureRequest) HasUserattr() bool` HasUserattr returns a boolean if a field has been set. @@ -844,27 +934,27 @@ HasUserattr returns a boolean if a field has been set. ### GetUserdn -`func (o *OpenLDAPWriteConfigRequest) GetUserdn() string` +`func (o *LdapConfigureRequest) GetUserdn() string` GetUserdn returns the Userdn field if non-nil, zero value otherwise. ### GetUserdnOk -`func (o *OpenLDAPWriteConfigRequest) GetUserdnOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetUserdnOk() (*string, bool)` GetUserdnOk returns a tuple with the Userdn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserdn -`func (o *OpenLDAPWriteConfigRequest) SetUserdn(v string)` +`func (o *LdapConfigureRequest) SetUserdn(v string)` SetUserdn sets Userdn field to given value. ### HasUserdn -`func (o *OpenLDAPWriteConfigRequest) HasUserdn() bool` +`func (o *LdapConfigureRequest) HasUserdn() bool` HasUserdn returns a boolean if a field has been set. @@ -873,27 +963,27 @@ HasUserdn returns a boolean if a field has been set. ### GetUserfilter -`func (o *OpenLDAPWriteConfigRequest) GetUserfilter() string` +`func (o *LdapConfigureRequest) GetUserfilter() string` GetUserfilter returns the Userfilter field if non-nil, zero value otherwise. ### GetUserfilterOk -`func (o *OpenLDAPWriteConfigRequest) GetUserfilterOk() (*string, bool)` +`func (o *LdapConfigureRequest) GetUserfilterOk() (*string, bool)` GetUserfilterOk returns a tuple with the Userfilter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserfilter -`func (o *OpenLDAPWriteConfigRequest) SetUserfilter(v string)` +`func (o *LdapConfigureRequest) SetUserfilter(v string)` SetUserfilter sets Userfilter field to given value. ### HasUserfilter -`func (o *OpenLDAPWriteConfigRequest) HasUserfilter() bool` +`func (o *LdapConfigureRequest) HasUserfilter() bool` HasUserfilter returns a boolean if a field has been set. @@ -902,27 +992,27 @@ HasUserfilter returns a boolean if a field has been set. ### GetUsernameAsAlias -`func (o *OpenLDAPWriteConfigRequest) GetUsernameAsAlias() bool` +`func (o *LdapConfigureRequest) GetUsernameAsAlias() bool` GetUsernameAsAlias returns the UsernameAsAlias field if non-nil, zero value otherwise. ### GetUsernameAsAliasOk -`func (o *OpenLDAPWriteConfigRequest) GetUsernameAsAliasOk() (*bool, bool)` +`func (o *LdapConfigureRequest) GetUsernameAsAliasOk() (*bool, bool)` GetUsernameAsAliasOk returns a tuple with the UsernameAsAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameAsAlias -`func (o *OpenLDAPWriteConfigRequest) SetUsernameAsAlias(v bool)` +`func (o *LdapConfigureRequest) SetUsernameAsAlias(v bool)` SetUsernameAsAlias sets UsernameAsAlias field to given value. ### HasUsernameAsAlias -`func (o *OpenLDAPWriteConfigRequest) HasUsernameAsAlias() bool` +`func (o *LdapConfigureRequest) HasUsernameAsAlias() bool` HasUsernameAsAlias returns a boolean if a field has been set. diff --git a/docs/LDAPCheckInLibraryRequest.md b/docs/LdapLibraryCheckInRequest.md similarity index 66% rename from docs/LDAPCheckInLibraryRequest.md rename to docs/LdapLibraryCheckInRequest.md index e12b41a6..96b23739 100644 --- a/docs/LDAPCheckInLibraryRequest.md +++ b/docs/LdapLibraryCheckInRequest.md @@ -1,4 +1,4 @@ -# LDAPCheckInLibraryRequest +# LdapLibraryCheckInRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewLDAPCheckInLibraryRequest +### NewLdapLibraryCheckInRequest -`func NewLDAPCheckInLibraryRequest() *LDAPCheckInLibraryRequest` +`func NewLdapLibraryCheckInRequest() *LdapLibraryCheckInRequest` -NewLDAPCheckInLibraryRequest instantiates a new LDAPCheckInLibraryRequest object +NewLdapLibraryCheckInRequest instantiates a new LdapLibraryCheckInRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPCheckInLibraryRequestWithDefaults +### NewLdapLibraryCheckInRequestWithDefaults -`func NewLDAPCheckInLibraryRequestWithDefaults() *LDAPCheckInLibraryRequest` +`func NewLdapLibraryCheckInRequestWithDefaults() *LdapLibraryCheckInRequest` -NewLDAPCheckInLibraryRequestWithDefaults instantiates a new LDAPCheckInLibraryRequest object +NewLdapLibraryCheckInRequestWithDefaults instantiates a new LdapLibraryCheckInRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetServiceAccountNames -`func (o *LDAPCheckInLibraryRequest) GetServiceAccountNames() []string` +`func (o *LdapLibraryCheckInRequest) GetServiceAccountNames() []string` GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. ### GetServiceAccountNamesOk -`func (o *LDAPCheckInLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` +`func (o *LdapLibraryCheckInRequest) GetServiceAccountNamesOk() (*[]string, bool)` GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetServiceAccountNames -`func (o *LDAPCheckInLibraryRequest) SetServiceAccountNames(v []string)` +`func (o *LdapLibraryCheckInRequest) SetServiceAccountNames(v []string)` SetServiceAccountNames sets ServiceAccountNames field to given value. ### HasServiceAccountNames -`func (o *LDAPCheckInLibraryRequest) HasServiceAccountNames() bool` +`func (o *LdapLibraryCheckInRequest) HasServiceAccountNames() bool` HasServiceAccountNames returns a boolean if a field has been set. diff --git a/docs/LDAPCheckOutLibraryRequest.md b/docs/LdapLibraryCheckOutRequest.md similarity index 63% rename from docs/LDAPCheckOutLibraryRequest.md rename to docs/LdapLibraryCheckOutRequest.md index 05de8cc0..8d426ef5 100644 --- a/docs/LDAPCheckOutLibraryRequest.md +++ b/docs/LdapLibraryCheckOutRequest.md @@ -1,4 +1,4 @@ -# LDAPCheckOutLibraryRequest +# LdapLibraryCheckOutRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewLDAPCheckOutLibraryRequest +### NewLdapLibraryCheckOutRequest -`func NewLDAPCheckOutLibraryRequest() *LDAPCheckOutLibraryRequest` +`func NewLdapLibraryCheckOutRequest() *LdapLibraryCheckOutRequest` -NewLDAPCheckOutLibraryRequest instantiates a new LDAPCheckOutLibraryRequest object +NewLdapLibraryCheckOutRequest instantiates a new LdapLibraryCheckOutRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPCheckOutLibraryRequestWithDefaults +### NewLdapLibraryCheckOutRequestWithDefaults -`func NewLDAPCheckOutLibraryRequestWithDefaults() *LDAPCheckOutLibraryRequest` +`func NewLdapLibraryCheckOutRequestWithDefaults() *LdapLibraryCheckOutRequest` -NewLDAPCheckOutLibraryRequestWithDefaults instantiates a new LDAPCheckOutLibraryRequest object +NewLdapLibraryCheckOutRequestWithDefaults instantiates a new LdapLibraryCheckOutRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTtl -`func (o *LDAPCheckOutLibraryRequest) GetTtl() int32` +`func (o *LdapLibraryCheckOutRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *LDAPCheckOutLibraryRequest) GetTtlOk() (*int32, bool)` +`func (o *LdapLibraryCheckOutRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *LDAPCheckOutLibraryRequest) SetTtl(v int32)` +`func (o *LdapLibraryCheckOutRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *LDAPCheckOutLibraryRequest) HasTtl() bool` +`func (o *LdapLibraryCheckOutRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/OpenLDAPWriteLibraryRequest.md b/docs/LdapLibraryConfigureRequest.md similarity index 69% rename from docs/OpenLDAPWriteLibraryRequest.md rename to docs/LdapLibraryConfigureRequest.md index 27565446..34827afa 100644 --- a/docs/OpenLDAPWriteLibraryRequest.md +++ b/docs/LdapLibraryConfigureRequest.md @@ -1,4 +1,4 @@ -# OpenLDAPWriteLibraryRequest +# LdapLibraryConfigureRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewOpenLDAPWriteLibraryRequest +### NewLdapLibraryConfigureRequest -`func NewOpenLDAPWriteLibraryRequest() *OpenLDAPWriteLibraryRequest` +`func NewLdapLibraryConfigureRequest() *LdapLibraryConfigureRequest` -NewOpenLDAPWriteLibraryRequest instantiates a new OpenLDAPWriteLibraryRequest object +NewLdapLibraryConfigureRequest instantiates a new LdapLibraryConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOpenLDAPWriteLibraryRequestWithDefaults +### NewLdapLibraryConfigureRequestWithDefaults -`func NewOpenLDAPWriteLibraryRequestWithDefaults() *OpenLDAPWriteLibraryRequest` +`func NewLdapLibraryConfigureRequestWithDefaults() *LdapLibraryConfigureRequest` -NewOpenLDAPWriteLibraryRequestWithDefaults instantiates a new OpenLDAPWriteLibraryRequest object +NewLdapLibraryConfigureRequestWithDefaults instantiates a new LdapLibraryConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisableCheckInEnforcement -`func (o *OpenLDAPWriteLibraryRequest) GetDisableCheckInEnforcement() bool` +`func (o *LdapLibraryConfigureRequest) GetDisableCheckInEnforcement() bool` GetDisableCheckInEnforcement returns the DisableCheckInEnforcement field if non-nil, zero value otherwise. ### GetDisableCheckInEnforcementOk -`func (o *OpenLDAPWriteLibraryRequest) GetDisableCheckInEnforcementOk() (*bool, bool)` +`func (o *LdapLibraryConfigureRequest) GetDisableCheckInEnforcementOk() (*bool, bool)` GetDisableCheckInEnforcementOk returns a tuple with the DisableCheckInEnforcement field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisableCheckInEnforcement -`func (o *OpenLDAPWriteLibraryRequest) SetDisableCheckInEnforcement(v bool)` +`func (o *LdapLibraryConfigureRequest) SetDisableCheckInEnforcement(v bool)` SetDisableCheckInEnforcement sets DisableCheckInEnforcement field to given value. ### HasDisableCheckInEnforcement -`func (o *OpenLDAPWriteLibraryRequest) HasDisableCheckInEnforcement() bool` +`func (o *LdapLibraryConfigureRequest) HasDisableCheckInEnforcement() bool` HasDisableCheckInEnforcement returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasDisableCheckInEnforcement returns a boolean if a field has been set. ### GetMaxTtl -`func (o *OpenLDAPWriteLibraryRequest) GetMaxTtl() int32` +`func (o *LdapLibraryConfigureRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *OpenLDAPWriteLibraryRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *LdapLibraryConfigureRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *OpenLDAPWriteLibraryRequest) SetMaxTtl(v int32)` +`func (o *LdapLibraryConfigureRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *OpenLDAPWriteLibraryRequest) HasMaxTtl() bool` +`func (o *LdapLibraryConfigureRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetServiceAccountNames -`func (o *OpenLDAPWriteLibraryRequest) GetServiceAccountNames() []string` +`func (o *LdapLibraryConfigureRequest) GetServiceAccountNames() []string` GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. ### GetServiceAccountNamesOk -`func (o *OpenLDAPWriteLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` +`func (o *LdapLibraryConfigureRequest) GetServiceAccountNamesOk() (*[]string, bool)` GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetServiceAccountNames -`func (o *OpenLDAPWriteLibraryRequest) SetServiceAccountNames(v []string)` +`func (o *LdapLibraryConfigureRequest) SetServiceAccountNames(v []string)` SetServiceAccountNames sets ServiceAccountNames field to given value. ### HasServiceAccountNames -`func (o *OpenLDAPWriteLibraryRequest) HasServiceAccountNames() bool` +`func (o *LdapLibraryConfigureRequest) HasServiceAccountNames() bool` HasServiceAccountNames returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasServiceAccountNames returns a boolean if a field has been set. ### GetTtl -`func (o *OpenLDAPWriteLibraryRequest) GetTtl() int32` +`func (o *LdapLibraryConfigureRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *OpenLDAPWriteLibraryRequest) GetTtlOk() (*int32, bool)` +`func (o *LdapLibraryConfigureRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *OpenLDAPWriteLibraryRequest) SetTtl(v int32)` +`func (o *LdapLibraryConfigureRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *OpenLDAPWriteLibraryRequest) HasTtl() bool` +`func (o *LdapLibraryConfigureRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/OpenLDAPCheckInLibraryRequest.md b/docs/LdapLibraryForceCheckInRequest.md similarity index 62% rename from docs/OpenLDAPCheckInLibraryRequest.md rename to docs/LdapLibraryForceCheckInRequest.md index 80a2c467..124e261e 100644 --- a/docs/OpenLDAPCheckInLibraryRequest.md +++ b/docs/LdapLibraryForceCheckInRequest.md @@ -1,4 +1,4 @@ -# OpenLDAPCheckInLibraryRequest +# LdapLibraryForceCheckInRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewOpenLDAPCheckInLibraryRequest +### NewLdapLibraryForceCheckInRequest -`func NewOpenLDAPCheckInLibraryRequest() *OpenLDAPCheckInLibraryRequest` +`func NewLdapLibraryForceCheckInRequest() *LdapLibraryForceCheckInRequest` -NewOpenLDAPCheckInLibraryRequest instantiates a new OpenLDAPCheckInLibraryRequest object +NewLdapLibraryForceCheckInRequest instantiates a new LdapLibraryForceCheckInRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOpenLDAPCheckInLibraryRequestWithDefaults +### NewLdapLibraryForceCheckInRequestWithDefaults -`func NewOpenLDAPCheckInLibraryRequestWithDefaults() *OpenLDAPCheckInLibraryRequest` +`func NewLdapLibraryForceCheckInRequestWithDefaults() *LdapLibraryForceCheckInRequest` -NewOpenLDAPCheckInLibraryRequestWithDefaults instantiates a new OpenLDAPCheckInLibraryRequest object +NewLdapLibraryForceCheckInRequestWithDefaults instantiates a new LdapLibraryForceCheckInRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetServiceAccountNames -`func (o *OpenLDAPCheckInLibraryRequest) GetServiceAccountNames() []string` +`func (o *LdapLibraryForceCheckInRequest) GetServiceAccountNames() []string` GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. ### GetServiceAccountNamesOk -`func (o *OpenLDAPCheckInLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` +`func (o *LdapLibraryForceCheckInRequest) GetServiceAccountNamesOk() (*[]string, bool)` GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetServiceAccountNames -`func (o *OpenLDAPCheckInLibraryRequest) SetServiceAccountNames(v []string)` +`func (o *LdapLibraryForceCheckInRequest) SetServiceAccountNames(v []string)` SetServiceAccountNames sets ServiceAccountNames field to given value. ### HasServiceAccountNames -`func (o *OpenLDAPCheckInLibraryRequest) HasServiceAccountNames() bool` +`func (o *LdapLibraryForceCheckInRequest) HasServiceAccountNames() bool` HasServiceAccountNames returns a boolean if a field has been set. diff --git a/docs/LdapLoginRequest.md b/docs/LdapLoginRequest.md index a2cf8750..3fad2510 100644 --- a/docs/LdapLoginRequest.md +++ b/docs/LdapLoginRequest.md @@ -1,4 +1,4 @@ -# LDAPLoginRequest +# LdapLoginRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewLDAPLoginRequest +### NewLdapLoginRequest -`func NewLDAPLoginRequest() *LDAPLoginRequest` +`func NewLdapLoginRequest() *LdapLoginRequest` -NewLDAPLoginRequest instantiates a new LDAPLoginRequest object +NewLdapLoginRequest instantiates a new LdapLoginRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPLoginRequestWithDefaults +### NewLdapLoginRequestWithDefaults -`func NewLDAPLoginRequestWithDefaults() *LDAPLoginRequest` +`func NewLdapLoginRequestWithDefaults() *LdapLoginRequest` -NewLDAPLoginRequestWithDefaults instantiates a new LDAPLoginRequest object +NewLdapLoginRequestWithDefaults instantiates a new LdapLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPassword -`func (o *LDAPLoginRequest) GetPassword() string` +`func (o *LdapLoginRequest) GetPassword() string` GetPassword returns the Password field if non-nil, zero value otherwise. ### GetPasswordOk -`func (o *LDAPLoginRequest) GetPasswordOk() (*string, bool)` +`func (o *LdapLoginRequest) GetPasswordOk() (*string, bool)` GetPasswordOk returns a tuple with the Password field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPassword -`func (o *LDAPLoginRequest) SetPassword(v string)` +`func (o *LdapLoginRequest) SetPassword(v string)` SetPassword sets Password field to given value. ### HasPassword -`func (o *LDAPLoginRequest) HasPassword() bool` +`func (o *LdapLoginRequest) HasPassword() bool` HasPassword returns a boolean if a field has been set. diff --git a/docs/LDAPWriteRoleRequest.md b/docs/LdapWriteDynamicRoleRequest.md similarity index 66% rename from docs/LDAPWriteRoleRequest.md rename to docs/LdapWriteDynamicRoleRequest.md index 656b3c46..f087a032 100644 --- a/docs/LDAPWriteRoleRequest.md +++ b/docs/LdapWriteDynamicRoleRequest.md @@ -1,4 +1,4 @@ -# LDAPWriteRoleRequest +# LdapWriteDynamicRoleRequest ## Properties @@ -17,40 +17,40 @@ Name | Type | Description | Notes ## Methods -### NewLDAPWriteRoleRequest +### NewLdapWriteDynamicRoleRequest -`func NewLDAPWriteRoleRequest(creationLdif string, deletionLdif string, ) *LDAPWriteRoleRequest` +`func NewLdapWriteDynamicRoleRequest(creationLdif string, deletionLdif string, ) *LdapWriteDynamicRoleRequest` -NewLDAPWriteRoleRequest instantiates a new LDAPWriteRoleRequest object +NewLdapWriteDynamicRoleRequest instantiates a new LdapWriteDynamicRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewLDAPWriteRoleRequestWithDefaults +### NewLdapWriteDynamicRoleRequestWithDefaults -`func NewLDAPWriteRoleRequestWithDefaults() *LDAPWriteRoleRequest` +`func NewLdapWriteDynamicRoleRequestWithDefaults() *LdapWriteDynamicRoleRequest` -NewLDAPWriteRoleRequestWithDefaults instantiates a new LDAPWriteRoleRequest object +NewLdapWriteDynamicRoleRequestWithDefaults instantiates a new LdapWriteDynamicRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCreationLdif -`func (o *LDAPWriteRoleRequest) GetCreationLdif() string` +`func (o *LdapWriteDynamicRoleRequest) GetCreationLdif() string` GetCreationLdif returns the CreationLdif field if non-nil, zero value otherwise. ### GetCreationLdifOk -`func (o *LDAPWriteRoleRequest) GetCreationLdifOk() (*string, bool)` +`func (o *LdapWriteDynamicRoleRequest) GetCreationLdifOk() (*string, bool)` GetCreationLdifOk returns a tuple with the CreationLdif field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCreationLdif -`func (o *LDAPWriteRoleRequest) SetCreationLdif(v string)` +`func (o *LdapWriteDynamicRoleRequest) SetCreationLdif(v string)` SetCreationLdif sets CreationLdif field to given value. @@ -60,27 +60,27 @@ SetCreationLdif sets CreationLdif field to given value. ### GetDefaultTtl -`func (o *LDAPWriteRoleRequest) GetDefaultTtl() int32` +`func (o *LdapWriteDynamicRoleRequest) GetDefaultTtl() int32` GetDefaultTtl returns the DefaultTtl field if non-nil, zero value otherwise. ### GetDefaultTtlOk -`func (o *LDAPWriteRoleRequest) GetDefaultTtlOk() (*int32, bool)` +`func (o *LdapWriteDynamicRoleRequest) GetDefaultTtlOk() (*int32, bool)` GetDefaultTtlOk returns a tuple with the DefaultTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultTtl -`func (o *LDAPWriteRoleRequest) SetDefaultTtl(v int32)` +`func (o *LdapWriteDynamicRoleRequest) SetDefaultTtl(v int32)` SetDefaultTtl sets DefaultTtl field to given value. ### HasDefaultTtl -`func (o *LDAPWriteRoleRequest) HasDefaultTtl() bool` +`func (o *LdapWriteDynamicRoleRequest) HasDefaultTtl() bool` HasDefaultTtl returns a boolean if a field has been set. @@ -89,20 +89,20 @@ HasDefaultTtl returns a boolean if a field has been set. ### GetDeletionLdif -`func (o *LDAPWriteRoleRequest) GetDeletionLdif() string` +`func (o *LdapWriteDynamicRoleRequest) GetDeletionLdif() string` GetDeletionLdif returns the DeletionLdif field if non-nil, zero value otherwise. ### GetDeletionLdifOk -`func (o *LDAPWriteRoleRequest) GetDeletionLdifOk() (*string, bool)` +`func (o *LdapWriteDynamicRoleRequest) GetDeletionLdifOk() (*string, bool)` GetDeletionLdifOk returns a tuple with the DeletionLdif field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDeletionLdif -`func (o *LDAPWriteRoleRequest) SetDeletionLdif(v string)` +`func (o *LdapWriteDynamicRoleRequest) SetDeletionLdif(v string)` SetDeletionLdif sets DeletionLdif field to given value. @@ -112,27 +112,27 @@ SetDeletionLdif sets DeletionLdif field to given value. ### GetMaxTtl -`func (o *LDAPWriteRoleRequest) GetMaxTtl() int32` +`func (o *LdapWriteDynamicRoleRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *LDAPWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *LdapWriteDynamicRoleRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *LDAPWriteRoleRequest) SetMaxTtl(v int32)` +`func (o *LdapWriteDynamicRoleRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *LDAPWriteRoleRequest) HasMaxTtl() bool` +`func (o *LdapWriteDynamicRoleRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -141,27 +141,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetRollbackLdif -`func (o *LDAPWriteRoleRequest) GetRollbackLdif() string` +`func (o *LdapWriteDynamicRoleRequest) GetRollbackLdif() string` GetRollbackLdif returns the RollbackLdif field if non-nil, zero value otherwise. ### GetRollbackLdifOk -`func (o *LDAPWriteRoleRequest) GetRollbackLdifOk() (*string, bool)` +`func (o *LdapWriteDynamicRoleRequest) GetRollbackLdifOk() (*string, bool)` GetRollbackLdifOk returns a tuple with the RollbackLdif field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRollbackLdif -`func (o *LDAPWriteRoleRequest) SetRollbackLdif(v string)` +`func (o *LdapWriteDynamicRoleRequest) SetRollbackLdif(v string)` SetRollbackLdif sets RollbackLdif field to given value. ### HasRollbackLdif -`func (o *LDAPWriteRoleRequest) HasRollbackLdif() bool` +`func (o *LdapWriteDynamicRoleRequest) HasRollbackLdif() bool` HasRollbackLdif returns a boolean if a field has been set. @@ -170,27 +170,27 @@ HasRollbackLdif returns a boolean if a field has been set. ### GetUsernameTemplate -`func (o *LDAPWriteRoleRequest) GetUsernameTemplate() string` +`func (o *LdapWriteDynamicRoleRequest) GetUsernameTemplate() string` GetUsernameTemplate returns the UsernameTemplate field if non-nil, zero value otherwise. ### GetUsernameTemplateOk -`func (o *LDAPWriteRoleRequest) GetUsernameTemplateOk() (*string, bool)` +`func (o *LdapWriteDynamicRoleRequest) GetUsernameTemplateOk() (*string, bool)` GetUsernameTemplateOk returns a tuple with the UsernameTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameTemplate -`func (o *LDAPWriteRoleRequest) SetUsernameTemplate(v string)` +`func (o *LdapWriteDynamicRoleRequest) SetUsernameTemplate(v string)` SetUsernameTemplate sets UsernameTemplate field to given value. ### HasUsernameTemplate -`func (o *LDAPWriteRoleRequest) HasUsernameTemplate() bool` +`func (o *LdapWriteDynamicRoleRequest) HasUsernameTemplate() bool` HasUsernameTemplate returns a boolean if a field has been set. diff --git a/docs/LeaderStatusResponse.md b/docs/LeaderStatusResponse.md new file mode 100644 index 00000000..9c645287 --- /dev/null +++ b/docs/LeaderStatusResponse.md @@ -0,0 +1,339 @@ +# LeaderStatusResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ActiveTime** | Pointer to **time.Time** | | [optional] +**HaEnabled** | Pointer to **bool** | | [optional] +**IsSelf** | Pointer to **bool** | | [optional] +**LastWal** | Pointer to **int64** | | [optional] +**LeaderAddress** | Pointer to **string** | | [optional] +**LeaderClusterAddress** | Pointer to **string** | | [optional] +**PerformanceStandby** | Pointer to **bool** | | [optional] +**PerformanceStandbyLastRemoteWal** | Pointer to **int64** | | [optional] +**RaftAppliedIndex** | Pointer to **int64** | | [optional] +**RaftCommittedIndex** | Pointer to **int64** | | [optional] + + + +## Methods + + +### NewLeaderStatusResponse + +`func NewLeaderStatusResponse() *LeaderStatusResponse` + +NewLeaderStatusResponse instantiates a new LeaderStatusResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewLeaderStatusResponseWithDefaults + +`func NewLeaderStatusResponseWithDefaults() *LeaderStatusResponse` + +NewLeaderStatusResponseWithDefaults instantiates a new LeaderStatusResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetActiveTime + +`func (o *LeaderStatusResponse) GetActiveTime() time.Time` + +GetActiveTime returns the ActiveTime field if non-nil, zero value otherwise. + +### GetActiveTimeOk + +`func (o *LeaderStatusResponse) GetActiveTimeOk() (*time.Time, bool)` + +GetActiveTimeOk returns a tuple with the ActiveTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetActiveTime + +`func (o *LeaderStatusResponse) SetActiveTime(v time.Time)` + +SetActiveTime sets ActiveTime field to given value. + + +### HasActiveTime + +`func (o *LeaderStatusResponse) HasActiveTime() bool` + +HasActiveTime returns a boolean if a field has been set. + + + + +### GetHaEnabled + +`func (o *LeaderStatusResponse) GetHaEnabled() bool` + +GetHaEnabled returns the HaEnabled field if non-nil, zero value otherwise. + +### GetHaEnabledOk + +`func (o *LeaderStatusResponse) GetHaEnabledOk() (*bool, bool)` + +GetHaEnabledOk returns a tuple with the HaEnabled field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHaEnabled + +`func (o *LeaderStatusResponse) SetHaEnabled(v bool)` + +SetHaEnabled sets HaEnabled field to given value. + + +### HasHaEnabled + +`func (o *LeaderStatusResponse) HasHaEnabled() bool` + +HasHaEnabled returns a boolean if a field has been set. + + + + +### GetIsSelf + +`func (o *LeaderStatusResponse) GetIsSelf() bool` + +GetIsSelf returns the IsSelf field if non-nil, zero value otherwise. + +### GetIsSelfOk + +`func (o *LeaderStatusResponse) GetIsSelfOk() (*bool, bool)` + +GetIsSelfOk returns a tuple with the IsSelf field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIsSelf + +`func (o *LeaderStatusResponse) SetIsSelf(v bool)` + +SetIsSelf sets IsSelf field to given value. + + +### HasIsSelf + +`func (o *LeaderStatusResponse) HasIsSelf() bool` + +HasIsSelf returns a boolean if a field has been set. + + + + +### GetLastWal + +`func (o *LeaderStatusResponse) GetLastWal() int64` + +GetLastWal returns the LastWal field if non-nil, zero value otherwise. + +### GetLastWalOk + +`func (o *LeaderStatusResponse) GetLastWalOk() (*int64, bool)` + +GetLastWalOk returns a tuple with the LastWal field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLastWal + +`func (o *LeaderStatusResponse) SetLastWal(v int64)` + +SetLastWal sets LastWal field to given value. + + +### HasLastWal + +`func (o *LeaderStatusResponse) HasLastWal() bool` + +HasLastWal returns a boolean if a field has been set. + + + + +### GetLeaderAddress + +`func (o *LeaderStatusResponse) GetLeaderAddress() string` + +GetLeaderAddress returns the LeaderAddress field if non-nil, zero value otherwise. + +### GetLeaderAddressOk + +`func (o *LeaderStatusResponse) GetLeaderAddressOk() (*string, bool)` + +GetLeaderAddressOk returns a tuple with the LeaderAddress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeaderAddress + +`func (o *LeaderStatusResponse) SetLeaderAddress(v string)` + +SetLeaderAddress sets LeaderAddress field to given value. + + +### HasLeaderAddress + +`func (o *LeaderStatusResponse) HasLeaderAddress() bool` + +HasLeaderAddress returns a boolean if a field has been set. + + + + +### GetLeaderClusterAddress + +`func (o *LeaderStatusResponse) GetLeaderClusterAddress() string` + +GetLeaderClusterAddress returns the LeaderClusterAddress field if non-nil, zero value otherwise. + +### GetLeaderClusterAddressOk + +`func (o *LeaderStatusResponse) GetLeaderClusterAddressOk() (*string, bool)` + +GetLeaderClusterAddressOk returns a tuple with the LeaderClusterAddress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeaderClusterAddress + +`func (o *LeaderStatusResponse) SetLeaderClusterAddress(v string)` + +SetLeaderClusterAddress sets LeaderClusterAddress field to given value. + + +### HasLeaderClusterAddress + +`func (o *LeaderStatusResponse) HasLeaderClusterAddress() bool` + +HasLeaderClusterAddress returns a boolean if a field has been set. + + + + +### GetPerformanceStandby + +`func (o *LeaderStatusResponse) GetPerformanceStandby() bool` + +GetPerformanceStandby returns the PerformanceStandby field if non-nil, zero value otherwise. + +### GetPerformanceStandbyOk + +`func (o *LeaderStatusResponse) GetPerformanceStandbyOk() (*bool, bool)` + +GetPerformanceStandbyOk returns a tuple with the PerformanceStandby field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPerformanceStandby + +`func (o *LeaderStatusResponse) SetPerformanceStandby(v bool)` + +SetPerformanceStandby sets PerformanceStandby field to given value. + + +### HasPerformanceStandby + +`func (o *LeaderStatusResponse) HasPerformanceStandby() bool` + +HasPerformanceStandby returns a boolean if a field has been set. + + + + +### GetPerformanceStandbyLastRemoteWal + +`func (o *LeaderStatusResponse) GetPerformanceStandbyLastRemoteWal() int64` + +GetPerformanceStandbyLastRemoteWal returns the PerformanceStandbyLastRemoteWal field if non-nil, zero value otherwise. + +### GetPerformanceStandbyLastRemoteWalOk + +`func (o *LeaderStatusResponse) GetPerformanceStandbyLastRemoteWalOk() (*int64, bool)` + +GetPerformanceStandbyLastRemoteWalOk returns a tuple with the PerformanceStandbyLastRemoteWal field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPerformanceStandbyLastRemoteWal + +`func (o *LeaderStatusResponse) SetPerformanceStandbyLastRemoteWal(v int64)` + +SetPerformanceStandbyLastRemoteWal sets PerformanceStandbyLastRemoteWal field to given value. + + +### HasPerformanceStandbyLastRemoteWal + +`func (o *LeaderStatusResponse) HasPerformanceStandbyLastRemoteWal() bool` + +HasPerformanceStandbyLastRemoteWal returns a boolean if a field has been set. + + + + +### GetRaftAppliedIndex + +`func (o *LeaderStatusResponse) GetRaftAppliedIndex() int64` + +GetRaftAppliedIndex returns the RaftAppliedIndex field if non-nil, zero value otherwise. + +### GetRaftAppliedIndexOk + +`func (o *LeaderStatusResponse) GetRaftAppliedIndexOk() (*int64, bool)` + +GetRaftAppliedIndexOk returns a tuple with the RaftAppliedIndex field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRaftAppliedIndex + +`func (o *LeaderStatusResponse) SetRaftAppliedIndex(v int64)` + +SetRaftAppliedIndex sets RaftAppliedIndex field to given value. + + +### HasRaftAppliedIndex + +`func (o *LeaderStatusResponse) HasRaftAppliedIndex() bool` + +HasRaftAppliedIndex returns a boolean if a field has been set. + + + + +### GetRaftCommittedIndex + +`func (o *LeaderStatusResponse) GetRaftCommittedIndex() int64` + +GetRaftCommittedIndex returns the RaftCommittedIndex field if non-nil, zero value otherwise. + +### GetRaftCommittedIndexOk + +`func (o *LeaderStatusResponse) GetRaftCommittedIndexOk() (*int64, bool)` + +GetRaftCommittedIndexOk returns a tuple with the RaftCommittedIndex field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRaftCommittedIndex + +`func (o *LeaderStatusResponse) SetRaftCommittedIndex(v int64)` + +SetRaftCommittedIndex sets RaftCommittedIndex field to given value. + + +### HasRaftCommittedIndex + +`func (o *LeaderStatusResponse) HasRaftCommittedIndex() bool` + +HasRaftCommittedIndex returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/LeasesCountResponse.md b/docs/LeasesCountResponse.md new file mode 100644 index 00000000..617706c8 --- /dev/null +++ b/docs/LeasesCountResponse.md @@ -0,0 +1,99 @@ +# LeasesCountResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Counts** | Pointer to **int32** | Number of matching leases per mount | [optional] +**LeaseCount** | Pointer to **int32** | Number of matching leases | [optional] + + + +## Methods + + +### NewLeasesCountResponse + +`func NewLeasesCountResponse() *LeasesCountResponse` + +NewLeasesCountResponse instantiates a new LeasesCountResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewLeasesCountResponseWithDefaults + +`func NewLeasesCountResponseWithDefaults() *LeasesCountResponse` + +NewLeasesCountResponseWithDefaults instantiates a new LeasesCountResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCounts + +`func (o *LeasesCountResponse) GetCounts() int32` + +GetCounts returns the Counts field if non-nil, zero value otherwise. + +### GetCountsOk + +`func (o *LeasesCountResponse) GetCountsOk() (*int32, bool)` + +GetCountsOk returns a tuple with the Counts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCounts + +`func (o *LeasesCountResponse) SetCounts(v int32)` + +SetCounts sets Counts field to given value. + + +### HasCounts + +`func (o *LeasesCountResponse) HasCounts() bool` + +HasCounts returns a boolean if a field has been set. + + + + +### GetLeaseCount + +`func (o *LeasesCountResponse) GetLeaseCount() int32` + +GetLeaseCount returns the LeaseCount field if non-nil, zero value otherwise. + +### GetLeaseCountOk + +`func (o *LeasesCountResponse) GetLeaseCountOk() (*int32, bool)` + +GetLeaseCountOk returns a tuple with the LeaseCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeaseCount + +`func (o *LeasesCountResponse) SetLeaseCount(v int32)` + +SetLeaseCount sets LeaseCount field to given value. + + +### HasLeaseCount + +`func (o *LeasesCountResponse) HasLeaseCount() bool` + +HasLeaseCount returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/LeasesListResponse.md b/docs/LeasesListResponse.md new file mode 100644 index 00000000..940933a3 --- /dev/null +++ b/docs/LeasesListResponse.md @@ -0,0 +1,99 @@ +# LeasesListResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Counts** | Pointer to **int32** | Number of matching leases per mount | [optional] +**LeaseCount** | Pointer to **int32** | Number of matching leases | [optional] + + + +## Methods + + +### NewLeasesListResponse + +`func NewLeasesListResponse() *LeasesListResponse` + +NewLeasesListResponse instantiates a new LeasesListResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewLeasesListResponseWithDefaults + +`func NewLeasesListResponseWithDefaults() *LeasesListResponse` + +NewLeasesListResponseWithDefaults instantiates a new LeasesListResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCounts + +`func (o *LeasesListResponse) GetCounts() int32` + +GetCounts returns the Counts field if non-nil, zero value otherwise. + +### GetCountsOk + +`func (o *LeasesListResponse) GetCountsOk() (*int32, bool)` + +GetCountsOk returns a tuple with the Counts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCounts + +`func (o *LeasesListResponse) SetCounts(v int32)` + +SetCounts sets Counts field to given value. + + +### HasCounts + +`func (o *LeasesListResponse) HasCounts() bool` + +HasCounts returns a boolean if a field has been set. + + + + +### GetLeaseCount + +`func (o *LeasesListResponse) GetLeaseCount() int32` + +GetLeaseCount returns the LeaseCount field if non-nil, zero value otherwise. + +### GetLeaseCountOk + +`func (o *LeasesListResponse) GetLeaseCountOk() (*int32, bool)` + +GetLeaseCountOk returns a tuple with the LeaseCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeaseCount + +`func (o *LeasesListResponse) SetLeaseCount(v int32)` + +SetLeaseCount sets LeaseCount field to given value. + + +### HasLeaseCount + +`func (o *LeasesListResponse) HasLeaseCount() bool` + +HasLeaseCount returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/LeasesLookUpResponse.md b/docs/LeasesLookUpResponse.md new file mode 100644 index 00000000..d890bc43 --- /dev/null +++ b/docs/LeasesLookUpResponse.md @@ -0,0 +1,69 @@ +# LeasesLookUpResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | A list of lease ids | [optional] + + + +## Methods + + +### NewLeasesLookUpResponse + +`func NewLeasesLookUpResponse() *LeasesLookUpResponse` + +NewLeasesLookUpResponse instantiates a new LeasesLookUpResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewLeasesLookUpResponseWithDefaults + +`func NewLeasesLookUpResponseWithDefaults() *LeasesLookUpResponse` + +NewLeasesLookUpResponseWithDefaults instantiates a new LeasesLookUpResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *LeasesLookUpResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *LeasesLookUpResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *LeasesLookUpResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *LeasesLookUpResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/LeasesLookUpWithPrefixResponse.md b/docs/LeasesLookUpWithPrefixResponse.md new file mode 100644 index 00000000..ebcdf043 --- /dev/null +++ b/docs/LeasesLookUpWithPrefixResponse.md @@ -0,0 +1,69 @@ +# LeasesLookUpWithPrefixResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | A list of lease ids | [optional] + + + +## Methods + + +### NewLeasesLookUpWithPrefixResponse + +`func NewLeasesLookUpWithPrefixResponse() *LeasesLookUpWithPrefixResponse` + +NewLeasesLookUpWithPrefixResponse instantiates a new LeasesLookUpWithPrefixResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewLeasesLookUpWithPrefixResponseWithDefaults + +`func NewLeasesLookUpWithPrefixResponseWithDefaults() *LeasesLookUpWithPrefixResponse` + +NewLeasesLookUpWithPrefixResponseWithDefaults instantiates a new LeasesLookUpWithPrefixResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *LeasesLookUpWithPrefixResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *LeasesLookUpWithPrefixResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *LeasesLookUpWithPrefixResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *LeasesLookUpWithPrefixResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteLeasesLookupRequest.md b/docs/LeasesReadLeaseRequest.md similarity index 64% rename from docs/WriteLeasesLookupRequest.md rename to docs/LeasesReadLeaseRequest.md index ab555be4..43a84e44 100644 --- a/docs/WriteLeasesLookupRequest.md +++ b/docs/LeasesReadLeaseRequest.md @@ -1,4 +1,4 @@ -# WriteLeasesLookupRequest +# LeasesReadLeaseRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLeasesLookupRequest +### NewLeasesReadLeaseRequest -`func NewWriteLeasesLookupRequest() *WriteLeasesLookupRequest` +`func NewLeasesReadLeaseRequest() *LeasesReadLeaseRequest` -NewWriteLeasesLookupRequest instantiates a new WriteLeasesLookupRequest object +NewLeasesReadLeaseRequest instantiates a new LeasesReadLeaseRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLeasesLookupRequestWithDefaults +### NewLeasesReadLeaseRequestWithDefaults -`func NewWriteLeasesLookupRequestWithDefaults() *WriteLeasesLookupRequest` +`func NewLeasesReadLeaseRequestWithDefaults() *LeasesReadLeaseRequest` -NewWriteLeasesLookupRequestWithDefaults instantiates a new WriteLeasesLookupRequest object +NewLeasesReadLeaseRequestWithDefaults instantiates a new LeasesReadLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLeaseId -`func (o *WriteLeasesLookupRequest) GetLeaseId() string` +`func (o *LeasesReadLeaseRequest) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *WriteLeasesLookupRequest) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesReadLeaseRequest) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *WriteLeasesLookupRequest) SetLeaseId(v string)` +`func (o *LeasesReadLeaseRequest) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *WriteLeasesLookupRequest) HasLeaseId() bool` +`func (o *LeasesReadLeaseRequest) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. diff --git a/docs/LeasesReadLeaseResponse.md b/docs/LeasesReadLeaseResponse.md new file mode 100644 index 00000000..da709b70 --- /dev/null +++ b/docs/LeasesReadLeaseResponse.md @@ -0,0 +1,219 @@ +# LeasesReadLeaseResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ExpireTime** | Pointer to **time.Time** | Optional lease expiry time | [optional] +**Id** | Pointer to **string** | Lease id | [optional] +**IssueTime** | Pointer to **time.Time** | Timestamp for the lease's issue time | [optional] +**LastRenewal** | Pointer to **time.Time** | Optional Timestamp of the last time the lease was renewed | [optional] +**Renewable** | Pointer to **bool** | True if the lease is able to be renewed | [optional] +**Ttl** | Pointer to **int32** | Time to Live set for the lease, returns 0 if unset | [optional] + + + +## Methods + + +### NewLeasesReadLeaseResponse + +`func NewLeasesReadLeaseResponse() *LeasesReadLeaseResponse` + +NewLeasesReadLeaseResponse instantiates a new LeasesReadLeaseResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewLeasesReadLeaseResponseWithDefaults + +`func NewLeasesReadLeaseResponseWithDefaults() *LeasesReadLeaseResponse` + +NewLeasesReadLeaseResponseWithDefaults instantiates a new LeasesReadLeaseResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetExpireTime + +`func (o *LeasesReadLeaseResponse) GetExpireTime() time.Time` + +GetExpireTime returns the ExpireTime field if non-nil, zero value otherwise. + +### GetExpireTimeOk + +`func (o *LeasesReadLeaseResponse) GetExpireTimeOk() (*time.Time, bool)` + +GetExpireTimeOk returns a tuple with the ExpireTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpireTime + +`func (o *LeasesReadLeaseResponse) SetExpireTime(v time.Time)` + +SetExpireTime sets ExpireTime field to given value. + + +### HasExpireTime + +`func (o *LeasesReadLeaseResponse) HasExpireTime() bool` + +HasExpireTime returns a boolean if a field has been set. + + + + +### GetId + +`func (o *LeasesReadLeaseResponse) GetId() string` + +GetId returns the Id field if non-nil, zero value otherwise. + +### GetIdOk + +`func (o *LeasesReadLeaseResponse) GetIdOk() (*string, bool)` + +GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetId + +`func (o *LeasesReadLeaseResponse) SetId(v string)` + +SetId sets Id field to given value. + + +### HasId + +`func (o *LeasesReadLeaseResponse) HasId() bool` + +HasId returns a boolean if a field has been set. + + + + +### GetIssueTime + +`func (o *LeasesReadLeaseResponse) GetIssueTime() time.Time` + +GetIssueTime returns the IssueTime field if non-nil, zero value otherwise. + +### GetIssueTimeOk + +`func (o *LeasesReadLeaseResponse) GetIssueTimeOk() (*time.Time, bool)` + +GetIssueTimeOk returns a tuple with the IssueTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssueTime + +`func (o *LeasesReadLeaseResponse) SetIssueTime(v time.Time)` + +SetIssueTime sets IssueTime field to given value. + + +### HasIssueTime + +`func (o *LeasesReadLeaseResponse) HasIssueTime() bool` + +HasIssueTime returns a boolean if a field has been set. + + + + +### GetLastRenewal + +`func (o *LeasesReadLeaseResponse) GetLastRenewal() time.Time` + +GetLastRenewal returns the LastRenewal field if non-nil, zero value otherwise. + +### GetLastRenewalOk + +`func (o *LeasesReadLeaseResponse) GetLastRenewalOk() (*time.Time, bool)` + +GetLastRenewalOk returns a tuple with the LastRenewal field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLastRenewal + +`func (o *LeasesReadLeaseResponse) SetLastRenewal(v time.Time)` + +SetLastRenewal sets LastRenewal field to given value. + + +### HasLastRenewal + +`func (o *LeasesReadLeaseResponse) HasLastRenewal() bool` + +HasLastRenewal returns a boolean if a field has been set. + + + + +### GetRenewable + +`func (o *LeasesReadLeaseResponse) GetRenewable() bool` + +GetRenewable returns the Renewable field if non-nil, zero value otherwise. + +### GetRenewableOk + +`func (o *LeasesReadLeaseResponse) GetRenewableOk() (*bool, bool)` + +GetRenewableOk returns a tuple with the Renewable field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRenewable + +`func (o *LeasesReadLeaseResponse) SetRenewable(v bool)` + +SetRenewable sets Renewable field to given value. + + +### HasRenewable + +`func (o *LeasesReadLeaseResponse) HasRenewable() bool` + +HasRenewable returns a boolean if a field has been set. + + + + +### GetTtl + +`func (o *LeasesReadLeaseResponse) GetTtl() int32` + +GetTtl returns the Ttl field if non-nil, zero value otherwise. + +### GetTtlOk + +`func (o *LeasesReadLeaseResponse) GetTtlOk() (*int32, bool)` + +GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTtl + +`func (o *LeasesReadLeaseResponse) SetTtl(v int32)` + +SetTtl sets Ttl field to given value. + + +### HasTtl + +`func (o *LeasesReadLeaseResponse) HasTtl() bool` + +HasTtl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RenewRequest.md b/docs/LeasesRenewLease2Request.md similarity index 66% rename from docs/RenewRequest.md rename to docs/LeasesRenewLease2Request.md index 0df53fc5..bb6b9685 100644 --- a/docs/RenewRequest.md +++ b/docs/LeasesRenewLease2Request.md @@ -1,4 +1,4 @@ -# RenewRequest +# LeasesRenewLease2Request ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewRenewRequest +### NewLeasesRenewLease2Request -`func NewRenewRequest() *RenewRequest` +`func NewLeasesRenewLease2Request() *LeasesRenewLease2Request` -NewRenewRequest instantiates a new RenewRequest object +NewLeasesRenewLease2Request instantiates a new LeasesRenewLease2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRenewRequestWithDefaults +### NewLeasesRenewLease2RequestWithDefaults -`func NewRenewRequestWithDefaults() *RenewRequest` +`func NewLeasesRenewLease2RequestWithDefaults() *LeasesRenewLease2Request` -NewRenewRequestWithDefaults instantiates a new RenewRequest object +NewLeasesRenewLease2RequestWithDefaults instantiates a new LeasesRenewLease2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIncrement -`func (o *RenewRequest) GetIncrement() int32` +`func (o *LeasesRenewLease2Request) GetIncrement() int32` GetIncrement returns the Increment field if non-nil, zero value otherwise. ### GetIncrementOk -`func (o *RenewRequest) GetIncrementOk() (*int32, bool)` +`func (o *LeasesRenewLease2Request) GetIncrementOk() (*int32, bool)` GetIncrementOk returns a tuple with the Increment field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIncrement -`func (o *RenewRequest) SetIncrement(v int32)` +`func (o *LeasesRenewLease2Request) SetIncrement(v int32)` SetIncrement sets Increment field to given value. ### HasIncrement -`func (o *RenewRequest) HasIncrement() bool` +`func (o *LeasesRenewLease2Request) HasIncrement() bool` HasIncrement returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasIncrement returns a boolean if a field has been set. ### GetLeaseId -`func (o *RenewRequest) GetLeaseId() string` +`func (o *LeasesRenewLease2Request) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *RenewRequest) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRenewLease2Request) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *RenewRequest) SetLeaseId(v string)` +`func (o *LeasesRenewLease2Request) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *RenewRequest) HasLeaseId() bool` +`func (o *LeasesRenewLease2Request) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasLeaseId returns a boolean if a field has been set. ### GetUrlLeaseId -`func (o *RenewRequest) GetUrlLeaseId() string` +`func (o *LeasesRenewLease2Request) GetUrlLeaseId() string` GetUrlLeaseId returns the UrlLeaseId field if non-nil, zero value otherwise. ### GetUrlLeaseIdOk -`func (o *RenewRequest) GetUrlLeaseIdOk() (*string, bool)` +`func (o *LeasesRenewLease2Request) GetUrlLeaseIdOk() (*string, bool)` GetUrlLeaseIdOk returns a tuple with the UrlLeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlLeaseId -`func (o *RenewRequest) SetUrlLeaseId(v string)` +`func (o *LeasesRenewLease2Request) SetUrlLeaseId(v string)` SetUrlLeaseId sets UrlLeaseId field to given value. ### HasUrlLeaseId -`func (o *RenewRequest) HasUrlLeaseId() bool` +`func (o *LeasesRenewLease2Request) HasUrlLeaseId() bool` HasUrlLeaseId returns a boolean if a field has been set. diff --git a/docs/WriteLeasesRenewRequest.md b/docs/LeasesRenewLeaseRequest.md similarity index 67% rename from docs/WriteLeasesRenewRequest.md rename to docs/LeasesRenewLeaseRequest.md index e6a75583..00ee0641 100644 --- a/docs/WriteLeasesRenewRequest.md +++ b/docs/LeasesRenewLeaseRequest.md @@ -1,4 +1,4 @@ -# WriteLeasesRenewRequest +# LeasesRenewLeaseRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLeasesRenewRequest +### NewLeasesRenewLeaseRequest -`func NewWriteLeasesRenewRequest() *WriteLeasesRenewRequest` +`func NewLeasesRenewLeaseRequest() *LeasesRenewLeaseRequest` -NewWriteLeasesRenewRequest instantiates a new WriteLeasesRenewRequest object +NewLeasesRenewLeaseRequest instantiates a new LeasesRenewLeaseRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLeasesRenewRequestWithDefaults +### NewLeasesRenewLeaseRequestWithDefaults -`func NewWriteLeasesRenewRequestWithDefaults() *WriteLeasesRenewRequest` +`func NewLeasesRenewLeaseRequestWithDefaults() *LeasesRenewLeaseRequest` -NewWriteLeasesRenewRequestWithDefaults instantiates a new WriteLeasesRenewRequest object +NewLeasesRenewLeaseRequestWithDefaults instantiates a new LeasesRenewLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIncrement -`func (o *WriteLeasesRenewRequest) GetIncrement() int32` +`func (o *LeasesRenewLeaseRequest) GetIncrement() int32` GetIncrement returns the Increment field if non-nil, zero value otherwise. ### GetIncrementOk -`func (o *WriteLeasesRenewRequest) GetIncrementOk() (*int32, bool)` +`func (o *LeasesRenewLeaseRequest) GetIncrementOk() (*int32, bool)` GetIncrementOk returns a tuple with the Increment field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIncrement -`func (o *WriteLeasesRenewRequest) SetIncrement(v int32)` +`func (o *LeasesRenewLeaseRequest) SetIncrement(v int32)` SetIncrement sets Increment field to given value. ### HasIncrement -`func (o *WriteLeasesRenewRequest) HasIncrement() bool` +`func (o *LeasesRenewLeaseRequest) HasIncrement() bool` HasIncrement returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasIncrement returns a boolean if a field has been set. ### GetLeaseId -`func (o *WriteLeasesRenewRequest) GetLeaseId() string` +`func (o *LeasesRenewLeaseRequest) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *WriteLeasesRenewRequest) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRenewLeaseRequest) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *WriteLeasesRenewRequest) SetLeaseId(v string)` +`func (o *LeasesRenewLeaseRequest) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *WriteLeasesRenewRequest) HasLeaseId() bool` +`func (o *LeasesRenewLeaseRequest) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasLeaseId returns a boolean if a field has been set. ### GetUrlLeaseId -`func (o *WriteLeasesRenewRequest) GetUrlLeaseId() string` +`func (o *LeasesRenewLeaseRequest) GetUrlLeaseId() string` GetUrlLeaseId returns the UrlLeaseId field if non-nil, zero value otherwise. ### GetUrlLeaseIdOk -`func (o *WriteLeasesRenewRequest) GetUrlLeaseIdOk() (*string, bool)` +`func (o *LeasesRenewLeaseRequest) GetUrlLeaseIdOk() (*string, bool)` GetUrlLeaseIdOk returns a tuple with the UrlLeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlLeaseId -`func (o *WriteLeasesRenewRequest) SetUrlLeaseId(v string)` +`func (o *LeasesRenewLeaseRequest) SetUrlLeaseId(v string)` SetUrlLeaseId sets UrlLeaseId field to given value. ### HasUrlLeaseId -`func (o *WriteLeasesRenewRequest) HasUrlLeaseId() bool` +`func (o *LeasesRenewLeaseRequest) HasUrlLeaseId() bool` HasUrlLeaseId returns a boolean if a field has been set. diff --git a/docs/RenewForRequest.md b/docs/LeasesRenewLeaseWithId2Request.md similarity index 62% rename from docs/RenewForRequest.md rename to docs/LeasesRenewLeaseWithId2Request.md index 5fc49eda..748b4485 100644 --- a/docs/RenewForRequest.md +++ b/docs/LeasesRenewLeaseWithId2Request.md @@ -1,4 +1,4 @@ -# RenewForRequest +# LeasesRenewLeaseWithId2Request ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewRenewForRequest +### NewLeasesRenewLeaseWithId2Request -`func NewRenewForRequest() *RenewForRequest` +`func NewLeasesRenewLeaseWithId2Request() *LeasesRenewLeaseWithId2Request` -NewRenewForRequest instantiates a new RenewForRequest object +NewLeasesRenewLeaseWithId2Request instantiates a new LeasesRenewLeaseWithId2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRenewForRequestWithDefaults +### NewLeasesRenewLeaseWithId2RequestWithDefaults -`func NewRenewForRequestWithDefaults() *RenewForRequest` +`func NewLeasesRenewLeaseWithId2RequestWithDefaults() *LeasesRenewLeaseWithId2Request` -NewRenewForRequestWithDefaults instantiates a new RenewForRequest object +NewLeasesRenewLeaseWithId2RequestWithDefaults instantiates a new LeasesRenewLeaseWithId2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIncrement -`func (o *RenewForRequest) GetIncrement() int32` +`func (o *LeasesRenewLeaseWithId2Request) GetIncrement() int32` GetIncrement returns the Increment field if non-nil, zero value otherwise. ### GetIncrementOk -`func (o *RenewForRequest) GetIncrementOk() (*int32, bool)` +`func (o *LeasesRenewLeaseWithId2Request) GetIncrementOk() (*int32, bool)` GetIncrementOk returns a tuple with the Increment field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIncrement -`func (o *RenewForRequest) SetIncrement(v int32)` +`func (o *LeasesRenewLeaseWithId2Request) SetIncrement(v int32)` SetIncrement sets Increment field to given value. ### HasIncrement -`func (o *RenewForRequest) HasIncrement() bool` +`func (o *LeasesRenewLeaseWithId2Request) HasIncrement() bool` HasIncrement returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasIncrement returns a boolean if a field has been set. ### GetLeaseId -`func (o *RenewForRequest) GetLeaseId() string` +`func (o *LeasesRenewLeaseWithId2Request) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *RenewForRequest) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRenewLeaseWithId2Request) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *RenewForRequest) SetLeaseId(v string)` +`func (o *LeasesRenewLeaseWithId2Request) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *RenewForRequest) HasLeaseId() bool` +`func (o *LeasesRenewLeaseWithId2Request) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. diff --git a/docs/WriteLeasesRenew2Request.md b/docs/LeasesRenewLeaseWithIdRequest.md similarity index 63% rename from docs/WriteLeasesRenew2Request.md rename to docs/LeasesRenewLeaseWithIdRequest.md index c980dae9..87417b7a 100644 --- a/docs/WriteLeasesRenew2Request.md +++ b/docs/LeasesRenewLeaseWithIdRequest.md @@ -1,4 +1,4 @@ -# WriteLeasesRenew2Request +# LeasesRenewLeaseWithIdRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLeasesRenew2Request +### NewLeasesRenewLeaseWithIdRequest -`func NewWriteLeasesRenew2Request() *WriteLeasesRenew2Request` +`func NewLeasesRenewLeaseWithIdRequest() *LeasesRenewLeaseWithIdRequest` -NewWriteLeasesRenew2Request instantiates a new WriteLeasesRenew2Request object +NewLeasesRenewLeaseWithIdRequest instantiates a new LeasesRenewLeaseWithIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLeasesRenew2RequestWithDefaults +### NewLeasesRenewLeaseWithIdRequestWithDefaults -`func NewWriteLeasesRenew2RequestWithDefaults() *WriteLeasesRenew2Request` +`func NewLeasesRenewLeaseWithIdRequestWithDefaults() *LeasesRenewLeaseWithIdRequest` -NewWriteLeasesRenew2RequestWithDefaults instantiates a new WriteLeasesRenew2Request object +NewLeasesRenewLeaseWithIdRequestWithDefaults instantiates a new LeasesRenewLeaseWithIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIncrement -`func (o *WriteLeasesRenew2Request) GetIncrement() int32` +`func (o *LeasesRenewLeaseWithIdRequest) GetIncrement() int32` GetIncrement returns the Increment field if non-nil, zero value otherwise. ### GetIncrementOk -`func (o *WriteLeasesRenew2Request) GetIncrementOk() (*int32, bool)` +`func (o *LeasesRenewLeaseWithIdRequest) GetIncrementOk() (*int32, bool)` GetIncrementOk returns a tuple with the Increment field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIncrement -`func (o *WriteLeasesRenew2Request) SetIncrement(v int32)` +`func (o *LeasesRenewLeaseWithIdRequest) SetIncrement(v int32)` SetIncrement sets Increment field to given value. ### HasIncrement -`func (o *WriteLeasesRenew2Request) HasIncrement() bool` +`func (o *LeasesRenewLeaseWithIdRequest) HasIncrement() bool` HasIncrement returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasIncrement returns a boolean if a field has been set. ### GetLeaseId -`func (o *WriteLeasesRenew2Request) GetLeaseId() string` +`func (o *LeasesRenewLeaseWithIdRequest) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *WriteLeasesRenew2Request) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRenewLeaseWithIdRequest) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *WriteLeasesRenew2Request) SetLeaseId(v string)` +`func (o *LeasesRenewLeaseWithIdRequest) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *WriteLeasesRenew2Request) HasLeaseId() bool` +`func (o *LeasesRenewLeaseWithIdRequest) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. diff --git a/docs/RevokeRequest.md b/docs/LeasesRevokeLease2Request.md similarity index 65% rename from docs/RevokeRequest.md rename to docs/LeasesRevokeLease2Request.md index 76d03245..828dbedd 100644 --- a/docs/RevokeRequest.md +++ b/docs/LeasesRevokeLease2Request.md @@ -1,4 +1,4 @@ -# RevokeRequest +# LeasesRevokeLease2Request ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewRevokeRequest +### NewLeasesRevokeLease2Request -`func NewRevokeRequest() *RevokeRequest` +`func NewLeasesRevokeLease2Request() *LeasesRevokeLease2Request` -NewRevokeRequest instantiates a new RevokeRequest object +NewLeasesRevokeLease2Request instantiates a new LeasesRevokeLease2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRevokeRequestWithDefaults +### NewLeasesRevokeLease2RequestWithDefaults -`func NewRevokeRequestWithDefaults() *RevokeRequest` +`func NewLeasesRevokeLease2RequestWithDefaults() *LeasesRevokeLease2Request` -NewRevokeRequestWithDefaults instantiates a new RevokeRequest object +NewLeasesRevokeLease2RequestWithDefaults instantiates a new LeasesRevokeLease2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLeaseId -`func (o *RevokeRequest) GetLeaseId() string` +`func (o *LeasesRevokeLease2Request) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *RevokeRequest) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRevokeLease2Request) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *RevokeRequest) SetLeaseId(v string)` +`func (o *LeasesRevokeLease2Request) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *RevokeRequest) HasLeaseId() bool` +`func (o *LeasesRevokeLease2Request) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasLeaseId returns a boolean if a field has been set. ### GetSync -`func (o *RevokeRequest) GetSync() bool` +`func (o *LeasesRevokeLease2Request) GetSync() bool` GetSync returns the Sync field if non-nil, zero value otherwise. ### GetSyncOk -`func (o *RevokeRequest) GetSyncOk() (*bool, bool)` +`func (o *LeasesRevokeLease2Request) GetSyncOk() (*bool, bool)` GetSyncOk returns a tuple with the Sync field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSync -`func (o *RevokeRequest) SetSync(v bool)` +`func (o *LeasesRevokeLease2Request) SetSync(v bool)` SetSync sets Sync field to given value. ### HasSync -`func (o *RevokeRequest) HasSync() bool` +`func (o *LeasesRevokeLease2Request) HasSync() bool` HasSync returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasSync returns a boolean if a field has been set. ### GetUrlLeaseId -`func (o *RevokeRequest) GetUrlLeaseId() string` +`func (o *LeasesRevokeLease2Request) GetUrlLeaseId() string` GetUrlLeaseId returns the UrlLeaseId field if non-nil, zero value otherwise. ### GetUrlLeaseIdOk -`func (o *RevokeRequest) GetUrlLeaseIdOk() (*string, bool)` +`func (o *LeasesRevokeLease2Request) GetUrlLeaseIdOk() (*string, bool)` GetUrlLeaseIdOk returns a tuple with the UrlLeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlLeaseId -`func (o *RevokeRequest) SetUrlLeaseId(v string)` +`func (o *LeasesRevokeLease2Request) SetUrlLeaseId(v string)` SetUrlLeaseId sets UrlLeaseId field to given value. ### HasUrlLeaseId -`func (o *RevokeRequest) HasUrlLeaseId() bool` +`func (o *LeasesRevokeLease2Request) HasUrlLeaseId() bool` HasUrlLeaseId returns a boolean if a field has been set. diff --git a/docs/WriteLeasesRevokeRequest.md b/docs/LeasesRevokeLeaseRequest.md similarity index 66% rename from docs/WriteLeasesRevokeRequest.md rename to docs/LeasesRevokeLeaseRequest.md index 2aa1041c..3ae7a5ba 100644 --- a/docs/WriteLeasesRevokeRequest.md +++ b/docs/LeasesRevokeLeaseRequest.md @@ -1,4 +1,4 @@ -# WriteLeasesRevokeRequest +# LeasesRevokeLeaseRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLeasesRevokeRequest +### NewLeasesRevokeLeaseRequest -`func NewWriteLeasesRevokeRequest() *WriteLeasesRevokeRequest` +`func NewLeasesRevokeLeaseRequest() *LeasesRevokeLeaseRequest` -NewWriteLeasesRevokeRequest instantiates a new WriteLeasesRevokeRequest object +NewLeasesRevokeLeaseRequest instantiates a new LeasesRevokeLeaseRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLeasesRevokeRequestWithDefaults +### NewLeasesRevokeLeaseRequestWithDefaults -`func NewWriteLeasesRevokeRequestWithDefaults() *WriteLeasesRevokeRequest` +`func NewLeasesRevokeLeaseRequestWithDefaults() *LeasesRevokeLeaseRequest` -NewWriteLeasesRevokeRequestWithDefaults instantiates a new WriteLeasesRevokeRequest object +NewLeasesRevokeLeaseRequestWithDefaults instantiates a new LeasesRevokeLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLeaseId -`func (o *WriteLeasesRevokeRequest) GetLeaseId() string` +`func (o *LeasesRevokeLeaseRequest) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *WriteLeasesRevokeRequest) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRevokeLeaseRequest) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *WriteLeasesRevokeRequest) SetLeaseId(v string)` +`func (o *LeasesRevokeLeaseRequest) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *WriteLeasesRevokeRequest) HasLeaseId() bool` +`func (o *LeasesRevokeLeaseRequest) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasLeaseId returns a boolean if a field has been set. ### GetSync -`func (o *WriteLeasesRevokeRequest) GetSync() bool` +`func (o *LeasesRevokeLeaseRequest) GetSync() bool` GetSync returns the Sync field if non-nil, zero value otherwise. ### GetSyncOk -`func (o *WriteLeasesRevokeRequest) GetSyncOk() (*bool, bool)` +`func (o *LeasesRevokeLeaseRequest) GetSyncOk() (*bool, bool)` GetSyncOk returns a tuple with the Sync field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSync -`func (o *WriteLeasesRevokeRequest) SetSync(v bool)` +`func (o *LeasesRevokeLeaseRequest) SetSync(v bool)` SetSync sets Sync field to given value. ### HasSync -`func (o *WriteLeasesRevokeRequest) HasSync() bool` +`func (o *LeasesRevokeLeaseRequest) HasSync() bool` HasSync returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasSync returns a boolean if a field has been set. ### GetUrlLeaseId -`func (o *WriteLeasesRevokeRequest) GetUrlLeaseId() string` +`func (o *LeasesRevokeLeaseRequest) GetUrlLeaseId() string` GetUrlLeaseId returns the UrlLeaseId field if non-nil, zero value otherwise. ### GetUrlLeaseIdOk -`func (o *WriteLeasesRevokeRequest) GetUrlLeaseIdOk() (*string, bool)` +`func (o *LeasesRevokeLeaseRequest) GetUrlLeaseIdOk() (*string, bool)` GetUrlLeaseIdOk returns a tuple with the UrlLeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlLeaseId -`func (o *WriteLeasesRevokeRequest) SetUrlLeaseId(v string)` +`func (o *LeasesRevokeLeaseRequest) SetUrlLeaseId(v string)` SetUrlLeaseId sets UrlLeaseId field to given value. ### HasUrlLeaseId -`func (o *WriteLeasesRevokeRequest) HasUrlLeaseId() bool` +`func (o *LeasesRevokeLeaseRequest) HasUrlLeaseId() bool` HasUrlLeaseId returns a boolean if a field has been set. diff --git a/docs/RevokeLeaseRequest.md b/docs/LeasesRevokeLeaseWithId2Request.md similarity index 62% rename from docs/RevokeLeaseRequest.md rename to docs/LeasesRevokeLeaseWithId2Request.md index 721d96cb..a9c369b2 100644 --- a/docs/RevokeLeaseRequest.md +++ b/docs/LeasesRevokeLeaseWithId2Request.md @@ -1,4 +1,4 @@ -# RevokeLeaseRequest +# LeasesRevokeLeaseWithId2Request ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewRevokeLeaseRequest +### NewLeasesRevokeLeaseWithId2Request -`func NewRevokeLeaseRequest() *RevokeLeaseRequest` +`func NewLeasesRevokeLeaseWithId2Request() *LeasesRevokeLeaseWithId2Request` -NewRevokeLeaseRequest instantiates a new RevokeLeaseRequest object +NewLeasesRevokeLeaseWithId2Request instantiates a new LeasesRevokeLeaseWithId2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRevokeLeaseRequestWithDefaults +### NewLeasesRevokeLeaseWithId2RequestWithDefaults -`func NewRevokeLeaseRequestWithDefaults() *RevokeLeaseRequest` +`func NewLeasesRevokeLeaseWithId2RequestWithDefaults() *LeasesRevokeLeaseWithId2Request` -NewRevokeLeaseRequestWithDefaults instantiates a new RevokeLeaseRequest object +NewLeasesRevokeLeaseWithId2RequestWithDefaults instantiates a new LeasesRevokeLeaseWithId2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLeaseId -`func (o *RevokeLeaseRequest) GetLeaseId() string` +`func (o *LeasesRevokeLeaseWithId2Request) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *RevokeLeaseRequest) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRevokeLeaseWithId2Request) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *RevokeLeaseRequest) SetLeaseId(v string)` +`func (o *LeasesRevokeLeaseWithId2Request) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *RevokeLeaseRequest) HasLeaseId() bool` +`func (o *LeasesRevokeLeaseWithId2Request) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasLeaseId returns a boolean if a field has been set. ### GetSync -`func (o *RevokeLeaseRequest) GetSync() bool` +`func (o *LeasesRevokeLeaseWithId2Request) GetSync() bool` GetSync returns the Sync field if non-nil, zero value otherwise. ### GetSyncOk -`func (o *RevokeLeaseRequest) GetSyncOk() (*bool, bool)` +`func (o *LeasesRevokeLeaseWithId2Request) GetSyncOk() (*bool, bool)` GetSyncOk returns a tuple with the Sync field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSync -`func (o *RevokeLeaseRequest) SetSync(v bool)` +`func (o *LeasesRevokeLeaseWithId2Request) SetSync(v bool)` SetSync sets Sync field to given value. ### HasSync -`func (o *RevokeLeaseRequest) HasSync() bool` +`func (o *LeasesRevokeLeaseWithId2Request) HasSync() bool` HasSync returns a boolean if a field has been set. diff --git a/docs/WriteLeasesRevoke2Request.md b/docs/LeasesRevokeLeaseWithIdRequest.md similarity index 62% rename from docs/WriteLeasesRevoke2Request.md rename to docs/LeasesRevokeLeaseWithIdRequest.md index 4f9e3237..f18ce714 100644 --- a/docs/WriteLeasesRevoke2Request.md +++ b/docs/LeasesRevokeLeaseWithIdRequest.md @@ -1,4 +1,4 @@ -# WriteLeasesRevoke2Request +# LeasesRevokeLeaseWithIdRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLeasesRevoke2Request +### NewLeasesRevokeLeaseWithIdRequest -`func NewWriteLeasesRevoke2Request() *WriteLeasesRevoke2Request` +`func NewLeasesRevokeLeaseWithIdRequest() *LeasesRevokeLeaseWithIdRequest` -NewWriteLeasesRevoke2Request instantiates a new WriteLeasesRevoke2Request object +NewLeasesRevokeLeaseWithIdRequest instantiates a new LeasesRevokeLeaseWithIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLeasesRevoke2RequestWithDefaults +### NewLeasesRevokeLeaseWithIdRequestWithDefaults -`func NewWriteLeasesRevoke2RequestWithDefaults() *WriteLeasesRevoke2Request` +`func NewLeasesRevokeLeaseWithIdRequestWithDefaults() *LeasesRevokeLeaseWithIdRequest` -NewWriteLeasesRevoke2RequestWithDefaults instantiates a new WriteLeasesRevoke2Request object +NewLeasesRevokeLeaseWithIdRequestWithDefaults instantiates a new LeasesRevokeLeaseWithIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLeaseId -`func (o *WriteLeasesRevoke2Request) GetLeaseId() string` +`func (o *LeasesRevokeLeaseWithIdRequest) GetLeaseId() string` GetLeaseId returns the LeaseId field if non-nil, zero value otherwise. ### GetLeaseIdOk -`func (o *WriteLeasesRevoke2Request) GetLeaseIdOk() (*string, bool)` +`func (o *LeasesRevokeLeaseWithIdRequest) GetLeaseIdOk() (*string, bool)` GetLeaseIdOk returns a tuple with the LeaseId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeaseId -`func (o *WriteLeasesRevoke2Request) SetLeaseId(v string)` +`func (o *LeasesRevokeLeaseWithIdRequest) SetLeaseId(v string)` SetLeaseId sets LeaseId field to given value. ### HasLeaseId -`func (o *WriteLeasesRevoke2Request) HasLeaseId() bool` +`func (o *LeasesRevokeLeaseWithIdRequest) HasLeaseId() bool` HasLeaseId returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasLeaseId returns a boolean if a field has been set. ### GetSync -`func (o *WriteLeasesRevoke2Request) GetSync() bool` +`func (o *LeasesRevokeLeaseWithIdRequest) GetSync() bool` GetSync returns the Sync field if non-nil, zero value otherwise. ### GetSyncOk -`func (o *WriteLeasesRevoke2Request) GetSyncOk() (*bool, bool)` +`func (o *LeasesRevokeLeaseWithIdRequest) GetSyncOk() (*bool, bool)` GetSyncOk returns a tuple with the Sync field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSync -`func (o *WriteLeasesRevoke2Request) SetSync(v bool)` +`func (o *LeasesRevokeLeaseWithIdRequest) SetSync(v bool)` SetSync sets Sync field to given value. ### HasSync -`func (o *WriteLeasesRevoke2Request) HasSync() bool` +`func (o *LeasesRevokeLeaseWithIdRequest) HasSync() bool` HasSync returns a boolean if a field has been set. diff --git a/docs/WriteLeasesRevokePrefixRequest.md b/docs/LeasesRevokeLeaseWithPrefix2Request.md similarity index 58% rename from docs/WriteLeasesRevokePrefixRequest.md rename to docs/LeasesRevokeLeaseWithPrefix2Request.md index a38be997..a8a59c62 100644 --- a/docs/WriteLeasesRevokePrefixRequest.md +++ b/docs/LeasesRevokeLeaseWithPrefix2Request.md @@ -1,4 +1,4 @@ -# WriteLeasesRevokePrefixRequest +# LeasesRevokeLeaseWithPrefix2Request ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLeasesRevokePrefixRequest +### NewLeasesRevokeLeaseWithPrefix2Request -`func NewWriteLeasesRevokePrefixRequest() *WriteLeasesRevokePrefixRequest` +`func NewLeasesRevokeLeaseWithPrefix2Request() *LeasesRevokeLeaseWithPrefix2Request` -NewWriteLeasesRevokePrefixRequest instantiates a new WriteLeasesRevokePrefixRequest object +NewLeasesRevokeLeaseWithPrefix2Request instantiates a new LeasesRevokeLeaseWithPrefix2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLeasesRevokePrefixRequestWithDefaults +### NewLeasesRevokeLeaseWithPrefix2RequestWithDefaults -`func NewWriteLeasesRevokePrefixRequestWithDefaults() *WriteLeasesRevokePrefixRequest` +`func NewLeasesRevokeLeaseWithPrefix2RequestWithDefaults() *LeasesRevokeLeaseWithPrefix2Request` -NewWriteLeasesRevokePrefixRequestWithDefaults instantiates a new WriteLeasesRevokePrefixRequest object +NewLeasesRevokeLeaseWithPrefix2RequestWithDefaults instantiates a new LeasesRevokeLeaseWithPrefix2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSync -`func (o *WriteLeasesRevokePrefixRequest) GetSync() bool` +`func (o *LeasesRevokeLeaseWithPrefix2Request) GetSync() bool` GetSync returns the Sync field if non-nil, zero value otherwise. ### GetSyncOk -`func (o *WriteLeasesRevokePrefixRequest) GetSyncOk() (*bool, bool)` +`func (o *LeasesRevokeLeaseWithPrefix2Request) GetSyncOk() (*bool, bool)` GetSyncOk returns a tuple with the Sync field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSync -`func (o *WriteLeasesRevokePrefixRequest) SetSync(v bool)` +`func (o *LeasesRevokeLeaseWithPrefix2Request) SetSync(v bool)` SetSync sets Sync field to given value. ### HasSync -`func (o *WriteLeasesRevokePrefixRequest) HasSync() bool` +`func (o *LeasesRevokeLeaseWithPrefix2Request) HasSync() bool` HasSync returns a boolean if a field has been set. diff --git a/docs/RevokePrefixRequest.md b/docs/LeasesRevokeLeaseWithPrefixRequest.md similarity index 59% rename from docs/RevokePrefixRequest.md rename to docs/LeasesRevokeLeaseWithPrefixRequest.md index 4cf34ffb..a4a49fed 100644 --- a/docs/RevokePrefixRequest.md +++ b/docs/LeasesRevokeLeaseWithPrefixRequest.md @@ -1,4 +1,4 @@ -# RevokePrefixRequest +# LeasesRevokeLeaseWithPrefixRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewRevokePrefixRequest +### NewLeasesRevokeLeaseWithPrefixRequest -`func NewRevokePrefixRequest() *RevokePrefixRequest` +`func NewLeasesRevokeLeaseWithPrefixRequest() *LeasesRevokeLeaseWithPrefixRequest` -NewRevokePrefixRequest instantiates a new RevokePrefixRequest object +NewLeasesRevokeLeaseWithPrefixRequest instantiates a new LeasesRevokeLeaseWithPrefixRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRevokePrefixRequestWithDefaults +### NewLeasesRevokeLeaseWithPrefixRequestWithDefaults -`func NewRevokePrefixRequestWithDefaults() *RevokePrefixRequest` +`func NewLeasesRevokeLeaseWithPrefixRequestWithDefaults() *LeasesRevokeLeaseWithPrefixRequest` -NewRevokePrefixRequestWithDefaults instantiates a new RevokePrefixRequest object +NewLeasesRevokeLeaseWithPrefixRequestWithDefaults instantiates a new LeasesRevokeLeaseWithPrefixRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSync -`func (o *RevokePrefixRequest) GetSync() bool` +`func (o *LeasesRevokeLeaseWithPrefixRequest) GetSync() bool` GetSync returns the Sync field if non-nil, zero value otherwise. ### GetSyncOk -`func (o *RevokePrefixRequest) GetSyncOk() (*bool, bool)` +`func (o *LeasesRevokeLeaseWithPrefixRequest) GetSyncOk() (*bool, bool)` GetSyncOk returns a tuple with the Sync field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSync -`func (o *RevokePrefixRequest) SetSync(v bool)` +`func (o *LeasesRevokeLeaseWithPrefixRequest) SetSync(v bool)` SetSync sets Sync field to given value. ### HasSync -`func (o *RevokePrefixRequest) HasSync() bool` +`func (o *LeasesRevokeLeaseWithPrefixRequest) HasSync() bool` HasSync returns a boolean if a field has been set. diff --git a/docs/WriteLoggerRequest.md b/docs/LoggersUpdateVerbosityLevelForRequest.md similarity index 60% rename from docs/WriteLoggerRequest.md rename to docs/LoggersUpdateVerbosityLevelForRequest.md index 5f1e876a..f97f7f13 100644 --- a/docs/WriteLoggerRequest.md +++ b/docs/LoggersUpdateVerbosityLevelForRequest.md @@ -1,4 +1,4 @@ -# WriteLoggerRequest +# LoggersUpdateVerbosityLevelForRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLoggerRequest +### NewLoggersUpdateVerbosityLevelForRequest -`func NewWriteLoggerRequest() *WriteLoggerRequest` +`func NewLoggersUpdateVerbosityLevelForRequest() *LoggersUpdateVerbosityLevelForRequest` -NewWriteLoggerRequest instantiates a new WriteLoggerRequest object +NewLoggersUpdateVerbosityLevelForRequest instantiates a new LoggersUpdateVerbosityLevelForRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLoggerRequestWithDefaults +### NewLoggersUpdateVerbosityLevelForRequestWithDefaults -`func NewWriteLoggerRequestWithDefaults() *WriteLoggerRequest` +`func NewLoggersUpdateVerbosityLevelForRequestWithDefaults() *LoggersUpdateVerbosityLevelForRequest` -NewWriteLoggerRequestWithDefaults instantiates a new WriteLoggerRequest object +NewLoggersUpdateVerbosityLevelForRequestWithDefaults instantiates a new LoggersUpdateVerbosityLevelForRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLevel -`func (o *WriteLoggerRequest) GetLevel() string` +`func (o *LoggersUpdateVerbosityLevelForRequest) GetLevel() string` GetLevel returns the Level field if non-nil, zero value otherwise. ### GetLevelOk -`func (o *WriteLoggerRequest) GetLevelOk() (*string, bool)` +`func (o *LoggersUpdateVerbosityLevelForRequest) GetLevelOk() (*string, bool)` GetLevelOk returns a tuple with the Level field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLevel -`func (o *WriteLoggerRequest) SetLevel(v string)` +`func (o *LoggersUpdateVerbosityLevelForRequest) SetLevel(v string)` SetLevel sets Level field to given value. ### HasLevel -`func (o *WriteLoggerRequest) HasLevel() bool` +`func (o *LoggersUpdateVerbosityLevelForRequest) HasLevel() bool` HasLevel returns a boolean if a field has been set. diff --git a/docs/WriteLoggersRequest.md b/docs/LoggersUpdateVerbosityLevelRequest.md similarity index 61% rename from docs/WriteLoggersRequest.md rename to docs/LoggersUpdateVerbosityLevelRequest.md index 51c0bb5e..2a0fec52 100644 --- a/docs/WriteLoggersRequest.md +++ b/docs/LoggersUpdateVerbosityLevelRequest.md @@ -1,4 +1,4 @@ -# WriteLoggersRequest +# LoggersUpdateVerbosityLevelRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteLoggersRequest +### NewLoggersUpdateVerbosityLevelRequest -`func NewWriteLoggersRequest() *WriteLoggersRequest` +`func NewLoggersUpdateVerbosityLevelRequest() *LoggersUpdateVerbosityLevelRequest` -NewWriteLoggersRequest instantiates a new WriteLoggersRequest object +NewLoggersUpdateVerbosityLevelRequest instantiates a new LoggersUpdateVerbosityLevelRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteLoggersRequestWithDefaults +### NewLoggersUpdateVerbosityLevelRequestWithDefaults -`func NewWriteLoggersRequestWithDefaults() *WriteLoggersRequest` +`func NewLoggersUpdateVerbosityLevelRequestWithDefaults() *LoggersUpdateVerbosityLevelRequest` -NewWriteLoggersRequestWithDefaults instantiates a new WriteLoggersRequest object +NewLoggersUpdateVerbosityLevelRequestWithDefaults instantiates a new LoggersUpdateVerbosityLevelRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetLevel -`func (o *WriteLoggersRequest) GetLevel() string` +`func (o *LoggersUpdateVerbosityLevelRequest) GetLevel() string` GetLevel returns the Level field if non-nil, zero value otherwise. ### GetLevelOk -`func (o *WriteLoggersRequest) GetLevelOk() (*string, bool)` +`func (o *LoggersUpdateVerbosityLevelRequest) GetLevelOk() (*string, bool)` GetLevelOk returns a tuple with the Level field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLevel -`func (o *WriteLoggersRequest) SetLevel(v string)` +`func (o *LoggersUpdateVerbosityLevelRequest) SetLevel(v string)` SetLevel sets Level field to given value. ### HasLevel -`func (o *WriteLoggersRequest) HasLevel() bool` +`func (o *LoggersUpdateVerbosityLevelRequest) HasLevel() bool` HasLevel returns a boolean if a field has been set. diff --git a/docs/MFAValidateRequest.md b/docs/MFAValidateRequest.md index 0769c5de..d03f9a32 100644 --- a/docs/MFAValidateRequest.md +++ b/docs/MFAValidateRequest.md @@ -1,4 +1,4 @@ -# MFAValidateRequest +# MfaValidateRequest ## Properties @@ -13,40 +13,40 @@ Name | Type | Description | Notes ## Methods -### NewMFAValidateRequest +### NewMfaValidateRequest -`func NewMFAValidateRequest(mfaPayload map[string]interface{}, mfaRequestId string, ) *MFAValidateRequest` +`func NewMfaValidateRequest(mfaPayload map[string]interface{}, mfaRequestId string, ) *MfaValidateRequest` -NewMFAValidateRequest instantiates a new MFAValidateRequest object +NewMfaValidateRequest instantiates a new MfaValidateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAValidateRequestWithDefaults +### NewMfaValidateRequestWithDefaults -`func NewMFAValidateRequestWithDefaults() *MFAValidateRequest` +`func NewMfaValidateRequestWithDefaults() *MfaValidateRequest` -NewMFAValidateRequestWithDefaults instantiates a new MFAValidateRequest object +NewMfaValidateRequestWithDefaults instantiates a new MfaValidateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMfaPayload -`func (o *MFAValidateRequest) GetMfaPayload() map[string]interface{}` +`func (o *MfaValidateRequest) GetMfaPayload() map[string]interface{}` GetMfaPayload returns the MfaPayload field if non-nil, zero value otherwise. ### GetMfaPayloadOk -`func (o *MFAValidateRequest) GetMfaPayloadOk() (*map[string]interface{}, bool)` +`func (o *MfaValidateRequest) GetMfaPayloadOk() (*map[string]interface{}, bool)` GetMfaPayloadOk returns a tuple with the MfaPayload field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMfaPayload -`func (o *MFAValidateRequest) SetMfaPayload(v map[string]interface{})` +`func (o *MfaValidateRequest) SetMfaPayload(v map[string]interface{})` SetMfaPayload sets MfaPayload field to given value. @@ -56,20 +56,20 @@ SetMfaPayload sets MfaPayload field to given value. ### GetMfaRequestId -`func (o *MFAValidateRequest) GetMfaRequestId() string` +`func (o *MfaValidateRequest) GetMfaRequestId() string` GetMfaRequestId returns the MfaRequestId field if non-nil, zero value otherwise. ### GetMfaRequestIdOk -`func (o *MFAValidateRequest) GetMfaRequestIdOk() (*string, bool)` +`func (o *MfaValidateRequest) GetMfaRequestIdOk() (*string, bool)` GetMfaRequestIdOk returns a tuple with the MfaRequestId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMfaRequestId -`func (o *MFAValidateRequest) SetMfaRequestId(v string)` +`func (o *MfaValidateRequest) SetMfaRequestId(v string)` SetMfaRequestId sets MfaRequestId field to given value. diff --git a/docs/MFAWriteLoginEnforcementRequest.md b/docs/MFAWriteLoginEnforcementRequest.md index 95715f64..11e0a07e 100644 --- a/docs/MFAWriteLoginEnforcementRequest.md +++ b/docs/MFAWriteLoginEnforcementRequest.md @@ -1,4 +1,4 @@ -# MFAWriteLoginEnforcementRequest +# MfaWriteLoginEnforcementRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewMFAWriteLoginEnforcementRequest +### NewMfaWriteLoginEnforcementRequest -`func NewMFAWriteLoginEnforcementRequest(mfaMethodIds []string, ) *MFAWriteLoginEnforcementRequest` +`func NewMfaWriteLoginEnforcementRequest(mfaMethodIds []string, ) *MfaWriteLoginEnforcementRequest` -NewMFAWriteLoginEnforcementRequest instantiates a new MFAWriteLoginEnforcementRequest object +NewMfaWriteLoginEnforcementRequest instantiates a new MfaWriteLoginEnforcementRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAWriteLoginEnforcementRequestWithDefaults +### NewMfaWriteLoginEnforcementRequestWithDefaults -`func NewMFAWriteLoginEnforcementRequestWithDefaults() *MFAWriteLoginEnforcementRequest` +`func NewMfaWriteLoginEnforcementRequestWithDefaults() *MfaWriteLoginEnforcementRequest` -NewMFAWriteLoginEnforcementRequestWithDefaults instantiates a new MFAWriteLoginEnforcementRequest object +NewMfaWriteLoginEnforcementRequestWithDefaults instantiates a new MfaWriteLoginEnforcementRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAuthMethodAccessors -`func (o *MFAWriteLoginEnforcementRequest) GetAuthMethodAccessors() []string` +`func (o *MfaWriteLoginEnforcementRequest) GetAuthMethodAccessors() []string` GetAuthMethodAccessors returns the AuthMethodAccessors field if non-nil, zero value otherwise. ### GetAuthMethodAccessorsOk -`func (o *MFAWriteLoginEnforcementRequest) GetAuthMethodAccessorsOk() (*[]string, bool)` +`func (o *MfaWriteLoginEnforcementRequest) GetAuthMethodAccessorsOk() (*[]string, bool)` GetAuthMethodAccessorsOk returns a tuple with the AuthMethodAccessors field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAuthMethodAccessors -`func (o *MFAWriteLoginEnforcementRequest) SetAuthMethodAccessors(v []string)` +`func (o *MfaWriteLoginEnforcementRequest) SetAuthMethodAccessors(v []string)` SetAuthMethodAccessors sets AuthMethodAccessors field to given value. ### HasAuthMethodAccessors -`func (o *MFAWriteLoginEnforcementRequest) HasAuthMethodAccessors() bool` +`func (o *MfaWriteLoginEnforcementRequest) HasAuthMethodAccessors() bool` HasAuthMethodAccessors returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasAuthMethodAccessors returns a boolean if a field has been set. ### GetAuthMethodTypes -`func (o *MFAWriteLoginEnforcementRequest) GetAuthMethodTypes() []string` +`func (o *MfaWriteLoginEnforcementRequest) GetAuthMethodTypes() []string` GetAuthMethodTypes returns the AuthMethodTypes field if non-nil, zero value otherwise. ### GetAuthMethodTypesOk -`func (o *MFAWriteLoginEnforcementRequest) GetAuthMethodTypesOk() (*[]string, bool)` +`func (o *MfaWriteLoginEnforcementRequest) GetAuthMethodTypesOk() (*[]string, bool)` GetAuthMethodTypesOk returns a tuple with the AuthMethodTypes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAuthMethodTypes -`func (o *MFAWriteLoginEnforcementRequest) SetAuthMethodTypes(v []string)` +`func (o *MfaWriteLoginEnforcementRequest) SetAuthMethodTypes(v []string)` SetAuthMethodTypes sets AuthMethodTypes field to given value. ### HasAuthMethodTypes -`func (o *MFAWriteLoginEnforcementRequest) HasAuthMethodTypes() bool` +`func (o *MfaWriteLoginEnforcementRequest) HasAuthMethodTypes() bool` HasAuthMethodTypes returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasAuthMethodTypes returns a boolean if a field has been set. ### GetIdentityEntityIds -`func (o *MFAWriteLoginEnforcementRequest) GetIdentityEntityIds() []string` +`func (o *MfaWriteLoginEnforcementRequest) GetIdentityEntityIds() []string` GetIdentityEntityIds returns the IdentityEntityIds field if non-nil, zero value otherwise. ### GetIdentityEntityIdsOk -`func (o *MFAWriteLoginEnforcementRequest) GetIdentityEntityIdsOk() (*[]string, bool)` +`func (o *MfaWriteLoginEnforcementRequest) GetIdentityEntityIdsOk() (*[]string, bool)` GetIdentityEntityIdsOk returns a tuple with the IdentityEntityIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIdentityEntityIds -`func (o *MFAWriteLoginEnforcementRequest) SetIdentityEntityIds(v []string)` +`func (o *MfaWriteLoginEnforcementRequest) SetIdentityEntityIds(v []string)` SetIdentityEntityIds sets IdentityEntityIds field to given value. ### HasIdentityEntityIds -`func (o *MFAWriteLoginEnforcementRequest) HasIdentityEntityIds() bool` +`func (o *MfaWriteLoginEnforcementRequest) HasIdentityEntityIds() bool` HasIdentityEntityIds returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasIdentityEntityIds returns a boolean if a field has been set. ### GetIdentityGroupIds -`func (o *MFAWriteLoginEnforcementRequest) GetIdentityGroupIds() []string` +`func (o *MfaWriteLoginEnforcementRequest) GetIdentityGroupIds() []string` GetIdentityGroupIds returns the IdentityGroupIds field if non-nil, zero value otherwise. ### GetIdentityGroupIdsOk -`func (o *MFAWriteLoginEnforcementRequest) GetIdentityGroupIdsOk() (*[]string, bool)` +`func (o *MfaWriteLoginEnforcementRequest) GetIdentityGroupIdsOk() (*[]string, bool)` GetIdentityGroupIdsOk returns a tuple with the IdentityGroupIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIdentityGroupIds -`func (o *MFAWriteLoginEnforcementRequest) SetIdentityGroupIds(v []string)` +`func (o *MfaWriteLoginEnforcementRequest) SetIdentityGroupIds(v []string)` SetIdentityGroupIds sets IdentityGroupIds field to given value. ### HasIdentityGroupIds -`func (o *MFAWriteLoginEnforcementRequest) HasIdentityGroupIds() bool` +`func (o *MfaWriteLoginEnforcementRequest) HasIdentityGroupIds() bool` HasIdentityGroupIds returns a boolean if a field has been set. @@ -152,20 +152,20 @@ HasIdentityGroupIds returns a boolean if a field has been set. ### GetMfaMethodIds -`func (o *MFAWriteLoginEnforcementRequest) GetMfaMethodIds() []string` +`func (o *MfaWriteLoginEnforcementRequest) GetMfaMethodIds() []string` GetMfaMethodIds returns the MfaMethodIds field if non-nil, zero value otherwise. ### GetMfaMethodIdsOk -`func (o *MFAWriteLoginEnforcementRequest) GetMfaMethodIdsOk() (*[]string, bool)` +`func (o *MfaWriteLoginEnforcementRequest) GetMfaMethodIdsOk() (*[]string, bool)` GetMfaMethodIdsOk returns a tuple with the MfaMethodIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMfaMethodIds -`func (o *MFAWriteLoginEnforcementRequest) SetMfaMethodIds(v []string)` +`func (o *MfaWriteLoginEnforcementRequest) SetMfaMethodIds(v []string)` SetMfaMethodIds sets MfaMethodIds field to given value. diff --git a/docs/MFAMethodAdminDestroyTOTPRequest.md b/docs/MfaAdminDestroyTotpSecretRequest.md similarity index 62% rename from docs/MFAMethodAdminDestroyTOTPRequest.md rename to docs/MfaAdminDestroyTotpSecretRequest.md index 6b030489..2edee887 100644 --- a/docs/MFAMethodAdminDestroyTOTPRequest.md +++ b/docs/MfaAdminDestroyTotpSecretRequest.md @@ -1,4 +1,4 @@ -# MFAMethodAdminDestroyTOTPRequest +# MfaAdminDestroyTotpSecretRequest ## Properties @@ -13,40 +13,40 @@ Name | Type | Description | Notes ## Methods -### NewMFAMethodAdminDestroyTOTPRequest +### NewMfaAdminDestroyTotpSecretRequest -`func NewMFAMethodAdminDestroyTOTPRequest(entityId string, methodId string, ) *MFAMethodAdminDestroyTOTPRequest` +`func NewMfaAdminDestroyTotpSecretRequest(entityId string, methodId string, ) *MfaAdminDestroyTotpSecretRequest` -NewMFAMethodAdminDestroyTOTPRequest instantiates a new MFAMethodAdminDestroyTOTPRequest object +NewMfaAdminDestroyTotpSecretRequest instantiates a new MfaAdminDestroyTotpSecretRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAMethodAdminDestroyTOTPRequestWithDefaults +### NewMfaAdminDestroyTotpSecretRequestWithDefaults -`func NewMFAMethodAdminDestroyTOTPRequestWithDefaults() *MFAMethodAdminDestroyTOTPRequest` +`func NewMfaAdminDestroyTotpSecretRequestWithDefaults() *MfaAdminDestroyTotpSecretRequest` -NewMFAMethodAdminDestroyTOTPRequestWithDefaults instantiates a new MFAMethodAdminDestroyTOTPRequest object +NewMfaAdminDestroyTotpSecretRequestWithDefaults instantiates a new MfaAdminDestroyTotpSecretRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEntityId -`func (o *MFAMethodAdminDestroyTOTPRequest) GetEntityId() string` +`func (o *MfaAdminDestroyTotpSecretRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *MFAMethodAdminDestroyTOTPRequest) GetEntityIdOk() (*string, bool)` +`func (o *MfaAdminDestroyTotpSecretRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *MFAMethodAdminDestroyTOTPRequest) SetEntityId(v string)` +`func (o *MfaAdminDestroyTotpSecretRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. @@ -56,20 +56,20 @@ SetEntityId sets EntityId field to given value. ### GetMethodId -`func (o *MFAMethodAdminDestroyTOTPRequest) GetMethodId() string` +`func (o *MfaAdminDestroyTotpSecretRequest) GetMethodId() string` GetMethodId returns the MethodId field if non-nil, zero value otherwise. ### GetMethodIdOk -`func (o *MFAMethodAdminDestroyTOTPRequest) GetMethodIdOk() (*string, bool)` +`func (o *MfaAdminDestroyTotpSecretRequest) GetMethodIdOk() (*string, bool)` GetMethodIdOk returns a tuple with the MethodId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMethodId -`func (o *MFAMethodAdminDestroyTOTPRequest) SetMethodId(v string)` +`func (o *MfaAdminDestroyTotpSecretRequest) SetMethodId(v string)` SetMethodId sets MethodId field to given value. diff --git a/docs/MFAMethodAdminGenerateTOTPRequest.md b/docs/MfaAdminGenerateTotpSecretRequest.md similarity index 62% rename from docs/MFAMethodAdminGenerateTOTPRequest.md rename to docs/MfaAdminGenerateTotpSecretRequest.md index 5fd959ad..888900a4 100644 --- a/docs/MFAMethodAdminGenerateTOTPRequest.md +++ b/docs/MfaAdminGenerateTotpSecretRequest.md @@ -1,4 +1,4 @@ -# MFAMethodAdminGenerateTOTPRequest +# MfaAdminGenerateTotpSecretRequest ## Properties @@ -13,40 +13,40 @@ Name | Type | Description | Notes ## Methods -### NewMFAMethodAdminGenerateTOTPRequest +### NewMfaAdminGenerateTotpSecretRequest -`func NewMFAMethodAdminGenerateTOTPRequest(entityId string, methodId string, ) *MFAMethodAdminGenerateTOTPRequest` +`func NewMfaAdminGenerateTotpSecretRequest(entityId string, methodId string, ) *MfaAdminGenerateTotpSecretRequest` -NewMFAMethodAdminGenerateTOTPRequest instantiates a new MFAMethodAdminGenerateTOTPRequest object +NewMfaAdminGenerateTotpSecretRequest instantiates a new MfaAdminGenerateTotpSecretRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAMethodAdminGenerateTOTPRequestWithDefaults +### NewMfaAdminGenerateTotpSecretRequestWithDefaults -`func NewMFAMethodAdminGenerateTOTPRequestWithDefaults() *MFAMethodAdminGenerateTOTPRequest` +`func NewMfaAdminGenerateTotpSecretRequestWithDefaults() *MfaAdminGenerateTotpSecretRequest` -NewMFAMethodAdminGenerateTOTPRequestWithDefaults instantiates a new MFAMethodAdminGenerateTOTPRequest object +NewMfaAdminGenerateTotpSecretRequestWithDefaults instantiates a new MfaAdminGenerateTotpSecretRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEntityId -`func (o *MFAMethodAdminGenerateTOTPRequest) GetEntityId() string` +`func (o *MfaAdminGenerateTotpSecretRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *MFAMethodAdminGenerateTOTPRequest) GetEntityIdOk() (*string, bool)` +`func (o *MfaAdminGenerateTotpSecretRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *MFAMethodAdminGenerateTOTPRequest) SetEntityId(v string)` +`func (o *MfaAdminGenerateTotpSecretRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. @@ -56,20 +56,20 @@ SetEntityId sets EntityId field to given value. ### GetMethodId -`func (o *MFAMethodAdminGenerateTOTPRequest) GetMethodId() string` +`func (o *MfaAdminGenerateTotpSecretRequest) GetMethodId() string` GetMethodId returns the MethodId field if non-nil, zero value otherwise. ### GetMethodIdOk -`func (o *MFAMethodAdminGenerateTOTPRequest) GetMethodIdOk() (*string, bool)` +`func (o *MfaAdminGenerateTotpSecretRequest) GetMethodIdOk() (*string, bool)` GetMethodIdOk returns a tuple with the MethodId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMethodId -`func (o *MFAMethodAdminGenerateTOTPRequest) SetMethodId(v string)` +`func (o *MfaAdminGenerateTotpSecretRequest) SetMethodId(v string)` SetMethodId sets MethodId field to given value. diff --git a/docs/MFAMethodWriteDuoRequest.md b/docs/MfaConfigureDuoMethodRequest.md similarity index 60% rename from docs/MFAMethodWriteDuoRequest.md rename to docs/MfaConfigureDuoMethodRequest.md index ac38908c..982f2345 100644 --- a/docs/MFAMethodWriteDuoRequest.md +++ b/docs/MfaConfigureDuoMethodRequest.md @@ -1,4 +1,4 @@ -# MFAMethodWriteDuoRequest +# MfaConfigureDuoMethodRequest ## Properties @@ -7,7 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **ApiHostname** | Pointer to **string** | API host name for Duo. | [optional] **IntegrationKey** | Pointer to **string** | Integration key for Duo. | [optional] -**MethodId** | Pointer to **string** | The unique identifier for this MFA method. | [optional] +**MethodName** | Pointer to **string** | The unique name identifier for this MFA method. | [optional] **PushInfo** | Pointer to **string** | Push information for Duo. | [optional] **SecretKey** | Pointer to **string** | Secret key for Duo. | [optional] **UsePasscode** | Pointer to **bool** | If true, the user is reminded to use the passcode upon MFA validation. This option does not enforce using the passcode. Defaults to false. | [optional] @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewMFAMethodWriteDuoRequest +### NewMfaConfigureDuoMethodRequest -`func NewMFAMethodWriteDuoRequest() *MFAMethodWriteDuoRequest` +`func NewMfaConfigureDuoMethodRequest() *MfaConfigureDuoMethodRequest` -NewMFAMethodWriteDuoRequest instantiates a new MFAMethodWriteDuoRequest object +NewMfaConfigureDuoMethodRequest instantiates a new MfaConfigureDuoMethodRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAMethodWriteDuoRequestWithDefaults +### NewMfaConfigureDuoMethodRequestWithDefaults -`func NewMFAMethodWriteDuoRequestWithDefaults() *MFAMethodWriteDuoRequest` +`func NewMfaConfigureDuoMethodRequestWithDefaults() *MfaConfigureDuoMethodRequest` -NewMFAMethodWriteDuoRequestWithDefaults instantiates a new MFAMethodWriteDuoRequest object +NewMfaConfigureDuoMethodRequestWithDefaults instantiates a new MfaConfigureDuoMethodRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetApiHostname -`func (o *MFAMethodWriteDuoRequest) GetApiHostname() string` +`func (o *MfaConfigureDuoMethodRequest) GetApiHostname() string` GetApiHostname returns the ApiHostname field if non-nil, zero value otherwise. ### GetApiHostnameOk -`func (o *MFAMethodWriteDuoRequest) GetApiHostnameOk() (*string, bool)` +`func (o *MfaConfigureDuoMethodRequest) GetApiHostnameOk() (*string, bool)` GetApiHostnameOk returns a tuple with the ApiHostname field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetApiHostname -`func (o *MFAMethodWriteDuoRequest) SetApiHostname(v string)` +`func (o *MfaConfigureDuoMethodRequest) SetApiHostname(v string)` SetApiHostname sets ApiHostname field to given value. ### HasApiHostname -`func (o *MFAMethodWriteDuoRequest) HasApiHostname() bool` +`func (o *MfaConfigureDuoMethodRequest) HasApiHostname() bool` HasApiHostname returns a boolean if a field has been set. @@ -67,85 +67,85 @@ HasApiHostname returns a boolean if a field has been set. ### GetIntegrationKey -`func (o *MFAMethodWriteDuoRequest) GetIntegrationKey() string` +`func (o *MfaConfigureDuoMethodRequest) GetIntegrationKey() string` GetIntegrationKey returns the IntegrationKey field if non-nil, zero value otherwise. ### GetIntegrationKeyOk -`func (o *MFAMethodWriteDuoRequest) GetIntegrationKeyOk() (*string, bool)` +`func (o *MfaConfigureDuoMethodRequest) GetIntegrationKeyOk() (*string, bool)` GetIntegrationKeyOk returns a tuple with the IntegrationKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIntegrationKey -`func (o *MFAMethodWriteDuoRequest) SetIntegrationKey(v string)` +`func (o *MfaConfigureDuoMethodRequest) SetIntegrationKey(v string)` SetIntegrationKey sets IntegrationKey field to given value. ### HasIntegrationKey -`func (o *MFAMethodWriteDuoRequest) HasIntegrationKey() bool` +`func (o *MfaConfigureDuoMethodRequest) HasIntegrationKey() bool` HasIntegrationKey returns a boolean if a field has been set. -### GetMethodId +### GetMethodName -`func (o *MFAMethodWriteDuoRequest) GetMethodId() string` +`func (o *MfaConfigureDuoMethodRequest) GetMethodName() string` -GetMethodId returns the MethodId field if non-nil, zero value otherwise. +GetMethodName returns the MethodName field if non-nil, zero value otherwise. -### GetMethodIdOk +### GetMethodNameOk -`func (o *MFAMethodWriteDuoRequest) GetMethodIdOk() (*string, bool)` +`func (o *MfaConfigureDuoMethodRequest) GetMethodNameOk() (*string, bool)` -GetMethodIdOk returns a tuple with the MethodId field if it's non-nil, zero value otherwise +GetMethodNameOk returns a tuple with the MethodName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. -### SetMethodId +### SetMethodName -`func (o *MFAMethodWriteDuoRequest) SetMethodId(v string)` +`func (o *MfaConfigureDuoMethodRequest) SetMethodName(v string)` -SetMethodId sets MethodId field to given value. +SetMethodName sets MethodName field to given value. -### HasMethodId +### HasMethodName -`func (o *MFAMethodWriteDuoRequest) HasMethodId() bool` +`func (o *MfaConfigureDuoMethodRequest) HasMethodName() bool` -HasMethodId returns a boolean if a field has been set. +HasMethodName returns a boolean if a field has been set. ### GetPushInfo -`func (o *MFAMethodWriteDuoRequest) GetPushInfo() string` +`func (o *MfaConfigureDuoMethodRequest) GetPushInfo() string` GetPushInfo returns the PushInfo field if non-nil, zero value otherwise. ### GetPushInfoOk -`func (o *MFAMethodWriteDuoRequest) GetPushInfoOk() (*string, bool)` +`func (o *MfaConfigureDuoMethodRequest) GetPushInfoOk() (*string, bool)` GetPushInfoOk returns a tuple with the PushInfo field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPushInfo -`func (o *MFAMethodWriteDuoRequest) SetPushInfo(v string)` +`func (o *MfaConfigureDuoMethodRequest) SetPushInfo(v string)` SetPushInfo sets PushInfo field to given value. ### HasPushInfo -`func (o *MFAMethodWriteDuoRequest) HasPushInfo() bool` +`func (o *MfaConfigureDuoMethodRequest) HasPushInfo() bool` HasPushInfo returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasPushInfo returns a boolean if a field has been set. ### GetSecretKey -`func (o *MFAMethodWriteDuoRequest) GetSecretKey() string` +`func (o *MfaConfigureDuoMethodRequest) GetSecretKey() string` GetSecretKey returns the SecretKey field if non-nil, zero value otherwise. ### GetSecretKeyOk -`func (o *MFAMethodWriteDuoRequest) GetSecretKeyOk() (*string, bool)` +`func (o *MfaConfigureDuoMethodRequest) GetSecretKeyOk() (*string, bool)` GetSecretKeyOk returns a tuple with the SecretKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretKey -`func (o *MFAMethodWriteDuoRequest) SetSecretKey(v string)` +`func (o *MfaConfigureDuoMethodRequest) SetSecretKey(v string)` SetSecretKey sets SecretKey field to given value. ### HasSecretKey -`func (o *MFAMethodWriteDuoRequest) HasSecretKey() bool` +`func (o *MfaConfigureDuoMethodRequest) HasSecretKey() bool` HasSecretKey returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasSecretKey returns a boolean if a field has been set. ### GetUsePasscode -`func (o *MFAMethodWriteDuoRequest) GetUsePasscode() bool` +`func (o *MfaConfigureDuoMethodRequest) GetUsePasscode() bool` GetUsePasscode returns the UsePasscode field if non-nil, zero value otherwise. ### GetUsePasscodeOk -`func (o *MFAMethodWriteDuoRequest) GetUsePasscodeOk() (*bool, bool)` +`func (o *MfaConfigureDuoMethodRequest) GetUsePasscodeOk() (*bool, bool)` GetUsePasscodeOk returns a tuple with the UsePasscode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePasscode -`func (o *MFAMethodWriteDuoRequest) SetUsePasscode(v bool)` +`func (o *MfaConfigureDuoMethodRequest) SetUsePasscode(v bool)` SetUsePasscode sets UsePasscode field to given value. ### HasUsePasscode -`func (o *MFAMethodWriteDuoRequest) HasUsePasscode() bool` +`func (o *MfaConfigureDuoMethodRequest) HasUsePasscode() bool` HasUsePasscode returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasUsePasscode returns a boolean if a field has been set. ### GetUsernameFormat -`func (o *MFAMethodWriteDuoRequest) GetUsernameFormat() string` +`func (o *MfaConfigureDuoMethodRequest) GetUsernameFormat() string` GetUsernameFormat returns the UsernameFormat field if non-nil, zero value otherwise. ### GetUsernameFormatOk -`func (o *MFAMethodWriteDuoRequest) GetUsernameFormatOk() (*string, bool)` +`func (o *MfaConfigureDuoMethodRequest) GetUsernameFormatOk() (*string, bool)` GetUsernameFormatOk returns a tuple with the UsernameFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameFormat -`func (o *MFAMethodWriteDuoRequest) SetUsernameFormat(v string)` +`func (o *MfaConfigureDuoMethodRequest) SetUsernameFormat(v string)` SetUsernameFormat sets UsernameFormat field to given value. ### HasUsernameFormat -`func (o *MFAMethodWriteDuoRequest) HasUsernameFormat() bool` +`func (o *MfaConfigureDuoMethodRequest) HasUsernameFormat() bool` HasUsernameFormat returns a boolean if a field has been set. diff --git a/docs/MFAMethodWriteOktaRequest.md b/docs/MfaConfigureOktaMethodRequest.md similarity index 59% rename from docs/MFAMethodWriteOktaRequest.md rename to docs/MfaConfigureOktaMethodRequest.md index bf478b69..fd66a5c2 100644 --- a/docs/MFAMethodWriteOktaRequest.md +++ b/docs/MfaConfigureOktaMethodRequest.md @@ -1,4 +1,4 @@ -# MFAMethodWriteOktaRequest +# MfaConfigureOktaMethodRequest ## Properties @@ -7,7 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **ApiToken** | Pointer to **string** | Okta API key. | [optional] **BaseUrl** | Pointer to **string** | The base domain to use for the Okta API. When not specified in the configuration, \"okta.com\" is used. | [optional] -**MethodId** | Pointer to **string** | The unique identifier for this MFA method. | [optional] +**MethodName** | Pointer to **string** | The unique name identifier for this MFA method. | [optional] **OrgName** | Pointer to **string** | Name of the organization to be used in the Okta API. | [optional] **PrimaryEmail** | Pointer to **bool** | If true, the username will only match the primary email for the account. Defaults to false. | [optional] **Production** | Pointer to **bool** | (DEPRECATED) Use base_url instead. | [optional] @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewMFAMethodWriteOktaRequest +### NewMfaConfigureOktaMethodRequest -`func NewMFAMethodWriteOktaRequest() *MFAMethodWriteOktaRequest` +`func NewMfaConfigureOktaMethodRequest() *MfaConfigureOktaMethodRequest` -NewMFAMethodWriteOktaRequest instantiates a new MFAMethodWriteOktaRequest object +NewMfaConfigureOktaMethodRequest instantiates a new MfaConfigureOktaMethodRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAMethodWriteOktaRequestWithDefaults +### NewMfaConfigureOktaMethodRequestWithDefaults -`func NewMFAMethodWriteOktaRequestWithDefaults() *MFAMethodWriteOktaRequest` +`func NewMfaConfigureOktaMethodRequestWithDefaults() *MfaConfigureOktaMethodRequest` -NewMFAMethodWriteOktaRequestWithDefaults instantiates a new MFAMethodWriteOktaRequest object +NewMfaConfigureOktaMethodRequestWithDefaults instantiates a new MfaConfigureOktaMethodRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetApiToken -`func (o *MFAMethodWriteOktaRequest) GetApiToken() string` +`func (o *MfaConfigureOktaMethodRequest) GetApiToken() string` GetApiToken returns the ApiToken field if non-nil, zero value otherwise. ### GetApiTokenOk -`func (o *MFAMethodWriteOktaRequest) GetApiTokenOk() (*string, bool)` +`func (o *MfaConfigureOktaMethodRequest) GetApiTokenOk() (*string, bool)` GetApiTokenOk returns a tuple with the ApiToken field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetApiToken -`func (o *MFAMethodWriteOktaRequest) SetApiToken(v string)` +`func (o *MfaConfigureOktaMethodRequest) SetApiToken(v string)` SetApiToken sets ApiToken field to given value. ### HasApiToken -`func (o *MFAMethodWriteOktaRequest) HasApiToken() bool` +`func (o *MfaConfigureOktaMethodRequest) HasApiToken() bool` HasApiToken returns a boolean if a field has been set. @@ -67,85 +67,85 @@ HasApiToken returns a boolean if a field has been set. ### GetBaseUrl -`func (o *MFAMethodWriteOktaRequest) GetBaseUrl() string` +`func (o *MfaConfigureOktaMethodRequest) GetBaseUrl() string` GetBaseUrl returns the BaseUrl field if non-nil, zero value otherwise. ### GetBaseUrlOk -`func (o *MFAMethodWriteOktaRequest) GetBaseUrlOk() (*string, bool)` +`func (o *MfaConfigureOktaMethodRequest) GetBaseUrlOk() (*string, bool)` GetBaseUrlOk returns a tuple with the BaseUrl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBaseUrl -`func (o *MFAMethodWriteOktaRequest) SetBaseUrl(v string)` +`func (o *MfaConfigureOktaMethodRequest) SetBaseUrl(v string)` SetBaseUrl sets BaseUrl field to given value. ### HasBaseUrl -`func (o *MFAMethodWriteOktaRequest) HasBaseUrl() bool` +`func (o *MfaConfigureOktaMethodRequest) HasBaseUrl() bool` HasBaseUrl returns a boolean if a field has been set. -### GetMethodId +### GetMethodName -`func (o *MFAMethodWriteOktaRequest) GetMethodId() string` +`func (o *MfaConfigureOktaMethodRequest) GetMethodName() string` -GetMethodId returns the MethodId field if non-nil, zero value otherwise. +GetMethodName returns the MethodName field if non-nil, zero value otherwise. -### GetMethodIdOk +### GetMethodNameOk -`func (o *MFAMethodWriteOktaRequest) GetMethodIdOk() (*string, bool)` +`func (o *MfaConfigureOktaMethodRequest) GetMethodNameOk() (*string, bool)` -GetMethodIdOk returns a tuple with the MethodId field if it's non-nil, zero value otherwise +GetMethodNameOk returns a tuple with the MethodName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. -### SetMethodId +### SetMethodName -`func (o *MFAMethodWriteOktaRequest) SetMethodId(v string)` +`func (o *MfaConfigureOktaMethodRequest) SetMethodName(v string)` -SetMethodId sets MethodId field to given value. +SetMethodName sets MethodName field to given value. -### HasMethodId +### HasMethodName -`func (o *MFAMethodWriteOktaRequest) HasMethodId() bool` +`func (o *MfaConfigureOktaMethodRequest) HasMethodName() bool` -HasMethodId returns a boolean if a field has been set. +HasMethodName returns a boolean if a field has been set. ### GetOrgName -`func (o *MFAMethodWriteOktaRequest) GetOrgName() string` +`func (o *MfaConfigureOktaMethodRequest) GetOrgName() string` GetOrgName returns the OrgName field if non-nil, zero value otherwise. ### GetOrgNameOk -`func (o *MFAMethodWriteOktaRequest) GetOrgNameOk() (*string, bool)` +`func (o *MfaConfigureOktaMethodRequest) GetOrgNameOk() (*string, bool)` GetOrgNameOk returns a tuple with the OrgName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrgName -`func (o *MFAMethodWriteOktaRequest) SetOrgName(v string)` +`func (o *MfaConfigureOktaMethodRequest) SetOrgName(v string)` SetOrgName sets OrgName field to given value. ### HasOrgName -`func (o *MFAMethodWriteOktaRequest) HasOrgName() bool` +`func (o *MfaConfigureOktaMethodRequest) HasOrgName() bool` HasOrgName returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasOrgName returns a boolean if a field has been set. ### GetPrimaryEmail -`func (o *MFAMethodWriteOktaRequest) GetPrimaryEmail() bool` +`func (o *MfaConfigureOktaMethodRequest) GetPrimaryEmail() bool` GetPrimaryEmail returns the PrimaryEmail field if non-nil, zero value otherwise. ### GetPrimaryEmailOk -`func (o *MFAMethodWriteOktaRequest) GetPrimaryEmailOk() (*bool, bool)` +`func (o *MfaConfigureOktaMethodRequest) GetPrimaryEmailOk() (*bool, bool)` GetPrimaryEmailOk returns a tuple with the PrimaryEmail field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrimaryEmail -`func (o *MFAMethodWriteOktaRequest) SetPrimaryEmail(v bool)` +`func (o *MfaConfigureOktaMethodRequest) SetPrimaryEmail(v bool)` SetPrimaryEmail sets PrimaryEmail field to given value. ### HasPrimaryEmail -`func (o *MFAMethodWriteOktaRequest) HasPrimaryEmail() bool` +`func (o *MfaConfigureOktaMethodRequest) HasPrimaryEmail() bool` HasPrimaryEmail returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasPrimaryEmail returns a boolean if a field has been set. ### GetProduction -`func (o *MFAMethodWriteOktaRequest) GetProduction() bool` +`func (o *MfaConfigureOktaMethodRequest) GetProduction() bool` GetProduction returns the Production field if non-nil, zero value otherwise. ### GetProductionOk -`func (o *MFAMethodWriteOktaRequest) GetProductionOk() (*bool, bool)` +`func (o *MfaConfigureOktaMethodRequest) GetProductionOk() (*bool, bool)` GetProductionOk returns a tuple with the Production field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProduction -`func (o *MFAMethodWriteOktaRequest) SetProduction(v bool)` +`func (o *MfaConfigureOktaMethodRequest) SetProduction(v bool)` SetProduction sets Production field to given value. ### HasProduction -`func (o *MFAMethodWriteOktaRequest) HasProduction() bool` +`func (o *MfaConfigureOktaMethodRequest) HasProduction() bool` HasProduction returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasProduction returns a boolean if a field has been set. ### GetUsernameFormat -`func (o *MFAMethodWriteOktaRequest) GetUsernameFormat() string` +`func (o *MfaConfigureOktaMethodRequest) GetUsernameFormat() string` GetUsernameFormat returns the UsernameFormat field if non-nil, zero value otherwise. ### GetUsernameFormatOk -`func (o *MFAMethodWriteOktaRequest) GetUsernameFormatOk() (*string, bool)` +`func (o *MfaConfigureOktaMethodRequest) GetUsernameFormatOk() (*string, bool)` GetUsernameFormatOk returns a tuple with the UsernameFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameFormat -`func (o *MFAMethodWriteOktaRequest) SetUsernameFormat(v string)` +`func (o *MfaConfigureOktaMethodRequest) SetUsernameFormat(v string)` SetUsernameFormat sets UsernameFormat field to given value. ### HasUsernameFormat -`func (o *MFAMethodWriteOktaRequest) HasUsernameFormat() bool` +`func (o *MfaConfigureOktaMethodRequest) HasUsernameFormat() bool` HasUsernameFormat returns a boolean if a field has been set. diff --git a/docs/MFAMethodWritePingIDRequest.md b/docs/MfaConfigurePingIdMethodRequest.md similarity index 57% rename from docs/MFAMethodWritePingIDRequest.md rename to docs/MfaConfigurePingIdMethodRequest.md index 0c104365..471c6608 100644 --- a/docs/MFAMethodWritePingIDRequest.md +++ b/docs/MfaConfigurePingIdMethodRequest.md @@ -1,11 +1,11 @@ -# MFAMethodWritePingIDRequest +# MfaConfigurePingIdMethodRequest ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**MethodId** | Pointer to **string** | The unique identifier for this MFA method. | [optional] +**MethodName** | Pointer to **string** | The unique name identifier for this MFA method. | [optional] **SettingsFileBase64** | Pointer to **string** | The settings file provided by Ping, Base64-encoded. This must be a settings file suitable for third-party clients, not the PingID SDK or PingFederate. | [optional] **UsernameFormat** | Pointer to **string** | A template string for mapping Identity names to MFA method names. Values to subtitute should be placed in {{}}. For example, \"{{alias.name}}@example.com\". Currently-supported mappings: alias.name: The name returned by the mount configured via the mount_accessor parameter If blank, the Alias's name field will be used as-is. | [optional] @@ -14,76 +14,76 @@ Name | Type | Description | Notes ## Methods -### NewMFAMethodWritePingIDRequest +### NewMfaConfigurePingIdMethodRequest -`func NewMFAMethodWritePingIDRequest() *MFAMethodWritePingIDRequest` +`func NewMfaConfigurePingIdMethodRequest() *MfaConfigurePingIdMethodRequest` -NewMFAMethodWritePingIDRequest instantiates a new MFAMethodWritePingIDRequest object +NewMfaConfigurePingIdMethodRequest instantiates a new MfaConfigurePingIdMethodRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAMethodWritePingIDRequestWithDefaults +### NewMfaConfigurePingIdMethodRequestWithDefaults -`func NewMFAMethodWritePingIDRequestWithDefaults() *MFAMethodWritePingIDRequest` +`func NewMfaConfigurePingIdMethodRequestWithDefaults() *MfaConfigurePingIdMethodRequest` -NewMFAMethodWritePingIDRequestWithDefaults instantiates a new MFAMethodWritePingIDRequest object +NewMfaConfigurePingIdMethodRequestWithDefaults instantiates a new MfaConfigurePingIdMethodRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set -### GetMethodId +### GetMethodName -`func (o *MFAMethodWritePingIDRequest) GetMethodId() string` +`func (o *MfaConfigurePingIdMethodRequest) GetMethodName() string` -GetMethodId returns the MethodId field if non-nil, zero value otherwise. +GetMethodName returns the MethodName field if non-nil, zero value otherwise. -### GetMethodIdOk +### GetMethodNameOk -`func (o *MFAMethodWritePingIDRequest) GetMethodIdOk() (*string, bool)` +`func (o *MfaConfigurePingIdMethodRequest) GetMethodNameOk() (*string, bool)` -GetMethodIdOk returns a tuple with the MethodId field if it's non-nil, zero value otherwise +GetMethodNameOk returns a tuple with the MethodName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. -### SetMethodId +### SetMethodName -`func (o *MFAMethodWritePingIDRequest) SetMethodId(v string)` +`func (o *MfaConfigurePingIdMethodRequest) SetMethodName(v string)` -SetMethodId sets MethodId field to given value. +SetMethodName sets MethodName field to given value. -### HasMethodId +### HasMethodName -`func (o *MFAMethodWritePingIDRequest) HasMethodId() bool` +`func (o *MfaConfigurePingIdMethodRequest) HasMethodName() bool` -HasMethodId returns a boolean if a field has been set. +HasMethodName returns a boolean if a field has been set. ### GetSettingsFileBase64 -`func (o *MFAMethodWritePingIDRequest) GetSettingsFileBase64() string` +`func (o *MfaConfigurePingIdMethodRequest) GetSettingsFileBase64() string` GetSettingsFileBase64 returns the SettingsFileBase64 field if non-nil, zero value otherwise. ### GetSettingsFileBase64Ok -`func (o *MFAMethodWritePingIDRequest) GetSettingsFileBase64Ok() (*string, bool)` +`func (o *MfaConfigurePingIdMethodRequest) GetSettingsFileBase64Ok() (*string, bool)` GetSettingsFileBase64Ok returns a tuple with the SettingsFileBase64 field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSettingsFileBase64 -`func (o *MFAMethodWritePingIDRequest) SetSettingsFileBase64(v string)` +`func (o *MfaConfigurePingIdMethodRequest) SetSettingsFileBase64(v string)` SetSettingsFileBase64 sets SettingsFileBase64 field to given value. ### HasSettingsFileBase64 -`func (o *MFAMethodWritePingIDRequest) HasSettingsFileBase64() bool` +`func (o *MfaConfigurePingIdMethodRequest) HasSettingsFileBase64() bool` HasSettingsFileBase64 returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasSettingsFileBase64 returns a boolean if a field has been set. ### GetUsernameFormat -`func (o *MFAMethodWritePingIDRequest) GetUsernameFormat() string` +`func (o *MfaConfigurePingIdMethodRequest) GetUsernameFormat() string` GetUsernameFormat returns the UsernameFormat field if non-nil, zero value otherwise. ### GetUsernameFormatOk -`func (o *MFAMethodWritePingIDRequest) GetUsernameFormatOk() (*string, bool)` +`func (o *MfaConfigurePingIdMethodRequest) GetUsernameFormatOk() (*string, bool)` GetUsernameFormatOk returns a tuple with the UsernameFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameFormat -`func (o *MFAMethodWritePingIDRequest) SetUsernameFormat(v string)` +`func (o *MfaConfigurePingIdMethodRequest) SetUsernameFormat(v string)` SetUsernameFormat sets UsernameFormat field to given value. ### HasUsernameFormat -`func (o *MFAMethodWritePingIDRequest) HasUsernameFormat() bool` +`func (o *MfaConfigurePingIdMethodRequest) HasUsernameFormat() bool` HasUsernameFormat returns a boolean if a field has been set. diff --git a/docs/MFAMethodWriteTOTPRequest.md b/docs/MfaConfigureTotpMethodRequest.md similarity index 60% rename from docs/MFAMethodWriteTOTPRequest.md rename to docs/MfaConfigureTotpMethodRequest.md index 95292758..3684cab8 100644 --- a/docs/MFAMethodWriteTOTPRequest.md +++ b/docs/MfaConfigureTotpMethodRequest.md @@ -1,4 +1,4 @@ -# MFAMethodWriteTOTPRequest +# MfaConfigureTotpMethodRequest ## Properties @@ -10,7 +10,7 @@ Name | Type | Description | Notes **Issuer** | Pointer to **string** | The name of the key's issuing organization. | [optional] **KeySize** | Pointer to **int32** | Determines the size in bytes of the generated key. | [optional] [default to 20] **MaxValidationAttempts** | Pointer to **int32** | Max number of allowed validation attempts. | [optional] -**MethodId** | Pointer to **string** | The unique identifier for this MFA method. | [optional] +**MethodName** | Pointer to **string** | The unique name identifier for this MFA method. | [optional] **Period** | Pointer to **int32** | The length of time used to generate a counter for the TOTP token calculation. | [optional] [default to 30] **QrSize** | Pointer to **int32** | The pixel size of the generated square QR code. | [optional] [default to 200] **Skew** | Pointer to **int32** | The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. | [optional] [default to 1] @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewMFAMethodWriteTOTPRequest +### NewMfaConfigureTotpMethodRequest -`func NewMFAMethodWriteTOTPRequest() *MFAMethodWriteTOTPRequest` +`func NewMfaConfigureTotpMethodRequest() *MfaConfigureTotpMethodRequest` -NewMFAMethodWriteTOTPRequest instantiates a new MFAMethodWriteTOTPRequest object +NewMfaConfigureTotpMethodRequest instantiates a new MfaConfigureTotpMethodRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAMethodWriteTOTPRequestWithDefaults +### NewMfaConfigureTotpMethodRequestWithDefaults -`func NewMFAMethodWriteTOTPRequestWithDefaults() *MFAMethodWriteTOTPRequest` +`func NewMfaConfigureTotpMethodRequestWithDefaults() *MfaConfigureTotpMethodRequest` -NewMFAMethodWriteTOTPRequestWithDefaults instantiates a new MFAMethodWriteTOTPRequest object +NewMfaConfigureTotpMethodRequestWithDefaults instantiates a new MfaConfigureTotpMethodRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAlgorithm -`func (o *MFAMethodWriteTOTPRequest) GetAlgorithm() string` +`func (o *MfaConfigureTotpMethodRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *MFAMethodWriteTOTPRequest) GetAlgorithmOk() (*string, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *MFAMethodWriteTOTPRequest) SetAlgorithm(v string)` +`func (o *MfaConfigureTotpMethodRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *MFAMethodWriteTOTPRequest) HasAlgorithm() bool` +`func (o *MfaConfigureTotpMethodRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasAlgorithm returns a boolean if a field has been set. ### GetDigits -`func (o *MFAMethodWriteTOTPRequest) GetDigits() int32` +`func (o *MfaConfigureTotpMethodRequest) GetDigits() int32` GetDigits returns the Digits field if non-nil, zero value otherwise. ### GetDigitsOk -`func (o *MFAMethodWriteTOTPRequest) GetDigitsOk() (*int32, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetDigitsOk() (*int32, bool)` GetDigitsOk returns a tuple with the Digits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDigits -`func (o *MFAMethodWriteTOTPRequest) SetDigits(v int32)` +`func (o *MfaConfigureTotpMethodRequest) SetDigits(v int32)` SetDigits sets Digits field to given value. ### HasDigits -`func (o *MFAMethodWriteTOTPRequest) HasDigits() bool` +`func (o *MfaConfigureTotpMethodRequest) HasDigits() bool` HasDigits returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasDigits returns a boolean if a field has been set. ### GetIssuer -`func (o *MFAMethodWriteTOTPRequest) GetIssuer() string` +`func (o *MfaConfigureTotpMethodRequest) GetIssuer() string` GetIssuer returns the Issuer field if non-nil, zero value otherwise. ### GetIssuerOk -`func (o *MFAMethodWriteTOTPRequest) GetIssuerOk() (*string, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetIssuerOk() (*string, bool)` GetIssuerOk returns a tuple with the Issuer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuer -`func (o *MFAMethodWriteTOTPRequest) SetIssuer(v string)` +`func (o *MfaConfigureTotpMethodRequest) SetIssuer(v string)` SetIssuer sets Issuer field to given value. ### HasIssuer -`func (o *MFAMethodWriteTOTPRequest) HasIssuer() bool` +`func (o *MfaConfigureTotpMethodRequest) HasIssuer() bool` HasIssuer returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasIssuer returns a boolean if a field has been set. ### GetKeySize -`func (o *MFAMethodWriteTOTPRequest) GetKeySize() int32` +`func (o *MfaConfigureTotpMethodRequest) GetKeySize() int32` GetKeySize returns the KeySize field if non-nil, zero value otherwise. ### GetKeySizeOk -`func (o *MFAMethodWriteTOTPRequest) GetKeySizeOk() (*int32, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetKeySizeOk() (*int32, bool)` GetKeySizeOk returns a tuple with the KeySize field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeySize -`func (o *MFAMethodWriteTOTPRequest) SetKeySize(v int32)` +`func (o *MfaConfigureTotpMethodRequest) SetKeySize(v int32)` SetKeySize sets KeySize field to given value. ### HasKeySize -`func (o *MFAMethodWriteTOTPRequest) HasKeySize() bool` +`func (o *MfaConfigureTotpMethodRequest) HasKeySize() bool` HasKeySize returns a boolean if a field has been set. @@ -156,85 +156,85 @@ HasKeySize returns a boolean if a field has been set. ### GetMaxValidationAttempts -`func (o *MFAMethodWriteTOTPRequest) GetMaxValidationAttempts() int32` +`func (o *MfaConfigureTotpMethodRequest) GetMaxValidationAttempts() int32` GetMaxValidationAttempts returns the MaxValidationAttempts field if non-nil, zero value otherwise. ### GetMaxValidationAttemptsOk -`func (o *MFAMethodWriteTOTPRequest) GetMaxValidationAttemptsOk() (*int32, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetMaxValidationAttemptsOk() (*int32, bool)` GetMaxValidationAttemptsOk returns a tuple with the MaxValidationAttempts field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxValidationAttempts -`func (o *MFAMethodWriteTOTPRequest) SetMaxValidationAttempts(v int32)` +`func (o *MfaConfigureTotpMethodRequest) SetMaxValidationAttempts(v int32)` SetMaxValidationAttempts sets MaxValidationAttempts field to given value. ### HasMaxValidationAttempts -`func (o *MFAMethodWriteTOTPRequest) HasMaxValidationAttempts() bool` +`func (o *MfaConfigureTotpMethodRequest) HasMaxValidationAttempts() bool` HasMaxValidationAttempts returns a boolean if a field has been set. -### GetMethodId +### GetMethodName -`func (o *MFAMethodWriteTOTPRequest) GetMethodId() string` +`func (o *MfaConfigureTotpMethodRequest) GetMethodName() string` -GetMethodId returns the MethodId field if non-nil, zero value otherwise. +GetMethodName returns the MethodName field if non-nil, zero value otherwise. -### GetMethodIdOk +### GetMethodNameOk -`func (o *MFAMethodWriteTOTPRequest) GetMethodIdOk() (*string, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetMethodNameOk() (*string, bool)` -GetMethodIdOk returns a tuple with the MethodId field if it's non-nil, zero value otherwise +GetMethodNameOk returns a tuple with the MethodName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. -### SetMethodId +### SetMethodName -`func (o *MFAMethodWriteTOTPRequest) SetMethodId(v string)` +`func (o *MfaConfigureTotpMethodRequest) SetMethodName(v string)` -SetMethodId sets MethodId field to given value. +SetMethodName sets MethodName field to given value. -### HasMethodId +### HasMethodName -`func (o *MFAMethodWriteTOTPRequest) HasMethodId() bool` +`func (o *MfaConfigureTotpMethodRequest) HasMethodName() bool` -HasMethodId returns a boolean if a field has been set. +HasMethodName returns a boolean if a field has been set. ### GetPeriod -`func (o *MFAMethodWriteTOTPRequest) GetPeriod() int32` +`func (o *MfaConfigureTotpMethodRequest) GetPeriod() int32` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *MFAMethodWriteTOTPRequest) GetPeriodOk() (*int32, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetPeriodOk() (*int32, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *MFAMethodWriteTOTPRequest) SetPeriod(v int32)` +`func (o *MfaConfigureTotpMethodRequest) SetPeriod(v int32)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *MFAMethodWriteTOTPRequest) HasPeriod() bool` +`func (o *MfaConfigureTotpMethodRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasPeriod returns a boolean if a field has been set. ### GetQrSize -`func (o *MFAMethodWriteTOTPRequest) GetQrSize() int32` +`func (o *MfaConfigureTotpMethodRequest) GetQrSize() int32` GetQrSize returns the QrSize field if non-nil, zero value otherwise. ### GetQrSizeOk -`func (o *MFAMethodWriteTOTPRequest) GetQrSizeOk() (*int32, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetQrSizeOk() (*int32, bool)` GetQrSizeOk returns a tuple with the QrSize field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetQrSize -`func (o *MFAMethodWriteTOTPRequest) SetQrSize(v int32)` +`func (o *MfaConfigureTotpMethodRequest) SetQrSize(v int32)` SetQrSize sets QrSize field to given value. ### HasQrSize -`func (o *MFAMethodWriteTOTPRequest) HasQrSize() bool` +`func (o *MfaConfigureTotpMethodRequest) HasQrSize() bool` HasQrSize returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasQrSize returns a boolean if a field has been set. ### GetSkew -`func (o *MFAMethodWriteTOTPRequest) GetSkew() int32` +`func (o *MfaConfigureTotpMethodRequest) GetSkew() int32` GetSkew returns the Skew field if non-nil, zero value otherwise. ### GetSkewOk -`func (o *MFAMethodWriteTOTPRequest) GetSkewOk() (*int32, bool)` +`func (o *MfaConfigureTotpMethodRequest) GetSkewOk() (*int32, bool)` GetSkewOk returns a tuple with the Skew field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSkew -`func (o *MFAMethodWriteTOTPRequest) SetSkew(v int32)` +`func (o *MfaConfigureTotpMethodRequest) SetSkew(v int32)` SetSkew sets Skew field to given value. ### HasSkew -`func (o *MFAMethodWriteTOTPRequest) HasSkew() bool` +`func (o *MfaConfigureTotpMethodRequest) HasSkew() bool` HasSkew returns a boolean if a field has been set. diff --git a/docs/MFAMethodGenerateTOTPRequest.md b/docs/MfaGenerateTotpSecretRequest.md similarity index 61% rename from docs/MFAMethodGenerateTOTPRequest.md rename to docs/MfaGenerateTotpSecretRequest.md index be3494ea..4b8f53aa 100644 --- a/docs/MFAMethodGenerateTOTPRequest.md +++ b/docs/MfaGenerateTotpSecretRequest.md @@ -1,4 +1,4 @@ -# MFAMethodGenerateTOTPRequest +# MfaGenerateTotpSecretRequest ## Properties @@ -12,40 +12,40 @@ Name | Type | Description | Notes ## Methods -### NewMFAMethodGenerateTOTPRequest +### NewMfaGenerateTotpSecretRequest -`func NewMFAMethodGenerateTOTPRequest(methodId string, ) *MFAMethodGenerateTOTPRequest` +`func NewMfaGenerateTotpSecretRequest(methodId string, ) *MfaGenerateTotpSecretRequest` -NewMFAMethodGenerateTOTPRequest instantiates a new MFAMethodGenerateTOTPRequest object +NewMfaGenerateTotpSecretRequest instantiates a new MfaGenerateTotpSecretRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMFAMethodGenerateTOTPRequestWithDefaults +### NewMfaGenerateTotpSecretRequestWithDefaults -`func NewMFAMethodGenerateTOTPRequestWithDefaults() *MFAMethodGenerateTOTPRequest` +`func NewMfaGenerateTotpSecretRequestWithDefaults() *MfaGenerateTotpSecretRequest` -NewMFAMethodGenerateTOTPRequestWithDefaults instantiates a new MFAMethodGenerateTOTPRequest object +NewMfaGenerateTotpSecretRequestWithDefaults instantiates a new MfaGenerateTotpSecretRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMethodId -`func (o *MFAMethodGenerateTOTPRequest) GetMethodId() string` +`func (o *MfaGenerateTotpSecretRequest) GetMethodId() string` GetMethodId returns the MethodId field if non-nil, zero value otherwise. ### GetMethodIdOk -`func (o *MFAMethodGenerateTOTPRequest) GetMethodIdOk() (*string, bool)` +`func (o *MfaGenerateTotpSecretRequest) GetMethodIdOk() (*string, bool)` GetMethodIdOk returns a tuple with the MethodId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMethodId -`func (o *MFAMethodGenerateTOTPRequest) SetMethodId(v string)` +`func (o *MfaGenerateTotpSecretRequest) SetMethodId(v string)` SetMethodId sets MethodId field to given value. diff --git a/docs/MongoDBAtlasWriteRoleRequest.md b/docs/MongoDBAtlasWriteRoleRequest.md index 5b2df933..dc5c36cf 100644 --- a/docs/MongoDBAtlasWriteRoleRequest.md +++ b/docs/MongoDBAtlasWriteRoleRequest.md @@ -1,4 +1,4 @@ -# MongoDBAtlasWriteRoleRequest +# MongoDbAtlasWriteRoleRequest ## Properties @@ -19,47 +19,47 @@ Name | Type | Description | Notes ## Methods -### NewMongoDBAtlasWriteRoleRequest +### NewMongoDbAtlasWriteRoleRequest -`func NewMongoDBAtlasWriteRoleRequest(roles []string, ) *MongoDBAtlasWriteRoleRequest` +`func NewMongoDbAtlasWriteRoleRequest(roles []string, ) *MongoDbAtlasWriteRoleRequest` -NewMongoDBAtlasWriteRoleRequest instantiates a new MongoDBAtlasWriteRoleRequest object +NewMongoDbAtlasWriteRoleRequest instantiates a new MongoDbAtlasWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMongoDBAtlasWriteRoleRequestWithDefaults +### NewMongoDbAtlasWriteRoleRequestWithDefaults -`func NewMongoDBAtlasWriteRoleRequestWithDefaults() *MongoDBAtlasWriteRoleRequest` +`func NewMongoDbAtlasWriteRoleRequestWithDefaults() *MongoDbAtlasWriteRoleRequest` -NewMongoDBAtlasWriteRoleRequestWithDefaults instantiates a new MongoDBAtlasWriteRoleRequest object +NewMongoDbAtlasWriteRoleRequestWithDefaults instantiates a new MongoDbAtlasWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCidrBlocks -`func (o *MongoDBAtlasWriteRoleRequest) GetCidrBlocks() []string` +`func (o *MongoDbAtlasWriteRoleRequest) GetCidrBlocks() []string` GetCidrBlocks returns the CidrBlocks field if non-nil, zero value otherwise. ### GetCidrBlocksOk -`func (o *MongoDBAtlasWriteRoleRequest) GetCidrBlocksOk() (*[]string, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetCidrBlocksOk() (*[]string, bool)` GetCidrBlocksOk returns a tuple with the CidrBlocks field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCidrBlocks -`func (o *MongoDBAtlasWriteRoleRequest) SetCidrBlocks(v []string)` +`func (o *MongoDbAtlasWriteRoleRequest) SetCidrBlocks(v []string)` SetCidrBlocks sets CidrBlocks field to given value. ### HasCidrBlocks -`func (o *MongoDBAtlasWriteRoleRequest) HasCidrBlocks() bool` +`func (o *MongoDbAtlasWriteRoleRequest) HasCidrBlocks() bool` HasCidrBlocks returns a boolean if a field has been set. @@ -68,27 +68,27 @@ HasCidrBlocks returns a boolean if a field has been set. ### GetIpAddresses -`func (o *MongoDBAtlasWriteRoleRequest) GetIpAddresses() []string` +`func (o *MongoDbAtlasWriteRoleRequest) GetIpAddresses() []string` GetIpAddresses returns the IpAddresses field if non-nil, zero value otherwise. ### GetIpAddressesOk -`func (o *MongoDBAtlasWriteRoleRequest) GetIpAddressesOk() (*[]string, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetIpAddressesOk() (*[]string, bool)` GetIpAddressesOk returns a tuple with the IpAddresses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpAddresses -`func (o *MongoDBAtlasWriteRoleRequest) SetIpAddresses(v []string)` +`func (o *MongoDbAtlasWriteRoleRequest) SetIpAddresses(v []string)` SetIpAddresses sets IpAddresses field to given value. ### HasIpAddresses -`func (o *MongoDBAtlasWriteRoleRequest) HasIpAddresses() bool` +`func (o *MongoDbAtlasWriteRoleRequest) HasIpAddresses() bool` HasIpAddresses returns a boolean if a field has been set. @@ -97,27 +97,27 @@ HasIpAddresses returns a boolean if a field has been set. ### GetMaxTtl -`func (o *MongoDBAtlasWriteRoleRequest) GetMaxTtl() int32` +`func (o *MongoDbAtlasWriteRoleRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *MongoDBAtlasWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *MongoDBAtlasWriteRoleRequest) SetMaxTtl(v int32)` +`func (o *MongoDbAtlasWriteRoleRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *MongoDBAtlasWriteRoleRequest) HasMaxTtl() bool` +`func (o *MongoDbAtlasWriteRoleRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -126,27 +126,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetOrganizationId -`func (o *MongoDBAtlasWriteRoleRequest) GetOrganizationId() string` +`func (o *MongoDbAtlasWriteRoleRequest) GetOrganizationId() string` GetOrganizationId returns the OrganizationId field if non-nil, zero value otherwise. ### GetOrganizationIdOk -`func (o *MongoDBAtlasWriteRoleRequest) GetOrganizationIdOk() (*string, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetOrganizationIdOk() (*string, bool)` GetOrganizationIdOk returns a tuple with the OrganizationId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganizationId -`func (o *MongoDBAtlasWriteRoleRequest) SetOrganizationId(v string)` +`func (o *MongoDbAtlasWriteRoleRequest) SetOrganizationId(v string)` SetOrganizationId sets OrganizationId field to given value. ### HasOrganizationId -`func (o *MongoDBAtlasWriteRoleRequest) HasOrganizationId() bool` +`func (o *MongoDbAtlasWriteRoleRequest) HasOrganizationId() bool` HasOrganizationId returns a boolean if a field has been set. @@ -155,27 +155,27 @@ HasOrganizationId returns a boolean if a field has been set. ### GetProjectId -`func (o *MongoDBAtlasWriteRoleRequest) GetProjectId() string` +`func (o *MongoDbAtlasWriteRoleRequest) GetProjectId() string` GetProjectId returns the ProjectId field if non-nil, zero value otherwise. ### GetProjectIdOk -`func (o *MongoDBAtlasWriteRoleRequest) GetProjectIdOk() (*string, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetProjectIdOk() (*string, bool)` GetProjectIdOk returns a tuple with the ProjectId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProjectId -`func (o *MongoDBAtlasWriteRoleRequest) SetProjectId(v string)` +`func (o *MongoDbAtlasWriteRoleRequest) SetProjectId(v string)` SetProjectId sets ProjectId field to given value. ### HasProjectId -`func (o *MongoDBAtlasWriteRoleRequest) HasProjectId() bool` +`func (o *MongoDbAtlasWriteRoleRequest) HasProjectId() bool` HasProjectId returns a boolean if a field has been set. @@ -184,27 +184,27 @@ HasProjectId returns a boolean if a field has been set. ### GetProjectRoles -`func (o *MongoDBAtlasWriteRoleRequest) GetProjectRoles() []string` +`func (o *MongoDbAtlasWriteRoleRequest) GetProjectRoles() []string` GetProjectRoles returns the ProjectRoles field if non-nil, zero value otherwise. ### GetProjectRolesOk -`func (o *MongoDBAtlasWriteRoleRequest) GetProjectRolesOk() (*[]string, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetProjectRolesOk() (*[]string, bool)` GetProjectRolesOk returns a tuple with the ProjectRoles field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProjectRoles -`func (o *MongoDBAtlasWriteRoleRequest) SetProjectRoles(v []string)` +`func (o *MongoDbAtlasWriteRoleRequest) SetProjectRoles(v []string)` SetProjectRoles sets ProjectRoles field to given value. ### HasProjectRoles -`func (o *MongoDBAtlasWriteRoleRequest) HasProjectRoles() bool` +`func (o *MongoDbAtlasWriteRoleRequest) HasProjectRoles() bool` HasProjectRoles returns a boolean if a field has been set. @@ -213,20 +213,20 @@ HasProjectRoles returns a boolean if a field has been set. ### GetRoles -`func (o *MongoDBAtlasWriteRoleRequest) GetRoles() []string` +`func (o *MongoDbAtlasWriteRoleRequest) GetRoles() []string` GetRoles returns the Roles field if non-nil, zero value otherwise. ### GetRolesOk -`func (o *MongoDBAtlasWriteRoleRequest) GetRolesOk() (*[]string, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetRolesOk() (*[]string, bool)` GetRolesOk returns a tuple with the Roles field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoles -`func (o *MongoDBAtlasWriteRoleRequest) SetRoles(v []string)` +`func (o *MongoDbAtlasWriteRoleRequest) SetRoles(v []string)` SetRoles sets Roles field to given value. @@ -236,27 +236,27 @@ SetRoles sets Roles field to given value. ### GetTtl -`func (o *MongoDBAtlasWriteRoleRequest) GetTtl() int32` +`func (o *MongoDbAtlasWriteRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *MongoDBAtlasWriteRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *MongoDbAtlasWriteRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *MongoDBAtlasWriteRoleRequest) SetTtl(v int32)` +`func (o *MongoDbAtlasWriteRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *MongoDBAtlasWriteRoleRequest) HasTtl() bool` +`func (o *MongoDbAtlasWriteRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/MongoDBAtlasWriteConfigRequest.md b/docs/MongoDbAtlasConfigureRequest.md similarity index 61% rename from docs/MongoDBAtlasWriteConfigRequest.md rename to docs/MongoDbAtlasConfigureRequest.md index fd04babe..87e769dc 100644 --- a/docs/MongoDBAtlasWriteConfigRequest.md +++ b/docs/MongoDbAtlasConfigureRequest.md @@ -1,4 +1,4 @@ -# MongoDBAtlasWriteConfigRequest +# MongoDbAtlasConfigureRequest ## Properties @@ -13,40 +13,40 @@ Name | Type | Description | Notes ## Methods -### NewMongoDBAtlasWriteConfigRequest +### NewMongoDbAtlasConfigureRequest -`func NewMongoDBAtlasWriteConfigRequest(privateKey string, publicKey string, ) *MongoDBAtlasWriteConfigRequest` +`func NewMongoDbAtlasConfigureRequest(privateKey string, publicKey string, ) *MongoDbAtlasConfigureRequest` -NewMongoDBAtlasWriteConfigRequest instantiates a new MongoDBAtlasWriteConfigRequest object +NewMongoDbAtlasConfigureRequest instantiates a new MongoDbAtlasConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewMongoDBAtlasWriteConfigRequestWithDefaults +### NewMongoDbAtlasConfigureRequestWithDefaults -`func NewMongoDBAtlasWriteConfigRequestWithDefaults() *MongoDBAtlasWriteConfigRequest` +`func NewMongoDbAtlasConfigureRequestWithDefaults() *MongoDbAtlasConfigureRequest` -NewMongoDBAtlasWriteConfigRequestWithDefaults instantiates a new MongoDBAtlasWriteConfigRequest object +NewMongoDbAtlasConfigureRequestWithDefaults instantiates a new MongoDbAtlasConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPrivateKey -`func (o *MongoDBAtlasWriteConfigRequest) GetPrivateKey() string` +`func (o *MongoDbAtlasConfigureRequest) GetPrivateKey() string` GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. ### GetPrivateKeyOk -`func (o *MongoDBAtlasWriteConfigRequest) GetPrivateKeyOk() (*string, bool)` +`func (o *MongoDbAtlasConfigureRequest) GetPrivateKeyOk() (*string, bool)` GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKey -`func (o *MongoDBAtlasWriteConfigRequest) SetPrivateKey(v string)` +`func (o *MongoDbAtlasConfigureRequest) SetPrivateKey(v string)` SetPrivateKey sets PrivateKey field to given value. @@ -56,20 +56,20 @@ SetPrivateKey sets PrivateKey field to given value. ### GetPublicKey -`func (o *MongoDBAtlasWriteConfigRequest) GetPublicKey() string` +`func (o *MongoDbAtlasConfigureRequest) GetPublicKey() string` GetPublicKey returns the PublicKey field if non-nil, zero value otherwise. ### GetPublicKeyOk -`func (o *MongoDBAtlasWriteConfigRequest) GetPublicKeyOk() (*string, bool)` +`func (o *MongoDbAtlasConfigureRequest) GetPublicKeyOk() (*string, bool)` GetPublicKeyOk returns a tuple with the PublicKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPublicKey -`func (o *MongoDBAtlasWriteConfigRequest) SetPublicKey(v string)` +`func (o *MongoDbAtlasConfigureRequest) SetPublicKey(v string)` SetPublicKey sets PublicKey field to given value. diff --git a/docs/WriteMountRequest.md b/docs/MountsEnableSecretsEngineRequest.md similarity index 64% rename from docs/WriteMountRequest.md rename to docs/MountsEnableSecretsEngineRequest.md index 451bc6cf..52313434 100644 --- a/docs/WriteMountRequest.md +++ b/docs/MountsEnableSecretsEngineRequest.md @@ -1,4 +1,4 @@ -# WriteMountRequest +# MountsEnableSecretsEngineRequest ## Properties @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteMountRequest +### NewMountsEnableSecretsEngineRequest -`func NewWriteMountRequest() *WriteMountRequest` +`func NewMountsEnableSecretsEngineRequest() *MountsEnableSecretsEngineRequest` -NewWriteMountRequest instantiates a new WriteMountRequest object +NewMountsEnableSecretsEngineRequest instantiates a new MountsEnableSecretsEngineRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteMountRequestWithDefaults +### NewMountsEnableSecretsEngineRequestWithDefaults -`func NewWriteMountRequestWithDefaults() *WriteMountRequest` +`func NewMountsEnableSecretsEngineRequestWithDefaults() *MountsEnableSecretsEngineRequest` -NewWriteMountRequestWithDefaults instantiates a new WriteMountRequest object +NewMountsEnableSecretsEngineRequestWithDefaults instantiates a new MountsEnableSecretsEngineRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetConfig -`func (o *WriteMountRequest) GetConfig() map[string]interface{}` +`func (o *MountsEnableSecretsEngineRequest) GetConfig() map[string]interface{}` GetConfig returns the Config field if non-nil, zero value otherwise. ### GetConfigOk -`func (o *WriteMountRequest) GetConfigOk() (*map[string]interface{}, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetConfigOk() (*map[string]interface{}, bool)` GetConfigOk returns a tuple with the Config field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetConfig -`func (o *WriteMountRequest) SetConfig(v map[string]interface{})` +`func (o *MountsEnableSecretsEngineRequest) SetConfig(v map[string]interface{})` SetConfig sets Config field to given value. ### HasConfig -`func (o *WriteMountRequest) HasConfig() bool` +`func (o *MountsEnableSecretsEngineRequest) HasConfig() bool` HasConfig returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasConfig returns a boolean if a field has been set. ### GetDescription -`func (o *WriteMountRequest) GetDescription() string` +`func (o *MountsEnableSecretsEngineRequest) GetDescription() string` GetDescription returns the Description field if non-nil, zero value otherwise. ### GetDescriptionOk -`func (o *WriteMountRequest) GetDescriptionOk() (*string, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetDescriptionOk() (*string, bool)` GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDescription -`func (o *WriteMountRequest) SetDescription(v string)` +`func (o *MountsEnableSecretsEngineRequest) SetDescription(v string)` SetDescription sets Description field to given value. ### HasDescription -`func (o *WriteMountRequest) HasDescription() bool` +`func (o *MountsEnableSecretsEngineRequest) HasDescription() bool` HasDescription returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasDescription returns a boolean if a field has been set. ### GetExternalEntropyAccess -`func (o *WriteMountRequest) GetExternalEntropyAccess() bool` +`func (o *MountsEnableSecretsEngineRequest) GetExternalEntropyAccess() bool` GetExternalEntropyAccess returns the ExternalEntropyAccess field if non-nil, zero value otherwise. ### GetExternalEntropyAccessOk -`func (o *WriteMountRequest) GetExternalEntropyAccessOk() (*bool, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetExternalEntropyAccessOk() (*bool, bool)` GetExternalEntropyAccessOk returns a tuple with the ExternalEntropyAccess field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExternalEntropyAccess -`func (o *WriteMountRequest) SetExternalEntropyAccess(v bool)` +`func (o *MountsEnableSecretsEngineRequest) SetExternalEntropyAccess(v bool)` SetExternalEntropyAccess sets ExternalEntropyAccess field to given value. ### HasExternalEntropyAccess -`func (o *WriteMountRequest) HasExternalEntropyAccess() bool` +`func (o *MountsEnableSecretsEngineRequest) HasExternalEntropyAccess() bool` HasExternalEntropyAccess returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasExternalEntropyAccess returns a boolean if a field has been set. ### GetLocal -`func (o *WriteMountRequest) GetLocal() bool` +`func (o *MountsEnableSecretsEngineRequest) GetLocal() bool` GetLocal returns the Local field if non-nil, zero value otherwise. ### GetLocalOk -`func (o *WriteMountRequest) GetLocalOk() (*bool, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetLocalOk() (*bool, bool)` GetLocalOk returns a tuple with the Local field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocal -`func (o *WriteMountRequest) SetLocal(v bool)` +`func (o *MountsEnableSecretsEngineRequest) SetLocal(v bool)` SetLocal sets Local field to given value. ### HasLocal -`func (o *WriteMountRequest) HasLocal() bool` +`func (o *MountsEnableSecretsEngineRequest) HasLocal() bool` HasLocal returns a boolean if a field has been set. @@ -156,27 +156,27 @@ HasLocal returns a boolean if a field has been set. ### GetOptions -`func (o *WriteMountRequest) GetOptions() map[string]interface{}` +`func (o *MountsEnableSecretsEngineRequest) GetOptions() map[string]interface{}` GetOptions returns the Options field if non-nil, zero value otherwise. ### GetOptionsOk -`func (o *WriteMountRequest) GetOptionsOk() (*map[string]interface{}, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetOptionsOk() (*map[string]interface{}, bool)` GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOptions -`func (o *WriteMountRequest) SetOptions(v map[string]interface{})` +`func (o *MountsEnableSecretsEngineRequest) SetOptions(v map[string]interface{})` SetOptions sets Options field to given value. ### HasOptions -`func (o *WriteMountRequest) HasOptions() bool` +`func (o *MountsEnableSecretsEngineRequest) HasOptions() bool` HasOptions returns a boolean if a field has been set. @@ -185,27 +185,27 @@ HasOptions returns a boolean if a field has been set. ### GetPluginName -`func (o *WriteMountRequest) GetPluginName() string` +`func (o *MountsEnableSecretsEngineRequest) GetPluginName() string` GetPluginName returns the PluginName field if non-nil, zero value otherwise. ### GetPluginNameOk -`func (o *WriteMountRequest) GetPluginNameOk() (*string, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetPluginNameOk() (*string, bool)` GetPluginNameOk returns a tuple with the PluginName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginName -`func (o *WriteMountRequest) SetPluginName(v string)` +`func (o *MountsEnableSecretsEngineRequest) SetPluginName(v string)` SetPluginName sets PluginName field to given value. ### HasPluginName -`func (o *WriteMountRequest) HasPluginName() bool` +`func (o *MountsEnableSecretsEngineRequest) HasPluginName() bool` HasPluginName returns a boolean if a field has been set. @@ -214,27 +214,27 @@ HasPluginName returns a boolean if a field has been set. ### GetPluginVersion -`func (o *WriteMountRequest) GetPluginVersion() string` +`func (o *MountsEnableSecretsEngineRequest) GetPluginVersion() string` GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. ### GetPluginVersionOk -`func (o *WriteMountRequest) GetPluginVersionOk() (*string, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetPluginVersionOk() (*string, bool)` GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginVersion -`func (o *WriteMountRequest) SetPluginVersion(v string)` +`func (o *MountsEnableSecretsEngineRequest) SetPluginVersion(v string)` SetPluginVersion sets PluginVersion field to given value. ### HasPluginVersion -`func (o *WriteMountRequest) HasPluginVersion() bool` +`func (o *MountsEnableSecretsEngineRequest) HasPluginVersion() bool` HasPluginVersion returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasPluginVersion returns a boolean if a field has been set. ### GetSealWrap -`func (o *WriteMountRequest) GetSealWrap() bool` +`func (o *MountsEnableSecretsEngineRequest) GetSealWrap() bool` GetSealWrap returns the SealWrap field if non-nil, zero value otherwise. ### GetSealWrapOk -`func (o *WriteMountRequest) GetSealWrapOk() (*bool, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetSealWrapOk() (*bool, bool)` GetSealWrapOk returns a tuple with the SealWrap field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSealWrap -`func (o *WriteMountRequest) SetSealWrap(v bool)` +`func (o *MountsEnableSecretsEngineRequest) SetSealWrap(v bool)` SetSealWrap sets SealWrap field to given value. ### HasSealWrap -`func (o *WriteMountRequest) HasSealWrap() bool` +`func (o *MountsEnableSecretsEngineRequest) HasSealWrap() bool` HasSealWrap returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasSealWrap returns a boolean if a field has been set. ### GetType -`func (o *WriteMountRequest) GetType() string` +`func (o *MountsEnableSecretsEngineRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *WriteMountRequest) GetTypeOk() (*string, bool)` +`func (o *MountsEnableSecretsEngineRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *WriteMountRequest) SetType(v string)` +`func (o *MountsEnableSecretsEngineRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *WriteMountRequest) HasType() bool` +`func (o *MountsEnableSecretsEngineRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/MountsReadConfigurationResponse.md b/docs/MountsReadConfigurationResponse.md new file mode 100644 index 00000000..7d974892 --- /dev/null +++ b/docs/MountsReadConfigurationResponse.md @@ -0,0 +1,429 @@ +# MountsReadConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Accessor** | Pointer to **string** | | [optional] +**Config** | Pointer to **map[string]interface{}** | Configuration for this mount, such as default_lease_ttl and max_lease_ttl. | [optional] +**DeprecationStatus** | Pointer to **string** | | [optional] +**Description** | Pointer to **string** | User-friendly description for this mount. | [optional] +**ExternalEntropyAccess** | Pointer to **bool** | | [optional] +**Local** | Pointer to **bool** | Mark the mount as a local mount, which is not replicated and is unaffected by replication. | [optional] [default to false] +**Options** | Pointer to **map[string]interface{}** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] +**PluginVersion** | Pointer to **string** | The semantic version of the plugin to use. | [optional] +**RunningPluginVersion** | Pointer to **string** | | [optional] +**RunningSha256** | Pointer to **string** | | [optional] +**SealWrap** | Pointer to **bool** | Whether to turn on seal wrapping for the mount. | [optional] [default to false] +**Type** | Pointer to **string** | The type of the backend. Example: \"passthrough\" | [optional] +**Uuid** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewMountsReadConfigurationResponse + +`func NewMountsReadConfigurationResponse() *MountsReadConfigurationResponse` + +NewMountsReadConfigurationResponse instantiates a new MountsReadConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewMountsReadConfigurationResponseWithDefaults + +`func NewMountsReadConfigurationResponseWithDefaults() *MountsReadConfigurationResponse` + +NewMountsReadConfigurationResponseWithDefaults instantiates a new MountsReadConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAccessor + +`func (o *MountsReadConfigurationResponse) GetAccessor() string` + +GetAccessor returns the Accessor field if non-nil, zero value otherwise. + +### GetAccessorOk + +`func (o *MountsReadConfigurationResponse) GetAccessorOk() (*string, bool)` + +GetAccessorOk returns a tuple with the Accessor field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAccessor + +`func (o *MountsReadConfigurationResponse) SetAccessor(v string)` + +SetAccessor sets Accessor field to given value. + + +### HasAccessor + +`func (o *MountsReadConfigurationResponse) HasAccessor() bool` + +HasAccessor returns a boolean if a field has been set. + + + + +### GetConfig + +`func (o *MountsReadConfigurationResponse) GetConfig() map[string]interface{}` + +GetConfig returns the Config field if non-nil, zero value otherwise. + +### GetConfigOk + +`func (o *MountsReadConfigurationResponse) GetConfigOk() (*map[string]interface{}, bool)` + +GetConfigOk returns a tuple with the Config field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetConfig + +`func (o *MountsReadConfigurationResponse) SetConfig(v map[string]interface{})` + +SetConfig sets Config field to given value. + + +### HasConfig + +`func (o *MountsReadConfigurationResponse) HasConfig() bool` + +HasConfig returns a boolean if a field has been set. + + + + +### GetDeprecationStatus + +`func (o *MountsReadConfigurationResponse) GetDeprecationStatus() string` + +GetDeprecationStatus returns the DeprecationStatus field if non-nil, zero value otherwise. + +### GetDeprecationStatusOk + +`func (o *MountsReadConfigurationResponse) GetDeprecationStatusOk() (*string, bool)` + +GetDeprecationStatusOk returns a tuple with the DeprecationStatus field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeprecationStatus + +`func (o *MountsReadConfigurationResponse) SetDeprecationStatus(v string)` + +SetDeprecationStatus sets DeprecationStatus field to given value. + + +### HasDeprecationStatus + +`func (o *MountsReadConfigurationResponse) HasDeprecationStatus() bool` + +HasDeprecationStatus returns a boolean if a field has been set. + + + + +### GetDescription + +`func (o *MountsReadConfigurationResponse) GetDescription() string` + +GetDescription returns the Description field if non-nil, zero value otherwise. + +### GetDescriptionOk + +`func (o *MountsReadConfigurationResponse) GetDescriptionOk() (*string, bool)` + +GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDescription + +`func (o *MountsReadConfigurationResponse) SetDescription(v string)` + +SetDescription sets Description field to given value. + + +### HasDescription + +`func (o *MountsReadConfigurationResponse) HasDescription() bool` + +HasDescription returns a boolean if a field has been set. + + + + +### GetExternalEntropyAccess + +`func (o *MountsReadConfigurationResponse) GetExternalEntropyAccess() bool` + +GetExternalEntropyAccess returns the ExternalEntropyAccess field if non-nil, zero value otherwise. + +### GetExternalEntropyAccessOk + +`func (o *MountsReadConfigurationResponse) GetExternalEntropyAccessOk() (*bool, bool)` + +GetExternalEntropyAccessOk returns a tuple with the ExternalEntropyAccess field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExternalEntropyAccess + +`func (o *MountsReadConfigurationResponse) SetExternalEntropyAccess(v bool)` + +SetExternalEntropyAccess sets ExternalEntropyAccess field to given value. + + +### HasExternalEntropyAccess + +`func (o *MountsReadConfigurationResponse) HasExternalEntropyAccess() bool` + +HasExternalEntropyAccess returns a boolean if a field has been set. + + + + +### GetLocal + +`func (o *MountsReadConfigurationResponse) GetLocal() bool` + +GetLocal returns the Local field if non-nil, zero value otherwise. + +### GetLocalOk + +`func (o *MountsReadConfigurationResponse) GetLocalOk() (*bool, bool)` + +GetLocalOk returns a tuple with the Local field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLocal + +`func (o *MountsReadConfigurationResponse) SetLocal(v bool)` + +SetLocal sets Local field to given value. + + +### HasLocal + +`func (o *MountsReadConfigurationResponse) HasLocal() bool` + +HasLocal returns a boolean if a field has been set. + + + + +### GetOptions + +`func (o *MountsReadConfigurationResponse) GetOptions() map[string]interface{}` + +GetOptions returns the Options field if non-nil, zero value otherwise. + +### GetOptionsOk + +`func (o *MountsReadConfigurationResponse) GetOptionsOk() (*map[string]interface{}, bool)` + +GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOptions + +`func (o *MountsReadConfigurationResponse) SetOptions(v map[string]interface{})` + +SetOptions sets Options field to given value. + + +### HasOptions + +`func (o *MountsReadConfigurationResponse) HasOptions() bool` + +HasOptions returns a boolean if a field has been set. + + + + +### GetPluginVersion + +`func (o *MountsReadConfigurationResponse) GetPluginVersion() string` + +GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. + +### GetPluginVersionOk + +`func (o *MountsReadConfigurationResponse) GetPluginVersionOk() (*string, bool)` + +GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPluginVersion + +`func (o *MountsReadConfigurationResponse) SetPluginVersion(v string)` + +SetPluginVersion sets PluginVersion field to given value. + + +### HasPluginVersion + +`func (o *MountsReadConfigurationResponse) HasPluginVersion() bool` + +HasPluginVersion returns a boolean if a field has been set. + + + + +### GetRunningPluginVersion + +`func (o *MountsReadConfigurationResponse) GetRunningPluginVersion() string` + +GetRunningPluginVersion returns the RunningPluginVersion field if non-nil, zero value otherwise. + +### GetRunningPluginVersionOk + +`func (o *MountsReadConfigurationResponse) GetRunningPluginVersionOk() (*string, bool)` + +GetRunningPluginVersionOk returns a tuple with the RunningPluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRunningPluginVersion + +`func (o *MountsReadConfigurationResponse) SetRunningPluginVersion(v string)` + +SetRunningPluginVersion sets RunningPluginVersion field to given value. + + +### HasRunningPluginVersion + +`func (o *MountsReadConfigurationResponse) HasRunningPluginVersion() bool` + +HasRunningPluginVersion returns a boolean if a field has been set. + + + + +### GetRunningSha256 + +`func (o *MountsReadConfigurationResponse) GetRunningSha256() string` + +GetRunningSha256 returns the RunningSha256 field if non-nil, zero value otherwise. + +### GetRunningSha256Ok + +`func (o *MountsReadConfigurationResponse) GetRunningSha256Ok() (*string, bool)` + +GetRunningSha256Ok returns a tuple with the RunningSha256 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRunningSha256 + +`func (o *MountsReadConfigurationResponse) SetRunningSha256(v string)` + +SetRunningSha256 sets RunningSha256 field to given value. + + +### HasRunningSha256 + +`func (o *MountsReadConfigurationResponse) HasRunningSha256() bool` + +HasRunningSha256 returns a boolean if a field has been set. + + + + +### GetSealWrap + +`func (o *MountsReadConfigurationResponse) GetSealWrap() bool` + +GetSealWrap returns the SealWrap field if non-nil, zero value otherwise. + +### GetSealWrapOk + +`func (o *MountsReadConfigurationResponse) GetSealWrapOk() (*bool, bool)` + +GetSealWrapOk returns a tuple with the SealWrap field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSealWrap + +`func (o *MountsReadConfigurationResponse) SetSealWrap(v bool)` + +SetSealWrap sets SealWrap field to given value. + + +### HasSealWrap + +`func (o *MountsReadConfigurationResponse) HasSealWrap() bool` + +HasSealWrap returns a boolean if a field has been set. + + + + +### GetType + +`func (o *MountsReadConfigurationResponse) GetType() string` + +GetType returns the Type field if non-nil, zero value otherwise. + +### GetTypeOk + +`func (o *MountsReadConfigurationResponse) GetTypeOk() (*string, bool)` + +GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetType + +`func (o *MountsReadConfigurationResponse) SetType(v string)` + +SetType sets Type field to given value. + + +### HasType + +`func (o *MountsReadConfigurationResponse) HasType() bool` + +HasType returns a boolean if a field has been set. + + + + +### GetUuid + +`func (o *MountsReadConfigurationResponse) GetUuid() string` + +GetUuid returns the Uuid field if non-nil, zero value otherwise. + +### GetUuidOk + +`func (o *MountsReadConfigurationResponse) GetUuidOk() (*string, bool)` + +GetUuidOk returns a tuple with the Uuid field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUuid + +`func (o *MountsReadConfigurationResponse) SetUuid(v string)` + +SetUuid sets Uuid field to given value. + + +### HasUuid + +`func (o *MountsReadConfigurationResponse) HasUuid() bool` + +HasUuid returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/MountsReadTuningInformationResponse.md b/docs/MountsReadTuningInformationResponse.md new file mode 100644 index 00000000..3296c604 --- /dev/null +++ b/docs/MountsReadTuningInformationResponse.md @@ -0,0 +1,579 @@ +# MountsReadTuningInformationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AllowedManagedKeys** | Pointer to **[]string** | | [optional] +**AllowedResponseHeaders** | Pointer to **[]string** | A list of headers to whitelist and allow a plugin to set on responses. | [optional] +**AuditNonHmacRequestKeys** | Pointer to **[]string** | | [optional] +**AuditNonHmacResponseKeys** | Pointer to **[]string** | | [optional] +**DefaultLeaseTtl** | Pointer to **int32** | The default lease TTL for this mount. | [optional] +**Description** | Pointer to **string** | User-friendly description for this credential backend. | [optional] +**ExternalEntropyAccess** | Pointer to **bool** | | [optional] +**ForceNoCache** | Pointer to **bool** | | [optional] +**ListingVisibility** | Pointer to **string** | | [optional] +**MaxLeaseTtl** | Pointer to **int32** | The max lease TTL for this mount. | [optional] +**Options** | Pointer to **map[string]interface{}** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] +**PassthroughRequestHeaders** | Pointer to **[]string** | | [optional] +**PluginVersion** | Pointer to **string** | The semantic version of the plugin to use. | [optional] +**TokenType** | Pointer to **string** | The type of token to issue (service or batch). | [optional] +**UserLockoutCounterResetDuration** | Pointer to **int64** | | [optional] +**UserLockoutDisable** | Pointer to **bool** | | [optional] +**UserLockoutDuration** | Pointer to **int64** | | [optional] +**UserLockoutThreshold** | Pointer to **int64** | | [optional] + + + +## Methods + + +### NewMountsReadTuningInformationResponse + +`func NewMountsReadTuningInformationResponse() *MountsReadTuningInformationResponse` + +NewMountsReadTuningInformationResponse instantiates a new MountsReadTuningInformationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewMountsReadTuningInformationResponseWithDefaults + +`func NewMountsReadTuningInformationResponseWithDefaults() *MountsReadTuningInformationResponse` + +NewMountsReadTuningInformationResponseWithDefaults instantiates a new MountsReadTuningInformationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAllowedManagedKeys + +`func (o *MountsReadTuningInformationResponse) GetAllowedManagedKeys() []string` + +GetAllowedManagedKeys returns the AllowedManagedKeys field if non-nil, zero value otherwise. + +### GetAllowedManagedKeysOk + +`func (o *MountsReadTuningInformationResponse) GetAllowedManagedKeysOk() (*[]string, bool)` + +GetAllowedManagedKeysOk returns a tuple with the AllowedManagedKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedManagedKeys + +`func (o *MountsReadTuningInformationResponse) SetAllowedManagedKeys(v []string)` + +SetAllowedManagedKeys sets AllowedManagedKeys field to given value. + + +### HasAllowedManagedKeys + +`func (o *MountsReadTuningInformationResponse) HasAllowedManagedKeys() bool` + +HasAllowedManagedKeys returns a boolean if a field has been set. + + + + +### GetAllowedResponseHeaders + +`func (o *MountsReadTuningInformationResponse) GetAllowedResponseHeaders() []string` + +GetAllowedResponseHeaders returns the AllowedResponseHeaders field if non-nil, zero value otherwise. + +### GetAllowedResponseHeadersOk + +`func (o *MountsReadTuningInformationResponse) GetAllowedResponseHeadersOk() (*[]string, bool)` + +GetAllowedResponseHeadersOk returns a tuple with the AllowedResponseHeaders field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedResponseHeaders + +`func (o *MountsReadTuningInformationResponse) SetAllowedResponseHeaders(v []string)` + +SetAllowedResponseHeaders sets AllowedResponseHeaders field to given value. + + +### HasAllowedResponseHeaders + +`func (o *MountsReadTuningInformationResponse) HasAllowedResponseHeaders() bool` + +HasAllowedResponseHeaders returns a boolean if a field has been set. + + + + +### GetAuditNonHmacRequestKeys + +`func (o *MountsReadTuningInformationResponse) GetAuditNonHmacRequestKeys() []string` + +GetAuditNonHmacRequestKeys returns the AuditNonHmacRequestKeys field if non-nil, zero value otherwise. + +### GetAuditNonHmacRequestKeysOk + +`func (o *MountsReadTuningInformationResponse) GetAuditNonHmacRequestKeysOk() (*[]string, bool)` + +GetAuditNonHmacRequestKeysOk returns a tuple with the AuditNonHmacRequestKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAuditNonHmacRequestKeys + +`func (o *MountsReadTuningInformationResponse) SetAuditNonHmacRequestKeys(v []string)` + +SetAuditNonHmacRequestKeys sets AuditNonHmacRequestKeys field to given value. + + +### HasAuditNonHmacRequestKeys + +`func (o *MountsReadTuningInformationResponse) HasAuditNonHmacRequestKeys() bool` + +HasAuditNonHmacRequestKeys returns a boolean if a field has been set. + + + + +### GetAuditNonHmacResponseKeys + +`func (o *MountsReadTuningInformationResponse) GetAuditNonHmacResponseKeys() []string` + +GetAuditNonHmacResponseKeys returns the AuditNonHmacResponseKeys field if non-nil, zero value otherwise. + +### GetAuditNonHmacResponseKeysOk + +`func (o *MountsReadTuningInformationResponse) GetAuditNonHmacResponseKeysOk() (*[]string, bool)` + +GetAuditNonHmacResponseKeysOk returns a tuple with the AuditNonHmacResponseKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAuditNonHmacResponseKeys + +`func (o *MountsReadTuningInformationResponse) SetAuditNonHmacResponseKeys(v []string)` + +SetAuditNonHmacResponseKeys sets AuditNonHmacResponseKeys field to given value. + + +### HasAuditNonHmacResponseKeys + +`func (o *MountsReadTuningInformationResponse) HasAuditNonHmacResponseKeys() bool` + +HasAuditNonHmacResponseKeys returns a boolean if a field has been set. + + + + +### GetDefaultLeaseTtl + +`func (o *MountsReadTuningInformationResponse) GetDefaultLeaseTtl() int32` + +GetDefaultLeaseTtl returns the DefaultLeaseTtl field if non-nil, zero value otherwise. + +### GetDefaultLeaseTtlOk + +`func (o *MountsReadTuningInformationResponse) GetDefaultLeaseTtlOk() (*int32, bool)` + +GetDefaultLeaseTtlOk returns a tuple with the DefaultLeaseTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefaultLeaseTtl + +`func (o *MountsReadTuningInformationResponse) SetDefaultLeaseTtl(v int32)` + +SetDefaultLeaseTtl sets DefaultLeaseTtl field to given value. + + +### HasDefaultLeaseTtl + +`func (o *MountsReadTuningInformationResponse) HasDefaultLeaseTtl() bool` + +HasDefaultLeaseTtl returns a boolean if a field has been set. + + + + +### GetDescription + +`func (o *MountsReadTuningInformationResponse) GetDescription() string` + +GetDescription returns the Description field if non-nil, zero value otherwise. + +### GetDescriptionOk + +`func (o *MountsReadTuningInformationResponse) GetDescriptionOk() (*string, bool)` + +GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDescription + +`func (o *MountsReadTuningInformationResponse) SetDescription(v string)` + +SetDescription sets Description field to given value. + + +### HasDescription + +`func (o *MountsReadTuningInformationResponse) HasDescription() bool` + +HasDescription returns a boolean if a field has been set. + + + + +### GetExternalEntropyAccess + +`func (o *MountsReadTuningInformationResponse) GetExternalEntropyAccess() bool` + +GetExternalEntropyAccess returns the ExternalEntropyAccess field if non-nil, zero value otherwise. + +### GetExternalEntropyAccessOk + +`func (o *MountsReadTuningInformationResponse) GetExternalEntropyAccessOk() (*bool, bool)` + +GetExternalEntropyAccessOk returns a tuple with the ExternalEntropyAccess field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExternalEntropyAccess + +`func (o *MountsReadTuningInformationResponse) SetExternalEntropyAccess(v bool)` + +SetExternalEntropyAccess sets ExternalEntropyAccess field to given value. + + +### HasExternalEntropyAccess + +`func (o *MountsReadTuningInformationResponse) HasExternalEntropyAccess() bool` + +HasExternalEntropyAccess returns a boolean if a field has been set. + + + + +### GetForceNoCache + +`func (o *MountsReadTuningInformationResponse) GetForceNoCache() bool` + +GetForceNoCache returns the ForceNoCache field if non-nil, zero value otherwise. + +### GetForceNoCacheOk + +`func (o *MountsReadTuningInformationResponse) GetForceNoCacheOk() (*bool, bool)` + +GetForceNoCacheOk returns a tuple with the ForceNoCache field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetForceNoCache + +`func (o *MountsReadTuningInformationResponse) SetForceNoCache(v bool)` + +SetForceNoCache sets ForceNoCache field to given value. + + +### HasForceNoCache + +`func (o *MountsReadTuningInformationResponse) HasForceNoCache() bool` + +HasForceNoCache returns a boolean if a field has been set. + + + + +### GetListingVisibility + +`func (o *MountsReadTuningInformationResponse) GetListingVisibility() string` + +GetListingVisibility returns the ListingVisibility field if non-nil, zero value otherwise. + +### GetListingVisibilityOk + +`func (o *MountsReadTuningInformationResponse) GetListingVisibilityOk() (*string, bool)` + +GetListingVisibilityOk returns a tuple with the ListingVisibility field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetListingVisibility + +`func (o *MountsReadTuningInformationResponse) SetListingVisibility(v string)` + +SetListingVisibility sets ListingVisibility field to given value. + + +### HasListingVisibility + +`func (o *MountsReadTuningInformationResponse) HasListingVisibility() bool` + +HasListingVisibility returns a boolean if a field has been set. + + + + +### GetMaxLeaseTtl + +`func (o *MountsReadTuningInformationResponse) GetMaxLeaseTtl() int32` + +GetMaxLeaseTtl returns the MaxLeaseTtl field if non-nil, zero value otherwise. + +### GetMaxLeaseTtlOk + +`func (o *MountsReadTuningInformationResponse) GetMaxLeaseTtlOk() (*int32, bool)` + +GetMaxLeaseTtlOk returns a tuple with the MaxLeaseTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxLeaseTtl + +`func (o *MountsReadTuningInformationResponse) SetMaxLeaseTtl(v int32)` + +SetMaxLeaseTtl sets MaxLeaseTtl field to given value. + + +### HasMaxLeaseTtl + +`func (o *MountsReadTuningInformationResponse) HasMaxLeaseTtl() bool` + +HasMaxLeaseTtl returns a boolean if a field has been set. + + + + +### GetOptions + +`func (o *MountsReadTuningInformationResponse) GetOptions() map[string]interface{}` + +GetOptions returns the Options field if non-nil, zero value otherwise. + +### GetOptionsOk + +`func (o *MountsReadTuningInformationResponse) GetOptionsOk() (*map[string]interface{}, bool)` + +GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOptions + +`func (o *MountsReadTuningInformationResponse) SetOptions(v map[string]interface{})` + +SetOptions sets Options field to given value. + + +### HasOptions + +`func (o *MountsReadTuningInformationResponse) HasOptions() bool` + +HasOptions returns a boolean if a field has been set. + + + + +### GetPassthroughRequestHeaders + +`func (o *MountsReadTuningInformationResponse) GetPassthroughRequestHeaders() []string` + +GetPassthroughRequestHeaders returns the PassthroughRequestHeaders field if non-nil, zero value otherwise. + +### GetPassthroughRequestHeadersOk + +`func (o *MountsReadTuningInformationResponse) GetPassthroughRequestHeadersOk() (*[]string, bool)` + +GetPassthroughRequestHeadersOk returns a tuple with the PassthroughRequestHeaders field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPassthroughRequestHeaders + +`func (o *MountsReadTuningInformationResponse) SetPassthroughRequestHeaders(v []string)` + +SetPassthroughRequestHeaders sets PassthroughRequestHeaders field to given value. + + +### HasPassthroughRequestHeaders + +`func (o *MountsReadTuningInformationResponse) HasPassthroughRequestHeaders() bool` + +HasPassthroughRequestHeaders returns a boolean if a field has been set. + + + + +### GetPluginVersion + +`func (o *MountsReadTuningInformationResponse) GetPluginVersion() string` + +GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. + +### GetPluginVersionOk + +`func (o *MountsReadTuningInformationResponse) GetPluginVersionOk() (*string, bool)` + +GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPluginVersion + +`func (o *MountsReadTuningInformationResponse) SetPluginVersion(v string)` + +SetPluginVersion sets PluginVersion field to given value. + + +### HasPluginVersion + +`func (o *MountsReadTuningInformationResponse) HasPluginVersion() bool` + +HasPluginVersion returns a boolean if a field has been set. + + + + +### GetTokenType + +`func (o *MountsReadTuningInformationResponse) GetTokenType() string` + +GetTokenType returns the TokenType field if non-nil, zero value otherwise. + +### GetTokenTypeOk + +`func (o *MountsReadTuningInformationResponse) GetTokenTypeOk() (*string, bool)` + +GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTokenType + +`func (o *MountsReadTuningInformationResponse) SetTokenType(v string)` + +SetTokenType sets TokenType field to given value. + + +### HasTokenType + +`func (o *MountsReadTuningInformationResponse) HasTokenType() bool` + +HasTokenType returns a boolean if a field has been set. + + + + +### GetUserLockoutCounterResetDuration + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutCounterResetDuration() int64` + +GetUserLockoutCounterResetDuration returns the UserLockoutCounterResetDuration field if non-nil, zero value otherwise. + +### GetUserLockoutCounterResetDurationOk + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutCounterResetDurationOk() (*int64, bool)` + +GetUserLockoutCounterResetDurationOk returns a tuple with the UserLockoutCounterResetDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutCounterResetDuration + +`func (o *MountsReadTuningInformationResponse) SetUserLockoutCounterResetDuration(v int64)` + +SetUserLockoutCounterResetDuration sets UserLockoutCounterResetDuration field to given value. + + +### HasUserLockoutCounterResetDuration + +`func (o *MountsReadTuningInformationResponse) HasUserLockoutCounterResetDuration() bool` + +HasUserLockoutCounterResetDuration returns a boolean if a field has been set. + + + + +### GetUserLockoutDisable + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutDisable() bool` + +GetUserLockoutDisable returns the UserLockoutDisable field if non-nil, zero value otherwise. + +### GetUserLockoutDisableOk + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutDisableOk() (*bool, bool)` + +GetUserLockoutDisableOk returns a tuple with the UserLockoutDisable field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutDisable + +`func (o *MountsReadTuningInformationResponse) SetUserLockoutDisable(v bool)` + +SetUserLockoutDisable sets UserLockoutDisable field to given value. + + +### HasUserLockoutDisable + +`func (o *MountsReadTuningInformationResponse) HasUserLockoutDisable() bool` + +HasUserLockoutDisable returns a boolean if a field has been set. + + + + +### GetUserLockoutDuration + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutDuration() int64` + +GetUserLockoutDuration returns the UserLockoutDuration field if non-nil, zero value otherwise. + +### GetUserLockoutDurationOk + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutDurationOk() (*int64, bool)` + +GetUserLockoutDurationOk returns a tuple with the UserLockoutDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutDuration + +`func (o *MountsReadTuningInformationResponse) SetUserLockoutDuration(v int64)` + +SetUserLockoutDuration sets UserLockoutDuration field to given value. + + +### HasUserLockoutDuration + +`func (o *MountsReadTuningInformationResponse) HasUserLockoutDuration() bool` + +HasUserLockoutDuration returns a boolean if a field has been set. + + + + +### GetUserLockoutThreshold + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutThreshold() int64` + +GetUserLockoutThreshold returns the UserLockoutThreshold field if non-nil, zero value otherwise. + +### GetUserLockoutThresholdOk + +`func (o *MountsReadTuningInformationResponse) GetUserLockoutThresholdOk() (*int64, bool)` + +GetUserLockoutThresholdOk returns a tuple with the UserLockoutThreshold field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserLockoutThreshold + +`func (o *MountsReadTuningInformationResponse) SetUserLockoutThreshold(v int64)` + +SetUserLockoutThreshold sets UserLockoutThreshold field to given value. + + +### HasUserLockoutThreshold + +`func (o *MountsReadTuningInformationResponse) HasUserLockoutThreshold() bool` + +HasUserLockoutThreshold returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteMountsConfigRequest.md b/docs/MountsTuneConfigurationParametersRequest.md similarity index 63% rename from docs/WriteMountsConfigRequest.md rename to docs/MountsTuneConfigurationParametersRequest.md index 05e5f4cf..d72cc597 100644 --- a/docs/WriteMountsConfigRequest.md +++ b/docs/MountsTuneConfigurationParametersRequest.md @@ -1,4 +1,4 @@ -# WriteMountsConfigRequest +# MountsTuneConfigurationParametersRequest ## Properties @@ -24,47 +24,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteMountsConfigRequest +### NewMountsTuneConfigurationParametersRequest -`func NewWriteMountsConfigRequest() *WriteMountsConfigRequest` +`func NewMountsTuneConfigurationParametersRequest() *MountsTuneConfigurationParametersRequest` -NewWriteMountsConfigRequest instantiates a new WriteMountsConfigRequest object +NewMountsTuneConfigurationParametersRequest instantiates a new MountsTuneConfigurationParametersRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteMountsConfigRequestWithDefaults +### NewMountsTuneConfigurationParametersRequestWithDefaults -`func NewWriteMountsConfigRequestWithDefaults() *WriteMountsConfigRequest` +`func NewMountsTuneConfigurationParametersRequestWithDefaults() *MountsTuneConfigurationParametersRequest` -NewWriteMountsConfigRequestWithDefaults instantiates a new WriteMountsConfigRequest object +NewMountsTuneConfigurationParametersRequestWithDefaults instantiates a new MountsTuneConfigurationParametersRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowedManagedKeys -`func (o *WriteMountsConfigRequest) GetAllowedManagedKeys() []string` +`func (o *MountsTuneConfigurationParametersRequest) GetAllowedManagedKeys() []string` GetAllowedManagedKeys returns the AllowedManagedKeys field if non-nil, zero value otherwise. ### GetAllowedManagedKeysOk -`func (o *WriteMountsConfigRequest) GetAllowedManagedKeysOk() (*[]string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetAllowedManagedKeysOk() (*[]string, bool)` GetAllowedManagedKeysOk returns a tuple with the AllowedManagedKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedManagedKeys -`func (o *WriteMountsConfigRequest) SetAllowedManagedKeys(v []string)` +`func (o *MountsTuneConfigurationParametersRequest) SetAllowedManagedKeys(v []string)` SetAllowedManagedKeys sets AllowedManagedKeys field to given value. ### HasAllowedManagedKeys -`func (o *WriteMountsConfigRequest) HasAllowedManagedKeys() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasAllowedManagedKeys() bool` HasAllowedManagedKeys returns a boolean if a field has been set. @@ -73,27 +73,27 @@ HasAllowedManagedKeys returns a boolean if a field has been set. ### GetAllowedResponseHeaders -`func (o *WriteMountsConfigRequest) GetAllowedResponseHeaders() []string` +`func (o *MountsTuneConfigurationParametersRequest) GetAllowedResponseHeaders() []string` GetAllowedResponseHeaders returns the AllowedResponseHeaders field if non-nil, zero value otherwise. ### GetAllowedResponseHeadersOk -`func (o *WriteMountsConfigRequest) GetAllowedResponseHeadersOk() (*[]string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetAllowedResponseHeadersOk() (*[]string, bool)` GetAllowedResponseHeadersOk returns a tuple with the AllowedResponseHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedResponseHeaders -`func (o *WriteMountsConfigRequest) SetAllowedResponseHeaders(v []string)` +`func (o *MountsTuneConfigurationParametersRequest) SetAllowedResponseHeaders(v []string)` SetAllowedResponseHeaders sets AllowedResponseHeaders field to given value. ### HasAllowedResponseHeaders -`func (o *WriteMountsConfigRequest) HasAllowedResponseHeaders() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasAllowedResponseHeaders() bool` HasAllowedResponseHeaders returns a boolean if a field has been set. @@ -102,27 +102,27 @@ HasAllowedResponseHeaders returns a boolean if a field has been set. ### GetAuditNonHmacRequestKeys -`func (o *WriteMountsConfigRequest) GetAuditNonHmacRequestKeys() []string` +`func (o *MountsTuneConfigurationParametersRequest) GetAuditNonHmacRequestKeys() []string` GetAuditNonHmacRequestKeys returns the AuditNonHmacRequestKeys field if non-nil, zero value otherwise. ### GetAuditNonHmacRequestKeysOk -`func (o *WriteMountsConfigRequest) GetAuditNonHmacRequestKeysOk() (*[]string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetAuditNonHmacRequestKeysOk() (*[]string, bool)` GetAuditNonHmacRequestKeysOk returns a tuple with the AuditNonHmacRequestKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAuditNonHmacRequestKeys -`func (o *WriteMountsConfigRequest) SetAuditNonHmacRequestKeys(v []string)` +`func (o *MountsTuneConfigurationParametersRequest) SetAuditNonHmacRequestKeys(v []string)` SetAuditNonHmacRequestKeys sets AuditNonHmacRequestKeys field to given value. ### HasAuditNonHmacRequestKeys -`func (o *WriteMountsConfigRequest) HasAuditNonHmacRequestKeys() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasAuditNonHmacRequestKeys() bool` HasAuditNonHmacRequestKeys returns a boolean if a field has been set. @@ -131,27 +131,27 @@ HasAuditNonHmacRequestKeys returns a boolean if a field has been set. ### GetAuditNonHmacResponseKeys -`func (o *WriteMountsConfigRequest) GetAuditNonHmacResponseKeys() []string` +`func (o *MountsTuneConfigurationParametersRequest) GetAuditNonHmacResponseKeys() []string` GetAuditNonHmacResponseKeys returns the AuditNonHmacResponseKeys field if non-nil, zero value otherwise. ### GetAuditNonHmacResponseKeysOk -`func (o *WriteMountsConfigRequest) GetAuditNonHmacResponseKeysOk() (*[]string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetAuditNonHmacResponseKeysOk() (*[]string, bool)` GetAuditNonHmacResponseKeysOk returns a tuple with the AuditNonHmacResponseKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAuditNonHmacResponseKeys -`func (o *WriteMountsConfigRequest) SetAuditNonHmacResponseKeys(v []string)` +`func (o *MountsTuneConfigurationParametersRequest) SetAuditNonHmacResponseKeys(v []string)` SetAuditNonHmacResponseKeys sets AuditNonHmacResponseKeys field to given value. ### HasAuditNonHmacResponseKeys -`func (o *WriteMountsConfigRequest) HasAuditNonHmacResponseKeys() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasAuditNonHmacResponseKeys() bool` HasAuditNonHmacResponseKeys returns a boolean if a field has been set. @@ -160,27 +160,27 @@ HasAuditNonHmacResponseKeys returns a boolean if a field has been set. ### GetDefaultLeaseTtl -`func (o *WriteMountsConfigRequest) GetDefaultLeaseTtl() string` +`func (o *MountsTuneConfigurationParametersRequest) GetDefaultLeaseTtl() string` GetDefaultLeaseTtl returns the DefaultLeaseTtl field if non-nil, zero value otherwise. ### GetDefaultLeaseTtlOk -`func (o *WriteMountsConfigRequest) GetDefaultLeaseTtlOk() (*string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetDefaultLeaseTtlOk() (*string, bool)` GetDefaultLeaseTtlOk returns a tuple with the DefaultLeaseTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultLeaseTtl -`func (o *WriteMountsConfigRequest) SetDefaultLeaseTtl(v string)` +`func (o *MountsTuneConfigurationParametersRequest) SetDefaultLeaseTtl(v string)` SetDefaultLeaseTtl sets DefaultLeaseTtl field to given value. ### HasDefaultLeaseTtl -`func (o *WriteMountsConfigRequest) HasDefaultLeaseTtl() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasDefaultLeaseTtl() bool` HasDefaultLeaseTtl returns a boolean if a field has been set. @@ -189,27 +189,27 @@ HasDefaultLeaseTtl returns a boolean if a field has been set. ### GetDescription -`func (o *WriteMountsConfigRequest) GetDescription() string` +`func (o *MountsTuneConfigurationParametersRequest) GetDescription() string` GetDescription returns the Description field if non-nil, zero value otherwise. ### GetDescriptionOk -`func (o *WriteMountsConfigRequest) GetDescriptionOk() (*string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetDescriptionOk() (*string, bool)` GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDescription -`func (o *WriteMountsConfigRequest) SetDescription(v string)` +`func (o *MountsTuneConfigurationParametersRequest) SetDescription(v string)` SetDescription sets Description field to given value. ### HasDescription -`func (o *WriteMountsConfigRequest) HasDescription() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasDescription() bool` HasDescription returns a boolean if a field has been set. @@ -218,27 +218,27 @@ HasDescription returns a boolean if a field has been set. ### GetListingVisibility -`func (o *WriteMountsConfigRequest) GetListingVisibility() string` +`func (o *MountsTuneConfigurationParametersRequest) GetListingVisibility() string` GetListingVisibility returns the ListingVisibility field if non-nil, zero value otherwise. ### GetListingVisibilityOk -`func (o *WriteMountsConfigRequest) GetListingVisibilityOk() (*string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetListingVisibilityOk() (*string, bool)` GetListingVisibilityOk returns a tuple with the ListingVisibility field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetListingVisibility -`func (o *WriteMountsConfigRequest) SetListingVisibility(v string)` +`func (o *MountsTuneConfigurationParametersRequest) SetListingVisibility(v string)` SetListingVisibility sets ListingVisibility field to given value. ### HasListingVisibility -`func (o *WriteMountsConfigRequest) HasListingVisibility() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasListingVisibility() bool` HasListingVisibility returns a boolean if a field has been set. @@ -247,27 +247,27 @@ HasListingVisibility returns a boolean if a field has been set. ### GetMaxLeaseTtl -`func (o *WriteMountsConfigRequest) GetMaxLeaseTtl() string` +`func (o *MountsTuneConfigurationParametersRequest) GetMaxLeaseTtl() string` GetMaxLeaseTtl returns the MaxLeaseTtl field if non-nil, zero value otherwise. ### GetMaxLeaseTtlOk -`func (o *WriteMountsConfigRequest) GetMaxLeaseTtlOk() (*string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetMaxLeaseTtlOk() (*string, bool)` GetMaxLeaseTtlOk returns a tuple with the MaxLeaseTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxLeaseTtl -`func (o *WriteMountsConfigRequest) SetMaxLeaseTtl(v string)` +`func (o *MountsTuneConfigurationParametersRequest) SetMaxLeaseTtl(v string)` SetMaxLeaseTtl sets MaxLeaseTtl field to given value. ### HasMaxLeaseTtl -`func (o *WriteMountsConfigRequest) HasMaxLeaseTtl() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasMaxLeaseTtl() bool` HasMaxLeaseTtl returns a boolean if a field has been set. @@ -276,27 +276,27 @@ HasMaxLeaseTtl returns a boolean if a field has been set. ### GetOptions -`func (o *WriteMountsConfigRequest) GetOptions() map[string]interface{}` +`func (o *MountsTuneConfigurationParametersRequest) GetOptions() map[string]interface{}` GetOptions returns the Options field if non-nil, zero value otherwise. ### GetOptionsOk -`func (o *WriteMountsConfigRequest) GetOptionsOk() (*map[string]interface{}, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetOptionsOk() (*map[string]interface{}, bool)` GetOptionsOk returns a tuple with the Options field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOptions -`func (o *WriteMountsConfigRequest) SetOptions(v map[string]interface{})` +`func (o *MountsTuneConfigurationParametersRequest) SetOptions(v map[string]interface{})` SetOptions sets Options field to given value. ### HasOptions -`func (o *WriteMountsConfigRequest) HasOptions() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasOptions() bool` HasOptions returns a boolean if a field has been set. @@ -305,27 +305,27 @@ HasOptions returns a boolean if a field has been set. ### GetPassthroughRequestHeaders -`func (o *WriteMountsConfigRequest) GetPassthroughRequestHeaders() []string` +`func (o *MountsTuneConfigurationParametersRequest) GetPassthroughRequestHeaders() []string` GetPassthroughRequestHeaders returns the PassthroughRequestHeaders field if non-nil, zero value otherwise. ### GetPassthroughRequestHeadersOk -`func (o *WriteMountsConfigRequest) GetPassthroughRequestHeadersOk() (*[]string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetPassthroughRequestHeadersOk() (*[]string, bool)` GetPassthroughRequestHeadersOk returns a tuple with the PassthroughRequestHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPassthroughRequestHeaders -`func (o *WriteMountsConfigRequest) SetPassthroughRequestHeaders(v []string)` +`func (o *MountsTuneConfigurationParametersRequest) SetPassthroughRequestHeaders(v []string)` SetPassthroughRequestHeaders sets PassthroughRequestHeaders field to given value. ### HasPassthroughRequestHeaders -`func (o *WriteMountsConfigRequest) HasPassthroughRequestHeaders() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasPassthroughRequestHeaders() bool` HasPassthroughRequestHeaders returns a boolean if a field has been set. @@ -334,27 +334,27 @@ HasPassthroughRequestHeaders returns a boolean if a field has been set. ### GetPluginVersion -`func (o *WriteMountsConfigRequest) GetPluginVersion() string` +`func (o *MountsTuneConfigurationParametersRequest) GetPluginVersion() string` GetPluginVersion returns the PluginVersion field if non-nil, zero value otherwise. ### GetPluginVersionOk -`func (o *WriteMountsConfigRequest) GetPluginVersionOk() (*string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetPluginVersionOk() (*string, bool)` GetPluginVersionOk returns a tuple with the PluginVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPluginVersion -`func (o *WriteMountsConfigRequest) SetPluginVersion(v string)` +`func (o *MountsTuneConfigurationParametersRequest) SetPluginVersion(v string)` SetPluginVersion sets PluginVersion field to given value. ### HasPluginVersion -`func (o *WriteMountsConfigRequest) HasPluginVersion() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasPluginVersion() bool` HasPluginVersion returns a boolean if a field has been set. @@ -363,27 +363,27 @@ HasPluginVersion returns a boolean if a field has been set. ### GetTokenType -`func (o *WriteMountsConfigRequest) GetTokenType() string` +`func (o *MountsTuneConfigurationParametersRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *WriteMountsConfigRequest) GetTokenTypeOk() (*string, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *WriteMountsConfigRequest) SetTokenType(v string)` +`func (o *MountsTuneConfigurationParametersRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *WriteMountsConfigRequest) HasTokenType() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -392,27 +392,27 @@ HasTokenType returns a boolean if a field has been set. ### GetUserLockoutConfig -`func (o *WriteMountsConfigRequest) GetUserLockoutConfig() map[string]interface{}` +`func (o *MountsTuneConfigurationParametersRequest) GetUserLockoutConfig() map[string]interface{}` GetUserLockoutConfig returns the UserLockoutConfig field if non-nil, zero value otherwise. ### GetUserLockoutConfigOk -`func (o *WriteMountsConfigRequest) GetUserLockoutConfigOk() (*map[string]interface{}, bool)` +`func (o *MountsTuneConfigurationParametersRequest) GetUserLockoutConfigOk() (*map[string]interface{}, bool)` GetUserLockoutConfigOk returns a tuple with the UserLockoutConfig field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserLockoutConfig -`func (o *WriteMountsConfigRequest) SetUserLockoutConfig(v map[string]interface{})` +`func (o *MountsTuneConfigurationParametersRequest) SetUserLockoutConfig(v map[string]interface{})` SetUserLockoutConfig sets UserLockoutConfig field to given value. ### HasUserLockoutConfig -`func (o *WriteMountsConfigRequest) HasUserLockoutConfig() bool` +`func (o *MountsTuneConfigurationParametersRequest) HasUserLockoutConfig() bool` HasUserLockoutConfig returns a boolean if a field has been set. diff --git a/docs/NomadWriteAccessConfigRequest.md b/docs/NomadConfigureAccessRequest.md similarity index 65% rename from docs/NomadWriteAccessConfigRequest.md rename to docs/NomadConfigureAccessRequest.md index 4a70f8e4..e787cb97 100644 --- a/docs/NomadWriteAccessConfigRequest.md +++ b/docs/NomadConfigureAccessRequest.md @@ -1,4 +1,4 @@ -# NomadWriteAccessConfigRequest +# NomadConfigureAccessRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewNomadWriteAccessConfigRequest +### NewNomadConfigureAccessRequest -`func NewNomadWriteAccessConfigRequest() *NomadWriteAccessConfigRequest` +`func NewNomadConfigureAccessRequest() *NomadConfigureAccessRequest` -NewNomadWriteAccessConfigRequest instantiates a new NomadWriteAccessConfigRequest object +NewNomadConfigureAccessRequest instantiates a new NomadConfigureAccessRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewNomadWriteAccessConfigRequestWithDefaults +### NewNomadConfigureAccessRequestWithDefaults -`func NewNomadWriteAccessConfigRequestWithDefaults() *NomadWriteAccessConfigRequest` +`func NewNomadConfigureAccessRequestWithDefaults() *NomadConfigureAccessRequest` -NewNomadWriteAccessConfigRequestWithDefaults instantiates a new NomadWriteAccessConfigRequest object +NewNomadConfigureAccessRequestWithDefaults instantiates a new NomadConfigureAccessRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAddress -`func (o *NomadWriteAccessConfigRequest) GetAddress() string` +`func (o *NomadConfigureAccessRequest) GetAddress() string` GetAddress returns the Address field if non-nil, zero value otherwise. ### GetAddressOk -`func (o *NomadWriteAccessConfigRequest) GetAddressOk() (*string, bool)` +`func (o *NomadConfigureAccessRequest) GetAddressOk() (*string, bool)` GetAddressOk returns a tuple with the Address field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAddress -`func (o *NomadWriteAccessConfigRequest) SetAddress(v string)` +`func (o *NomadConfigureAccessRequest) SetAddress(v string)` SetAddress sets Address field to given value. ### HasAddress -`func (o *NomadWriteAccessConfigRequest) HasAddress() bool` +`func (o *NomadConfigureAccessRequest) HasAddress() bool` HasAddress returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasAddress returns a boolean if a field has been set. ### GetCaCert -`func (o *NomadWriteAccessConfigRequest) GetCaCert() string` +`func (o *NomadConfigureAccessRequest) GetCaCert() string` GetCaCert returns the CaCert field if non-nil, zero value otherwise. ### GetCaCertOk -`func (o *NomadWriteAccessConfigRequest) GetCaCertOk() (*string, bool)` +`func (o *NomadConfigureAccessRequest) GetCaCertOk() (*string, bool)` GetCaCertOk returns a tuple with the CaCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCaCert -`func (o *NomadWriteAccessConfigRequest) SetCaCert(v string)` +`func (o *NomadConfigureAccessRequest) SetCaCert(v string)` SetCaCert sets CaCert field to given value. ### HasCaCert -`func (o *NomadWriteAccessConfigRequest) HasCaCert() bool` +`func (o *NomadConfigureAccessRequest) HasCaCert() bool` HasCaCert returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasCaCert returns a boolean if a field has been set. ### GetClientCert -`func (o *NomadWriteAccessConfigRequest) GetClientCert() string` +`func (o *NomadConfigureAccessRequest) GetClientCert() string` GetClientCert returns the ClientCert field if non-nil, zero value otherwise. ### GetClientCertOk -`func (o *NomadWriteAccessConfigRequest) GetClientCertOk() (*string, bool)` +`func (o *NomadConfigureAccessRequest) GetClientCertOk() (*string, bool)` GetClientCertOk returns a tuple with the ClientCert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientCert -`func (o *NomadWriteAccessConfigRequest) SetClientCert(v string)` +`func (o *NomadConfigureAccessRequest) SetClientCert(v string)` SetClientCert sets ClientCert field to given value. ### HasClientCert -`func (o *NomadWriteAccessConfigRequest) HasClientCert() bool` +`func (o *NomadConfigureAccessRequest) HasClientCert() bool` HasClientCert returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasClientCert returns a boolean if a field has been set. ### GetClientKey -`func (o *NomadWriteAccessConfigRequest) GetClientKey() string` +`func (o *NomadConfigureAccessRequest) GetClientKey() string` GetClientKey returns the ClientKey field if non-nil, zero value otherwise. ### GetClientKeyOk -`func (o *NomadWriteAccessConfigRequest) GetClientKeyOk() (*string, bool)` +`func (o *NomadConfigureAccessRequest) GetClientKeyOk() (*string, bool)` GetClientKeyOk returns a tuple with the ClientKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientKey -`func (o *NomadWriteAccessConfigRequest) SetClientKey(v string)` +`func (o *NomadConfigureAccessRequest) SetClientKey(v string)` SetClientKey sets ClientKey field to given value. ### HasClientKey -`func (o *NomadWriteAccessConfigRequest) HasClientKey() bool` +`func (o *NomadConfigureAccessRequest) HasClientKey() bool` HasClientKey returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasClientKey returns a boolean if a field has been set. ### GetMaxTokenNameLength -`func (o *NomadWriteAccessConfigRequest) GetMaxTokenNameLength() int32` +`func (o *NomadConfigureAccessRequest) GetMaxTokenNameLength() int32` GetMaxTokenNameLength returns the MaxTokenNameLength field if non-nil, zero value otherwise. ### GetMaxTokenNameLengthOk -`func (o *NomadWriteAccessConfigRequest) GetMaxTokenNameLengthOk() (*int32, bool)` +`func (o *NomadConfigureAccessRequest) GetMaxTokenNameLengthOk() (*int32, bool)` GetMaxTokenNameLengthOk returns a tuple with the MaxTokenNameLength field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTokenNameLength -`func (o *NomadWriteAccessConfigRequest) SetMaxTokenNameLength(v int32)` +`func (o *NomadConfigureAccessRequest) SetMaxTokenNameLength(v int32)` SetMaxTokenNameLength sets MaxTokenNameLength field to given value. ### HasMaxTokenNameLength -`func (o *NomadWriteAccessConfigRequest) HasMaxTokenNameLength() bool` +`func (o *NomadConfigureAccessRequest) HasMaxTokenNameLength() bool` HasMaxTokenNameLength returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasMaxTokenNameLength returns a boolean if a field has been set. ### GetToken -`func (o *NomadWriteAccessConfigRequest) GetToken() string` +`func (o *NomadConfigureAccessRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *NomadWriteAccessConfigRequest) GetTokenOk() (*string, bool)` +`func (o *NomadConfigureAccessRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *NomadWriteAccessConfigRequest) SetToken(v string)` +`func (o *NomadConfigureAccessRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *NomadWriteAccessConfigRequest) HasToken() bool` +`func (o *NomadConfigureAccessRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/NomadWriteLeaseConfigRequest.md b/docs/NomadConfigureLeaseRequest.md similarity index 63% rename from docs/NomadWriteLeaseConfigRequest.md rename to docs/NomadConfigureLeaseRequest.md index 281fdc36..7dd73d0f 100644 --- a/docs/NomadWriteLeaseConfigRequest.md +++ b/docs/NomadConfigureLeaseRequest.md @@ -1,4 +1,4 @@ -# NomadWriteLeaseConfigRequest +# NomadConfigureLeaseRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewNomadWriteLeaseConfigRequest +### NewNomadConfigureLeaseRequest -`func NewNomadWriteLeaseConfigRequest() *NomadWriteLeaseConfigRequest` +`func NewNomadConfigureLeaseRequest() *NomadConfigureLeaseRequest` -NewNomadWriteLeaseConfigRequest instantiates a new NomadWriteLeaseConfigRequest object +NewNomadConfigureLeaseRequest instantiates a new NomadConfigureLeaseRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewNomadWriteLeaseConfigRequestWithDefaults +### NewNomadConfigureLeaseRequestWithDefaults -`func NewNomadWriteLeaseConfigRequestWithDefaults() *NomadWriteLeaseConfigRequest` +`func NewNomadConfigureLeaseRequestWithDefaults() *NomadConfigureLeaseRequest` -NewNomadWriteLeaseConfigRequestWithDefaults instantiates a new NomadWriteLeaseConfigRequest object +NewNomadConfigureLeaseRequestWithDefaults instantiates a new NomadConfigureLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMaxTtl -`func (o *NomadWriteLeaseConfigRequest) GetMaxTtl() int32` +`func (o *NomadConfigureLeaseRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *NomadWriteLeaseConfigRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *NomadConfigureLeaseRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *NomadWriteLeaseConfigRequest) SetMaxTtl(v int32)` +`func (o *NomadConfigureLeaseRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *NomadWriteLeaseConfigRequest) HasMaxTtl() bool` +`func (o *NomadConfigureLeaseRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetTtl -`func (o *NomadWriteLeaseConfigRequest) GetTtl() int32` +`func (o *NomadConfigureLeaseRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *NomadWriteLeaseConfigRequest) GetTtlOk() (*int32, bool)` +`func (o *NomadConfigureLeaseRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *NomadWriteLeaseConfigRequest) SetTtl(v int32)` +`func (o *NomadConfigureLeaseRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *NomadWriteLeaseConfigRequest) HasTtl() bool` +`func (o *NomadConfigureLeaseRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/OCIWriteRoleRequest.md b/docs/OCIWriteRoleRequest.md index c7b4e72d..9bca97f8 100644 --- a/docs/OCIWriteRoleRequest.md +++ b/docs/OCIWriteRoleRequest.md @@ -1,4 +1,4 @@ -# OCIWriteRoleRequest +# OciWriteRoleRequest ## Properties @@ -21,47 +21,47 @@ Name | Type | Description | Notes ## Methods -### NewOCIWriteRoleRequest +### NewOciWriteRoleRequest -`func NewOCIWriteRoleRequest() *OCIWriteRoleRequest` +`func NewOciWriteRoleRequest() *OciWriteRoleRequest` -NewOCIWriteRoleRequest instantiates a new OCIWriteRoleRequest object +NewOciWriteRoleRequest instantiates a new OciWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOCIWriteRoleRequestWithDefaults +### NewOciWriteRoleRequestWithDefaults -`func NewOCIWriteRoleRequestWithDefaults() *OCIWriteRoleRequest` +`func NewOciWriteRoleRequestWithDefaults() *OciWriteRoleRequest` -NewOCIWriteRoleRequestWithDefaults instantiates a new OCIWriteRoleRequest object +NewOciWriteRoleRequestWithDefaults instantiates a new OciWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetOcidList -`func (o *OCIWriteRoleRequest) GetOcidList() []string` +`func (o *OciWriteRoleRequest) GetOcidList() []string` GetOcidList returns the OcidList field if non-nil, zero value otherwise. ### GetOcidListOk -`func (o *OCIWriteRoleRequest) GetOcidListOk() (*[]string, bool)` +`func (o *OciWriteRoleRequest) GetOcidListOk() (*[]string, bool)` GetOcidListOk returns a tuple with the OcidList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcidList -`func (o *OCIWriteRoleRequest) SetOcidList(v []string)` +`func (o *OciWriteRoleRequest) SetOcidList(v []string)` SetOcidList sets OcidList field to given value. ### HasOcidList -`func (o *OCIWriteRoleRequest) HasOcidList() bool` +`func (o *OciWriteRoleRequest) HasOcidList() bool` HasOcidList returns a boolean if a field has been set. @@ -70,27 +70,27 @@ HasOcidList returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *OCIWriteRoleRequest) GetTokenBoundCidrs() []string` +`func (o *OciWriteRoleRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *OCIWriteRoleRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *OciWriteRoleRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *OCIWriteRoleRequest) SetTokenBoundCidrs(v []string)` +`func (o *OciWriteRoleRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *OCIWriteRoleRequest) HasTokenBoundCidrs() bool` +`func (o *OciWriteRoleRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -99,27 +99,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *OCIWriteRoleRequest) GetTokenExplicitMaxTtl() int32` +`func (o *OciWriteRoleRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *OCIWriteRoleRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *OciWriteRoleRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *OCIWriteRoleRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *OciWriteRoleRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *OCIWriteRoleRequest) HasTokenExplicitMaxTtl() bool` +`func (o *OciWriteRoleRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -128,27 +128,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *OCIWriteRoleRequest) GetTokenMaxTtl() int32` +`func (o *OciWriteRoleRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *OCIWriteRoleRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *OciWriteRoleRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *OCIWriteRoleRequest) SetTokenMaxTtl(v int32)` +`func (o *OciWriteRoleRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *OCIWriteRoleRequest) HasTokenMaxTtl() bool` +`func (o *OciWriteRoleRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -157,27 +157,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *OCIWriteRoleRequest) GetTokenNoDefaultPolicy() bool` +`func (o *OciWriteRoleRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *OCIWriteRoleRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *OciWriteRoleRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *OCIWriteRoleRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *OciWriteRoleRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *OCIWriteRoleRequest) HasTokenNoDefaultPolicy() bool` +`func (o *OciWriteRoleRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -186,27 +186,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *OCIWriteRoleRequest) GetTokenNumUses() int32` +`func (o *OciWriteRoleRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *OCIWriteRoleRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *OciWriteRoleRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *OCIWriteRoleRequest) SetTokenNumUses(v int32)` +`func (o *OciWriteRoleRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *OCIWriteRoleRequest) HasTokenNumUses() bool` +`func (o *OciWriteRoleRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -215,27 +215,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *OCIWriteRoleRequest) GetTokenPeriod() int32` +`func (o *OciWriteRoleRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *OCIWriteRoleRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *OciWriteRoleRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *OCIWriteRoleRequest) SetTokenPeriod(v int32)` +`func (o *OciWriteRoleRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *OCIWriteRoleRequest) HasTokenPeriod() bool` +`func (o *OciWriteRoleRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -244,27 +244,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *OCIWriteRoleRequest) GetTokenPolicies() []string` +`func (o *OciWriteRoleRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *OCIWriteRoleRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *OciWriteRoleRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *OCIWriteRoleRequest) SetTokenPolicies(v []string)` +`func (o *OciWriteRoleRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *OCIWriteRoleRequest) HasTokenPolicies() bool` +`func (o *OciWriteRoleRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -273,27 +273,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *OCIWriteRoleRequest) GetTokenTtl() int32` +`func (o *OciWriteRoleRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *OCIWriteRoleRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *OciWriteRoleRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *OCIWriteRoleRequest) SetTokenTtl(v int32)` +`func (o *OciWriteRoleRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *OCIWriteRoleRequest) HasTokenTtl() bool` +`func (o *OciWriteRoleRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -302,27 +302,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *OCIWriteRoleRequest) GetTokenType() string` +`func (o *OciWriteRoleRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *OCIWriteRoleRequest) GetTokenTypeOk() (*string, bool)` +`func (o *OciWriteRoleRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *OCIWriteRoleRequest) SetTokenType(v string)` +`func (o *OciWriteRoleRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *OCIWriteRoleRequest) HasTokenType() bool` +`func (o *OciWriteRoleRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. diff --git a/docs/OIDCIntrospectRequest.md b/docs/OIDCIntrospectRequest.md index e35fe987..e8e2bab4 100644 --- a/docs/OIDCIntrospectRequest.md +++ b/docs/OIDCIntrospectRequest.md @@ -1,4 +1,4 @@ -# OIDCIntrospectRequest +# OidcIntrospectRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCIntrospectRequest +### NewOidcIntrospectRequest -`func NewOIDCIntrospectRequest() *OIDCIntrospectRequest` +`func NewOidcIntrospectRequest() *OidcIntrospectRequest` -NewOIDCIntrospectRequest instantiates a new OIDCIntrospectRequest object +NewOidcIntrospectRequest instantiates a new OidcIntrospectRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCIntrospectRequestWithDefaults +### NewOidcIntrospectRequestWithDefaults -`func NewOIDCIntrospectRequestWithDefaults() *OIDCIntrospectRequest` +`func NewOidcIntrospectRequestWithDefaults() *OidcIntrospectRequest` -NewOIDCIntrospectRequestWithDefaults instantiates a new OIDCIntrospectRequest object +NewOidcIntrospectRequestWithDefaults instantiates a new OidcIntrospectRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientId -`func (o *OIDCIntrospectRequest) GetClientId() string` +`func (o *OidcIntrospectRequest) GetClientId() string` GetClientId returns the ClientId field if non-nil, zero value otherwise. ### GetClientIdOk -`func (o *OIDCIntrospectRequest) GetClientIdOk() (*string, bool)` +`func (o *OidcIntrospectRequest) GetClientIdOk() (*string, bool)` GetClientIdOk returns a tuple with the ClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientId -`func (o *OIDCIntrospectRequest) SetClientId(v string)` +`func (o *OidcIntrospectRequest) SetClientId(v string)` SetClientId sets ClientId field to given value. ### HasClientId -`func (o *OIDCIntrospectRequest) HasClientId() bool` +`func (o *OidcIntrospectRequest) HasClientId() bool` HasClientId returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasClientId returns a boolean if a field has been set. ### GetToken -`func (o *OIDCIntrospectRequest) GetToken() string` +`func (o *OidcIntrospectRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *OIDCIntrospectRequest) GetTokenOk() (*string, bool)` +`func (o *OidcIntrospectRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *OIDCIntrospectRequest) SetToken(v string)` +`func (o *OidcIntrospectRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *OIDCIntrospectRequest) HasToken() bool` +`func (o *OidcIntrospectRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/OIDCLoginRequest.md b/docs/OIDCLoginRequest.md deleted file mode 100644 index ea01c8d5..00000000 --- a/docs/OIDCLoginRequest.md +++ /dev/null @@ -1,99 +0,0 @@ -# OIDCLoginRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Jwt** | Pointer to **string** | The signed JWT to validate. | [optional] -**Role** | Pointer to **string** | The role to log in against. | [optional] - - - -## Methods - - -### NewOIDCLoginRequest - -`func NewOIDCLoginRequest() *OIDCLoginRequest` - -NewOIDCLoginRequest instantiates a new OIDCLoginRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOIDCLoginRequestWithDefaults - -`func NewOIDCLoginRequestWithDefaults() *OIDCLoginRequest` - -NewOIDCLoginRequestWithDefaults instantiates a new OIDCLoginRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetJwt - -`func (o *OIDCLoginRequest) GetJwt() string` - -GetJwt returns the Jwt field if non-nil, zero value otherwise. - -### GetJwtOk - -`func (o *OIDCLoginRequest) GetJwtOk() (*string, bool)` - -GetJwtOk returns a tuple with the Jwt field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetJwt - -`func (o *OIDCLoginRequest) SetJwt(v string)` - -SetJwt sets Jwt field to given value. - - -### HasJwt - -`func (o *OIDCLoginRequest) HasJwt() bool` - -HasJwt returns a boolean if a field has been set. - - - - -### GetRole - -`func (o *OIDCLoginRequest) GetRole() string` - -GetRole returns the Role field if non-nil, zero value otherwise. - -### GetRoleOk - -`func (o *OIDCLoginRequest) GetRoleOk() (*string, bool)` - -GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRole - -`func (o *OIDCLoginRequest) SetRole(v string)` - -SetRole sets Role field to given value. - - -### HasRole - -`func (o *OIDCLoginRequest) HasRole() bool` - -HasRole returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/OIDCRotateKeyRequest.md b/docs/OIDCRotateKeyRequest.md index 2690cdd9..db077f5e 100644 --- a/docs/OIDCRotateKeyRequest.md +++ b/docs/OIDCRotateKeyRequest.md @@ -1,4 +1,4 @@ -# OIDCRotateKeyRequest +# OidcRotateKeyRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCRotateKeyRequest +### NewOidcRotateKeyRequest -`func NewOIDCRotateKeyRequest() *OIDCRotateKeyRequest` +`func NewOidcRotateKeyRequest() *OidcRotateKeyRequest` -NewOIDCRotateKeyRequest instantiates a new OIDCRotateKeyRequest object +NewOidcRotateKeyRequest instantiates a new OidcRotateKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCRotateKeyRequestWithDefaults +### NewOidcRotateKeyRequestWithDefaults -`func NewOIDCRotateKeyRequestWithDefaults() *OIDCRotateKeyRequest` +`func NewOidcRotateKeyRequestWithDefaults() *OidcRotateKeyRequest` -NewOIDCRotateKeyRequestWithDefaults instantiates a new OIDCRotateKeyRequest object +NewOidcRotateKeyRequestWithDefaults instantiates a new OidcRotateKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetVerificationTtl -`func (o *OIDCRotateKeyRequest) GetVerificationTtl() int32` +`func (o *OidcRotateKeyRequest) GetVerificationTtl() int32` GetVerificationTtl returns the VerificationTtl field if non-nil, zero value otherwise. ### GetVerificationTtlOk -`func (o *OIDCRotateKeyRequest) GetVerificationTtlOk() (*int32, bool)` +`func (o *OidcRotateKeyRequest) GetVerificationTtlOk() (*int32, bool)` GetVerificationTtlOk returns a tuple with the VerificationTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVerificationTtl -`func (o *OIDCRotateKeyRequest) SetVerificationTtl(v int32)` +`func (o *OidcRotateKeyRequest) SetVerificationTtl(v int32)` SetVerificationTtl sets VerificationTtl field to given value. ### HasVerificationTtl -`func (o *OIDCRotateKeyRequest) HasVerificationTtl() bool` +`func (o *OidcRotateKeyRequest) HasVerificationTtl() bool` HasVerificationTtl returns a boolean if a field has been set. diff --git a/docs/OIDCWriteAssignmentRequest.md b/docs/OIDCWriteAssignmentRequest.md index 8eafe005..d6e1b676 100644 --- a/docs/OIDCWriteAssignmentRequest.md +++ b/docs/OIDCWriteAssignmentRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteAssignmentRequest +# OidcWriteAssignmentRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteAssignmentRequest +### NewOidcWriteAssignmentRequest -`func NewOIDCWriteAssignmentRequest() *OIDCWriteAssignmentRequest` +`func NewOidcWriteAssignmentRequest() *OidcWriteAssignmentRequest` -NewOIDCWriteAssignmentRequest instantiates a new OIDCWriteAssignmentRequest object +NewOidcWriteAssignmentRequest instantiates a new OidcWriteAssignmentRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteAssignmentRequestWithDefaults +### NewOidcWriteAssignmentRequestWithDefaults -`func NewOIDCWriteAssignmentRequestWithDefaults() *OIDCWriteAssignmentRequest` +`func NewOidcWriteAssignmentRequestWithDefaults() *OidcWriteAssignmentRequest` -NewOIDCWriteAssignmentRequestWithDefaults instantiates a new OIDCWriteAssignmentRequest object +NewOidcWriteAssignmentRequestWithDefaults instantiates a new OidcWriteAssignmentRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEntityIds -`func (o *OIDCWriteAssignmentRequest) GetEntityIds() []string` +`func (o *OidcWriteAssignmentRequest) GetEntityIds() []string` GetEntityIds returns the EntityIds field if non-nil, zero value otherwise. ### GetEntityIdsOk -`func (o *OIDCWriteAssignmentRequest) GetEntityIdsOk() (*[]string, bool)` +`func (o *OidcWriteAssignmentRequest) GetEntityIdsOk() (*[]string, bool)` GetEntityIdsOk returns a tuple with the EntityIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityIds -`func (o *OIDCWriteAssignmentRequest) SetEntityIds(v []string)` +`func (o *OidcWriteAssignmentRequest) SetEntityIds(v []string)` SetEntityIds sets EntityIds field to given value. ### HasEntityIds -`func (o *OIDCWriteAssignmentRequest) HasEntityIds() bool` +`func (o *OidcWriteAssignmentRequest) HasEntityIds() bool` HasEntityIds returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasEntityIds returns a boolean if a field has been set. ### GetGroupIds -`func (o *OIDCWriteAssignmentRequest) GetGroupIds() []string` +`func (o *OidcWriteAssignmentRequest) GetGroupIds() []string` GetGroupIds returns the GroupIds field if non-nil, zero value otherwise. ### GetGroupIdsOk -`func (o *OIDCWriteAssignmentRequest) GetGroupIdsOk() (*[]string, bool)` +`func (o *OidcWriteAssignmentRequest) GetGroupIdsOk() (*[]string, bool)` GetGroupIdsOk returns a tuple with the GroupIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGroupIds -`func (o *OIDCWriteAssignmentRequest) SetGroupIds(v []string)` +`func (o *OidcWriteAssignmentRequest) SetGroupIds(v []string)` SetGroupIds sets GroupIds field to given value. ### HasGroupIds -`func (o *OIDCWriteAssignmentRequest) HasGroupIds() bool` +`func (o *OidcWriteAssignmentRequest) HasGroupIds() bool` HasGroupIds returns a boolean if a field has been set. diff --git a/docs/OIDCWriteAuthConfigRequest.md b/docs/OIDCWriteAuthConfigRequest.md deleted file mode 100644 index c0b74531..00000000 --- a/docs/OIDCWriteAuthConfigRequest.md +++ /dev/null @@ -1,459 +0,0 @@ -# OIDCWriteAuthConfigRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**BoundIssuer** | Pointer to **string** | The value against which to match the 'iss' claim in a JWT. Optional. | [optional] -**DefaultRole** | Pointer to **string** | The default role to use if none is provided during login. If not set, a role is required during login. | [optional] -**JwksCaPem** | Pointer to **string** | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used. | [optional] -**JwksUrl** | Pointer to **string** | JWKS URL to use to authenticate signatures. Cannot be used with \"oidc_discovery_url\" or \"jwt_validation_pubkeys\". | [optional] -**JwtSupportedAlgs** | Pointer to **[]string** | A list of supported signing algorithms. Defaults to RS256. | [optional] -**JwtValidationPubkeys** | Pointer to **[]string** | A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with \"jwks_url\" or \"oidc_discovery_url\". | [optional] -**NamespaceInState** | Pointer to **bool** | Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. | [optional] -**OidcClientId** | Pointer to **string** | The OAuth Client ID configured with your OIDC provider. | [optional] -**OidcClientSecret** | Pointer to **string** | The OAuth Client Secret configured with your OIDC provider. | [optional] -**OidcDiscoveryCaPem** | Pointer to **string** | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used. | [optional] -**OidcDiscoveryUrl** | Pointer to **string** | OIDC Discovery URL, without any .well-known component (base path). Cannot be used with \"jwks_url\" or \"jwt_validation_pubkeys\". | [optional] -**OidcResponseMode** | Pointer to **string** | The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. | [optional] -**OidcResponseTypes** | Pointer to **[]string** | The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. | [optional] -**ProviderConfig** | Pointer to **map[string]interface{}** | Provider-specific configuration. Optional. | [optional] - - - -## Methods - - -### NewOIDCWriteAuthConfigRequest - -`func NewOIDCWriteAuthConfigRequest() *OIDCWriteAuthConfigRequest` - -NewOIDCWriteAuthConfigRequest instantiates a new OIDCWriteAuthConfigRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOIDCWriteAuthConfigRequestWithDefaults - -`func NewOIDCWriteAuthConfigRequestWithDefaults() *OIDCWriteAuthConfigRequest` - -NewOIDCWriteAuthConfigRequestWithDefaults instantiates a new OIDCWriteAuthConfigRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetBoundIssuer - -`func (o *OIDCWriteAuthConfigRequest) GetBoundIssuer() string` - -GetBoundIssuer returns the BoundIssuer field if non-nil, zero value otherwise. - -### GetBoundIssuerOk - -`func (o *OIDCWriteAuthConfigRequest) GetBoundIssuerOk() (*string, bool)` - -GetBoundIssuerOk returns a tuple with the BoundIssuer field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBoundIssuer - -`func (o *OIDCWriteAuthConfigRequest) SetBoundIssuer(v string)` - -SetBoundIssuer sets BoundIssuer field to given value. - - -### HasBoundIssuer - -`func (o *OIDCWriteAuthConfigRequest) HasBoundIssuer() bool` - -HasBoundIssuer returns a boolean if a field has been set. - - - - -### GetDefaultRole - -`func (o *OIDCWriteAuthConfigRequest) GetDefaultRole() string` - -GetDefaultRole returns the DefaultRole field if non-nil, zero value otherwise. - -### GetDefaultRoleOk - -`func (o *OIDCWriteAuthConfigRequest) GetDefaultRoleOk() (*string, bool)` - -GetDefaultRoleOk returns a tuple with the DefaultRole field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDefaultRole - -`func (o *OIDCWriteAuthConfigRequest) SetDefaultRole(v string)` - -SetDefaultRole sets DefaultRole field to given value. - - -### HasDefaultRole - -`func (o *OIDCWriteAuthConfigRequest) HasDefaultRole() bool` - -HasDefaultRole returns a boolean if a field has been set. - - - - -### GetJwksCaPem - -`func (o *OIDCWriteAuthConfigRequest) GetJwksCaPem() string` - -GetJwksCaPem returns the JwksCaPem field if non-nil, zero value otherwise. - -### GetJwksCaPemOk - -`func (o *OIDCWriteAuthConfigRequest) GetJwksCaPemOk() (*string, bool)` - -GetJwksCaPemOk returns a tuple with the JwksCaPem field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetJwksCaPem - -`func (o *OIDCWriteAuthConfigRequest) SetJwksCaPem(v string)` - -SetJwksCaPem sets JwksCaPem field to given value. - - -### HasJwksCaPem - -`func (o *OIDCWriteAuthConfigRequest) HasJwksCaPem() bool` - -HasJwksCaPem returns a boolean if a field has been set. - - - - -### GetJwksUrl - -`func (o *OIDCWriteAuthConfigRequest) GetJwksUrl() string` - -GetJwksUrl returns the JwksUrl field if non-nil, zero value otherwise. - -### GetJwksUrlOk - -`func (o *OIDCWriteAuthConfigRequest) GetJwksUrlOk() (*string, bool)` - -GetJwksUrlOk returns a tuple with the JwksUrl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetJwksUrl - -`func (o *OIDCWriteAuthConfigRequest) SetJwksUrl(v string)` - -SetJwksUrl sets JwksUrl field to given value. - - -### HasJwksUrl - -`func (o *OIDCWriteAuthConfigRequest) HasJwksUrl() bool` - -HasJwksUrl returns a boolean if a field has been set. - - - - -### GetJwtSupportedAlgs - -`func (o *OIDCWriteAuthConfigRequest) GetJwtSupportedAlgs() []string` - -GetJwtSupportedAlgs returns the JwtSupportedAlgs field if non-nil, zero value otherwise. - -### GetJwtSupportedAlgsOk - -`func (o *OIDCWriteAuthConfigRequest) GetJwtSupportedAlgsOk() (*[]string, bool)` - -GetJwtSupportedAlgsOk returns a tuple with the JwtSupportedAlgs field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetJwtSupportedAlgs - -`func (o *OIDCWriteAuthConfigRequest) SetJwtSupportedAlgs(v []string)` - -SetJwtSupportedAlgs sets JwtSupportedAlgs field to given value. - - -### HasJwtSupportedAlgs - -`func (o *OIDCWriteAuthConfigRequest) HasJwtSupportedAlgs() bool` - -HasJwtSupportedAlgs returns a boolean if a field has been set. - - - - -### GetJwtValidationPubkeys - -`func (o *OIDCWriteAuthConfigRequest) GetJwtValidationPubkeys() []string` - -GetJwtValidationPubkeys returns the JwtValidationPubkeys field if non-nil, zero value otherwise. - -### GetJwtValidationPubkeysOk - -`func (o *OIDCWriteAuthConfigRequest) GetJwtValidationPubkeysOk() (*[]string, bool)` - -GetJwtValidationPubkeysOk returns a tuple with the JwtValidationPubkeys field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetJwtValidationPubkeys - -`func (o *OIDCWriteAuthConfigRequest) SetJwtValidationPubkeys(v []string)` - -SetJwtValidationPubkeys sets JwtValidationPubkeys field to given value. - - -### HasJwtValidationPubkeys - -`func (o *OIDCWriteAuthConfigRequest) HasJwtValidationPubkeys() bool` - -HasJwtValidationPubkeys returns a boolean if a field has been set. - - - - -### GetNamespaceInState - -`func (o *OIDCWriteAuthConfigRequest) GetNamespaceInState() bool` - -GetNamespaceInState returns the NamespaceInState field if non-nil, zero value otherwise. - -### GetNamespaceInStateOk - -`func (o *OIDCWriteAuthConfigRequest) GetNamespaceInStateOk() (*bool, bool)` - -GetNamespaceInStateOk returns a tuple with the NamespaceInState field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetNamespaceInState - -`func (o *OIDCWriteAuthConfigRequest) SetNamespaceInState(v bool)` - -SetNamespaceInState sets NamespaceInState field to given value. - - -### HasNamespaceInState - -`func (o *OIDCWriteAuthConfigRequest) HasNamespaceInState() bool` - -HasNamespaceInState returns a boolean if a field has been set. - - - - -### GetOidcClientId - -`func (o *OIDCWriteAuthConfigRequest) GetOidcClientId() string` - -GetOidcClientId returns the OidcClientId field if non-nil, zero value otherwise. - -### GetOidcClientIdOk - -`func (o *OIDCWriteAuthConfigRequest) GetOidcClientIdOk() (*string, bool)` - -GetOidcClientIdOk returns a tuple with the OidcClientId field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOidcClientId - -`func (o *OIDCWriteAuthConfigRequest) SetOidcClientId(v string)` - -SetOidcClientId sets OidcClientId field to given value. - - -### HasOidcClientId - -`func (o *OIDCWriteAuthConfigRequest) HasOidcClientId() bool` - -HasOidcClientId returns a boolean if a field has been set. - - - - -### GetOidcClientSecret - -`func (o *OIDCWriteAuthConfigRequest) GetOidcClientSecret() string` - -GetOidcClientSecret returns the OidcClientSecret field if non-nil, zero value otherwise. - -### GetOidcClientSecretOk - -`func (o *OIDCWriteAuthConfigRequest) GetOidcClientSecretOk() (*string, bool)` - -GetOidcClientSecretOk returns a tuple with the OidcClientSecret field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOidcClientSecret - -`func (o *OIDCWriteAuthConfigRequest) SetOidcClientSecret(v string)` - -SetOidcClientSecret sets OidcClientSecret field to given value. - - -### HasOidcClientSecret - -`func (o *OIDCWriteAuthConfigRequest) HasOidcClientSecret() bool` - -HasOidcClientSecret returns a boolean if a field has been set. - - - - -### GetOidcDiscoveryCaPem - -`func (o *OIDCWriteAuthConfigRequest) GetOidcDiscoveryCaPem() string` - -GetOidcDiscoveryCaPem returns the OidcDiscoveryCaPem field if non-nil, zero value otherwise. - -### GetOidcDiscoveryCaPemOk - -`func (o *OIDCWriteAuthConfigRequest) GetOidcDiscoveryCaPemOk() (*string, bool)` - -GetOidcDiscoveryCaPemOk returns a tuple with the OidcDiscoveryCaPem field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOidcDiscoveryCaPem - -`func (o *OIDCWriteAuthConfigRequest) SetOidcDiscoveryCaPem(v string)` - -SetOidcDiscoveryCaPem sets OidcDiscoveryCaPem field to given value. - - -### HasOidcDiscoveryCaPem - -`func (o *OIDCWriteAuthConfigRequest) HasOidcDiscoveryCaPem() bool` - -HasOidcDiscoveryCaPem returns a boolean if a field has been set. - - - - -### GetOidcDiscoveryUrl - -`func (o *OIDCWriteAuthConfigRequest) GetOidcDiscoveryUrl() string` - -GetOidcDiscoveryUrl returns the OidcDiscoveryUrl field if non-nil, zero value otherwise. - -### GetOidcDiscoveryUrlOk - -`func (o *OIDCWriteAuthConfigRequest) GetOidcDiscoveryUrlOk() (*string, bool)` - -GetOidcDiscoveryUrlOk returns a tuple with the OidcDiscoveryUrl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOidcDiscoveryUrl - -`func (o *OIDCWriteAuthConfigRequest) SetOidcDiscoveryUrl(v string)` - -SetOidcDiscoveryUrl sets OidcDiscoveryUrl field to given value. - - -### HasOidcDiscoveryUrl - -`func (o *OIDCWriteAuthConfigRequest) HasOidcDiscoveryUrl() bool` - -HasOidcDiscoveryUrl returns a boolean if a field has been set. - - - - -### GetOidcResponseMode - -`func (o *OIDCWriteAuthConfigRequest) GetOidcResponseMode() string` - -GetOidcResponseMode returns the OidcResponseMode field if non-nil, zero value otherwise. - -### GetOidcResponseModeOk - -`func (o *OIDCWriteAuthConfigRequest) GetOidcResponseModeOk() (*string, bool)` - -GetOidcResponseModeOk returns a tuple with the OidcResponseMode field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOidcResponseMode - -`func (o *OIDCWriteAuthConfigRequest) SetOidcResponseMode(v string)` - -SetOidcResponseMode sets OidcResponseMode field to given value. - - -### HasOidcResponseMode - -`func (o *OIDCWriteAuthConfigRequest) HasOidcResponseMode() bool` - -HasOidcResponseMode returns a boolean if a field has been set. - - - - -### GetOidcResponseTypes - -`func (o *OIDCWriteAuthConfigRequest) GetOidcResponseTypes() []string` - -GetOidcResponseTypes returns the OidcResponseTypes field if non-nil, zero value otherwise. - -### GetOidcResponseTypesOk - -`func (o *OIDCWriteAuthConfigRequest) GetOidcResponseTypesOk() (*[]string, bool)` - -GetOidcResponseTypesOk returns a tuple with the OidcResponseTypes field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOidcResponseTypes - -`func (o *OIDCWriteAuthConfigRequest) SetOidcResponseTypes(v []string)` - -SetOidcResponseTypes sets OidcResponseTypes field to given value. - - -### HasOidcResponseTypes - -`func (o *OIDCWriteAuthConfigRequest) HasOidcResponseTypes() bool` - -HasOidcResponseTypes returns a boolean if a field has been set. - - - - -### GetProviderConfig - -`func (o *OIDCWriteAuthConfigRequest) GetProviderConfig() map[string]interface{}` - -GetProviderConfig returns the ProviderConfig field if non-nil, zero value otherwise. - -### GetProviderConfigOk - -`func (o *OIDCWriteAuthConfigRequest) GetProviderConfigOk() (*map[string]interface{}, bool)` - -GetProviderConfigOk returns a tuple with the ProviderConfig field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetProviderConfig - -`func (o *OIDCWriteAuthConfigRequest) SetProviderConfig(v map[string]interface{})` - -SetProviderConfig sets ProviderConfig field to given value. - - -### HasProviderConfig - -`func (o *OIDCWriteAuthConfigRequest) HasProviderConfig() bool` - -HasProviderConfig returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/OIDCWriteAuthRoleRequest.md b/docs/OIDCWriteAuthRoleRequest.md deleted file mode 100644 index a762a858..00000000 --- a/docs/OIDCWriteAuthRoleRequest.md +++ /dev/null @@ -1,969 +0,0 @@ -# OIDCWriteAuthRoleRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**AllowedRedirectUris** | Pointer to **[]string** | Comma-separated list of allowed values for redirect_uri | [optional] -**BoundAudiences** | Pointer to **[]string** | Comma-separated list of 'aud' claims that are valid for login; any match is sufficient | [optional] -**BoundCidrs** | Pointer to **[]string** | Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. | [optional] -**BoundClaims** | Pointer to **map[string]interface{}** | Map of claims/values which must match for login | [optional] -**BoundClaimsType** | Pointer to **string** | How to interpret values in the map of claims/values (which must match for login): allowed values are 'string' or 'glob' | [optional] [default to "string"] -**BoundSubject** | Pointer to **string** | The 'sub' claim that is valid for login. Optional. | [optional] -**ClaimMappings** | Pointer to **map[string]interface{}** | Mappings of claims (key) that will be copied to a metadata field (value) | [optional] -**ClockSkewLeeway** | Pointer to **int32** | Duration in seconds of leeway when validating all claims to account for clock skew. Defaults to 60 (1 minute) if set to 0 and can be disabled if set to -1. | [optional] -**ExpirationLeeway** | Pointer to **int32** | Duration in seconds of leeway when validating expiration of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. | [optional] [default to 150] -**GroupsClaim** | Pointer to **string** | The claim to use for the Identity group alias names | [optional] -**MaxAge** | Pointer to **int32** | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | [optional] -**MaxTtl** | Pointer to **int32** | Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. | [optional] -**NotBeforeLeeway** | Pointer to **int32** | Duration in seconds of leeway when validating not before values of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. | [optional] [default to 150] -**NumUses** | Pointer to **int32** | Use \"token_num_uses\" instead. If this and \"token_num_uses\" are both specified, only \"token_num_uses\" will be used. | [optional] -**OidcScopes** | Pointer to **[]string** | Comma-separated list of OIDC scopes | [optional] -**Period** | Pointer to **int32** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] -**Policies** | Pointer to **[]string** | Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. | [optional] -**RoleType** | Pointer to **string** | Type of the role, either 'jwt' or 'oidc'. | [optional] -**TokenBoundCidrs** | Pointer to **[]string** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] -**TokenExplicitMaxTtl** | Pointer to **int32** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] -**TokenMaxTtl** | Pointer to **int32** | The maximum lifetime of the generated token | [optional] -**TokenNoDefaultPolicy** | Pointer to **bool** | If true, the 'default' policy will not automatically be added to generated tokens | [optional] -**TokenNumUses** | Pointer to **int32** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] -**TokenPeriod** | Pointer to **int32** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). | [optional] -**TokenPolicies** | Pointer to **[]string** | Comma-separated list of policies | [optional] -**TokenTtl** | Pointer to **int32** | The initial ttl of the token to generate | [optional] -**TokenType** | Pointer to **string** | The type of token to generate, service or batch | [optional] [default to "default-service"] -**Ttl** | Pointer to **int32** | Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. | [optional] -**UserClaim** | Pointer to **string** | The claim to use for the Identity entity alias name | [optional] -**UserClaimJsonPointer** | Pointer to **bool** | If true, the user_claim value will use JSON pointer syntax for referencing claims. | [optional] -**VerboseOidcLogging** | Pointer to **bool** | Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. | [optional] - - - -## Methods - - -### NewOIDCWriteAuthRoleRequest - -`func NewOIDCWriteAuthRoleRequest() *OIDCWriteAuthRoleRequest` - -NewOIDCWriteAuthRoleRequest instantiates a new OIDCWriteAuthRoleRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOIDCWriteAuthRoleRequestWithDefaults - -`func NewOIDCWriteAuthRoleRequestWithDefaults() *OIDCWriteAuthRoleRequest` - -NewOIDCWriteAuthRoleRequestWithDefaults instantiates a new OIDCWriteAuthRoleRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetAllowedRedirectUris - -`func (o *OIDCWriteAuthRoleRequest) GetAllowedRedirectUris() []string` - -GetAllowedRedirectUris returns the AllowedRedirectUris field if non-nil, zero value otherwise. - -### GetAllowedRedirectUrisOk - -`func (o *OIDCWriteAuthRoleRequest) GetAllowedRedirectUrisOk() (*[]string, bool)` - -GetAllowedRedirectUrisOk returns a tuple with the AllowedRedirectUris field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetAllowedRedirectUris - -`func (o *OIDCWriteAuthRoleRequest) SetAllowedRedirectUris(v []string)` - -SetAllowedRedirectUris sets AllowedRedirectUris field to given value. - - -### HasAllowedRedirectUris - -`func (o *OIDCWriteAuthRoleRequest) HasAllowedRedirectUris() bool` - -HasAllowedRedirectUris returns a boolean if a field has been set. - - - - -### GetBoundAudiences - -`func (o *OIDCWriteAuthRoleRequest) GetBoundAudiences() []string` - -GetBoundAudiences returns the BoundAudiences field if non-nil, zero value otherwise. - -### GetBoundAudiencesOk - -`func (o *OIDCWriteAuthRoleRequest) GetBoundAudiencesOk() (*[]string, bool)` - -GetBoundAudiencesOk returns a tuple with the BoundAudiences field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBoundAudiences - -`func (o *OIDCWriteAuthRoleRequest) SetBoundAudiences(v []string)` - -SetBoundAudiences sets BoundAudiences field to given value. - - -### HasBoundAudiences - -`func (o *OIDCWriteAuthRoleRequest) HasBoundAudiences() bool` - -HasBoundAudiences returns a boolean if a field has been set. - - - - -### GetBoundCidrs - -`func (o *OIDCWriteAuthRoleRequest) GetBoundCidrs() []string` - -GetBoundCidrs returns the BoundCidrs field if non-nil, zero value otherwise. - -### GetBoundCidrsOk - -`func (o *OIDCWriteAuthRoleRequest) GetBoundCidrsOk() (*[]string, bool)` - -GetBoundCidrsOk returns a tuple with the BoundCidrs field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBoundCidrs - -`func (o *OIDCWriteAuthRoleRequest) SetBoundCidrs(v []string)` - -SetBoundCidrs sets BoundCidrs field to given value. - - -### HasBoundCidrs - -`func (o *OIDCWriteAuthRoleRequest) HasBoundCidrs() bool` - -HasBoundCidrs returns a boolean if a field has been set. - - - - -### GetBoundClaims - -`func (o *OIDCWriteAuthRoleRequest) GetBoundClaims() map[string]interface{}` - -GetBoundClaims returns the BoundClaims field if non-nil, zero value otherwise. - -### GetBoundClaimsOk - -`func (o *OIDCWriteAuthRoleRequest) GetBoundClaimsOk() (*map[string]interface{}, bool)` - -GetBoundClaimsOk returns a tuple with the BoundClaims field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBoundClaims - -`func (o *OIDCWriteAuthRoleRequest) SetBoundClaims(v map[string]interface{})` - -SetBoundClaims sets BoundClaims field to given value. - - -### HasBoundClaims - -`func (o *OIDCWriteAuthRoleRequest) HasBoundClaims() bool` - -HasBoundClaims returns a boolean if a field has been set. - - - - -### GetBoundClaimsType - -`func (o *OIDCWriteAuthRoleRequest) GetBoundClaimsType() string` - -GetBoundClaimsType returns the BoundClaimsType field if non-nil, zero value otherwise. - -### GetBoundClaimsTypeOk - -`func (o *OIDCWriteAuthRoleRequest) GetBoundClaimsTypeOk() (*string, bool)` - -GetBoundClaimsTypeOk returns a tuple with the BoundClaimsType field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBoundClaimsType - -`func (o *OIDCWriteAuthRoleRequest) SetBoundClaimsType(v string)` - -SetBoundClaimsType sets BoundClaimsType field to given value. - - -### HasBoundClaimsType - -`func (o *OIDCWriteAuthRoleRequest) HasBoundClaimsType() bool` - -HasBoundClaimsType returns a boolean if a field has been set. - - - - -### GetBoundSubject - -`func (o *OIDCWriteAuthRoleRequest) GetBoundSubject() string` - -GetBoundSubject returns the BoundSubject field if non-nil, zero value otherwise. - -### GetBoundSubjectOk - -`func (o *OIDCWriteAuthRoleRequest) GetBoundSubjectOk() (*string, bool)` - -GetBoundSubjectOk returns a tuple with the BoundSubject field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetBoundSubject - -`func (o *OIDCWriteAuthRoleRequest) SetBoundSubject(v string)` - -SetBoundSubject sets BoundSubject field to given value. - - -### HasBoundSubject - -`func (o *OIDCWriteAuthRoleRequest) HasBoundSubject() bool` - -HasBoundSubject returns a boolean if a field has been set. - - - - -### GetClaimMappings - -`func (o *OIDCWriteAuthRoleRequest) GetClaimMappings() map[string]interface{}` - -GetClaimMappings returns the ClaimMappings field if non-nil, zero value otherwise. - -### GetClaimMappingsOk - -`func (o *OIDCWriteAuthRoleRequest) GetClaimMappingsOk() (*map[string]interface{}, bool)` - -GetClaimMappingsOk returns a tuple with the ClaimMappings field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClaimMappings - -`func (o *OIDCWriteAuthRoleRequest) SetClaimMappings(v map[string]interface{})` - -SetClaimMappings sets ClaimMappings field to given value. - - -### HasClaimMappings - -`func (o *OIDCWriteAuthRoleRequest) HasClaimMappings() bool` - -HasClaimMappings returns a boolean if a field has been set. - - - - -### GetClockSkewLeeway - -`func (o *OIDCWriteAuthRoleRequest) GetClockSkewLeeway() int32` - -GetClockSkewLeeway returns the ClockSkewLeeway field if non-nil, zero value otherwise. - -### GetClockSkewLeewayOk - -`func (o *OIDCWriteAuthRoleRequest) GetClockSkewLeewayOk() (*int32, bool)` - -GetClockSkewLeewayOk returns a tuple with the ClockSkewLeeway field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClockSkewLeeway - -`func (o *OIDCWriteAuthRoleRequest) SetClockSkewLeeway(v int32)` - -SetClockSkewLeeway sets ClockSkewLeeway field to given value. - - -### HasClockSkewLeeway - -`func (o *OIDCWriteAuthRoleRequest) HasClockSkewLeeway() bool` - -HasClockSkewLeeway returns a boolean if a field has been set. - - - - -### GetExpirationLeeway - -`func (o *OIDCWriteAuthRoleRequest) GetExpirationLeeway() int32` - -GetExpirationLeeway returns the ExpirationLeeway field if non-nil, zero value otherwise. - -### GetExpirationLeewayOk - -`func (o *OIDCWriteAuthRoleRequest) GetExpirationLeewayOk() (*int32, bool)` - -GetExpirationLeewayOk returns a tuple with the ExpirationLeeway field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetExpirationLeeway - -`func (o *OIDCWriteAuthRoleRequest) SetExpirationLeeway(v int32)` - -SetExpirationLeeway sets ExpirationLeeway field to given value. - - -### HasExpirationLeeway - -`func (o *OIDCWriteAuthRoleRequest) HasExpirationLeeway() bool` - -HasExpirationLeeway returns a boolean if a field has been set. - - - - -### GetGroupsClaim - -`func (o *OIDCWriteAuthRoleRequest) GetGroupsClaim() string` - -GetGroupsClaim returns the GroupsClaim field if non-nil, zero value otherwise. - -### GetGroupsClaimOk - -`func (o *OIDCWriteAuthRoleRequest) GetGroupsClaimOk() (*string, bool)` - -GetGroupsClaimOk returns a tuple with the GroupsClaim field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetGroupsClaim - -`func (o *OIDCWriteAuthRoleRequest) SetGroupsClaim(v string)` - -SetGroupsClaim sets GroupsClaim field to given value. - - -### HasGroupsClaim - -`func (o *OIDCWriteAuthRoleRequest) HasGroupsClaim() bool` - -HasGroupsClaim returns a boolean if a field has been set. - - - - -### GetMaxAge - -`func (o *OIDCWriteAuthRoleRequest) GetMaxAge() int32` - -GetMaxAge returns the MaxAge field if non-nil, zero value otherwise. - -### GetMaxAgeOk - -`func (o *OIDCWriteAuthRoleRequest) GetMaxAgeOk() (*int32, bool)` - -GetMaxAgeOk returns a tuple with the MaxAge field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetMaxAge - -`func (o *OIDCWriteAuthRoleRequest) SetMaxAge(v int32)` - -SetMaxAge sets MaxAge field to given value. - - -### HasMaxAge - -`func (o *OIDCWriteAuthRoleRequest) HasMaxAge() bool` - -HasMaxAge returns a boolean if a field has been set. - - - - -### GetMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) GetMaxTtl() int32` - -GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. - -### GetMaxTtlOk - -`func (o *OIDCWriteAuthRoleRequest) GetMaxTtlOk() (*int32, bool)` - -GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) SetMaxTtl(v int32)` - -SetMaxTtl sets MaxTtl field to given value. - - -### HasMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) HasMaxTtl() bool` - -HasMaxTtl returns a boolean if a field has been set. - - - - -### GetNotBeforeLeeway - -`func (o *OIDCWriteAuthRoleRequest) GetNotBeforeLeeway() int32` - -GetNotBeforeLeeway returns the NotBeforeLeeway field if non-nil, zero value otherwise. - -### GetNotBeforeLeewayOk - -`func (o *OIDCWriteAuthRoleRequest) GetNotBeforeLeewayOk() (*int32, bool)` - -GetNotBeforeLeewayOk returns a tuple with the NotBeforeLeeway field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetNotBeforeLeeway - -`func (o *OIDCWriteAuthRoleRequest) SetNotBeforeLeeway(v int32)` - -SetNotBeforeLeeway sets NotBeforeLeeway field to given value. - - -### HasNotBeforeLeeway - -`func (o *OIDCWriteAuthRoleRequest) HasNotBeforeLeeway() bool` - -HasNotBeforeLeeway returns a boolean if a field has been set. - - - - -### GetNumUses - -`func (o *OIDCWriteAuthRoleRequest) GetNumUses() int32` - -GetNumUses returns the NumUses field if non-nil, zero value otherwise. - -### GetNumUsesOk - -`func (o *OIDCWriteAuthRoleRequest) GetNumUsesOk() (*int32, bool)` - -GetNumUsesOk returns a tuple with the NumUses field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetNumUses - -`func (o *OIDCWriteAuthRoleRequest) SetNumUses(v int32)` - -SetNumUses sets NumUses field to given value. - - -### HasNumUses - -`func (o *OIDCWriteAuthRoleRequest) HasNumUses() bool` - -HasNumUses returns a boolean if a field has been set. - - - - -### GetOidcScopes - -`func (o *OIDCWriteAuthRoleRequest) GetOidcScopes() []string` - -GetOidcScopes returns the OidcScopes field if non-nil, zero value otherwise. - -### GetOidcScopesOk - -`func (o *OIDCWriteAuthRoleRequest) GetOidcScopesOk() (*[]string, bool)` - -GetOidcScopesOk returns a tuple with the OidcScopes field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOidcScopes - -`func (o *OIDCWriteAuthRoleRequest) SetOidcScopes(v []string)` - -SetOidcScopes sets OidcScopes field to given value. - - -### HasOidcScopes - -`func (o *OIDCWriteAuthRoleRequest) HasOidcScopes() bool` - -HasOidcScopes returns a boolean if a field has been set. - - - - -### GetPeriod - -`func (o *OIDCWriteAuthRoleRequest) GetPeriod() int32` - -GetPeriod returns the Period field if non-nil, zero value otherwise. - -### GetPeriodOk - -`func (o *OIDCWriteAuthRoleRequest) GetPeriodOk() (*int32, bool)` - -GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetPeriod - -`func (o *OIDCWriteAuthRoleRequest) SetPeriod(v int32)` - -SetPeriod sets Period field to given value. - - -### HasPeriod - -`func (o *OIDCWriteAuthRoleRequest) HasPeriod() bool` - -HasPeriod returns a boolean if a field has been set. - - - - -### GetPolicies - -`func (o *OIDCWriteAuthRoleRequest) GetPolicies() []string` - -GetPolicies returns the Policies field if non-nil, zero value otherwise. - -### GetPoliciesOk - -`func (o *OIDCWriteAuthRoleRequest) GetPoliciesOk() (*[]string, bool)` - -GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetPolicies - -`func (o *OIDCWriteAuthRoleRequest) SetPolicies(v []string)` - -SetPolicies sets Policies field to given value. - - -### HasPolicies - -`func (o *OIDCWriteAuthRoleRequest) HasPolicies() bool` - -HasPolicies returns a boolean if a field has been set. - - - - -### GetRoleType - -`func (o *OIDCWriteAuthRoleRequest) GetRoleType() string` - -GetRoleType returns the RoleType field if non-nil, zero value otherwise. - -### GetRoleTypeOk - -`func (o *OIDCWriteAuthRoleRequest) GetRoleTypeOk() (*string, bool)` - -GetRoleTypeOk returns a tuple with the RoleType field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRoleType - -`func (o *OIDCWriteAuthRoleRequest) SetRoleType(v string)` - -SetRoleType sets RoleType field to given value. - - -### HasRoleType - -`func (o *OIDCWriteAuthRoleRequest) HasRoleType() bool` - -HasRoleType returns a boolean if a field has been set. - - - - -### GetTokenBoundCidrs - -`func (o *OIDCWriteAuthRoleRequest) GetTokenBoundCidrs() []string` - -GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. - -### GetTokenBoundCidrsOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenBoundCidrsOk() (*[]string, bool)` - -GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenBoundCidrs - -`func (o *OIDCWriteAuthRoleRequest) SetTokenBoundCidrs(v []string)` - -SetTokenBoundCidrs sets TokenBoundCidrs field to given value. - - -### HasTokenBoundCidrs - -`func (o *OIDCWriteAuthRoleRequest) HasTokenBoundCidrs() bool` - -HasTokenBoundCidrs returns a boolean if a field has been set. - - - - -### GetTokenExplicitMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) GetTokenExplicitMaxTtl() int32` - -GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. - -### GetTokenExplicitMaxTtlOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` - -GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenExplicitMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) SetTokenExplicitMaxTtl(v int32)` - -SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. - - -### HasTokenExplicitMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) HasTokenExplicitMaxTtl() bool` - -HasTokenExplicitMaxTtl returns a boolean if a field has been set. - - - - -### GetTokenMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) GetTokenMaxTtl() int32` - -GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. - -### GetTokenMaxTtlOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenMaxTtlOk() (*int32, bool)` - -GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) SetTokenMaxTtl(v int32)` - -SetTokenMaxTtl sets TokenMaxTtl field to given value. - - -### HasTokenMaxTtl - -`func (o *OIDCWriteAuthRoleRequest) HasTokenMaxTtl() bool` - -HasTokenMaxTtl returns a boolean if a field has been set. - - - - -### GetTokenNoDefaultPolicy - -`func (o *OIDCWriteAuthRoleRequest) GetTokenNoDefaultPolicy() bool` - -GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. - -### GetTokenNoDefaultPolicyOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` - -GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenNoDefaultPolicy - -`func (o *OIDCWriteAuthRoleRequest) SetTokenNoDefaultPolicy(v bool)` - -SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. - - -### HasTokenNoDefaultPolicy - -`func (o *OIDCWriteAuthRoleRequest) HasTokenNoDefaultPolicy() bool` - -HasTokenNoDefaultPolicy returns a boolean if a field has been set. - - - - -### GetTokenNumUses - -`func (o *OIDCWriteAuthRoleRequest) GetTokenNumUses() int32` - -GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. - -### GetTokenNumUsesOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenNumUsesOk() (*int32, bool)` - -GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenNumUses - -`func (o *OIDCWriteAuthRoleRequest) SetTokenNumUses(v int32)` - -SetTokenNumUses sets TokenNumUses field to given value. - - -### HasTokenNumUses - -`func (o *OIDCWriteAuthRoleRequest) HasTokenNumUses() bool` - -HasTokenNumUses returns a boolean if a field has been set. - - - - -### GetTokenPeriod - -`func (o *OIDCWriteAuthRoleRequest) GetTokenPeriod() int32` - -GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. - -### GetTokenPeriodOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenPeriodOk() (*int32, bool)` - -GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenPeriod - -`func (o *OIDCWriteAuthRoleRequest) SetTokenPeriod(v int32)` - -SetTokenPeriod sets TokenPeriod field to given value. - - -### HasTokenPeriod - -`func (o *OIDCWriteAuthRoleRequest) HasTokenPeriod() bool` - -HasTokenPeriod returns a boolean if a field has been set. - - - - -### GetTokenPolicies - -`func (o *OIDCWriteAuthRoleRequest) GetTokenPolicies() []string` - -GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. - -### GetTokenPoliciesOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenPoliciesOk() (*[]string, bool)` - -GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenPolicies - -`func (o *OIDCWriteAuthRoleRequest) SetTokenPolicies(v []string)` - -SetTokenPolicies sets TokenPolicies field to given value. - - -### HasTokenPolicies - -`func (o *OIDCWriteAuthRoleRequest) HasTokenPolicies() bool` - -HasTokenPolicies returns a boolean if a field has been set. - - - - -### GetTokenTtl - -`func (o *OIDCWriteAuthRoleRequest) GetTokenTtl() int32` - -GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. - -### GetTokenTtlOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenTtlOk() (*int32, bool)` - -GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenTtl - -`func (o *OIDCWriteAuthRoleRequest) SetTokenTtl(v int32)` - -SetTokenTtl sets TokenTtl field to given value. - - -### HasTokenTtl - -`func (o *OIDCWriteAuthRoleRequest) HasTokenTtl() bool` - -HasTokenTtl returns a boolean if a field has been set. - - - - -### GetTokenType - -`func (o *OIDCWriteAuthRoleRequest) GetTokenType() string` - -GetTokenType returns the TokenType field if non-nil, zero value otherwise. - -### GetTokenTypeOk - -`func (o *OIDCWriteAuthRoleRequest) GetTokenTypeOk() (*string, bool)` - -GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTokenType - -`func (o *OIDCWriteAuthRoleRequest) SetTokenType(v string)` - -SetTokenType sets TokenType field to given value. - - -### HasTokenType - -`func (o *OIDCWriteAuthRoleRequest) HasTokenType() bool` - -HasTokenType returns a boolean if a field has been set. - - - - -### GetTtl - -`func (o *OIDCWriteAuthRoleRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *OIDCWriteAuthRoleRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *OIDCWriteAuthRoleRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *OIDCWriteAuthRoleRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - -### GetUserClaim - -`func (o *OIDCWriteAuthRoleRequest) GetUserClaim() string` - -GetUserClaim returns the UserClaim field if non-nil, zero value otherwise. - -### GetUserClaimOk - -`func (o *OIDCWriteAuthRoleRequest) GetUserClaimOk() (*string, bool)` - -GetUserClaimOk returns a tuple with the UserClaim field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserClaim - -`func (o *OIDCWriteAuthRoleRequest) SetUserClaim(v string)` - -SetUserClaim sets UserClaim field to given value. - - -### HasUserClaim - -`func (o *OIDCWriteAuthRoleRequest) HasUserClaim() bool` - -HasUserClaim returns a boolean if a field has been set. - - - - -### GetUserClaimJsonPointer - -`func (o *OIDCWriteAuthRoleRequest) GetUserClaimJsonPointer() bool` - -GetUserClaimJsonPointer returns the UserClaimJsonPointer field if non-nil, zero value otherwise. - -### GetUserClaimJsonPointerOk - -`func (o *OIDCWriteAuthRoleRequest) GetUserClaimJsonPointerOk() (*bool, bool)` - -GetUserClaimJsonPointerOk returns a tuple with the UserClaimJsonPointer field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUserClaimJsonPointer - -`func (o *OIDCWriteAuthRoleRequest) SetUserClaimJsonPointer(v bool)` - -SetUserClaimJsonPointer sets UserClaimJsonPointer field to given value. - - -### HasUserClaimJsonPointer - -`func (o *OIDCWriteAuthRoleRequest) HasUserClaimJsonPointer() bool` - -HasUserClaimJsonPointer returns a boolean if a field has been set. - - - - -### GetVerboseOidcLogging - -`func (o *OIDCWriteAuthRoleRequest) GetVerboseOidcLogging() bool` - -GetVerboseOidcLogging returns the VerboseOidcLogging field if non-nil, zero value otherwise. - -### GetVerboseOidcLoggingOk - -`func (o *OIDCWriteAuthRoleRequest) GetVerboseOidcLoggingOk() (*bool, bool)` - -GetVerboseOidcLoggingOk returns a tuple with the VerboseOidcLogging field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetVerboseOidcLogging - -`func (o *OIDCWriteAuthRoleRequest) SetVerboseOidcLogging(v bool)` - -SetVerboseOidcLogging sets VerboseOidcLogging field to given value. - - -### HasVerboseOidcLogging - -`func (o *OIDCWriteAuthRoleRequest) HasVerboseOidcLogging() bool` - -HasVerboseOidcLogging returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/OIDCWriteAuthURLRequest.md b/docs/OIDCWriteAuthURLRequest.md deleted file mode 100644 index d1a7708d..00000000 --- a/docs/OIDCWriteAuthURLRequest.md +++ /dev/null @@ -1,129 +0,0 @@ -# OIDCWriteAuthURLRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ClientNonce** | Pointer to **string** | Optional client-provided nonce that must match during callback, if present. | [optional] -**RedirectUri** | Pointer to **string** | The OAuth redirect_uri to use in the authorization URL. | [optional] -**Role** | Pointer to **string** | The role to issue an OIDC authorization URL against. | [optional] - - - -## Methods - - -### NewOIDCWriteAuthURLRequest - -`func NewOIDCWriteAuthURLRequest() *OIDCWriteAuthURLRequest` - -NewOIDCWriteAuthURLRequest instantiates a new OIDCWriteAuthURLRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOIDCWriteAuthURLRequestWithDefaults - -`func NewOIDCWriteAuthURLRequestWithDefaults() *OIDCWriteAuthURLRequest` - -NewOIDCWriteAuthURLRequestWithDefaults instantiates a new OIDCWriteAuthURLRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetClientNonce - -`func (o *OIDCWriteAuthURLRequest) GetClientNonce() string` - -GetClientNonce returns the ClientNonce field if non-nil, zero value otherwise. - -### GetClientNonceOk - -`func (o *OIDCWriteAuthURLRequest) GetClientNonceOk() (*string, bool)` - -GetClientNonceOk returns a tuple with the ClientNonce field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetClientNonce - -`func (o *OIDCWriteAuthURLRequest) SetClientNonce(v string)` - -SetClientNonce sets ClientNonce field to given value. - - -### HasClientNonce - -`func (o *OIDCWriteAuthURLRequest) HasClientNonce() bool` - -HasClientNonce returns a boolean if a field has been set. - - - - -### GetRedirectUri - -`func (o *OIDCWriteAuthURLRequest) GetRedirectUri() string` - -GetRedirectUri returns the RedirectUri field if non-nil, zero value otherwise. - -### GetRedirectUriOk - -`func (o *OIDCWriteAuthURLRequest) GetRedirectUriOk() (*string, bool)` - -GetRedirectUriOk returns a tuple with the RedirectUri field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRedirectUri - -`func (o *OIDCWriteAuthURLRequest) SetRedirectUri(v string)` - -SetRedirectUri sets RedirectUri field to given value. - - -### HasRedirectUri - -`func (o *OIDCWriteAuthURLRequest) HasRedirectUri() bool` - -HasRedirectUri returns a boolean if a field has been set. - - - - -### GetRole - -`func (o *OIDCWriteAuthURLRequest) GetRole() string` - -GetRole returns the Role field if non-nil, zero value otherwise. - -### GetRoleOk - -`func (o *OIDCWriteAuthURLRequest) GetRoleOk() (*string, bool)` - -GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRole - -`func (o *OIDCWriteAuthURLRequest) SetRole(v string)` - -SetRole sets Role field to given value. - - -### HasRole - -`func (o *OIDCWriteAuthURLRequest) HasRole() bool` - -HasRole returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/OIDCWriteClientRequest.md b/docs/OIDCWriteClientRequest.md index 23a220fc..805576fa 100644 --- a/docs/OIDCWriteClientRequest.md +++ b/docs/OIDCWriteClientRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteClientRequest +# OidcWriteClientRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteClientRequest +### NewOidcWriteClientRequest -`func NewOIDCWriteClientRequest() *OIDCWriteClientRequest` +`func NewOidcWriteClientRequest() *OidcWriteClientRequest` -NewOIDCWriteClientRequest instantiates a new OIDCWriteClientRequest object +NewOidcWriteClientRequest instantiates a new OidcWriteClientRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteClientRequestWithDefaults +### NewOidcWriteClientRequestWithDefaults -`func NewOIDCWriteClientRequestWithDefaults() *OIDCWriteClientRequest` +`func NewOidcWriteClientRequestWithDefaults() *OidcWriteClientRequest` -NewOIDCWriteClientRequestWithDefaults instantiates a new OIDCWriteClientRequest object +NewOidcWriteClientRequestWithDefaults instantiates a new OidcWriteClientRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAccessTokenTtl -`func (o *OIDCWriteClientRequest) GetAccessTokenTtl() int32` +`func (o *OidcWriteClientRequest) GetAccessTokenTtl() int32` GetAccessTokenTtl returns the AccessTokenTtl field if non-nil, zero value otherwise. ### GetAccessTokenTtlOk -`func (o *OIDCWriteClientRequest) GetAccessTokenTtlOk() (*int32, bool)` +`func (o *OidcWriteClientRequest) GetAccessTokenTtlOk() (*int32, bool)` GetAccessTokenTtlOk returns a tuple with the AccessTokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAccessTokenTtl -`func (o *OIDCWriteClientRequest) SetAccessTokenTtl(v int32)` +`func (o *OidcWriteClientRequest) SetAccessTokenTtl(v int32)` SetAccessTokenTtl sets AccessTokenTtl field to given value. ### HasAccessTokenTtl -`func (o *OIDCWriteClientRequest) HasAccessTokenTtl() bool` +`func (o *OidcWriteClientRequest) HasAccessTokenTtl() bool` HasAccessTokenTtl returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasAccessTokenTtl returns a boolean if a field has been set. ### GetAssignments -`func (o *OIDCWriteClientRequest) GetAssignments() []string` +`func (o *OidcWriteClientRequest) GetAssignments() []string` GetAssignments returns the Assignments field if non-nil, zero value otherwise. ### GetAssignmentsOk -`func (o *OIDCWriteClientRequest) GetAssignmentsOk() (*[]string, bool)` +`func (o *OidcWriteClientRequest) GetAssignmentsOk() (*[]string, bool)` GetAssignmentsOk returns a tuple with the Assignments field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAssignments -`func (o *OIDCWriteClientRequest) SetAssignments(v []string)` +`func (o *OidcWriteClientRequest) SetAssignments(v []string)` SetAssignments sets Assignments field to given value. ### HasAssignments -`func (o *OIDCWriteClientRequest) HasAssignments() bool` +`func (o *OidcWriteClientRequest) HasAssignments() bool` HasAssignments returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasAssignments returns a boolean if a field has been set. ### GetClientType -`func (o *OIDCWriteClientRequest) GetClientType() string` +`func (o *OidcWriteClientRequest) GetClientType() string` GetClientType returns the ClientType field if non-nil, zero value otherwise. ### GetClientTypeOk -`func (o *OIDCWriteClientRequest) GetClientTypeOk() (*string, bool)` +`func (o *OidcWriteClientRequest) GetClientTypeOk() (*string, bool)` GetClientTypeOk returns a tuple with the ClientType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientType -`func (o *OIDCWriteClientRequest) SetClientType(v string)` +`func (o *OidcWriteClientRequest) SetClientType(v string)` SetClientType sets ClientType field to given value. ### HasClientType -`func (o *OIDCWriteClientRequest) HasClientType() bool` +`func (o *OidcWriteClientRequest) HasClientType() bool` HasClientType returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasClientType returns a boolean if a field has been set. ### GetIdTokenTtl -`func (o *OIDCWriteClientRequest) GetIdTokenTtl() int32` +`func (o *OidcWriteClientRequest) GetIdTokenTtl() int32` GetIdTokenTtl returns the IdTokenTtl field if non-nil, zero value otherwise. ### GetIdTokenTtlOk -`func (o *OIDCWriteClientRequest) GetIdTokenTtlOk() (*int32, bool)` +`func (o *OidcWriteClientRequest) GetIdTokenTtlOk() (*int32, bool)` GetIdTokenTtlOk returns a tuple with the IdTokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIdTokenTtl -`func (o *OIDCWriteClientRequest) SetIdTokenTtl(v int32)` +`func (o *OidcWriteClientRequest) SetIdTokenTtl(v int32)` SetIdTokenTtl sets IdTokenTtl field to given value. ### HasIdTokenTtl -`func (o *OIDCWriteClientRequest) HasIdTokenTtl() bool` +`func (o *OidcWriteClientRequest) HasIdTokenTtl() bool` HasIdTokenTtl returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasIdTokenTtl returns a boolean if a field has been set. ### GetKey -`func (o *OIDCWriteClientRequest) GetKey() string` +`func (o *OidcWriteClientRequest) GetKey() string` GetKey returns the Key field if non-nil, zero value otherwise. ### GetKeyOk -`func (o *OIDCWriteClientRequest) GetKeyOk() (*string, bool)` +`func (o *OidcWriteClientRequest) GetKeyOk() (*string, bool)` GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKey -`func (o *OIDCWriteClientRequest) SetKey(v string)` +`func (o *OidcWriteClientRequest) SetKey(v string)` SetKey sets Key field to given value. ### HasKey -`func (o *OIDCWriteClientRequest) HasKey() bool` +`func (o *OidcWriteClientRequest) HasKey() bool` HasKey returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasKey returns a boolean if a field has been set. ### GetRedirectUris -`func (o *OIDCWriteClientRequest) GetRedirectUris() []string` +`func (o *OidcWriteClientRequest) GetRedirectUris() []string` GetRedirectUris returns the RedirectUris field if non-nil, zero value otherwise. ### GetRedirectUrisOk -`func (o *OIDCWriteClientRequest) GetRedirectUrisOk() (*[]string, bool)` +`func (o *OidcWriteClientRequest) GetRedirectUrisOk() (*[]string, bool)` GetRedirectUrisOk returns a tuple with the RedirectUris field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRedirectUris -`func (o *OIDCWriteClientRequest) SetRedirectUris(v []string)` +`func (o *OidcWriteClientRequest) SetRedirectUris(v []string)` SetRedirectUris sets RedirectUris field to given value. ### HasRedirectUris -`func (o *OIDCWriteClientRequest) HasRedirectUris() bool` +`func (o *OidcWriteClientRequest) HasRedirectUris() bool` HasRedirectUris returns a boolean if a field has been set. diff --git a/docs/OIDCWriteKeyRequest.md b/docs/OIDCWriteKeyRequest.md index ea343747..f3adcab0 100644 --- a/docs/OIDCWriteKeyRequest.md +++ b/docs/OIDCWriteKeyRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteKeyRequest +# OidcWriteKeyRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteKeyRequest +### NewOidcWriteKeyRequest -`func NewOIDCWriteKeyRequest() *OIDCWriteKeyRequest` +`func NewOidcWriteKeyRequest() *OidcWriteKeyRequest` -NewOIDCWriteKeyRequest instantiates a new OIDCWriteKeyRequest object +NewOidcWriteKeyRequest instantiates a new OidcWriteKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteKeyRequestWithDefaults +### NewOidcWriteKeyRequestWithDefaults -`func NewOIDCWriteKeyRequestWithDefaults() *OIDCWriteKeyRequest` +`func NewOidcWriteKeyRequestWithDefaults() *OidcWriteKeyRequest` -NewOIDCWriteKeyRequestWithDefaults instantiates a new OIDCWriteKeyRequest object +NewOidcWriteKeyRequestWithDefaults instantiates a new OidcWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAlgorithm -`func (o *OIDCWriteKeyRequest) GetAlgorithm() string` +`func (o *OidcWriteKeyRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *OIDCWriteKeyRequest) GetAlgorithmOk() (*string, bool)` +`func (o *OidcWriteKeyRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *OIDCWriteKeyRequest) SetAlgorithm(v string)` +`func (o *OidcWriteKeyRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *OIDCWriteKeyRequest) HasAlgorithm() bool` +`func (o *OidcWriteKeyRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasAlgorithm returns a boolean if a field has been set. ### GetAllowedClientIds -`func (o *OIDCWriteKeyRequest) GetAllowedClientIds() []string` +`func (o *OidcWriteKeyRequest) GetAllowedClientIds() []string` GetAllowedClientIds returns the AllowedClientIds field if non-nil, zero value otherwise. ### GetAllowedClientIdsOk -`func (o *OIDCWriteKeyRequest) GetAllowedClientIdsOk() (*[]string, bool)` +`func (o *OidcWriteKeyRequest) GetAllowedClientIdsOk() (*[]string, bool)` GetAllowedClientIdsOk returns a tuple with the AllowedClientIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedClientIds -`func (o *OIDCWriteKeyRequest) SetAllowedClientIds(v []string)` +`func (o *OidcWriteKeyRequest) SetAllowedClientIds(v []string)` SetAllowedClientIds sets AllowedClientIds field to given value. ### HasAllowedClientIds -`func (o *OIDCWriteKeyRequest) HasAllowedClientIds() bool` +`func (o *OidcWriteKeyRequest) HasAllowedClientIds() bool` HasAllowedClientIds returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasAllowedClientIds returns a boolean if a field has been set. ### GetRotationPeriod -`func (o *OIDCWriteKeyRequest) GetRotationPeriod() int32` +`func (o *OidcWriteKeyRequest) GetRotationPeriod() int32` GetRotationPeriod returns the RotationPeriod field if non-nil, zero value otherwise. ### GetRotationPeriodOk -`func (o *OIDCWriteKeyRequest) GetRotationPeriodOk() (*int32, bool)` +`func (o *OidcWriteKeyRequest) GetRotationPeriodOk() (*int32, bool)` GetRotationPeriodOk returns a tuple with the RotationPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRotationPeriod -`func (o *OIDCWriteKeyRequest) SetRotationPeriod(v int32)` +`func (o *OidcWriteKeyRequest) SetRotationPeriod(v int32)` SetRotationPeriod sets RotationPeriod field to given value. ### HasRotationPeriod -`func (o *OIDCWriteKeyRequest) HasRotationPeriod() bool` +`func (o *OidcWriteKeyRequest) HasRotationPeriod() bool` HasRotationPeriod returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasRotationPeriod returns a boolean if a field has been set. ### GetVerificationTtl -`func (o *OIDCWriteKeyRequest) GetVerificationTtl() int32` +`func (o *OidcWriteKeyRequest) GetVerificationTtl() int32` GetVerificationTtl returns the VerificationTtl field if non-nil, zero value otherwise. ### GetVerificationTtlOk -`func (o *OIDCWriteKeyRequest) GetVerificationTtlOk() (*int32, bool)` +`func (o *OidcWriteKeyRequest) GetVerificationTtlOk() (*int32, bool)` GetVerificationTtlOk returns a tuple with the VerificationTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVerificationTtl -`func (o *OIDCWriteKeyRequest) SetVerificationTtl(v int32)` +`func (o *OidcWriteKeyRequest) SetVerificationTtl(v int32)` SetVerificationTtl sets VerificationTtl field to given value. ### HasVerificationTtl -`func (o *OIDCWriteKeyRequest) HasVerificationTtl() bool` +`func (o *OidcWriteKeyRequest) HasVerificationTtl() bool` HasVerificationTtl returns a boolean if a field has been set. diff --git a/docs/OIDCWriteProviderRequest.md b/docs/OIDCWriteProviderRequest.md index 7c0c3a95..15d824a9 100644 --- a/docs/OIDCWriteProviderRequest.md +++ b/docs/OIDCWriteProviderRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteProviderRequest +# OidcWriteProviderRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteProviderRequest +### NewOidcWriteProviderRequest -`func NewOIDCWriteProviderRequest() *OIDCWriteProviderRequest` +`func NewOidcWriteProviderRequest() *OidcWriteProviderRequest` -NewOIDCWriteProviderRequest instantiates a new OIDCWriteProviderRequest object +NewOidcWriteProviderRequest instantiates a new OidcWriteProviderRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteProviderRequestWithDefaults +### NewOidcWriteProviderRequestWithDefaults -`func NewOIDCWriteProviderRequestWithDefaults() *OIDCWriteProviderRequest` +`func NewOidcWriteProviderRequestWithDefaults() *OidcWriteProviderRequest` -NewOIDCWriteProviderRequestWithDefaults instantiates a new OIDCWriteProviderRequest object +NewOidcWriteProviderRequestWithDefaults instantiates a new OidcWriteProviderRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowedClientIds -`func (o *OIDCWriteProviderRequest) GetAllowedClientIds() []string` +`func (o *OidcWriteProviderRequest) GetAllowedClientIds() []string` GetAllowedClientIds returns the AllowedClientIds field if non-nil, zero value otherwise. ### GetAllowedClientIdsOk -`func (o *OIDCWriteProviderRequest) GetAllowedClientIdsOk() (*[]string, bool)` +`func (o *OidcWriteProviderRequest) GetAllowedClientIdsOk() (*[]string, bool)` GetAllowedClientIdsOk returns a tuple with the AllowedClientIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedClientIds -`func (o *OIDCWriteProviderRequest) SetAllowedClientIds(v []string)` +`func (o *OidcWriteProviderRequest) SetAllowedClientIds(v []string)` SetAllowedClientIds sets AllowedClientIds field to given value. ### HasAllowedClientIds -`func (o *OIDCWriteProviderRequest) HasAllowedClientIds() bool` +`func (o *OidcWriteProviderRequest) HasAllowedClientIds() bool` HasAllowedClientIds returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAllowedClientIds returns a boolean if a field has been set. ### GetIssuer -`func (o *OIDCWriteProviderRequest) GetIssuer() string` +`func (o *OidcWriteProviderRequest) GetIssuer() string` GetIssuer returns the Issuer field if non-nil, zero value otherwise. ### GetIssuerOk -`func (o *OIDCWriteProviderRequest) GetIssuerOk() (*string, bool)` +`func (o *OidcWriteProviderRequest) GetIssuerOk() (*string, bool)` GetIssuerOk returns a tuple with the Issuer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuer -`func (o *OIDCWriteProviderRequest) SetIssuer(v string)` +`func (o *OidcWriteProviderRequest) SetIssuer(v string)` SetIssuer sets Issuer field to given value. ### HasIssuer -`func (o *OIDCWriteProviderRequest) HasIssuer() bool` +`func (o *OidcWriteProviderRequest) HasIssuer() bool` HasIssuer returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasIssuer returns a boolean if a field has been set. ### GetScopesSupported -`func (o *OIDCWriteProviderRequest) GetScopesSupported() []string` +`func (o *OidcWriteProviderRequest) GetScopesSupported() []string` GetScopesSupported returns the ScopesSupported field if non-nil, zero value otherwise. ### GetScopesSupportedOk -`func (o *OIDCWriteProviderRequest) GetScopesSupportedOk() (*[]string, bool)` +`func (o *OidcWriteProviderRequest) GetScopesSupportedOk() (*[]string, bool)` GetScopesSupportedOk returns a tuple with the ScopesSupported field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetScopesSupported -`func (o *OIDCWriteProviderRequest) SetScopesSupported(v []string)` +`func (o *OidcWriteProviderRequest) SetScopesSupported(v []string)` SetScopesSupported sets ScopesSupported field to given value. ### HasScopesSupported -`func (o *OIDCWriteProviderRequest) HasScopesSupported() bool` +`func (o *OidcWriteProviderRequest) HasScopesSupported() bool` HasScopesSupported returns a boolean if a field has been set. diff --git a/docs/OIDCWriteRoleRequest.md b/docs/OIDCWriteRoleRequest.md index ea6bb610..8b3cb43b 100644 --- a/docs/OIDCWriteRoleRequest.md +++ b/docs/OIDCWriteRoleRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteRoleRequest +# OidcWriteRoleRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteRoleRequest +### NewOidcWriteRoleRequest -`func NewOIDCWriteRoleRequest(key string, ) *OIDCWriteRoleRequest` +`func NewOidcWriteRoleRequest(key string, ) *OidcWriteRoleRequest` -NewOIDCWriteRoleRequest instantiates a new OIDCWriteRoleRequest object +NewOidcWriteRoleRequest instantiates a new OidcWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteRoleRequestWithDefaults +### NewOidcWriteRoleRequestWithDefaults -`func NewOIDCWriteRoleRequestWithDefaults() *OIDCWriteRoleRequest` +`func NewOidcWriteRoleRequestWithDefaults() *OidcWriteRoleRequest` -NewOIDCWriteRoleRequestWithDefaults instantiates a new OIDCWriteRoleRequest object +NewOidcWriteRoleRequestWithDefaults instantiates a new OidcWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientId -`func (o *OIDCWriteRoleRequest) GetClientId() string` +`func (o *OidcWriteRoleRequest) GetClientId() string` GetClientId returns the ClientId field if non-nil, zero value otherwise. ### GetClientIdOk -`func (o *OIDCWriteRoleRequest) GetClientIdOk() (*string, bool)` +`func (o *OidcWriteRoleRequest) GetClientIdOk() (*string, bool)` GetClientIdOk returns a tuple with the ClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientId -`func (o *OIDCWriteRoleRequest) SetClientId(v string)` +`func (o *OidcWriteRoleRequest) SetClientId(v string)` SetClientId sets ClientId field to given value. ### HasClientId -`func (o *OIDCWriteRoleRequest) HasClientId() bool` +`func (o *OidcWriteRoleRequest) HasClientId() bool` HasClientId returns a boolean if a field has been set. @@ -64,20 +64,20 @@ HasClientId returns a boolean if a field has been set. ### GetKey -`func (o *OIDCWriteRoleRequest) GetKey() string` +`func (o *OidcWriteRoleRequest) GetKey() string` GetKey returns the Key field if non-nil, zero value otherwise. ### GetKeyOk -`func (o *OIDCWriteRoleRequest) GetKeyOk() (*string, bool)` +`func (o *OidcWriteRoleRequest) GetKeyOk() (*string, bool)` GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKey -`func (o *OIDCWriteRoleRequest) SetKey(v string)` +`func (o *OidcWriteRoleRequest) SetKey(v string)` SetKey sets Key field to given value. @@ -87,27 +87,27 @@ SetKey sets Key field to given value. ### GetTemplate -`func (o *OIDCWriteRoleRequest) GetTemplate() string` +`func (o *OidcWriteRoleRequest) GetTemplate() string` GetTemplate returns the Template field if non-nil, zero value otherwise. ### GetTemplateOk -`func (o *OIDCWriteRoleRequest) GetTemplateOk() (*string, bool)` +`func (o *OidcWriteRoleRequest) GetTemplateOk() (*string, bool)` GetTemplateOk returns a tuple with the Template field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTemplate -`func (o *OIDCWriteRoleRequest) SetTemplate(v string)` +`func (o *OidcWriteRoleRequest) SetTemplate(v string)` SetTemplate sets Template field to given value. ### HasTemplate -`func (o *OIDCWriteRoleRequest) HasTemplate() bool` +`func (o *OidcWriteRoleRequest) HasTemplate() bool` HasTemplate returns a boolean if a field has been set. @@ -116,27 +116,27 @@ HasTemplate returns a boolean if a field has been set. ### GetTtl -`func (o *OIDCWriteRoleRequest) GetTtl() int32` +`func (o *OidcWriteRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *OIDCWriteRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *OidcWriteRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *OIDCWriteRoleRequest) SetTtl(v int32)` +`func (o *OidcWriteRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *OIDCWriteRoleRequest) HasTtl() bool` +`func (o *OidcWriteRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/OIDCWriteScopeRequest.md b/docs/OIDCWriteScopeRequest.md index 01ff314f..ce83b23f 100644 --- a/docs/OIDCWriteScopeRequest.md +++ b/docs/OIDCWriteScopeRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteScopeRequest +# OidcWriteScopeRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteScopeRequest +### NewOidcWriteScopeRequest -`func NewOIDCWriteScopeRequest() *OIDCWriteScopeRequest` +`func NewOidcWriteScopeRequest() *OidcWriteScopeRequest` -NewOIDCWriteScopeRequest instantiates a new OIDCWriteScopeRequest object +NewOidcWriteScopeRequest instantiates a new OidcWriteScopeRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteScopeRequestWithDefaults +### NewOidcWriteScopeRequestWithDefaults -`func NewOIDCWriteScopeRequestWithDefaults() *OIDCWriteScopeRequest` +`func NewOidcWriteScopeRequestWithDefaults() *OidcWriteScopeRequest` -NewOIDCWriteScopeRequestWithDefaults instantiates a new OIDCWriteScopeRequest object +NewOidcWriteScopeRequestWithDefaults instantiates a new OidcWriteScopeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDescription -`func (o *OIDCWriteScopeRequest) GetDescription() string` +`func (o *OidcWriteScopeRequest) GetDescription() string` GetDescription returns the Description field if non-nil, zero value otherwise. ### GetDescriptionOk -`func (o *OIDCWriteScopeRequest) GetDescriptionOk() (*string, bool)` +`func (o *OidcWriteScopeRequest) GetDescriptionOk() (*string, bool)` GetDescriptionOk returns a tuple with the Description field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDescription -`func (o *OIDCWriteScopeRequest) SetDescription(v string)` +`func (o *OidcWriteScopeRequest) SetDescription(v string)` SetDescription sets Description field to given value. ### HasDescription -`func (o *OIDCWriteScopeRequest) HasDescription() bool` +`func (o *OidcWriteScopeRequest) HasDescription() bool` HasDescription returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasDescription returns a boolean if a field has been set. ### GetTemplate -`func (o *OIDCWriteScopeRequest) GetTemplate() string` +`func (o *OidcWriteScopeRequest) GetTemplate() string` GetTemplate returns the Template field if non-nil, zero value otherwise. ### GetTemplateOk -`func (o *OIDCWriteScopeRequest) GetTemplateOk() (*string, bool)` +`func (o *OidcWriteScopeRequest) GetTemplateOk() (*string, bool)` GetTemplateOk returns a tuple with the Template field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTemplate -`func (o *OIDCWriteScopeRequest) SetTemplate(v string)` +`func (o *OidcWriteScopeRequest) SetTemplate(v string)` SetTemplate sets Template field to given value. ### HasTemplate -`func (o *OIDCWriteScopeRequest) HasTemplate() bool` +`func (o *OidcWriteScopeRequest) HasTemplate() bool` HasTemplate returns a boolean if a field has been set. diff --git a/docs/OCIWriteConfigRequest.md b/docs/OciConfigureRequest.md similarity index 65% rename from docs/OCIWriteConfigRequest.md rename to docs/OciConfigureRequest.md index bf1dcc7f..07f79676 100644 --- a/docs/OCIWriteConfigRequest.md +++ b/docs/OciConfigureRequest.md @@ -1,4 +1,4 @@ -# OCIWriteConfigRequest +# OciConfigureRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewOCIWriteConfigRequest +### NewOciConfigureRequest -`func NewOCIWriteConfigRequest() *OCIWriteConfigRequest` +`func NewOciConfigureRequest() *OciConfigureRequest` -NewOCIWriteConfigRequest instantiates a new OCIWriteConfigRequest object +NewOciConfigureRequest instantiates a new OciConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOCIWriteConfigRequestWithDefaults +### NewOciConfigureRequestWithDefaults -`func NewOCIWriteConfigRequestWithDefaults() *OCIWriteConfigRequest` +`func NewOciConfigureRequestWithDefaults() *OciConfigureRequest` -NewOCIWriteConfigRequestWithDefaults instantiates a new OCIWriteConfigRequest object +NewOciConfigureRequestWithDefaults instantiates a new OciConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetHomeTenancyId -`func (o *OCIWriteConfigRequest) GetHomeTenancyId() string` +`func (o *OciConfigureRequest) GetHomeTenancyId() string` GetHomeTenancyId returns the HomeTenancyId field if non-nil, zero value otherwise. ### GetHomeTenancyIdOk -`func (o *OCIWriteConfigRequest) GetHomeTenancyIdOk() (*string, bool)` +`func (o *OciConfigureRequest) GetHomeTenancyIdOk() (*string, bool)` GetHomeTenancyIdOk returns a tuple with the HomeTenancyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetHomeTenancyId -`func (o *OCIWriteConfigRequest) SetHomeTenancyId(v string)` +`func (o *OciConfigureRequest) SetHomeTenancyId(v string)` SetHomeTenancyId sets HomeTenancyId field to given value. ### HasHomeTenancyId -`func (o *OCIWriteConfigRequest) HasHomeTenancyId() bool` +`func (o *OciConfigureRequest) HasHomeTenancyId() bool` HasHomeTenancyId returns a boolean if a field has been set. diff --git a/docs/OCILoginWithRoleRequest.md b/docs/OciLoginRequest.md similarity index 64% rename from docs/OCILoginWithRoleRequest.md rename to docs/OciLoginRequest.md index 0fcce75f..1d322c7b 100644 --- a/docs/OCILoginWithRoleRequest.md +++ b/docs/OciLoginRequest.md @@ -1,4 +1,4 @@ -# OCILoginWithRoleRequest +# OciLoginRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewOCILoginWithRoleRequest +### NewOciLoginRequest -`func NewOCILoginWithRoleRequest() *OCILoginWithRoleRequest` +`func NewOciLoginRequest() *OciLoginRequest` -NewOCILoginWithRoleRequest instantiates a new OCILoginWithRoleRequest object +NewOciLoginRequest instantiates a new OciLoginRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOCILoginWithRoleRequestWithDefaults +### NewOciLoginRequestWithDefaults -`func NewOCILoginWithRoleRequestWithDefaults() *OCILoginWithRoleRequest` +`func NewOciLoginRequestWithDefaults() *OciLoginRequest` -NewOCILoginWithRoleRequestWithDefaults instantiates a new OCILoginWithRoleRequest object +NewOciLoginRequestWithDefaults instantiates a new OciLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetRequestHeaders -`func (o *OCILoginWithRoleRequest) GetRequestHeaders() string` +`func (o *OciLoginRequest) GetRequestHeaders() string` GetRequestHeaders returns the RequestHeaders field if non-nil, zero value otherwise. ### GetRequestHeadersOk -`func (o *OCILoginWithRoleRequest) GetRequestHeadersOk() (*string, bool)` +`func (o *OciLoginRequest) GetRequestHeadersOk() (*string, bool)` GetRequestHeadersOk returns a tuple with the RequestHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequestHeaders -`func (o *OCILoginWithRoleRequest) SetRequestHeaders(v string)` +`func (o *OciLoginRequest) SetRequestHeaders(v string)` SetRequestHeaders sets RequestHeaders field to given value. ### HasRequestHeaders -`func (o *OCILoginWithRoleRequest) HasRequestHeaders() bool` +`func (o *OciLoginRequest) HasRequestHeaders() bool` HasRequestHeaders returns a boolean if a field has been set. diff --git a/docs/OIDCWriteConfigRequest.md b/docs/OidcConfigureRequest.md similarity index 66% rename from docs/OIDCWriteConfigRequest.md rename to docs/OidcConfigureRequest.md index cf09ebcc..25e42644 100644 --- a/docs/OIDCWriteConfigRequest.md +++ b/docs/OidcConfigureRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteConfigRequest +# OidcConfigureRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteConfigRequest +### NewOidcConfigureRequest -`func NewOIDCWriteConfigRequest() *OIDCWriteConfigRequest` +`func NewOidcConfigureRequest() *OidcConfigureRequest` -NewOIDCWriteConfigRequest instantiates a new OIDCWriteConfigRequest object +NewOidcConfigureRequest instantiates a new OidcConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteConfigRequestWithDefaults +### NewOidcConfigureRequestWithDefaults -`func NewOIDCWriteConfigRequestWithDefaults() *OIDCWriteConfigRequest` +`func NewOidcConfigureRequestWithDefaults() *OidcConfigureRequest` -NewOIDCWriteConfigRequestWithDefaults instantiates a new OIDCWriteConfigRequest object +NewOidcConfigureRequestWithDefaults instantiates a new OidcConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIssuer -`func (o *OIDCWriteConfigRequest) GetIssuer() string` +`func (o *OidcConfigureRequest) GetIssuer() string` GetIssuer returns the Issuer field if non-nil, zero value otherwise. ### GetIssuerOk -`func (o *OIDCWriteConfigRequest) GetIssuerOk() (*string, bool)` +`func (o *OidcConfigureRequest) GetIssuerOk() (*string, bool)` GetIssuerOk returns a tuple with the Issuer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuer -`func (o *OIDCWriteConfigRequest) SetIssuer(v string)` +`func (o *OidcConfigureRequest) SetIssuer(v string)` SetIssuer sets Issuer field to given value. ### HasIssuer -`func (o *OIDCWriteConfigRequest) HasIssuer() bool` +`func (o *OidcConfigureRequest) HasIssuer() bool` HasIssuer returns a boolean if a field has been set. diff --git a/docs/OIDCWriteProviderAuthorizeRequest.md b/docs/OidcProviderAuthorize2Request.md similarity index 65% rename from docs/OIDCWriteProviderAuthorizeRequest.md rename to docs/OidcProviderAuthorize2Request.md index 71135971..ebd41908 100644 --- a/docs/OIDCWriteProviderAuthorizeRequest.md +++ b/docs/OidcProviderAuthorize2Request.md @@ -1,4 +1,4 @@ -# OIDCWriteProviderAuthorizeRequest +# OidcProviderAuthorize2Request ## Properties @@ -20,40 +20,40 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteProviderAuthorizeRequest +### NewOidcProviderAuthorize2Request -`func NewOIDCWriteProviderAuthorizeRequest(clientId string, redirectUri string, responseType string, scope string, ) *OIDCWriteProviderAuthorizeRequest` +`func NewOidcProviderAuthorize2Request(clientId string, redirectUri string, responseType string, scope string, ) *OidcProviderAuthorize2Request` -NewOIDCWriteProviderAuthorizeRequest instantiates a new OIDCWriteProviderAuthorizeRequest object +NewOidcProviderAuthorize2Request instantiates a new OidcProviderAuthorize2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteProviderAuthorizeRequestWithDefaults +### NewOidcProviderAuthorize2RequestWithDefaults -`func NewOIDCWriteProviderAuthorizeRequestWithDefaults() *OIDCWriteProviderAuthorizeRequest` +`func NewOidcProviderAuthorize2RequestWithDefaults() *OidcProviderAuthorize2Request` -NewOIDCWriteProviderAuthorizeRequestWithDefaults instantiates a new OIDCWriteProviderAuthorizeRequest object +NewOidcProviderAuthorize2RequestWithDefaults instantiates a new OidcProviderAuthorize2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientId -`func (o *OIDCWriteProviderAuthorizeRequest) GetClientId() string` +`func (o *OidcProviderAuthorize2Request) GetClientId() string` GetClientId returns the ClientId field if non-nil, zero value otherwise. ### GetClientIdOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetClientIdOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetClientIdOk() (*string, bool)` GetClientIdOk returns a tuple with the ClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientId -`func (o *OIDCWriteProviderAuthorizeRequest) SetClientId(v string)` +`func (o *OidcProviderAuthorize2Request) SetClientId(v string)` SetClientId sets ClientId field to given value. @@ -63,27 +63,27 @@ SetClientId sets ClientId field to given value. ### GetCodeChallenge -`func (o *OIDCWriteProviderAuthorizeRequest) GetCodeChallenge() string` +`func (o *OidcProviderAuthorize2Request) GetCodeChallenge() string` GetCodeChallenge returns the CodeChallenge field if non-nil, zero value otherwise. ### GetCodeChallengeOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetCodeChallengeOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetCodeChallengeOk() (*string, bool)` GetCodeChallengeOk returns a tuple with the CodeChallenge field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCodeChallenge -`func (o *OIDCWriteProviderAuthorizeRequest) SetCodeChallenge(v string)` +`func (o *OidcProviderAuthorize2Request) SetCodeChallenge(v string)` SetCodeChallenge sets CodeChallenge field to given value. ### HasCodeChallenge -`func (o *OIDCWriteProviderAuthorizeRequest) HasCodeChallenge() bool` +`func (o *OidcProviderAuthorize2Request) HasCodeChallenge() bool` HasCodeChallenge returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasCodeChallenge returns a boolean if a field has been set. ### GetCodeChallengeMethod -`func (o *OIDCWriteProviderAuthorizeRequest) GetCodeChallengeMethod() string` +`func (o *OidcProviderAuthorize2Request) GetCodeChallengeMethod() string` GetCodeChallengeMethod returns the CodeChallengeMethod field if non-nil, zero value otherwise. ### GetCodeChallengeMethodOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetCodeChallengeMethodOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetCodeChallengeMethodOk() (*string, bool)` GetCodeChallengeMethodOk returns a tuple with the CodeChallengeMethod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCodeChallengeMethod -`func (o *OIDCWriteProviderAuthorizeRequest) SetCodeChallengeMethod(v string)` +`func (o *OidcProviderAuthorize2Request) SetCodeChallengeMethod(v string)` SetCodeChallengeMethod sets CodeChallengeMethod field to given value. ### HasCodeChallengeMethod -`func (o *OIDCWriteProviderAuthorizeRequest) HasCodeChallengeMethod() bool` +`func (o *OidcProviderAuthorize2Request) HasCodeChallengeMethod() bool` HasCodeChallengeMethod returns a boolean if a field has been set. @@ -121,27 +121,27 @@ HasCodeChallengeMethod returns a boolean if a field has been set. ### GetMaxAge -`func (o *OIDCWriteProviderAuthorizeRequest) GetMaxAge() int32` +`func (o *OidcProviderAuthorize2Request) GetMaxAge() int32` GetMaxAge returns the MaxAge field if non-nil, zero value otherwise. ### GetMaxAgeOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetMaxAgeOk() (*int32, bool)` +`func (o *OidcProviderAuthorize2Request) GetMaxAgeOk() (*int32, bool)` GetMaxAgeOk returns a tuple with the MaxAge field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxAge -`func (o *OIDCWriteProviderAuthorizeRequest) SetMaxAge(v int32)` +`func (o *OidcProviderAuthorize2Request) SetMaxAge(v int32)` SetMaxAge sets MaxAge field to given value. ### HasMaxAge -`func (o *OIDCWriteProviderAuthorizeRequest) HasMaxAge() bool` +`func (o *OidcProviderAuthorize2Request) HasMaxAge() bool` HasMaxAge returns a boolean if a field has been set. @@ -150,27 +150,27 @@ HasMaxAge returns a boolean if a field has been set. ### GetNonce -`func (o *OIDCWriteProviderAuthorizeRequest) GetNonce() string` +`func (o *OidcProviderAuthorize2Request) GetNonce() string` GetNonce returns the Nonce field if non-nil, zero value otherwise. ### GetNonceOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetNonceOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetNonceOk() (*string, bool)` GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNonce -`func (o *OIDCWriteProviderAuthorizeRequest) SetNonce(v string)` +`func (o *OidcProviderAuthorize2Request) SetNonce(v string)` SetNonce sets Nonce field to given value. ### HasNonce -`func (o *OIDCWriteProviderAuthorizeRequest) HasNonce() bool` +`func (o *OidcProviderAuthorize2Request) HasNonce() bool` HasNonce returns a boolean if a field has been set. @@ -179,20 +179,20 @@ HasNonce returns a boolean if a field has been set. ### GetRedirectUri -`func (o *OIDCWriteProviderAuthorizeRequest) GetRedirectUri() string` +`func (o *OidcProviderAuthorize2Request) GetRedirectUri() string` GetRedirectUri returns the RedirectUri field if non-nil, zero value otherwise. ### GetRedirectUriOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetRedirectUriOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetRedirectUriOk() (*string, bool)` GetRedirectUriOk returns a tuple with the RedirectUri field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRedirectUri -`func (o *OIDCWriteProviderAuthorizeRequest) SetRedirectUri(v string)` +`func (o *OidcProviderAuthorize2Request) SetRedirectUri(v string)` SetRedirectUri sets RedirectUri field to given value. @@ -202,20 +202,20 @@ SetRedirectUri sets RedirectUri field to given value. ### GetResponseType -`func (o *OIDCWriteProviderAuthorizeRequest) GetResponseType() string` +`func (o *OidcProviderAuthorize2Request) GetResponseType() string` GetResponseType returns the ResponseType field if non-nil, zero value otherwise. ### GetResponseTypeOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetResponseTypeOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetResponseTypeOk() (*string, bool)` GetResponseTypeOk returns a tuple with the ResponseType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetResponseType -`func (o *OIDCWriteProviderAuthorizeRequest) SetResponseType(v string)` +`func (o *OidcProviderAuthorize2Request) SetResponseType(v string)` SetResponseType sets ResponseType field to given value. @@ -225,20 +225,20 @@ SetResponseType sets ResponseType field to given value. ### GetScope -`func (o *OIDCWriteProviderAuthorizeRequest) GetScope() string` +`func (o *OidcProviderAuthorize2Request) GetScope() string` GetScope returns the Scope field if non-nil, zero value otherwise. ### GetScopeOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetScopeOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetScopeOk() (*string, bool)` GetScopeOk returns a tuple with the Scope field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetScope -`func (o *OIDCWriteProviderAuthorizeRequest) SetScope(v string)` +`func (o *OidcProviderAuthorize2Request) SetScope(v string)` SetScope sets Scope field to given value. @@ -248,27 +248,27 @@ SetScope sets Scope field to given value. ### GetState -`func (o *OIDCWriteProviderAuthorizeRequest) GetState() string` +`func (o *OidcProviderAuthorize2Request) GetState() string` GetState returns the State field if non-nil, zero value otherwise. ### GetStateOk -`func (o *OIDCWriteProviderAuthorizeRequest) GetStateOk() (*string, bool)` +`func (o *OidcProviderAuthorize2Request) GetStateOk() (*string, bool)` GetStateOk returns a tuple with the State field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetState -`func (o *OIDCWriteProviderAuthorizeRequest) SetState(v string)` +`func (o *OidcProviderAuthorize2Request) SetState(v string)` SetState sets State field to given value. ### HasState -`func (o *OIDCWriteProviderAuthorizeRequest) HasState() bool` +`func (o *OidcProviderAuthorize2Request) HasState() bool` HasState returns a boolean if a field has been set. diff --git a/docs/OIDCWriteProviderTokenRequest.md b/docs/OidcProviderTokenRequest.md similarity index 64% rename from docs/OIDCWriteProviderTokenRequest.md rename to docs/OidcProviderTokenRequest.md index 80e74907..ac53bd3a 100644 --- a/docs/OIDCWriteProviderTokenRequest.md +++ b/docs/OidcProviderTokenRequest.md @@ -1,4 +1,4 @@ -# OIDCWriteProviderTokenRequest +# OidcProviderTokenRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewOIDCWriteProviderTokenRequest +### NewOidcProviderTokenRequest -`func NewOIDCWriteProviderTokenRequest(code string, grantType string, redirectUri string, ) *OIDCWriteProviderTokenRequest` +`func NewOidcProviderTokenRequest(code string, grantType string, redirectUri string, ) *OidcProviderTokenRequest` -NewOIDCWriteProviderTokenRequest instantiates a new OIDCWriteProviderTokenRequest object +NewOidcProviderTokenRequest instantiates a new OidcProviderTokenRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOIDCWriteProviderTokenRequestWithDefaults +### NewOidcProviderTokenRequestWithDefaults -`func NewOIDCWriteProviderTokenRequestWithDefaults() *OIDCWriteProviderTokenRequest` +`func NewOidcProviderTokenRequestWithDefaults() *OidcProviderTokenRequest` -NewOIDCWriteProviderTokenRequestWithDefaults instantiates a new OIDCWriteProviderTokenRequest object +NewOidcProviderTokenRequestWithDefaults instantiates a new OidcProviderTokenRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetClientId -`func (o *OIDCWriteProviderTokenRequest) GetClientId() string` +`func (o *OidcProviderTokenRequest) GetClientId() string` GetClientId returns the ClientId field if non-nil, zero value otherwise. ### GetClientIdOk -`func (o *OIDCWriteProviderTokenRequest) GetClientIdOk() (*string, bool)` +`func (o *OidcProviderTokenRequest) GetClientIdOk() (*string, bool)` GetClientIdOk returns a tuple with the ClientId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientId -`func (o *OIDCWriteProviderTokenRequest) SetClientId(v string)` +`func (o *OidcProviderTokenRequest) SetClientId(v string)` SetClientId sets ClientId field to given value. ### HasClientId -`func (o *OIDCWriteProviderTokenRequest) HasClientId() bool` +`func (o *OidcProviderTokenRequest) HasClientId() bool` HasClientId returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasClientId returns a boolean if a field has been set. ### GetClientSecret -`func (o *OIDCWriteProviderTokenRequest) GetClientSecret() string` +`func (o *OidcProviderTokenRequest) GetClientSecret() string` GetClientSecret returns the ClientSecret field if non-nil, zero value otherwise. ### GetClientSecretOk -`func (o *OIDCWriteProviderTokenRequest) GetClientSecretOk() (*string, bool)` +`func (o *OidcProviderTokenRequest) GetClientSecretOk() (*string, bool)` GetClientSecretOk returns a tuple with the ClientSecret field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientSecret -`func (o *OIDCWriteProviderTokenRequest) SetClientSecret(v string)` +`func (o *OidcProviderTokenRequest) SetClientSecret(v string)` SetClientSecret sets ClientSecret field to given value. ### HasClientSecret -`func (o *OIDCWriteProviderTokenRequest) HasClientSecret() bool` +`func (o *OidcProviderTokenRequest) HasClientSecret() bool` HasClientSecret returns a boolean if a field has been set. @@ -95,20 +95,20 @@ HasClientSecret returns a boolean if a field has been set. ### GetCode -`func (o *OIDCWriteProviderTokenRequest) GetCode() string` +`func (o *OidcProviderTokenRequest) GetCode() string` GetCode returns the Code field if non-nil, zero value otherwise. ### GetCodeOk -`func (o *OIDCWriteProviderTokenRequest) GetCodeOk() (*string, bool)` +`func (o *OidcProviderTokenRequest) GetCodeOk() (*string, bool)` GetCodeOk returns a tuple with the Code field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCode -`func (o *OIDCWriteProviderTokenRequest) SetCode(v string)` +`func (o *OidcProviderTokenRequest) SetCode(v string)` SetCode sets Code field to given value. @@ -118,27 +118,27 @@ SetCode sets Code field to given value. ### GetCodeVerifier -`func (o *OIDCWriteProviderTokenRequest) GetCodeVerifier() string` +`func (o *OidcProviderTokenRequest) GetCodeVerifier() string` GetCodeVerifier returns the CodeVerifier field if non-nil, zero value otherwise. ### GetCodeVerifierOk -`func (o *OIDCWriteProviderTokenRequest) GetCodeVerifierOk() (*string, bool)` +`func (o *OidcProviderTokenRequest) GetCodeVerifierOk() (*string, bool)` GetCodeVerifierOk returns a tuple with the CodeVerifier field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCodeVerifier -`func (o *OIDCWriteProviderTokenRequest) SetCodeVerifier(v string)` +`func (o *OidcProviderTokenRequest) SetCodeVerifier(v string)` SetCodeVerifier sets CodeVerifier field to given value. ### HasCodeVerifier -`func (o *OIDCWriteProviderTokenRequest) HasCodeVerifier() bool` +`func (o *OidcProviderTokenRequest) HasCodeVerifier() bool` HasCodeVerifier returns a boolean if a field has been set. @@ -147,20 +147,20 @@ HasCodeVerifier returns a boolean if a field has been set. ### GetGrantType -`func (o *OIDCWriteProviderTokenRequest) GetGrantType() string` +`func (o *OidcProviderTokenRequest) GetGrantType() string` GetGrantType returns the GrantType field if non-nil, zero value otherwise. ### GetGrantTypeOk -`func (o *OIDCWriteProviderTokenRequest) GetGrantTypeOk() (*string, bool)` +`func (o *OidcProviderTokenRequest) GetGrantTypeOk() (*string, bool)` GetGrantTypeOk returns a tuple with the GrantType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGrantType -`func (o *OIDCWriteProviderTokenRequest) SetGrantType(v string)` +`func (o *OidcProviderTokenRequest) SetGrantType(v string)` SetGrantType sets GrantType field to given value. @@ -170,20 +170,20 @@ SetGrantType sets GrantType field to given value. ### GetRedirectUri -`func (o *OIDCWriteProviderTokenRequest) GetRedirectUri() string` +`func (o *OidcProviderTokenRequest) GetRedirectUri() string` GetRedirectUri returns the RedirectUri field if non-nil, zero value otherwise. ### GetRedirectUriOk -`func (o *OIDCWriteProviderTokenRequest) GetRedirectUriOk() (*string, bool)` +`func (o *OidcProviderTokenRequest) GetRedirectUriOk() (*string, bool)` GetRedirectUriOk returns a tuple with the RedirectUri field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRedirectUri -`func (o *OIDCWriteProviderTokenRequest) SetRedirectUri(v string)` +`func (o *OidcProviderTokenRequest) SetRedirectUri(v string)` SetRedirectUri sets RedirectUri field to given value. diff --git a/docs/OktaWriteConfigRequest.md b/docs/OktaConfigureRequest.md similarity index 70% rename from docs/OktaWriteConfigRequest.md rename to docs/OktaConfigureRequest.md index e5128e3a..52d9466f 100644 --- a/docs/OktaWriteConfigRequest.md +++ b/docs/OktaConfigureRequest.md @@ -1,4 +1,4 @@ -# OktaWriteConfigRequest +# OktaConfigureRequest ## Properties @@ -29,47 +29,47 @@ Name | Type | Description | Notes ## Methods -### NewOktaWriteConfigRequest +### NewOktaConfigureRequest -`func NewOktaWriteConfigRequest() *OktaWriteConfigRequest` +`func NewOktaConfigureRequest() *OktaConfigureRequest` -NewOktaWriteConfigRequest instantiates a new OktaWriteConfigRequest object +NewOktaConfigureRequest instantiates a new OktaConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewOktaWriteConfigRequestWithDefaults +### NewOktaConfigureRequestWithDefaults -`func NewOktaWriteConfigRequestWithDefaults() *OktaWriteConfigRequest` +`func NewOktaConfigureRequestWithDefaults() *OktaConfigureRequest` -NewOktaWriteConfigRequestWithDefaults instantiates a new OktaWriteConfigRequest object +NewOktaConfigureRequestWithDefaults instantiates a new OktaConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetApiToken -`func (o *OktaWriteConfigRequest) GetApiToken() string` +`func (o *OktaConfigureRequest) GetApiToken() string` GetApiToken returns the ApiToken field if non-nil, zero value otherwise. ### GetApiTokenOk -`func (o *OktaWriteConfigRequest) GetApiTokenOk() (*string, bool)` +`func (o *OktaConfigureRequest) GetApiTokenOk() (*string, bool)` GetApiTokenOk returns a tuple with the ApiToken field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetApiToken -`func (o *OktaWriteConfigRequest) SetApiToken(v string)` +`func (o *OktaConfigureRequest) SetApiToken(v string)` SetApiToken sets ApiToken field to given value. ### HasApiToken -`func (o *OktaWriteConfigRequest) HasApiToken() bool` +`func (o *OktaConfigureRequest) HasApiToken() bool` HasApiToken returns a boolean if a field has been set. @@ -78,27 +78,27 @@ HasApiToken returns a boolean if a field has been set. ### GetBaseUrl -`func (o *OktaWriteConfigRequest) GetBaseUrl() string` +`func (o *OktaConfigureRequest) GetBaseUrl() string` GetBaseUrl returns the BaseUrl field if non-nil, zero value otherwise. ### GetBaseUrlOk -`func (o *OktaWriteConfigRequest) GetBaseUrlOk() (*string, bool)` +`func (o *OktaConfigureRequest) GetBaseUrlOk() (*string, bool)` GetBaseUrlOk returns a tuple with the BaseUrl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBaseUrl -`func (o *OktaWriteConfigRequest) SetBaseUrl(v string)` +`func (o *OktaConfigureRequest) SetBaseUrl(v string)` SetBaseUrl sets BaseUrl field to given value. ### HasBaseUrl -`func (o *OktaWriteConfigRequest) HasBaseUrl() bool` +`func (o *OktaConfigureRequest) HasBaseUrl() bool` HasBaseUrl returns a boolean if a field has been set. @@ -107,27 +107,27 @@ HasBaseUrl returns a boolean if a field has been set. ### GetBypassOktaMfa -`func (o *OktaWriteConfigRequest) GetBypassOktaMfa() bool` +`func (o *OktaConfigureRequest) GetBypassOktaMfa() bool` GetBypassOktaMfa returns the BypassOktaMfa field if non-nil, zero value otherwise. ### GetBypassOktaMfaOk -`func (o *OktaWriteConfigRequest) GetBypassOktaMfaOk() (*bool, bool)` +`func (o *OktaConfigureRequest) GetBypassOktaMfaOk() (*bool, bool)` GetBypassOktaMfaOk returns a tuple with the BypassOktaMfa field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBypassOktaMfa -`func (o *OktaWriteConfigRequest) SetBypassOktaMfa(v bool)` +`func (o *OktaConfigureRequest) SetBypassOktaMfa(v bool)` SetBypassOktaMfa sets BypassOktaMfa field to given value. ### HasBypassOktaMfa -`func (o *OktaWriteConfigRequest) HasBypassOktaMfa() bool` +`func (o *OktaConfigureRequest) HasBypassOktaMfa() bool` HasBypassOktaMfa returns a boolean if a field has been set. @@ -136,27 +136,27 @@ HasBypassOktaMfa returns a boolean if a field has been set. ### GetMaxTtl -`func (o *OktaWriteConfigRequest) GetMaxTtl() int32` +`func (o *OktaConfigureRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *OktaWriteConfigRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *OktaConfigureRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *OktaWriteConfigRequest) SetMaxTtl(v int32)` +`func (o *OktaConfigureRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *OktaWriteConfigRequest) HasMaxTtl() bool` +`func (o *OktaConfigureRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -165,27 +165,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetOrgName -`func (o *OktaWriteConfigRequest) GetOrgName() string` +`func (o *OktaConfigureRequest) GetOrgName() string` GetOrgName returns the OrgName field if non-nil, zero value otherwise. ### GetOrgNameOk -`func (o *OktaWriteConfigRequest) GetOrgNameOk() (*string, bool)` +`func (o *OktaConfigureRequest) GetOrgNameOk() (*string, bool)` GetOrgNameOk returns a tuple with the OrgName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrgName -`func (o *OktaWriteConfigRequest) SetOrgName(v string)` +`func (o *OktaConfigureRequest) SetOrgName(v string)` SetOrgName sets OrgName field to given value. ### HasOrgName -`func (o *OktaWriteConfigRequest) HasOrgName() bool` +`func (o *OktaConfigureRequest) HasOrgName() bool` HasOrgName returns a boolean if a field has been set. @@ -194,27 +194,27 @@ HasOrgName returns a boolean if a field has been set. ### GetOrganization -`func (o *OktaWriteConfigRequest) GetOrganization() string` +`func (o *OktaConfigureRequest) GetOrganization() string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *OktaWriteConfigRequest) GetOrganizationOk() (*string, bool)` +`func (o *OktaConfigureRequest) GetOrganizationOk() (*string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *OktaWriteConfigRequest) SetOrganization(v string)` +`func (o *OktaConfigureRequest) SetOrganization(v string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *OktaWriteConfigRequest) HasOrganization() bool` +`func (o *OktaConfigureRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -223,27 +223,27 @@ HasOrganization returns a boolean if a field has been set. ### GetProduction -`func (o *OktaWriteConfigRequest) GetProduction() bool` +`func (o *OktaConfigureRequest) GetProduction() bool` GetProduction returns the Production field if non-nil, zero value otherwise. ### GetProductionOk -`func (o *OktaWriteConfigRequest) GetProductionOk() (*bool, bool)` +`func (o *OktaConfigureRequest) GetProductionOk() (*bool, bool)` GetProductionOk returns a tuple with the Production field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProduction -`func (o *OktaWriteConfigRequest) SetProduction(v bool)` +`func (o *OktaConfigureRequest) SetProduction(v bool)` SetProduction sets Production field to given value. ### HasProduction -`func (o *OktaWriteConfigRequest) HasProduction() bool` +`func (o *OktaConfigureRequest) HasProduction() bool` HasProduction returns a boolean if a field has been set. @@ -252,27 +252,27 @@ HasProduction returns a boolean if a field has been set. ### GetToken -`func (o *OktaWriteConfigRequest) GetToken() string` +`func (o *OktaConfigureRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *OktaWriteConfigRequest) GetTokenOk() (*string, bool)` +`func (o *OktaConfigureRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *OktaWriteConfigRequest) SetToken(v string)` +`func (o *OktaConfigureRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *OktaWriteConfigRequest) HasToken() bool` +`func (o *OktaConfigureRequest) HasToken() bool` HasToken returns a boolean if a field has been set. @@ -281,27 +281,27 @@ HasToken returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *OktaWriteConfigRequest) GetTokenBoundCidrs() []string` +`func (o *OktaConfigureRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *OktaWriteConfigRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *OktaConfigureRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *OktaWriteConfigRequest) SetTokenBoundCidrs(v []string)` +`func (o *OktaConfigureRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *OktaWriteConfigRequest) HasTokenBoundCidrs() bool` +`func (o *OktaConfigureRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -310,27 +310,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *OktaWriteConfigRequest) GetTokenExplicitMaxTtl() int32` +`func (o *OktaConfigureRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *OktaWriteConfigRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *OktaConfigureRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *OktaWriteConfigRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *OktaConfigureRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *OktaWriteConfigRequest) HasTokenExplicitMaxTtl() bool` +`func (o *OktaConfigureRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -339,27 +339,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *OktaWriteConfigRequest) GetTokenMaxTtl() int32` +`func (o *OktaConfigureRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *OktaWriteConfigRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *OktaConfigureRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *OktaWriteConfigRequest) SetTokenMaxTtl(v int32)` +`func (o *OktaConfigureRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *OktaWriteConfigRequest) HasTokenMaxTtl() bool` +`func (o *OktaConfigureRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -368,27 +368,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *OktaWriteConfigRequest) GetTokenNoDefaultPolicy() bool` +`func (o *OktaConfigureRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *OktaWriteConfigRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *OktaConfigureRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *OktaWriteConfigRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *OktaConfigureRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *OktaWriteConfigRequest) HasTokenNoDefaultPolicy() bool` +`func (o *OktaConfigureRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -397,27 +397,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *OktaWriteConfigRequest) GetTokenNumUses() int32` +`func (o *OktaConfigureRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *OktaWriteConfigRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *OktaConfigureRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *OktaWriteConfigRequest) SetTokenNumUses(v int32)` +`func (o *OktaConfigureRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *OktaWriteConfigRequest) HasTokenNumUses() bool` +`func (o *OktaConfigureRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -426,27 +426,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *OktaWriteConfigRequest) GetTokenPeriod() int32` +`func (o *OktaConfigureRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *OktaWriteConfigRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *OktaConfigureRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *OktaWriteConfigRequest) SetTokenPeriod(v int32)` +`func (o *OktaConfigureRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *OktaWriteConfigRequest) HasTokenPeriod() bool` +`func (o *OktaConfigureRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -455,27 +455,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *OktaWriteConfigRequest) GetTokenPolicies() []string` +`func (o *OktaConfigureRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *OktaWriteConfigRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *OktaConfigureRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *OktaWriteConfigRequest) SetTokenPolicies(v []string)` +`func (o *OktaConfigureRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *OktaWriteConfigRequest) HasTokenPolicies() bool` +`func (o *OktaConfigureRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -484,27 +484,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *OktaWriteConfigRequest) GetTokenTtl() int32` +`func (o *OktaConfigureRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *OktaWriteConfigRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *OktaConfigureRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *OktaWriteConfigRequest) SetTokenTtl(v int32)` +`func (o *OktaConfigureRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *OktaWriteConfigRequest) HasTokenTtl() bool` +`func (o *OktaConfigureRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -513,27 +513,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *OktaWriteConfigRequest) GetTokenType() string` +`func (o *OktaConfigureRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *OktaWriteConfigRequest) GetTokenTypeOk() (*string, bool)` +`func (o *OktaConfigureRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *OktaWriteConfigRequest) SetTokenType(v string)` +`func (o *OktaConfigureRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *OktaWriteConfigRequest) HasTokenType() bool` +`func (o *OktaConfigureRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -542,27 +542,27 @@ HasTokenType returns a boolean if a field has been set. ### GetTtl -`func (o *OktaWriteConfigRequest) GetTtl() int32` +`func (o *OktaConfigureRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *OktaWriteConfigRequest) GetTtlOk() (*int32, bool)` +`func (o *OktaConfigureRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *OktaWriteConfigRequest) SetTtl(v int32)` +`func (o *OktaConfigureRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *OktaWriteConfigRequest) HasTtl() bool` +`func (o *OktaConfigureRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/OpenLDAPCheckInManageLibraryRequest.md b/docs/OpenLDAPCheckInManageLibraryRequest.md deleted file mode 100644 index 632e8612..00000000 --- a/docs/OpenLDAPCheckInManageLibraryRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# OpenLDAPCheckInManageLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**ServiceAccountNames** | Pointer to **[]string** | The username/logon name for the service accounts to check in. | [optional] - - - -## Methods - - -### NewOpenLDAPCheckInManageLibraryRequest - -`func NewOpenLDAPCheckInManageLibraryRequest() *OpenLDAPCheckInManageLibraryRequest` - -NewOpenLDAPCheckInManageLibraryRequest instantiates a new OpenLDAPCheckInManageLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOpenLDAPCheckInManageLibraryRequestWithDefaults - -`func NewOpenLDAPCheckInManageLibraryRequestWithDefaults() *OpenLDAPCheckInManageLibraryRequest` - -NewOpenLDAPCheckInManageLibraryRequestWithDefaults instantiates a new OpenLDAPCheckInManageLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetServiceAccountNames - -`func (o *OpenLDAPCheckInManageLibraryRequest) GetServiceAccountNames() []string` - -GetServiceAccountNames returns the ServiceAccountNames field if non-nil, zero value otherwise. - -### GetServiceAccountNamesOk - -`func (o *OpenLDAPCheckInManageLibraryRequest) GetServiceAccountNamesOk() (*[]string, bool)` - -GetServiceAccountNamesOk returns a tuple with the ServiceAccountNames field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetServiceAccountNames - -`func (o *OpenLDAPCheckInManageLibraryRequest) SetServiceAccountNames(v []string)` - -SetServiceAccountNames sets ServiceAccountNames field to given value. - - -### HasServiceAccountNames - -`func (o *OpenLDAPCheckInManageLibraryRequest) HasServiceAccountNames() bool` - -HasServiceAccountNames returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/OpenLDAPCheckOutLibraryRequest.md b/docs/OpenLDAPCheckOutLibraryRequest.md deleted file mode 100644 index 25623676..00000000 --- a/docs/OpenLDAPCheckOutLibraryRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# OpenLDAPCheckOutLibraryRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Ttl** | Pointer to **int32** | The length of time before the check-out will expire, in seconds. | [optional] - - - -## Methods - - -### NewOpenLDAPCheckOutLibraryRequest - -`func NewOpenLDAPCheckOutLibraryRequest() *OpenLDAPCheckOutLibraryRequest` - -NewOpenLDAPCheckOutLibraryRequest instantiates a new OpenLDAPCheckOutLibraryRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOpenLDAPCheckOutLibraryRequestWithDefaults - -`func NewOpenLDAPCheckOutLibraryRequestWithDefaults() *OpenLDAPCheckOutLibraryRequest` - -NewOpenLDAPCheckOutLibraryRequestWithDefaults instantiates a new OpenLDAPCheckOutLibraryRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetTtl - -`func (o *OpenLDAPCheckOutLibraryRequest) GetTtl() int32` - -GetTtl returns the Ttl field if non-nil, zero value otherwise. - -### GetTtlOk - -`func (o *OpenLDAPCheckOutLibraryRequest) GetTtlOk() (*int32, bool)` - -GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTtl - -`func (o *OpenLDAPCheckOutLibraryRequest) SetTtl(v int32)` - -SetTtl sets Ttl field to given value. - - -### HasTtl - -`func (o *OpenLDAPCheckOutLibraryRequest) HasTtl() bool` - -HasTtl returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/OpenLDAPWriteRoleRequest.md b/docs/OpenLDAPWriteRoleRequest.md deleted file mode 100644 index 46a7f503..00000000 --- a/docs/OpenLDAPWriteRoleRequest.md +++ /dev/null @@ -1,207 +0,0 @@ -# OpenLDAPWriteRoleRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**CreationLdif** | **string** | LDIF string used to create new entities within the LDAP system. This LDIF can be templated. | -**DefaultTtl** | Pointer to **int32** | Default TTL for dynamic credentials | [optional] -**DeletionLdif** | **string** | LDIF string used to delete entities created within the LDAP system. This LDIF can be templated. | -**MaxTtl** | Pointer to **int32** | Max TTL a dynamic credential can be extended to | [optional] -**RollbackLdif** | Pointer to **string** | LDIF string used to rollback changes in the event of a failure to create credentials. This LDIF can be templated. | [optional] -**UsernameTemplate** | Pointer to **string** | The template used to create a username | [optional] - - - -## Methods - - -### NewOpenLDAPWriteRoleRequest - -`func NewOpenLDAPWriteRoleRequest(creationLdif string, deletionLdif string, ) *OpenLDAPWriteRoleRequest` - -NewOpenLDAPWriteRoleRequest instantiates a new OpenLDAPWriteRoleRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOpenLDAPWriteRoleRequestWithDefaults - -`func NewOpenLDAPWriteRoleRequestWithDefaults() *OpenLDAPWriteRoleRequest` - -NewOpenLDAPWriteRoleRequestWithDefaults instantiates a new OpenLDAPWriteRoleRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetCreationLdif - -`func (o *OpenLDAPWriteRoleRequest) GetCreationLdif() string` - -GetCreationLdif returns the CreationLdif field if non-nil, zero value otherwise. - -### GetCreationLdifOk - -`func (o *OpenLDAPWriteRoleRequest) GetCreationLdifOk() (*string, bool)` - -GetCreationLdifOk returns a tuple with the CreationLdif field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCreationLdif - -`func (o *OpenLDAPWriteRoleRequest) SetCreationLdif(v string)` - -SetCreationLdif sets CreationLdif field to given value. - - - - - -### GetDefaultTtl - -`func (o *OpenLDAPWriteRoleRequest) GetDefaultTtl() int32` - -GetDefaultTtl returns the DefaultTtl field if non-nil, zero value otherwise. - -### GetDefaultTtlOk - -`func (o *OpenLDAPWriteRoleRequest) GetDefaultTtlOk() (*int32, bool)` - -GetDefaultTtlOk returns a tuple with the DefaultTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDefaultTtl - -`func (o *OpenLDAPWriteRoleRequest) SetDefaultTtl(v int32)` - -SetDefaultTtl sets DefaultTtl field to given value. - - -### HasDefaultTtl - -`func (o *OpenLDAPWriteRoleRequest) HasDefaultTtl() bool` - -HasDefaultTtl returns a boolean if a field has been set. - - - - -### GetDeletionLdif - -`func (o *OpenLDAPWriteRoleRequest) GetDeletionLdif() string` - -GetDeletionLdif returns the DeletionLdif field if non-nil, zero value otherwise. - -### GetDeletionLdifOk - -`func (o *OpenLDAPWriteRoleRequest) GetDeletionLdifOk() (*string, bool)` - -GetDeletionLdifOk returns a tuple with the DeletionLdif field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDeletionLdif - -`func (o *OpenLDAPWriteRoleRequest) SetDeletionLdif(v string)` - -SetDeletionLdif sets DeletionLdif field to given value. - - - - - -### GetMaxTtl - -`func (o *OpenLDAPWriteRoleRequest) GetMaxTtl() int32` - -GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. - -### GetMaxTtlOk - -`func (o *OpenLDAPWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` - -GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetMaxTtl - -`func (o *OpenLDAPWriteRoleRequest) SetMaxTtl(v int32)` - -SetMaxTtl sets MaxTtl field to given value. - - -### HasMaxTtl - -`func (o *OpenLDAPWriteRoleRequest) HasMaxTtl() bool` - -HasMaxTtl returns a boolean if a field has been set. - - - - -### GetRollbackLdif - -`func (o *OpenLDAPWriteRoleRequest) GetRollbackLdif() string` - -GetRollbackLdif returns the RollbackLdif field if non-nil, zero value otherwise. - -### GetRollbackLdifOk - -`func (o *OpenLDAPWriteRoleRequest) GetRollbackLdifOk() (*string, bool)` - -GetRollbackLdifOk returns a tuple with the RollbackLdif field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRollbackLdif - -`func (o *OpenLDAPWriteRoleRequest) SetRollbackLdif(v string)` - -SetRollbackLdif sets RollbackLdif field to given value. - - -### HasRollbackLdif - -`func (o *OpenLDAPWriteRoleRequest) HasRollbackLdif() bool` - -HasRollbackLdif returns a boolean if a field has been set. - - - - -### GetUsernameTemplate - -`func (o *OpenLDAPWriteRoleRequest) GetUsernameTemplate() string` - -GetUsernameTemplate returns the UsernameTemplate field if non-nil, zero value otherwise. - -### GetUsernameTemplateOk - -`func (o *OpenLDAPWriteRoleRequest) GetUsernameTemplateOk() (*string, bool)` - -GetUsernameTemplateOk returns a tuple with the UsernameTemplate field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUsernameTemplate - -`func (o *OpenLDAPWriteRoleRequest) SetUsernameTemplate(v string)` - -SetUsernameTemplate sets UsernameTemplate field to given value. - - -### HasUsernameTemplate - -`func (o *OpenLDAPWriteRoleRequest) HasUsernameTemplate() bool` - -HasUsernameTemplate returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/OpenLDAPWriteStaticRoleRequest.md b/docs/OpenLDAPWriteStaticRoleRequest.md deleted file mode 100644 index 9855e15d..00000000 --- a/docs/OpenLDAPWriteStaticRoleRequest.md +++ /dev/null @@ -1,129 +0,0 @@ -# OpenLDAPWriteStaticRoleRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Dn** | Pointer to **string** | The distinguished name of the entry to manage. | [optional] -**RotationPeriod** | Pointer to **int32** | Period for automatic credential rotation of the given entry. | [optional] -**Username** | Pointer to **string** | The username/logon name for the entry with which this role will be associated. | [optional] - - - -## Methods - - -### NewOpenLDAPWriteStaticRoleRequest - -`func NewOpenLDAPWriteStaticRoleRequest() *OpenLDAPWriteStaticRoleRequest` - -NewOpenLDAPWriteStaticRoleRequest instantiates a new OpenLDAPWriteStaticRoleRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewOpenLDAPWriteStaticRoleRequestWithDefaults - -`func NewOpenLDAPWriteStaticRoleRequestWithDefaults() *OpenLDAPWriteStaticRoleRequest` - -NewOpenLDAPWriteStaticRoleRequestWithDefaults instantiates a new OpenLDAPWriteStaticRoleRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetDn - -`func (o *OpenLDAPWriteStaticRoleRequest) GetDn() string` - -GetDn returns the Dn field if non-nil, zero value otherwise. - -### GetDnOk - -`func (o *OpenLDAPWriteStaticRoleRequest) GetDnOk() (*string, bool)` - -GetDnOk returns a tuple with the Dn field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetDn - -`func (o *OpenLDAPWriteStaticRoleRequest) SetDn(v string)` - -SetDn sets Dn field to given value. - - -### HasDn - -`func (o *OpenLDAPWriteStaticRoleRequest) HasDn() bool` - -HasDn returns a boolean if a field has been set. - - - - -### GetRotationPeriod - -`func (o *OpenLDAPWriteStaticRoleRequest) GetRotationPeriod() int32` - -GetRotationPeriod returns the RotationPeriod field if non-nil, zero value otherwise. - -### GetRotationPeriodOk - -`func (o *OpenLDAPWriteStaticRoleRequest) GetRotationPeriodOk() (*int32, bool)` - -GetRotationPeriodOk returns a tuple with the RotationPeriod field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRotationPeriod - -`func (o *OpenLDAPWriteStaticRoleRequest) SetRotationPeriod(v int32)` - -SetRotationPeriod sets RotationPeriod field to given value. - - -### HasRotationPeriod - -`func (o *OpenLDAPWriteStaticRoleRequest) HasRotationPeriod() bool` - -HasRotationPeriod returns a boolean if a field has been set. - - - - -### GetUsername - -`func (o *OpenLDAPWriteStaticRoleRequest) GetUsername() string` - -GetUsername returns the Username field if non-nil, zero value otherwise. - -### GetUsernameOk - -`func (o *OpenLDAPWriteStaticRoleRequest) GetUsernameOk() (*string, bool)` - -GetUsernameOk returns a tuple with the Username field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUsername - -`func (o *OpenLDAPWriteStaticRoleRequest) SetUsername(v string)` - -SetUsername sets Username field to given value. - - -### HasUsername - -`func (o *OpenLDAPWriteStaticRoleRequest) HasUsername() bool` - -HasUsername returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/PKIGenerateRootRequest.md b/docs/PKIGenerateRootRequest.md index 7e8b6148..987202fb 100644 --- a/docs/PKIGenerateRootRequest.md +++ b/docs/PKIGenerateRootRequest.md @@ -1,4 +1,4 @@ -# PKIGenerateRootRequest +# PkiGenerateRootRequest ## Properties @@ -41,47 +41,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIGenerateRootRequest +### NewPkiGenerateRootRequest -`func NewPKIGenerateRootRequest() *PKIGenerateRootRequest` +`func NewPkiGenerateRootRequest() *PkiGenerateRootRequest` -NewPKIGenerateRootRequest instantiates a new PKIGenerateRootRequest object +NewPkiGenerateRootRequest instantiates a new PkiGenerateRootRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIGenerateRootRequestWithDefaults +### NewPkiGenerateRootRequestWithDefaults -`func NewPKIGenerateRootRequestWithDefaults() *PKIGenerateRootRequest` +`func NewPkiGenerateRootRequestWithDefaults() *PkiGenerateRootRequest` -NewPKIGenerateRootRequestWithDefaults instantiates a new PKIGenerateRootRequest object +NewPkiGenerateRootRequestWithDefaults instantiates a new PkiGenerateRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIGenerateRootRequest) GetAltNames() string` +`func (o *PkiGenerateRootRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIGenerateRootRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIGenerateRootRequest) SetAltNames(v string)` +`func (o *PkiGenerateRootRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIGenerateRootRequest) HasAltNames() bool` +`func (o *PkiGenerateRootRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -90,27 +90,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIGenerateRootRequest) GetCommonName() string` +`func (o *PkiGenerateRootRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIGenerateRootRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIGenerateRootRequest) SetCommonName(v string)` +`func (o *PkiGenerateRootRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIGenerateRootRequest) HasCommonName() bool` +`func (o *PkiGenerateRootRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -119,27 +119,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIGenerateRootRequest) GetCountry() []string` +`func (o *PkiGenerateRootRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIGenerateRootRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIGenerateRootRequest) SetCountry(v []string)` +`func (o *PkiGenerateRootRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIGenerateRootRequest) HasCountry() bool` +`func (o *PkiGenerateRootRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -148,27 +148,27 @@ HasCountry returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIGenerateRootRequest) GetExcludeCnFromSans() bool` +`func (o *PkiGenerateRootRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIGenerateRootRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiGenerateRootRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIGenerateRootRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiGenerateRootRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIGenerateRootRequest) HasExcludeCnFromSans() bool` +`func (o *PkiGenerateRootRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -177,27 +177,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIGenerateRootRequest) GetFormat() string` +`func (o *PkiGenerateRootRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIGenerateRootRequest) GetFormatOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIGenerateRootRequest) SetFormat(v string)` +`func (o *PkiGenerateRootRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIGenerateRootRequest) HasFormat() bool` +`func (o *PkiGenerateRootRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -206,27 +206,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIGenerateRootRequest) GetIpSans() []string` +`func (o *PkiGenerateRootRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIGenerateRootRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIGenerateRootRequest) SetIpSans(v []string)` +`func (o *PkiGenerateRootRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIGenerateRootRequest) HasIpSans() bool` +`func (o *PkiGenerateRootRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -235,27 +235,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerName -`func (o *PKIGenerateRootRequest) GetIssuerName() string` +`func (o *PkiGenerateRootRequest) GetIssuerName() string` GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. ### GetIssuerNameOk -`func (o *PKIGenerateRootRequest) GetIssuerNameOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetIssuerNameOk() (*string, bool)` GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerName -`func (o *PKIGenerateRootRequest) SetIssuerName(v string)` +`func (o *PkiGenerateRootRequest) SetIssuerName(v string)` SetIssuerName sets IssuerName field to given value. ### HasIssuerName -`func (o *PKIGenerateRootRequest) HasIssuerName() bool` +`func (o *PkiGenerateRootRequest) HasIssuerName() bool` HasIssuerName returns a boolean if a field has been set. @@ -264,27 +264,27 @@ HasIssuerName returns a boolean if a field has been set. ### GetKeyBits -`func (o *PKIGenerateRootRequest) GetKeyBits() int32` +`func (o *PkiGenerateRootRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIGenerateRootRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiGenerateRootRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIGenerateRootRequest) SetKeyBits(v int32)` +`func (o *PkiGenerateRootRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIGenerateRootRequest) HasKeyBits() bool` +`func (o *PkiGenerateRootRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -293,27 +293,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIGenerateRootRequest) GetKeyName() string` +`func (o *PkiGenerateRootRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIGenerateRootRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIGenerateRootRequest) SetKeyName(v string)` +`func (o *PkiGenerateRootRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIGenerateRootRequest) HasKeyName() bool` +`func (o *PkiGenerateRootRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -322,27 +322,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyRef -`func (o *PKIGenerateRootRequest) GetKeyRef() string` +`func (o *PkiGenerateRootRequest) GetKeyRef() string` GetKeyRef returns the KeyRef field if non-nil, zero value otherwise. ### GetKeyRefOk -`func (o *PKIGenerateRootRequest) GetKeyRefOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetKeyRefOk() (*string, bool)` GetKeyRefOk returns a tuple with the KeyRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyRef -`func (o *PKIGenerateRootRequest) SetKeyRef(v string)` +`func (o *PkiGenerateRootRequest) SetKeyRef(v string)` SetKeyRef sets KeyRef field to given value. ### HasKeyRef -`func (o *PKIGenerateRootRequest) HasKeyRef() bool` +`func (o *PkiGenerateRootRequest) HasKeyRef() bool` HasKeyRef returns a boolean if a field has been set. @@ -351,27 +351,27 @@ HasKeyRef returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIGenerateRootRequest) GetKeyType() string` +`func (o *PkiGenerateRootRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIGenerateRootRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIGenerateRootRequest) SetKeyType(v string)` +`func (o *PkiGenerateRootRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIGenerateRootRequest) HasKeyType() bool` +`func (o *PkiGenerateRootRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -380,27 +380,27 @@ HasKeyType returns a boolean if a field has been set. ### GetLocality -`func (o *PKIGenerateRootRequest) GetLocality() []string` +`func (o *PkiGenerateRootRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIGenerateRootRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIGenerateRootRequest) SetLocality(v []string)` +`func (o *PkiGenerateRootRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIGenerateRootRequest) HasLocality() bool` +`func (o *PkiGenerateRootRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -409,27 +409,27 @@ HasLocality returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIGenerateRootRequest) GetManagedKeyId() string` +`func (o *PkiGenerateRootRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIGenerateRootRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIGenerateRootRequest) SetManagedKeyId(v string)` +`func (o *PkiGenerateRootRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIGenerateRootRequest) HasManagedKeyId() bool` +`func (o *PkiGenerateRootRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -438,27 +438,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIGenerateRootRequest) GetManagedKeyName() string` +`func (o *PkiGenerateRootRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIGenerateRootRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIGenerateRootRequest) SetManagedKeyName(v string)` +`func (o *PkiGenerateRootRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIGenerateRootRequest) HasManagedKeyName() bool` +`func (o *PkiGenerateRootRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. @@ -467,27 +467,27 @@ HasManagedKeyName returns a boolean if a field has been set. ### GetMaxPathLength -`func (o *PKIGenerateRootRequest) GetMaxPathLength() int32` +`func (o *PkiGenerateRootRequest) GetMaxPathLength() int32` GetMaxPathLength returns the MaxPathLength field if non-nil, zero value otherwise. ### GetMaxPathLengthOk -`func (o *PKIGenerateRootRequest) GetMaxPathLengthOk() (*int32, bool)` +`func (o *PkiGenerateRootRequest) GetMaxPathLengthOk() (*int32, bool)` GetMaxPathLengthOk returns a tuple with the MaxPathLength field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxPathLength -`func (o *PKIGenerateRootRequest) SetMaxPathLength(v int32)` +`func (o *PkiGenerateRootRequest) SetMaxPathLength(v int32)` SetMaxPathLength sets MaxPathLength field to given value. ### HasMaxPathLength -`func (o *PKIGenerateRootRequest) HasMaxPathLength() bool` +`func (o *PkiGenerateRootRequest) HasMaxPathLength() bool` HasMaxPathLength returns a boolean if a field has been set. @@ -496,27 +496,27 @@ HasMaxPathLength returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIGenerateRootRequest) GetNotAfter() string` +`func (o *PkiGenerateRootRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIGenerateRootRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIGenerateRootRequest) SetNotAfter(v string)` +`func (o *PkiGenerateRootRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIGenerateRootRequest) HasNotAfter() bool` +`func (o *PkiGenerateRootRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -525,27 +525,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIGenerateRootRequest) GetNotBeforeDuration() int32` +`func (o *PkiGenerateRootRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIGenerateRootRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiGenerateRootRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIGenerateRootRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiGenerateRootRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIGenerateRootRequest) HasNotBeforeDuration() bool` +`func (o *PkiGenerateRootRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -554,27 +554,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIGenerateRootRequest) GetOrganization() []string` +`func (o *PkiGenerateRootRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIGenerateRootRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIGenerateRootRequest) SetOrganization(v []string)` +`func (o *PkiGenerateRootRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIGenerateRootRequest) HasOrganization() bool` +`func (o *PkiGenerateRootRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -583,27 +583,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIGenerateRootRequest) GetOtherSans() []string` +`func (o *PkiGenerateRootRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIGenerateRootRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIGenerateRootRequest) SetOtherSans(v []string)` +`func (o *PkiGenerateRootRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIGenerateRootRequest) HasOtherSans() bool` +`func (o *PkiGenerateRootRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -612,27 +612,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIGenerateRootRequest) GetOu() []string` +`func (o *PkiGenerateRootRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIGenerateRootRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIGenerateRootRequest) SetOu(v []string)` +`func (o *PkiGenerateRootRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIGenerateRootRequest) HasOu() bool` +`func (o *PkiGenerateRootRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -641,27 +641,27 @@ HasOu returns a boolean if a field has been set. ### GetPermittedDnsDomains -`func (o *PKIGenerateRootRequest) GetPermittedDnsDomains() []string` +`func (o *PkiGenerateRootRequest) GetPermittedDnsDomains() []string` GetPermittedDnsDomains returns the PermittedDnsDomains field if non-nil, zero value otherwise. ### GetPermittedDnsDomainsOk -`func (o *PKIGenerateRootRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` GetPermittedDnsDomainsOk returns a tuple with the PermittedDnsDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPermittedDnsDomains -`func (o *PKIGenerateRootRequest) SetPermittedDnsDomains(v []string)` +`func (o *PkiGenerateRootRequest) SetPermittedDnsDomains(v []string)` SetPermittedDnsDomains sets PermittedDnsDomains field to given value. ### HasPermittedDnsDomains -`func (o *PKIGenerateRootRequest) HasPermittedDnsDomains() bool` +`func (o *PkiGenerateRootRequest) HasPermittedDnsDomains() bool` HasPermittedDnsDomains returns a boolean if a field has been set. @@ -670,27 +670,27 @@ HasPermittedDnsDomains returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIGenerateRootRequest) GetPostalCode() []string` +`func (o *PkiGenerateRootRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIGenerateRootRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIGenerateRootRequest) SetPostalCode(v []string)` +`func (o *PkiGenerateRootRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIGenerateRootRequest) HasPostalCode() bool` +`func (o *PkiGenerateRootRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -699,27 +699,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIGenerateRootRequest) GetPrivateKeyFormat() string` +`func (o *PkiGenerateRootRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIGenerateRootRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIGenerateRootRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiGenerateRootRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIGenerateRootRequest) HasPrivateKeyFormat() bool` +`func (o *PkiGenerateRootRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -728,27 +728,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIGenerateRootRequest) GetProvince() []string` +`func (o *PkiGenerateRootRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIGenerateRootRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIGenerateRootRequest) SetProvince(v []string)` +`func (o *PkiGenerateRootRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIGenerateRootRequest) HasProvince() bool` +`func (o *PkiGenerateRootRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -757,27 +757,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIGenerateRootRequest) GetSerialNumber() string` +`func (o *PkiGenerateRootRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIGenerateRootRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiGenerateRootRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIGenerateRootRequest) SetSerialNumber(v string)` +`func (o *PkiGenerateRootRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIGenerateRootRequest) HasSerialNumber() bool` +`func (o *PkiGenerateRootRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -786,27 +786,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIGenerateRootRequest) GetSignatureBits() int32` +`func (o *PkiGenerateRootRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIGenerateRootRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiGenerateRootRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIGenerateRootRequest) SetSignatureBits(v int32)` +`func (o *PkiGenerateRootRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIGenerateRootRequest) HasSignatureBits() bool` +`func (o *PkiGenerateRootRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -815,27 +815,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIGenerateRootRequest) GetStreetAddress() []string` +`func (o *PkiGenerateRootRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIGenerateRootRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIGenerateRootRequest) SetStreetAddress(v []string)` +`func (o *PkiGenerateRootRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIGenerateRootRequest) HasStreetAddress() bool` +`func (o *PkiGenerateRootRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -844,27 +844,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIGenerateRootRequest) GetTtl() int32` +`func (o *PkiGenerateRootRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIGenerateRootRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiGenerateRootRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIGenerateRootRequest) SetTtl(v int32)` +`func (o *PkiGenerateRootRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIGenerateRootRequest) HasTtl() bool` +`func (o *PkiGenerateRootRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -873,27 +873,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIGenerateRootRequest) GetUriSans() []string` +`func (o *PkiGenerateRootRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIGenerateRootRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiGenerateRootRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIGenerateRootRequest) SetUriSans(v []string)` +`func (o *PkiGenerateRootRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIGenerateRootRequest) HasUriSans() bool` +`func (o *PkiGenerateRootRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -902,27 +902,27 @@ HasUriSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIGenerateRootRequest) GetUsePss() bool` +`func (o *PkiGenerateRootRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIGenerateRootRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiGenerateRootRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIGenerateRootRequest) SetUsePss(v bool)` +`func (o *PkiGenerateRootRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIGenerateRootRequest) HasUsePss() bool` +`func (o *PkiGenerateRootRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. diff --git a/docs/PKIReplaceRootRequest.md b/docs/PKIReplaceRootRequest.md index c08ae92b..72568042 100644 --- a/docs/PKIReplaceRootRequest.md +++ b/docs/PKIReplaceRootRequest.md @@ -1,4 +1,4 @@ -# PKIReplaceRootRequest +# PkiReplaceRootRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIReplaceRootRequest +### NewPkiReplaceRootRequest -`func NewPKIReplaceRootRequest() *PKIReplaceRootRequest` +`func NewPkiReplaceRootRequest() *PkiReplaceRootRequest` -NewPKIReplaceRootRequest instantiates a new PKIReplaceRootRequest object +NewPkiReplaceRootRequest instantiates a new PkiReplaceRootRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIReplaceRootRequestWithDefaults +### NewPkiReplaceRootRequestWithDefaults -`func NewPKIReplaceRootRequestWithDefaults() *PKIReplaceRootRequest` +`func NewPkiReplaceRootRequestWithDefaults() *PkiReplaceRootRequest` -NewPKIReplaceRootRequestWithDefaults instantiates a new PKIReplaceRootRequest object +NewPkiReplaceRootRequestWithDefaults instantiates a new PkiReplaceRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDefault -`func (o *PKIReplaceRootRequest) GetDefault() string` +`func (o *PkiReplaceRootRequest) GetDefault() string` GetDefault returns the Default field if non-nil, zero value otherwise. ### GetDefaultOk -`func (o *PKIReplaceRootRequest) GetDefaultOk() (*string, bool)` +`func (o *PkiReplaceRootRequest) GetDefaultOk() (*string, bool)` GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefault -`func (o *PKIReplaceRootRequest) SetDefault(v string)` +`func (o *PkiReplaceRootRequest) SetDefault(v string)` SetDefault sets Default field to given value. ### HasDefault -`func (o *PKIReplaceRootRequest) HasDefault() bool` +`func (o *PkiReplaceRootRequest) HasDefault() bool` HasDefault returns a boolean if a field has been set. diff --git a/docs/PKIWriteAutoTidyConfigRequest.md b/docs/PKIWriteAutoTidyConfigRequest.md deleted file mode 100644 index ee334ec7..00000000 --- a/docs/PKIWriteAutoTidyConfigRequest.md +++ /dev/null @@ -1,339 +0,0 @@ -# PKIWriteAutoTidyConfigRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Enabled** | Pointer to **bool** | Set to true to enable automatic tidy operations. | [optional] -**IntervalDuration** | Pointer to **int32** | Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next). Running a manual tidy will reset this duration. | [optional] [default to 43200] -**IssuerSafetyBuffer** | Pointer to **int32** | The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year). | [optional] [default to 31536000] -**PauseDuration** | Pointer to **string** | The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds. | [optional] [default to "0s"] -**SafetyBuffer** | Pointer to **int32** | The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours. | [optional] [default to 259200] -**TidyCertStore** | Pointer to **bool** | Set to true to enable tidying up the certificate store | [optional] -**TidyExpiredIssuers** | Pointer to **bool** | Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation. | [optional] -**TidyRevocationList** | Pointer to **bool** | Deprecated; synonym for 'tidy_revoked_certs | [optional] -**TidyRevokedCertIssuerAssociations** | Pointer to **bool** | Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses. | [optional] -**TidyRevokedCerts** | Pointer to **bool** | Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed. | [optional] - - - -## Methods - - -### NewPKIWriteAutoTidyConfigRequest - -`func NewPKIWriteAutoTidyConfigRequest() *PKIWriteAutoTidyConfigRequest` - -NewPKIWriteAutoTidyConfigRequest instantiates a new PKIWriteAutoTidyConfigRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewPKIWriteAutoTidyConfigRequestWithDefaults - -`func NewPKIWriteAutoTidyConfigRequestWithDefaults() *PKIWriteAutoTidyConfigRequest` - -NewPKIWriteAutoTidyConfigRequestWithDefaults instantiates a new PKIWriteAutoTidyConfigRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetEnabled - -`func (o *PKIWriteAutoTidyConfigRequest) GetEnabled() bool` - -GetEnabled returns the Enabled field if non-nil, zero value otherwise. - -### GetEnabledOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetEnabledOk() (*bool, bool)` - -GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetEnabled - -`func (o *PKIWriteAutoTidyConfigRequest) SetEnabled(v bool)` - -SetEnabled sets Enabled field to given value. - - -### HasEnabled - -`func (o *PKIWriteAutoTidyConfigRequest) HasEnabled() bool` - -HasEnabled returns a boolean if a field has been set. - - - - -### GetIntervalDuration - -`func (o *PKIWriteAutoTidyConfigRequest) GetIntervalDuration() int32` - -GetIntervalDuration returns the IntervalDuration field if non-nil, zero value otherwise. - -### GetIntervalDurationOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetIntervalDurationOk() (*int32, bool)` - -GetIntervalDurationOk returns a tuple with the IntervalDuration field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetIntervalDuration - -`func (o *PKIWriteAutoTidyConfigRequest) SetIntervalDuration(v int32)` - -SetIntervalDuration sets IntervalDuration field to given value. - - -### HasIntervalDuration - -`func (o *PKIWriteAutoTidyConfigRequest) HasIntervalDuration() bool` - -HasIntervalDuration returns a boolean if a field has been set. - - - - -### GetIssuerSafetyBuffer - -`func (o *PKIWriteAutoTidyConfigRequest) GetIssuerSafetyBuffer() int32` - -GetIssuerSafetyBuffer returns the IssuerSafetyBuffer field if non-nil, zero value otherwise. - -### GetIssuerSafetyBufferOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetIssuerSafetyBufferOk() (*int32, bool)` - -GetIssuerSafetyBufferOk returns a tuple with the IssuerSafetyBuffer field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetIssuerSafetyBuffer - -`func (o *PKIWriteAutoTidyConfigRequest) SetIssuerSafetyBuffer(v int32)` - -SetIssuerSafetyBuffer sets IssuerSafetyBuffer field to given value. - - -### HasIssuerSafetyBuffer - -`func (o *PKIWriteAutoTidyConfigRequest) HasIssuerSafetyBuffer() bool` - -HasIssuerSafetyBuffer returns a boolean if a field has been set. - - - - -### GetPauseDuration - -`func (o *PKIWriteAutoTidyConfigRequest) GetPauseDuration() string` - -GetPauseDuration returns the PauseDuration field if non-nil, zero value otherwise. - -### GetPauseDurationOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetPauseDurationOk() (*string, bool)` - -GetPauseDurationOk returns a tuple with the PauseDuration field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetPauseDuration - -`func (o *PKIWriteAutoTidyConfigRequest) SetPauseDuration(v string)` - -SetPauseDuration sets PauseDuration field to given value. - - -### HasPauseDuration - -`func (o *PKIWriteAutoTidyConfigRequest) HasPauseDuration() bool` - -HasPauseDuration returns a boolean if a field has been set. - - - - -### GetSafetyBuffer - -`func (o *PKIWriteAutoTidyConfigRequest) GetSafetyBuffer() int32` - -GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. - -### GetSafetyBufferOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetSafetyBufferOk() (*int32, bool)` - -GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetSafetyBuffer - -`func (o *PKIWriteAutoTidyConfigRequest) SetSafetyBuffer(v int32)` - -SetSafetyBuffer sets SafetyBuffer field to given value. - - -### HasSafetyBuffer - -`func (o *PKIWriteAutoTidyConfigRequest) HasSafetyBuffer() bool` - -HasSafetyBuffer returns a boolean if a field has been set. - - - - -### GetTidyCertStore - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyCertStore() bool` - -GetTidyCertStore returns the TidyCertStore field if non-nil, zero value otherwise. - -### GetTidyCertStoreOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyCertStoreOk() (*bool, bool)` - -GetTidyCertStoreOk returns a tuple with the TidyCertStore field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTidyCertStore - -`func (o *PKIWriteAutoTidyConfigRequest) SetTidyCertStore(v bool)` - -SetTidyCertStore sets TidyCertStore field to given value. - - -### HasTidyCertStore - -`func (o *PKIWriteAutoTidyConfigRequest) HasTidyCertStore() bool` - -HasTidyCertStore returns a boolean if a field has been set. - - - - -### GetTidyExpiredIssuers - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyExpiredIssuers() bool` - -GetTidyExpiredIssuers returns the TidyExpiredIssuers field if non-nil, zero value otherwise. - -### GetTidyExpiredIssuersOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyExpiredIssuersOk() (*bool, bool)` - -GetTidyExpiredIssuersOk returns a tuple with the TidyExpiredIssuers field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTidyExpiredIssuers - -`func (o *PKIWriteAutoTidyConfigRequest) SetTidyExpiredIssuers(v bool)` - -SetTidyExpiredIssuers sets TidyExpiredIssuers field to given value. - - -### HasTidyExpiredIssuers - -`func (o *PKIWriteAutoTidyConfigRequest) HasTidyExpiredIssuers() bool` - -HasTidyExpiredIssuers returns a boolean if a field has been set. - - - - -### GetTidyRevocationList - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyRevocationList() bool` - -GetTidyRevocationList returns the TidyRevocationList field if non-nil, zero value otherwise. - -### GetTidyRevocationListOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyRevocationListOk() (*bool, bool)` - -GetTidyRevocationListOk returns a tuple with the TidyRevocationList field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTidyRevocationList - -`func (o *PKIWriteAutoTidyConfigRequest) SetTidyRevocationList(v bool)` - -SetTidyRevocationList sets TidyRevocationList field to given value. - - -### HasTidyRevocationList - -`func (o *PKIWriteAutoTidyConfigRequest) HasTidyRevocationList() bool` - -HasTidyRevocationList returns a boolean if a field has been set. - - - - -### GetTidyRevokedCertIssuerAssociations - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyRevokedCertIssuerAssociations() bool` - -GetTidyRevokedCertIssuerAssociations returns the TidyRevokedCertIssuerAssociations field if non-nil, zero value otherwise. - -### GetTidyRevokedCertIssuerAssociationsOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` - -GetTidyRevokedCertIssuerAssociationsOk returns a tuple with the TidyRevokedCertIssuerAssociations field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTidyRevokedCertIssuerAssociations - -`func (o *PKIWriteAutoTidyConfigRequest) SetTidyRevokedCertIssuerAssociations(v bool)` - -SetTidyRevokedCertIssuerAssociations sets TidyRevokedCertIssuerAssociations field to given value. - - -### HasTidyRevokedCertIssuerAssociations - -`func (o *PKIWriteAutoTidyConfigRequest) HasTidyRevokedCertIssuerAssociations() bool` - -HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. - - - - -### GetTidyRevokedCerts - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyRevokedCerts() bool` - -GetTidyRevokedCerts returns the TidyRevokedCerts field if non-nil, zero value otherwise. - -### GetTidyRevokedCertsOk - -`func (o *PKIWriteAutoTidyConfigRequest) GetTidyRevokedCertsOk() (*bool, bool)` - -GetTidyRevokedCertsOk returns a tuple with the TidyRevokedCerts field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetTidyRevokedCerts - -`func (o *PKIWriteAutoTidyConfigRequest) SetTidyRevokedCerts(v bool)` - -SetTidyRevokedCerts sets TidyRevokedCerts field to given value. - - -### HasTidyRevokedCerts - -`func (o *PKIWriteAutoTidyConfigRequest) HasTidyRevokedCerts() bool` - -HasTidyRevokedCerts returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/PKIWriteClusterConfigRequest.md b/docs/PKIWriteClusterConfigRequest.md deleted file mode 100644 index a87aa7d4..00000000 --- a/docs/PKIWriteClusterConfigRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# PKIWriteClusterConfigRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Path** | Pointer to **string** | Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki | [optional] - - - -## Methods - - -### NewPKIWriteClusterConfigRequest - -`func NewPKIWriteClusterConfigRequest() *PKIWriteClusterConfigRequest` - -NewPKIWriteClusterConfigRequest instantiates a new PKIWriteClusterConfigRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewPKIWriteClusterConfigRequestWithDefaults - -`func NewPKIWriteClusterConfigRequestWithDefaults() *PKIWriteClusterConfigRequest` - -NewPKIWriteClusterConfigRequestWithDefaults instantiates a new PKIWriteClusterConfigRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetPath - -`func (o *PKIWriteClusterConfigRequest) GetPath() string` - -GetPath returns the Path field if non-nil, zero value otherwise. - -### GetPathOk - -`func (o *PKIWriteClusterConfigRequest) GetPathOk() (*string, bool)` - -GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetPath - -`func (o *PKIWriteClusterConfigRequest) SetPath(v string)` - -SetPath sets Path field to given value. - - -### HasPath - -`func (o *PKIWriteClusterConfigRequest) HasPath() bool` - -HasPath returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/PKIWriteKeyRequest.md b/docs/PKIWriteKeyRequest.md index 2e5bbb9f..2730b4a0 100644 --- a/docs/PKIWriteKeyRequest.md +++ b/docs/PKIWriteKeyRequest.md @@ -1,4 +1,4 @@ -# PKIWriteKeyRequest +# PkiWriteKeyRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteKeyRequest +### NewPkiWriteKeyRequest -`func NewPKIWriteKeyRequest() *PKIWriteKeyRequest` +`func NewPkiWriteKeyRequest() *PkiWriteKeyRequest` -NewPKIWriteKeyRequest instantiates a new PKIWriteKeyRequest object +NewPkiWriteKeyRequest instantiates a new PkiWriteKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteKeyRequestWithDefaults +### NewPkiWriteKeyRequestWithDefaults -`func NewPKIWriteKeyRequestWithDefaults() *PKIWriteKeyRequest` +`func NewPkiWriteKeyRequestWithDefaults() *PkiWriteKeyRequest` -NewPKIWriteKeyRequestWithDefaults instantiates a new PKIWriteKeyRequest object +NewPkiWriteKeyRequestWithDefaults instantiates a new PkiWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeyName -`func (o *PKIWriteKeyRequest) GetKeyName() string` +`func (o *PkiWriteKeyRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIWriteKeyRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiWriteKeyRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIWriteKeyRequest) SetKeyName(v string)` +`func (o *PkiWriteKeyRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIWriteKeyRequest) HasKeyName() bool` +`func (o *PkiWriteKeyRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. diff --git a/docs/PKIWriteRoleRequest.md b/docs/PKIWriteRoleRequest.md index 29c77afc..35c0c672 100644 --- a/docs/PKIWriteRoleRequest.md +++ b/docs/PKIWriteRoleRequest.md @@ -1,4 +1,4 @@ -# PKIWriteRoleRequest +# PkiWriteRoleRequest ## Properties @@ -18,6 +18,7 @@ Name | Type | Description | Notes **AllowedSerialNumbers** | Pointer to **[]string** | If set, an array of allowed serial numbers to put in Subject. These values support globbing. | [optional] **AllowedUriSans** | Pointer to **[]string** | If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. | [optional] **AllowedUriSansTemplate** | Pointer to **bool** | If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. | [optional] [default to false] +**AllowedUserIds** | Pointer to **[]string** | If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 | [optional] **Backend** | Pointer to **string** | Backend Type | [optional] **BasicConstraintsValidForNonCa** | Pointer to **bool** | Mark Basic Constraints valid when issuing non-CA certificates. | [optional] **ClientFlag** | Pointer to **bool** | If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. | [optional] [default to true] @@ -57,47 +58,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteRoleRequest +### NewPkiWriteRoleRequest -`func NewPKIWriteRoleRequest() *PKIWriteRoleRequest` +`func NewPkiWriteRoleRequest() *PkiWriteRoleRequest` -NewPKIWriteRoleRequest instantiates a new PKIWriteRoleRequest object +NewPkiWriteRoleRequest instantiates a new PkiWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteRoleRequestWithDefaults +### NewPkiWriteRoleRequestWithDefaults -`func NewPKIWriteRoleRequestWithDefaults() *PKIWriteRoleRequest` +`func NewPkiWriteRoleRequestWithDefaults() *PkiWriteRoleRequest` -NewPKIWriteRoleRequestWithDefaults instantiates a new PKIWriteRoleRequest object +NewPkiWriteRoleRequestWithDefaults instantiates a new PkiWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowAnyName -`func (o *PKIWriteRoleRequest) GetAllowAnyName() bool` +`func (o *PkiWriteRoleRequest) GetAllowAnyName() bool` GetAllowAnyName returns the AllowAnyName field if non-nil, zero value otherwise. ### GetAllowAnyNameOk -`func (o *PKIWriteRoleRequest) GetAllowAnyNameOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowAnyNameOk() (*bool, bool)` GetAllowAnyNameOk returns a tuple with the AllowAnyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowAnyName -`func (o *PKIWriteRoleRequest) SetAllowAnyName(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowAnyName(v bool)` SetAllowAnyName sets AllowAnyName field to given value. ### HasAllowAnyName -`func (o *PKIWriteRoleRequest) HasAllowAnyName() bool` +`func (o *PkiWriteRoleRequest) HasAllowAnyName() bool` HasAllowAnyName returns a boolean if a field has been set. @@ -106,27 +107,27 @@ HasAllowAnyName returns a boolean if a field has been set. ### GetAllowBareDomains -`func (o *PKIWriteRoleRequest) GetAllowBareDomains() bool` +`func (o *PkiWriteRoleRequest) GetAllowBareDomains() bool` GetAllowBareDomains returns the AllowBareDomains field if non-nil, zero value otherwise. ### GetAllowBareDomainsOk -`func (o *PKIWriteRoleRequest) GetAllowBareDomainsOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowBareDomainsOk() (*bool, bool)` GetAllowBareDomainsOk returns a tuple with the AllowBareDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowBareDomains -`func (o *PKIWriteRoleRequest) SetAllowBareDomains(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowBareDomains(v bool)` SetAllowBareDomains sets AllowBareDomains field to given value. ### HasAllowBareDomains -`func (o *PKIWriteRoleRequest) HasAllowBareDomains() bool` +`func (o *PkiWriteRoleRequest) HasAllowBareDomains() bool` HasAllowBareDomains returns a boolean if a field has been set. @@ -135,27 +136,27 @@ HasAllowBareDomains returns a boolean if a field has been set. ### GetAllowGlobDomains -`func (o *PKIWriteRoleRequest) GetAllowGlobDomains() bool` +`func (o *PkiWriteRoleRequest) GetAllowGlobDomains() bool` GetAllowGlobDomains returns the AllowGlobDomains field if non-nil, zero value otherwise. ### GetAllowGlobDomainsOk -`func (o *PKIWriteRoleRequest) GetAllowGlobDomainsOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowGlobDomainsOk() (*bool, bool)` GetAllowGlobDomainsOk returns a tuple with the AllowGlobDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowGlobDomains -`func (o *PKIWriteRoleRequest) SetAllowGlobDomains(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowGlobDomains(v bool)` SetAllowGlobDomains sets AllowGlobDomains field to given value. ### HasAllowGlobDomains -`func (o *PKIWriteRoleRequest) HasAllowGlobDomains() bool` +`func (o *PkiWriteRoleRequest) HasAllowGlobDomains() bool` HasAllowGlobDomains returns a boolean if a field has been set. @@ -164,27 +165,27 @@ HasAllowGlobDomains returns a boolean if a field has been set. ### GetAllowIpSans -`func (o *PKIWriteRoleRequest) GetAllowIpSans() bool` +`func (o *PkiWriteRoleRequest) GetAllowIpSans() bool` GetAllowIpSans returns the AllowIpSans field if non-nil, zero value otherwise. ### GetAllowIpSansOk -`func (o *PKIWriteRoleRequest) GetAllowIpSansOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowIpSansOk() (*bool, bool)` GetAllowIpSansOk returns a tuple with the AllowIpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowIpSans -`func (o *PKIWriteRoleRequest) SetAllowIpSans(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowIpSans(v bool)` SetAllowIpSans sets AllowIpSans field to given value. ### HasAllowIpSans -`func (o *PKIWriteRoleRequest) HasAllowIpSans() bool` +`func (o *PkiWriteRoleRequest) HasAllowIpSans() bool` HasAllowIpSans returns a boolean if a field has been set. @@ -193,27 +194,27 @@ HasAllowIpSans returns a boolean if a field has been set. ### GetAllowLocalhost -`func (o *PKIWriteRoleRequest) GetAllowLocalhost() bool` +`func (o *PkiWriteRoleRequest) GetAllowLocalhost() bool` GetAllowLocalhost returns the AllowLocalhost field if non-nil, zero value otherwise. ### GetAllowLocalhostOk -`func (o *PKIWriteRoleRequest) GetAllowLocalhostOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowLocalhostOk() (*bool, bool)` GetAllowLocalhostOk returns a tuple with the AllowLocalhost field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowLocalhost -`func (o *PKIWriteRoleRequest) SetAllowLocalhost(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowLocalhost(v bool)` SetAllowLocalhost sets AllowLocalhost field to given value. ### HasAllowLocalhost -`func (o *PKIWriteRoleRequest) HasAllowLocalhost() bool` +`func (o *PkiWriteRoleRequest) HasAllowLocalhost() bool` HasAllowLocalhost returns a boolean if a field has been set. @@ -222,27 +223,27 @@ HasAllowLocalhost returns a boolean if a field has been set. ### GetAllowSubdomains -`func (o *PKIWriteRoleRequest) GetAllowSubdomains() bool` +`func (o *PkiWriteRoleRequest) GetAllowSubdomains() bool` GetAllowSubdomains returns the AllowSubdomains field if non-nil, zero value otherwise. ### GetAllowSubdomainsOk -`func (o *PKIWriteRoleRequest) GetAllowSubdomainsOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowSubdomainsOk() (*bool, bool)` GetAllowSubdomainsOk returns a tuple with the AllowSubdomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowSubdomains -`func (o *PKIWriteRoleRequest) SetAllowSubdomains(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowSubdomains(v bool)` SetAllowSubdomains sets AllowSubdomains field to given value. ### HasAllowSubdomains -`func (o *PKIWriteRoleRequest) HasAllowSubdomains() bool` +`func (o *PkiWriteRoleRequest) HasAllowSubdomains() bool` HasAllowSubdomains returns a boolean if a field has been set. @@ -251,27 +252,27 @@ HasAllowSubdomains returns a boolean if a field has been set. ### GetAllowWildcardCertificates -`func (o *PKIWriteRoleRequest) GetAllowWildcardCertificates() bool` +`func (o *PkiWriteRoleRequest) GetAllowWildcardCertificates() bool` GetAllowWildcardCertificates returns the AllowWildcardCertificates field if non-nil, zero value otherwise. ### GetAllowWildcardCertificatesOk -`func (o *PKIWriteRoleRequest) GetAllowWildcardCertificatesOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowWildcardCertificatesOk() (*bool, bool)` GetAllowWildcardCertificatesOk returns a tuple with the AllowWildcardCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowWildcardCertificates -`func (o *PKIWriteRoleRequest) SetAllowWildcardCertificates(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowWildcardCertificates(v bool)` SetAllowWildcardCertificates sets AllowWildcardCertificates field to given value. ### HasAllowWildcardCertificates -`func (o *PKIWriteRoleRequest) HasAllowWildcardCertificates() bool` +`func (o *PkiWriteRoleRequest) HasAllowWildcardCertificates() bool` HasAllowWildcardCertificates returns a boolean if a field has been set. @@ -280,27 +281,27 @@ HasAllowWildcardCertificates returns a boolean if a field has been set. ### GetAllowedDomains -`func (o *PKIWriteRoleRequest) GetAllowedDomains() []string` +`func (o *PkiWriteRoleRequest) GetAllowedDomains() []string` GetAllowedDomains returns the AllowedDomains field if non-nil, zero value otherwise. ### GetAllowedDomainsOk -`func (o *PKIWriteRoleRequest) GetAllowedDomainsOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetAllowedDomainsOk() (*[]string, bool)` GetAllowedDomainsOk returns a tuple with the AllowedDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedDomains -`func (o *PKIWriteRoleRequest) SetAllowedDomains(v []string)` +`func (o *PkiWriteRoleRequest) SetAllowedDomains(v []string)` SetAllowedDomains sets AllowedDomains field to given value. ### HasAllowedDomains -`func (o *PKIWriteRoleRequest) HasAllowedDomains() bool` +`func (o *PkiWriteRoleRequest) HasAllowedDomains() bool` HasAllowedDomains returns a boolean if a field has been set. @@ -309,27 +310,27 @@ HasAllowedDomains returns a boolean if a field has been set. ### GetAllowedDomainsTemplate -`func (o *PKIWriteRoleRequest) GetAllowedDomainsTemplate() bool` +`func (o *PkiWriteRoleRequest) GetAllowedDomainsTemplate() bool` GetAllowedDomainsTemplate returns the AllowedDomainsTemplate field if non-nil, zero value otherwise. ### GetAllowedDomainsTemplateOk -`func (o *PKIWriteRoleRequest) GetAllowedDomainsTemplateOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowedDomainsTemplateOk() (*bool, bool)` GetAllowedDomainsTemplateOk returns a tuple with the AllowedDomainsTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedDomainsTemplate -`func (o *PKIWriteRoleRequest) SetAllowedDomainsTemplate(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowedDomainsTemplate(v bool)` SetAllowedDomainsTemplate sets AllowedDomainsTemplate field to given value. ### HasAllowedDomainsTemplate -`func (o *PKIWriteRoleRequest) HasAllowedDomainsTemplate() bool` +`func (o *PkiWriteRoleRequest) HasAllowedDomainsTemplate() bool` HasAllowedDomainsTemplate returns a boolean if a field has been set. @@ -338,27 +339,27 @@ HasAllowedDomainsTemplate returns a boolean if a field has been set. ### GetAllowedOtherSans -`func (o *PKIWriteRoleRequest) GetAllowedOtherSans() []string` +`func (o *PkiWriteRoleRequest) GetAllowedOtherSans() []string` GetAllowedOtherSans returns the AllowedOtherSans field if non-nil, zero value otherwise. ### GetAllowedOtherSansOk -`func (o *PKIWriteRoleRequest) GetAllowedOtherSansOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetAllowedOtherSansOk() (*[]string, bool)` GetAllowedOtherSansOk returns a tuple with the AllowedOtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedOtherSans -`func (o *PKIWriteRoleRequest) SetAllowedOtherSans(v []string)` +`func (o *PkiWriteRoleRequest) SetAllowedOtherSans(v []string)` SetAllowedOtherSans sets AllowedOtherSans field to given value. ### HasAllowedOtherSans -`func (o *PKIWriteRoleRequest) HasAllowedOtherSans() bool` +`func (o *PkiWriteRoleRequest) HasAllowedOtherSans() bool` HasAllowedOtherSans returns a boolean if a field has been set. @@ -367,27 +368,27 @@ HasAllowedOtherSans returns a boolean if a field has been set. ### GetAllowedSerialNumbers -`func (o *PKIWriteRoleRequest) GetAllowedSerialNumbers() []string` +`func (o *PkiWriteRoleRequest) GetAllowedSerialNumbers() []string` GetAllowedSerialNumbers returns the AllowedSerialNumbers field if non-nil, zero value otherwise. ### GetAllowedSerialNumbersOk -`func (o *PKIWriteRoleRequest) GetAllowedSerialNumbersOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetAllowedSerialNumbersOk() (*[]string, bool)` GetAllowedSerialNumbersOk returns a tuple with the AllowedSerialNumbers field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedSerialNumbers -`func (o *PKIWriteRoleRequest) SetAllowedSerialNumbers(v []string)` +`func (o *PkiWriteRoleRequest) SetAllowedSerialNumbers(v []string)` SetAllowedSerialNumbers sets AllowedSerialNumbers field to given value. ### HasAllowedSerialNumbers -`func (o *PKIWriteRoleRequest) HasAllowedSerialNumbers() bool` +`func (o *PkiWriteRoleRequest) HasAllowedSerialNumbers() bool` HasAllowedSerialNumbers returns a boolean if a field has been set. @@ -396,27 +397,27 @@ HasAllowedSerialNumbers returns a boolean if a field has been set. ### GetAllowedUriSans -`func (o *PKIWriteRoleRequest) GetAllowedUriSans() []string` +`func (o *PkiWriteRoleRequest) GetAllowedUriSans() []string` GetAllowedUriSans returns the AllowedUriSans field if non-nil, zero value otherwise. ### GetAllowedUriSansOk -`func (o *PKIWriteRoleRequest) GetAllowedUriSansOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetAllowedUriSansOk() (*[]string, bool)` GetAllowedUriSansOk returns a tuple with the AllowedUriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedUriSans -`func (o *PKIWriteRoleRequest) SetAllowedUriSans(v []string)` +`func (o *PkiWriteRoleRequest) SetAllowedUriSans(v []string)` SetAllowedUriSans sets AllowedUriSans field to given value. ### HasAllowedUriSans -`func (o *PKIWriteRoleRequest) HasAllowedUriSans() bool` +`func (o *PkiWriteRoleRequest) HasAllowedUriSans() bool` HasAllowedUriSans returns a boolean if a field has been set. @@ -425,56 +426,85 @@ HasAllowedUriSans returns a boolean if a field has been set. ### GetAllowedUriSansTemplate -`func (o *PKIWriteRoleRequest) GetAllowedUriSansTemplate() bool` +`func (o *PkiWriteRoleRequest) GetAllowedUriSansTemplate() bool` GetAllowedUriSansTemplate returns the AllowedUriSansTemplate field if non-nil, zero value otherwise. ### GetAllowedUriSansTemplateOk -`func (o *PKIWriteRoleRequest) GetAllowedUriSansTemplateOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetAllowedUriSansTemplateOk() (*bool, bool)` GetAllowedUriSansTemplateOk returns a tuple with the AllowedUriSansTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedUriSansTemplate -`func (o *PKIWriteRoleRequest) SetAllowedUriSansTemplate(v bool)` +`func (o *PkiWriteRoleRequest) SetAllowedUriSansTemplate(v bool)` SetAllowedUriSansTemplate sets AllowedUriSansTemplate field to given value. ### HasAllowedUriSansTemplate -`func (o *PKIWriteRoleRequest) HasAllowedUriSansTemplate() bool` +`func (o *PkiWriteRoleRequest) HasAllowedUriSansTemplate() bool` HasAllowedUriSansTemplate returns a boolean if a field has been set. +### GetAllowedUserIds + +`func (o *PkiWriteRoleRequest) GetAllowedUserIds() []string` + +GetAllowedUserIds returns the AllowedUserIds field if non-nil, zero value otherwise. + +### GetAllowedUserIdsOk + +`func (o *PkiWriteRoleRequest) GetAllowedUserIdsOk() (*[]string, bool)` + +GetAllowedUserIdsOk returns a tuple with the AllowedUserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUserIds + +`func (o *PkiWriteRoleRequest) SetAllowedUserIds(v []string)` + +SetAllowedUserIds sets AllowedUserIds field to given value. + + +### HasAllowedUserIds + +`func (o *PkiWriteRoleRequest) HasAllowedUserIds() bool` + +HasAllowedUserIds returns a boolean if a field has been set. + + + + ### GetBackend -`func (o *PKIWriteRoleRequest) GetBackend() string` +`func (o *PkiWriteRoleRequest) GetBackend() string` GetBackend returns the Backend field if non-nil, zero value otherwise. ### GetBackendOk -`func (o *PKIWriteRoleRequest) GetBackendOk() (*string, bool)` +`func (o *PkiWriteRoleRequest) GetBackendOk() (*string, bool)` GetBackendOk returns a tuple with the Backend field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBackend -`func (o *PKIWriteRoleRequest) SetBackend(v string)` +`func (o *PkiWriteRoleRequest) SetBackend(v string)` SetBackend sets Backend field to given value. ### HasBackend -`func (o *PKIWriteRoleRequest) HasBackend() bool` +`func (o *PkiWriteRoleRequest) HasBackend() bool` HasBackend returns a boolean if a field has been set. @@ -483,27 +513,27 @@ HasBackend returns a boolean if a field has been set. ### GetBasicConstraintsValidForNonCa -`func (o *PKIWriteRoleRequest) GetBasicConstraintsValidForNonCa() bool` +`func (o *PkiWriteRoleRequest) GetBasicConstraintsValidForNonCa() bool` GetBasicConstraintsValidForNonCa returns the BasicConstraintsValidForNonCa field if non-nil, zero value otherwise. ### GetBasicConstraintsValidForNonCaOk -`func (o *PKIWriteRoleRequest) GetBasicConstraintsValidForNonCaOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetBasicConstraintsValidForNonCaOk() (*bool, bool)` GetBasicConstraintsValidForNonCaOk returns a tuple with the BasicConstraintsValidForNonCa field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBasicConstraintsValidForNonCa -`func (o *PKIWriteRoleRequest) SetBasicConstraintsValidForNonCa(v bool)` +`func (o *PkiWriteRoleRequest) SetBasicConstraintsValidForNonCa(v bool)` SetBasicConstraintsValidForNonCa sets BasicConstraintsValidForNonCa field to given value. ### HasBasicConstraintsValidForNonCa -`func (o *PKIWriteRoleRequest) HasBasicConstraintsValidForNonCa() bool` +`func (o *PkiWriteRoleRequest) HasBasicConstraintsValidForNonCa() bool` HasBasicConstraintsValidForNonCa returns a boolean if a field has been set. @@ -512,27 +542,27 @@ HasBasicConstraintsValidForNonCa returns a boolean if a field has been set. ### GetClientFlag -`func (o *PKIWriteRoleRequest) GetClientFlag() bool` +`func (o *PkiWriteRoleRequest) GetClientFlag() bool` GetClientFlag returns the ClientFlag field if non-nil, zero value otherwise. ### GetClientFlagOk -`func (o *PKIWriteRoleRequest) GetClientFlagOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetClientFlagOk() (*bool, bool)` GetClientFlagOk returns a tuple with the ClientFlag field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetClientFlag -`func (o *PKIWriteRoleRequest) SetClientFlag(v bool)` +`func (o *PkiWriteRoleRequest) SetClientFlag(v bool)` SetClientFlag sets ClientFlag field to given value. ### HasClientFlag -`func (o *PKIWriteRoleRequest) HasClientFlag() bool` +`func (o *PkiWriteRoleRequest) HasClientFlag() bool` HasClientFlag returns a boolean if a field has been set. @@ -541,27 +571,27 @@ HasClientFlag returns a boolean if a field has been set. ### GetCnValidations -`func (o *PKIWriteRoleRequest) GetCnValidations() []string` +`func (o *PkiWriteRoleRequest) GetCnValidations() []string` GetCnValidations returns the CnValidations field if non-nil, zero value otherwise. ### GetCnValidationsOk -`func (o *PKIWriteRoleRequest) GetCnValidationsOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetCnValidationsOk() (*[]string, bool)` GetCnValidationsOk returns a tuple with the CnValidations field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCnValidations -`func (o *PKIWriteRoleRequest) SetCnValidations(v []string)` +`func (o *PkiWriteRoleRequest) SetCnValidations(v []string)` SetCnValidations sets CnValidations field to given value. ### HasCnValidations -`func (o *PKIWriteRoleRequest) HasCnValidations() bool` +`func (o *PkiWriteRoleRequest) HasCnValidations() bool` HasCnValidations returns a boolean if a field has been set. @@ -570,27 +600,27 @@ HasCnValidations returns a boolean if a field has been set. ### GetCodeSigningFlag -`func (o *PKIWriteRoleRequest) GetCodeSigningFlag() bool` +`func (o *PkiWriteRoleRequest) GetCodeSigningFlag() bool` GetCodeSigningFlag returns the CodeSigningFlag field if non-nil, zero value otherwise. ### GetCodeSigningFlagOk -`func (o *PKIWriteRoleRequest) GetCodeSigningFlagOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetCodeSigningFlagOk() (*bool, bool)` GetCodeSigningFlagOk returns a tuple with the CodeSigningFlag field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCodeSigningFlag -`func (o *PKIWriteRoleRequest) SetCodeSigningFlag(v bool)` +`func (o *PkiWriteRoleRequest) SetCodeSigningFlag(v bool)` SetCodeSigningFlag sets CodeSigningFlag field to given value. ### HasCodeSigningFlag -`func (o *PKIWriteRoleRequest) HasCodeSigningFlag() bool` +`func (o *PkiWriteRoleRequest) HasCodeSigningFlag() bool` HasCodeSigningFlag returns a boolean if a field has been set. @@ -599,27 +629,27 @@ HasCodeSigningFlag returns a boolean if a field has been set. ### GetCountry -`func (o *PKIWriteRoleRequest) GetCountry() []string` +`func (o *PkiWriteRoleRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIWriteRoleRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIWriteRoleRequest) SetCountry(v []string)` +`func (o *PkiWriteRoleRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIWriteRoleRequest) HasCountry() bool` +`func (o *PkiWriteRoleRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -628,27 +658,27 @@ HasCountry returns a boolean if a field has been set. ### GetEmailProtectionFlag -`func (o *PKIWriteRoleRequest) GetEmailProtectionFlag() bool` +`func (o *PkiWriteRoleRequest) GetEmailProtectionFlag() bool` GetEmailProtectionFlag returns the EmailProtectionFlag field if non-nil, zero value otherwise. ### GetEmailProtectionFlagOk -`func (o *PKIWriteRoleRequest) GetEmailProtectionFlagOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetEmailProtectionFlagOk() (*bool, bool)` GetEmailProtectionFlagOk returns a tuple with the EmailProtectionFlag field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEmailProtectionFlag -`func (o *PKIWriteRoleRequest) SetEmailProtectionFlag(v bool)` +`func (o *PkiWriteRoleRequest) SetEmailProtectionFlag(v bool)` SetEmailProtectionFlag sets EmailProtectionFlag field to given value. ### HasEmailProtectionFlag -`func (o *PKIWriteRoleRequest) HasEmailProtectionFlag() bool` +`func (o *PkiWriteRoleRequest) HasEmailProtectionFlag() bool` HasEmailProtectionFlag returns a boolean if a field has been set. @@ -657,27 +687,27 @@ HasEmailProtectionFlag returns a boolean if a field has been set. ### GetEnforceHostnames -`func (o *PKIWriteRoleRequest) GetEnforceHostnames() bool` +`func (o *PkiWriteRoleRequest) GetEnforceHostnames() bool` GetEnforceHostnames returns the EnforceHostnames field if non-nil, zero value otherwise. ### GetEnforceHostnamesOk -`func (o *PKIWriteRoleRequest) GetEnforceHostnamesOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetEnforceHostnamesOk() (*bool, bool)` GetEnforceHostnamesOk returns a tuple with the EnforceHostnames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnforceHostnames -`func (o *PKIWriteRoleRequest) SetEnforceHostnames(v bool)` +`func (o *PkiWriteRoleRequest) SetEnforceHostnames(v bool)` SetEnforceHostnames sets EnforceHostnames field to given value. ### HasEnforceHostnames -`func (o *PKIWriteRoleRequest) HasEnforceHostnames() bool` +`func (o *PkiWriteRoleRequest) HasEnforceHostnames() bool` HasEnforceHostnames returns a boolean if a field has been set. @@ -686,27 +716,27 @@ HasEnforceHostnames returns a boolean if a field has been set. ### GetExtKeyUsage -`func (o *PKIWriteRoleRequest) GetExtKeyUsage() []string` +`func (o *PkiWriteRoleRequest) GetExtKeyUsage() []string` GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. ### GetExtKeyUsageOk -`func (o *PKIWriteRoleRequest) GetExtKeyUsageOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetExtKeyUsageOk() (*[]string, bool)` GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsage -`func (o *PKIWriteRoleRequest) SetExtKeyUsage(v []string)` +`func (o *PkiWriteRoleRequest) SetExtKeyUsage(v []string)` SetExtKeyUsage sets ExtKeyUsage field to given value. ### HasExtKeyUsage -`func (o *PKIWriteRoleRequest) HasExtKeyUsage() bool` +`func (o *PkiWriteRoleRequest) HasExtKeyUsage() bool` HasExtKeyUsage returns a boolean if a field has been set. @@ -715,27 +745,27 @@ HasExtKeyUsage returns a boolean if a field has been set. ### GetExtKeyUsageOids -`func (o *PKIWriteRoleRequest) GetExtKeyUsageOids() []string` +`func (o *PkiWriteRoleRequest) GetExtKeyUsageOids() []string` GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. ### GetExtKeyUsageOidsOk -`func (o *PKIWriteRoleRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsageOids -`func (o *PKIWriteRoleRequest) SetExtKeyUsageOids(v []string)` +`func (o *PkiWriteRoleRequest) SetExtKeyUsageOids(v []string)` SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. ### HasExtKeyUsageOids -`func (o *PKIWriteRoleRequest) HasExtKeyUsageOids() bool` +`func (o *PkiWriteRoleRequest) HasExtKeyUsageOids() bool` HasExtKeyUsageOids returns a boolean if a field has been set. @@ -744,27 +774,27 @@ HasExtKeyUsageOids returns a boolean if a field has been set. ### GetGenerateLease -`func (o *PKIWriteRoleRequest) GetGenerateLease() bool` +`func (o *PkiWriteRoleRequest) GetGenerateLease() bool` GetGenerateLease returns the GenerateLease field if non-nil, zero value otherwise. ### GetGenerateLeaseOk -`func (o *PKIWriteRoleRequest) GetGenerateLeaseOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetGenerateLeaseOk() (*bool, bool)` GetGenerateLeaseOk returns a tuple with the GenerateLease field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGenerateLease -`func (o *PKIWriteRoleRequest) SetGenerateLease(v bool)` +`func (o *PkiWriteRoleRequest) SetGenerateLease(v bool)` SetGenerateLease sets GenerateLease field to given value. ### HasGenerateLease -`func (o *PKIWriteRoleRequest) HasGenerateLease() bool` +`func (o *PkiWriteRoleRequest) HasGenerateLease() bool` HasGenerateLease returns a boolean if a field has been set. @@ -773,27 +803,27 @@ HasGenerateLease returns a boolean if a field has been set. ### GetIssuerRef -`func (o *PKIWriteRoleRequest) GetIssuerRef() string` +`func (o *PkiWriteRoleRequest) GetIssuerRef() string` GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. ### GetIssuerRefOk -`func (o *PKIWriteRoleRequest) GetIssuerRefOk() (*string, bool)` +`func (o *PkiWriteRoleRequest) GetIssuerRefOk() (*string, bool)` GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerRef -`func (o *PKIWriteRoleRequest) SetIssuerRef(v string)` +`func (o *PkiWriteRoleRequest) SetIssuerRef(v string)` SetIssuerRef sets IssuerRef field to given value. ### HasIssuerRef -`func (o *PKIWriteRoleRequest) HasIssuerRef() bool` +`func (o *PkiWriteRoleRequest) HasIssuerRef() bool` HasIssuerRef returns a boolean if a field has been set. @@ -802,27 +832,27 @@ HasIssuerRef returns a boolean if a field has been set. ### GetKeyBits -`func (o *PKIWriteRoleRequest) GetKeyBits() int32` +`func (o *PkiWriteRoleRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIWriteRoleRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiWriteRoleRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIWriteRoleRequest) SetKeyBits(v int32)` +`func (o *PkiWriteRoleRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIWriteRoleRequest) HasKeyBits() bool` +`func (o *PkiWriteRoleRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -831,27 +861,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIWriteRoleRequest) GetKeyType() string` +`func (o *PkiWriteRoleRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIWriteRoleRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiWriteRoleRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIWriteRoleRequest) SetKeyType(v string)` +`func (o *PkiWriteRoleRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIWriteRoleRequest) HasKeyType() bool` +`func (o *PkiWriteRoleRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -860,27 +890,27 @@ HasKeyType returns a boolean if a field has been set. ### GetKeyUsage -`func (o *PKIWriteRoleRequest) GetKeyUsage() []string` +`func (o *PkiWriteRoleRequest) GetKeyUsage() []string` GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. ### GetKeyUsageOk -`func (o *PKIWriteRoleRequest) GetKeyUsageOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetKeyUsageOk() (*[]string, bool)` GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyUsage -`func (o *PKIWriteRoleRequest) SetKeyUsage(v []string)` +`func (o *PkiWriteRoleRequest) SetKeyUsage(v []string)` SetKeyUsage sets KeyUsage field to given value. ### HasKeyUsage -`func (o *PKIWriteRoleRequest) HasKeyUsage() bool` +`func (o *PkiWriteRoleRequest) HasKeyUsage() bool` HasKeyUsage returns a boolean if a field has been set. @@ -889,27 +919,27 @@ HasKeyUsage returns a boolean if a field has been set. ### GetLocality -`func (o *PKIWriteRoleRequest) GetLocality() []string` +`func (o *PkiWriteRoleRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIWriteRoleRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIWriteRoleRequest) SetLocality(v []string)` +`func (o *PkiWriteRoleRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIWriteRoleRequest) HasLocality() bool` +`func (o *PkiWriteRoleRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -918,27 +948,27 @@ HasLocality returns a boolean if a field has been set. ### GetMaxTtl -`func (o *PKIWriteRoleRequest) GetMaxTtl() int32` +`func (o *PkiWriteRoleRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *PKIWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *PkiWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *PKIWriteRoleRequest) SetMaxTtl(v int32)` +`func (o *PkiWriteRoleRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *PKIWriteRoleRequest) HasMaxTtl() bool` +`func (o *PkiWriteRoleRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -947,27 +977,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetNoStore -`func (o *PKIWriteRoleRequest) GetNoStore() bool` +`func (o *PkiWriteRoleRequest) GetNoStore() bool` GetNoStore returns the NoStore field if non-nil, zero value otherwise. ### GetNoStoreOk -`func (o *PKIWriteRoleRequest) GetNoStoreOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetNoStoreOk() (*bool, bool)` GetNoStoreOk returns a tuple with the NoStore field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNoStore -`func (o *PKIWriteRoleRequest) SetNoStore(v bool)` +`func (o *PkiWriteRoleRequest) SetNoStore(v bool)` SetNoStore sets NoStore field to given value. ### HasNoStore -`func (o *PKIWriteRoleRequest) HasNoStore() bool` +`func (o *PkiWriteRoleRequest) HasNoStore() bool` HasNoStore returns a boolean if a field has been set. @@ -976,27 +1006,27 @@ HasNoStore returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIWriteRoleRequest) GetNotAfter() string` +`func (o *PkiWriteRoleRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIWriteRoleRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiWriteRoleRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIWriteRoleRequest) SetNotAfter(v string)` +`func (o *PkiWriteRoleRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIWriteRoleRequest) HasNotAfter() bool` +`func (o *PkiWriteRoleRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -1005,27 +1035,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIWriteRoleRequest) GetNotBeforeDuration() int32` +`func (o *PkiWriteRoleRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIWriteRoleRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiWriteRoleRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIWriteRoleRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiWriteRoleRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIWriteRoleRequest) HasNotBeforeDuration() bool` +`func (o *PkiWriteRoleRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -1034,27 +1064,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIWriteRoleRequest) GetOrganization() []string` +`func (o *PkiWriteRoleRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIWriteRoleRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIWriteRoleRequest) SetOrganization(v []string)` +`func (o *PkiWriteRoleRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIWriteRoleRequest) HasOrganization() bool` +`func (o *PkiWriteRoleRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -1063,27 +1093,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOu -`func (o *PKIWriteRoleRequest) GetOu() []string` +`func (o *PkiWriteRoleRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIWriteRoleRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIWriteRoleRequest) SetOu(v []string)` +`func (o *PkiWriteRoleRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIWriteRoleRequest) HasOu() bool` +`func (o *PkiWriteRoleRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -1092,27 +1122,27 @@ HasOu returns a boolean if a field has been set. ### GetPolicyIdentifiers -`func (o *PKIWriteRoleRequest) GetPolicyIdentifiers() []string` +`func (o *PkiWriteRoleRequest) GetPolicyIdentifiers() []string` GetPolicyIdentifiers returns the PolicyIdentifiers field if non-nil, zero value otherwise. ### GetPolicyIdentifiersOk -`func (o *PKIWriteRoleRequest) GetPolicyIdentifiersOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetPolicyIdentifiersOk() (*[]string, bool)` GetPolicyIdentifiersOk returns a tuple with the PolicyIdentifiers field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicyIdentifiers -`func (o *PKIWriteRoleRequest) SetPolicyIdentifiers(v []string)` +`func (o *PkiWriteRoleRequest) SetPolicyIdentifiers(v []string)` SetPolicyIdentifiers sets PolicyIdentifiers field to given value. ### HasPolicyIdentifiers -`func (o *PKIWriteRoleRequest) HasPolicyIdentifiers() bool` +`func (o *PkiWriteRoleRequest) HasPolicyIdentifiers() bool` HasPolicyIdentifiers returns a boolean if a field has been set. @@ -1121,27 +1151,27 @@ HasPolicyIdentifiers returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIWriteRoleRequest) GetPostalCode() []string` +`func (o *PkiWriteRoleRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIWriteRoleRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIWriteRoleRequest) SetPostalCode(v []string)` +`func (o *PkiWriteRoleRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIWriteRoleRequest) HasPostalCode() bool` +`func (o *PkiWriteRoleRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -1150,27 +1180,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetProvince -`func (o *PKIWriteRoleRequest) GetProvince() []string` +`func (o *PkiWriteRoleRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIWriteRoleRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIWriteRoleRequest) SetProvince(v []string)` +`func (o *PkiWriteRoleRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIWriteRoleRequest) HasProvince() bool` +`func (o *PkiWriteRoleRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -1179,27 +1209,27 @@ HasProvince returns a boolean if a field has been set. ### GetRequireCn -`func (o *PKIWriteRoleRequest) GetRequireCn() bool` +`func (o *PkiWriteRoleRequest) GetRequireCn() bool` GetRequireCn returns the RequireCn field if non-nil, zero value otherwise. ### GetRequireCnOk -`func (o *PKIWriteRoleRequest) GetRequireCnOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetRequireCnOk() (*bool, bool)` GetRequireCnOk returns a tuple with the RequireCn field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequireCn -`func (o *PKIWriteRoleRequest) SetRequireCn(v bool)` +`func (o *PkiWriteRoleRequest) SetRequireCn(v bool)` SetRequireCn sets RequireCn field to given value. ### HasRequireCn -`func (o *PKIWriteRoleRequest) HasRequireCn() bool` +`func (o *PkiWriteRoleRequest) HasRequireCn() bool` HasRequireCn returns a boolean if a field has been set. @@ -1208,27 +1238,27 @@ HasRequireCn returns a boolean if a field has been set. ### GetServerFlag -`func (o *PKIWriteRoleRequest) GetServerFlag() bool` +`func (o *PkiWriteRoleRequest) GetServerFlag() bool` GetServerFlag returns the ServerFlag field if non-nil, zero value otherwise. ### GetServerFlagOk -`func (o *PKIWriteRoleRequest) GetServerFlagOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetServerFlagOk() (*bool, bool)` GetServerFlagOk returns a tuple with the ServerFlag field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetServerFlag -`func (o *PKIWriteRoleRequest) SetServerFlag(v bool)` +`func (o *PkiWriteRoleRequest) SetServerFlag(v bool)` SetServerFlag sets ServerFlag field to given value. ### HasServerFlag -`func (o *PKIWriteRoleRequest) HasServerFlag() bool` +`func (o *PkiWriteRoleRequest) HasServerFlag() bool` HasServerFlag returns a boolean if a field has been set. @@ -1237,27 +1267,27 @@ HasServerFlag returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIWriteRoleRequest) GetSignatureBits() int32` +`func (o *PkiWriteRoleRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIWriteRoleRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiWriteRoleRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIWriteRoleRequest) SetSignatureBits(v int32)` +`func (o *PkiWriteRoleRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIWriteRoleRequest) HasSignatureBits() bool` +`func (o *PkiWriteRoleRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -1266,27 +1296,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIWriteRoleRequest) GetStreetAddress() []string` +`func (o *PkiWriteRoleRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIWriteRoleRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiWriteRoleRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIWriteRoleRequest) SetStreetAddress(v []string)` +`func (o *PkiWriteRoleRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIWriteRoleRequest) HasStreetAddress() bool` +`func (o *PkiWriteRoleRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -1295,27 +1325,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIWriteRoleRequest) GetTtl() int32` +`func (o *PkiWriteRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIWriteRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiWriteRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIWriteRoleRequest) SetTtl(v int32)` +`func (o *PkiWriteRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIWriteRoleRequest) HasTtl() bool` +`func (o *PkiWriteRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -1324,27 +1354,27 @@ HasTtl returns a boolean if a field has been set. ### GetUseCsrCommonName -`func (o *PKIWriteRoleRequest) GetUseCsrCommonName() bool` +`func (o *PkiWriteRoleRequest) GetUseCsrCommonName() bool` GetUseCsrCommonName returns the UseCsrCommonName field if non-nil, zero value otherwise. ### GetUseCsrCommonNameOk -`func (o *PKIWriteRoleRequest) GetUseCsrCommonNameOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetUseCsrCommonNameOk() (*bool, bool)` GetUseCsrCommonNameOk returns a tuple with the UseCsrCommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUseCsrCommonName -`func (o *PKIWriteRoleRequest) SetUseCsrCommonName(v bool)` +`func (o *PkiWriteRoleRequest) SetUseCsrCommonName(v bool)` SetUseCsrCommonName sets UseCsrCommonName field to given value. ### HasUseCsrCommonName -`func (o *PKIWriteRoleRequest) HasUseCsrCommonName() bool` +`func (o *PkiWriteRoleRequest) HasUseCsrCommonName() bool` HasUseCsrCommonName returns a boolean if a field has been set. @@ -1353,27 +1383,27 @@ HasUseCsrCommonName returns a boolean if a field has been set. ### GetUseCsrSans -`func (o *PKIWriteRoleRequest) GetUseCsrSans() bool` +`func (o *PkiWriteRoleRequest) GetUseCsrSans() bool` GetUseCsrSans returns the UseCsrSans field if non-nil, zero value otherwise. ### GetUseCsrSansOk -`func (o *PKIWriteRoleRequest) GetUseCsrSansOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetUseCsrSansOk() (*bool, bool)` GetUseCsrSansOk returns a tuple with the UseCsrSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUseCsrSans -`func (o *PKIWriteRoleRequest) SetUseCsrSans(v bool)` +`func (o *PkiWriteRoleRequest) SetUseCsrSans(v bool)` SetUseCsrSans sets UseCsrSans field to given value. ### HasUseCsrSans -`func (o *PKIWriteRoleRequest) HasUseCsrSans() bool` +`func (o *PkiWriteRoleRequest) HasUseCsrSans() bool` HasUseCsrSans returns a boolean if a field has been set. @@ -1382,27 +1412,27 @@ HasUseCsrSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIWriteRoleRequest) GetUsePss() bool` +`func (o *PkiWriteRoleRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIWriteRoleRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiWriteRoleRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIWriteRoleRequest) SetUsePss(v bool)` +`func (o *PkiWriteRoleRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIWriteRoleRequest) HasUsePss() bool` +`func (o *PkiWriteRoleRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. diff --git a/docs/PersonaWriteRequest.md b/docs/PersonaCreateRequest.md similarity index 68% rename from docs/PersonaWriteRequest.md rename to docs/PersonaCreateRequest.md index e4a904fa..e114a853 100644 --- a/docs/PersonaWriteRequest.md +++ b/docs/PersonaCreateRequest.md @@ -1,4 +1,4 @@ -# PersonaWriteRequest +# PersonaCreateRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewPersonaWriteRequest +### NewPersonaCreateRequest -`func NewPersonaWriteRequest() *PersonaWriteRequest` +`func NewPersonaCreateRequest() *PersonaCreateRequest` -NewPersonaWriteRequest instantiates a new PersonaWriteRequest object +NewPersonaCreateRequest instantiates a new PersonaCreateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPersonaWriteRequestWithDefaults +### NewPersonaCreateRequestWithDefaults -`func NewPersonaWriteRequestWithDefaults() *PersonaWriteRequest` +`func NewPersonaCreateRequestWithDefaults() *PersonaCreateRequest` -NewPersonaWriteRequestWithDefaults instantiates a new PersonaWriteRequest object +NewPersonaCreateRequestWithDefaults instantiates a new PersonaCreateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEntityId -`func (o *PersonaWriteRequest) GetEntityId() string` +`func (o *PersonaCreateRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *PersonaWriteRequest) GetEntityIdOk() (*string, bool)` +`func (o *PersonaCreateRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *PersonaWriteRequest) SetEntityId(v string)` +`func (o *PersonaCreateRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. ### HasEntityId -`func (o *PersonaWriteRequest) HasEntityId() bool` +`func (o *PersonaCreateRequest) HasEntityId() bool` HasEntityId returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasEntityId returns a boolean if a field has been set. ### GetId -`func (o *PersonaWriteRequest) GetId() string` +`func (o *PersonaCreateRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *PersonaWriteRequest) GetIdOk() (*string, bool)` +`func (o *PersonaCreateRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *PersonaWriteRequest) SetId(v string)` +`func (o *PersonaCreateRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *PersonaWriteRequest) HasId() bool` +`func (o *PersonaCreateRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasId returns a boolean if a field has been set. ### GetMetadata -`func (o *PersonaWriteRequest) GetMetadata() map[string]interface{}` +`func (o *PersonaCreateRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *PersonaWriteRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *PersonaCreateRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *PersonaWriteRequest) SetMetadata(v map[string]interface{})` +`func (o *PersonaCreateRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *PersonaWriteRequest) HasMetadata() bool` +`func (o *PersonaCreateRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasMetadata returns a boolean if a field has been set. ### GetMountAccessor -`func (o *PersonaWriteRequest) GetMountAccessor() string` +`func (o *PersonaCreateRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *PersonaWriteRequest) GetMountAccessorOk() (*string, bool)` +`func (o *PersonaCreateRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *PersonaWriteRequest) SetMountAccessor(v string)` +`func (o *PersonaCreateRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *PersonaWriteRequest) HasMountAccessor() bool` +`func (o *PersonaCreateRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *PersonaWriteRequest) GetName() string` +`func (o *PersonaCreateRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *PersonaWriteRequest) GetNameOk() (*string, bool)` +`func (o *PersonaCreateRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *PersonaWriteRequest) SetName(v string)` +`func (o *PersonaCreateRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *PersonaWriteRequest) HasName() bool` +`func (o *PersonaCreateRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/PersonaIDWriteByIDRequest.md b/docs/PersonaUpdateByIdRequest.md similarity index 66% rename from docs/PersonaIDWriteByIDRequest.md rename to docs/PersonaUpdateByIdRequest.md index 2c8ca296..2f763319 100644 --- a/docs/PersonaIDWriteByIDRequest.md +++ b/docs/PersonaUpdateByIdRequest.md @@ -1,4 +1,4 @@ -# PersonaIDWriteByIDRequest +# PersonaUpdateByIdRequest ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewPersonaIDWriteByIDRequest +### NewPersonaUpdateByIdRequest -`func NewPersonaIDWriteByIDRequest() *PersonaIDWriteByIDRequest` +`func NewPersonaUpdateByIdRequest() *PersonaUpdateByIdRequest` -NewPersonaIDWriteByIDRequest instantiates a new PersonaIDWriteByIDRequest object +NewPersonaUpdateByIdRequest instantiates a new PersonaUpdateByIdRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPersonaIDWriteByIDRequestWithDefaults +### NewPersonaUpdateByIdRequestWithDefaults -`func NewPersonaIDWriteByIDRequestWithDefaults() *PersonaIDWriteByIDRequest` +`func NewPersonaUpdateByIdRequestWithDefaults() *PersonaUpdateByIdRequest` -NewPersonaIDWriteByIDRequestWithDefaults instantiates a new PersonaIDWriteByIDRequest object +NewPersonaUpdateByIdRequestWithDefaults instantiates a new PersonaUpdateByIdRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEntityId -`func (o *PersonaIDWriteByIDRequest) GetEntityId() string` +`func (o *PersonaUpdateByIdRequest) GetEntityId() string` GetEntityId returns the EntityId field if non-nil, zero value otherwise. ### GetEntityIdOk -`func (o *PersonaIDWriteByIDRequest) GetEntityIdOk() (*string, bool)` +`func (o *PersonaUpdateByIdRequest) GetEntityIdOk() (*string, bool)` GetEntityIdOk returns a tuple with the EntityId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityId -`func (o *PersonaIDWriteByIDRequest) SetEntityId(v string)` +`func (o *PersonaUpdateByIdRequest) SetEntityId(v string)` SetEntityId sets EntityId field to given value. ### HasEntityId -`func (o *PersonaIDWriteByIDRequest) HasEntityId() bool` +`func (o *PersonaUpdateByIdRequest) HasEntityId() bool` HasEntityId returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasEntityId returns a boolean if a field has been set. ### GetMetadata -`func (o *PersonaIDWriteByIDRequest) GetMetadata() map[string]interface{}` +`func (o *PersonaUpdateByIdRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *PersonaIDWriteByIDRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *PersonaUpdateByIdRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *PersonaIDWriteByIDRequest) SetMetadata(v map[string]interface{})` +`func (o *PersonaUpdateByIdRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *PersonaIDWriteByIDRequest) HasMetadata() bool` +`func (o *PersonaUpdateByIdRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasMetadata returns a boolean if a field has been set. ### GetMountAccessor -`func (o *PersonaIDWriteByIDRequest) GetMountAccessor() string` +`func (o *PersonaUpdateByIdRequest) GetMountAccessor() string` GetMountAccessor returns the MountAccessor field if non-nil, zero value otherwise. ### GetMountAccessorOk -`func (o *PersonaIDWriteByIDRequest) GetMountAccessorOk() (*string, bool)` +`func (o *PersonaUpdateByIdRequest) GetMountAccessorOk() (*string, bool)` GetMountAccessorOk returns a tuple with the MountAccessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMountAccessor -`func (o *PersonaIDWriteByIDRequest) SetMountAccessor(v string)` +`func (o *PersonaUpdateByIdRequest) SetMountAccessor(v string)` SetMountAccessor sets MountAccessor field to given value. ### HasMountAccessor -`func (o *PersonaIDWriteByIDRequest) HasMountAccessor() bool` +`func (o *PersonaUpdateByIdRequest) HasMountAccessor() bool` HasMountAccessor returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasMountAccessor returns a boolean if a field has been set. ### GetName -`func (o *PersonaIDWriteByIDRequest) GetName() string` +`func (o *PersonaUpdateByIdRequest) GetName() string` GetName returns the Name field if non-nil, zero value otherwise. ### GetNameOk -`func (o *PersonaIDWriteByIDRequest) GetNameOk() (*string, bool)` +`func (o *PersonaUpdateByIdRequest) GetNameOk() (*string, bool)` GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetName -`func (o *PersonaIDWriteByIDRequest) SetName(v string)` +`func (o *PersonaUpdateByIdRequest) SetName(v string)` SetName sets Name field to given value. ### HasName -`func (o *PersonaIDWriteByIDRequest) HasName() bool` +`func (o *PersonaUpdateByIdRequest) HasName() bool` HasName returns a boolean if a field has been set. diff --git a/docs/PkiConfigureAutoTidyRequest.md b/docs/PkiConfigureAutoTidyRequest.md new file mode 100644 index 00000000..99157a71 --- /dev/null +++ b/docs/PkiConfigureAutoTidyRequest.md @@ -0,0 +1,519 @@ +# PkiConfigureAutoTidyRequest + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Enabled** | Pointer to **bool** | Set to true to enable automatic tidy operations. | [optional] +**IntervalDuration** | Pointer to **int32** | Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next). Running a manual tidy will reset this duration. | [optional] [default to 43200] +**IssuerSafetyBuffer** | Pointer to **int32** | The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year). | [optional] [default to 31536000] +**MaintainStoredCertificateCounts** | Pointer to **bool** | This configures whether stored certificates are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained. | [optional] [default to false] +**PauseDuration** | Pointer to **string** | The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds. | [optional] [default to "0s"] +**PublishStoredCertificateCountMetrics** | Pointer to **bool** | This configures whether the stored certificate count is published to the metrics consumer. It does not affect if the stored certificate count is maintained, and if maintained, it will be available on the tidy-status endpoint. | [optional] [default to false] +**RevocationQueueSafetyBuffer** | Pointer to **int32** | The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal. Setting this too low may remove valid revocation requests before the owning cluster has a chance to process them, especially if the cluster is offline. | [optional] [default to 172800] +**SafetyBuffer** | Pointer to **int32** | The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours. | [optional] [default to 259200] +**TidyCertStore** | Pointer to **bool** | Set to true to enable tidying up the certificate store | [optional] +**TidyCrossClusterRevokedCerts** | Pointer to **bool** | Set to true to enable tidying up the cross-cluster revoked certificate store. Only runs on the active primary node. | [optional] +**TidyExpiredIssuers** | Pointer to **bool** | Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation. | [optional] +**TidyMoveLegacyCaBundle** | Pointer to **bool** | Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak. This prevents downgrades to pre-Vault 1.11 versions (as older PKI engines do not know about the new multi-issuer storage layout), but improves the performance on seal wrapped PKI mounts. This will only occur if at least issuer_safety_buffer time has occurred after the initial storage migration. This backup is saved in case of an issue in future migrations. Operators may consider removing it via sys/raw if they desire. The backup will be removed via a DELETE /root call, but note that this removes ALL issuers within the mount (and is thus not desirable in most operational scenarios). | [optional] +**TidyRevocationList** | Pointer to **bool** | Deprecated; synonym for 'tidy_revoked_certs | [optional] +**TidyRevocationQueue** | Pointer to **bool** | Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster. Only runs on the active primary node | [optional] [default to false] +**TidyRevokedCertIssuerAssociations** | Pointer to **bool** | Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses. | [optional] +**TidyRevokedCerts** | Pointer to **bool** | Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed. | [optional] + + + +## Methods + + +### NewPkiConfigureAutoTidyRequest + +`func NewPkiConfigureAutoTidyRequest() *PkiConfigureAutoTidyRequest` + +NewPkiConfigureAutoTidyRequest instantiates a new PkiConfigureAutoTidyRequest object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureAutoTidyRequestWithDefaults + +`func NewPkiConfigureAutoTidyRequestWithDefaults() *PkiConfigureAutoTidyRequest` + +NewPkiConfigureAutoTidyRequestWithDefaults instantiates a new PkiConfigureAutoTidyRequest object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetEnabled + +`func (o *PkiConfigureAutoTidyRequest) GetEnabled() bool` + +GetEnabled returns the Enabled field if non-nil, zero value otherwise. + +### GetEnabledOk + +`func (o *PkiConfigureAutoTidyRequest) GetEnabledOk() (*bool, bool)` + +GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnabled + +`func (o *PkiConfigureAutoTidyRequest) SetEnabled(v bool)` + +SetEnabled sets Enabled field to given value. + + +### HasEnabled + +`func (o *PkiConfigureAutoTidyRequest) HasEnabled() bool` + +HasEnabled returns a boolean if a field has been set. + + + + +### GetIntervalDuration + +`func (o *PkiConfigureAutoTidyRequest) GetIntervalDuration() int32` + +GetIntervalDuration returns the IntervalDuration field if non-nil, zero value otherwise. + +### GetIntervalDurationOk + +`func (o *PkiConfigureAutoTidyRequest) GetIntervalDurationOk() (*int32, bool)` + +GetIntervalDurationOk returns a tuple with the IntervalDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIntervalDuration + +`func (o *PkiConfigureAutoTidyRequest) SetIntervalDuration(v int32)` + +SetIntervalDuration sets IntervalDuration field to given value. + + +### HasIntervalDuration + +`func (o *PkiConfigureAutoTidyRequest) HasIntervalDuration() bool` + +HasIntervalDuration returns a boolean if a field has been set. + + + + +### GetIssuerSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) GetIssuerSafetyBuffer() int32` + +GetIssuerSafetyBuffer returns the IssuerSafetyBuffer field if non-nil, zero value otherwise. + +### GetIssuerSafetyBufferOk + +`func (o *PkiConfigureAutoTidyRequest) GetIssuerSafetyBufferOk() (*int32, bool)` + +GetIssuerSafetyBufferOk returns a tuple with the IssuerSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) SetIssuerSafetyBuffer(v int32)` + +SetIssuerSafetyBuffer sets IssuerSafetyBuffer field to given value. + + +### HasIssuerSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) HasIssuerSafetyBuffer() bool` + +HasIssuerSafetyBuffer returns a boolean if a field has been set. + + + + +### GetMaintainStoredCertificateCounts + +`func (o *PkiConfigureAutoTidyRequest) GetMaintainStoredCertificateCounts() bool` + +GetMaintainStoredCertificateCounts returns the MaintainStoredCertificateCounts field if non-nil, zero value otherwise. + +### GetMaintainStoredCertificateCountsOk + +`func (o *PkiConfigureAutoTidyRequest) GetMaintainStoredCertificateCountsOk() (*bool, bool)` + +GetMaintainStoredCertificateCountsOk returns a tuple with the MaintainStoredCertificateCounts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaintainStoredCertificateCounts + +`func (o *PkiConfigureAutoTidyRequest) SetMaintainStoredCertificateCounts(v bool)` + +SetMaintainStoredCertificateCounts sets MaintainStoredCertificateCounts field to given value. + + +### HasMaintainStoredCertificateCounts + +`func (o *PkiConfigureAutoTidyRequest) HasMaintainStoredCertificateCounts() bool` + +HasMaintainStoredCertificateCounts returns a boolean if a field has been set. + + + + +### GetPauseDuration + +`func (o *PkiConfigureAutoTidyRequest) GetPauseDuration() string` + +GetPauseDuration returns the PauseDuration field if non-nil, zero value otherwise. + +### GetPauseDurationOk + +`func (o *PkiConfigureAutoTidyRequest) GetPauseDurationOk() (*string, bool)` + +GetPauseDurationOk returns a tuple with the PauseDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPauseDuration + +`func (o *PkiConfigureAutoTidyRequest) SetPauseDuration(v string)` + +SetPauseDuration sets PauseDuration field to given value. + + +### HasPauseDuration + +`func (o *PkiConfigureAutoTidyRequest) HasPauseDuration() bool` + +HasPauseDuration returns a boolean if a field has been set. + + + + +### GetPublishStoredCertificateCountMetrics + +`func (o *PkiConfigureAutoTidyRequest) GetPublishStoredCertificateCountMetrics() bool` + +GetPublishStoredCertificateCountMetrics returns the PublishStoredCertificateCountMetrics field if non-nil, zero value otherwise. + +### GetPublishStoredCertificateCountMetricsOk + +`func (o *PkiConfigureAutoTidyRequest) GetPublishStoredCertificateCountMetricsOk() (*bool, bool)` + +GetPublishStoredCertificateCountMetricsOk returns a tuple with the PublishStoredCertificateCountMetrics field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPublishStoredCertificateCountMetrics + +`func (o *PkiConfigureAutoTidyRequest) SetPublishStoredCertificateCountMetrics(v bool)` + +SetPublishStoredCertificateCountMetrics sets PublishStoredCertificateCountMetrics field to given value. + + +### HasPublishStoredCertificateCountMetrics + +`func (o *PkiConfigureAutoTidyRequest) HasPublishStoredCertificateCountMetrics() bool` + +HasPublishStoredCertificateCountMetrics returns a boolean if a field has been set. + + + + +### GetRevocationQueueSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) GetRevocationQueueSafetyBuffer() int32` + +GetRevocationQueueSafetyBuffer returns the RevocationQueueSafetyBuffer field if non-nil, zero value otherwise. + +### GetRevocationQueueSafetyBufferOk + +`func (o *PkiConfigureAutoTidyRequest) GetRevocationQueueSafetyBufferOk() (*int32, bool)` + +GetRevocationQueueSafetyBufferOk returns a tuple with the RevocationQueueSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationQueueSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) SetRevocationQueueSafetyBuffer(v int32)` + +SetRevocationQueueSafetyBuffer sets RevocationQueueSafetyBuffer field to given value. + + +### HasRevocationQueueSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) HasRevocationQueueSafetyBuffer() bool` + +HasRevocationQueueSafetyBuffer returns a boolean if a field has been set. + + + + +### GetSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) GetSafetyBuffer() int32` + +GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. + +### GetSafetyBufferOk + +`func (o *PkiConfigureAutoTidyRequest) GetSafetyBufferOk() (*int32, bool)` + +GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) SetSafetyBuffer(v int32)` + +SetSafetyBuffer sets SafetyBuffer field to given value. + + +### HasSafetyBuffer + +`func (o *PkiConfigureAutoTidyRequest) HasSafetyBuffer() bool` + +HasSafetyBuffer returns a boolean if a field has been set. + + + + +### GetTidyCertStore + +`func (o *PkiConfigureAutoTidyRequest) GetTidyCertStore() bool` + +GetTidyCertStore returns the TidyCertStore field if non-nil, zero value otherwise. + +### GetTidyCertStoreOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyCertStoreOk() (*bool, bool)` + +GetTidyCertStoreOk returns a tuple with the TidyCertStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCertStore + +`func (o *PkiConfigureAutoTidyRequest) SetTidyCertStore(v bool)` + +SetTidyCertStore sets TidyCertStore field to given value. + + +### HasTidyCertStore + +`func (o *PkiConfigureAutoTidyRequest) HasTidyCertStore() bool` + +HasTidyCertStore returns a boolean if a field has been set. + + + + +### GetTidyCrossClusterRevokedCerts + +`func (o *PkiConfigureAutoTidyRequest) GetTidyCrossClusterRevokedCerts() bool` + +GetTidyCrossClusterRevokedCerts returns the TidyCrossClusterRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyCrossClusterRevokedCertsOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyCrossClusterRevokedCertsOk() (*bool, bool)` + +GetTidyCrossClusterRevokedCertsOk returns a tuple with the TidyCrossClusterRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCrossClusterRevokedCerts + +`func (o *PkiConfigureAutoTidyRequest) SetTidyCrossClusterRevokedCerts(v bool)` + +SetTidyCrossClusterRevokedCerts sets TidyCrossClusterRevokedCerts field to given value. + + +### HasTidyCrossClusterRevokedCerts + +`func (o *PkiConfigureAutoTidyRequest) HasTidyCrossClusterRevokedCerts() bool` + +HasTidyCrossClusterRevokedCerts returns a boolean if a field has been set. + + + + +### GetTidyExpiredIssuers + +`func (o *PkiConfigureAutoTidyRequest) GetTidyExpiredIssuers() bool` + +GetTidyExpiredIssuers returns the TidyExpiredIssuers field if non-nil, zero value otherwise. + +### GetTidyExpiredIssuersOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyExpiredIssuersOk() (*bool, bool)` + +GetTidyExpiredIssuersOk returns a tuple with the TidyExpiredIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyExpiredIssuers + +`func (o *PkiConfigureAutoTidyRequest) SetTidyExpiredIssuers(v bool)` + +SetTidyExpiredIssuers sets TidyExpiredIssuers field to given value. + + +### HasTidyExpiredIssuers + +`func (o *PkiConfigureAutoTidyRequest) HasTidyExpiredIssuers() bool` + +HasTidyExpiredIssuers returns a boolean if a field has been set. + + + + +### GetTidyMoveLegacyCaBundle + +`func (o *PkiConfigureAutoTidyRequest) GetTidyMoveLegacyCaBundle() bool` + +GetTidyMoveLegacyCaBundle returns the TidyMoveLegacyCaBundle field if non-nil, zero value otherwise. + +### GetTidyMoveLegacyCaBundleOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyMoveLegacyCaBundleOk() (*bool, bool)` + +GetTidyMoveLegacyCaBundleOk returns a tuple with the TidyMoveLegacyCaBundle field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyMoveLegacyCaBundle + +`func (o *PkiConfigureAutoTidyRequest) SetTidyMoveLegacyCaBundle(v bool)` + +SetTidyMoveLegacyCaBundle sets TidyMoveLegacyCaBundle field to given value. + + +### HasTidyMoveLegacyCaBundle + +`func (o *PkiConfigureAutoTidyRequest) HasTidyMoveLegacyCaBundle() bool` + +HasTidyMoveLegacyCaBundle returns a boolean if a field has been set. + + + + +### GetTidyRevocationList + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevocationList() bool` + +GetTidyRevocationList returns the TidyRevocationList field if non-nil, zero value otherwise. + +### GetTidyRevocationListOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevocationListOk() (*bool, bool)` + +GetTidyRevocationListOk returns a tuple with the TidyRevocationList field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevocationList + +`func (o *PkiConfigureAutoTidyRequest) SetTidyRevocationList(v bool)` + +SetTidyRevocationList sets TidyRevocationList field to given value. + + +### HasTidyRevocationList + +`func (o *PkiConfigureAutoTidyRequest) HasTidyRevocationList() bool` + +HasTidyRevocationList returns a boolean if a field has been set. + + + + +### GetTidyRevocationQueue + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevocationQueue() bool` + +GetTidyRevocationQueue returns the TidyRevocationQueue field if non-nil, zero value otherwise. + +### GetTidyRevocationQueueOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevocationQueueOk() (*bool, bool)` + +GetTidyRevocationQueueOk returns a tuple with the TidyRevocationQueue field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevocationQueue + +`func (o *PkiConfigureAutoTidyRequest) SetTidyRevocationQueue(v bool)` + +SetTidyRevocationQueue sets TidyRevocationQueue field to given value. + + +### HasTidyRevocationQueue + +`func (o *PkiConfigureAutoTidyRequest) HasTidyRevocationQueue() bool` + +HasTidyRevocationQueue returns a boolean if a field has been set. + + + + +### GetTidyRevokedCertIssuerAssociations + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevokedCertIssuerAssociations() bool` + +GetTidyRevokedCertIssuerAssociations returns the TidyRevokedCertIssuerAssociations field if non-nil, zero value otherwise. + +### GetTidyRevokedCertIssuerAssociationsOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` + +GetTidyRevokedCertIssuerAssociationsOk returns a tuple with the TidyRevokedCertIssuerAssociations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCertIssuerAssociations + +`func (o *PkiConfigureAutoTidyRequest) SetTidyRevokedCertIssuerAssociations(v bool)` + +SetTidyRevokedCertIssuerAssociations sets TidyRevokedCertIssuerAssociations field to given value. + + +### HasTidyRevokedCertIssuerAssociations + +`func (o *PkiConfigureAutoTidyRequest) HasTidyRevokedCertIssuerAssociations() bool` + +HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. + + + + +### GetTidyRevokedCerts + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevokedCerts() bool` + +GetTidyRevokedCerts returns the TidyRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyRevokedCertsOk + +`func (o *PkiConfigureAutoTidyRequest) GetTidyRevokedCertsOk() (*bool, bool)` + +GetTidyRevokedCertsOk returns a tuple with the TidyRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCerts + +`func (o *PkiConfigureAutoTidyRequest) SetTidyRevokedCerts(v bool)` + +SetTidyRevokedCerts sets TidyRevokedCerts field to given value. + + +### HasTidyRevokedCerts + +`func (o *PkiConfigureAutoTidyRequest) HasTidyRevokedCerts() bool` + +HasTidyRevokedCerts returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiConfigureAutoTidyResponse.md b/docs/PkiConfigureAutoTidyResponse.md new file mode 100644 index 00000000..cf090e3e --- /dev/null +++ b/docs/PkiConfigureAutoTidyResponse.md @@ -0,0 +1,429 @@ +# PkiConfigureAutoTidyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Enabled** | Pointer to **bool** | Specifies whether automatic tidy is enabled or not | [optional] +**IntervalDuration** | Pointer to **int32** | Specifies the duration between automatic tidy operation | [optional] +**IssuerSafetyBuffer** | Pointer to **int32** | Issuer safety buffer | [optional] +**PauseDuration** | Pointer to **string** | Duration to pause between tidying certificates | [optional] +**RevocationQueueSafetyBuffer** | Pointer to **int32** | | [optional] +**SafetyBuffer** | Pointer to **int32** | Safety buffer time duration | [optional] +**TidyCertStore** | Pointer to **bool** | Specifies whether to tidy up the certificate store | [optional] +**TidyCrossClusterRevokedCerts** | Pointer to **bool** | | [optional] +**TidyExpiredIssuers** | Pointer to **bool** | Specifies whether tidy expired issuers | [optional] +**TidyMoveLegacyCaBundle** | Pointer to **bool** | | [optional] +**TidyRevocationQueue** | Pointer to **bool** | | [optional] +**TidyRevokedCertIssuerAssociations** | Pointer to **bool** | Specifies whether to associate revoked certificates with their corresponding issuers | [optional] +**TidyRevokedCerts** | Pointer to **bool** | Specifies whether to remove all invalid and expired certificates from storage | [optional] + + + +## Methods + + +### NewPkiConfigureAutoTidyResponse + +`func NewPkiConfigureAutoTidyResponse() *PkiConfigureAutoTidyResponse` + +NewPkiConfigureAutoTidyResponse instantiates a new PkiConfigureAutoTidyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureAutoTidyResponseWithDefaults + +`func NewPkiConfigureAutoTidyResponseWithDefaults() *PkiConfigureAutoTidyResponse` + +NewPkiConfigureAutoTidyResponseWithDefaults instantiates a new PkiConfigureAutoTidyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetEnabled + +`func (o *PkiConfigureAutoTidyResponse) GetEnabled() bool` + +GetEnabled returns the Enabled field if non-nil, zero value otherwise. + +### GetEnabledOk + +`func (o *PkiConfigureAutoTidyResponse) GetEnabledOk() (*bool, bool)` + +GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnabled + +`func (o *PkiConfigureAutoTidyResponse) SetEnabled(v bool)` + +SetEnabled sets Enabled field to given value. + + +### HasEnabled + +`func (o *PkiConfigureAutoTidyResponse) HasEnabled() bool` + +HasEnabled returns a boolean if a field has been set. + + + + +### GetIntervalDuration + +`func (o *PkiConfigureAutoTidyResponse) GetIntervalDuration() int32` + +GetIntervalDuration returns the IntervalDuration field if non-nil, zero value otherwise. + +### GetIntervalDurationOk + +`func (o *PkiConfigureAutoTidyResponse) GetIntervalDurationOk() (*int32, bool)` + +GetIntervalDurationOk returns a tuple with the IntervalDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIntervalDuration + +`func (o *PkiConfigureAutoTidyResponse) SetIntervalDuration(v int32)` + +SetIntervalDuration sets IntervalDuration field to given value. + + +### HasIntervalDuration + +`func (o *PkiConfigureAutoTidyResponse) HasIntervalDuration() bool` + +HasIntervalDuration returns a boolean if a field has been set. + + + + +### GetIssuerSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) GetIssuerSafetyBuffer() int32` + +GetIssuerSafetyBuffer returns the IssuerSafetyBuffer field if non-nil, zero value otherwise. + +### GetIssuerSafetyBufferOk + +`func (o *PkiConfigureAutoTidyResponse) GetIssuerSafetyBufferOk() (*int32, bool)` + +GetIssuerSafetyBufferOk returns a tuple with the IssuerSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) SetIssuerSafetyBuffer(v int32)` + +SetIssuerSafetyBuffer sets IssuerSafetyBuffer field to given value. + + +### HasIssuerSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) HasIssuerSafetyBuffer() bool` + +HasIssuerSafetyBuffer returns a boolean if a field has been set. + + + + +### GetPauseDuration + +`func (o *PkiConfigureAutoTidyResponse) GetPauseDuration() string` + +GetPauseDuration returns the PauseDuration field if non-nil, zero value otherwise. + +### GetPauseDurationOk + +`func (o *PkiConfigureAutoTidyResponse) GetPauseDurationOk() (*string, bool)` + +GetPauseDurationOk returns a tuple with the PauseDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPauseDuration + +`func (o *PkiConfigureAutoTidyResponse) SetPauseDuration(v string)` + +SetPauseDuration sets PauseDuration field to given value. + + +### HasPauseDuration + +`func (o *PkiConfigureAutoTidyResponse) HasPauseDuration() bool` + +HasPauseDuration returns a boolean if a field has been set. + + + + +### GetRevocationQueueSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) GetRevocationQueueSafetyBuffer() int32` + +GetRevocationQueueSafetyBuffer returns the RevocationQueueSafetyBuffer field if non-nil, zero value otherwise. + +### GetRevocationQueueSafetyBufferOk + +`func (o *PkiConfigureAutoTidyResponse) GetRevocationQueueSafetyBufferOk() (*int32, bool)` + +GetRevocationQueueSafetyBufferOk returns a tuple with the RevocationQueueSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationQueueSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) SetRevocationQueueSafetyBuffer(v int32)` + +SetRevocationQueueSafetyBuffer sets RevocationQueueSafetyBuffer field to given value. + + +### HasRevocationQueueSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) HasRevocationQueueSafetyBuffer() bool` + +HasRevocationQueueSafetyBuffer returns a boolean if a field has been set. + + + + +### GetSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) GetSafetyBuffer() int32` + +GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. + +### GetSafetyBufferOk + +`func (o *PkiConfigureAutoTidyResponse) GetSafetyBufferOk() (*int32, bool)` + +GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) SetSafetyBuffer(v int32)` + +SetSafetyBuffer sets SafetyBuffer field to given value. + + +### HasSafetyBuffer + +`func (o *PkiConfigureAutoTidyResponse) HasSafetyBuffer() bool` + +HasSafetyBuffer returns a boolean if a field has been set. + + + + +### GetTidyCertStore + +`func (o *PkiConfigureAutoTidyResponse) GetTidyCertStore() bool` + +GetTidyCertStore returns the TidyCertStore field if non-nil, zero value otherwise. + +### GetTidyCertStoreOk + +`func (o *PkiConfigureAutoTidyResponse) GetTidyCertStoreOk() (*bool, bool)` + +GetTidyCertStoreOk returns a tuple with the TidyCertStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCertStore + +`func (o *PkiConfigureAutoTidyResponse) SetTidyCertStore(v bool)` + +SetTidyCertStore sets TidyCertStore field to given value. + + +### HasTidyCertStore + +`func (o *PkiConfigureAutoTidyResponse) HasTidyCertStore() bool` + +HasTidyCertStore returns a boolean if a field has been set. + + + + +### GetTidyCrossClusterRevokedCerts + +`func (o *PkiConfigureAutoTidyResponse) GetTidyCrossClusterRevokedCerts() bool` + +GetTidyCrossClusterRevokedCerts returns the TidyCrossClusterRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyCrossClusterRevokedCertsOk + +`func (o *PkiConfigureAutoTidyResponse) GetTidyCrossClusterRevokedCertsOk() (*bool, bool)` + +GetTidyCrossClusterRevokedCertsOk returns a tuple with the TidyCrossClusterRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCrossClusterRevokedCerts + +`func (o *PkiConfigureAutoTidyResponse) SetTidyCrossClusterRevokedCerts(v bool)` + +SetTidyCrossClusterRevokedCerts sets TidyCrossClusterRevokedCerts field to given value. + + +### HasTidyCrossClusterRevokedCerts + +`func (o *PkiConfigureAutoTidyResponse) HasTidyCrossClusterRevokedCerts() bool` + +HasTidyCrossClusterRevokedCerts returns a boolean if a field has been set. + + + + +### GetTidyExpiredIssuers + +`func (o *PkiConfigureAutoTidyResponse) GetTidyExpiredIssuers() bool` + +GetTidyExpiredIssuers returns the TidyExpiredIssuers field if non-nil, zero value otherwise. + +### GetTidyExpiredIssuersOk + +`func (o *PkiConfigureAutoTidyResponse) GetTidyExpiredIssuersOk() (*bool, bool)` + +GetTidyExpiredIssuersOk returns a tuple with the TidyExpiredIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyExpiredIssuers + +`func (o *PkiConfigureAutoTidyResponse) SetTidyExpiredIssuers(v bool)` + +SetTidyExpiredIssuers sets TidyExpiredIssuers field to given value. + + +### HasTidyExpiredIssuers + +`func (o *PkiConfigureAutoTidyResponse) HasTidyExpiredIssuers() bool` + +HasTidyExpiredIssuers returns a boolean if a field has been set. + + + + +### GetTidyMoveLegacyCaBundle + +`func (o *PkiConfigureAutoTidyResponse) GetTidyMoveLegacyCaBundle() bool` + +GetTidyMoveLegacyCaBundle returns the TidyMoveLegacyCaBundle field if non-nil, zero value otherwise. + +### GetTidyMoveLegacyCaBundleOk + +`func (o *PkiConfigureAutoTidyResponse) GetTidyMoveLegacyCaBundleOk() (*bool, bool)` + +GetTidyMoveLegacyCaBundleOk returns a tuple with the TidyMoveLegacyCaBundle field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyMoveLegacyCaBundle + +`func (o *PkiConfigureAutoTidyResponse) SetTidyMoveLegacyCaBundle(v bool)` + +SetTidyMoveLegacyCaBundle sets TidyMoveLegacyCaBundle field to given value. + + +### HasTidyMoveLegacyCaBundle + +`func (o *PkiConfigureAutoTidyResponse) HasTidyMoveLegacyCaBundle() bool` + +HasTidyMoveLegacyCaBundle returns a boolean if a field has been set. + + + + +### GetTidyRevocationQueue + +`func (o *PkiConfigureAutoTidyResponse) GetTidyRevocationQueue() bool` + +GetTidyRevocationQueue returns the TidyRevocationQueue field if non-nil, zero value otherwise. + +### GetTidyRevocationQueueOk + +`func (o *PkiConfigureAutoTidyResponse) GetTidyRevocationQueueOk() (*bool, bool)` + +GetTidyRevocationQueueOk returns a tuple with the TidyRevocationQueue field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevocationQueue + +`func (o *PkiConfigureAutoTidyResponse) SetTidyRevocationQueue(v bool)` + +SetTidyRevocationQueue sets TidyRevocationQueue field to given value. + + +### HasTidyRevocationQueue + +`func (o *PkiConfigureAutoTidyResponse) HasTidyRevocationQueue() bool` + +HasTidyRevocationQueue returns a boolean if a field has been set. + + + + +### GetTidyRevokedCertIssuerAssociations + +`func (o *PkiConfigureAutoTidyResponse) GetTidyRevokedCertIssuerAssociations() bool` + +GetTidyRevokedCertIssuerAssociations returns the TidyRevokedCertIssuerAssociations field if non-nil, zero value otherwise. + +### GetTidyRevokedCertIssuerAssociationsOk + +`func (o *PkiConfigureAutoTidyResponse) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` + +GetTidyRevokedCertIssuerAssociationsOk returns a tuple with the TidyRevokedCertIssuerAssociations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCertIssuerAssociations + +`func (o *PkiConfigureAutoTidyResponse) SetTidyRevokedCertIssuerAssociations(v bool)` + +SetTidyRevokedCertIssuerAssociations sets TidyRevokedCertIssuerAssociations field to given value. + + +### HasTidyRevokedCertIssuerAssociations + +`func (o *PkiConfigureAutoTidyResponse) HasTidyRevokedCertIssuerAssociations() bool` + +HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. + + + + +### GetTidyRevokedCerts + +`func (o *PkiConfigureAutoTidyResponse) GetTidyRevokedCerts() bool` + +GetTidyRevokedCerts returns the TidyRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyRevokedCertsOk + +`func (o *PkiConfigureAutoTidyResponse) GetTidyRevokedCertsOk() (*bool, bool)` + +GetTidyRevokedCertsOk returns a tuple with the TidyRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCerts + +`func (o *PkiConfigureAutoTidyResponse) SetTidyRevokedCerts(v bool)` + +SetTidyRevokedCerts sets TidyRevokedCerts field to given value. + + +### HasTidyRevokedCerts + +`func (o *PkiConfigureAutoTidyResponse) HasTidyRevokedCerts() bool` + +HasTidyRevokedCerts returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteCAConfigRequest.md b/docs/PkiConfigureCaRequest.md similarity index 65% rename from docs/PKIWriteCAConfigRequest.md rename to docs/PkiConfigureCaRequest.md index d0cf771d..287efbf8 100644 --- a/docs/PKIWriteCAConfigRequest.md +++ b/docs/PkiConfigureCaRequest.md @@ -1,4 +1,4 @@ -# PKIWriteCAConfigRequest +# PkiConfigureCaRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteCAConfigRequest +### NewPkiConfigureCaRequest -`func NewPKIWriteCAConfigRequest() *PKIWriteCAConfigRequest` +`func NewPkiConfigureCaRequest() *PkiConfigureCaRequest` -NewPKIWriteCAConfigRequest instantiates a new PKIWriteCAConfigRequest object +NewPkiConfigureCaRequest instantiates a new PkiConfigureCaRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteCAConfigRequestWithDefaults +### NewPkiConfigureCaRequestWithDefaults -`func NewPKIWriteCAConfigRequestWithDefaults() *PKIWriteCAConfigRequest` +`func NewPkiConfigureCaRequestWithDefaults() *PkiConfigureCaRequest` -NewPKIWriteCAConfigRequestWithDefaults instantiates a new PKIWriteCAConfigRequest object +NewPkiConfigureCaRequestWithDefaults instantiates a new PkiConfigureCaRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPemBundle -`func (o *PKIWriteCAConfigRequest) GetPemBundle() string` +`func (o *PkiConfigureCaRequest) GetPemBundle() string` GetPemBundle returns the PemBundle field if non-nil, zero value otherwise. ### GetPemBundleOk -`func (o *PKIWriteCAConfigRequest) GetPemBundleOk() (*string, bool)` +`func (o *PkiConfigureCaRequest) GetPemBundleOk() (*string, bool)` GetPemBundleOk returns a tuple with the PemBundle field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPemBundle -`func (o *PKIWriteCAConfigRequest) SetPemBundle(v string)` +`func (o *PkiConfigureCaRequest) SetPemBundle(v string)` SetPemBundle sets PemBundle field to given value. ### HasPemBundle -`func (o *PKIWriteCAConfigRequest) HasPemBundle() bool` +`func (o *PkiConfigureCaRequest) HasPemBundle() bool` HasPemBundle returns a boolean if a field has been set. diff --git a/docs/PkiConfigureCaResponse.md b/docs/PkiConfigureCaResponse.md new file mode 100644 index 00000000..4ee70fbc --- /dev/null +++ b/docs/PkiConfigureCaResponse.md @@ -0,0 +1,129 @@ +# PkiConfigureCaResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ImportedIssuers** | Pointer to **[]string** | Net-new issuers imported as a part of this request | [optional] +**ImportedKeys** | Pointer to **[]string** | Net-new keys imported as a part of this request | [optional] +**Mapping** | Pointer to **map[string]interface{}** | A mapping of issuer_id to key_id for all issuers included in this request | [optional] + + + +## Methods + + +### NewPkiConfigureCaResponse + +`func NewPkiConfigureCaResponse() *PkiConfigureCaResponse` + +NewPkiConfigureCaResponse instantiates a new PkiConfigureCaResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureCaResponseWithDefaults + +`func NewPkiConfigureCaResponseWithDefaults() *PkiConfigureCaResponse` + +NewPkiConfigureCaResponseWithDefaults instantiates a new PkiConfigureCaResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetImportedIssuers + +`func (o *PkiConfigureCaResponse) GetImportedIssuers() []string` + +GetImportedIssuers returns the ImportedIssuers field if non-nil, zero value otherwise. + +### GetImportedIssuersOk + +`func (o *PkiConfigureCaResponse) GetImportedIssuersOk() (*[]string, bool)` + +GetImportedIssuersOk returns a tuple with the ImportedIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedIssuers + +`func (o *PkiConfigureCaResponse) SetImportedIssuers(v []string)` + +SetImportedIssuers sets ImportedIssuers field to given value. + + +### HasImportedIssuers + +`func (o *PkiConfigureCaResponse) HasImportedIssuers() bool` + +HasImportedIssuers returns a boolean if a field has been set. + + + + +### GetImportedKeys + +`func (o *PkiConfigureCaResponse) GetImportedKeys() []string` + +GetImportedKeys returns the ImportedKeys field if non-nil, zero value otherwise. + +### GetImportedKeysOk + +`func (o *PkiConfigureCaResponse) GetImportedKeysOk() (*[]string, bool)` + +GetImportedKeysOk returns a tuple with the ImportedKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedKeys + +`func (o *PkiConfigureCaResponse) SetImportedKeys(v []string)` + +SetImportedKeys sets ImportedKeys field to given value. + + +### HasImportedKeys + +`func (o *PkiConfigureCaResponse) HasImportedKeys() bool` + +HasImportedKeys returns a boolean if a field has been set. + + + + +### GetMapping + +`func (o *PkiConfigureCaResponse) GetMapping() map[string]interface{}` + +GetMapping returns the Mapping field if non-nil, zero value otherwise. + +### GetMappingOk + +`func (o *PkiConfigureCaResponse) GetMappingOk() (*map[string]interface{}, bool)` + +GetMappingOk returns a tuple with the Mapping field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMapping + +`func (o *PkiConfigureCaResponse) SetMapping(v map[string]interface{})` + +SetMapping sets Mapping field to given value. + + +### HasMapping + +`func (o *PkiConfigureCaResponse) HasMapping() bool` + +HasMapping returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiConfigureClusterRequest.md b/docs/PkiConfigureClusterRequest.md new file mode 100644 index 00000000..eb0c9650 --- /dev/null +++ b/docs/PkiConfigureClusterRequest.md @@ -0,0 +1,99 @@ +# PkiConfigureClusterRequest + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AiaPath** | Pointer to **string** | Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki | [optional] +**Path** | Pointer to **string** | Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki | [optional] + + + +## Methods + + +### NewPkiConfigureClusterRequest + +`func NewPkiConfigureClusterRequest() *PkiConfigureClusterRequest` + +NewPkiConfigureClusterRequest instantiates a new PkiConfigureClusterRequest object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureClusterRequestWithDefaults + +`func NewPkiConfigureClusterRequestWithDefaults() *PkiConfigureClusterRequest` + +NewPkiConfigureClusterRequestWithDefaults instantiates a new PkiConfigureClusterRequest object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAiaPath + +`func (o *PkiConfigureClusterRequest) GetAiaPath() string` + +GetAiaPath returns the AiaPath field if non-nil, zero value otherwise. + +### GetAiaPathOk + +`func (o *PkiConfigureClusterRequest) GetAiaPathOk() (*string, bool)` + +GetAiaPathOk returns a tuple with the AiaPath field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAiaPath + +`func (o *PkiConfigureClusterRequest) SetAiaPath(v string)` + +SetAiaPath sets AiaPath field to given value. + + +### HasAiaPath + +`func (o *PkiConfigureClusterRequest) HasAiaPath() bool` + +HasAiaPath returns a boolean if a field has been set. + + + + +### GetPath + +`func (o *PkiConfigureClusterRequest) GetPath() string` + +GetPath returns the Path field if non-nil, zero value otherwise. + +### GetPathOk + +`func (o *PkiConfigureClusterRequest) GetPathOk() (*string, bool)` + +GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPath + +`func (o *PkiConfigureClusterRequest) SetPath(v string)` + +SetPath sets Path field to given value. + + +### HasPath + +`func (o *PkiConfigureClusterRequest) HasPath() bool` + +HasPath returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiConfigureClusterResponse.md b/docs/PkiConfigureClusterResponse.md new file mode 100644 index 00000000..55ab8a5b --- /dev/null +++ b/docs/PkiConfigureClusterResponse.md @@ -0,0 +1,99 @@ +# PkiConfigureClusterResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AiaPath** | Pointer to **string** | Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki | [optional] +**Path** | Pointer to **string** | Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki | [optional] + + + +## Methods + + +### NewPkiConfigureClusterResponse + +`func NewPkiConfigureClusterResponse() *PkiConfigureClusterResponse` + +NewPkiConfigureClusterResponse instantiates a new PkiConfigureClusterResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureClusterResponseWithDefaults + +`func NewPkiConfigureClusterResponseWithDefaults() *PkiConfigureClusterResponse` + +NewPkiConfigureClusterResponseWithDefaults instantiates a new PkiConfigureClusterResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAiaPath + +`func (o *PkiConfigureClusterResponse) GetAiaPath() string` + +GetAiaPath returns the AiaPath field if non-nil, zero value otherwise. + +### GetAiaPathOk + +`func (o *PkiConfigureClusterResponse) GetAiaPathOk() (*string, bool)` + +GetAiaPathOk returns a tuple with the AiaPath field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAiaPath + +`func (o *PkiConfigureClusterResponse) SetAiaPath(v string)` + +SetAiaPath sets AiaPath field to given value. + + +### HasAiaPath + +`func (o *PkiConfigureClusterResponse) HasAiaPath() bool` + +HasAiaPath returns a boolean if a field has been set. + + + + +### GetPath + +`func (o *PkiConfigureClusterResponse) GetPath() string` + +GetPath returns the Path field if non-nil, zero value otherwise. + +### GetPathOk + +`func (o *PkiConfigureClusterResponse) GetPathOk() (*string, bool)` + +GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPath + +`func (o *PkiConfigureClusterResponse) SetPath(v string)` + +SetPath sets Path field to given value. + + +### HasPath + +`func (o *PkiConfigureClusterResponse) HasPath() bool` + +HasPath returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteCRLConfigRequest.md b/docs/PkiConfigureCrlRequest.md similarity index 50% rename from docs/PKIWriteCRLConfigRequest.md rename to docs/PkiConfigureCrlRequest.md index 4246b7de..dc37498b 100644 --- a/docs/PKIWriteCRLConfigRequest.md +++ b/docs/PkiConfigureCrlRequest.md @@ -1,4 +1,4 @@ -# PKIWriteCRLConfigRequest +# PkiConfigureCrlRequest ## Properties @@ -7,59 +7,62 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **AutoRebuild** | Pointer to **bool** | If set to true, enables automatic rebuilding of the CRL | [optional] **AutoRebuildGracePeriod** | Pointer to **string** | The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h. | [optional] [default to "12h"] +**CrossClusterRevocation** | Pointer to **bool** | Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true. | [optional] **DeltaRebuildInterval** | Pointer to **string** | The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m. | [optional] [default to "15m"] **Disable** | Pointer to **bool** | If set to true, disables generating the CRL entirely. | [optional] **EnableDelta** | Pointer to **bool** | Whether to enable delta CRLs between authoritative CRL rebuilds | [optional] **Expiry** | Pointer to **string** | The amount of time the generated CRL should be valid; defaults to 72 hours | [optional] [default to "72h"] **OcspDisable** | Pointer to **bool** | If set to true, ocsp unauthorized responses will be returned. | [optional] **OcspExpiry** | Pointer to **string** | The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours | [optional] [default to "1h"] +**UnifiedCrl** | Pointer to **bool** | If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP. | [optional] [default to false] +**UnifiedCrlOnExistingPaths** | Pointer to **bool** | If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data | [optional] [default to false] ## Methods -### NewPKIWriteCRLConfigRequest +### NewPkiConfigureCrlRequest -`func NewPKIWriteCRLConfigRequest() *PKIWriteCRLConfigRequest` +`func NewPkiConfigureCrlRequest() *PkiConfigureCrlRequest` -NewPKIWriteCRLConfigRequest instantiates a new PKIWriteCRLConfigRequest object +NewPkiConfigureCrlRequest instantiates a new PkiConfigureCrlRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteCRLConfigRequestWithDefaults +### NewPkiConfigureCrlRequestWithDefaults -`func NewPKIWriteCRLConfigRequestWithDefaults() *PKIWriteCRLConfigRequest` +`func NewPkiConfigureCrlRequestWithDefaults() *PkiConfigureCrlRequest` -NewPKIWriteCRLConfigRequestWithDefaults instantiates a new PKIWriteCRLConfigRequest object +NewPkiConfigureCrlRequestWithDefaults instantiates a new PkiConfigureCrlRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAutoRebuild -`func (o *PKIWriteCRLConfigRequest) GetAutoRebuild() bool` +`func (o *PkiConfigureCrlRequest) GetAutoRebuild() bool` GetAutoRebuild returns the AutoRebuild field if non-nil, zero value otherwise. ### GetAutoRebuildOk -`func (o *PKIWriteCRLConfigRequest) GetAutoRebuildOk() (*bool, bool)` +`func (o *PkiConfigureCrlRequest) GetAutoRebuildOk() (*bool, bool)` GetAutoRebuildOk returns a tuple with the AutoRebuild field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAutoRebuild -`func (o *PKIWriteCRLConfigRequest) SetAutoRebuild(v bool)` +`func (o *PkiConfigureCrlRequest) SetAutoRebuild(v bool)` SetAutoRebuild sets AutoRebuild field to given value. ### HasAutoRebuild -`func (o *PKIWriteCRLConfigRequest) HasAutoRebuild() bool` +`func (o *PkiConfigureCrlRequest) HasAutoRebuild() bool` HasAutoRebuild returns a boolean if a field has been set. @@ -68,56 +71,85 @@ HasAutoRebuild returns a boolean if a field has been set. ### GetAutoRebuildGracePeriod -`func (o *PKIWriteCRLConfigRequest) GetAutoRebuildGracePeriod() string` +`func (o *PkiConfigureCrlRequest) GetAutoRebuildGracePeriod() string` GetAutoRebuildGracePeriod returns the AutoRebuildGracePeriod field if non-nil, zero value otherwise. ### GetAutoRebuildGracePeriodOk -`func (o *PKIWriteCRLConfigRequest) GetAutoRebuildGracePeriodOk() (*string, bool)` +`func (o *PkiConfigureCrlRequest) GetAutoRebuildGracePeriodOk() (*string, bool)` GetAutoRebuildGracePeriodOk returns a tuple with the AutoRebuildGracePeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAutoRebuildGracePeriod -`func (o *PKIWriteCRLConfigRequest) SetAutoRebuildGracePeriod(v string)` +`func (o *PkiConfigureCrlRequest) SetAutoRebuildGracePeriod(v string)` SetAutoRebuildGracePeriod sets AutoRebuildGracePeriod field to given value. ### HasAutoRebuildGracePeriod -`func (o *PKIWriteCRLConfigRequest) HasAutoRebuildGracePeriod() bool` +`func (o *PkiConfigureCrlRequest) HasAutoRebuildGracePeriod() bool` HasAutoRebuildGracePeriod returns a boolean if a field has been set. +### GetCrossClusterRevocation + +`func (o *PkiConfigureCrlRequest) GetCrossClusterRevocation() bool` + +GetCrossClusterRevocation returns the CrossClusterRevocation field if non-nil, zero value otherwise. + +### GetCrossClusterRevocationOk + +`func (o *PkiConfigureCrlRequest) GetCrossClusterRevocationOk() (*bool, bool)` + +GetCrossClusterRevocationOk returns a tuple with the CrossClusterRevocation field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrossClusterRevocation + +`func (o *PkiConfigureCrlRequest) SetCrossClusterRevocation(v bool)` + +SetCrossClusterRevocation sets CrossClusterRevocation field to given value. + + +### HasCrossClusterRevocation + +`func (o *PkiConfigureCrlRequest) HasCrossClusterRevocation() bool` + +HasCrossClusterRevocation returns a boolean if a field has been set. + + + + ### GetDeltaRebuildInterval -`func (o *PKIWriteCRLConfigRequest) GetDeltaRebuildInterval() string` +`func (o *PkiConfigureCrlRequest) GetDeltaRebuildInterval() string` GetDeltaRebuildInterval returns the DeltaRebuildInterval field if non-nil, zero value otherwise. ### GetDeltaRebuildIntervalOk -`func (o *PKIWriteCRLConfigRequest) GetDeltaRebuildIntervalOk() (*string, bool)` +`func (o *PkiConfigureCrlRequest) GetDeltaRebuildIntervalOk() (*string, bool)` GetDeltaRebuildIntervalOk returns a tuple with the DeltaRebuildInterval field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDeltaRebuildInterval -`func (o *PKIWriteCRLConfigRequest) SetDeltaRebuildInterval(v string)` +`func (o *PkiConfigureCrlRequest) SetDeltaRebuildInterval(v string)` SetDeltaRebuildInterval sets DeltaRebuildInterval field to given value. ### HasDeltaRebuildInterval -`func (o *PKIWriteCRLConfigRequest) HasDeltaRebuildInterval() bool` +`func (o *PkiConfigureCrlRequest) HasDeltaRebuildInterval() bool` HasDeltaRebuildInterval returns a boolean if a field has been set. @@ -126,27 +158,27 @@ HasDeltaRebuildInterval returns a boolean if a field has been set. ### GetDisable -`func (o *PKIWriteCRLConfigRequest) GetDisable() bool` +`func (o *PkiConfigureCrlRequest) GetDisable() bool` GetDisable returns the Disable field if non-nil, zero value otherwise. ### GetDisableOk -`func (o *PKIWriteCRLConfigRequest) GetDisableOk() (*bool, bool)` +`func (o *PkiConfigureCrlRequest) GetDisableOk() (*bool, bool)` GetDisableOk returns a tuple with the Disable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisable -`func (o *PKIWriteCRLConfigRequest) SetDisable(v bool)` +`func (o *PkiConfigureCrlRequest) SetDisable(v bool)` SetDisable sets Disable field to given value. ### HasDisable -`func (o *PKIWriteCRLConfigRequest) HasDisable() bool` +`func (o *PkiConfigureCrlRequest) HasDisable() bool` HasDisable returns a boolean if a field has been set. @@ -155,27 +187,27 @@ HasDisable returns a boolean if a field has been set. ### GetEnableDelta -`func (o *PKIWriteCRLConfigRequest) GetEnableDelta() bool` +`func (o *PkiConfigureCrlRequest) GetEnableDelta() bool` GetEnableDelta returns the EnableDelta field if non-nil, zero value otherwise. ### GetEnableDeltaOk -`func (o *PKIWriteCRLConfigRequest) GetEnableDeltaOk() (*bool, bool)` +`func (o *PkiConfigureCrlRequest) GetEnableDeltaOk() (*bool, bool)` GetEnableDeltaOk returns a tuple with the EnableDelta field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnableDelta -`func (o *PKIWriteCRLConfigRequest) SetEnableDelta(v bool)` +`func (o *PkiConfigureCrlRequest) SetEnableDelta(v bool)` SetEnableDelta sets EnableDelta field to given value. ### HasEnableDelta -`func (o *PKIWriteCRLConfigRequest) HasEnableDelta() bool` +`func (o *PkiConfigureCrlRequest) HasEnableDelta() bool` HasEnableDelta returns a boolean if a field has been set. @@ -184,27 +216,27 @@ HasEnableDelta returns a boolean if a field has been set. ### GetExpiry -`func (o *PKIWriteCRLConfigRequest) GetExpiry() string` +`func (o *PkiConfigureCrlRequest) GetExpiry() string` GetExpiry returns the Expiry field if non-nil, zero value otherwise. ### GetExpiryOk -`func (o *PKIWriteCRLConfigRequest) GetExpiryOk() (*string, bool)` +`func (o *PkiConfigureCrlRequest) GetExpiryOk() (*string, bool)` GetExpiryOk returns a tuple with the Expiry field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExpiry -`func (o *PKIWriteCRLConfigRequest) SetExpiry(v string)` +`func (o *PkiConfigureCrlRequest) SetExpiry(v string)` SetExpiry sets Expiry field to given value. ### HasExpiry -`func (o *PKIWriteCRLConfigRequest) HasExpiry() bool` +`func (o *PkiConfigureCrlRequest) HasExpiry() bool` HasExpiry returns a boolean if a field has been set. @@ -213,27 +245,27 @@ HasExpiry returns a boolean if a field has been set. ### GetOcspDisable -`func (o *PKIWriteCRLConfigRequest) GetOcspDisable() bool` +`func (o *PkiConfigureCrlRequest) GetOcspDisable() bool` GetOcspDisable returns the OcspDisable field if non-nil, zero value otherwise. ### GetOcspDisableOk -`func (o *PKIWriteCRLConfigRequest) GetOcspDisableOk() (*bool, bool)` +`func (o *PkiConfigureCrlRequest) GetOcspDisableOk() (*bool, bool)` GetOcspDisableOk returns a tuple with the OcspDisable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspDisable -`func (o *PKIWriteCRLConfigRequest) SetOcspDisable(v bool)` +`func (o *PkiConfigureCrlRequest) SetOcspDisable(v bool)` SetOcspDisable sets OcspDisable field to given value. ### HasOcspDisable -`func (o *PKIWriteCRLConfigRequest) HasOcspDisable() bool` +`func (o *PkiConfigureCrlRequest) HasOcspDisable() bool` HasOcspDisable returns a boolean if a field has been set. @@ -242,33 +274,91 @@ HasOcspDisable returns a boolean if a field has been set. ### GetOcspExpiry -`func (o *PKIWriteCRLConfigRequest) GetOcspExpiry() string` +`func (o *PkiConfigureCrlRequest) GetOcspExpiry() string` GetOcspExpiry returns the OcspExpiry field if non-nil, zero value otherwise. ### GetOcspExpiryOk -`func (o *PKIWriteCRLConfigRequest) GetOcspExpiryOk() (*string, bool)` +`func (o *PkiConfigureCrlRequest) GetOcspExpiryOk() (*string, bool)` GetOcspExpiryOk returns a tuple with the OcspExpiry field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspExpiry -`func (o *PKIWriteCRLConfigRequest) SetOcspExpiry(v string)` +`func (o *PkiConfigureCrlRequest) SetOcspExpiry(v string)` SetOcspExpiry sets OcspExpiry field to given value. ### HasOcspExpiry -`func (o *PKIWriteCRLConfigRequest) HasOcspExpiry() bool` +`func (o *PkiConfigureCrlRequest) HasOcspExpiry() bool` HasOcspExpiry returns a boolean if a field has been set. +### GetUnifiedCrl + +`func (o *PkiConfigureCrlRequest) GetUnifiedCrl() bool` + +GetUnifiedCrl returns the UnifiedCrl field if non-nil, zero value otherwise. + +### GetUnifiedCrlOk + +`func (o *PkiConfigureCrlRequest) GetUnifiedCrlOk() (*bool, bool)` + +GetUnifiedCrlOk returns a tuple with the UnifiedCrl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUnifiedCrl + +`func (o *PkiConfigureCrlRequest) SetUnifiedCrl(v bool)` + +SetUnifiedCrl sets UnifiedCrl field to given value. + + +### HasUnifiedCrl + +`func (o *PkiConfigureCrlRequest) HasUnifiedCrl() bool` + +HasUnifiedCrl returns a boolean if a field has been set. + + + + +### GetUnifiedCrlOnExistingPaths + +`func (o *PkiConfigureCrlRequest) GetUnifiedCrlOnExistingPaths() bool` + +GetUnifiedCrlOnExistingPaths returns the UnifiedCrlOnExistingPaths field if non-nil, zero value otherwise. + +### GetUnifiedCrlOnExistingPathsOk + +`func (o *PkiConfigureCrlRequest) GetUnifiedCrlOnExistingPathsOk() (*bool, bool)` + +GetUnifiedCrlOnExistingPathsOk returns a tuple with the UnifiedCrlOnExistingPaths field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUnifiedCrlOnExistingPaths + +`func (o *PkiConfigureCrlRequest) SetUnifiedCrlOnExistingPaths(v bool)` + +SetUnifiedCrlOnExistingPaths sets UnifiedCrlOnExistingPaths field to given value. + + +### HasUnifiedCrlOnExistingPaths + +`func (o *PkiConfigureCrlRequest) HasUnifiedCrlOnExistingPaths() bool` + +HasUnifiedCrlOnExistingPaths returns a boolean if a field has been set. + + + + diff --git a/docs/PkiConfigureCrlResponse.md b/docs/PkiConfigureCrlResponse.md new file mode 100644 index 00000000..ec51c6c5 --- /dev/null +++ b/docs/PkiConfigureCrlResponse.md @@ -0,0 +1,369 @@ +# PkiConfigureCrlResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AutoRebuild** | Pointer to **bool** | If set to true, enables automatic rebuilding of the CRL | [optional] +**AutoRebuildGracePeriod** | Pointer to **string** | The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h. | [optional] [default to "12h"] +**CrossClusterRevocation** | Pointer to **bool** | Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true. | [optional] +**DeltaRebuildInterval** | Pointer to **string** | The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m. | [optional] [default to "15m"] +**Disable** | Pointer to **bool** | If set to true, disables generating the CRL entirely. | [optional] +**EnableDelta** | Pointer to **bool** | Whether to enable delta CRLs between authoritative CRL rebuilds | [optional] +**Expiry** | Pointer to **string** | The amount of time the generated CRL should be valid; defaults to 72 hours | [optional] [default to "72h"] +**OcspDisable** | Pointer to **bool** | If set to true, ocsp unauthorized responses will be returned. | [optional] +**OcspExpiry** | Pointer to **string** | The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours | [optional] [default to "1h"] +**UnifiedCrl** | Pointer to **bool** | If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP. | [optional] +**UnifiedCrlOnExistingPaths** | Pointer to **bool** | If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data | [optional] + + + +## Methods + + +### NewPkiConfigureCrlResponse + +`func NewPkiConfigureCrlResponse() *PkiConfigureCrlResponse` + +NewPkiConfigureCrlResponse instantiates a new PkiConfigureCrlResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureCrlResponseWithDefaults + +`func NewPkiConfigureCrlResponseWithDefaults() *PkiConfigureCrlResponse` + +NewPkiConfigureCrlResponseWithDefaults instantiates a new PkiConfigureCrlResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAutoRebuild + +`func (o *PkiConfigureCrlResponse) GetAutoRebuild() bool` + +GetAutoRebuild returns the AutoRebuild field if non-nil, zero value otherwise. + +### GetAutoRebuildOk + +`func (o *PkiConfigureCrlResponse) GetAutoRebuildOk() (*bool, bool)` + +GetAutoRebuildOk returns a tuple with the AutoRebuild field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAutoRebuild + +`func (o *PkiConfigureCrlResponse) SetAutoRebuild(v bool)` + +SetAutoRebuild sets AutoRebuild field to given value. + + +### HasAutoRebuild + +`func (o *PkiConfigureCrlResponse) HasAutoRebuild() bool` + +HasAutoRebuild returns a boolean if a field has been set. + + + + +### GetAutoRebuildGracePeriod + +`func (o *PkiConfigureCrlResponse) GetAutoRebuildGracePeriod() string` + +GetAutoRebuildGracePeriod returns the AutoRebuildGracePeriod field if non-nil, zero value otherwise. + +### GetAutoRebuildGracePeriodOk + +`func (o *PkiConfigureCrlResponse) GetAutoRebuildGracePeriodOk() (*string, bool)` + +GetAutoRebuildGracePeriodOk returns a tuple with the AutoRebuildGracePeriod field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAutoRebuildGracePeriod + +`func (o *PkiConfigureCrlResponse) SetAutoRebuildGracePeriod(v string)` + +SetAutoRebuildGracePeriod sets AutoRebuildGracePeriod field to given value. + + +### HasAutoRebuildGracePeriod + +`func (o *PkiConfigureCrlResponse) HasAutoRebuildGracePeriod() bool` + +HasAutoRebuildGracePeriod returns a boolean if a field has been set. + + + + +### GetCrossClusterRevocation + +`func (o *PkiConfigureCrlResponse) GetCrossClusterRevocation() bool` + +GetCrossClusterRevocation returns the CrossClusterRevocation field if non-nil, zero value otherwise. + +### GetCrossClusterRevocationOk + +`func (o *PkiConfigureCrlResponse) GetCrossClusterRevocationOk() (*bool, bool)` + +GetCrossClusterRevocationOk returns a tuple with the CrossClusterRevocation field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrossClusterRevocation + +`func (o *PkiConfigureCrlResponse) SetCrossClusterRevocation(v bool)` + +SetCrossClusterRevocation sets CrossClusterRevocation field to given value. + + +### HasCrossClusterRevocation + +`func (o *PkiConfigureCrlResponse) HasCrossClusterRevocation() bool` + +HasCrossClusterRevocation returns a boolean if a field has been set. + + + + +### GetDeltaRebuildInterval + +`func (o *PkiConfigureCrlResponse) GetDeltaRebuildInterval() string` + +GetDeltaRebuildInterval returns the DeltaRebuildInterval field if non-nil, zero value otherwise. + +### GetDeltaRebuildIntervalOk + +`func (o *PkiConfigureCrlResponse) GetDeltaRebuildIntervalOk() (*string, bool)` + +GetDeltaRebuildIntervalOk returns a tuple with the DeltaRebuildInterval field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeltaRebuildInterval + +`func (o *PkiConfigureCrlResponse) SetDeltaRebuildInterval(v string)` + +SetDeltaRebuildInterval sets DeltaRebuildInterval field to given value. + + +### HasDeltaRebuildInterval + +`func (o *PkiConfigureCrlResponse) HasDeltaRebuildInterval() bool` + +HasDeltaRebuildInterval returns a boolean if a field has been set. + + + + +### GetDisable + +`func (o *PkiConfigureCrlResponse) GetDisable() bool` + +GetDisable returns the Disable field if non-nil, zero value otherwise. + +### GetDisableOk + +`func (o *PkiConfigureCrlResponse) GetDisableOk() (*bool, bool)` + +GetDisableOk returns a tuple with the Disable field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDisable + +`func (o *PkiConfigureCrlResponse) SetDisable(v bool)` + +SetDisable sets Disable field to given value. + + +### HasDisable + +`func (o *PkiConfigureCrlResponse) HasDisable() bool` + +HasDisable returns a boolean if a field has been set. + + + + +### GetEnableDelta + +`func (o *PkiConfigureCrlResponse) GetEnableDelta() bool` + +GetEnableDelta returns the EnableDelta field if non-nil, zero value otherwise. + +### GetEnableDeltaOk + +`func (o *PkiConfigureCrlResponse) GetEnableDeltaOk() (*bool, bool)` + +GetEnableDeltaOk returns a tuple with the EnableDelta field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnableDelta + +`func (o *PkiConfigureCrlResponse) SetEnableDelta(v bool)` + +SetEnableDelta sets EnableDelta field to given value. + + +### HasEnableDelta + +`func (o *PkiConfigureCrlResponse) HasEnableDelta() bool` + +HasEnableDelta returns a boolean if a field has been set. + + + + +### GetExpiry + +`func (o *PkiConfigureCrlResponse) GetExpiry() string` + +GetExpiry returns the Expiry field if non-nil, zero value otherwise. + +### GetExpiryOk + +`func (o *PkiConfigureCrlResponse) GetExpiryOk() (*string, bool)` + +GetExpiryOk returns a tuple with the Expiry field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiry + +`func (o *PkiConfigureCrlResponse) SetExpiry(v string)` + +SetExpiry sets Expiry field to given value. + + +### HasExpiry + +`func (o *PkiConfigureCrlResponse) HasExpiry() bool` + +HasExpiry returns a boolean if a field has been set. + + + + +### GetOcspDisable + +`func (o *PkiConfigureCrlResponse) GetOcspDisable() bool` + +GetOcspDisable returns the OcspDisable field if non-nil, zero value otherwise. + +### GetOcspDisableOk + +`func (o *PkiConfigureCrlResponse) GetOcspDisableOk() (*bool, bool)` + +GetOcspDisableOk returns a tuple with the OcspDisable field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspDisable + +`func (o *PkiConfigureCrlResponse) SetOcspDisable(v bool)` + +SetOcspDisable sets OcspDisable field to given value. + + +### HasOcspDisable + +`func (o *PkiConfigureCrlResponse) HasOcspDisable() bool` + +HasOcspDisable returns a boolean if a field has been set. + + + + +### GetOcspExpiry + +`func (o *PkiConfigureCrlResponse) GetOcspExpiry() string` + +GetOcspExpiry returns the OcspExpiry field if non-nil, zero value otherwise. + +### GetOcspExpiryOk + +`func (o *PkiConfigureCrlResponse) GetOcspExpiryOk() (*string, bool)` + +GetOcspExpiryOk returns a tuple with the OcspExpiry field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspExpiry + +`func (o *PkiConfigureCrlResponse) SetOcspExpiry(v string)` + +SetOcspExpiry sets OcspExpiry field to given value. + + +### HasOcspExpiry + +`func (o *PkiConfigureCrlResponse) HasOcspExpiry() bool` + +HasOcspExpiry returns a boolean if a field has been set. + + + + +### GetUnifiedCrl + +`func (o *PkiConfigureCrlResponse) GetUnifiedCrl() bool` + +GetUnifiedCrl returns the UnifiedCrl field if non-nil, zero value otherwise. + +### GetUnifiedCrlOk + +`func (o *PkiConfigureCrlResponse) GetUnifiedCrlOk() (*bool, bool)` + +GetUnifiedCrlOk returns a tuple with the UnifiedCrl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUnifiedCrl + +`func (o *PkiConfigureCrlResponse) SetUnifiedCrl(v bool)` + +SetUnifiedCrl sets UnifiedCrl field to given value. + + +### HasUnifiedCrl + +`func (o *PkiConfigureCrlResponse) HasUnifiedCrl() bool` + +HasUnifiedCrl returns a boolean if a field has been set. + + + + +### GetUnifiedCrlOnExistingPaths + +`func (o *PkiConfigureCrlResponse) GetUnifiedCrlOnExistingPaths() bool` + +GetUnifiedCrlOnExistingPaths returns the UnifiedCrlOnExistingPaths field if non-nil, zero value otherwise. + +### GetUnifiedCrlOnExistingPathsOk + +`func (o *PkiConfigureCrlResponse) GetUnifiedCrlOnExistingPathsOk() (*bool, bool)` + +GetUnifiedCrlOnExistingPathsOk returns a tuple with the UnifiedCrlOnExistingPaths field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUnifiedCrlOnExistingPaths + +`func (o *PkiConfigureCrlResponse) SetUnifiedCrlOnExistingPaths(v bool)` + +SetUnifiedCrlOnExistingPaths sets UnifiedCrlOnExistingPaths field to given value. + + +### HasUnifiedCrlOnExistingPaths + +`func (o *PkiConfigureCrlResponse) HasUnifiedCrlOnExistingPaths() bool` + +HasUnifiedCrlOnExistingPaths returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteIssuersConfigRequest.md b/docs/PkiConfigureIssuersRequest.md similarity index 65% rename from docs/PKIWriteIssuersConfigRequest.md rename to docs/PkiConfigureIssuersRequest.md index 3ca277b8..caa9e049 100644 --- a/docs/PKIWriteIssuersConfigRequest.md +++ b/docs/PkiConfigureIssuersRequest.md @@ -1,4 +1,4 @@ -# PKIWriteIssuersConfigRequest +# PkiConfigureIssuersRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteIssuersConfigRequest +### NewPkiConfigureIssuersRequest -`func NewPKIWriteIssuersConfigRequest() *PKIWriteIssuersConfigRequest` +`func NewPkiConfigureIssuersRequest() *PkiConfigureIssuersRequest` -NewPKIWriteIssuersConfigRequest instantiates a new PKIWriteIssuersConfigRequest object +NewPkiConfigureIssuersRequest instantiates a new PkiConfigureIssuersRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteIssuersConfigRequestWithDefaults +### NewPkiConfigureIssuersRequestWithDefaults -`func NewPKIWriteIssuersConfigRequestWithDefaults() *PKIWriteIssuersConfigRequest` +`func NewPkiConfigureIssuersRequestWithDefaults() *PkiConfigureIssuersRequest` -NewPKIWriteIssuersConfigRequestWithDefaults instantiates a new PKIWriteIssuersConfigRequest object +NewPkiConfigureIssuersRequestWithDefaults instantiates a new PkiConfigureIssuersRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDefault -`func (o *PKIWriteIssuersConfigRequest) GetDefault() string` +`func (o *PkiConfigureIssuersRequest) GetDefault() string` GetDefault returns the Default field if non-nil, zero value otherwise. ### GetDefaultOk -`func (o *PKIWriteIssuersConfigRequest) GetDefaultOk() (*string, bool)` +`func (o *PkiConfigureIssuersRequest) GetDefaultOk() (*string, bool)` GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefault -`func (o *PKIWriteIssuersConfigRequest) SetDefault(v string)` +`func (o *PkiConfigureIssuersRequest) SetDefault(v string)` SetDefault sets Default field to given value. ### HasDefault -`func (o *PKIWriteIssuersConfigRequest) HasDefault() bool` +`func (o *PkiConfigureIssuersRequest) HasDefault() bool` HasDefault returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasDefault returns a boolean if a field has been set. ### GetDefaultFollowsLatestIssuer -`func (o *PKIWriteIssuersConfigRequest) GetDefaultFollowsLatestIssuer() bool` +`func (o *PkiConfigureIssuersRequest) GetDefaultFollowsLatestIssuer() bool` GetDefaultFollowsLatestIssuer returns the DefaultFollowsLatestIssuer field if non-nil, zero value otherwise. ### GetDefaultFollowsLatestIssuerOk -`func (o *PKIWriteIssuersConfigRequest) GetDefaultFollowsLatestIssuerOk() (*bool, bool)` +`func (o *PkiConfigureIssuersRequest) GetDefaultFollowsLatestIssuerOk() (*bool, bool)` GetDefaultFollowsLatestIssuerOk returns a tuple with the DefaultFollowsLatestIssuer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultFollowsLatestIssuer -`func (o *PKIWriteIssuersConfigRequest) SetDefaultFollowsLatestIssuer(v bool)` +`func (o *PkiConfigureIssuersRequest) SetDefaultFollowsLatestIssuer(v bool)` SetDefaultFollowsLatestIssuer sets DefaultFollowsLatestIssuer field to given value. ### HasDefaultFollowsLatestIssuer -`func (o *PKIWriteIssuersConfigRequest) HasDefaultFollowsLatestIssuer() bool` +`func (o *PkiConfigureIssuersRequest) HasDefaultFollowsLatestIssuer() bool` HasDefaultFollowsLatestIssuer returns a boolean if a field has been set. diff --git a/docs/PkiConfigureIssuersResponse.md b/docs/PkiConfigureIssuersResponse.md new file mode 100644 index 00000000..6a33c266 --- /dev/null +++ b/docs/PkiConfigureIssuersResponse.md @@ -0,0 +1,99 @@ +# PkiConfigureIssuersResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Default** | Pointer to **string** | Reference (name or identifier) to the default issuer. | [optional] +**DefaultFollowsLatestIssuer** | Pointer to **bool** | Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false. | [optional] + + + +## Methods + + +### NewPkiConfigureIssuersResponse + +`func NewPkiConfigureIssuersResponse() *PkiConfigureIssuersResponse` + +NewPkiConfigureIssuersResponse instantiates a new PkiConfigureIssuersResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureIssuersResponseWithDefaults + +`func NewPkiConfigureIssuersResponseWithDefaults() *PkiConfigureIssuersResponse` + +NewPkiConfigureIssuersResponseWithDefaults instantiates a new PkiConfigureIssuersResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetDefault + +`func (o *PkiConfigureIssuersResponse) GetDefault() string` + +GetDefault returns the Default field if non-nil, zero value otherwise. + +### GetDefaultOk + +`func (o *PkiConfigureIssuersResponse) GetDefaultOk() (*string, bool)` + +GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefault + +`func (o *PkiConfigureIssuersResponse) SetDefault(v string)` + +SetDefault sets Default field to given value. + + +### HasDefault + +`func (o *PkiConfigureIssuersResponse) HasDefault() bool` + +HasDefault returns a boolean if a field has been set. + + + + +### GetDefaultFollowsLatestIssuer + +`func (o *PkiConfigureIssuersResponse) GetDefaultFollowsLatestIssuer() bool` + +GetDefaultFollowsLatestIssuer returns the DefaultFollowsLatestIssuer field if non-nil, zero value otherwise. + +### GetDefaultFollowsLatestIssuerOk + +`func (o *PkiConfigureIssuersResponse) GetDefaultFollowsLatestIssuerOk() (*bool, bool)` + +GetDefaultFollowsLatestIssuerOk returns a tuple with the DefaultFollowsLatestIssuer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefaultFollowsLatestIssuer + +`func (o *PkiConfigureIssuersResponse) SetDefaultFollowsLatestIssuer(v bool)` + +SetDefaultFollowsLatestIssuer sets DefaultFollowsLatestIssuer field to given value. + + +### HasDefaultFollowsLatestIssuer + +`func (o *PkiConfigureIssuersResponse) HasDefaultFollowsLatestIssuer() bool` + +HasDefaultFollowsLatestIssuer returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteKeysConfigRequest.md b/docs/PkiConfigureKeysRequest.md similarity index 63% rename from docs/PKIWriteKeysConfigRequest.md rename to docs/PkiConfigureKeysRequest.md index e96211d8..f59e714c 100644 --- a/docs/PKIWriteKeysConfigRequest.md +++ b/docs/PkiConfigureKeysRequest.md @@ -1,4 +1,4 @@ -# PKIWriteKeysConfigRequest +# PkiConfigureKeysRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteKeysConfigRequest +### NewPkiConfigureKeysRequest -`func NewPKIWriteKeysConfigRequest() *PKIWriteKeysConfigRequest` +`func NewPkiConfigureKeysRequest() *PkiConfigureKeysRequest` -NewPKIWriteKeysConfigRequest instantiates a new PKIWriteKeysConfigRequest object +NewPkiConfigureKeysRequest instantiates a new PkiConfigureKeysRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteKeysConfigRequestWithDefaults +### NewPkiConfigureKeysRequestWithDefaults -`func NewPKIWriteKeysConfigRequestWithDefaults() *PKIWriteKeysConfigRequest` +`func NewPkiConfigureKeysRequestWithDefaults() *PkiConfigureKeysRequest` -NewPKIWriteKeysConfigRequestWithDefaults instantiates a new PKIWriteKeysConfigRequest object +NewPkiConfigureKeysRequestWithDefaults instantiates a new PkiConfigureKeysRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDefault -`func (o *PKIWriteKeysConfigRequest) GetDefault() string` +`func (o *PkiConfigureKeysRequest) GetDefault() string` GetDefault returns the Default field if non-nil, zero value otherwise. ### GetDefaultOk -`func (o *PKIWriteKeysConfigRequest) GetDefaultOk() (*string, bool)` +`func (o *PkiConfigureKeysRequest) GetDefaultOk() (*string, bool)` GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefault -`func (o *PKIWriteKeysConfigRequest) SetDefault(v string)` +`func (o *PkiConfigureKeysRequest) SetDefault(v string)` SetDefault sets Default field to given value. ### HasDefault -`func (o *PKIWriteKeysConfigRequest) HasDefault() bool` +`func (o *PkiConfigureKeysRequest) HasDefault() bool` HasDefault returns a boolean if a field has been set. diff --git a/docs/PkiConfigureKeysResponse.md b/docs/PkiConfigureKeysResponse.md new file mode 100644 index 00000000..111c16ab --- /dev/null +++ b/docs/PkiConfigureKeysResponse.md @@ -0,0 +1,69 @@ +# PkiConfigureKeysResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Default** | Pointer to **string** | Reference (name or identifier) to the default issuer. | [optional] + + + +## Methods + + +### NewPkiConfigureKeysResponse + +`func NewPkiConfigureKeysResponse() *PkiConfigureKeysResponse` + +NewPkiConfigureKeysResponse instantiates a new PkiConfigureKeysResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureKeysResponseWithDefaults + +`func NewPkiConfigureKeysResponseWithDefaults() *PkiConfigureKeysResponse` + +NewPkiConfigureKeysResponseWithDefaults instantiates a new PkiConfigureKeysResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetDefault + +`func (o *PkiConfigureKeysResponse) GetDefault() string` + +GetDefault returns the Default field if non-nil, zero value otherwise. + +### GetDefaultOk + +`func (o *PkiConfigureKeysResponse) GetDefaultOk() (*string, bool)` + +GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefault + +`func (o *PkiConfigureKeysResponse) SetDefault(v string)` + +SetDefault sets Default field to given value. + + +### HasDefault + +`func (o *PkiConfigureKeysResponse) HasDefault() bool` + +HasDefault returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiConfigureUrlsRequest.md b/docs/PkiConfigureUrlsRequest.md new file mode 100644 index 00000000..56017531 --- /dev/null +++ b/docs/PkiConfigureUrlsRequest.md @@ -0,0 +1,159 @@ +# PkiConfigureUrlsRequest + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CrlDistributionPoints** | Pointer to **[]string** | Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. | [optional] +**EnableTemplating** | Pointer to **bool** | Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}', '{{cluster_path}}', and '{{cluster_aia_path}}' are available, but the addresses are not checked for URI validity until issuance time. Using '{{cluster_path}}' requires /config/cluster's 'path' member to be set on all PR Secondary clusters and using '{{cluster_aia_path}}' requires /config/cluster's 'aia_path' member to be set on all PR secondary clusters. | [optional] [default to false] +**IssuingCertificates** | Pointer to **[]string** | Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. | [optional] +**OcspServers** | Pointer to **[]string** | Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. | [optional] + + + +## Methods + + +### NewPkiConfigureUrlsRequest + +`func NewPkiConfigureUrlsRequest() *PkiConfigureUrlsRequest` + +NewPkiConfigureUrlsRequest instantiates a new PkiConfigureUrlsRequest object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiConfigureUrlsRequestWithDefaults + +`func NewPkiConfigureUrlsRequestWithDefaults() *PkiConfigureUrlsRequest` + +NewPkiConfigureUrlsRequestWithDefaults instantiates a new PkiConfigureUrlsRequest object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrlDistributionPoints + +`func (o *PkiConfigureUrlsRequest) GetCrlDistributionPoints() []string` + +GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. + +### GetCrlDistributionPointsOk + +`func (o *PkiConfigureUrlsRequest) GetCrlDistributionPointsOk() (*[]string, bool)` + +GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrlDistributionPoints + +`func (o *PkiConfigureUrlsRequest) SetCrlDistributionPoints(v []string)` + +SetCrlDistributionPoints sets CrlDistributionPoints field to given value. + + +### HasCrlDistributionPoints + +`func (o *PkiConfigureUrlsRequest) HasCrlDistributionPoints() bool` + +HasCrlDistributionPoints returns a boolean if a field has been set. + + + + +### GetEnableTemplating + +`func (o *PkiConfigureUrlsRequest) GetEnableTemplating() bool` + +GetEnableTemplating returns the EnableTemplating field if non-nil, zero value otherwise. + +### GetEnableTemplatingOk + +`func (o *PkiConfigureUrlsRequest) GetEnableTemplatingOk() (*bool, bool)` + +GetEnableTemplatingOk returns a tuple with the EnableTemplating field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnableTemplating + +`func (o *PkiConfigureUrlsRequest) SetEnableTemplating(v bool)` + +SetEnableTemplating sets EnableTemplating field to given value. + + +### HasEnableTemplating + +`func (o *PkiConfigureUrlsRequest) HasEnableTemplating() bool` + +HasEnableTemplating returns a boolean if a field has been set. + + + + +### GetIssuingCertificates + +`func (o *PkiConfigureUrlsRequest) GetIssuingCertificates() []string` + +GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. + +### GetIssuingCertificatesOk + +`func (o *PkiConfigureUrlsRequest) GetIssuingCertificatesOk() (*[]string, bool)` + +GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCertificates + +`func (o *PkiConfigureUrlsRequest) SetIssuingCertificates(v []string)` + +SetIssuingCertificates sets IssuingCertificates field to given value. + + +### HasIssuingCertificates + +`func (o *PkiConfigureUrlsRequest) HasIssuingCertificates() bool` + +HasIssuingCertificates returns a boolean if a field has been set. + + + + +### GetOcspServers + +`func (o *PkiConfigureUrlsRequest) GetOcspServers() []string` + +GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. + +### GetOcspServersOk + +`func (o *PkiConfigureUrlsRequest) GetOcspServersOk() (*[]string, bool)` + +GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspServers + +`func (o *PkiConfigureUrlsRequest) SetOcspServers(v []string)` + +SetOcspServers sets OcspServers field to given value. + + +### HasOcspServers + +`func (o *PkiConfigureUrlsRequest) HasOcspServers() bool` + +HasOcspServers returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteURLConfigRequest.md b/docs/PkiConfigureUrlsResponse.md similarity index 72% rename from docs/PKIWriteURLConfigRequest.md rename to docs/PkiConfigureUrlsResponse.md index c3b8b614..16a6d4d6 100644 --- a/docs/PKIWriteURLConfigRequest.md +++ b/docs/PkiConfigureUrlsResponse.md @@ -1,4 +1,4 @@ -# PKIWriteURLConfigRequest +# PkiConfigureUrlsResponse ## Properties @@ -15,47 +15,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteURLConfigRequest +### NewPkiConfigureUrlsResponse -`func NewPKIWriteURLConfigRequest() *PKIWriteURLConfigRequest` +`func NewPkiConfigureUrlsResponse() *PkiConfigureUrlsResponse` -NewPKIWriteURLConfigRequest instantiates a new PKIWriteURLConfigRequest object +NewPkiConfigureUrlsResponse instantiates a new PkiConfigureUrlsResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteURLConfigRequestWithDefaults +### NewPkiConfigureUrlsResponseWithDefaults -`func NewPKIWriteURLConfigRequestWithDefaults() *PKIWriteURLConfigRequest` +`func NewPkiConfigureUrlsResponseWithDefaults() *PkiConfigureUrlsResponse` -NewPKIWriteURLConfigRequestWithDefaults instantiates a new PKIWriteURLConfigRequest object +NewPkiConfigureUrlsResponseWithDefaults instantiates a new PkiConfigureUrlsResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCrlDistributionPoints -`func (o *PKIWriteURLConfigRequest) GetCrlDistributionPoints() []string` +`func (o *PkiConfigureUrlsResponse) GetCrlDistributionPoints() []string` GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. ### GetCrlDistributionPointsOk -`func (o *PKIWriteURLConfigRequest) GetCrlDistributionPointsOk() (*[]string, bool)` +`func (o *PkiConfigureUrlsResponse) GetCrlDistributionPointsOk() (*[]string, bool)` GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCrlDistributionPoints -`func (o *PKIWriteURLConfigRequest) SetCrlDistributionPoints(v []string)` +`func (o *PkiConfigureUrlsResponse) SetCrlDistributionPoints(v []string)` SetCrlDistributionPoints sets CrlDistributionPoints field to given value. ### HasCrlDistributionPoints -`func (o *PKIWriteURLConfigRequest) HasCrlDistributionPoints() bool` +`func (o *PkiConfigureUrlsResponse) HasCrlDistributionPoints() bool` HasCrlDistributionPoints returns a boolean if a field has been set. @@ -64,27 +64,27 @@ HasCrlDistributionPoints returns a boolean if a field has been set. ### GetEnableTemplating -`func (o *PKIWriteURLConfigRequest) GetEnableTemplating() bool` +`func (o *PkiConfigureUrlsResponse) GetEnableTemplating() bool` GetEnableTemplating returns the EnableTemplating field if non-nil, zero value otherwise. ### GetEnableTemplatingOk -`func (o *PKIWriteURLConfigRequest) GetEnableTemplatingOk() (*bool, bool)` +`func (o *PkiConfigureUrlsResponse) GetEnableTemplatingOk() (*bool, bool)` GetEnableTemplatingOk returns a tuple with the EnableTemplating field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnableTemplating -`func (o *PKIWriteURLConfigRequest) SetEnableTemplating(v bool)` +`func (o *PkiConfigureUrlsResponse) SetEnableTemplating(v bool)` SetEnableTemplating sets EnableTemplating field to given value. ### HasEnableTemplating -`func (o *PKIWriteURLConfigRequest) HasEnableTemplating() bool` +`func (o *PkiConfigureUrlsResponse) HasEnableTemplating() bool` HasEnableTemplating returns a boolean if a field has been set. @@ -93,27 +93,27 @@ HasEnableTemplating returns a boolean if a field has been set. ### GetIssuingCertificates -`func (o *PKIWriteURLConfigRequest) GetIssuingCertificates() []string` +`func (o *PkiConfigureUrlsResponse) GetIssuingCertificates() []string` GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. ### GetIssuingCertificatesOk -`func (o *PKIWriteURLConfigRequest) GetIssuingCertificatesOk() (*[]string, bool)` +`func (o *PkiConfigureUrlsResponse) GetIssuingCertificatesOk() (*[]string, bool)` GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuingCertificates -`func (o *PKIWriteURLConfigRequest) SetIssuingCertificates(v []string)` +`func (o *PkiConfigureUrlsResponse) SetIssuingCertificates(v []string)` SetIssuingCertificates sets IssuingCertificates field to given value. ### HasIssuingCertificates -`func (o *PKIWriteURLConfigRequest) HasIssuingCertificates() bool` +`func (o *PkiConfigureUrlsResponse) HasIssuingCertificates() bool` HasIssuingCertificates returns a boolean if a field has been set. @@ -122,27 +122,27 @@ HasIssuingCertificates returns a boolean if a field has been set. ### GetOcspServers -`func (o *PKIWriteURLConfigRequest) GetOcspServers() []string` +`func (o *PkiConfigureUrlsResponse) GetOcspServers() []string` GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. ### GetOcspServersOk -`func (o *PKIWriteURLConfigRequest) GetOcspServersOk() (*[]string, bool)` +`func (o *PkiConfigureUrlsResponse) GetOcspServersOk() (*[]string, bool)` GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspServers -`func (o *PKIWriteURLConfigRequest) SetOcspServers(v []string)` +`func (o *PkiConfigureUrlsResponse) SetOcspServers(v []string)` SetOcspServers sets OcspServers field to given value. ### HasOcspServers -`func (o *PKIWriteURLConfigRequest) HasOcspServers() bool` +`func (o *PkiConfigureUrlsResponse) HasOcspServers() bool` HasOcspServers returns a boolean if a field has been set. diff --git a/docs/PKIWriteIntermediateCrossSignRequest.md b/docs/PkiCrossSignIntermediateRequest.md similarity index 67% rename from docs/PKIWriteIntermediateCrossSignRequest.md rename to docs/PkiCrossSignIntermediateRequest.md index 5cf41a36..232f62b2 100644 --- a/docs/PKIWriteIntermediateCrossSignRequest.md +++ b/docs/PkiCrossSignIntermediateRequest.md @@ -1,4 +1,4 @@ -# PKIWriteIntermediateCrossSignRequest +# PkiCrossSignIntermediateRequest ## Properties @@ -39,47 +39,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteIntermediateCrossSignRequest +### NewPkiCrossSignIntermediateRequest -`func NewPKIWriteIntermediateCrossSignRequest() *PKIWriteIntermediateCrossSignRequest` +`func NewPkiCrossSignIntermediateRequest() *PkiCrossSignIntermediateRequest` -NewPKIWriteIntermediateCrossSignRequest instantiates a new PKIWriteIntermediateCrossSignRequest object +NewPkiCrossSignIntermediateRequest instantiates a new PkiCrossSignIntermediateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteIntermediateCrossSignRequestWithDefaults +### NewPkiCrossSignIntermediateRequestWithDefaults -`func NewPKIWriteIntermediateCrossSignRequestWithDefaults() *PKIWriteIntermediateCrossSignRequest` +`func NewPkiCrossSignIntermediateRequestWithDefaults() *PkiCrossSignIntermediateRequest` -NewPKIWriteIntermediateCrossSignRequestWithDefaults instantiates a new PKIWriteIntermediateCrossSignRequest object +NewPkiCrossSignIntermediateRequestWithDefaults instantiates a new PkiCrossSignIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAddBasicConstraints -`func (o *PKIWriteIntermediateCrossSignRequest) GetAddBasicConstraints() bool` +`func (o *PkiCrossSignIntermediateRequest) GetAddBasicConstraints() bool` GetAddBasicConstraints returns the AddBasicConstraints field if non-nil, zero value otherwise. ### GetAddBasicConstraintsOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetAddBasicConstraintsOk() (*bool, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetAddBasicConstraintsOk() (*bool, bool)` GetAddBasicConstraintsOk returns a tuple with the AddBasicConstraints field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAddBasicConstraints -`func (o *PKIWriteIntermediateCrossSignRequest) SetAddBasicConstraints(v bool)` +`func (o *PkiCrossSignIntermediateRequest) SetAddBasicConstraints(v bool)` SetAddBasicConstraints sets AddBasicConstraints field to given value. ### HasAddBasicConstraints -`func (o *PKIWriteIntermediateCrossSignRequest) HasAddBasicConstraints() bool` +`func (o *PkiCrossSignIntermediateRequest) HasAddBasicConstraints() bool` HasAddBasicConstraints returns a boolean if a field has been set. @@ -88,27 +88,27 @@ HasAddBasicConstraints returns a boolean if a field has been set. ### GetAltNames -`func (o *PKIWriteIntermediateCrossSignRequest) GetAltNames() string` +`func (o *PkiCrossSignIntermediateRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIWriteIntermediateCrossSignRequest) SetAltNames(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIWriteIntermediateCrossSignRequest) HasAltNames() bool` +`func (o *PkiCrossSignIntermediateRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -117,27 +117,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIWriteIntermediateCrossSignRequest) GetCommonName() string` +`func (o *PkiCrossSignIntermediateRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIWriteIntermediateCrossSignRequest) SetCommonName(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIWriteIntermediateCrossSignRequest) HasCommonName() bool` +`func (o *PkiCrossSignIntermediateRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -146,27 +146,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIWriteIntermediateCrossSignRequest) GetCountry() []string` +`func (o *PkiCrossSignIntermediateRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIWriteIntermediateCrossSignRequest) SetCountry(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIWriteIntermediateCrossSignRequest) HasCountry() bool` +`func (o *PkiCrossSignIntermediateRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -175,27 +175,27 @@ HasCountry returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIWriteIntermediateCrossSignRequest) GetExcludeCnFromSans() bool` +`func (o *PkiCrossSignIntermediateRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIWriteIntermediateCrossSignRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiCrossSignIntermediateRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIWriteIntermediateCrossSignRequest) HasExcludeCnFromSans() bool` +`func (o *PkiCrossSignIntermediateRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -204,27 +204,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetExported -`func (o *PKIWriteIntermediateCrossSignRequest) GetExported() string` +`func (o *PkiCrossSignIntermediateRequest) GetExported() string` GetExported returns the Exported field if non-nil, zero value otherwise. ### GetExportedOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetExportedOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetExportedOk() (*string, bool)` GetExportedOk returns a tuple with the Exported field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExported -`func (o *PKIWriteIntermediateCrossSignRequest) SetExported(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetExported(v string)` SetExported sets Exported field to given value. ### HasExported -`func (o *PKIWriteIntermediateCrossSignRequest) HasExported() bool` +`func (o *PkiCrossSignIntermediateRequest) HasExported() bool` HasExported returns a boolean if a field has been set. @@ -233,27 +233,27 @@ HasExported returns a boolean if a field has been set. ### GetFormat -`func (o *PKIWriteIntermediateCrossSignRequest) GetFormat() string` +`func (o *PkiCrossSignIntermediateRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetFormatOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIWriteIntermediateCrossSignRequest) SetFormat(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIWriteIntermediateCrossSignRequest) HasFormat() bool` +`func (o *PkiCrossSignIntermediateRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -262,27 +262,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIWriteIntermediateCrossSignRequest) GetIpSans() []string` +`func (o *PkiCrossSignIntermediateRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIWriteIntermediateCrossSignRequest) SetIpSans(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIWriteIntermediateCrossSignRequest) HasIpSans() bool` +`func (o *PkiCrossSignIntermediateRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -291,27 +291,27 @@ HasIpSans returns a boolean if a field has been set. ### GetKeyBits -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyBits() int32` +`func (o *PkiCrossSignIntermediateRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIWriteIntermediateCrossSignRequest) SetKeyBits(v int32)` +`func (o *PkiCrossSignIntermediateRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIWriteIntermediateCrossSignRequest) HasKeyBits() bool` +`func (o *PkiCrossSignIntermediateRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -320,27 +320,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyName() string` +`func (o *PkiCrossSignIntermediateRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIWriteIntermediateCrossSignRequest) SetKeyName(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIWriteIntermediateCrossSignRequest) HasKeyName() bool` +`func (o *PkiCrossSignIntermediateRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -349,27 +349,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyRef -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyRef() string` +`func (o *PkiCrossSignIntermediateRequest) GetKeyRef() string` GetKeyRef returns the KeyRef field if non-nil, zero value otherwise. ### GetKeyRefOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyRefOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetKeyRefOk() (*string, bool)` GetKeyRefOk returns a tuple with the KeyRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyRef -`func (o *PKIWriteIntermediateCrossSignRequest) SetKeyRef(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetKeyRef(v string)` SetKeyRef sets KeyRef field to given value. ### HasKeyRef -`func (o *PKIWriteIntermediateCrossSignRequest) HasKeyRef() bool` +`func (o *PkiCrossSignIntermediateRequest) HasKeyRef() bool` HasKeyRef returns a boolean if a field has been set. @@ -378,27 +378,27 @@ HasKeyRef returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyType() string` +`func (o *PkiCrossSignIntermediateRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIWriteIntermediateCrossSignRequest) SetKeyType(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIWriteIntermediateCrossSignRequest) HasKeyType() bool` +`func (o *PkiCrossSignIntermediateRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -407,27 +407,27 @@ HasKeyType returns a boolean if a field has been set. ### GetLocality -`func (o *PKIWriteIntermediateCrossSignRequest) GetLocality() []string` +`func (o *PkiCrossSignIntermediateRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIWriteIntermediateCrossSignRequest) SetLocality(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIWriteIntermediateCrossSignRequest) HasLocality() bool` +`func (o *PkiCrossSignIntermediateRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -436,27 +436,27 @@ HasLocality returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIWriteIntermediateCrossSignRequest) GetManagedKeyId() string` +`func (o *PkiCrossSignIntermediateRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIWriteIntermediateCrossSignRequest) SetManagedKeyId(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIWriteIntermediateCrossSignRequest) HasManagedKeyId() bool` +`func (o *PkiCrossSignIntermediateRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -465,27 +465,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIWriteIntermediateCrossSignRequest) GetManagedKeyName() string` +`func (o *PkiCrossSignIntermediateRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIWriteIntermediateCrossSignRequest) SetManagedKeyName(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIWriteIntermediateCrossSignRequest) HasManagedKeyName() bool` +`func (o *PkiCrossSignIntermediateRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. @@ -494,27 +494,27 @@ HasManagedKeyName returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIWriteIntermediateCrossSignRequest) GetNotAfter() string` +`func (o *PkiCrossSignIntermediateRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIWriteIntermediateCrossSignRequest) SetNotAfter(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIWriteIntermediateCrossSignRequest) HasNotAfter() bool` +`func (o *PkiCrossSignIntermediateRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -523,27 +523,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIWriteIntermediateCrossSignRequest) GetNotBeforeDuration() int32` +`func (o *PkiCrossSignIntermediateRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIWriteIntermediateCrossSignRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiCrossSignIntermediateRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIWriteIntermediateCrossSignRequest) HasNotBeforeDuration() bool` +`func (o *PkiCrossSignIntermediateRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -552,27 +552,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIWriteIntermediateCrossSignRequest) GetOrganization() []string` +`func (o *PkiCrossSignIntermediateRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIWriteIntermediateCrossSignRequest) SetOrganization(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIWriteIntermediateCrossSignRequest) HasOrganization() bool` +`func (o *PkiCrossSignIntermediateRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -581,27 +581,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIWriteIntermediateCrossSignRequest) GetOtherSans() []string` +`func (o *PkiCrossSignIntermediateRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIWriteIntermediateCrossSignRequest) SetOtherSans(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIWriteIntermediateCrossSignRequest) HasOtherSans() bool` +`func (o *PkiCrossSignIntermediateRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -610,27 +610,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIWriteIntermediateCrossSignRequest) GetOu() []string` +`func (o *PkiCrossSignIntermediateRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIWriteIntermediateCrossSignRequest) SetOu(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIWriteIntermediateCrossSignRequest) HasOu() bool` +`func (o *PkiCrossSignIntermediateRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -639,27 +639,27 @@ HasOu returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIWriteIntermediateCrossSignRequest) GetPostalCode() []string` +`func (o *PkiCrossSignIntermediateRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIWriteIntermediateCrossSignRequest) SetPostalCode(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIWriteIntermediateCrossSignRequest) HasPostalCode() bool` +`func (o *PkiCrossSignIntermediateRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -668,27 +668,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIWriteIntermediateCrossSignRequest) GetPrivateKeyFormat() string` +`func (o *PkiCrossSignIntermediateRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIWriteIntermediateCrossSignRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIWriteIntermediateCrossSignRequest) HasPrivateKeyFormat() bool` +`func (o *PkiCrossSignIntermediateRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -697,27 +697,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIWriteIntermediateCrossSignRequest) GetProvince() []string` +`func (o *PkiCrossSignIntermediateRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIWriteIntermediateCrossSignRequest) SetProvince(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIWriteIntermediateCrossSignRequest) HasProvince() bool` +`func (o *PkiCrossSignIntermediateRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -726,27 +726,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIWriteIntermediateCrossSignRequest) GetSerialNumber() string` +`func (o *PkiCrossSignIntermediateRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIWriteIntermediateCrossSignRequest) SetSerialNumber(v string)` +`func (o *PkiCrossSignIntermediateRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIWriteIntermediateCrossSignRequest) HasSerialNumber() bool` +`func (o *PkiCrossSignIntermediateRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -755,27 +755,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIWriteIntermediateCrossSignRequest) GetSignatureBits() int32` +`func (o *PkiCrossSignIntermediateRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIWriteIntermediateCrossSignRequest) SetSignatureBits(v int32)` +`func (o *PkiCrossSignIntermediateRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIWriteIntermediateCrossSignRequest) HasSignatureBits() bool` +`func (o *PkiCrossSignIntermediateRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -784,27 +784,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIWriteIntermediateCrossSignRequest) GetStreetAddress() []string` +`func (o *PkiCrossSignIntermediateRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIWriteIntermediateCrossSignRequest) SetStreetAddress(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIWriteIntermediateCrossSignRequest) HasStreetAddress() bool` +`func (o *PkiCrossSignIntermediateRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -813,27 +813,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIWriteIntermediateCrossSignRequest) GetTtl() int32` +`func (o *PkiCrossSignIntermediateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIWriteIntermediateCrossSignRequest) SetTtl(v int32)` +`func (o *PkiCrossSignIntermediateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIWriteIntermediateCrossSignRequest) HasTtl() bool` +`func (o *PkiCrossSignIntermediateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -842,27 +842,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIWriteIntermediateCrossSignRequest) GetUriSans() []string` +`func (o *PkiCrossSignIntermediateRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIWriteIntermediateCrossSignRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiCrossSignIntermediateRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIWriteIntermediateCrossSignRequest) SetUriSans(v []string)` +`func (o *PkiCrossSignIntermediateRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIWriteIntermediateCrossSignRequest) HasUriSans() bool` +`func (o *PkiCrossSignIntermediateRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. diff --git a/docs/PkiCrossSignIntermediateResponse.md b/docs/PkiCrossSignIntermediateResponse.md new file mode 100644 index 00000000..4c1cac5b --- /dev/null +++ b/docs/PkiCrossSignIntermediateResponse.md @@ -0,0 +1,159 @@ +# PkiCrossSignIntermediateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Csr** | Pointer to **string** | Certificate signing request. | [optional] +**KeyId** | Pointer to **string** | Id of the key. | [optional] +**PrivateKey** | Pointer to **string** | Generated private key. | [optional] +**PrivateKeyType** | Pointer to **string** | Specifies the format used for marshaling the private key. | [optional] + + + +## Methods + + +### NewPkiCrossSignIntermediateResponse + +`func NewPkiCrossSignIntermediateResponse() *PkiCrossSignIntermediateResponse` + +NewPkiCrossSignIntermediateResponse instantiates a new PkiCrossSignIntermediateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiCrossSignIntermediateResponseWithDefaults + +`func NewPkiCrossSignIntermediateResponseWithDefaults() *PkiCrossSignIntermediateResponse` + +NewPkiCrossSignIntermediateResponseWithDefaults instantiates a new PkiCrossSignIntermediateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCsr + +`func (o *PkiCrossSignIntermediateResponse) GetCsr() string` + +GetCsr returns the Csr field if non-nil, zero value otherwise. + +### GetCsrOk + +`func (o *PkiCrossSignIntermediateResponse) GetCsrOk() (*string, bool)` + +GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCsr + +`func (o *PkiCrossSignIntermediateResponse) SetCsr(v string)` + +SetCsr sets Csr field to given value. + + +### HasCsr + +`func (o *PkiCrossSignIntermediateResponse) HasCsr() bool` + +HasCsr returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiCrossSignIntermediateResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiCrossSignIntermediateResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiCrossSignIntermediateResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiCrossSignIntermediateResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiCrossSignIntermediateResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiCrossSignIntermediateResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiCrossSignIntermediateResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiCrossSignIntermediateResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiCrossSignIntermediateResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiCrossSignIntermediateResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiCrossSignIntermediateResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiCrossSignIntermediateResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiGenerateExportedKeyRequest.md b/docs/PkiGenerateExportedKeyRequest.md new file mode 100644 index 00000000..9424359b --- /dev/null +++ b/docs/PkiGenerateExportedKeyRequest.md @@ -0,0 +1,189 @@ +# PkiGenerateExportedKeyRequest + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyBits** | Pointer to **int32** | The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. | [optional] [default to 0] +**KeyName** | Pointer to **string** | Optional name to be used for this key | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. | [optional] [default to "rsa"] +**ManagedKeyId** | Pointer to **string** | The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. | [optional] +**ManagedKeyName** | Pointer to **string** | The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. | [optional] + + + +## Methods + + +### NewPkiGenerateExportedKeyRequest + +`func NewPkiGenerateExportedKeyRequest() *PkiGenerateExportedKeyRequest` + +NewPkiGenerateExportedKeyRequest instantiates a new PkiGenerateExportedKeyRequest object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiGenerateExportedKeyRequestWithDefaults + +`func NewPkiGenerateExportedKeyRequestWithDefaults() *PkiGenerateExportedKeyRequest` + +NewPkiGenerateExportedKeyRequestWithDefaults instantiates a new PkiGenerateExportedKeyRequest object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyBits + +`func (o *PkiGenerateExportedKeyRequest) GetKeyBits() int32` + +GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. + +### GetKeyBitsOk + +`func (o *PkiGenerateExportedKeyRequest) GetKeyBitsOk() (*int32, bool)` + +GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyBits + +`func (o *PkiGenerateExportedKeyRequest) SetKeyBits(v int32)` + +SetKeyBits sets KeyBits field to given value. + + +### HasKeyBits + +`func (o *PkiGenerateExportedKeyRequest) HasKeyBits() bool` + +HasKeyBits returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiGenerateExportedKeyRequest) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiGenerateExportedKeyRequest) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiGenerateExportedKeyRequest) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiGenerateExportedKeyRequest) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiGenerateExportedKeyRequest) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiGenerateExportedKeyRequest) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiGenerateExportedKeyRequest) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiGenerateExportedKeyRequest) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetManagedKeyId + +`func (o *PkiGenerateExportedKeyRequest) GetManagedKeyId() string` + +GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. + +### GetManagedKeyIdOk + +`func (o *PkiGenerateExportedKeyRequest) GetManagedKeyIdOk() (*string, bool)` + +GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyId + +`func (o *PkiGenerateExportedKeyRequest) SetManagedKeyId(v string)` + +SetManagedKeyId sets ManagedKeyId field to given value. + + +### HasManagedKeyId + +`func (o *PkiGenerateExportedKeyRequest) HasManagedKeyId() bool` + +HasManagedKeyId returns a boolean if a field has been set. + + + + +### GetManagedKeyName + +`func (o *PkiGenerateExportedKeyRequest) GetManagedKeyName() string` + +GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. + +### GetManagedKeyNameOk + +`func (o *PkiGenerateExportedKeyRequest) GetManagedKeyNameOk() (*string, bool)` + +GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyName + +`func (o *PkiGenerateExportedKeyRequest) SetManagedKeyName(v string)` + +SetManagedKeyName sets ManagedKeyName field to given value. + + +### HasManagedKeyName + +`func (o *PkiGenerateExportedKeyRequest) HasManagedKeyName() bool` + +HasManagedKeyName returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiGenerateExportedKeyResponse.md b/docs/PkiGenerateExportedKeyResponse.md new file mode 100644 index 00000000..c1065f8e --- /dev/null +++ b/docs/PkiGenerateExportedKeyResponse.md @@ -0,0 +1,159 @@ +# PkiGenerateExportedKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyId** | Pointer to **string** | ID assigned to this key. | [optional] +**KeyName** | Pointer to **string** | Name assigned to this key. | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. | [optional] +**PrivateKey** | Pointer to **string** | The private key string | [optional] + + + +## Methods + + +### NewPkiGenerateExportedKeyResponse + +`func NewPkiGenerateExportedKeyResponse() *PkiGenerateExportedKeyResponse` + +NewPkiGenerateExportedKeyResponse instantiates a new PkiGenerateExportedKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiGenerateExportedKeyResponseWithDefaults + +`func NewPkiGenerateExportedKeyResponseWithDefaults() *PkiGenerateExportedKeyResponse` + +NewPkiGenerateExportedKeyResponseWithDefaults instantiates a new PkiGenerateExportedKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyId + +`func (o *PkiGenerateExportedKeyResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiGenerateExportedKeyResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiGenerateExportedKeyResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiGenerateExportedKeyResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiGenerateExportedKeyResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiGenerateExportedKeyResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiGenerateExportedKeyResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiGenerateExportedKeyResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiGenerateExportedKeyResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiGenerateExportedKeyResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiGenerateExportedKeyResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiGenerateExportedKeyResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiGenerateExportedKeyResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiGenerateExportedKeyResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiGenerateExportedKeyResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiGenerateExportedKeyResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteIntermediateGenerateRequest.md b/docs/PkiGenerateIntermediateRequest.md similarity index 68% rename from docs/PKIWriteIntermediateGenerateRequest.md rename to docs/PkiGenerateIntermediateRequest.md index 4e9859b3..a23e8a06 100644 --- a/docs/PKIWriteIntermediateGenerateRequest.md +++ b/docs/PkiGenerateIntermediateRequest.md @@ -1,4 +1,4 @@ -# PKIWriteIntermediateGenerateRequest +# PkiGenerateIntermediateRequest ## Properties @@ -38,47 +38,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteIntermediateGenerateRequest +### NewPkiGenerateIntermediateRequest -`func NewPKIWriteIntermediateGenerateRequest() *PKIWriteIntermediateGenerateRequest` +`func NewPkiGenerateIntermediateRequest() *PkiGenerateIntermediateRequest` -NewPKIWriteIntermediateGenerateRequest instantiates a new PKIWriteIntermediateGenerateRequest object +NewPkiGenerateIntermediateRequest instantiates a new PkiGenerateIntermediateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteIntermediateGenerateRequestWithDefaults +### NewPkiGenerateIntermediateRequestWithDefaults -`func NewPKIWriteIntermediateGenerateRequestWithDefaults() *PKIWriteIntermediateGenerateRequest` +`func NewPkiGenerateIntermediateRequestWithDefaults() *PkiGenerateIntermediateRequest` -NewPKIWriteIntermediateGenerateRequestWithDefaults instantiates a new PKIWriteIntermediateGenerateRequest object +NewPkiGenerateIntermediateRequestWithDefaults instantiates a new PkiGenerateIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAddBasicConstraints -`func (o *PKIWriteIntermediateGenerateRequest) GetAddBasicConstraints() bool` +`func (o *PkiGenerateIntermediateRequest) GetAddBasicConstraints() bool` GetAddBasicConstraints returns the AddBasicConstraints field if non-nil, zero value otherwise. ### GetAddBasicConstraintsOk -`func (o *PKIWriteIntermediateGenerateRequest) GetAddBasicConstraintsOk() (*bool, bool)` +`func (o *PkiGenerateIntermediateRequest) GetAddBasicConstraintsOk() (*bool, bool)` GetAddBasicConstraintsOk returns a tuple with the AddBasicConstraints field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAddBasicConstraints -`func (o *PKIWriteIntermediateGenerateRequest) SetAddBasicConstraints(v bool)` +`func (o *PkiGenerateIntermediateRequest) SetAddBasicConstraints(v bool)` SetAddBasicConstraints sets AddBasicConstraints field to given value. ### HasAddBasicConstraints -`func (o *PKIWriteIntermediateGenerateRequest) HasAddBasicConstraints() bool` +`func (o *PkiGenerateIntermediateRequest) HasAddBasicConstraints() bool` HasAddBasicConstraints returns a boolean if a field has been set. @@ -87,27 +87,27 @@ HasAddBasicConstraints returns a boolean if a field has been set. ### GetAltNames -`func (o *PKIWriteIntermediateGenerateRequest) GetAltNames() string` +`func (o *PkiGenerateIntermediateRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIWriteIntermediateGenerateRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIWriteIntermediateGenerateRequest) SetAltNames(v string)` +`func (o *PkiGenerateIntermediateRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIWriteIntermediateGenerateRequest) HasAltNames() bool` +`func (o *PkiGenerateIntermediateRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -116,27 +116,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIWriteIntermediateGenerateRequest) GetCommonName() string` +`func (o *PkiGenerateIntermediateRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIWriteIntermediateGenerateRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIWriteIntermediateGenerateRequest) SetCommonName(v string)` +`func (o *PkiGenerateIntermediateRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIWriteIntermediateGenerateRequest) HasCommonName() bool` +`func (o *PkiGenerateIntermediateRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -145,27 +145,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIWriteIntermediateGenerateRequest) GetCountry() []string` +`func (o *PkiGenerateIntermediateRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIWriteIntermediateGenerateRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIWriteIntermediateGenerateRequest) SetCountry(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIWriteIntermediateGenerateRequest) HasCountry() bool` +`func (o *PkiGenerateIntermediateRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -174,27 +174,27 @@ HasCountry returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIWriteIntermediateGenerateRequest) GetExcludeCnFromSans() bool` +`func (o *PkiGenerateIntermediateRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIWriteIntermediateGenerateRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiGenerateIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIWriteIntermediateGenerateRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiGenerateIntermediateRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIWriteIntermediateGenerateRequest) HasExcludeCnFromSans() bool` +`func (o *PkiGenerateIntermediateRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -203,27 +203,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIWriteIntermediateGenerateRequest) GetFormat() string` +`func (o *PkiGenerateIntermediateRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIWriteIntermediateGenerateRequest) GetFormatOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIWriteIntermediateGenerateRequest) SetFormat(v string)` +`func (o *PkiGenerateIntermediateRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIWriteIntermediateGenerateRequest) HasFormat() bool` +`func (o *PkiGenerateIntermediateRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -232,27 +232,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIWriteIntermediateGenerateRequest) GetIpSans() []string` +`func (o *PkiGenerateIntermediateRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIWriteIntermediateGenerateRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIWriteIntermediateGenerateRequest) SetIpSans(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIWriteIntermediateGenerateRequest) HasIpSans() bool` +`func (o *PkiGenerateIntermediateRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -261,27 +261,27 @@ HasIpSans returns a boolean if a field has been set. ### GetKeyBits -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyBits() int32` +`func (o *PkiGenerateIntermediateRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiGenerateIntermediateRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIWriteIntermediateGenerateRequest) SetKeyBits(v int32)` +`func (o *PkiGenerateIntermediateRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIWriteIntermediateGenerateRequest) HasKeyBits() bool` +`func (o *PkiGenerateIntermediateRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -290,27 +290,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyName() string` +`func (o *PkiGenerateIntermediateRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIWriteIntermediateGenerateRequest) SetKeyName(v string)` +`func (o *PkiGenerateIntermediateRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIWriteIntermediateGenerateRequest) HasKeyName() bool` +`func (o *PkiGenerateIntermediateRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -319,27 +319,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyRef -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyRef() string` +`func (o *PkiGenerateIntermediateRequest) GetKeyRef() string` GetKeyRef returns the KeyRef field if non-nil, zero value otherwise. ### GetKeyRefOk -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyRefOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetKeyRefOk() (*string, bool)` GetKeyRefOk returns a tuple with the KeyRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyRef -`func (o *PKIWriteIntermediateGenerateRequest) SetKeyRef(v string)` +`func (o *PkiGenerateIntermediateRequest) SetKeyRef(v string)` SetKeyRef sets KeyRef field to given value. ### HasKeyRef -`func (o *PKIWriteIntermediateGenerateRequest) HasKeyRef() bool` +`func (o *PkiGenerateIntermediateRequest) HasKeyRef() bool` HasKeyRef returns a boolean if a field has been set. @@ -348,27 +348,27 @@ HasKeyRef returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyType() string` +`func (o *PkiGenerateIntermediateRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIWriteIntermediateGenerateRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIWriteIntermediateGenerateRequest) SetKeyType(v string)` +`func (o *PkiGenerateIntermediateRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIWriteIntermediateGenerateRequest) HasKeyType() bool` +`func (o *PkiGenerateIntermediateRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -377,27 +377,27 @@ HasKeyType returns a boolean if a field has been set. ### GetLocality -`func (o *PKIWriteIntermediateGenerateRequest) GetLocality() []string` +`func (o *PkiGenerateIntermediateRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIWriteIntermediateGenerateRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIWriteIntermediateGenerateRequest) SetLocality(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIWriteIntermediateGenerateRequest) HasLocality() bool` +`func (o *PkiGenerateIntermediateRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -406,27 +406,27 @@ HasLocality returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIWriteIntermediateGenerateRequest) GetManagedKeyId() string` +`func (o *PkiGenerateIntermediateRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIWriteIntermediateGenerateRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIWriteIntermediateGenerateRequest) SetManagedKeyId(v string)` +`func (o *PkiGenerateIntermediateRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIWriteIntermediateGenerateRequest) HasManagedKeyId() bool` +`func (o *PkiGenerateIntermediateRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -435,27 +435,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIWriteIntermediateGenerateRequest) GetManagedKeyName() string` +`func (o *PkiGenerateIntermediateRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIWriteIntermediateGenerateRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIWriteIntermediateGenerateRequest) SetManagedKeyName(v string)` +`func (o *PkiGenerateIntermediateRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIWriteIntermediateGenerateRequest) HasManagedKeyName() bool` +`func (o *PkiGenerateIntermediateRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. @@ -464,27 +464,27 @@ HasManagedKeyName returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIWriteIntermediateGenerateRequest) GetNotAfter() string` +`func (o *PkiGenerateIntermediateRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIWriteIntermediateGenerateRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIWriteIntermediateGenerateRequest) SetNotAfter(v string)` +`func (o *PkiGenerateIntermediateRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIWriteIntermediateGenerateRequest) HasNotAfter() bool` +`func (o *PkiGenerateIntermediateRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -493,27 +493,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIWriteIntermediateGenerateRequest) GetNotBeforeDuration() int32` +`func (o *PkiGenerateIntermediateRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIWriteIntermediateGenerateRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiGenerateIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIWriteIntermediateGenerateRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiGenerateIntermediateRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIWriteIntermediateGenerateRequest) HasNotBeforeDuration() bool` +`func (o *PkiGenerateIntermediateRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -522,27 +522,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIWriteIntermediateGenerateRequest) GetOrganization() []string` +`func (o *PkiGenerateIntermediateRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIWriteIntermediateGenerateRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIWriteIntermediateGenerateRequest) SetOrganization(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIWriteIntermediateGenerateRequest) HasOrganization() bool` +`func (o *PkiGenerateIntermediateRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -551,27 +551,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIWriteIntermediateGenerateRequest) GetOtherSans() []string` +`func (o *PkiGenerateIntermediateRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIWriteIntermediateGenerateRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIWriteIntermediateGenerateRequest) SetOtherSans(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIWriteIntermediateGenerateRequest) HasOtherSans() bool` +`func (o *PkiGenerateIntermediateRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -580,27 +580,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIWriteIntermediateGenerateRequest) GetOu() []string` +`func (o *PkiGenerateIntermediateRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIWriteIntermediateGenerateRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIWriteIntermediateGenerateRequest) SetOu(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIWriteIntermediateGenerateRequest) HasOu() bool` +`func (o *PkiGenerateIntermediateRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -609,27 +609,27 @@ HasOu returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIWriteIntermediateGenerateRequest) GetPostalCode() []string` +`func (o *PkiGenerateIntermediateRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIWriteIntermediateGenerateRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIWriteIntermediateGenerateRequest) SetPostalCode(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIWriteIntermediateGenerateRequest) HasPostalCode() bool` +`func (o *PkiGenerateIntermediateRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -638,27 +638,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIWriteIntermediateGenerateRequest) GetPrivateKeyFormat() string` +`func (o *PkiGenerateIntermediateRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIWriteIntermediateGenerateRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIWriteIntermediateGenerateRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiGenerateIntermediateRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIWriteIntermediateGenerateRequest) HasPrivateKeyFormat() bool` +`func (o *PkiGenerateIntermediateRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -667,27 +667,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIWriteIntermediateGenerateRequest) GetProvince() []string` +`func (o *PkiGenerateIntermediateRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIWriteIntermediateGenerateRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIWriteIntermediateGenerateRequest) SetProvince(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIWriteIntermediateGenerateRequest) HasProvince() bool` +`func (o *PkiGenerateIntermediateRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -696,27 +696,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIWriteIntermediateGenerateRequest) GetSerialNumber() string` +`func (o *PkiGenerateIntermediateRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIWriteIntermediateGenerateRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIWriteIntermediateGenerateRequest) SetSerialNumber(v string)` +`func (o *PkiGenerateIntermediateRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIWriteIntermediateGenerateRequest) HasSerialNumber() bool` +`func (o *PkiGenerateIntermediateRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -725,27 +725,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIWriteIntermediateGenerateRequest) GetSignatureBits() int32` +`func (o *PkiGenerateIntermediateRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIWriteIntermediateGenerateRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiGenerateIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIWriteIntermediateGenerateRequest) SetSignatureBits(v int32)` +`func (o *PkiGenerateIntermediateRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIWriteIntermediateGenerateRequest) HasSignatureBits() bool` +`func (o *PkiGenerateIntermediateRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -754,27 +754,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIWriteIntermediateGenerateRequest) GetStreetAddress() []string` +`func (o *PkiGenerateIntermediateRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIWriteIntermediateGenerateRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIWriteIntermediateGenerateRequest) SetStreetAddress(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIWriteIntermediateGenerateRequest) HasStreetAddress() bool` +`func (o *PkiGenerateIntermediateRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -783,27 +783,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIWriteIntermediateGenerateRequest) GetTtl() int32` +`func (o *PkiGenerateIntermediateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIWriteIntermediateGenerateRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiGenerateIntermediateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIWriteIntermediateGenerateRequest) SetTtl(v int32)` +`func (o *PkiGenerateIntermediateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIWriteIntermediateGenerateRequest) HasTtl() bool` +`func (o *PkiGenerateIntermediateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -812,27 +812,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIWriteIntermediateGenerateRequest) GetUriSans() []string` +`func (o *PkiGenerateIntermediateRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIWriteIntermediateGenerateRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiGenerateIntermediateRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIWriteIntermediateGenerateRequest) SetUriSans(v []string)` +`func (o *PkiGenerateIntermediateRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIWriteIntermediateGenerateRequest) HasUriSans() bool` +`func (o *PkiGenerateIntermediateRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. diff --git a/docs/PkiGenerateIntermediateResponse.md b/docs/PkiGenerateIntermediateResponse.md new file mode 100644 index 00000000..dc582365 --- /dev/null +++ b/docs/PkiGenerateIntermediateResponse.md @@ -0,0 +1,159 @@ +# PkiGenerateIntermediateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Csr** | Pointer to **string** | Certificate signing request. | [optional] +**KeyId** | Pointer to **string** | Id of the key. | [optional] +**PrivateKey** | Pointer to **string** | Generated private key. | [optional] +**PrivateKeyType** | Pointer to **string** | Specifies the format used for marshaling the private key. | [optional] + + + +## Methods + + +### NewPkiGenerateIntermediateResponse + +`func NewPkiGenerateIntermediateResponse() *PkiGenerateIntermediateResponse` + +NewPkiGenerateIntermediateResponse instantiates a new PkiGenerateIntermediateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiGenerateIntermediateResponseWithDefaults + +`func NewPkiGenerateIntermediateResponseWithDefaults() *PkiGenerateIntermediateResponse` + +NewPkiGenerateIntermediateResponseWithDefaults instantiates a new PkiGenerateIntermediateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCsr + +`func (o *PkiGenerateIntermediateResponse) GetCsr() string` + +GetCsr returns the Csr field if non-nil, zero value otherwise. + +### GetCsrOk + +`func (o *PkiGenerateIntermediateResponse) GetCsrOk() (*string, bool)` + +GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCsr + +`func (o *PkiGenerateIntermediateResponse) SetCsr(v string)` + +SetCsr sets Csr field to given value. + + +### HasCsr + +`func (o *PkiGenerateIntermediateResponse) HasCsr() bool` + +HasCsr returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiGenerateIntermediateResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiGenerateIntermediateResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiGenerateIntermediateResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiGenerateIntermediateResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiGenerateIntermediateResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiGenerateIntermediateResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiGenerateIntermediateResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiGenerateIntermediateResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiGenerateIntermediateResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiGenerateIntermediateResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiGenerateIntermediateResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiGenerateIntermediateResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteInternalExportedRequest.md b/docs/PkiGenerateInternalKeyRequest.md similarity index 68% rename from docs/PKIWriteInternalExportedRequest.md rename to docs/PkiGenerateInternalKeyRequest.md index 458cc1d0..cf32f5a4 100644 --- a/docs/PKIWriteInternalExportedRequest.md +++ b/docs/PkiGenerateInternalKeyRequest.md @@ -1,4 +1,4 @@ -# PKIWriteInternalExportedRequest +# PkiGenerateInternalKeyRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteInternalExportedRequest +### NewPkiGenerateInternalKeyRequest -`func NewPKIWriteInternalExportedRequest() *PKIWriteInternalExportedRequest` +`func NewPkiGenerateInternalKeyRequest() *PkiGenerateInternalKeyRequest` -NewPKIWriteInternalExportedRequest instantiates a new PKIWriteInternalExportedRequest object +NewPkiGenerateInternalKeyRequest instantiates a new PkiGenerateInternalKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteInternalExportedRequestWithDefaults +### NewPkiGenerateInternalKeyRequestWithDefaults -`func NewPKIWriteInternalExportedRequestWithDefaults() *PKIWriteInternalExportedRequest` +`func NewPkiGenerateInternalKeyRequestWithDefaults() *PkiGenerateInternalKeyRequest` -NewPKIWriteInternalExportedRequestWithDefaults instantiates a new PKIWriteInternalExportedRequest object +NewPkiGenerateInternalKeyRequestWithDefaults instantiates a new PkiGenerateInternalKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeyBits -`func (o *PKIWriteInternalExportedRequest) GetKeyBits() int32` +`func (o *PkiGenerateInternalKeyRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIWriteInternalExportedRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiGenerateInternalKeyRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIWriteInternalExportedRequest) SetKeyBits(v int32)` +`func (o *PkiGenerateInternalKeyRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIWriteInternalExportedRequest) HasKeyBits() bool` +`func (o *PkiGenerateInternalKeyRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIWriteInternalExportedRequest) GetKeyName() string` +`func (o *PkiGenerateInternalKeyRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIWriteInternalExportedRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiGenerateInternalKeyRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIWriteInternalExportedRequest) SetKeyName(v string)` +`func (o *PkiGenerateInternalKeyRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIWriteInternalExportedRequest) HasKeyName() bool` +`func (o *PkiGenerateInternalKeyRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIWriteInternalExportedRequest) GetKeyType() string` +`func (o *PkiGenerateInternalKeyRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIWriteInternalExportedRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiGenerateInternalKeyRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIWriteInternalExportedRequest) SetKeyType(v string)` +`func (o *PkiGenerateInternalKeyRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIWriteInternalExportedRequest) HasKeyType() bool` +`func (o *PkiGenerateInternalKeyRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasKeyType returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIWriteInternalExportedRequest) GetManagedKeyId() string` +`func (o *PkiGenerateInternalKeyRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIWriteInternalExportedRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiGenerateInternalKeyRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIWriteInternalExportedRequest) SetManagedKeyId(v string)` +`func (o *PkiGenerateInternalKeyRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIWriteInternalExportedRequest) HasManagedKeyId() bool` +`func (o *PkiGenerateInternalKeyRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIWriteInternalExportedRequest) GetManagedKeyName() string` +`func (o *PkiGenerateInternalKeyRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIWriteInternalExportedRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiGenerateInternalKeyRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIWriteInternalExportedRequest) SetManagedKeyName(v string)` +`func (o *PkiGenerateInternalKeyRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIWriteInternalExportedRequest) HasManagedKeyName() bool` +`func (o *PkiGenerateInternalKeyRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. diff --git a/docs/PkiGenerateInternalKeyResponse.md b/docs/PkiGenerateInternalKeyResponse.md new file mode 100644 index 00000000..a2b7ce36 --- /dev/null +++ b/docs/PkiGenerateInternalKeyResponse.md @@ -0,0 +1,159 @@ +# PkiGenerateInternalKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyId** | Pointer to **string** | ID assigned to this key. | [optional] +**KeyName** | Pointer to **string** | Name assigned to this key. | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. | [optional] +**PrivateKey** | Pointer to **string** | The private key string | [optional] + + + +## Methods + + +### NewPkiGenerateInternalKeyResponse + +`func NewPkiGenerateInternalKeyResponse() *PkiGenerateInternalKeyResponse` + +NewPkiGenerateInternalKeyResponse instantiates a new PkiGenerateInternalKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiGenerateInternalKeyResponseWithDefaults + +`func NewPkiGenerateInternalKeyResponseWithDefaults() *PkiGenerateInternalKeyResponse` + +NewPkiGenerateInternalKeyResponseWithDefaults instantiates a new PkiGenerateInternalKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyId + +`func (o *PkiGenerateInternalKeyResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiGenerateInternalKeyResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiGenerateInternalKeyResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiGenerateInternalKeyResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiGenerateInternalKeyResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiGenerateInternalKeyResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiGenerateInternalKeyResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiGenerateInternalKeyResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiGenerateInternalKeyResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiGenerateInternalKeyResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiGenerateInternalKeyResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiGenerateInternalKeyResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiGenerateInternalKeyResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiGenerateInternalKeyResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiGenerateInternalKeyResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiGenerateInternalKeyResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteKMSRequest.md b/docs/PkiGenerateKmsKeyRequest.md similarity index 69% rename from docs/PKIWriteKMSRequest.md rename to docs/PkiGenerateKmsKeyRequest.md index 3f53aaab..709110b0 100644 --- a/docs/PKIWriteKMSRequest.md +++ b/docs/PkiGenerateKmsKeyRequest.md @@ -1,4 +1,4 @@ -# PKIWriteKMSRequest +# PkiGenerateKmsKeyRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteKMSRequest +### NewPkiGenerateKmsKeyRequest -`func NewPKIWriteKMSRequest() *PKIWriteKMSRequest` +`func NewPkiGenerateKmsKeyRequest() *PkiGenerateKmsKeyRequest` -NewPKIWriteKMSRequest instantiates a new PKIWriteKMSRequest object +NewPkiGenerateKmsKeyRequest instantiates a new PkiGenerateKmsKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteKMSRequestWithDefaults +### NewPkiGenerateKmsKeyRequestWithDefaults -`func NewPKIWriteKMSRequestWithDefaults() *PKIWriteKMSRequest` +`func NewPkiGenerateKmsKeyRequestWithDefaults() *PkiGenerateKmsKeyRequest` -NewPKIWriteKMSRequestWithDefaults instantiates a new PKIWriteKMSRequest object +NewPkiGenerateKmsKeyRequestWithDefaults instantiates a new PkiGenerateKmsKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeyBits -`func (o *PKIWriteKMSRequest) GetKeyBits() int32` +`func (o *PkiGenerateKmsKeyRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIWriteKMSRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiGenerateKmsKeyRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIWriteKMSRequest) SetKeyBits(v int32)` +`func (o *PkiGenerateKmsKeyRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIWriteKMSRequest) HasKeyBits() bool` +`func (o *PkiGenerateKmsKeyRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIWriteKMSRequest) GetKeyName() string` +`func (o *PkiGenerateKmsKeyRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIWriteKMSRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiGenerateKmsKeyRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIWriteKMSRequest) SetKeyName(v string)` +`func (o *PkiGenerateKmsKeyRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIWriteKMSRequest) HasKeyName() bool` +`func (o *PkiGenerateKmsKeyRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIWriteKMSRequest) GetKeyType() string` +`func (o *PkiGenerateKmsKeyRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIWriteKMSRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiGenerateKmsKeyRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIWriteKMSRequest) SetKeyType(v string)` +`func (o *PkiGenerateKmsKeyRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIWriteKMSRequest) HasKeyType() bool` +`func (o *PkiGenerateKmsKeyRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasKeyType returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIWriteKMSRequest) GetManagedKeyId() string` +`func (o *PkiGenerateKmsKeyRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIWriteKMSRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiGenerateKmsKeyRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIWriteKMSRequest) SetManagedKeyId(v string)` +`func (o *PkiGenerateKmsKeyRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIWriteKMSRequest) HasManagedKeyId() bool` +`func (o *PkiGenerateKmsKeyRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIWriteKMSRequest) GetManagedKeyName() string` +`func (o *PkiGenerateKmsKeyRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIWriteKMSRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiGenerateKmsKeyRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIWriteKMSRequest) SetManagedKeyName(v string)` +`func (o *PkiGenerateKmsKeyRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIWriteKMSRequest) HasManagedKeyName() bool` +`func (o *PkiGenerateKmsKeyRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. diff --git a/docs/PkiGenerateKmsKeyResponse.md b/docs/PkiGenerateKmsKeyResponse.md new file mode 100644 index 00000000..75a9f4e1 --- /dev/null +++ b/docs/PkiGenerateKmsKeyResponse.md @@ -0,0 +1,159 @@ +# PkiGenerateKmsKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyId** | Pointer to **string** | ID assigned to this key. | [optional] +**KeyName** | Pointer to **string** | Name assigned to this key. | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. | [optional] +**PrivateKey** | Pointer to **string** | The private key string | [optional] + + + +## Methods + + +### NewPkiGenerateKmsKeyResponse + +`func NewPkiGenerateKmsKeyResponse() *PkiGenerateKmsKeyResponse` + +NewPkiGenerateKmsKeyResponse instantiates a new PkiGenerateKmsKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiGenerateKmsKeyResponseWithDefaults + +`func NewPkiGenerateKmsKeyResponseWithDefaults() *PkiGenerateKmsKeyResponse` + +NewPkiGenerateKmsKeyResponseWithDefaults instantiates a new PkiGenerateKmsKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyId + +`func (o *PkiGenerateKmsKeyResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiGenerateKmsKeyResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiGenerateKmsKeyResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiGenerateKmsKeyResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiGenerateKmsKeyResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiGenerateKmsKeyResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiGenerateKmsKeyResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiGenerateKmsKeyResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiGenerateKmsKeyResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiGenerateKmsKeyResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiGenerateKmsKeyResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiGenerateKmsKeyResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiGenerateKmsKeyResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiGenerateKmsKeyResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiGenerateKmsKeyResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiGenerateKmsKeyResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiGenerateRootResponse.md b/docs/PkiGenerateRootResponse.md new file mode 100644 index 00000000..b5a3f6bc --- /dev/null +++ b/docs/PkiGenerateRootResponse.md @@ -0,0 +1,309 @@ +# PkiGenerateRootResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Certificate** | Pointer to **string** | The generated self-signed CA certificate. | [optional] +**Expiration** | Pointer to **string** | The expiration of the given. | [optional] +**IssuerId** | Pointer to **string** | The ID of the issuer | [optional] +**IssuerName** | Pointer to **string** | The name of the issuer. | [optional] +**IssuingCa** | Pointer to **string** | The issuing certificate authority. | [optional] +**KeyId** | Pointer to **string** | The ID of the key. | [optional] +**KeyName** | Pointer to **string** | The key name if given. | [optional] +**PrivateKey** | Pointer to **string** | The private key if exported was specified. | [optional] +**SerialNumber** | Pointer to **string** | The requested Subject's named serial number. | [optional] + + + +## Methods + + +### NewPkiGenerateRootResponse + +`func NewPkiGenerateRootResponse() *PkiGenerateRootResponse` + +NewPkiGenerateRootResponse instantiates a new PkiGenerateRootResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiGenerateRootResponseWithDefaults + +`func NewPkiGenerateRootResponseWithDefaults() *PkiGenerateRootResponse` + +NewPkiGenerateRootResponseWithDefaults instantiates a new PkiGenerateRootResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCertificate + +`func (o *PkiGenerateRootResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiGenerateRootResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiGenerateRootResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiGenerateRootResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiGenerateRootResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiGenerateRootResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiGenerateRootResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiGenerateRootResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiGenerateRootResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiGenerateRootResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiGenerateRootResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiGenerateRootResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiGenerateRootResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiGenerateRootResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiGenerateRootResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiGenerateRootResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiGenerateRootResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiGenerateRootResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiGenerateRootResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiGenerateRootResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiGenerateRootResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiGenerateRootResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiGenerateRootResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiGenerateRootResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiGenerateRootResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiGenerateRootResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiGenerateRootResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiGenerateRootResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiGenerateRootResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiGenerateRootResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiGenerateRootResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiGenerateRootResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiGenerateRootResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiGenerateRootResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiGenerateRootResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiGenerateRootResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIImportKeysRequest.md b/docs/PkiImportKeyRequest.md similarity index 66% rename from docs/PKIImportKeysRequest.md rename to docs/PkiImportKeyRequest.md index 7f641d53..a2883277 100644 --- a/docs/PKIImportKeysRequest.md +++ b/docs/PkiImportKeyRequest.md @@ -1,4 +1,4 @@ -# PKIImportKeysRequest +# PkiImportKeyRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIImportKeysRequest +### NewPkiImportKeyRequest -`func NewPKIImportKeysRequest() *PKIImportKeysRequest` +`func NewPkiImportKeyRequest() *PkiImportKeyRequest` -NewPKIImportKeysRequest instantiates a new PKIImportKeysRequest object +NewPkiImportKeyRequest instantiates a new PkiImportKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIImportKeysRequestWithDefaults +### NewPkiImportKeyRequestWithDefaults -`func NewPKIImportKeysRequestWithDefaults() *PKIImportKeysRequest` +`func NewPkiImportKeyRequestWithDefaults() *PkiImportKeyRequest` -NewPKIImportKeysRequestWithDefaults instantiates a new PKIImportKeysRequest object +NewPkiImportKeyRequestWithDefaults instantiates a new PkiImportKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeyName -`func (o *PKIImportKeysRequest) GetKeyName() string` +`func (o *PkiImportKeyRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIImportKeysRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiImportKeyRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIImportKeysRequest) SetKeyName(v string)` +`func (o *PkiImportKeyRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIImportKeysRequest) HasKeyName() bool` +`func (o *PkiImportKeyRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasKeyName returns a boolean if a field has been set. ### GetPemBundle -`func (o *PKIImportKeysRequest) GetPemBundle() string` +`func (o *PkiImportKeyRequest) GetPemBundle() string` GetPemBundle returns the PemBundle field if non-nil, zero value otherwise. ### GetPemBundleOk -`func (o *PKIImportKeysRequest) GetPemBundleOk() (*string, bool)` +`func (o *PkiImportKeyRequest) GetPemBundleOk() (*string, bool)` GetPemBundleOk returns a tuple with the PemBundle field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPemBundle -`func (o *PKIImportKeysRequest) SetPemBundle(v string)` +`func (o *PkiImportKeyRequest) SetPemBundle(v string)` SetPemBundle sets PemBundle field to given value. ### HasPemBundle -`func (o *PKIImportKeysRequest) HasPemBundle() bool` +`func (o *PkiImportKeyRequest) HasPemBundle() bool` HasPemBundle returns a boolean if a field has been set. diff --git a/docs/PkiImportKeyResponse.md b/docs/PkiImportKeyResponse.md new file mode 100644 index 00000000..d778a117 --- /dev/null +++ b/docs/PkiImportKeyResponse.md @@ -0,0 +1,129 @@ +# PkiImportKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyId** | Pointer to **string** | ID assigned to this key. | [optional] +**KeyName** | Pointer to **string** | Name assigned to this key. | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. | [optional] + + + +## Methods + + +### NewPkiImportKeyResponse + +`func NewPkiImportKeyResponse() *PkiImportKeyResponse` + +NewPkiImportKeyResponse instantiates a new PkiImportKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiImportKeyResponseWithDefaults + +`func NewPkiImportKeyResponseWithDefaults() *PkiImportKeyResponse` + +NewPkiImportKeyResponseWithDefaults instantiates a new PkiImportKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyId + +`func (o *PkiImportKeyResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiImportKeyResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiImportKeyResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiImportKeyResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiImportKeyResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiImportKeyResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiImportKeyResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiImportKeyResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiImportKeyResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiImportKeyResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiImportKeyResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiImportKeyResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKISignRoleRequest.md b/docs/PkiIssueWithRoleRequest.md similarity index 67% rename from docs/PKISignRoleRequest.md rename to docs/PkiIssueWithRoleRequest.md index a4771028..7cee3f9e 100644 --- a/docs/PKISignRoleRequest.md +++ b/docs/PkiIssueWithRoleRequest.md @@ -1,4 +1,4 @@ -# PKISignRoleRequest +# PkiIssueWithRoleRequest ## Properties @@ -7,7 +7,6 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **AltNames** | Pointer to **string** | The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. | [optional] **CommonName** | Pointer to **string** | The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. | [optional] -**Csr** | Pointer to **string** | PEM-format CSR to be signed. | [optional] [default to ""] **ExcludeCnFromSans** | Pointer to **bool** | If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). | [optional] [default to false] **Format** | Pointer to **string** | Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". | [optional] [default to "pem"] **IpSans** | Pointer to **[]string** | The requested IP SANs, if any, in a comma-delimited list | [optional] @@ -19,53 +18,54 @@ Name | Type | Description | Notes **SerialNumber** | Pointer to **string** | The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. | [optional] **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKISignRoleRequest +### NewPkiIssueWithRoleRequest -`func NewPKISignRoleRequest() *PKISignRoleRequest` +`func NewPkiIssueWithRoleRequest() *PkiIssueWithRoleRequest` -NewPKISignRoleRequest instantiates a new PKISignRoleRequest object +NewPkiIssueWithRoleRequest instantiates a new PkiIssueWithRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKISignRoleRequestWithDefaults +### NewPkiIssueWithRoleRequestWithDefaults -`func NewPKISignRoleRequestWithDefaults() *PKISignRoleRequest` +`func NewPkiIssueWithRoleRequestWithDefaults() *PkiIssueWithRoleRequest` -NewPKISignRoleRequestWithDefaults instantiates a new PKISignRoleRequest object +NewPkiIssueWithRoleRequestWithDefaults instantiates a new PkiIssueWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKISignRoleRequest) GetAltNames() string` +`func (o *PkiIssueWithRoleRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKISignRoleRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssueWithRoleRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKISignRoleRequest) SetAltNames(v string)` +`func (o *PkiIssueWithRoleRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKISignRoleRequest) HasAltNames() bool` +`func (o *PkiIssueWithRoleRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -74,85 +74,56 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKISignRoleRequest) GetCommonName() string` +`func (o *PkiIssueWithRoleRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKISignRoleRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssueWithRoleRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKISignRoleRequest) SetCommonName(v string)` +`func (o *PkiIssueWithRoleRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKISignRoleRequest) HasCommonName() bool` +`func (o *PkiIssueWithRoleRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. -### GetCsr - -`func (o *PKISignRoleRequest) GetCsr() string` - -GetCsr returns the Csr field if non-nil, zero value otherwise. - -### GetCsrOk - -`func (o *PKISignRoleRequest) GetCsrOk() (*string, bool)` - -GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCsr - -`func (o *PKISignRoleRequest) SetCsr(v string)` - -SetCsr sets Csr field to given value. - - -### HasCsr - -`func (o *PKISignRoleRequest) HasCsr() bool` - -HasCsr returns a boolean if a field has been set. - - - - ### GetExcludeCnFromSans -`func (o *PKISignRoleRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssueWithRoleRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKISignRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssueWithRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKISignRoleRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssueWithRoleRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKISignRoleRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssueWithRoleRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -161,27 +132,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKISignRoleRequest) GetFormat() string` +`func (o *PkiIssueWithRoleRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKISignRoleRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssueWithRoleRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKISignRoleRequest) SetFormat(v string)` +`func (o *PkiIssueWithRoleRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKISignRoleRequest) HasFormat() bool` +`func (o *PkiIssueWithRoleRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -190,27 +161,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKISignRoleRequest) GetIpSans() []string` +`func (o *PkiIssueWithRoleRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKISignRoleRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssueWithRoleRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKISignRoleRequest) SetIpSans(v []string)` +`func (o *PkiIssueWithRoleRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKISignRoleRequest) HasIpSans() bool` +`func (o *PkiIssueWithRoleRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -219,27 +190,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerRef -`func (o *PKISignRoleRequest) GetIssuerRef() string` +`func (o *PkiIssueWithRoleRequest) GetIssuerRef() string` GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. ### GetIssuerRefOk -`func (o *PKISignRoleRequest) GetIssuerRefOk() (*string, bool)` +`func (o *PkiIssueWithRoleRequest) GetIssuerRefOk() (*string, bool)` GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerRef -`func (o *PKISignRoleRequest) SetIssuerRef(v string)` +`func (o *PkiIssueWithRoleRequest) SetIssuerRef(v string)` SetIssuerRef sets IssuerRef field to given value. ### HasIssuerRef -`func (o *PKISignRoleRequest) HasIssuerRef() bool` +`func (o *PkiIssueWithRoleRequest) HasIssuerRef() bool` HasIssuerRef returns a boolean if a field has been set. @@ -248,27 +219,27 @@ HasIssuerRef returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKISignRoleRequest) GetNotAfter() string` +`func (o *PkiIssueWithRoleRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKISignRoleRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssueWithRoleRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKISignRoleRequest) SetNotAfter(v string)` +`func (o *PkiIssueWithRoleRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKISignRoleRequest) HasNotAfter() bool` +`func (o *PkiIssueWithRoleRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -277,27 +248,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKISignRoleRequest) GetOtherSans() []string` +`func (o *PkiIssueWithRoleRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKISignRoleRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssueWithRoleRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKISignRoleRequest) SetOtherSans(v []string)` +`func (o *PkiIssueWithRoleRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKISignRoleRequest) HasOtherSans() bool` +`func (o *PkiIssueWithRoleRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -306,27 +277,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKISignRoleRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssueWithRoleRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKISignRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssueWithRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKISignRoleRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssueWithRoleRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKISignRoleRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssueWithRoleRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -335,27 +306,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKISignRoleRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiIssueWithRoleRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKISignRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiIssueWithRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKISignRoleRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiIssueWithRoleRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKISignRoleRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiIssueWithRoleRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -364,27 +335,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKISignRoleRequest) GetSerialNumber() string` +`func (o *PkiIssueWithRoleRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKISignRoleRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssueWithRoleRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKISignRoleRequest) SetSerialNumber(v string)` +`func (o *PkiIssueWithRoleRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKISignRoleRequest) HasSerialNumber() bool` +`func (o *PkiIssueWithRoleRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -393,27 +364,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetTtl -`func (o *PKISignRoleRequest) GetTtl() int32` +`func (o *PkiIssueWithRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKISignRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssueWithRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKISignRoleRequest) SetTtl(v int32)` +`func (o *PkiIssueWithRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKISignRoleRequest) HasTtl() bool` +`func (o *PkiIssueWithRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -422,33 +393,62 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKISignRoleRequest) GetUriSans() []string` +`func (o *PkiIssueWithRoleRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKISignRoleRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssueWithRoleRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKISignRoleRequest) SetUriSans(v []string)` +`func (o *PkiIssueWithRoleRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKISignRoleRequest) HasUriSans() bool` +`func (o *PkiIssueWithRoleRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiIssueWithRoleRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiIssueWithRoleRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiIssueWithRoleRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiIssueWithRoleRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiIssueWithRoleResponse.md b/docs/PkiIssueWithRoleResponse.md new file mode 100644 index 00000000..9ed635ba --- /dev/null +++ b/docs/PkiIssueWithRoleResponse.md @@ -0,0 +1,249 @@ +# PkiIssueWithRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiIssueWithRoleResponse + +`func NewPkiIssueWithRoleResponse() *PkiIssueWithRoleResponse` + +NewPkiIssueWithRoleResponse instantiates a new PkiIssueWithRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssueWithRoleResponseWithDefaults + +`func NewPkiIssueWithRoleResponseWithDefaults() *PkiIssueWithRoleResponse` + +NewPkiIssueWithRoleResponseWithDefaults instantiates a new PkiIssueWithRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiIssueWithRoleResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiIssueWithRoleResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiIssueWithRoleResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiIssueWithRoleResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiIssueWithRoleResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssueWithRoleResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssueWithRoleResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssueWithRoleResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssueWithRoleResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssueWithRoleResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssueWithRoleResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssueWithRoleResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssueWithRoleResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssueWithRoleResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssueWithRoleResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssueWithRoleResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssueWithRoleResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssueWithRoleResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssueWithRoleResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssueWithRoleResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiIssueWithRoleResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiIssueWithRoleResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiIssueWithRoleResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiIssueWithRoleResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssueWithRoleResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssueWithRoleResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssueWithRoleResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssueWithRoleResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteIssueRoleRequest.md b/docs/PkiIssuerIssueWithRoleRequest.md similarity index 66% rename from docs/PKIWriteIssueRoleRequest.md rename to docs/PkiIssuerIssueWithRoleRequest.md index ef515ea3..d2381a02 100644 --- a/docs/PKIWriteIssueRoleRequest.md +++ b/docs/PkiIssuerIssueWithRoleRequest.md @@ -1,4 +1,4 @@ -# PKIWriteIssueRoleRequest +# PkiIssuerIssueWithRoleRequest ## Properties @@ -10,7 +10,6 @@ Name | Type | Description | Notes **ExcludeCnFromSans** | Pointer to **bool** | If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). | [optional] [default to false] **Format** | Pointer to **string** | Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". | [optional] [default to "pem"] **IpSans** | Pointer to **[]string** | The requested IP SANs, if any, in a comma-delimited list | [optional] -**IssuerRef** | Pointer to **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [optional] [default to "default"] **NotAfter** | Pointer to **string** | Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ | [optional] **OtherSans** | Pointer to **[]string** | Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. | [optional] **PrivateKeyFormat** | Pointer to **string** | Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". | [optional] [default to "der"] @@ -18,53 +17,54 @@ Name | Type | Description | Notes **SerialNumber** | Pointer to **string** | The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. | [optional] **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKIWriteIssueRoleRequest +### NewPkiIssuerIssueWithRoleRequest -`func NewPKIWriteIssueRoleRequest() *PKIWriteIssueRoleRequest` +`func NewPkiIssuerIssueWithRoleRequest() *PkiIssuerIssueWithRoleRequest` -NewPKIWriteIssueRoleRequest instantiates a new PKIWriteIssueRoleRequest object +NewPkiIssuerIssueWithRoleRequest instantiates a new PkiIssuerIssueWithRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteIssueRoleRequestWithDefaults +### NewPkiIssuerIssueWithRoleRequestWithDefaults -`func NewPKIWriteIssueRoleRequestWithDefaults() *PKIWriteIssueRoleRequest` +`func NewPkiIssuerIssueWithRoleRequestWithDefaults() *PkiIssuerIssueWithRoleRequest` -NewPKIWriteIssueRoleRequestWithDefaults instantiates a new PKIWriteIssueRoleRequest object +NewPkiIssuerIssueWithRoleRequestWithDefaults instantiates a new PkiIssuerIssueWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIWriteIssueRoleRequest) GetAltNames() string` +`func (o *PkiIssuerIssueWithRoleRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIWriteIssueRoleRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIWriteIssueRoleRequest) SetAltNames(v string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIWriteIssueRoleRequest) HasAltNames() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -73,27 +73,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIWriteIssueRoleRequest) GetCommonName() string` +`func (o *PkiIssuerIssueWithRoleRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIWriteIssueRoleRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIWriteIssueRoleRequest) SetCommonName(v string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIWriteIssueRoleRequest) HasCommonName() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -102,27 +102,27 @@ HasCommonName returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIWriteIssueRoleRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuerIssueWithRoleRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIWriteIssueRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIWriteIssueRoleRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuerIssueWithRoleRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIWriteIssueRoleRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -131,27 +131,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIWriteIssueRoleRequest) GetFormat() string` +`func (o *PkiIssuerIssueWithRoleRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIWriteIssueRoleRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIWriteIssueRoleRequest) SetFormat(v string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIWriteIssueRoleRequest) HasFormat() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -160,85 +160,56 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIWriteIssueRoleRequest) GetIpSans() []string` +`func (o *PkiIssuerIssueWithRoleRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIWriteIssueRoleRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIWriteIssueRoleRequest) SetIpSans(v []string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIWriteIssueRoleRequest) HasIpSans() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. -### GetIssuerRef - -`func (o *PKIWriteIssueRoleRequest) GetIssuerRef() string` - -GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. - -### GetIssuerRefOk - -`func (o *PKIWriteIssueRoleRequest) GetIssuerRefOk() (*string, bool)` - -GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetIssuerRef - -`func (o *PKIWriteIssueRoleRequest) SetIssuerRef(v string)` - -SetIssuerRef sets IssuerRef field to given value. - - -### HasIssuerRef - -`func (o *PKIWriteIssueRoleRequest) HasIssuerRef() bool` - -HasIssuerRef returns a boolean if a field has been set. - - - - ### GetNotAfter -`func (o *PKIWriteIssueRoleRequest) GetNotAfter() string` +`func (o *PkiIssuerIssueWithRoleRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIWriteIssueRoleRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIWriteIssueRoleRequest) SetNotAfter(v string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIWriteIssueRoleRequest) HasNotAfter() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -247,27 +218,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIWriteIssueRoleRequest) GetOtherSans() []string` +`func (o *PkiIssuerIssueWithRoleRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIWriteIssueRoleRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIWriteIssueRoleRequest) SetOtherSans(v []string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIWriteIssueRoleRequest) HasOtherSans() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -276,27 +247,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIWriteIssueRoleRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuerIssueWithRoleRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIWriteIssueRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIWriteIssueRoleRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIWriteIssueRoleRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -305,27 +276,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKIWriteIssueRoleRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiIssuerIssueWithRoleRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKIWriteIssueRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKIWriteIssueRoleRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiIssuerIssueWithRoleRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKIWriteIssueRoleRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -334,27 +305,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIWriteIssueRoleRequest) GetSerialNumber() string` +`func (o *PkiIssuerIssueWithRoleRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIWriteIssueRoleRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIWriteIssueRoleRequest) SetSerialNumber(v string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIWriteIssueRoleRequest) HasSerialNumber() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -363,27 +334,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetTtl -`func (o *PKIWriteIssueRoleRequest) GetTtl() int32` +`func (o *PkiIssuerIssueWithRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIWriteIssueRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIWriteIssueRoleRequest) SetTtl(v int32)` +`func (o *PkiIssuerIssueWithRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIWriteIssueRoleRequest) HasTtl() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -392,33 +363,62 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIWriteIssueRoleRequest) GetUriSans() []string` +`func (o *PkiIssuerIssueWithRoleRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIWriteIssueRoleRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuerIssueWithRoleRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIWriteIssueRoleRequest) SetUriSans(v []string)` +`func (o *PkiIssuerIssueWithRoleRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIWriteIssueRoleRequest) HasUriSans() bool` +`func (o *PkiIssuerIssueWithRoleRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiIssuerIssueWithRoleRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiIssuerIssueWithRoleRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiIssuerIssueWithRoleRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiIssuerIssueWithRoleRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiIssuerIssueWithRoleResponse.md b/docs/PkiIssuerIssueWithRoleResponse.md new file mode 100644 index 00000000..d18f5880 --- /dev/null +++ b/docs/PkiIssuerIssueWithRoleResponse.md @@ -0,0 +1,249 @@ +# PkiIssuerIssueWithRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiIssuerIssueWithRoleResponse + +`func NewPkiIssuerIssueWithRoleResponse() *PkiIssuerIssueWithRoleResponse` + +NewPkiIssuerIssueWithRoleResponse instantiates a new PkiIssuerIssueWithRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerIssueWithRoleResponseWithDefaults + +`func NewPkiIssuerIssueWithRoleResponseWithDefaults() *PkiIssuerIssueWithRoleResponse` + +NewPkiIssuerIssueWithRoleResponseWithDefaults instantiates a new PkiIssuerIssueWithRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiIssuerIssueWithRoleResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiIssuerIssueWithRoleResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiIssuerIssueWithRoleResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiIssuerIssueWithRoleResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiIssuerIssueWithRoleResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuerIssueWithRoleResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuerIssueWithRoleResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuerIssueWithRoleResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssuerIssueWithRoleResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssuerIssueWithRoleResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssuerIssueWithRoleResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssuerIssueWithRoleResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuerIssueWithRoleResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuerIssueWithRoleResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuerIssueWithRoleResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuerIssueWithRoleResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssuerIssueWithRoleResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssuerIssueWithRoleResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssuerIssueWithRoleResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssuerIssueWithRoleResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiIssuerIssueWithRoleResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiIssuerIssueWithRoleResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiIssuerIssueWithRoleResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiIssuerIssueWithRoleResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssuerIssueWithRoleResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssuerIssueWithRoleResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssuerIssueWithRoleResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssuerIssueWithRoleResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerReadCrlDeltaDerResponse.md b/docs/PkiIssuerReadCrlDeltaDerResponse.md new file mode 100644 index 00000000..696bc7e9 --- /dev/null +++ b/docs/PkiIssuerReadCrlDeltaDerResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerReadCrlDeltaDerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPkiIssuerReadCrlDeltaDerResponse + +`func NewPkiIssuerReadCrlDeltaDerResponse() *PkiIssuerReadCrlDeltaDerResponse` + +NewPkiIssuerReadCrlDeltaDerResponse instantiates a new PkiIssuerReadCrlDeltaDerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerReadCrlDeltaDerResponseWithDefaults + +`func NewPkiIssuerReadCrlDeltaDerResponseWithDefaults() *PkiIssuerReadCrlDeltaDerResponse` + +NewPkiIssuerReadCrlDeltaDerResponseWithDefaults instantiates a new PkiIssuerReadCrlDeltaDerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerReadCrlDeltaDerResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerReadCrlDeltaDerResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerReadCrlDeltaDerResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerReadCrlDeltaDerResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerReadCrlDeltaPemResponse.md b/docs/PkiIssuerReadCrlDeltaPemResponse.md new file mode 100644 index 00000000..598bc431 --- /dev/null +++ b/docs/PkiIssuerReadCrlDeltaPemResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerReadCrlDeltaPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPkiIssuerReadCrlDeltaPemResponse + +`func NewPkiIssuerReadCrlDeltaPemResponse() *PkiIssuerReadCrlDeltaPemResponse` + +NewPkiIssuerReadCrlDeltaPemResponse instantiates a new PkiIssuerReadCrlDeltaPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerReadCrlDeltaPemResponseWithDefaults + +`func NewPkiIssuerReadCrlDeltaPemResponseWithDefaults() *PkiIssuerReadCrlDeltaPemResponse` + +NewPkiIssuerReadCrlDeltaPemResponseWithDefaults instantiates a new PkiIssuerReadCrlDeltaPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerReadCrlDeltaPemResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerReadCrlDeltaPemResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerReadCrlDeltaPemResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerReadCrlDeltaPemResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerReadCrlDeltaResponse.md b/docs/PkiIssuerReadCrlDeltaResponse.md new file mode 100644 index 00000000..bc1bef4d --- /dev/null +++ b/docs/PkiIssuerReadCrlDeltaResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerReadCrlDeltaResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPkiIssuerReadCrlDeltaResponse + +`func NewPkiIssuerReadCrlDeltaResponse() *PkiIssuerReadCrlDeltaResponse` + +NewPkiIssuerReadCrlDeltaResponse instantiates a new PkiIssuerReadCrlDeltaResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerReadCrlDeltaResponseWithDefaults + +`func NewPkiIssuerReadCrlDeltaResponseWithDefaults() *PkiIssuerReadCrlDeltaResponse` + +NewPkiIssuerReadCrlDeltaResponseWithDefaults instantiates a new PkiIssuerReadCrlDeltaResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerReadCrlDeltaResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerReadCrlDeltaResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerReadCrlDeltaResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerReadCrlDeltaResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerReadCrlDerResponse.md b/docs/PkiIssuerReadCrlDerResponse.md new file mode 100644 index 00000000..61b18d68 --- /dev/null +++ b/docs/PkiIssuerReadCrlDerResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerReadCrlDerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPkiIssuerReadCrlDerResponse + +`func NewPkiIssuerReadCrlDerResponse() *PkiIssuerReadCrlDerResponse` + +NewPkiIssuerReadCrlDerResponse instantiates a new PkiIssuerReadCrlDerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerReadCrlDerResponseWithDefaults + +`func NewPkiIssuerReadCrlDerResponseWithDefaults() *PkiIssuerReadCrlDerResponse` + +NewPkiIssuerReadCrlDerResponseWithDefaults instantiates a new PkiIssuerReadCrlDerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerReadCrlDerResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerReadCrlDerResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerReadCrlDerResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerReadCrlDerResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerReadCrlPemResponse.md b/docs/PkiIssuerReadCrlPemResponse.md new file mode 100644 index 00000000..f8061b4c --- /dev/null +++ b/docs/PkiIssuerReadCrlPemResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerReadCrlPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPkiIssuerReadCrlPemResponse + +`func NewPkiIssuerReadCrlPemResponse() *PkiIssuerReadCrlPemResponse` + +NewPkiIssuerReadCrlPemResponse instantiates a new PkiIssuerReadCrlPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerReadCrlPemResponseWithDefaults + +`func NewPkiIssuerReadCrlPemResponseWithDefaults() *PkiIssuerReadCrlPemResponse` + +NewPkiIssuerReadCrlPemResponseWithDefaults instantiates a new PkiIssuerReadCrlPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerReadCrlPemResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerReadCrlPemResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerReadCrlPemResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerReadCrlPemResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerReadCrlResponse.md b/docs/PkiIssuerReadCrlResponse.md new file mode 100644 index 00000000..6ef5fedb --- /dev/null +++ b/docs/PkiIssuerReadCrlResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerReadCrlResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPkiIssuerReadCrlResponse + +`func NewPkiIssuerReadCrlResponse() *PkiIssuerReadCrlResponse` + +NewPkiIssuerReadCrlResponse instantiates a new PkiIssuerReadCrlResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerReadCrlResponseWithDefaults + +`func NewPkiIssuerReadCrlResponseWithDefaults() *PkiIssuerReadCrlResponse` + +NewPkiIssuerReadCrlResponseWithDefaults instantiates a new PkiIssuerReadCrlResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerReadCrlResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerReadCrlResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerReadCrlResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerReadCrlResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerResignCrlsRequest.md b/docs/PkiIssuerResignCrlsRequest.md index 68945c81..81b4e76e 100644 --- a/docs/PkiIssuerResignCrlsRequest.md +++ b/docs/PkiIssuerResignCrlsRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerResignCRLsRequest +# PkiIssuerResignCrlsRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIIssuerResignCRLsRequest +### NewPkiIssuerResignCrlsRequest -`func NewPKIIssuerResignCRLsRequest() *PKIIssuerResignCRLsRequest` +`func NewPkiIssuerResignCrlsRequest() *PkiIssuerResignCrlsRequest` -NewPKIIssuerResignCRLsRequest instantiates a new PKIIssuerResignCRLsRequest object +NewPkiIssuerResignCrlsRequest instantiates a new PkiIssuerResignCrlsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerResignCRLsRequestWithDefaults +### NewPkiIssuerResignCrlsRequestWithDefaults -`func NewPKIIssuerResignCRLsRequestWithDefaults() *PKIIssuerResignCRLsRequest` +`func NewPkiIssuerResignCrlsRequestWithDefaults() *PkiIssuerResignCrlsRequest` -NewPKIIssuerResignCRLsRequestWithDefaults instantiates a new PKIIssuerResignCRLsRequest object +NewPkiIssuerResignCrlsRequestWithDefaults instantiates a new PkiIssuerResignCrlsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCrlNumber -`func (o *PKIIssuerResignCRLsRequest) GetCrlNumber() int32` +`func (o *PkiIssuerResignCrlsRequest) GetCrlNumber() int32` GetCrlNumber returns the CrlNumber field if non-nil, zero value otherwise. ### GetCrlNumberOk -`func (o *PKIIssuerResignCRLsRequest) GetCrlNumberOk() (*int32, bool)` +`func (o *PkiIssuerResignCrlsRequest) GetCrlNumberOk() (*int32, bool)` GetCrlNumberOk returns a tuple with the CrlNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCrlNumber -`func (o *PKIIssuerResignCRLsRequest) SetCrlNumber(v int32)` +`func (o *PkiIssuerResignCrlsRequest) SetCrlNumber(v int32)` SetCrlNumber sets CrlNumber field to given value. ### HasCrlNumber -`func (o *PKIIssuerResignCRLsRequest) HasCrlNumber() bool` +`func (o *PkiIssuerResignCrlsRequest) HasCrlNumber() bool` HasCrlNumber returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasCrlNumber returns a boolean if a field has been set. ### GetCrls -`func (o *PKIIssuerResignCRLsRequest) GetCrls() []string` +`func (o *PkiIssuerResignCrlsRequest) GetCrls() []string` GetCrls returns the Crls field if non-nil, zero value otherwise. ### GetCrlsOk -`func (o *PKIIssuerResignCRLsRequest) GetCrlsOk() (*[]string, bool)` +`func (o *PkiIssuerResignCrlsRequest) GetCrlsOk() (*[]string, bool)` GetCrlsOk returns a tuple with the Crls field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCrls -`func (o *PKIIssuerResignCRLsRequest) SetCrls(v []string)` +`func (o *PkiIssuerResignCrlsRequest) SetCrls(v []string)` SetCrls sets Crls field to given value. ### HasCrls -`func (o *PKIIssuerResignCRLsRequest) HasCrls() bool` +`func (o *PkiIssuerResignCrlsRequest) HasCrls() bool` HasCrls returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasCrls returns a boolean if a field has been set. ### GetDeltaCrlBaseNumber -`func (o *PKIIssuerResignCRLsRequest) GetDeltaCrlBaseNumber() int32` +`func (o *PkiIssuerResignCrlsRequest) GetDeltaCrlBaseNumber() int32` GetDeltaCrlBaseNumber returns the DeltaCrlBaseNumber field if non-nil, zero value otherwise. ### GetDeltaCrlBaseNumberOk -`func (o *PKIIssuerResignCRLsRequest) GetDeltaCrlBaseNumberOk() (*int32, bool)` +`func (o *PkiIssuerResignCrlsRequest) GetDeltaCrlBaseNumberOk() (*int32, bool)` GetDeltaCrlBaseNumberOk returns a tuple with the DeltaCrlBaseNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDeltaCrlBaseNumber -`func (o *PKIIssuerResignCRLsRequest) SetDeltaCrlBaseNumber(v int32)` +`func (o *PkiIssuerResignCrlsRequest) SetDeltaCrlBaseNumber(v int32)` SetDeltaCrlBaseNumber sets DeltaCrlBaseNumber field to given value. ### HasDeltaCrlBaseNumber -`func (o *PKIIssuerResignCRLsRequest) HasDeltaCrlBaseNumber() bool` +`func (o *PkiIssuerResignCrlsRequest) HasDeltaCrlBaseNumber() bool` HasDeltaCrlBaseNumber returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasDeltaCrlBaseNumber returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuerResignCRLsRequest) GetFormat() string` +`func (o *PkiIssuerResignCrlsRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuerResignCRLsRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuerResignCrlsRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuerResignCRLsRequest) SetFormat(v string)` +`func (o *PkiIssuerResignCrlsRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuerResignCRLsRequest) HasFormat() bool` +`func (o *PkiIssuerResignCrlsRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasFormat returns a boolean if a field has been set. ### GetNextUpdate -`func (o *PKIIssuerResignCRLsRequest) GetNextUpdate() string` +`func (o *PkiIssuerResignCrlsRequest) GetNextUpdate() string` GetNextUpdate returns the NextUpdate field if non-nil, zero value otherwise. ### GetNextUpdateOk -`func (o *PKIIssuerResignCRLsRequest) GetNextUpdateOk() (*string, bool)` +`func (o *PkiIssuerResignCrlsRequest) GetNextUpdateOk() (*string, bool)` GetNextUpdateOk returns a tuple with the NextUpdate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNextUpdate -`func (o *PKIIssuerResignCRLsRequest) SetNextUpdate(v string)` +`func (o *PkiIssuerResignCrlsRequest) SetNextUpdate(v string)` SetNextUpdate sets NextUpdate field to given value. ### HasNextUpdate -`func (o *PKIIssuerResignCRLsRequest) HasNextUpdate() bool` +`func (o *PkiIssuerResignCrlsRequest) HasNextUpdate() bool` HasNextUpdate returns a boolean if a field has been set. diff --git a/docs/PkiIssuerResignCrlsResponse.md b/docs/PkiIssuerResignCrlsResponse.md new file mode 100644 index 00000000..9b8703cc --- /dev/null +++ b/docs/PkiIssuerResignCrlsResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerResignCrlsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | CRL | [optional] + + + +## Methods + + +### NewPkiIssuerResignCrlsResponse + +`func NewPkiIssuerResignCrlsResponse() *PkiIssuerResignCrlsResponse` + +NewPkiIssuerResignCrlsResponse instantiates a new PkiIssuerResignCrlsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerResignCrlsResponseWithDefaults + +`func NewPkiIssuerResignCrlsResponseWithDefaults() *PkiIssuerResignCrlsResponse` + +NewPkiIssuerResignCrlsResponseWithDefaults instantiates a new PkiIssuerResignCrlsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerResignCrlsResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerResignCrlsResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerResignCrlsResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerResignCrlsResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerSignIntermediateRequest.md b/docs/PkiIssuerSignIntermediateRequest.md index 155f2930..e27d8376 100644 --- a/docs/PkiIssuerSignIntermediateRequest.md +++ b/docs/PkiIssuerSignIntermediateRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerSignIntermediateRequest +# PkiIssuerSignIntermediateRequest ## Properties @@ -38,47 +38,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIIssuerSignIntermediateRequest +### NewPkiIssuerSignIntermediateRequest -`func NewPKIIssuerSignIntermediateRequest() *PKIIssuerSignIntermediateRequest` +`func NewPkiIssuerSignIntermediateRequest() *PkiIssuerSignIntermediateRequest` -NewPKIIssuerSignIntermediateRequest instantiates a new PKIIssuerSignIntermediateRequest object +NewPkiIssuerSignIntermediateRequest instantiates a new PkiIssuerSignIntermediateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerSignIntermediateRequestWithDefaults +### NewPkiIssuerSignIntermediateRequestWithDefaults -`func NewPKIIssuerSignIntermediateRequestWithDefaults() *PKIIssuerSignIntermediateRequest` +`func NewPkiIssuerSignIntermediateRequestWithDefaults() *PkiIssuerSignIntermediateRequest` -NewPKIIssuerSignIntermediateRequestWithDefaults instantiates a new PKIIssuerSignIntermediateRequest object +NewPkiIssuerSignIntermediateRequestWithDefaults instantiates a new PkiIssuerSignIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIIssuerSignIntermediateRequest) GetAltNames() string` +`func (o *PkiIssuerSignIntermediateRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIIssuerSignIntermediateRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIIssuerSignIntermediateRequest) SetAltNames(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIIssuerSignIntermediateRequest) HasAltNames() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -87,27 +87,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIIssuerSignIntermediateRequest) GetCommonName() string` +`func (o *PkiIssuerSignIntermediateRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIIssuerSignIntermediateRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIIssuerSignIntermediateRequest) SetCommonName(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIIssuerSignIntermediateRequest) HasCommonName() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -116,27 +116,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIIssuerSignIntermediateRequest) GetCountry() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIIssuerSignIntermediateRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIIssuerSignIntermediateRequest) SetCountry(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIIssuerSignIntermediateRequest) HasCountry() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -145,27 +145,27 @@ HasCountry returns a boolean if a field has been set. ### GetCsr -`func (o *PKIIssuerSignIntermediateRequest) GetCsr() string` +`func (o *PkiIssuerSignIntermediateRequest) GetCsr() string` GetCsr returns the Csr field if non-nil, zero value otherwise. ### GetCsrOk -`func (o *PKIIssuerSignIntermediateRequest) GetCsrOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetCsrOk() (*string, bool)` GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCsr -`func (o *PKIIssuerSignIntermediateRequest) SetCsr(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetCsr(v string)` SetCsr sets Csr field to given value. ### HasCsr -`func (o *PKIIssuerSignIntermediateRequest) HasCsr() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasCsr() bool` HasCsr returns a boolean if a field has been set. @@ -174,27 +174,27 @@ HasCsr returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIIssuerSignIntermediateRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuerSignIntermediateRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIIssuerSignIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIIssuerSignIntermediateRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuerSignIntermediateRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIIssuerSignIntermediateRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -203,27 +203,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuerSignIntermediateRequest) GetFormat() string` +`func (o *PkiIssuerSignIntermediateRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuerSignIntermediateRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuerSignIntermediateRequest) SetFormat(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuerSignIntermediateRequest) HasFormat() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -232,27 +232,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIIssuerSignIntermediateRequest) GetIpSans() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIIssuerSignIntermediateRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIIssuerSignIntermediateRequest) SetIpSans(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIIssuerSignIntermediateRequest) HasIpSans() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -261,27 +261,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerName -`func (o *PKIIssuerSignIntermediateRequest) GetIssuerName() string` +`func (o *PkiIssuerSignIntermediateRequest) GetIssuerName() string` GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. ### GetIssuerNameOk -`func (o *PKIIssuerSignIntermediateRequest) GetIssuerNameOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetIssuerNameOk() (*string, bool)` GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerName -`func (o *PKIIssuerSignIntermediateRequest) SetIssuerName(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetIssuerName(v string)` SetIssuerName sets IssuerName field to given value. ### HasIssuerName -`func (o *PKIIssuerSignIntermediateRequest) HasIssuerName() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasIssuerName() bool` HasIssuerName returns a boolean if a field has been set. @@ -290,27 +290,27 @@ HasIssuerName returns a boolean if a field has been set. ### GetLocality -`func (o *PKIIssuerSignIntermediateRequest) GetLocality() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIIssuerSignIntermediateRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIIssuerSignIntermediateRequest) SetLocality(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIIssuerSignIntermediateRequest) HasLocality() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -319,27 +319,27 @@ HasLocality returns a boolean if a field has been set. ### GetMaxPathLength -`func (o *PKIIssuerSignIntermediateRequest) GetMaxPathLength() int32` +`func (o *PkiIssuerSignIntermediateRequest) GetMaxPathLength() int32` GetMaxPathLength returns the MaxPathLength field if non-nil, zero value otherwise. ### GetMaxPathLengthOk -`func (o *PKIIssuerSignIntermediateRequest) GetMaxPathLengthOk() (*int32, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetMaxPathLengthOk() (*int32, bool)` GetMaxPathLengthOk returns a tuple with the MaxPathLength field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxPathLength -`func (o *PKIIssuerSignIntermediateRequest) SetMaxPathLength(v int32)` +`func (o *PkiIssuerSignIntermediateRequest) SetMaxPathLength(v int32)` SetMaxPathLength sets MaxPathLength field to given value. ### HasMaxPathLength -`func (o *PKIIssuerSignIntermediateRequest) HasMaxPathLength() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasMaxPathLength() bool` HasMaxPathLength returns a boolean if a field has been set. @@ -348,27 +348,27 @@ HasMaxPathLength returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIIssuerSignIntermediateRequest) GetNotAfter() string` +`func (o *PkiIssuerSignIntermediateRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIIssuerSignIntermediateRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIIssuerSignIntermediateRequest) SetNotAfter(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIIssuerSignIntermediateRequest) HasNotAfter() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -377,27 +377,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIIssuerSignIntermediateRequest) GetNotBeforeDuration() int32` +`func (o *PkiIssuerSignIntermediateRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIIssuerSignIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIIssuerSignIntermediateRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiIssuerSignIntermediateRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIIssuerSignIntermediateRequest) HasNotBeforeDuration() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -406,27 +406,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIIssuerSignIntermediateRequest) GetOrganization() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIIssuerSignIntermediateRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIIssuerSignIntermediateRequest) SetOrganization(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIIssuerSignIntermediateRequest) HasOrganization() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -435,27 +435,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIIssuerSignIntermediateRequest) GetOtherSans() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIIssuerSignIntermediateRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIIssuerSignIntermediateRequest) SetOtherSans(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIIssuerSignIntermediateRequest) HasOtherSans() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -464,27 +464,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIIssuerSignIntermediateRequest) GetOu() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIIssuerSignIntermediateRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIIssuerSignIntermediateRequest) SetOu(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIIssuerSignIntermediateRequest) HasOu() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -493,27 +493,27 @@ HasOu returns a boolean if a field has been set. ### GetPermittedDnsDomains -`func (o *PKIIssuerSignIntermediateRequest) GetPermittedDnsDomains() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetPermittedDnsDomains() []string` GetPermittedDnsDomains returns the PermittedDnsDomains field if non-nil, zero value otherwise. ### GetPermittedDnsDomainsOk -`func (o *PKIIssuerSignIntermediateRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` GetPermittedDnsDomainsOk returns a tuple with the PermittedDnsDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPermittedDnsDomains -`func (o *PKIIssuerSignIntermediateRequest) SetPermittedDnsDomains(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetPermittedDnsDomains(v []string)` SetPermittedDnsDomains sets PermittedDnsDomains field to given value. ### HasPermittedDnsDomains -`func (o *PKIIssuerSignIntermediateRequest) HasPermittedDnsDomains() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasPermittedDnsDomains() bool` HasPermittedDnsDomains returns a boolean if a field has been set. @@ -522,27 +522,27 @@ HasPermittedDnsDomains returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIIssuerSignIntermediateRequest) GetPostalCode() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIIssuerSignIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIIssuerSignIntermediateRequest) SetPostalCode(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIIssuerSignIntermediateRequest) HasPostalCode() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -551,27 +551,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIIssuerSignIntermediateRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuerSignIntermediateRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIIssuerSignIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIIssuerSignIntermediateRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIIssuerSignIntermediateRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -580,27 +580,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIIssuerSignIntermediateRequest) GetProvince() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIIssuerSignIntermediateRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIIssuerSignIntermediateRequest) SetProvince(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIIssuerSignIntermediateRequest) HasProvince() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -609,27 +609,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIIssuerSignIntermediateRequest) GetSerialNumber() string` +`func (o *PkiIssuerSignIntermediateRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIIssuerSignIntermediateRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIIssuerSignIntermediateRequest) SetSerialNumber(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIIssuerSignIntermediateRequest) HasSerialNumber() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -638,27 +638,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIIssuerSignIntermediateRequest) GetSignatureBits() int32` +`func (o *PkiIssuerSignIntermediateRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIIssuerSignIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIIssuerSignIntermediateRequest) SetSignatureBits(v int32)` +`func (o *PkiIssuerSignIntermediateRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIIssuerSignIntermediateRequest) HasSignatureBits() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -667,27 +667,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetSkid -`func (o *PKIIssuerSignIntermediateRequest) GetSkid() string` +`func (o *PkiIssuerSignIntermediateRequest) GetSkid() string` GetSkid returns the Skid field if non-nil, zero value otherwise. ### GetSkidOk -`func (o *PKIIssuerSignIntermediateRequest) GetSkidOk() (*string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetSkidOk() (*string, bool)` GetSkidOk returns a tuple with the Skid field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSkid -`func (o *PKIIssuerSignIntermediateRequest) SetSkid(v string)` +`func (o *PkiIssuerSignIntermediateRequest) SetSkid(v string)` SetSkid sets Skid field to given value. ### HasSkid -`func (o *PKIIssuerSignIntermediateRequest) HasSkid() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasSkid() bool` HasSkid returns a boolean if a field has been set. @@ -696,27 +696,27 @@ HasSkid returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIIssuerSignIntermediateRequest) GetStreetAddress() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIIssuerSignIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIIssuerSignIntermediateRequest) SetStreetAddress(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIIssuerSignIntermediateRequest) HasStreetAddress() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -725,27 +725,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIIssuerSignIntermediateRequest) GetTtl() int32` +`func (o *PkiIssuerSignIntermediateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIIssuerSignIntermediateRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIIssuerSignIntermediateRequest) SetTtl(v int32)` +`func (o *PkiIssuerSignIntermediateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIIssuerSignIntermediateRequest) HasTtl() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -754,27 +754,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIIssuerSignIntermediateRequest) GetUriSans() []string` +`func (o *PkiIssuerSignIntermediateRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIIssuerSignIntermediateRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIIssuerSignIntermediateRequest) SetUriSans(v []string)` +`func (o *PkiIssuerSignIntermediateRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIIssuerSignIntermediateRequest) HasUriSans() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -783,27 +783,27 @@ HasUriSans returns a boolean if a field has been set. ### GetUseCsrValues -`func (o *PKIIssuerSignIntermediateRequest) GetUseCsrValues() bool` +`func (o *PkiIssuerSignIntermediateRequest) GetUseCsrValues() bool` GetUseCsrValues returns the UseCsrValues field if non-nil, zero value otherwise. ### GetUseCsrValuesOk -`func (o *PKIIssuerSignIntermediateRequest) GetUseCsrValuesOk() (*bool, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetUseCsrValuesOk() (*bool, bool)` GetUseCsrValuesOk returns a tuple with the UseCsrValues field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUseCsrValues -`func (o *PKIIssuerSignIntermediateRequest) SetUseCsrValues(v bool)` +`func (o *PkiIssuerSignIntermediateRequest) SetUseCsrValues(v bool)` SetUseCsrValues sets UseCsrValues field to given value. ### HasUseCsrValues -`func (o *PKIIssuerSignIntermediateRequest) HasUseCsrValues() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasUseCsrValues() bool` HasUseCsrValues returns a boolean if a field has been set. @@ -812,27 +812,27 @@ HasUseCsrValues returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIIssuerSignIntermediateRequest) GetUsePss() bool` +`func (o *PkiIssuerSignIntermediateRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIIssuerSignIntermediateRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiIssuerSignIntermediateRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIIssuerSignIntermediateRequest) SetUsePss(v bool)` +`func (o *PkiIssuerSignIntermediateRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIIssuerSignIntermediateRequest) HasUsePss() bool` +`func (o *PkiIssuerSignIntermediateRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. diff --git a/docs/PkiIssuerSignIntermediateResponse.md b/docs/PkiIssuerSignIntermediateResponse.md new file mode 100644 index 00000000..df08d4b1 --- /dev/null +++ b/docs/PkiIssuerSignIntermediateResponse.md @@ -0,0 +1,189 @@ +# PkiIssuerSignIntermediateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **int64** | Expiration Time | [optional] +**IssuingCa** | Pointer to **string** | Issuing CA | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiIssuerSignIntermediateResponse + +`func NewPkiIssuerSignIntermediateResponse() *PkiIssuerSignIntermediateResponse` + +NewPkiIssuerSignIntermediateResponse instantiates a new PkiIssuerSignIntermediateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerSignIntermediateResponseWithDefaults + +`func NewPkiIssuerSignIntermediateResponseWithDefaults() *PkiIssuerSignIntermediateResponse` + +NewPkiIssuerSignIntermediateResponseWithDefaults instantiates a new PkiIssuerSignIntermediateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiIssuerSignIntermediateResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiIssuerSignIntermediateResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiIssuerSignIntermediateResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiIssuerSignIntermediateResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiIssuerSignIntermediateResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuerSignIntermediateResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuerSignIntermediateResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuerSignIntermediateResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssuerSignIntermediateResponse) GetExpiration() int64` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssuerSignIntermediateResponse) GetExpirationOk() (*int64, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssuerSignIntermediateResponse) SetExpiration(v int64)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssuerSignIntermediateResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuerSignIntermediateResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuerSignIntermediateResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuerSignIntermediateResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuerSignIntermediateResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssuerSignIntermediateResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssuerSignIntermediateResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssuerSignIntermediateResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssuerSignIntermediateResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerSignRevocationListRequest.md b/docs/PkiIssuerSignRevocationListRequest.md index 50b62a87..41a4eeb1 100644 --- a/docs/PkiIssuerSignRevocationListRequest.md +++ b/docs/PkiIssuerSignRevocationListRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerSignRevocationListRequest +# PkiIssuerSignRevocationListRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIIssuerSignRevocationListRequest +### NewPkiIssuerSignRevocationListRequest -`func NewPKIIssuerSignRevocationListRequest() *PKIIssuerSignRevocationListRequest` +`func NewPkiIssuerSignRevocationListRequest() *PkiIssuerSignRevocationListRequest` -NewPKIIssuerSignRevocationListRequest instantiates a new PKIIssuerSignRevocationListRequest object +NewPkiIssuerSignRevocationListRequest instantiates a new PkiIssuerSignRevocationListRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerSignRevocationListRequestWithDefaults +### NewPkiIssuerSignRevocationListRequestWithDefaults -`func NewPKIIssuerSignRevocationListRequestWithDefaults() *PKIIssuerSignRevocationListRequest` +`func NewPkiIssuerSignRevocationListRequestWithDefaults() *PkiIssuerSignRevocationListRequest` -NewPKIIssuerSignRevocationListRequestWithDefaults instantiates a new PKIIssuerSignRevocationListRequest object +NewPkiIssuerSignRevocationListRequestWithDefaults instantiates a new PkiIssuerSignRevocationListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCrlNumber -`func (o *PKIIssuerSignRevocationListRequest) GetCrlNumber() int32` +`func (o *PkiIssuerSignRevocationListRequest) GetCrlNumber() int32` GetCrlNumber returns the CrlNumber field if non-nil, zero value otherwise. ### GetCrlNumberOk -`func (o *PKIIssuerSignRevocationListRequest) GetCrlNumberOk() (*int32, bool)` +`func (o *PkiIssuerSignRevocationListRequest) GetCrlNumberOk() (*int32, bool)` GetCrlNumberOk returns a tuple with the CrlNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCrlNumber -`func (o *PKIIssuerSignRevocationListRequest) SetCrlNumber(v int32)` +`func (o *PkiIssuerSignRevocationListRequest) SetCrlNumber(v int32)` SetCrlNumber sets CrlNumber field to given value. ### HasCrlNumber -`func (o *PKIIssuerSignRevocationListRequest) HasCrlNumber() bool` +`func (o *PkiIssuerSignRevocationListRequest) HasCrlNumber() bool` HasCrlNumber returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasCrlNumber returns a boolean if a field has been set. ### GetDeltaCrlBaseNumber -`func (o *PKIIssuerSignRevocationListRequest) GetDeltaCrlBaseNumber() int32` +`func (o *PkiIssuerSignRevocationListRequest) GetDeltaCrlBaseNumber() int32` GetDeltaCrlBaseNumber returns the DeltaCrlBaseNumber field if non-nil, zero value otherwise. ### GetDeltaCrlBaseNumberOk -`func (o *PKIIssuerSignRevocationListRequest) GetDeltaCrlBaseNumberOk() (*int32, bool)` +`func (o *PkiIssuerSignRevocationListRequest) GetDeltaCrlBaseNumberOk() (*int32, bool)` GetDeltaCrlBaseNumberOk returns a tuple with the DeltaCrlBaseNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDeltaCrlBaseNumber -`func (o *PKIIssuerSignRevocationListRequest) SetDeltaCrlBaseNumber(v int32)` +`func (o *PkiIssuerSignRevocationListRequest) SetDeltaCrlBaseNumber(v int32)` SetDeltaCrlBaseNumber sets DeltaCrlBaseNumber field to given value. ### HasDeltaCrlBaseNumber -`func (o *PKIIssuerSignRevocationListRequest) HasDeltaCrlBaseNumber() bool` +`func (o *PkiIssuerSignRevocationListRequest) HasDeltaCrlBaseNumber() bool` HasDeltaCrlBaseNumber returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasDeltaCrlBaseNumber returns a boolean if a field has been set. ### GetExtensions -`func (o *PKIIssuerSignRevocationListRequest) GetExtensions() []map[string]interface{}` +`func (o *PkiIssuerSignRevocationListRequest) GetExtensions() []map[string]interface{}` GetExtensions returns the Extensions field if non-nil, zero value otherwise. ### GetExtensionsOk -`func (o *PKIIssuerSignRevocationListRequest) GetExtensionsOk() (*[]map[string]interface{}, bool)` +`func (o *PkiIssuerSignRevocationListRequest) GetExtensionsOk() (*[]map[string]interface{}, bool)` GetExtensionsOk returns a tuple with the Extensions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtensions -`func (o *PKIIssuerSignRevocationListRequest) SetExtensions(v []map[string]interface{})` +`func (o *PkiIssuerSignRevocationListRequest) SetExtensions(v []map[string]interface{})` SetExtensions sets Extensions field to given value. ### HasExtensions -`func (o *PKIIssuerSignRevocationListRequest) HasExtensions() bool` +`func (o *PkiIssuerSignRevocationListRequest) HasExtensions() bool` HasExtensions returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasExtensions returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuerSignRevocationListRequest) GetFormat() string` +`func (o *PkiIssuerSignRevocationListRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuerSignRevocationListRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuerSignRevocationListRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuerSignRevocationListRequest) SetFormat(v string)` +`func (o *PkiIssuerSignRevocationListRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuerSignRevocationListRequest) HasFormat() bool` +`func (o *PkiIssuerSignRevocationListRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasFormat returns a boolean if a field has been set. ### GetNextUpdate -`func (o *PKIIssuerSignRevocationListRequest) GetNextUpdate() string` +`func (o *PkiIssuerSignRevocationListRequest) GetNextUpdate() string` GetNextUpdate returns the NextUpdate field if non-nil, zero value otherwise. ### GetNextUpdateOk -`func (o *PKIIssuerSignRevocationListRequest) GetNextUpdateOk() (*string, bool)` +`func (o *PkiIssuerSignRevocationListRequest) GetNextUpdateOk() (*string, bool)` GetNextUpdateOk returns a tuple with the NextUpdate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNextUpdate -`func (o *PKIIssuerSignRevocationListRequest) SetNextUpdate(v string)` +`func (o *PkiIssuerSignRevocationListRequest) SetNextUpdate(v string)` SetNextUpdate sets NextUpdate field to given value. ### HasNextUpdate -`func (o *PKIIssuerSignRevocationListRequest) HasNextUpdate() bool` +`func (o *PkiIssuerSignRevocationListRequest) HasNextUpdate() bool` HasNextUpdate returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasNextUpdate returns a boolean if a field has been set. ### GetRevokedCerts -`func (o *PKIIssuerSignRevocationListRequest) GetRevokedCerts() []map[string]interface{}` +`func (o *PkiIssuerSignRevocationListRequest) GetRevokedCerts() []map[string]interface{}` GetRevokedCerts returns the RevokedCerts field if non-nil, zero value otherwise. ### GetRevokedCertsOk -`func (o *PKIIssuerSignRevocationListRequest) GetRevokedCertsOk() (*[]map[string]interface{}, bool)` +`func (o *PkiIssuerSignRevocationListRequest) GetRevokedCertsOk() (*[]map[string]interface{}, bool)` GetRevokedCertsOk returns a tuple with the RevokedCerts field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRevokedCerts -`func (o *PKIIssuerSignRevocationListRequest) SetRevokedCerts(v []map[string]interface{})` +`func (o *PkiIssuerSignRevocationListRequest) SetRevokedCerts(v []map[string]interface{})` SetRevokedCerts sets RevokedCerts field to given value. ### HasRevokedCerts -`func (o *PKIIssuerSignRevocationListRequest) HasRevokedCerts() bool` +`func (o *PkiIssuerSignRevocationListRequest) HasRevokedCerts() bool` HasRevokedCerts returns a boolean if a field has been set. diff --git a/docs/PkiIssuerSignRevocationListResponse.md b/docs/PkiIssuerSignRevocationListResponse.md new file mode 100644 index 00000000..bc87ebcd --- /dev/null +++ b/docs/PkiIssuerSignRevocationListResponse.md @@ -0,0 +1,69 @@ +# PkiIssuerSignRevocationListResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Crl** | Pointer to **string** | CRL | [optional] + + + +## Methods + + +### NewPkiIssuerSignRevocationListResponse + +`func NewPkiIssuerSignRevocationListResponse() *PkiIssuerSignRevocationListResponse` + +NewPkiIssuerSignRevocationListResponse instantiates a new PkiIssuerSignRevocationListResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerSignRevocationListResponseWithDefaults + +`func NewPkiIssuerSignRevocationListResponseWithDefaults() *PkiIssuerSignRevocationListResponse` + +NewPkiIssuerSignRevocationListResponseWithDefaults instantiates a new PkiIssuerSignRevocationListResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrl + +`func (o *PkiIssuerSignRevocationListResponse) GetCrl() string` + +GetCrl returns the Crl field if non-nil, zero value otherwise. + +### GetCrlOk + +`func (o *PkiIssuerSignRevocationListResponse) GetCrlOk() (*string, bool)` + +GetCrlOk returns a tuple with the Crl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrl + +`func (o *PkiIssuerSignRevocationListResponse) SetCrl(v string)` + +SetCrl sets Crl field to given value. + + +### HasCrl + +`func (o *PkiIssuerSignRevocationListResponse) HasCrl() bool` + +HasCrl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerSignSelfIssuedRequest.md b/docs/PkiIssuerSignSelfIssuedRequest.md index 5c699550..0409d774 100644 --- a/docs/PkiIssuerSignSelfIssuedRequest.md +++ b/docs/PkiIssuerSignSelfIssuedRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerSignSelfIssuedRequest +# PkiIssuerSignSelfIssuedRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIIssuerSignSelfIssuedRequest +### NewPkiIssuerSignSelfIssuedRequest -`func NewPKIIssuerSignSelfIssuedRequest() *PKIIssuerSignSelfIssuedRequest` +`func NewPkiIssuerSignSelfIssuedRequest() *PkiIssuerSignSelfIssuedRequest` -NewPKIIssuerSignSelfIssuedRequest instantiates a new PKIIssuerSignSelfIssuedRequest object +NewPkiIssuerSignSelfIssuedRequest instantiates a new PkiIssuerSignSelfIssuedRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerSignSelfIssuedRequestWithDefaults +### NewPkiIssuerSignSelfIssuedRequestWithDefaults -`func NewPKIIssuerSignSelfIssuedRequestWithDefaults() *PKIIssuerSignSelfIssuedRequest` +`func NewPkiIssuerSignSelfIssuedRequestWithDefaults() *PkiIssuerSignSelfIssuedRequest` -NewPKIIssuerSignSelfIssuedRequestWithDefaults instantiates a new PKIIssuerSignSelfIssuedRequest object +NewPkiIssuerSignSelfIssuedRequestWithDefaults instantiates a new PkiIssuerSignSelfIssuedRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCertificate -`func (o *PKIIssuerSignSelfIssuedRequest) GetCertificate() string` +`func (o *PkiIssuerSignSelfIssuedRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *PKIIssuerSignSelfIssuedRequest) GetCertificateOk() (*string, bool)` +`func (o *PkiIssuerSignSelfIssuedRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *PKIIssuerSignSelfIssuedRequest) SetCertificate(v string)` +`func (o *PkiIssuerSignSelfIssuedRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *PKIIssuerSignSelfIssuedRequest) HasCertificate() bool` +`func (o *PkiIssuerSignSelfIssuedRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasCertificate returns a boolean if a field has been set. ### GetRequireMatchingCertificateAlgorithms -`func (o *PKIIssuerSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithms() bool` +`func (o *PkiIssuerSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithms() bool` GetRequireMatchingCertificateAlgorithms returns the RequireMatchingCertificateAlgorithms field if non-nil, zero value otherwise. ### GetRequireMatchingCertificateAlgorithmsOk -`func (o *PKIIssuerSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithmsOk() (*bool, bool)` +`func (o *PkiIssuerSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithmsOk() (*bool, bool)` GetRequireMatchingCertificateAlgorithmsOk returns a tuple with the RequireMatchingCertificateAlgorithms field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequireMatchingCertificateAlgorithms -`func (o *PKIIssuerSignSelfIssuedRequest) SetRequireMatchingCertificateAlgorithms(v bool)` +`func (o *PkiIssuerSignSelfIssuedRequest) SetRequireMatchingCertificateAlgorithms(v bool)` SetRequireMatchingCertificateAlgorithms sets RequireMatchingCertificateAlgorithms field to given value. ### HasRequireMatchingCertificateAlgorithms -`func (o *PKIIssuerSignSelfIssuedRequest) HasRequireMatchingCertificateAlgorithms() bool` +`func (o *PkiIssuerSignSelfIssuedRequest) HasRequireMatchingCertificateAlgorithms() bool` HasRequireMatchingCertificateAlgorithms returns a boolean if a field has been set. diff --git a/docs/PkiIssuerSignSelfIssuedResponse.md b/docs/PkiIssuerSignSelfIssuedResponse.md new file mode 100644 index 00000000..458b15e1 --- /dev/null +++ b/docs/PkiIssuerSignSelfIssuedResponse.md @@ -0,0 +1,99 @@ +# PkiIssuerSignSelfIssuedResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuingCa** | Pointer to **string** | Issuing CA | [optional] + + + +## Methods + + +### NewPkiIssuerSignSelfIssuedResponse + +`func NewPkiIssuerSignSelfIssuedResponse() *PkiIssuerSignSelfIssuedResponse` + +NewPkiIssuerSignSelfIssuedResponse instantiates a new PkiIssuerSignSelfIssuedResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerSignSelfIssuedResponseWithDefaults + +`func NewPkiIssuerSignSelfIssuedResponseWithDefaults() *PkiIssuerSignSelfIssuedResponse` + +NewPkiIssuerSignSelfIssuedResponseWithDefaults instantiates a new PkiIssuerSignSelfIssuedResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCertificate + +`func (o *PkiIssuerSignSelfIssuedResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuerSignSelfIssuedResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuerSignSelfIssuedResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuerSignSelfIssuedResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuerSignSelfIssuedResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuerSignSelfIssuedResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuerSignSelfIssuedResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuerSignSelfIssuedResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuerSignVerbatimRequest.md b/docs/PkiIssuerSignVerbatimRequest.md index 364d4a6b..16d63c8e 100644 --- a/docs/PkiIssuerSignVerbatimRequest.md +++ b/docs/PkiIssuerSignVerbatimRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerSignVerbatimRequest +# PkiIssuerSignVerbatimRequest ## Properties @@ -24,53 +24,54 @@ Name | Type | Description | Notes **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] **UsePss** | Pointer to **bool** | Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. | [optional] [default to false] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKIIssuerSignVerbatimRequest +### NewPkiIssuerSignVerbatimRequest -`func NewPKIIssuerSignVerbatimRequest() *PKIIssuerSignVerbatimRequest` +`func NewPkiIssuerSignVerbatimRequest() *PkiIssuerSignVerbatimRequest` -NewPKIIssuerSignVerbatimRequest instantiates a new PKIIssuerSignVerbatimRequest object +NewPkiIssuerSignVerbatimRequest instantiates a new PkiIssuerSignVerbatimRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerSignVerbatimRequestWithDefaults +### NewPkiIssuerSignVerbatimRequestWithDefaults -`func NewPKIIssuerSignVerbatimRequestWithDefaults() *PKIIssuerSignVerbatimRequest` +`func NewPkiIssuerSignVerbatimRequestWithDefaults() *PkiIssuerSignVerbatimRequest` -NewPKIIssuerSignVerbatimRequestWithDefaults instantiates a new PKIIssuerSignVerbatimRequest object +NewPkiIssuerSignVerbatimRequestWithDefaults instantiates a new PkiIssuerSignVerbatimRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIIssuerSignVerbatimRequest) GetAltNames() string` +`func (o *PkiIssuerSignVerbatimRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIIssuerSignVerbatimRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIIssuerSignVerbatimRequest) SetAltNames(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIIssuerSignVerbatimRequest) HasAltNames() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -79,27 +80,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIIssuerSignVerbatimRequest) GetCommonName() string` +`func (o *PkiIssuerSignVerbatimRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIIssuerSignVerbatimRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIIssuerSignVerbatimRequest) SetCommonName(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIIssuerSignVerbatimRequest) HasCommonName() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -108,27 +109,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCsr -`func (o *PKIIssuerSignVerbatimRequest) GetCsr() string` +`func (o *PkiIssuerSignVerbatimRequest) GetCsr() string` GetCsr returns the Csr field if non-nil, zero value otherwise. ### GetCsrOk -`func (o *PKIIssuerSignVerbatimRequest) GetCsrOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetCsrOk() (*string, bool)` GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCsr -`func (o *PKIIssuerSignVerbatimRequest) SetCsr(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetCsr(v string)` SetCsr sets Csr field to given value. ### HasCsr -`func (o *PKIIssuerSignVerbatimRequest) HasCsr() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasCsr() bool` HasCsr returns a boolean if a field has been set. @@ -137,27 +138,27 @@ HasCsr returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIIssuerSignVerbatimRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuerSignVerbatimRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIIssuerSignVerbatimRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIIssuerSignVerbatimRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuerSignVerbatimRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIIssuerSignVerbatimRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -166,27 +167,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetExtKeyUsage -`func (o *PKIIssuerSignVerbatimRequest) GetExtKeyUsage() []string` +`func (o *PkiIssuerSignVerbatimRequest) GetExtKeyUsage() []string` GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. ### GetExtKeyUsageOk -`func (o *PKIIssuerSignVerbatimRequest) GetExtKeyUsageOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetExtKeyUsageOk() (*[]string, bool)` GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsage -`func (o *PKIIssuerSignVerbatimRequest) SetExtKeyUsage(v []string)` +`func (o *PkiIssuerSignVerbatimRequest) SetExtKeyUsage(v []string)` SetExtKeyUsage sets ExtKeyUsage field to given value. ### HasExtKeyUsage -`func (o *PKIIssuerSignVerbatimRequest) HasExtKeyUsage() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasExtKeyUsage() bool` HasExtKeyUsage returns a boolean if a field has been set. @@ -195,27 +196,27 @@ HasExtKeyUsage returns a boolean if a field has been set. ### GetExtKeyUsageOids -`func (o *PKIIssuerSignVerbatimRequest) GetExtKeyUsageOids() []string` +`func (o *PkiIssuerSignVerbatimRequest) GetExtKeyUsageOids() []string` GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. ### GetExtKeyUsageOidsOk -`func (o *PKIIssuerSignVerbatimRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsageOids -`func (o *PKIIssuerSignVerbatimRequest) SetExtKeyUsageOids(v []string)` +`func (o *PkiIssuerSignVerbatimRequest) SetExtKeyUsageOids(v []string)` SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. ### HasExtKeyUsageOids -`func (o *PKIIssuerSignVerbatimRequest) HasExtKeyUsageOids() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasExtKeyUsageOids() bool` HasExtKeyUsageOids returns a boolean if a field has been set. @@ -224,27 +225,27 @@ HasExtKeyUsageOids returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuerSignVerbatimRequest) GetFormat() string` +`func (o *PkiIssuerSignVerbatimRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuerSignVerbatimRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuerSignVerbatimRequest) SetFormat(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuerSignVerbatimRequest) HasFormat() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -253,27 +254,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIIssuerSignVerbatimRequest) GetIpSans() []string` +`func (o *PkiIssuerSignVerbatimRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIIssuerSignVerbatimRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIIssuerSignVerbatimRequest) SetIpSans(v []string)` +`func (o *PkiIssuerSignVerbatimRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIIssuerSignVerbatimRequest) HasIpSans() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -282,27 +283,27 @@ HasIpSans returns a boolean if a field has been set. ### GetKeyUsage -`func (o *PKIIssuerSignVerbatimRequest) GetKeyUsage() []string` +`func (o *PkiIssuerSignVerbatimRequest) GetKeyUsage() []string` GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. ### GetKeyUsageOk -`func (o *PKIIssuerSignVerbatimRequest) GetKeyUsageOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetKeyUsageOk() (*[]string, bool)` GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyUsage -`func (o *PKIIssuerSignVerbatimRequest) SetKeyUsage(v []string)` +`func (o *PkiIssuerSignVerbatimRequest) SetKeyUsage(v []string)` SetKeyUsage sets KeyUsage field to given value. ### HasKeyUsage -`func (o *PKIIssuerSignVerbatimRequest) HasKeyUsage() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasKeyUsage() bool` HasKeyUsage returns a boolean if a field has been set. @@ -311,27 +312,27 @@ HasKeyUsage returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIIssuerSignVerbatimRequest) GetNotAfter() string` +`func (o *PkiIssuerSignVerbatimRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIIssuerSignVerbatimRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIIssuerSignVerbatimRequest) SetNotAfter(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIIssuerSignVerbatimRequest) HasNotAfter() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -340,27 +341,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIIssuerSignVerbatimRequest) GetOtherSans() []string` +`func (o *PkiIssuerSignVerbatimRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIIssuerSignVerbatimRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIIssuerSignVerbatimRequest) SetOtherSans(v []string)` +`func (o *PkiIssuerSignVerbatimRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIIssuerSignVerbatimRequest) HasOtherSans() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -369,27 +370,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIIssuerSignVerbatimRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuerSignVerbatimRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIIssuerSignVerbatimRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIIssuerSignVerbatimRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIIssuerSignVerbatimRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -398,27 +399,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKIIssuerSignVerbatimRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiIssuerSignVerbatimRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKIIssuerSignVerbatimRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKIIssuerSignVerbatimRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiIssuerSignVerbatimRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKIIssuerSignVerbatimRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -427,27 +428,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetRole -`func (o *PKIIssuerSignVerbatimRequest) GetRole() string` +`func (o *PkiIssuerSignVerbatimRequest) GetRole() string` GetRole returns the Role field if non-nil, zero value otherwise. ### GetRoleOk -`func (o *PKIIssuerSignVerbatimRequest) GetRoleOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetRoleOk() (*string, bool)` GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRole -`func (o *PKIIssuerSignVerbatimRequest) SetRole(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetRole(v string)` SetRole sets Role field to given value. ### HasRole -`func (o *PKIIssuerSignVerbatimRequest) HasRole() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasRole() bool` HasRole returns a boolean if a field has been set. @@ -456,27 +457,27 @@ HasRole returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIIssuerSignVerbatimRequest) GetSerialNumber() string` +`func (o *PkiIssuerSignVerbatimRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIIssuerSignVerbatimRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIIssuerSignVerbatimRequest) SetSerialNumber(v string)` +`func (o *PkiIssuerSignVerbatimRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIIssuerSignVerbatimRequest) HasSerialNumber() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -485,27 +486,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIIssuerSignVerbatimRequest) GetSignatureBits() int32` +`func (o *PkiIssuerSignVerbatimRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIIssuerSignVerbatimRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIIssuerSignVerbatimRequest) SetSignatureBits(v int32)` +`func (o *PkiIssuerSignVerbatimRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIIssuerSignVerbatimRequest) HasSignatureBits() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -514,27 +515,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetTtl -`func (o *PKIIssuerSignVerbatimRequest) GetTtl() int32` +`func (o *PkiIssuerSignVerbatimRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIIssuerSignVerbatimRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIIssuerSignVerbatimRequest) SetTtl(v int32)` +`func (o *PkiIssuerSignVerbatimRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIIssuerSignVerbatimRequest) HasTtl() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -543,27 +544,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIIssuerSignVerbatimRequest) GetUriSans() []string` +`func (o *PkiIssuerSignVerbatimRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIIssuerSignVerbatimRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIIssuerSignVerbatimRequest) SetUriSans(v []string)` +`func (o *PkiIssuerSignVerbatimRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIIssuerSignVerbatimRequest) HasUriSans() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -572,33 +573,62 @@ HasUriSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIIssuerSignVerbatimRequest) GetUsePss() bool` +`func (o *PkiIssuerSignVerbatimRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIIssuerSignVerbatimRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiIssuerSignVerbatimRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIIssuerSignVerbatimRequest) SetUsePss(v bool)` +`func (o *PkiIssuerSignVerbatimRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIIssuerSignVerbatimRequest) HasUsePss() bool` +`func (o *PkiIssuerSignVerbatimRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiIssuerSignVerbatimRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiIssuerSignVerbatimRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiIssuerSignVerbatimRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiIssuerSignVerbatimRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiIssuerSignVerbatimResponse.md b/docs/PkiIssuerSignVerbatimResponse.md new file mode 100644 index 00000000..49eea49b --- /dev/null +++ b/docs/PkiIssuerSignVerbatimResponse.md @@ -0,0 +1,249 @@ +# PkiIssuerSignVerbatimResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiIssuerSignVerbatimResponse + +`func NewPkiIssuerSignVerbatimResponse() *PkiIssuerSignVerbatimResponse` + +NewPkiIssuerSignVerbatimResponse instantiates a new PkiIssuerSignVerbatimResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerSignVerbatimResponseWithDefaults + +`func NewPkiIssuerSignVerbatimResponseWithDefaults() *PkiIssuerSignVerbatimResponse` + +NewPkiIssuerSignVerbatimResponseWithDefaults instantiates a new PkiIssuerSignVerbatimResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiIssuerSignVerbatimResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiIssuerSignVerbatimResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiIssuerSignVerbatimResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiIssuerSignVerbatimResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiIssuerSignVerbatimResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuerSignVerbatimResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuerSignVerbatimResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuerSignVerbatimResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssuerSignVerbatimResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssuerSignVerbatimResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssuerSignVerbatimResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssuerSignVerbatimResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuerSignVerbatimResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuerSignVerbatimResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuerSignVerbatimResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuerSignVerbatimResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssuerSignVerbatimResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssuerSignVerbatimResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssuerSignVerbatimResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssuerSignVerbatimResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiIssuerSignVerbatimResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiIssuerSignVerbatimResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiIssuerSignVerbatimResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiIssuerSignVerbatimResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssuerSignVerbatimResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssuerSignVerbatimResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssuerSignVerbatimResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssuerSignVerbatimResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIIssuerSignVerbatimRoleRequest.md b/docs/PkiIssuerSignVerbatimWithRoleRequest.md similarity index 65% rename from docs/PKIIssuerSignVerbatimRoleRequest.md rename to docs/PkiIssuerSignVerbatimWithRoleRequest.md index f6a57512..9d4fff23 100644 --- a/docs/PKIIssuerSignVerbatimRoleRequest.md +++ b/docs/PkiIssuerSignVerbatimWithRoleRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerSignVerbatimRoleRequest +# PkiIssuerSignVerbatimWithRoleRequest ## Properties @@ -23,53 +23,54 @@ Name | Type | Description | Notes **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] **UsePss** | Pointer to **bool** | Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. | [optional] [default to false] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKIIssuerSignVerbatimRoleRequest +### NewPkiIssuerSignVerbatimWithRoleRequest -`func NewPKIIssuerSignVerbatimRoleRequest() *PKIIssuerSignVerbatimRoleRequest` +`func NewPkiIssuerSignVerbatimWithRoleRequest() *PkiIssuerSignVerbatimWithRoleRequest` -NewPKIIssuerSignVerbatimRoleRequest instantiates a new PKIIssuerSignVerbatimRoleRequest object +NewPkiIssuerSignVerbatimWithRoleRequest instantiates a new PkiIssuerSignVerbatimWithRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerSignVerbatimRoleRequestWithDefaults +### NewPkiIssuerSignVerbatimWithRoleRequestWithDefaults -`func NewPKIIssuerSignVerbatimRoleRequestWithDefaults() *PKIIssuerSignVerbatimRoleRequest` +`func NewPkiIssuerSignVerbatimWithRoleRequestWithDefaults() *PkiIssuerSignVerbatimWithRoleRequest` -NewPKIIssuerSignVerbatimRoleRequestWithDefaults instantiates a new PKIIssuerSignVerbatimRoleRequest object +NewPkiIssuerSignVerbatimWithRoleRequestWithDefaults instantiates a new PkiIssuerSignVerbatimWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIIssuerSignVerbatimRoleRequest) GetAltNames() string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIIssuerSignVerbatimRoleRequest) SetAltNames(v string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIIssuerSignVerbatimRoleRequest) HasAltNames() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -78,27 +79,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIIssuerSignVerbatimRoleRequest) GetCommonName() string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIIssuerSignVerbatimRoleRequest) SetCommonName(v string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIIssuerSignVerbatimRoleRequest) HasCommonName() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -107,27 +108,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCsr -`func (o *PKIIssuerSignVerbatimRoleRequest) GetCsr() string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetCsr() string` GetCsr returns the Csr field if non-nil, zero value otherwise. ### GetCsrOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetCsrOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetCsrOk() (*string, bool)` GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCsr -`func (o *PKIIssuerSignVerbatimRoleRequest) SetCsr(v string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetCsr(v string)` SetCsr sets Csr field to given value. ### HasCsr -`func (o *PKIIssuerSignVerbatimRoleRequest) HasCsr() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasCsr() bool` HasCsr returns a boolean if a field has been set. @@ -136,27 +137,27 @@ HasCsr returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIIssuerSignVerbatimRoleRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIIssuerSignVerbatimRoleRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIIssuerSignVerbatimRoleRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -165,27 +166,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetExtKeyUsage -`func (o *PKIIssuerSignVerbatimRoleRequest) GetExtKeyUsage() []string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetExtKeyUsage() []string` GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. ### GetExtKeyUsageOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetExtKeyUsageOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetExtKeyUsageOk() (*[]string, bool)` GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsage -`func (o *PKIIssuerSignVerbatimRoleRequest) SetExtKeyUsage(v []string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetExtKeyUsage(v []string)` SetExtKeyUsage sets ExtKeyUsage field to given value. ### HasExtKeyUsage -`func (o *PKIIssuerSignVerbatimRoleRequest) HasExtKeyUsage() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasExtKeyUsage() bool` HasExtKeyUsage returns a boolean if a field has been set. @@ -194,27 +195,27 @@ HasExtKeyUsage returns a boolean if a field has been set. ### GetExtKeyUsageOids -`func (o *PKIIssuerSignVerbatimRoleRequest) GetExtKeyUsageOids() []string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetExtKeyUsageOids() []string` GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. ### GetExtKeyUsageOidsOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsageOids -`func (o *PKIIssuerSignVerbatimRoleRequest) SetExtKeyUsageOids(v []string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetExtKeyUsageOids(v []string)` SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. ### HasExtKeyUsageOids -`func (o *PKIIssuerSignVerbatimRoleRequest) HasExtKeyUsageOids() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasExtKeyUsageOids() bool` HasExtKeyUsageOids returns a boolean if a field has been set. @@ -223,27 +224,27 @@ HasExtKeyUsageOids returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuerSignVerbatimRoleRequest) GetFormat() string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuerSignVerbatimRoleRequest) SetFormat(v string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuerSignVerbatimRoleRequest) HasFormat() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -252,27 +253,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIIssuerSignVerbatimRoleRequest) GetIpSans() []string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIIssuerSignVerbatimRoleRequest) SetIpSans(v []string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIIssuerSignVerbatimRoleRequest) HasIpSans() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -281,27 +282,27 @@ HasIpSans returns a boolean if a field has been set. ### GetKeyUsage -`func (o *PKIIssuerSignVerbatimRoleRequest) GetKeyUsage() []string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetKeyUsage() []string` GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. ### GetKeyUsageOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetKeyUsageOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetKeyUsageOk() (*[]string, bool)` GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyUsage -`func (o *PKIIssuerSignVerbatimRoleRequest) SetKeyUsage(v []string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetKeyUsage(v []string)` SetKeyUsage sets KeyUsage field to given value. ### HasKeyUsage -`func (o *PKIIssuerSignVerbatimRoleRequest) HasKeyUsage() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasKeyUsage() bool` HasKeyUsage returns a boolean if a field has been set. @@ -310,27 +311,27 @@ HasKeyUsage returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIIssuerSignVerbatimRoleRequest) GetNotAfter() string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIIssuerSignVerbatimRoleRequest) SetNotAfter(v string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIIssuerSignVerbatimRoleRequest) HasNotAfter() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -339,27 +340,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIIssuerSignVerbatimRoleRequest) GetOtherSans() []string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIIssuerSignVerbatimRoleRequest) SetOtherSans(v []string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIIssuerSignVerbatimRoleRequest) HasOtherSans() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -368,27 +369,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIIssuerSignVerbatimRoleRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIIssuerSignVerbatimRoleRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIIssuerSignVerbatimRoleRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -397,27 +398,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKIIssuerSignVerbatimRoleRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKIIssuerSignVerbatimRoleRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKIIssuerSignVerbatimRoleRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -426,27 +427,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIIssuerSignVerbatimRoleRequest) GetSerialNumber() string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIIssuerSignVerbatimRoleRequest) SetSerialNumber(v string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIIssuerSignVerbatimRoleRequest) HasSerialNumber() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -455,27 +456,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIIssuerSignVerbatimRoleRequest) GetSignatureBits() int32` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIIssuerSignVerbatimRoleRequest) SetSignatureBits(v int32)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIIssuerSignVerbatimRoleRequest) HasSignatureBits() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -484,27 +485,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetTtl -`func (o *PKIIssuerSignVerbatimRoleRequest) GetTtl() int32` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIIssuerSignVerbatimRoleRequest) SetTtl(v int32)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIIssuerSignVerbatimRoleRequest) HasTtl() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -513,27 +514,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIIssuerSignVerbatimRoleRequest) GetUriSans() []string` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIIssuerSignVerbatimRoleRequest) SetUriSans(v []string)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIIssuerSignVerbatimRoleRequest) HasUriSans() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -542,33 +543,62 @@ HasUriSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIIssuerSignVerbatimRoleRequest) GetUsePss() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIIssuerSignVerbatimRoleRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIIssuerSignVerbatimRoleRequest) SetUsePss(v bool)` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIIssuerSignVerbatimRoleRequest) HasUsePss() bool` +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiIssuerSignVerbatimWithRoleRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiIssuerSignVerbatimWithRoleRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiIssuerSignVerbatimWithRoleRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiIssuerSignVerbatimWithRoleResponse.md b/docs/PkiIssuerSignVerbatimWithRoleResponse.md new file mode 100644 index 00000000..c51a6017 --- /dev/null +++ b/docs/PkiIssuerSignVerbatimWithRoleResponse.md @@ -0,0 +1,249 @@ +# PkiIssuerSignVerbatimWithRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiIssuerSignVerbatimWithRoleResponse + +`func NewPkiIssuerSignVerbatimWithRoleResponse() *PkiIssuerSignVerbatimWithRoleResponse` + +NewPkiIssuerSignVerbatimWithRoleResponse instantiates a new PkiIssuerSignVerbatimWithRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerSignVerbatimWithRoleResponseWithDefaults + +`func NewPkiIssuerSignVerbatimWithRoleResponseWithDefaults() *PkiIssuerSignVerbatimWithRoleResponse` + +NewPkiIssuerSignVerbatimWithRoleResponseWithDefaults instantiates a new PkiIssuerSignVerbatimWithRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssuerSignVerbatimWithRoleResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIIssuerSignRoleRequest.md b/docs/PkiIssuerSignWithRoleRequest.md similarity index 65% rename from docs/PKIIssuerSignRoleRequest.md rename to docs/PkiIssuerSignWithRoleRequest.md index 19fe56fd..399299b9 100644 --- a/docs/PKIIssuerSignRoleRequest.md +++ b/docs/PkiIssuerSignWithRoleRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerSignRoleRequest +# PkiIssuerSignWithRoleRequest ## Properties @@ -18,53 +18,54 @@ Name | Type | Description | Notes **SerialNumber** | Pointer to **string** | The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. | [optional] **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKIIssuerSignRoleRequest +### NewPkiIssuerSignWithRoleRequest -`func NewPKIIssuerSignRoleRequest() *PKIIssuerSignRoleRequest` +`func NewPkiIssuerSignWithRoleRequest() *PkiIssuerSignWithRoleRequest` -NewPKIIssuerSignRoleRequest instantiates a new PKIIssuerSignRoleRequest object +NewPkiIssuerSignWithRoleRequest instantiates a new PkiIssuerSignWithRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerSignRoleRequestWithDefaults +### NewPkiIssuerSignWithRoleRequestWithDefaults -`func NewPKIIssuerSignRoleRequestWithDefaults() *PKIIssuerSignRoleRequest` +`func NewPkiIssuerSignWithRoleRequestWithDefaults() *PkiIssuerSignWithRoleRequest` -NewPKIIssuerSignRoleRequestWithDefaults instantiates a new PKIIssuerSignRoleRequest object +NewPkiIssuerSignWithRoleRequestWithDefaults instantiates a new PkiIssuerSignWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIIssuerSignRoleRequest) GetAltNames() string` +`func (o *PkiIssuerSignWithRoleRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIIssuerSignRoleRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIIssuerSignRoleRequest) SetAltNames(v string)` +`func (o *PkiIssuerSignWithRoleRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIIssuerSignRoleRequest) HasAltNames() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -73,27 +74,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIIssuerSignRoleRequest) GetCommonName() string` +`func (o *PkiIssuerSignWithRoleRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIIssuerSignRoleRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIIssuerSignRoleRequest) SetCommonName(v string)` +`func (o *PkiIssuerSignWithRoleRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIIssuerSignRoleRequest) HasCommonName() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -102,27 +103,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCsr -`func (o *PKIIssuerSignRoleRequest) GetCsr() string` +`func (o *PkiIssuerSignWithRoleRequest) GetCsr() string` GetCsr returns the Csr field if non-nil, zero value otherwise. ### GetCsrOk -`func (o *PKIIssuerSignRoleRequest) GetCsrOk() (*string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetCsrOk() (*string, bool)` GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCsr -`func (o *PKIIssuerSignRoleRequest) SetCsr(v string)` +`func (o *PkiIssuerSignWithRoleRequest) SetCsr(v string)` SetCsr sets Csr field to given value. ### HasCsr -`func (o *PKIIssuerSignRoleRequest) HasCsr() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasCsr() bool` HasCsr returns a boolean if a field has been set. @@ -131,27 +132,27 @@ HasCsr returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIIssuerSignRoleRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuerSignWithRoleRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIIssuerSignRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIIssuerSignRoleRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuerSignWithRoleRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIIssuerSignRoleRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -160,27 +161,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuerSignRoleRequest) GetFormat() string` +`func (o *PkiIssuerSignWithRoleRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuerSignRoleRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuerSignRoleRequest) SetFormat(v string)` +`func (o *PkiIssuerSignWithRoleRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuerSignRoleRequest) HasFormat() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -189,27 +190,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIIssuerSignRoleRequest) GetIpSans() []string` +`func (o *PkiIssuerSignWithRoleRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIIssuerSignRoleRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIIssuerSignRoleRequest) SetIpSans(v []string)` +`func (o *PkiIssuerSignWithRoleRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIIssuerSignRoleRequest) HasIpSans() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -218,27 +219,27 @@ HasIpSans returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIIssuerSignRoleRequest) GetNotAfter() string` +`func (o *PkiIssuerSignWithRoleRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIIssuerSignRoleRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIIssuerSignRoleRequest) SetNotAfter(v string)` +`func (o *PkiIssuerSignWithRoleRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIIssuerSignRoleRequest) HasNotAfter() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -247,27 +248,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIIssuerSignRoleRequest) GetOtherSans() []string` +`func (o *PkiIssuerSignWithRoleRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIIssuerSignRoleRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIIssuerSignRoleRequest) SetOtherSans(v []string)` +`func (o *PkiIssuerSignWithRoleRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIIssuerSignRoleRequest) HasOtherSans() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -276,27 +277,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIIssuerSignRoleRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuerSignWithRoleRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIIssuerSignRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIIssuerSignRoleRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuerSignWithRoleRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIIssuerSignRoleRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -305,27 +306,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKIIssuerSignRoleRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiIssuerSignWithRoleRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKIIssuerSignRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKIIssuerSignRoleRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiIssuerSignWithRoleRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKIIssuerSignRoleRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -334,27 +335,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIIssuerSignRoleRequest) GetSerialNumber() string` +`func (o *PkiIssuerSignWithRoleRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIIssuerSignRoleRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIIssuerSignRoleRequest) SetSerialNumber(v string)` +`func (o *PkiIssuerSignWithRoleRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIIssuerSignRoleRequest) HasSerialNumber() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -363,27 +364,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetTtl -`func (o *PKIIssuerSignRoleRequest) GetTtl() int32` +`func (o *PkiIssuerSignWithRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIIssuerSignRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIIssuerSignRoleRequest) SetTtl(v int32)` +`func (o *PkiIssuerSignWithRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIIssuerSignRoleRequest) HasTtl() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -392,33 +393,62 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIIssuerSignRoleRequest) GetUriSans() []string` +`func (o *PkiIssuerSignWithRoleRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIIssuerSignRoleRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuerSignWithRoleRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIIssuerSignRoleRequest) SetUriSans(v []string)` +`func (o *PkiIssuerSignWithRoleRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIIssuerSignRoleRequest) HasUriSans() bool` +`func (o *PkiIssuerSignWithRoleRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiIssuerSignWithRoleRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiIssuerSignWithRoleRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiIssuerSignWithRoleRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiIssuerSignWithRoleRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiIssuerSignWithRoleResponse.md b/docs/PkiIssuerSignWithRoleResponse.md new file mode 100644 index 00000000..1e09dab5 --- /dev/null +++ b/docs/PkiIssuerSignWithRoleResponse.md @@ -0,0 +1,249 @@ +# PkiIssuerSignWithRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiIssuerSignWithRoleResponse + +`func NewPkiIssuerSignWithRoleResponse() *PkiIssuerSignWithRoleResponse` + +NewPkiIssuerSignWithRoleResponse instantiates a new PkiIssuerSignWithRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuerSignWithRoleResponseWithDefaults + +`func NewPkiIssuerSignWithRoleResponseWithDefaults() *PkiIssuerSignWithRoleResponse` + +NewPkiIssuerSignWithRoleResponseWithDefaults instantiates a new PkiIssuerSignWithRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiIssuerSignWithRoleResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiIssuerSignWithRoleResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiIssuerSignWithRoleResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiIssuerSignWithRoleResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiIssuerSignWithRoleResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuerSignWithRoleResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuerSignWithRoleResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuerSignWithRoleResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssuerSignWithRoleResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssuerSignWithRoleResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssuerSignWithRoleResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssuerSignWithRoleResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuerSignWithRoleResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuerSignWithRoleResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuerSignWithRoleResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuerSignWithRoleResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssuerSignWithRoleResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssuerSignWithRoleResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssuerSignWithRoleResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssuerSignWithRoleResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiIssuerSignWithRoleResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiIssuerSignWithRoleResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiIssuerSignWithRoleResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiIssuerSignWithRoleResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssuerSignWithRoleResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssuerSignWithRoleResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssuerSignWithRoleResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssuerSignWithRoleResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuersGenerateIntermediateRequest.md b/docs/PkiIssuersGenerateIntermediateRequest.md index bf48025f..0a0ccbca 100644 --- a/docs/PkiIssuersGenerateIntermediateRequest.md +++ b/docs/PkiIssuersGenerateIntermediateRequest.md @@ -1,4 +1,4 @@ -# PKIIssuersGenerateIntermediateRequest +# PkiIssuersGenerateIntermediateRequest ## Properties @@ -38,47 +38,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIIssuersGenerateIntermediateRequest +### NewPkiIssuersGenerateIntermediateRequest -`func NewPKIIssuersGenerateIntermediateRequest() *PKIIssuersGenerateIntermediateRequest` +`func NewPkiIssuersGenerateIntermediateRequest() *PkiIssuersGenerateIntermediateRequest` -NewPKIIssuersGenerateIntermediateRequest instantiates a new PKIIssuersGenerateIntermediateRequest object +NewPkiIssuersGenerateIntermediateRequest instantiates a new PkiIssuersGenerateIntermediateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuersGenerateIntermediateRequestWithDefaults +### NewPkiIssuersGenerateIntermediateRequestWithDefaults -`func NewPKIIssuersGenerateIntermediateRequestWithDefaults() *PKIIssuersGenerateIntermediateRequest` +`func NewPkiIssuersGenerateIntermediateRequestWithDefaults() *PkiIssuersGenerateIntermediateRequest` -NewPKIIssuersGenerateIntermediateRequestWithDefaults instantiates a new PKIIssuersGenerateIntermediateRequest object +NewPkiIssuersGenerateIntermediateRequestWithDefaults instantiates a new PkiIssuersGenerateIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAddBasicConstraints -`func (o *PKIIssuersGenerateIntermediateRequest) GetAddBasicConstraints() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) GetAddBasicConstraints() bool` GetAddBasicConstraints returns the AddBasicConstraints field if non-nil, zero value otherwise. ### GetAddBasicConstraintsOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetAddBasicConstraintsOk() (*bool, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetAddBasicConstraintsOk() (*bool, bool)` GetAddBasicConstraintsOk returns a tuple with the AddBasicConstraints field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAddBasicConstraints -`func (o *PKIIssuersGenerateIntermediateRequest) SetAddBasicConstraints(v bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetAddBasicConstraints(v bool)` SetAddBasicConstraints sets AddBasicConstraints field to given value. ### HasAddBasicConstraints -`func (o *PKIIssuersGenerateIntermediateRequest) HasAddBasicConstraints() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasAddBasicConstraints() bool` HasAddBasicConstraints returns a boolean if a field has been set. @@ -87,27 +87,27 @@ HasAddBasicConstraints returns a boolean if a field has been set. ### GetAltNames -`func (o *PKIIssuersGenerateIntermediateRequest) GetAltNames() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIIssuersGenerateIntermediateRequest) SetAltNames(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIIssuersGenerateIntermediateRequest) HasAltNames() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -116,27 +116,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIIssuersGenerateIntermediateRequest) GetCommonName() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIIssuersGenerateIntermediateRequest) SetCommonName(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIIssuersGenerateIntermediateRequest) HasCommonName() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -145,27 +145,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIIssuersGenerateIntermediateRequest) GetCountry() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIIssuersGenerateIntermediateRequest) SetCountry(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIIssuersGenerateIntermediateRequest) HasCountry() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -174,27 +174,27 @@ HasCountry returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIIssuersGenerateIntermediateRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIIssuersGenerateIntermediateRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIIssuersGenerateIntermediateRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -203,27 +203,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuersGenerateIntermediateRequest) GetFormat() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuersGenerateIntermediateRequest) SetFormat(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuersGenerateIntermediateRequest) HasFormat() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -232,27 +232,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIIssuersGenerateIntermediateRequest) GetIpSans() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIIssuersGenerateIntermediateRequest) SetIpSans(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIIssuersGenerateIntermediateRequest) HasIpSans() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -261,27 +261,27 @@ HasIpSans returns a boolean if a field has been set. ### GetKeyBits -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyBits() int32` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIIssuersGenerateIntermediateRequest) SetKeyBits(v int32)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIIssuersGenerateIntermediateRequest) HasKeyBits() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -290,27 +290,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyName() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIIssuersGenerateIntermediateRequest) SetKeyName(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIIssuersGenerateIntermediateRequest) HasKeyName() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -319,27 +319,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyRef -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyRef() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyRef() string` GetKeyRef returns the KeyRef field if non-nil, zero value otherwise. ### GetKeyRefOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyRefOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyRefOk() (*string, bool)` GetKeyRefOk returns a tuple with the KeyRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyRef -`func (o *PKIIssuersGenerateIntermediateRequest) SetKeyRef(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetKeyRef(v string)` SetKeyRef sets KeyRef field to given value. ### HasKeyRef -`func (o *PKIIssuersGenerateIntermediateRequest) HasKeyRef() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasKeyRef() bool` HasKeyRef returns a boolean if a field has been set. @@ -348,27 +348,27 @@ HasKeyRef returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyType() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIIssuersGenerateIntermediateRequest) SetKeyType(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIIssuersGenerateIntermediateRequest) HasKeyType() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -377,27 +377,27 @@ HasKeyType returns a boolean if a field has been set. ### GetLocality -`func (o *PKIIssuersGenerateIntermediateRequest) GetLocality() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIIssuersGenerateIntermediateRequest) SetLocality(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIIssuersGenerateIntermediateRequest) HasLocality() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -406,27 +406,27 @@ HasLocality returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIIssuersGenerateIntermediateRequest) GetManagedKeyId() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIIssuersGenerateIntermediateRequest) SetManagedKeyId(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIIssuersGenerateIntermediateRequest) HasManagedKeyId() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -435,27 +435,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIIssuersGenerateIntermediateRequest) GetManagedKeyName() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIIssuersGenerateIntermediateRequest) SetManagedKeyName(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIIssuersGenerateIntermediateRequest) HasManagedKeyName() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. @@ -464,27 +464,27 @@ HasManagedKeyName returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIIssuersGenerateIntermediateRequest) GetNotAfter() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIIssuersGenerateIntermediateRequest) SetNotAfter(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIIssuersGenerateIntermediateRequest) HasNotAfter() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -493,27 +493,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIIssuersGenerateIntermediateRequest) GetNotBeforeDuration() int32` +`func (o *PkiIssuersGenerateIntermediateRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIIssuersGenerateIntermediateRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIIssuersGenerateIntermediateRequest) HasNotBeforeDuration() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -522,27 +522,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIIssuersGenerateIntermediateRequest) GetOrganization() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIIssuersGenerateIntermediateRequest) SetOrganization(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIIssuersGenerateIntermediateRequest) HasOrganization() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -551,27 +551,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIIssuersGenerateIntermediateRequest) GetOtherSans() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIIssuersGenerateIntermediateRequest) SetOtherSans(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIIssuersGenerateIntermediateRequest) HasOtherSans() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -580,27 +580,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIIssuersGenerateIntermediateRequest) GetOu() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIIssuersGenerateIntermediateRequest) SetOu(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIIssuersGenerateIntermediateRequest) HasOu() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -609,27 +609,27 @@ HasOu returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIIssuersGenerateIntermediateRequest) GetPostalCode() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIIssuersGenerateIntermediateRequest) SetPostalCode(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIIssuersGenerateIntermediateRequest) HasPostalCode() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -638,27 +638,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIIssuersGenerateIntermediateRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIIssuersGenerateIntermediateRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIIssuersGenerateIntermediateRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -667,27 +667,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIIssuersGenerateIntermediateRequest) GetProvince() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIIssuersGenerateIntermediateRequest) SetProvince(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIIssuersGenerateIntermediateRequest) HasProvince() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -696,27 +696,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIIssuersGenerateIntermediateRequest) GetSerialNumber() string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIIssuersGenerateIntermediateRequest) SetSerialNumber(v string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIIssuersGenerateIntermediateRequest) HasSerialNumber() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -725,27 +725,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIIssuersGenerateIntermediateRequest) GetSignatureBits() int32` +`func (o *PkiIssuersGenerateIntermediateRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIIssuersGenerateIntermediateRequest) SetSignatureBits(v int32)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIIssuersGenerateIntermediateRequest) HasSignatureBits() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -754,27 +754,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIIssuersGenerateIntermediateRequest) GetStreetAddress() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIIssuersGenerateIntermediateRequest) SetStreetAddress(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIIssuersGenerateIntermediateRequest) HasStreetAddress() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -783,27 +783,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIIssuersGenerateIntermediateRequest) GetTtl() int32` +`func (o *PkiIssuersGenerateIntermediateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIIssuersGenerateIntermediateRequest) SetTtl(v int32)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIIssuersGenerateIntermediateRequest) HasTtl() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -812,27 +812,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIIssuersGenerateIntermediateRequest) GetUriSans() []string` +`func (o *PkiIssuersGenerateIntermediateRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIIssuersGenerateIntermediateRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateIntermediateRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIIssuersGenerateIntermediateRequest) SetUriSans(v []string)` +`func (o *PkiIssuersGenerateIntermediateRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIIssuersGenerateIntermediateRequest) HasUriSans() bool` +`func (o *PkiIssuersGenerateIntermediateRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. diff --git a/docs/PkiIssuersGenerateIntermediateResponse.md b/docs/PkiIssuersGenerateIntermediateResponse.md new file mode 100644 index 00000000..f7ca434c --- /dev/null +++ b/docs/PkiIssuersGenerateIntermediateResponse.md @@ -0,0 +1,159 @@ +# PkiIssuersGenerateIntermediateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Csr** | Pointer to **string** | Certificate signing request. | [optional] +**KeyId** | Pointer to **string** | Id of the key. | [optional] +**PrivateKey** | Pointer to **string** | Generated private key. | [optional] +**PrivateKeyType** | Pointer to **string** | Specifies the format used for marshaling the private key. | [optional] + + + +## Methods + + +### NewPkiIssuersGenerateIntermediateResponse + +`func NewPkiIssuersGenerateIntermediateResponse() *PkiIssuersGenerateIntermediateResponse` + +NewPkiIssuersGenerateIntermediateResponse instantiates a new PkiIssuersGenerateIntermediateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuersGenerateIntermediateResponseWithDefaults + +`func NewPkiIssuersGenerateIntermediateResponseWithDefaults() *PkiIssuersGenerateIntermediateResponse` + +NewPkiIssuersGenerateIntermediateResponseWithDefaults instantiates a new PkiIssuersGenerateIntermediateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCsr + +`func (o *PkiIssuersGenerateIntermediateResponse) GetCsr() string` + +GetCsr returns the Csr field if non-nil, zero value otherwise. + +### GetCsrOk + +`func (o *PkiIssuersGenerateIntermediateResponse) GetCsrOk() (*string, bool)` + +GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCsr + +`func (o *PkiIssuersGenerateIntermediateResponse) SetCsr(v string)` + +SetCsr sets Csr field to given value. + + +### HasCsr + +`func (o *PkiIssuersGenerateIntermediateResponse) HasCsr() bool` + +HasCsr returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiIssuersGenerateIntermediateResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiIssuersGenerateIntermediateResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiIssuersGenerateIntermediateResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiIssuersGenerateIntermediateResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssuersGenerateIntermediateResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssuersGenerateIntermediateResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssuersGenerateIntermediateResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssuersGenerateIntermediateResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiIssuersGenerateIntermediateResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiIssuersGenerateIntermediateResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiIssuersGenerateIntermediateResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiIssuersGenerateIntermediateResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiIssuersGenerateRootRequest.md b/docs/PkiIssuersGenerateRootRequest.md index ad13d5e6..48652913 100644 --- a/docs/PkiIssuersGenerateRootRequest.md +++ b/docs/PkiIssuersGenerateRootRequest.md @@ -1,4 +1,4 @@ -# PKIIssuersGenerateRootRequest +# PkiIssuersGenerateRootRequest ## Properties @@ -41,47 +41,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIIssuersGenerateRootRequest +### NewPkiIssuersGenerateRootRequest -`func NewPKIIssuersGenerateRootRequest() *PKIIssuersGenerateRootRequest` +`func NewPkiIssuersGenerateRootRequest() *PkiIssuersGenerateRootRequest` -NewPKIIssuersGenerateRootRequest instantiates a new PKIIssuersGenerateRootRequest object +NewPkiIssuersGenerateRootRequest instantiates a new PkiIssuersGenerateRootRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuersGenerateRootRequestWithDefaults +### NewPkiIssuersGenerateRootRequestWithDefaults -`func NewPKIIssuersGenerateRootRequestWithDefaults() *PKIIssuersGenerateRootRequest` +`func NewPkiIssuersGenerateRootRequestWithDefaults() *PkiIssuersGenerateRootRequest` -NewPKIIssuersGenerateRootRequestWithDefaults instantiates a new PKIIssuersGenerateRootRequest object +NewPkiIssuersGenerateRootRequestWithDefaults instantiates a new PkiIssuersGenerateRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIIssuersGenerateRootRequest) GetAltNames() string` +`func (o *PkiIssuersGenerateRootRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIIssuersGenerateRootRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIIssuersGenerateRootRequest) SetAltNames(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIIssuersGenerateRootRequest) HasAltNames() bool` +`func (o *PkiIssuersGenerateRootRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -90,27 +90,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIIssuersGenerateRootRequest) GetCommonName() string` +`func (o *PkiIssuersGenerateRootRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIIssuersGenerateRootRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIIssuersGenerateRootRequest) SetCommonName(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIIssuersGenerateRootRequest) HasCommonName() bool` +`func (o *PkiIssuersGenerateRootRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -119,27 +119,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIIssuersGenerateRootRequest) GetCountry() []string` +`func (o *PkiIssuersGenerateRootRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIIssuersGenerateRootRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIIssuersGenerateRootRequest) SetCountry(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIIssuersGenerateRootRequest) HasCountry() bool` +`func (o *PkiIssuersGenerateRootRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -148,27 +148,27 @@ HasCountry returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIIssuersGenerateRootRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuersGenerateRootRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIIssuersGenerateRootRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIIssuersGenerateRootRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuersGenerateRootRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIIssuersGenerateRootRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuersGenerateRootRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -177,27 +177,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuersGenerateRootRequest) GetFormat() string` +`func (o *PkiIssuersGenerateRootRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuersGenerateRootRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuersGenerateRootRequest) SetFormat(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuersGenerateRootRequest) HasFormat() bool` +`func (o *PkiIssuersGenerateRootRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -206,27 +206,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIIssuersGenerateRootRequest) GetIpSans() []string` +`func (o *PkiIssuersGenerateRootRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIIssuersGenerateRootRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIIssuersGenerateRootRequest) SetIpSans(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIIssuersGenerateRootRequest) HasIpSans() bool` +`func (o *PkiIssuersGenerateRootRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -235,27 +235,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerName -`func (o *PKIIssuersGenerateRootRequest) GetIssuerName() string` +`func (o *PkiIssuersGenerateRootRequest) GetIssuerName() string` GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. ### GetIssuerNameOk -`func (o *PKIIssuersGenerateRootRequest) GetIssuerNameOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetIssuerNameOk() (*string, bool)` GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerName -`func (o *PKIIssuersGenerateRootRequest) SetIssuerName(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetIssuerName(v string)` SetIssuerName sets IssuerName field to given value. ### HasIssuerName -`func (o *PKIIssuersGenerateRootRequest) HasIssuerName() bool` +`func (o *PkiIssuersGenerateRootRequest) HasIssuerName() bool` HasIssuerName returns a boolean if a field has been set. @@ -264,27 +264,27 @@ HasIssuerName returns a boolean if a field has been set. ### GetKeyBits -`func (o *PKIIssuersGenerateRootRequest) GetKeyBits() int32` +`func (o *PkiIssuersGenerateRootRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIIssuersGenerateRootRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIIssuersGenerateRootRequest) SetKeyBits(v int32)` +`func (o *PkiIssuersGenerateRootRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIIssuersGenerateRootRequest) HasKeyBits() bool` +`func (o *PkiIssuersGenerateRootRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -293,27 +293,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIIssuersGenerateRootRequest) GetKeyName() string` +`func (o *PkiIssuersGenerateRootRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIIssuersGenerateRootRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIIssuersGenerateRootRequest) SetKeyName(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIIssuersGenerateRootRequest) HasKeyName() bool` +`func (o *PkiIssuersGenerateRootRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -322,27 +322,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyRef -`func (o *PKIIssuersGenerateRootRequest) GetKeyRef() string` +`func (o *PkiIssuersGenerateRootRequest) GetKeyRef() string` GetKeyRef returns the KeyRef field if non-nil, zero value otherwise. ### GetKeyRefOk -`func (o *PKIIssuersGenerateRootRequest) GetKeyRefOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetKeyRefOk() (*string, bool)` GetKeyRefOk returns a tuple with the KeyRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyRef -`func (o *PKIIssuersGenerateRootRequest) SetKeyRef(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetKeyRef(v string)` SetKeyRef sets KeyRef field to given value. ### HasKeyRef -`func (o *PKIIssuersGenerateRootRequest) HasKeyRef() bool` +`func (o *PkiIssuersGenerateRootRequest) HasKeyRef() bool` HasKeyRef returns a boolean if a field has been set. @@ -351,27 +351,27 @@ HasKeyRef returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIIssuersGenerateRootRequest) GetKeyType() string` +`func (o *PkiIssuersGenerateRootRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIIssuersGenerateRootRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIIssuersGenerateRootRequest) SetKeyType(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIIssuersGenerateRootRequest) HasKeyType() bool` +`func (o *PkiIssuersGenerateRootRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -380,27 +380,27 @@ HasKeyType returns a boolean if a field has been set. ### GetLocality -`func (o *PKIIssuersGenerateRootRequest) GetLocality() []string` +`func (o *PkiIssuersGenerateRootRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIIssuersGenerateRootRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIIssuersGenerateRootRequest) SetLocality(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIIssuersGenerateRootRequest) HasLocality() bool` +`func (o *PkiIssuersGenerateRootRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -409,27 +409,27 @@ HasLocality returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIIssuersGenerateRootRequest) GetManagedKeyId() string` +`func (o *PkiIssuersGenerateRootRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIIssuersGenerateRootRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIIssuersGenerateRootRequest) SetManagedKeyId(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIIssuersGenerateRootRequest) HasManagedKeyId() bool` +`func (o *PkiIssuersGenerateRootRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -438,27 +438,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIIssuersGenerateRootRequest) GetManagedKeyName() string` +`func (o *PkiIssuersGenerateRootRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIIssuersGenerateRootRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIIssuersGenerateRootRequest) SetManagedKeyName(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIIssuersGenerateRootRequest) HasManagedKeyName() bool` +`func (o *PkiIssuersGenerateRootRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. @@ -467,27 +467,27 @@ HasManagedKeyName returns a boolean if a field has been set. ### GetMaxPathLength -`func (o *PKIIssuersGenerateRootRequest) GetMaxPathLength() int32` +`func (o *PkiIssuersGenerateRootRequest) GetMaxPathLength() int32` GetMaxPathLength returns the MaxPathLength field if non-nil, zero value otherwise. ### GetMaxPathLengthOk -`func (o *PKIIssuersGenerateRootRequest) GetMaxPathLengthOk() (*int32, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetMaxPathLengthOk() (*int32, bool)` GetMaxPathLengthOk returns a tuple with the MaxPathLength field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxPathLength -`func (o *PKIIssuersGenerateRootRequest) SetMaxPathLength(v int32)` +`func (o *PkiIssuersGenerateRootRequest) SetMaxPathLength(v int32)` SetMaxPathLength sets MaxPathLength field to given value. ### HasMaxPathLength -`func (o *PKIIssuersGenerateRootRequest) HasMaxPathLength() bool` +`func (o *PkiIssuersGenerateRootRequest) HasMaxPathLength() bool` HasMaxPathLength returns a boolean if a field has been set. @@ -496,27 +496,27 @@ HasMaxPathLength returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIIssuersGenerateRootRequest) GetNotAfter() string` +`func (o *PkiIssuersGenerateRootRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIIssuersGenerateRootRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIIssuersGenerateRootRequest) SetNotAfter(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIIssuersGenerateRootRequest) HasNotAfter() bool` +`func (o *PkiIssuersGenerateRootRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -525,27 +525,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIIssuersGenerateRootRequest) GetNotBeforeDuration() int32` +`func (o *PkiIssuersGenerateRootRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIIssuersGenerateRootRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIIssuersGenerateRootRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiIssuersGenerateRootRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIIssuersGenerateRootRequest) HasNotBeforeDuration() bool` +`func (o *PkiIssuersGenerateRootRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -554,27 +554,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIIssuersGenerateRootRequest) GetOrganization() []string` +`func (o *PkiIssuersGenerateRootRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIIssuersGenerateRootRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIIssuersGenerateRootRequest) SetOrganization(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIIssuersGenerateRootRequest) HasOrganization() bool` +`func (o *PkiIssuersGenerateRootRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -583,27 +583,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIIssuersGenerateRootRequest) GetOtherSans() []string` +`func (o *PkiIssuersGenerateRootRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIIssuersGenerateRootRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIIssuersGenerateRootRequest) SetOtherSans(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIIssuersGenerateRootRequest) HasOtherSans() bool` +`func (o *PkiIssuersGenerateRootRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -612,27 +612,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIIssuersGenerateRootRequest) GetOu() []string` +`func (o *PkiIssuersGenerateRootRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIIssuersGenerateRootRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIIssuersGenerateRootRequest) SetOu(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIIssuersGenerateRootRequest) HasOu() bool` +`func (o *PkiIssuersGenerateRootRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -641,27 +641,27 @@ HasOu returns a boolean if a field has been set. ### GetPermittedDnsDomains -`func (o *PKIIssuersGenerateRootRequest) GetPermittedDnsDomains() []string` +`func (o *PkiIssuersGenerateRootRequest) GetPermittedDnsDomains() []string` GetPermittedDnsDomains returns the PermittedDnsDomains field if non-nil, zero value otherwise. ### GetPermittedDnsDomainsOk -`func (o *PKIIssuersGenerateRootRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` GetPermittedDnsDomainsOk returns a tuple with the PermittedDnsDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPermittedDnsDomains -`func (o *PKIIssuersGenerateRootRequest) SetPermittedDnsDomains(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetPermittedDnsDomains(v []string)` SetPermittedDnsDomains sets PermittedDnsDomains field to given value. ### HasPermittedDnsDomains -`func (o *PKIIssuersGenerateRootRequest) HasPermittedDnsDomains() bool` +`func (o *PkiIssuersGenerateRootRequest) HasPermittedDnsDomains() bool` HasPermittedDnsDomains returns a boolean if a field has been set. @@ -670,27 +670,27 @@ HasPermittedDnsDomains returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIIssuersGenerateRootRequest) GetPostalCode() []string` +`func (o *PkiIssuersGenerateRootRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIIssuersGenerateRootRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIIssuersGenerateRootRequest) SetPostalCode(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIIssuersGenerateRootRequest) HasPostalCode() bool` +`func (o *PkiIssuersGenerateRootRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -699,27 +699,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIIssuersGenerateRootRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuersGenerateRootRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIIssuersGenerateRootRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIIssuersGenerateRootRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIIssuersGenerateRootRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuersGenerateRootRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -728,27 +728,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIIssuersGenerateRootRequest) GetProvince() []string` +`func (o *PkiIssuersGenerateRootRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIIssuersGenerateRootRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIIssuersGenerateRootRequest) SetProvince(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIIssuersGenerateRootRequest) HasProvince() bool` +`func (o *PkiIssuersGenerateRootRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -757,27 +757,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIIssuersGenerateRootRequest) GetSerialNumber() string` +`func (o *PkiIssuersGenerateRootRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIIssuersGenerateRootRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIIssuersGenerateRootRequest) SetSerialNumber(v string)` +`func (o *PkiIssuersGenerateRootRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIIssuersGenerateRootRequest) HasSerialNumber() bool` +`func (o *PkiIssuersGenerateRootRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -786,27 +786,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIIssuersGenerateRootRequest) GetSignatureBits() int32` +`func (o *PkiIssuersGenerateRootRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIIssuersGenerateRootRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIIssuersGenerateRootRequest) SetSignatureBits(v int32)` +`func (o *PkiIssuersGenerateRootRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIIssuersGenerateRootRequest) HasSignatureBits() bool` +`func (o *PkiIssuersGenerateRootRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -815,27 +815,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIIssuersGenerateRootRequest) GetStreetAddress() []string` +`func (o *PkiIssuersGenerateRootRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIIssuersGenerateRootRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIIssuersGenerateRootRequest) SetStreetAddress(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIIssuersGenerateRootRequest) HasStreetAddress() bool` +`func (o *PkiIssuersGenerateRootRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -844,27 +844,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIIssuersGenerateRootRequest) GetTtl() int32` +`func (o *PkiIssuersGenerateRootRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIIssuersGenerateRootRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIIssuersGenerateRootRequest) SetTtl(v int32)` +`func (o *PkiIssuersGenerateRootRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIIssuersGenerateRootRequest) HasTtl() bool` +`func (o *PkiIssuersGenerateRootRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -873,27 +873,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIIssuersGenerateRootRequest) GetUriSans() []string` +`func (o *PkiIssuersGenerateRootRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIIssuersGenerateRootRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIIssuersGenerateRootRequest) SetUriSans(v []string)` +`func (o *PkiIssuersGenerateRootRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIIssuersGenerateRootRequest) HasUriSans() bool` +`func (o *PkiIssuersGenerateRootRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -902,27 +902,27 @@ HasUriSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIIssuersGenerateRootRequest) GetUsePss() bool` +`func (o *PkiIssuersGenerateRootRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIIssuersGenerateRootRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiIssuersGenerateRootRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIIssuersGenerateRootRequest) SetUsePss(v bool)` +`func (o *PkiIssuersGenerateRootRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIIssuersGenerateRootRequest) HasUsePss() bool` +`func (o *PkiIssuersGenerateRootRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. diff --git a/docs/PkiIssuersGenerateRootResponse.md b/docs/PkiIssuersGenerateRootResponse.md new file mode 100644 index 00000000..eaada159 --- /dev/null +++ b/docs/PkiIssuersGenerateRootResponse.md @@ -0,0 +1,309 @@ +# PkiIssuersGenerateRootResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Certificate** | Pointer to **string** | The generated self-signed CA certificate. | [optional] +**Expiration** | Pointer to **string** | The expiration of the given. | [optional] +**IssuerId** | Pointer to **string** | The ID of the issuer | [optional] +**IssuerName** | Pointer to **string** | The name of the issuer. | [optional] +**IssuingCa** | Pointer to **string** | The issuing certificate authority. | [optional] +**KeyId** | Pointer to **string** | The ID of the key. | [optional] +**KeyName** | Pointer to **string** | The key name if given. | [optional] +**PrivateKey** | Pointer to **string** | The private key if exported was specified. | [optional] +**SerialNumber** | Pointer to **string** | The requested Subject's named serial number. | [optional] + + + +## Methods + + +### NewPkiIssuersGenerateRootResponse + +`func NewPkiIssuersGenerateRootResponse() *PkiIssuersGenerateRootResponse` + +NewPkiIssuersGenerateRootResponse instantiates a new PkiIssuersGenerateRootResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuersGenerateRootResponseWithDefaults + +`func NewPkiIssuersGenerateRootResponseWithDefaults() *PkiIssuersGenerateRootResponse` + +NewPkiIssuersGenerateRootResponseWithDefaults instantiates a new PkiIssuersGenerateRootResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCertificate + +`func (o *PkiIssuersGenerateRootResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuersGenerateRootResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuersGenerateRootResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuersGenerateRootResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssuersGenerateRootResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssuersGenerateRootResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssuersGenerateRootResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssuersGenerateRootResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiIssuersGenerateRootResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiIssuersGenerateRootResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiIssuersGenerateRootResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiIssuersGenerateRootResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiIssuersGenerateRootResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiIssuersGenerateRootResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiIssuersGenerateRootResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiIssuersGenerateRootResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuersGenerateRootResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuersGenerateRootResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuersGenerateRootResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuersGenerateRootResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiIssuersGenerateRootResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiIssuersGenerateRootResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiIssuersGenerateRootResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiIssuersGenerateRootResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiIssuersGenerateRootResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiIssuersGenerateRootResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiIssuersGenerateRootResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiIssuersGenerateRootResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssuersGenerateRootResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssuersGenerateRootResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssuersGenerateRootResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssuersGenerateRootResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssuersGenerateRootResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssuersGenerateRootResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssuersGenerateRootResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssuersGenerateRootResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteCertsRequest.md b/docs/PkiIssuersImportBundleRequest.md similarity index 62% rename from docs/PKIWriteCertsRequest.md rename to docs/PkiIssuersImportBundleRequest.md index ce772bf5..41b868a4 100644 --- a/docs/PKIWriteCertsRequest.md +++ b/docs/PkiIssuersImportBundleRequest.md @@ -1,4 +1,4 @@ -# PKIWriteCertsRequest +# PkiIssuersImportBundleRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteCertsRequest +### NewPkiIssuersImportBundleRequest -`func NewPKIWriteCertsRequest() *PKIWriteCertsRequest` +`func NewPkiIssuersImportBundleRequest() *PkiIssuersImportBundleRequest` -NewPKIWriteCertsRequest instantiates a new PKIWriteCertsRequest object +NewPkiIssuersImportBundleRequest instantiates a new PkiIssuersImportBundleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteCertsRequestWithDefaults +### NewPkiIssuersImportBundleRequestWithDefaults -`func NewPKIWriteCertsRequestWithDefaults() *PKIWriteCertsRequest` +`func NewPkiIssuersImportBundleRequestWithDefaults() *PkiIssuersImportBundleRequest` -NewPKIWriteCertsRequestWithDefaults instantiates a new PKIWriteCertsRequest object +NewPkiIssuersImportBundleRequestWithDefaults instantiates a new PkiIssuersImportBundleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPemBundle -`func (o *PKIWriteCertsRequest) GetPemBundle() string` +`func (o *PkiIssuersImportBundleRequest) GetPemBundle() string` GetPemBundle returns the PemBundle field if non-nil, zero value otherwise. ### GetPemBundleOk -`func (o *PKIWriteCertsRequest) GetPemBundleOk() (*string, bool)` +`func (o *PkiIssuersImportBundleRequest) GetPemBundleOk() (*string, bool)` GetPemBundleOk returns a tuple with the PemBundle field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPemBundle -`func (o *PKIWriteCertsRequest) SetPemBundle(v string)` +`func (o *PkiIssuersImportBundleRequest) SetPemBundle(v string)` SetPemBundle sets PemBundle field to given value. ### HasPemBundle -`func (o *PKIWriteCertsRequest) HasPemBundle() bool` +`func (o *PkiIssuersImportBundleRequest) HasPemBundle() bool` HasPemBundle returns a boolean if a field has been set. diff --git a/docs/PkiIssuersImportBundleResponse.md b/docs/PkiIssuersImportBundleResponse.md new file mode 100644 index 00000000..e0d74b1e --- /dev/null +++ b/docs/PkiIssuersImportBundleResponse.md @@ -0,0 +1,129 @@ +# PkiIssuersImportBundleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ImportedIssuers** | Pointer to **[]string** | Net-new issuers imported as a part of this request | [optional] +**ImportedKeys** | Pointer to **[]string** | Net-new keys imported as a part of this request | [optional] +**Mapping** | Pointer to **map[string]interface{}** | A mapping of issuer_id to key_id for all issuers included in this request | [optional] + + + +## Methods + + +### NewPkiIssuersImportBundleResponse + +`func NewPkiIssuersImportBundleResponse() *PkiIssuersImportBundleResponse` + +NewPkiIssuersImportBundleResponse instantiates a new PkiIssuersImportBundleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuersImportBundleResponseWithDefaults + +`func NewPkiIssuersImportBundleResponseWithDefaults() *PkiIssuersImportBundleResponse` + +NewPkiIssuersImportBundleResponseWithDefaults instantiates a new PkiIssuersImportBundleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetImportedIssuers + +`func (o *PkiIssuersImportBundleResponse) GetImportedIssuers() []string` + +GetImportedIssuers returns the ImportedIssuers field if non-nil, zero value otherwise. + +### GetImportedIssuersOk + +`func (o *PkiIssuersImportBundleResponse) GetImportedIssuersOk() (*[]string, bool)` + +GetImportedIssuersOk returns a tuple with the ImportedIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedIssuers + +`func (o *PkiIssuersImportBundleResponse) SetImportedIssuers(v []string)` + +SetImportedIssuers sets ImportedIssuers field to given value. + + +### HasImportedIssuers + +`func (o *PkiIssuersImportBundleResponse) HasImportedIssuers() bool` + +HasImportedIssuers returns a boolean if a field has been set. + + + + +### GetImportedKeys + +`func (o *PkiIssuersImportBundleResponse) GetImportedKeys() []string` + +GetImportedKeys returns the ImportedKeys field if non-nil, zero value otherwise. + +### GetImportedKeysOk + +`func (o *PkiIssuersImportBundleResponse) GetImportedKeysOk() (*[]string, bool)` + +GetImportedKeysOk returns a tuple with the ImportedKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedKeys + +`func (o *PkiIssuersImportBundleResponse) SetImportedKeys(v []string)` + +SetImportedKeys sets ImportedKeys field to given value. + + +### HasImportedKeys + +`func (o *PkiIssuersImportBundleResponse) HasImportedKeys() bool` + +HasImportedKeys returns a boolean if a field has been set. + + + + +### GetMapping + +`func (o *PkiIssuersImportBundleResponse) GetMapping() map[string]interface{}` + +GetMapping returns the Mapping field if non-nil, zero value otherwise. + +### GetMappingOk + +`func (o *PkiIssuersImportBundleResponse) GetMappingOk() (*map[string]interface{}, bool)` + +GetMappingOk returns a tuple with the Mapping field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMapping + +`func (o *PkiIssuersImportBundleResponse) SetMapping(v map[string]interface{})` + +SetMapping sets Mapping field to given value. + + +### HasMapping + +`func (o *PkiIssuersImportBundleResponse) HasMapping() bool` + +HasMapping returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIBundleWriteRequest.md b/docs/PkiIssuersImportCertRequest.md similarity index 63% rename from docs/PKIBundleWriteRequest.md rename to docs/PkiIssuersImportCertRequest.md index d19e2768..2905bbcb 100644 --- a/docs/PKIBundleWriteRequest.md +++ b/docs/PkiIssuersImportCertRequest.md @@ -1,4 +1,4 @@ -# PKIBundleWriteRequest +# PkiIssuersImportCertRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIBundleWriteRequest +### NewPkiIssuersImportCertRequest -`func NewPKIBundleWriteRequest() *PKIBundleWriteRequest` +`func NewPkiIssuersImportCertRequest() *PkiIssuersImportCertRequest` -NewPKIBundleWriteRequest instantiates a new PKIBundleWriteRequest object +NewPkiIssuersImportCertRequest instantiates a new PkiIssuersImportCertRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIBundleWriteRequestWithDefaults +### NewPkiIssuersImportCertRequestWithDefaults -`func NewPKIBundleWriteRequestWithDefaults() *PKIBundleWriteRequest` +`func NewPkiIssuersImportCertRequestWithDefaults() *PkiIssuersImportCertRequest` -NewPKIBundleWriteRequestWithDefaults instantiates a new PKIBundleWriteRequest object +NewPkiIssuersImportCertRequestWithDefaults instantiates a new PkiIssuersImportCertRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPemBundle -`func (o *PKIBundleWriteRequest) GetPemBundle() string` +`func (o *PkiIssuersImportCertRequest) GetPemBundle() string` GetPemBundle returns the PemBundle field if non-nil, zero value otherwise. ### GetPemBundleOk -`func (o *PKIBundleWriteRequest) GetPemBundleOk() (*string, bool)` +`func (o *PkiIssuersImportCertRequest) GetPemBundleOk() (*string, bool)` GetPemBundleOk returns a tuple with the PemBundle field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPemBundle -`func (o *PKIBundleWriteRequest) SetPemBundle(v string)` +`func (o *PkiIssuersImportCertRequest) SetPemBundle(v string)` SetPemBundle sets PemBundle field to given value. ### HasPemBundle -`func (o *PKIBundleWriteRequest) HasPemBundle() bool` +`func (o *PkiIssuersImportCertRequest) HasPemBundle() bool` HasPemBundle returns a boolean if a field has been set. diff --git a/docs/PkiIssuersImportCertResponse.md b/docs/PkiIssuersImportCertResponse.md new file mode 100644 index 00000000..9d68b85e --- /dev/null +++ b/docs/PkiIssuersImportCertResponse.md @@ -0,0 +1,129 @@ +# PkiIssuersImportCertResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ImportedIssuers** | Pointer to **[]string** | Net-new issuers imported as a part of this request | [optional] +**ImportedKeys** | Pointer to **[]string** | Net-new keys imported as a part of this request | [optional] +**Mapping** | Pointer to **map[string]interface{}** | A mapping of issuer_id to key_id for all issuers included in this request | [optional] + + + +## Methods + + +### NewPkiIssuersImportCertResponse + +`func NewPkiIssuersImportCertResponse() *PkiIssuersImportCertResponse` + +NewPkiIssuersImportCertResponse instantiates a new PkiIssuersImportCertResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuersImportCertResponseWithDefaults + +`func NewPkiIssuersImportCertResponseWithDefaults() *PkiIssuersImportCertResponse` + +NewPkiIssuersImportCertResponseWithDefaults instantiates a new PkiIssuersImportCertResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetImportedIssuers + +`func (o *PkiIssuersImportCertResponse) GetImportedIssuers() []string` + +GetImportedIssuers returns the ImportedIssuers field if non-nil, zero value otherwise. + +### GetImportedIssuersOk + +`func (o *PkiIssuersImportCertResponse) GetImportedIssuersOk() (*[]string, bool)` + +GetImportedIssuersOk returns a tuple with the ImportedIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedIssuers + +`func (o *PkiIssuersImportCertResponse) SetImportedIssuers(v []string)` + +SetImportedIssuers sets ImportedIssuers field to given value. + + +### HasImportedIssuers + +`func (o *PkiIssuersImportCertResponse) HasImportedIssuers() bool` + +HasImportedIssuers returns a boolean if a field has been set. + + + + +### GetImportedKeys + +`func (o *PkiIssuersImportCertResponse) GetImportedKeys() []string` + +GetImportedKeys returns the ImportedKeys field if non-nil, zero value otherwise. + +### GetImportedKeysOk + +`func (o *PkiIssuersImportCertResponse) GetImportedKeysOk() (*[]string, bool)` + +GetImportedKeysOk returns a tuple with the ImportedKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedKeys + +`func (o *PkiIssuersImportCertResponse) SetImportedKeys(v []string)` + +SetImportedKeys sets ImportedKeys field to given value. + + +### HasImportedKeys + +`func (o *PkiIssuersImportCertResponse) HasImportedKeys() bool` + +HasImportedKeys returns a boolean if a field has been set. + + + + +### GetMapping + +`func (o *PkiIssuersImportCertResponse) GetMapping() map[string]interface{}` + +GetMapping returns the Mapping field if non-nil, zero value otherwise. + +### GetMappingOk + +`func (o *PkiIssuersImportCertResponse) GetMappingOk() (*map[string]interface{}, bool)` + +GetMappingOk returns a tuple with the Mapping field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMapping + +`func (o *PkiIssuersImportCertResponse) SetMapping(v map[string]interface{})` + +SetMapping sets Mapping field to given value. + + +### HasMapping + +`func (o *PkiIssuersImportCertResponse) HasMapping() bool` + +HasMapping returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIRotateRootRequest.md b/docs/PkiIssuersRotateRootRequest.md similarity index 70% rename from docs/PKIRotateRootRequest.md rename to docs/PkiIssuersRotateRootRequest.md index de1e3c0c..f6f22fb3 100644 --- a/docs/PKIRotateRootRequest.md +++ b/docs/PkiIssuersRotateRootRequest.md @@ -1,4 +1,4 @@ -# PKIRotateRootRequest +# PkiIssuersRotateRootRequest ## Properties @@ -41,47 +41,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIRotateRootRequest +### NewPkiIssuersRotateRootRequest -`func NewPKIRotateRootRequest() *PKIRotateRootRequest` +`func NewPkiIssuersRotateRootRequest() *PkiIssuersRotateRootRequest` -NewPKIRotateRootRequest instantiates a new PKIRotateRootRequest object +NewPkiIssuersRotateRootRequest instantiates a new PkiIssuersRotateRootRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIRotateRootRequestWithDefaults +### NewPkiIssuersRotateRootRequestWithDefaults -`func NewPKIRotateRootRequestWithDefaults() *PKIRotateRootRequest` +`func NewPkiIssuersRotateRootRequestWithDefaults() *PkiIssuersRotateRootRequest` -NewPKIRotateRootRequestWithDefaults instantiates a new PKIRotateRootRequest object +NewPkiIssuersRotateRootRequestWithDefaults instantiates a new PkiIssuersRotateRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIRotateRootRequest) GetAltNames() string` +`func (o *PkiIssuersRotateRootRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIRotateRootRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIRotateRootRequest) SetAltNames(v string)` +`func (o *PkiIssuersRotateRootRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIRotateRootRequest) HasAltNames() bool` +`func (o *PkiIssuersRotateRootRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -90,27 +90,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIRotateRootRequest) GetCommonName() string` +`func (o *PkiIssuersRotateRootRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIRotateRootRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIRotateRootRequest) SetCommonName(v string)` +`func (o *PkiIssuersRotateRootRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIRotateRootRequest) HasCommonName() bool` +`func (o *PkiIssuersRotateRootRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -119,27 +119,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIRotateRootRequest) GetCountry() []string` +`func (o *PkiIssuersRotateRootRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIRotateRootRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIRotateRootRequest) SetCountry(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIRotateRootRequest) HasCountry() bool` +`func (o *PkiIssuersRotateRootRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -148,27 +148,27 @@ HasCountry returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIRotateRootRequest) GetExcludeCnFromSans() bool` +`func (o *PkiIssuersRotateRootRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIRotateRootRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiIssuersRotateRootRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIRotateRootRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiIssuersRotateRootRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIRotateRootRequest) HasExcludeCnFromSans() bool` +`func (o *PkiIssuersRotateRootRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -177,27 +177,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIRotateRootRequest) GetFormat() string` +`func (o *PkiIssuersRotateRootRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIRotateRootRequest) GetFormatOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIRotateRootRequest) SetFormat(v string)` +`func (o *PkiIssuersRotateRootRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIRotateRootRequest) HasFormat() bool` +`func (o *PkiIssuersRotateRootRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -206,27 +206,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIRotateRootRequest) GetIpSans() []string` +`func (o *PkiIssuersRotateRootRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIRotateRootRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIRotateRootRequest) SetIpSans(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIRotateRootRequest) HasIpSans() bool` +`func (o *PkiIssuersRotateRootRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -235,27 +235,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerName -`func (o *PKIRotateRootRequest) GetIssuerName() string` +`func (o *PkiIssuersRotateRootRequest) GetIssuerName() string` GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. ### GetIssuerNameOk -`func (o *PKIRotateRootRequest) GetIssuerNameOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetIssuerNameOk() (*string, bool)` GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerName -`func (o *PKIRotateRootRequest) SetIssuerName(v string)` +`func (o *PkiIssuersRotateRootRequest) SetIssuerName(v string)` SetIssuerName sets IssuerName field to given value. ### HasIssuerName -`func (o *PKIRotateRootRequest) HasIssuerName() bool` +`func (o *PkiIssuersRotateRootRequest) HasIssuerName() bool` HasIssuerName returns a boolean if a field has been set. @@ -264,27 +264,27 @@ HasIssuerName returns a boolean if a field has been set. ### GetKeyBits -`func (o *PKIRotateRootRequest) GetKeyBits() int32` +`func (o *PkiIssuersRotateRootRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *PKIRotateRootRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *PkiIssuersRotateRootRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *PKIRotateRootRequest) SetKeyBits(v int32)` +`func (o *PkiIssuersRotateRootRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *PKIRotateRootRequest) HasKeyBits() bool` +`func (o *PkiIssuersRotateRootRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -293,27 +293,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyName -`func (o *PKIRotateRootRequest) GetKeyName() string` +`func (o *PkiIssuersRotateRootRequest) GetKeyName() string` GetKeyName returns the KeyName field if non-nil, zero value otherwise. ### GetKeyNameOk -`func (o *PKIRotateRootRequest) GetKeyNameOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetKeyNameOk() (*string, bool)` GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyName -`func (o *PKIRotateRootRequest) SetKeyName(v string)` +`func (o *PkiIssuersRotateRootRequest) SetKeyName(v string)` SetKeyName sets KeyName field to given value. ### HasKeyName -`func (o *PKIRotateRootRequest) HasKeyName() bool` +`func (o *PkiIssuersRotateRootRequest) HasKeyName() bool` HasKeyName returns a boolean if a field has been set. @@ -322,27 +322,27 @@ HasKeyName returns a boolean if a field has been set. ### GetKeyRef -`func (o *PKIRotateRootRequest) GetKeyRef() string` +`func (o *PkiIssuersRotateRootRequest) GetKeyRef() string` GetKeyRef returns the KeyRef field if non-nil, zero value otherwise. ### GetKeyRefOk -`func (o *PKIRotateRootRequest) GetKeyRefOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetKeyRefOk() (*string, bool)` GetKeyRefOk returns a tuple with the KeyRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyRef -`func (o *PKIRotateRootRequest) SetKeyRef(v string)` +`func (o *PkiIssuersRotateRootRequest) SetKeyRef(v string)` SetKeyRef sets KeyRef field to given value. ### HasKeyRef -`func (o *PKIRotateRootRequest) HasKeyRef() bool` +`func (o *PkiIssuersRotateRootRequest) HasKeyRef() bool` HasKeyRef returns a boolean if a field has been set. @@ -351,27 +351,27 @@ HasKeyRef returns a boolean if a field has been set. ### GetKeyType -`func (o *PKIRotateRootRequest) GetKeyType() string` +`func (o *PkiIssuersRotateRootRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *PKIRotateRootRequest) GetKeyTypeOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *PKIRotateRootRequest) SetKeyType(v string)` +`func (o *PkiIssuersRotateRootRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *PKIRotateRootRequest) HasKeyType() bool` +`func (o *PkiIssuersRotateRootRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -380,27 +380,27 @@ HasKeyType returns a boolean if a field has been set. ### GetLocality -`func (o *PKIRotateRootRequest) GetLocality() []string` +`func (o *PkiIssuersRotateRootRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIRotateRootRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIRotateRootRequest) SetLocality(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIRotateRootRequest) HasLocality() bool` +`func (o *PkiIssuersRotateRootRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -409,27 +409,27 @@ HasLocality returns a boolean if a field has been set. ### GetManagedKeyId -`func (o *PKIRotateRootRequest) GetManagedKeyId() string` +`func (o *PkiIssuersRotateRootRequest) GetManagedKeyId() string` GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. ### GetManagedKeyIdOk -`func (o *PKIRotateRootRequest) GetManagedKeyIdOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetManagedKeyIdOk() (*string, bool)` GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyId -`func (o *PKIRotateRootRequest) SetManagedKeyId(v string)` +`func (o *PkiIssuersRotateRootRequest) SetManagedKeyId(v string)` SetManagedKeyId sets ManagedKeyId field to given value. ### HasManagedKeyId -`func (o *PKIRotateRootRequest) HasManagedKeyId() bool` +`func (o *PkiIssuersRotateRootRequest) HasManagedKeyId() bool` HasManagedKeyId returns a boolean if a field has been set. @@ -438,27 +438,27 @@ HasManagedKeyId returns a boolean if a field has been set. ### GetManagedKeyName -`func (o *PKIRotateRootRequest) GetManagedKeyName() string` +`func (o *PkiIssuersRotateRootRequest) GetManagedKeyName() string` GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. ### GetManagedKeyNameOk -`func (o *PKIRotateRootRequest) GetManagedKeyNameOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetManagedKeyNameOk() (*string, bool)` GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManagedKeyName -`func (o *PKIRotateRootRequest) SetManagedKeyName(v string)` +`func (o *PkiIssuersRotateRootRequest) SetManagedKeyName(v string)` SetManagedKeyName sets ManagedKeyName field to given value. ### HasManagedKeyName -`func (o *PKIRotateRootRequest) HasManagedKeyName() bool` +`func (o *PkiIssuersRotateRootRequest) HasManagedKeyName() bool` HasManagedKeyName returns a boolean if a field has been set. @@ -467,27 +467,27 @@ HasManagedKeyName returns a boolean if a field has been set. ### GetMaxPathLength -`func (o *PKIRotateRootRequest) GetMaxPathLength() int32` +`func (o *PkiIssuersRotateRootRequest) GetMaxPathLength() int32` GetMaxPathLength returns the MaxPathLength field if non-nil, zero value otherwise. ### GetMaxPathLengthOk -`func (o *PKIRotateRootRequest) GetMaxPathLengthOk() (*int32, bool)` +`func (o *PkiIssuersRotateRootRequest) GetMaxPathLengthOk() (*int32, bool)` GetMaxPathLengthOk returns a tuple with the MaxPathLength field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxPathLength -`func (o *PKIRotateRootRequest) SetMaxPathLength(v int32)` +`func (o *PkiIssuersRotateRootRequest) SetMaxPathLength(v int32)` SetMaxPathLength sets MaxPathLength field to given value. ### HasMaxPathLength -`func (o *PKIRotateRootRequest) HasMaxPathLength() bool` +`func (o *PkiIssuersRotateRootRequest) HasMaxPathLength() bool` HasMaxPathLength returns a boolean if a field has been set. @@ -496,27 +496,27 @@ HasMaxPathLength returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIRotateRootRequest) GetNotAfter() string` +`func (o *PkiIssuersRotateRootRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIRotateRootRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIRotateRootRequest) SetNotAfter(v string)` +`func (o *PkiIssuersRotateRootRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIRotateRootRequest) HasNotAfter() bool` +`func (o *PkiIssuersRotateRootRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -525,27 +525,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIRotateRootRequest) GetNotBeforeDuration() int32` +`func (o *PkiIssuersRotateRootRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIRotateRootRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiIssuersRotateRootRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIRotateRootRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiIssuersRotateRootRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIRotateRootRequest) HasNotBeforeDuration() bool` +`func (o *PkiIssuersRotateRootRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -554,27 +554,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIRotateRootRequest) GetOrganization() []string` +`func (o *PkiIssuersRotateRootRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIRotateRootRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIRotateRootRequest) SetOrganization(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIRotateRootRequest) HasOrganization() bool` +`func (o *PkiIssuersRotateRootRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -583,27 +583,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIRotateRootRequest) GetOtherSans() []string` +`func (o *PkiIssuersRotateRootRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIRotateRootRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIRotateRootRequest) SetOtherSans(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIRotateRootRequest) HasOtherSans() bool` +`func (o *PkiIssuersRotateRootRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -612,27 +612,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIRotateRootRequest) GetOu() []string` +`func (o *PkiIssuersRotateRootRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIRotateRootRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIRotateRootRequest) SetOu(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIRotateRootRequest) HasOu() bool` +`func (o *PkiIssuersRotateRootRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -641,27 +641,27 @@ HasOu returns a boolean if a field has been set. ### GetPermittedDnsDomains -`func (o *PKIRotateRootRequest) GetPermittedDnsDomains() []string` +`func (o *PkiIssuersRotateRootRequest) GetPermittedDnsDomains() []string` GetPermittedDnsDomains returns the PermittedDnsDomains field if non-nil, zero value otherwise. ### GetPermittedDnsDomainsOk -`func (o *PKIRotateRootRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` GetPermittedDnsDomainsOk returns a tuple with the PermittedDnsDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPermittedDnsDomains -`func (o *PKIRotateRootRequest) SetPermittedDnsDomains(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetPermittedDnsDomains(v []string)` SetPermittedDnsDomains sets PermittedDnsDomains field to given value. ### HasPermittedDnsDomains -`func (o *PKIRotateRootRequest) HasPermittedDnsDomains() bool` +`func (o *PkiIssuersRotateRootRequest) HasPermittedDnsDomains() bool` HasPermittedDnsDomains returns a boolean if a field has been set. @@ -670,27 +670,27 @@ HasPermittedDnsDomains returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIRotateRootRequest) GetPostalCode() []string` +`func (o *PkiIssuersRotateRootRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIRotateRootRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIRotateRootRequest) SetPostalCode(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIRotateRootRequest) HasPostalCode() bool` +`func (o *PkiIssuersRotateRootRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -699,27 +699,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIRotateRootRequest) GetPrivateKeyFormat() string` +`func (o *PkiIssuersRotateRootRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIRotateRootRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIRotateRootRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiIssuersRotateRootRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIRotateRootRequest) HasPrivateKeyFormat() bool` +`func (o *PkiIssuersRotateRootRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -728,27 +728,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIRotateRootRequest) GetProvince() []string` +`func (o *PkiIssuersRotateRootRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIRotateRootRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIRotateRootRequest) SetProvince(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIRotateRootRequest) HasProvince() bool` +`func (o *PkiIssuersRotateRootRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -757,27 +757,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIRotateRootRequest) GetSerialNumber() string` +`func (o *PkiIssuersRotateRootRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIRotateRootRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIRotateRootRequest) SetSerialNumber(v string)` +`func (o *PkiIssuersRotateRootRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIRotateRootRequest) HasSerialNumber() bool` +`func (o *PkiIssuersRotateRootRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -786,27 +786,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIRotateRootRequest) GetSignatureBits() int32` +`func (o *PkiIssuersRotateRootRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIRotateRootRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiIssuersRotateRootRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIRotateRootRequest) SetSignatureBits(v int32)` +`func (o *PkiIssuersRotateRootRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIRotateRootRequest) HasSignatureBits() bool` +`func (o *PkiIssuersRotateRootRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -815,27 +815,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIRotateRootRequest) GetStreetAddress() []string` +`func (o *PkiIssuersRotateRootRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIRotateRootRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIRotateRootRequest) SetStreetAddress(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIRotateRootRequest) HasStreetAddress() bool` +`func (o *PkiIssuersRotateRootRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -844,27 +844,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIRotateRootRequest) GetTtl() int32` +`func (o *PkiIssuersRotateRootRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIRotateRootRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiIssuersRotateRootRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIRotateRootRequest) SetTtl(v int32)` +`func (o *PkiIssuersRotateRootRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIRotateRootRequest) HasTtl() bool` +`func (o *PkiIssuersRotateRootRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -873,27 +873,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIRotateRootRequest) GetUriSans() []string` +`func (o *PkiIssuersRotateRootRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIRotateRootRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiIssuersRotateRootRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIRotateRootRequest) SetUriSans(v []string)` +`func (o *PkiIssuersRotateRootRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIRotateRootRequest) HasUriSans() bool` +`func (o *PkiIssuersRotateRootRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -902,27 +902,27 @@ HasUriSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIRotateRootRequest) GetUsePss() bool` +`func (o *PkiIssuersRotateRootRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIRotateRootRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiIssuersRotateRootRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIRotateRootRequest) SetUsePss(v bool)` +`func (o *PkiIssuersRotateRootRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIRotateRootRequest) HasUsePss() bool` +`func (o *PkiIssuersRotateRootRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. diff --git a/docs/PkiIssuersRotateRootResponse.md b/docs/PkiIssuersRotateRootResponse.md new file mode 100644 index 00000000..5cbedfbe --- /dev/null +++ b/docs/PkiIssuersRotateRootResponse.md @@ -0,0 +1,309 @@ +# PkiIssuersRotateRootResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Certificate** | Pointer to **string** | The generated self-signed CA certificate. | [optional] +**Expiration** | Pointer to **string** | The expiration of the given. | [optional] +**IssuerId** | Pointer to **string** | The ID of the issuer | [optional] +**IssuerName** | Pointer to **string** | The name of the issuer. | [optional] +**IssuingCa** | Pointer to **string** | The issuing certificate authority. | [optional] +**KeyId** | Pointer to **string** | The ID of the key. | [optional] +**KeyName** | Pointer to **string** | The key name if given. | [optional] +**PrivateKey** | Pointer to **string** | The private key if exported was specified. | [optional] +**SerialNumber** | Pointer to **string** | The requested Subject's named serial number. | [optional] + + + +## Methods + + +### NewPkiIssuersRotateRootResponse + +`func NewPkiIssuersRotateRootResponse() *PkiIssuersRotateRootResponse` + +NewPkiIssuersRotateRootResponse instantiates a new PkiIssuersRotateRootResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiIssuersRotateRootResponseWithDefaults + +`func NewPkiIssuersRotateRootResponseWithDefaults() *PkiIssuersRotateRootResponse` + +NewPkiIssuersRotateRootResponseWithDefaults instantiates a new PkiIssuersRotateRootResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCertificate + +`func (o *PkiIssuersRotateRootResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiIssuersRotateRootResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiIssuersRotateRootResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiIssuersRotateRootResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiIssuersRotateRootResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiIssuersRotateRootResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiIssuersRotateRootResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiIssuersRotateRootResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiIssuersRotateRootResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiIssuersRotateRootResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiIssuersRotateRootResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiIssuersRotateRootResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiIssuersRotateRootResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiIssuersRotateRootResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiIssuersRotateRootResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiIssuersRotateRootResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiIssuersRotateRootResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiIssuersRotateRootResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiIssuersRotateRootResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiIssuersRotateRootResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiIssuersRotateRootResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiIssuersRotateRootResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiIssuersRotateRootResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiIssuersRotateRootResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiIssuersRotateRootResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiIssuersRotateRootResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiIssuersRotateRootResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiIssuersRotateRootResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiIssuersRotateRootResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiIssuersRotateRootResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiIssuersRotateRootResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiIssuersRotateRootResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiIssuersRotateRootResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiIssuersRotateRootResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiIssuersRotateRootResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiIssuersRotateRootResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiListCertsResponse.md b/docs/PkiListCertsResponse.md new file mode 100644 index 00000000..aeff3039 --- /dev/null +++ b/docs/PkiListCertsResponse.md @@ -0,0 +1,69 @@ +# PkiListCertsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | A list of keys | [optional] + + + +## Methods + + +### NewPkiListCertsResponse + +`func NewPkiListCertsResponse() *PkiListCertsResponse` + +NewPkiListCertsResponse instantiates a new PkiListCertsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiListCertsResponseWithDefaults + +`func NewPkiListCertsResponseWithDefaults() *PkiListCertsResponse` + +NewPkiListCertsResponseWithDefaults instantiates a new PkiListCertsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *PkiListCertsResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PkiListCertsResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PkiListCertsResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PkiListCertsResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiListIssuersResponse.md b/docs/PkiListIssuersResponse.md new file mode 100644 index 00000000..92ea1672 --- /dev/null +++ b/docs/PkiListIssuersResponse.md @@ -0,0 +1,99 @@ +# PkiListIssuersResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyInfo** | Pointer to **map[string]interface{}** | Key info with issuer name | [optional] +**Keys** | Pointer to **[]string** | A list of keys | [optional] + + + +## Methods + + +### NewPkiListIssuersResponse + +`func NewPkiListIssuersResponse() *PkiListIssuersResponse` + +NewPkiListIssuersResponse instantiates a new PkiListIssuersResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiListIssuersResponseWithDefaults + +`func NewPkiListIssuersResponseWithDefaults() *PkiListIssuersResponse` + +NewPkiListIssuersResponseWithDefaults instantiates a new PkiListIssuersResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyInfo + +`func (o *PkiListIssuersResponse) GetKeyInfo() map[string]interface{}` + +GetKeyInfo returns the KeyInfo field if non-nil, zero value otherwise. + +### GetKeyInfoOk + +`func (o *PkiListIssuersResponse) GetKeyInfoOk() (*map[string]interface{}, bool)` + +GetKeyInfoOk returns a tuple with the KeyInfo field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyInfo + +`func (o *PkiListIssuersResponse) SetKeyInfo(v map[string]interface{})` + +SetKeyInfo sets KeyInfo field to given value. + + +### HasKeyInfo + +`func (o *PkiListIssuersResponse) HasKeyInfo() bool` + +HasKeyInfo returns a boolean if a field has been set. + + + + +### GetKeys + +`func (o *PkiListIssuersResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PkiListIssuersResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PkiListIssuersResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PkiListIssuersResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiListKeysResponse.md b/docs/PkiListKeysResponse.md new file mode 100644 index 00000000..045db512 --- /dev/null +++ b/docs/PkiListKeysResponse.md @@ -0,0 +1,99 @@ +# PkiListKeysResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyInfo** | Pointer to **map[string]interface{}** | Key info with issuer name | [optional] +**Keys** | Pointer to **[]string** | A list of keys | [optional] + + + +## Methods + + +### NewPkiListKeysResponse + +`func NewPkiListKeysResponse() *PkiListKeysResponse` + +NewPkiListKeysResponse instantiates a new PkiListKeysResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiListKeysResponseWithDefaults + +`func NewPkiListKeysResponseWithDefaults() *PkiListKeysResponse` + +NewPkiListKeysResponseWithDefaults instantiates a new PkiListKeysResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyInfo + +`func (o *PkiListKeysResponse) GetKeyInfo() map[string]interface{}` + +GetKeyInfo returns the KeyInfo field if non-nil, zero value otherwise. + +### GetKeyInfoOk + +`func (o *PkiListKeysResponse) GetKeyInfoOk() (*map[string]interface{}, bool)` + +GetKeyInfoOk returns a tuple with the KeyInfo field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyInfo + +`func (o *PkiListKeysResponse) SetKeyInfo(v map[string]interface{})` + +SetKeyInfo sets KeyInfo field to given value. + + +### HasKeyInfo + +`func (o *PkiListKeysResponse) HasKeyInfo() bool` + +HasKeyInfo returns a boolean if a field has been set. + + + + +### GetKeys + +`func (o *PkiListKeysResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PkiListKeysResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PkiListKeysResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PkiListKeysResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiListRevokedCertsResponse.md b/docs/PkiListRevokedCertsResponse.md new file mode 100644 index 00000000..f3b0cb2c --- /dev/null +++ b/docs/PkiListRevokedCertsResponse.md @@ -0,0 +1,69 @@ +# PkiListRevokedCertsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | List of Keys | [optional] + + + +## Methods + + +### NewPkiListRevokedCertsResponse + +`func NewPkiListRevokedCertsResponse() *PkiListRevokedCertsResponse` + +NewPkiListRevokedCertsResponse instantiates a new PkiListRevokedCertsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiListRevokedCertsResponseWithDefaults + +`func NewPkiListRevokedCertsResponseWithDefaults() *PkiListRevokedCertsResponse` + +NewPkiListRevokedCertsResponseWithDefaults instantiates a new PkiListRevokedCertsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *PkiListRevokedCertsResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PkiListRevokedCertsResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PkiListRevokedCertsResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PkiListRevokedCertsResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiListRolesResponse.md b/docs/PkiListRolesResponse.md new file mode 100644 index 00000000..66a6413e --- /dev/null +++ b/docs/PkiListRolesResponse.md @@ -0,0 +1,69 @@ +# PkiListRolesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **map[string]interface{}** | List of keys | [optional] + + + +## Methods + + +### NewPkiListRolesResponse + +`func NewPkiListRolesResponse() *PkiListRolesResponse` + +NewPkiListRolesResponse instantiates a new PkiListRolesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiListRolesResponseWithDefaults + +`func NewPkiListRolesResponseWithDefaults() *PkiListRolesResponse` + +NewPkiListRolesResponseWithDefaults instantiates a new PkiListRolesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *PkiListRolesResponse) GetKeys() map[string]interface{}` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PkiListRolesResponse) GetKeysOk() (*map[string]interface{}, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PkiListRolesResponse) SetKeys(v map[string]interface{})` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PkiListRolesResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiPatchIssuerResponse.md b/docs/PkiPatchIssuerResponse.md new file mode 100644 index 00000000..ad6bcb96 --- /dev/null +++ b/docs/PkiPatchIssuerResponse.md @@ -0,0 +1,489 @@ +# PkiPatchIssuerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**CrlDistributionPoints** | Pointer to **[]string** | CRL Distribution Points | [optional] +**IssuerId** | Pointer to **string** | Issuer Id | [optional] +**IssuerName** | Pointer to **string** | Issuer Name | [optional] +**IssuingCertificates** | Pointer to **[]string** | Issuing Certificates | [optional] +**KeyId** | Pointer to **string** | Key Id | [optional] +**LeafNotAfterBehavior** | Pointer to **string** | Leaf Not After Behavior | [optional] +**ManualChain** | Pointer to **[]string** | Manual Chain | [optional] +**OcspServers** | Pointer to **[]string** | OSCP Servers | [optional] +**RevocationSignatureAlgorithm** | Pointer to **string** | Revocation Signature Alogrithm | [optional] +**RevocationTime** | Pointer to **int32** | | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | | [optional] +**Revoked** | Pointer to **bool** | Revoked | [optional] +**Usage** | Pointer to **[]string** | Usage | [optional] + + + +## Methods + + +### NewPkiPatchIssuerResponse + +`func NewPkiPatchIssuerResponse() *PkiPatchIssuerResponse` + +NewPkiPatchIssuerResponse instantiates a new PkiPatchIssuerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiPatchIssuerResponseWithDefaults + +`func NewPkiPatchIssuerResponseWithDefaults() *PkiPatchIssuerResponse` + +NewPkiPatchIssuerResponseWithDefaults instantiates a new PkiPatchIssuerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiPatchIssuerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiPatchIssuerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiPatchIssuerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiPatchIssuerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiPatchIssuerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiPatchIssuerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiPatchIssuerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiPatchIssuerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetCrlDistributionPoints + +`func (o *PkiPatchIssuerResponse) GetCrlDistributionPoints() []string` + +GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. + +### GetCrlDistributionPointsOk + +`func (o *PkiPatchIssuerResponse) GetCrlDistributionPointsOk() (*[]string, bool)` + +GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrlDistributionPoints + +`func (o *PkiPatchIssuerResponse) SetCrlDistributionPoints(v []string)` + +SetCrlDistributionPoints sets CrlDistributionPoints field to given value. + + +### HasCrlDistributionPoints + +`func (o *PkiPatchIssuerResponse) HasCrlDistributionPoints() bool` + +HasCrlDistributionPoints returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiPatchIssuerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiPatchIssuerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiPatchIssuerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiPatchIssuerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiPatchIssuerResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiPatchIssuerResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiPatchIssuerResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiPatchIssuerResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + +### GetIssuingCertificates + +`func (o *PkiPatchIssuerResponse) GetIssuingCertificates() []string` + +GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. + +### GetIssuingCertificatesOk + +`func (o *PkiPatchIssuerResponse) GetIssuingCertificatesOk() (*[]string, bool)` + +GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCertificates + +`func (o *PkiPatchIssuerResponse) SetIssuingCertificates(v []string)` + +SetIssuingCertificates sets IssuingCertificates field to given value. + + +### HasIssuingCertificates + +`func (o *PkiPatchIssuerResponse) HasIssuingCertificates() bool` + +HasIssuingCertificates returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiPatchIssuerResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiPatchIssuerResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiPatchIssuerResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiPatchIssuerResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetLeafNotAfterBehavior + +`func (o *PkiPatchIssuerResponse) GetLeafNotAfterBehavior() string` + +GetLeafNotAfterBehavior returns the LeafNotAfterBehavior field if non-nil, zero value otherwise. + +### GetLeafNotAfterBehaviorOk + +`func (o *PkiPatchIssuerResponse) GetLeafNotAfterBehaviorOk() (*string, bool)` + +GetLeafNotAfterBehaviorOk returns a tuple with the LeafNotAfterBehavior field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeafNotAfterBehavior + +`func (o *PkiPatchIssuerResponse) SetLeafNotAfterBehavior(v string)` + +SetLeafNotAfterBehavior sets LeafNotAfterBehavior field to given value. + + +### HasLeafNotAfterBehavior + +`func (o *PkiPatchIssuerResponse) HasLeafNotAfterBehavior() bool` + +HasLeafNotAfterBehavior returns a boolean if a field has been set. + + + + +### GetManualChain + +`func (o *PkiPatchIssuerResponse) GetManualChain() []string` + +GetManualChain returns the ManualChain field if non-nil, zero value otherwise. + +### GetManualChainOk + +`func (o *PkiPatchIssuerResponse) GetManualChainOk() (*[]string, bool)` + +GetManualChainOk returns a tuple with the ManualChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManualChain + +`func (o *PkiPatchIssuerResponse) SetManualChain(v []string)` + +SetManualChain sets ManualChain field to given value. + + +### HasManualChain + +`func (o *PkiPatchIssuerResponse) HasManualChain() bool` + +HasManualChain returns a boolean if a field has been set. + + + + +### GetOcspServers + +`func (o *PkiPatchIssuerResponse) GetOcspServers() []string` + +GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. + +### GetOcspServersOk + +`func (o *PkiPatchIssuerResponse) GetOcspServersOk() (*[]string, bool)` + +GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspServers + +`func (o *PkiPatchIssuerResponse) SetOcspServers(v []string)` + +SetOcspServers sets OcspServers field to given value. + + +### HasOcspServers + +`func (o *PkiPatchIssuerResponse) HasOcspServers() bool` + +HasOcspServers returns a boolean if a field has been set. + + + + +### GetRevocationSignatureAlgorithm + +`func (o *PkiPatchIssuerResponse) GetRevocationSignatureAlgorithm() string` + +GetRevocationSignatureAlgorithm returns the RevocationSignatureAlgorithm field if non-nil, zero value otherwise. + +### GetRevocationSignatureAlgorithmOk + +`func (o *PkiPatchIssuerResponse) GetRevocationSignatureAlgorithmOk() (*string, bool)` + +GetRevocationSignatureAlgorithmOk returns a tuple with the RevocationSignatureAlgorithm field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationSignatureAlgorithm + +`func (o *PkiPatchIssuerResponse) SetRevocationSignatureAlgorithm(v string)` + +SetRevocationSignatureAlgorithm sets RevocationSignatureAlgorithm field to given value. + + +### HasRevocationSignatureAlgorithm + +`func (o *PkiPatchIssuerResponse) HasRevocationSignatureAlgorithm() bool` + +HasRevocationSignatureAlgorithm returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiPatchIssuerResponse) GetRevocationTime() int32` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiPatchIssuerResponse) GetRevocationTimeOk() (*int32, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiPatchIssuerResponse) SetRevocationTime(v int32)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiPatchIssuerResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiPatchIssuerResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiPatchIssuerResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiPatchIssuerResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiPatchIssuerResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + +### GetRevoked + +`func (o *PkiPatchIssuerResponse) GetRevoked() bool` + +GetRevoked returns the Revoked field if non-nil, zero value otherwise. + +### GetRevokedOk + +`func (o *PkiPatchIssuerResponse) GetRevokedOk() (*bool, bool)` + +GetRevokedOk returns a tuple with the Revoked field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevoked + +`func (o *PkiPatchIssuerResponse) SetRevoked(v bool)` + +SetRevoked sets Revoked field to given value. + + +### HasRevoked + +`func (o *PkiPatchIssuerResponse) HasRevoked() bool` + +HasRevoked returns a boolean if a field has been set. + + + + +### GetUsage + +`func (o *PkiPatchIssuerResponse) GetUsage() []string` + +GetUsage returns the Usage field if non-nil, zero value otherwise. + +### GetUsageOk + +`func (o *PkiPatchIssuerResponse) GetUsageOk() (*[]string, bool)` + +GetUsageOk returns a tuple with the Usage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUsage + +`func (o *PkiPatchIssuerResponse) SetUsage(v []string)` + +SetUsage sets Usage field to given value. + + +### HasUsage + +`func (o *PkiPatchIssuerResponse) HasUsage() bool` + +HasUsage returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiPatchRoleResponse.md b/docs/PkiPatchRoleResponse.md new file mode 100644 index 00000000..baac0911 --- /dev/null +++ b/docs/PkiPatchRoleResponse.md @@ -0,0 +1,1449 @@ +# PkiPatchRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AllowAnyName** | Pointer to **bool** | If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. | [optional] +**AllowBareDomains** | Pointer to **bool** | If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information. | [optional] +**AllowGlobDomains** | Pointer to **bool** | If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information. | [optional] +**AllowIpSans** | Pointer to **bool** | If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed. | [optional] +**AllowLocalhost** | Pointer to **bool** | Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. | [optional] +**AllowSubdomains** | Pointer to **bool** | If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information. | [optional] +**AllowTokenDisplayname** | Pointer to **bool** | Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. | [optional] +**AllowWildcardCertificates** | Pointer to **bool** | If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information. | [optional] +**AllowedDomains** | Pointer to **[]string** | Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains. | [optional] +**AllowedDomainsTemplate** | Pointer to **bool** | If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. | [optional] +**AllowedOtherSans** | Pointer to **[]string** | If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format <oid>;<type>:<value>. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8). | [optional] +**AllowedSerialNumbers** | Pointer to **[]string** | If set, an array of allowed serial numbers to put in Subject. These values support globbing. | [optional] +**AllowedUriSans** | Pointer to **[]string** | If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. | [optional] +**AllowedUriSansTemplate** | Pointer to **bool** | If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. | [optional] +**AllowedUserIds** | Pointer to **[]string** | If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 | [optional] +**BasicConstraintsValidForNonCa** | Pointer to **bool** | Mark Basic Constraints valid when issuing non-CA certificates. | [optional] +**ClientFlag** | Pointer to **bool** | If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. | [optional] +**CnValidations** | Pointer to **[]string** | List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs. | [optional] +**CodeSigningFlag** | Pointer to **bool** | If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12. | [optional] +**Country** | Pointer to **[]string** | If set, Country will be set to this value in certificates issued by this role. | [optional] +**EmailProtectionFlag** | Pointer to **bool** | If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12. | [optional] +**EnforceHostnames** | Pointer to **bool** | If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true. | [optional] +**ExtKeyUsage** | Pointer to **[]string** | A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12. | [optional] +**ExtKeyUsageOids** | Pointer to **[]string** | A comma-separated string or list of extended key usage oids. | [optional] +**GenerateLease** | Pointer to **bool** | If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke <lease_id>\" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault. | [optional] +**IssuerRef** | Pointer to **string** | Reference to the issuer used to sign requests serviced by this role. | [optional] +**KeyBits** | Pointer to **int32** | The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values. | [optional] +**KeyUsage** | Pointer to **[]string** | A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3. | [optional] +**Locality** | Pointer to **[]string** | If set, Locality will be set to this value in certificates issued by this role. | [optional] +**MaxTtl** | Pointer to **int32** | The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL. | [optional] +**NoStore** | Pointer to **bool** | If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\". | [optional] +**NotAfter** | Pointer to **string** | Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. | [optional] +**NotBeforeDuration** | Pointer to **int32** | The duration before now which the certificate needs to be backdated by. | [optional] +**Organization** | Pointer to **[]string** | If set, O (Organization) will be set to this value in certificates issued by this role. | [optional] +**Ou** | Pointer to **[]string** | If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role. | [optional] +**PolicyIdentifiers** | Pointer to **[]string** | A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}]. | [optional] +**PostalCode** | Pointer to **[]string** | If set, Postal Code will be set to this value in certificates issued by this role. | [optional] +**Province** | Pointer to **[]string** | If set, Province will be set to this value in certificates issued by this role. | [optional] +**RequireCn** | Pointer to **bool** | If set to false, makes the 'common_name' field optional while generating a certificate. | [optional] +**ServerFlag** | Pointer to **bool** | If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. | [optional] [default to true] +**SignatureBits** | Pointer to **int32** | The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). | [optional] +**StreetAddress** | Pointer to **[]string** | If set, Street Address will be set to this value in certificates issued by this role. | [optional] +**Ttl** | Pointer to **int32** | The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter. | [optional] +**UseCsrCommonName** | Pointer to **bool** | If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true. | [optional] +**UseCsrSans** | Pointer to **bool** | If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true. | [optional] +**UsePss** | Pointer to **bool** | Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. | [optional] + + + +## Methods + + +### NewPkiPatchRoleResponse + +`func NewPkiPatchRoleResponse() *PkiPatchRoleResponse` + +NewPkiPatchRoleResponse instantiates a new PkiPatchRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiPatchRoleResponseWithDefaults + +`func NewPkiPatchRoleResponseWithDefaults() *PkiPatchRoleResponse` + +NewPkiPatchRoleResponseWithDefaults instantiates a new PkiPatchRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAllowAnyName + +`func (o *PkiPatchRoleResponse) GetAllowAnyName() bool` + +GetAllowAnyName returns the AllowAnyName field if non-nil, zero value otherwise. + +### GetAllowAnyNameOk + +`func (o *PkiPatchRoleResponse) GetAllowAnyNameOk() (*bool, bool)` + +GetAllowAnyNameOk returns a tuple with the AllowAnyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowAnyName + +`func (o *PkiPatchRoleResponse) SetAllowAnyName(v bool)` + +SetAllowAnyName sets AllowAnyName field to given value. + + +### HasAllowAnyName + +`func (o *PkiPatchRoleResponse) HasAllowAnyName() bool` + +HasAllowAnyName returns a boolean if a field has been set. + + + + +### GetAllowBareDomains + +`func (o *PkiPatchRoleResponse) GetAllowBareDomains() bool` + +GetAllowBareDomains returns the AllowBareDomains field if non-nil, zero value otherwise. + +### GetAllowBareDomainsOk + +`func (o *PkiPatchRoleResponse) GetAllowBareDomainsOk() (*bool, bool)` + +GetAllowBareDomainsOk returns a tuple with the AllowBareDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowBareDomains + +`func (o *PkiPatchRoleResponse) SetAllowBareDomains(v bool)` + +SetAllowBareDomains sets AllowBareDomains field to given value. + + +### HasAllowBareDomains + +`func (o *PkiPatchRoleResponse) HasAllowBareDomains() bool` + +HasAllowBareDomains returns a boolean if a field has been set. + + + + +### GetAllowGlobDomains + +`func (o *PkiPatchRoleResponse) GetAllowGlobDomains() bool` + +GetAllowGlobDomains returns the AllowGlobDomains field if non-nil, zero value otherwise. + +### GetAllowGlobDomainsOk + +`func (o *PkiPatchRoleResponse) GetAllowGlobDomainsOk() (*bool, bool)` + +GetAllowGlobDomainsOk returns a tuple with the AllowGlobDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowGlobDomains + +`func (o *PkiPatchRoleResponse) SetAllowGlobDomains(v bool)` + +SetAllowGlobDomains sets AllowGlobDomains field to given value. + + +### HasAllowGlobDomains + +`func (o *PkiPatchRoleResponse) HasAllowGlobDomains() bool` + +HasAllowGlobDomains returns a boolean if a field has been set. + + + + +### GetAllowIpSans + +`func (o *PkiPatchRoleResponse) GetAllowIpSans() bool` + +GetAllowIpSans returns the AllowIpSans field if non-nil, zero value otherwise. + +### GetAllowIpSansOk + +`func (o *PkiPatchRoleResponse) GetAllowIpSansOk() (*bool, bool)` + +GetAllowIpSansOk returns a tuple with the AllowIpSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowIpSans + +`func (o *PkiPatchRoleResponse) SetAllowIpSans(v bool)` + +SetAllowIpSans sets AllowIpSans field to given value. + + +### HasAllowIpSans + +`func (o *PkiPatchRoleResponse) HasAllowIpSans() bool` + +HasAllowIpSans returns a boolean if a field has been set. + + + + +### GetAllowLocalhost + +`func (o *PkiPatchRoleResponse) GetAllowLocalhost() bool` + +GetAllowLocalhost returns the AllowLocalhost field if non-nil, zero value otherwise. + +### GetAllowLocalhostOk + +`func (o *PkiPatchRoleResponse) GetAllowLocalhostOk() (*bool, bool)` + +GetAllowLocalhostOk returns a tuple with the AllowLocalhost field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowLocalhost + +`func (o *PkiPatchRoleResponse) SetAllowLocalhost(v bool)` + +SetAllowLocalhost sets AllowLocalhost field to given value. + + +### HasAllowLocalhost + +`func (o *PkiPatchRoleResponse) HasAllowLocalhost() bool` + +HasAllowLocalhost returns a boolean if a field has been set. + + + + +### GetAllowSubdomains + +`func (o *PkiPatchRoleResponse) GetAllowSubdomains() bool` + +GetAllowSubdomains returns the AllowSubdomains field if non-nil, zero value otherwise. + +### GetAllowSubdomainsOk + +`func (o *PkiPatchRoleResponse) GetAllowSubdomainsOk() (*bool, bool)` + +GetAllowSubdomainsOk returns a tuple with the AllowSubdomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowSubdomains + +`func (o *PkiPatchRoleResponse) SetAllowSubdomains(v bool)` + +SetAllowSubdomains sets AllowSubdomains field to given value. + + +### HasAllowSubdomains + +`func (o *PkiPatchRoleResponse) HasAllowSubdomains() bool` + +HasAllowSubdomains returns a boolean if a field has been set. + + + + +### GetAllowTokenDisplayname + +`func (o *PkiPatchRoleResponse) GetAllowTokenDisplayname() bool` + +GetAllowTokenDisplayname returns the AllowTokenDisplayname field if non-nil, zero value otherwise. + +### GetAllowTokenDisplaynameOk + +`func (o *PkiPatchRoleResponse) GetAllowTokenDisplaynameOk() (*bool, bool)` + +GetAllowTokenDisplaynameOk returns a tuple with the AllowTokenDisplayname field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowTokenDisplayname + +`func (o *PkiPatchRoleResponse) SetAllowTokenDisplayname(v bool)` + +SetAllowTokenDisplayname sets AllowTokenDisplayname field to given value. + + +### HasAllowTokenDisplayname + +`func (o *PkiPatchRoleResponse) HasAllowTokenDisplayname() bool` + +HasAllowTokenDisplayname returns a boolean if a field has been set. + + + + +### GetAllowWildcardCertificates + +`func (o *PkiPatchRoleResponse) GetAllowWildcardCertificates() bool` + +GetAllowWildcardCertificates returns the AllowWildcardCertificates field if non-nil, zero value otherwise. + +### GetAllowWildcardCertificatesOk + +`func (o *PkiPatchRoleResponse) GetAllowWildcardCertificatesOk() (*bool, bool)` + +GetAllowWildcardCertificatesOk returns a tuple with the AllowWildcardCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowWildcardCertificates + +`func (o *PkiPatchRoleResponse) SetAllowWildcardCertificates(v bool)` + +SetAllowWildcardCertificates sets AllowWildcardCertificates field to given value. + + +### HasAllowWildcardCertificates + +`func (o *PkiPatchRoleResponse) HasAllowWildcardCertificates() bool` + +HasAllowWildcardCertificates returns a boolean if a field has been set. + + + + +### GetAllowedDomains + +`func (o *PkiPatchRoleResponse) GetAllowedDomains() []string` + +GetAllowedDomains returns the AllowedDomains field if non-nil, zero value otherwise. + +### GetAllowedDomainsOk + +`func (o *PkiPatchRoleResponse) GetAllowedDomainsOk() (*[]string, bool)` + +GetAllowedDomainsOk returns a tuple with the AllowedDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedDomains + +`func (o *PkiPatchRoleResponse) SetAllowedDomains(v []string)` + +SetAllowedDomains sets AllowedDomains field to given value. + + +### HasAllowedDomains + +`func (o *PkiPatchRoleResponse) HasAllowedDomains() bool` + +HasAllowedDomains returns a boolean if a field has been set. + + + + +### GetAllowedDomainsTemplate + +`func (o *PkiPatchRoleResponse) GetAllowedDomainsTemplate() bool` + +GetAllowedDomainsTemplate returns the AllowedDomainsTemplate field if non-nil, zero value otherwise. + +### GetAllowedDomainsTemplateOk + +`func (o *PkiPatchRoleResponse) GetAllowedDomainsTemplateOk() (*bool, bool)` + +GetAllowedDomainsTemplateOk returns a tuple with the AllowedDomainsTemplate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedDomainsTemplate + +`func (o *PkiPatchRoleResponse) SetAllowedDomainsTemplate(v bool)` + +SetAllowedDomainsTemplate sets AllowedDomainsTemplate field to given value. + + +### HasAllowedDomainsTemplate + +`func (o *PkiPatchRoleResponse) HasAllowedDomainsTemplate() bool` + +HasAllowedDomainsTemplate returns a boolean if a field has been set. + + + + +### GetAllowedOtherSans + +`func (o *PkiPatchRoleResponse) GetAllowedOtherSans() []string` + +GetAllowedOtherSans returns the AllowedOtherSans field if non-nil, zero value otherwise. + +### GetAllowedOtherSansOk + +`func (o *PkiPatchRoleResponse) GetAllowedOtherSansOk() (*[]string, bool)` + +GetAllowedOtherSansOk returns a tuple with the AllowedOtherSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedOtherSans + +`func (o *PkiPatchRoleResponse) SetAllowedOtherSans(v []string)` + +SetAllowedOtherSans sets AllowedOtherSans field to given value. + + +### HasAllowedOtherSans + +`func (o *PkiPatchRoleResponse) HasAllowedOtherSans() bool` + +HasAllowedOtherSans returns a boolean if a field has been set. + + + + +### GetAllowedSerialNumbers + +`func (o *PkiPatchRoleResponse) GetAllowedSerialNumbers() []string` + +GetAllowedSerialNumbers returns the AllowedSerialNumbers field if non-nil, zero value otherwise. + +### GetAllowedSerialNumbersOk + +`func (o *PkiPatchRoleResponse) GetAllowedSerialNumbersOk() (*[]string, bool)` + +GetAllowedSerialNumbersOk returns a tuple with the AllowedSerialNumbers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedSerialNumbers + +`func (o *PkiPatchRoleResponse) SetAllowedSerialNumbers(v []string)` + +SetAllowedSerialNumbers sets AllowedSerialNumbers field to given value. + + +### HasAllowedSerialNumbers + +`func (o *PkiPatchRoleResponse) HasAllowedSerialNumbers() bool` + +HasAllowedSerialNumbers returns a boolean if a field has been set. + + + + +### GetAllowedUriSans + +`func (o *PkiPatchRoleResponse) GetAllowedUriSans() []string` + +GetAllowedUriSans returns the AllowedUriSans field if non-nil, zero value otherwise. + +### GetAllowedUriSansOk + +`func (o *PkiPatchRoleResponse) GetAllowedUriSansOk() (*[]string, bool)` + +GetAllowedUriSansOk returns a tuple with the AllowedUriSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUriSans + +`func (o *PkiPatchRoleResponse) SetAllowedUriSans(v []string)` + +SetAllowedUriSans sets AllowedUriSans field to given value. + + +### HasAllowedUriSans + +`func (o *PkiPatchRoleResponse) HasAllowedUriSans() bool` + +HasAllowedUriSans returns a boolean if a field has been set. + + + + +### GetAllowedUriSansTemplate + +`func (o *PkiPatchRoleResponse) GetAllowedUriSansTemplate() bool` + +GetAllowedUriSansTemplate returns the AllowedUriSansTemplate field if non-nil, zero value otherwise. + +### GetAllowedUriSansTemplateOk + +`func (o *PkiPatchRoleResponse) GetAllowedUriSansTemplateOk() (*bool, bool)` + +GetAllowedUriSansTemplateOk returns a tuple with the AllowedUriSansTemplate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUriSansTemplate + +`func (o *PkiPatchRoleResponse) SetAllowedUriSansTemplate(v bool)` + +SetAllowedUriSansTemplate sets AllowedUriSansTemplate field to given value. + + +### HasAllowedUriSansTemplate + +`func (o *PkiPatchRoleResponse) HasAllowedUriSansTemplate() bool` + +HasAllowedUriSansTemplate returns a boolean if a field has been set. + + + + +### GetAllowedUserIds + +`func (o *PkiPatchRoleResponse) GetAllowedUserIds() []string` + +GetAllowedUserIds returns the AllowedUserIds field if non-nil, zero value otherwise. + +### GetAllowedUserIdsOk + +`func (o *PkiPatchRoleResponse) GetAllowedUserIdsOk() (*[]string, bool)` + +GetAllowedUserIdsOk returns a tuple with the AllowedUserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUserIds + +`func (o *PkiPatchRoleResponse) SetAllowedUserIds(v []string)` + +SetAllowedUserIds sets AllowedUserIds field to given value. + + +### HasAllowedUserIds + +`func (o *PkiPatchRoleResponse) HasAllowedUserIds() bool` + +HasAllowedUserIds returns a boolean if a field has been set. + + + + +### GetBasicConstraintsValidForNonCa + +`func (o *PkiPatchRoleResponse) GetBasicConstraintsValidForNonCa() bool` + +GetBasicConstraintsValidForNonCa returns the BasicConstraintsValidForNonCa field if non-nil, zero value otherwise. + +### GetBasicConstraintsValidForNonCaOk + +`func (o *PkiPatchRoleResponse) GetBasicConstraintsValidForNonCaOk() (*bool, bool)` + +GetBasicConstraintsValidForNonCaOk returns a tuple with the BasicConstraintsValidForNonCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBasicConstraintsValidForNonCa + +`func (o *PkiPatchRoleResponse) SetBasicConstraintsValidForNonCa(v bool)` + +SetBasicConstraintsValidForNonCa sets BasicConstraintsValidForNonCa field to given value. + + +### HasBasicConstraintsValidForNonCa + +`func (o *PkiPatchRoleResponse) HasBasicConstraintsValidForNonCa() bool` + +HasBasicConstraintsValidForNonCa returns a boolean if a field has been set. + + + + +### GetClientFlag + +`func (o *PkiPatchRoleResponse) GetClientFlag() bool` + +GetClientFlag returns the ClientFlag field if non-nil, zero value otherwise. + +### GetClientFlagOk + +`func (o *PkiPatchRoleResponse) GetClientFlagOk() (*bool, bool)` + +GetClientFlagOk returns a tuple with the ClientFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetClientFlag + +`func (o *PkiPatchRoleResponse) SetClientFlag(v bool)` + +SetClientFlag sets ClientFlag field to given value. + + +### HasClientFlag + +`func (o *PkiPatchRoleResponse) HasClientFlag() bool` + +HasClientFlag returns a boolean if a field has been set. + + + + +### GetCnValidations + +`func (o *PkiPatchRoleResponse) GetCnValidations() []string` + +GetCnValidations returns the CnValidations field if non-nil, zero value otherwise. + +### GetCnValidationsOk + +`func (o *PkiPatchRoleResponse) GetCnValidationsOk() (*[]string, bool)` + +GetCnValidationsOk returns a tuple with the CnValidations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCnValidations + +`func (o *PkiPatchRoleResponse) SetCnValidations(v []string)` + +SetCnValidations sets CnValidations field to given value. + + +### HasCnValidations + +`func (o *PkiPatchRoleResponse) HasCnValidations() bool` + +HasCnValidations returns a boolean if a field has been set. + + + + +### GetCodeSigningFlag + +`func (o *PkiPatchRoleResponse) GetCodeSigningFlag() bool` + +GetCodeSigningFlag returns the CodeSigningFlag field if non-nil, zero value otherwise. + +### GetCodeSigningFlagOk + +`func (o *PkiPatchRoleResponse) GetCodeSigningFlagOk() (*bool, bool)` + +GetCodeSigningFlagOk returns a tuple with the CodeSigningFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCodeSigningFlag + +`func (o *PkiPatchRoleResponse) SetCodeSigningFlag(v bool)` + +SetCodeSigningFlag sets CodeSigningFlag field to given value. + + +### HasCodeSigningFlag + +`func (o *PkiPatchRoleResponse) HasCodeSigningFlag() bool` + +HasCodeSigningFlag returns a boolean if a field has been set. + + + + +### GetCountry + +`func (o *PkiPatchRoleResponse) GetCountry() []string` + +GetCountry returns the Country field if non-nil, zero value otherwise. + +### GetCountryOk + +`func (o *PkiPatchRoleResponse) GetCountryOk() (*[]string, bool)` + +GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCountry + +`func (o *PkiPatchRoleResponse) SetCountry(v []string)` + +SetCountry sets Country field to given value. + + +### HasCountry + +`func (o *PkiPatchRoleResponse) HasCountry() bool` + +HasCountry returns a boolean if a field has been set. + + + + +### GetEmailProtectionFlag + +`func (o *PkiPatchRoleResponse) GetEmailProtectionFlag() bool` + +GetEmailProtectionFlag returns the EmailProtectionFlag field if non-nil, zero value otherwise. + +### GetEmailProtectionFlagOk + +`func (o *PkiPatchRoleResponse) GetEmailProtectionFlagOk() (*bool, bool)` + +GetEmailProtectionFlagOk returns a tuple with the EmailProtectionFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEmailProtectionFlag + +`func (o *PkiPatchRoleResponse) SetEmailProtectionFlag(v bool)` + +SetEmailProtectionFlag sets EmailProtectionFlag field to given value. + + +### HasEmailProtectionFlag + +`func (o *PkiPatchRoleResponse) HasEmailProtectionFlag() bool` + +HasEmailProtectionFlag returns a boolean if a field has been set. + + + + +### GetEnforceHostnames + +`func (o *PkiPatchRoleResponse) GetEnforceHostnames() bool` + +GetEnforceHostnames returns the EnforceHostnames field if non-nil, zero value otherwise. + +### GetEnforceHostnamesOk + +`func (o *PkiPatchRoleResponse) GetEnforceHostnamesOk() (*bool, bool)` + +GetEnforceHostnamesOk returns a tuple with the EnforceHostnames field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnforceHostnames + +`func (o *PkiPatchRoleResponse) SetEnforceHostnames(v bool)` + +SetEnforceHostnames sets EnforceHostnames field to given value. + + +### HasEnforceHostnames + +`func (o *PkiPatchRoleResponse) HasEnforceHostnames() bool` + +HasEnforceHostnames returns a boolean if a field has been set. + + + + +### GetExtKeyUsage + +`func (o *PkiPatchRoleResponse) GetExtKeyUsage() []string` + +GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. + +### GetExtKeyUsageOk + +`func (o *PkiPatchRoleResponse) GetExtKeyUsageOk() (*[]string, bool)` + +GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExtKeyUsage + +`func (o *PkiPatchRoleResponse) SetExtKeyUsage(v []string)` + +SetExtKeyUsage sets ExtKeyUsage field to given value. + + +### HasExtKeyUsage + +`func (o *PkiPatchRoleResponse) HasExtKeyUsage() bool` + +HasExtKeyUsage returns a boolean if a field has been set. + + + + +### GetExtKeyUsageOids + +`func (o *PkiPatchRoleResponse) GetExtKeyUsageOids() []string` + +GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. + +### GetExtKeyUsageOidsOk + +`func (o *PkiPatchRoleResponse) GetExtKeyUsageOidsOk() (*[]string, bool)` + +GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExtKeyUsageOids + +`func (o *PkiPatchRoleResponse) SetExtKeyUsageOids(v []string)` + +SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. + + +### HasExtKeyUsageOids + +`func (o *PkiPatchRoleResponse) HasExtKeyUsageOids() bool` + +HasExtKeyUsageOids returns a boolean if a field has been set. + + + + +### GetGenerateLease + +`func (o *PkiPatchRoleResponse) GetGenerateLease() bool` + +GetGenerateLease returns the GenerateLease field if non-nil, zero value otherwise. + +### GetGenerateLeaseOk + +`func (o *PkiPatchRoleResponse) GetGenerateLeaseOk() (*bool, bool)` + +GetGenerateLeaseOk returns a tuple with the GenerateLease field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetGenerateLease + +`func (o *PkiPatchRoleResponse) SetGenerateLease(v bool)` + +SetGenerateLease sets GenerateLease field to given value. + + +### HasGenerateLease + +`func (o *PkiPatchRoleResponse) HasGenerateLease() bool` + +HasGenerateLease returns a boolean if a field has been set. + + + + +### GetIssuerRef + +`func (o *PkiPatchRoleResponse) GetIssuerRef() string` + +GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. + +### GetIssuerRefOk + +`func (o *PkiPatchRoleResponse) GetIssuerRefOk() (*string, bool)` + +GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerRef + +`func (o *PkiPatchRoleResponse) SetIssuerRef(v string)` + +SetIssuerRef sets IssuerRef field to given value. + + +### HasIssuerRef + +`func (o *PkiPatchRoleResponse) HasIssuerRef() bool` + +HasIssuerRef returns a boolean if a field has been set. + + + + +### GetKeyBits + +`func (o *PkiPatchRoleResponse) GetKeyBits() int32` + +GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. + +### GetKeyBitsOk + +`func (o *PkiPatchRoleResponse) GetKeyBitsOk() (*int32, bool)` + +GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyBits + +`func (o *PkiPatchRoleResponse) SetKeyBits(v int32)` + +SetKeyBits sets KeyBits field to given value. + + +### HasKeyBits + +`func (o *PkiPatchRoleResponse) HasKeyBits() bool` + +HasKeyBits returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiPatchRoleResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiPatchRoleResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiPatchRoleResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiPatchRoleResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetKeyUsage + +`func (o *PkiPatchRoleResponse) GetKeyUsage() []string` + +GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. + +### GetKeyUsageOk + +`func (o *PkiPatchRoleResponse) GetKeyUsageOk() (*[]string, bool)` + +GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyUsage + +`func (o *PkiPatchRoleResponse) SetKeyUsage(v []string)` + +SetKeyUsage sets KeyUsage field to given value. + + +### HasKeyUsage + +`func (o *PkiPatchRoleResponse) HasKeyUsage() bool` + +HasKeyUsage returns a boolean if a field has been set. + + + + +### GetLocality + +`func (o *PkiPatchRoleResponse) GetLocality() []string` + +GetLocality returns the Locality field if non-nil, zero value otherwise. + +### GetLocalityOk + +`func (o *PkiPatchRoleResponse) GetLocalityOk() (*[]string, bool)` + +GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLocality + +`func (o *PkiPatchRoleResponse) SetLocality(v []string)` + +SetLocality sets Locality field to given value. + + +### HasLocality + +`func (o *PkiPatchRoleResponse) HasLocality() bool` + +HasLocality returns a boolean if a field has been set. + + + + +### GetMaxTtl + +`func (o *PkiPatchRoleResponse) GetMaxTtl() int32` + +GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. + +### GetMaxTtlOk + +`func (o *PkiPatchRoleResponse) GetMaxTtlOk() (*int32, bool)` + +GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxTtl + +`func (o *PkiPatchRoleResponse) SetMaxTtl(v int32)` + +SetMaxTtl sets MaxTtl field to given value. + + +### HasMaxTtl + +`func (o *PkiPatchRoleResponse) HasMaxTtl() bool` + +HasMaxTtl returns a boolean if a field has been set. + + + + +### GetNoStore + +`func (o *PkiPatchRoleResponse) GetNoStore() bool` + +GetNoStore returns the NoStore field if non-nil, zero value otherwise. + +### GetNoStoreOk + +`func (o *PkiPatchRoleResponse) GetNoStoreOk() (*bool, bool)` + +GetNoStoreOk returns a tuple with the NoStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNoStore + +`func (o *PkiPatchRoleResponse) SetNoStore(v bool)` + +SetNoStore sets NoStore field to given value. + + +### HasNoStore + +`func (o *PkiPatchRoleResponse) HasNoStore() bool` + +HasNoStore returns a boolean if a field has been set. + + + + +### GetNotAfter + +`func (o *PkiPatchRoleResponse) GetNotAfter() string` + +GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. + +### GetNotAfterOk + +`func (o *PkiPatchRoleResponse) GetNotAfterOk() (*string, bool)` + +GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNotAfter + +`func (o *PkiPatchRoleResponse) SetNotAfter(v string)` + +SetNotAfter sets NotAfter field to given value. + + +### HasNotAfter + +`func (o *PkiPatchRoleResponse) HasNotAfter() bool` + +HasNotAfter returns a boolean if a field has been set. + + + + +### GetNotBeforeDuration + +`func (o *PkiPatchRoleResponse) GetNotBeforeDuration() int32` + +GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. + +### GetNotBeforeDurationOk + +`func (o *PkiPatchRoleResponse) GetNotBeforeDurationOk() (*int32, bool)` + +GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNotBeforeDuration + +`func (o *PkiPatchRoleResponse) SetNotBeforeDuration(v int32)` + +SetNotBeforeDuration sets NotBeforeDuration field to given value. + + +### HasNotBeforeDuration + +`func (o *PkiPatchRoleResponse) HasNotBeforeDuration() bool` + +HasNotBeforeDuration returns a boolean if a field has been set. + + + + +### GetOrganization + +`func (o *PkiPatchRoleResponse) GetOrganization() []string` + +GetOrganization returns the Organization field if non-nil, zero value otherwise. + +### GetOrganizationOk + +`func (o *PkiPatchRoleResponse) GetOrganizationOk() (*[]string, bool)` + +GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOrganization + +`func (o *PkiPatchRoleResponse) SetOrganization(v []string)` + +SetOrganization sets Organization field to given value. + + +### HasOrganization + +`func (o *PkiPatchRoleResponse) HasOrganization() bool` + +HasOrganization returns a boolean if a field has been set. + + + + +### GetOu + +`func (o *PkiPatchRoleResponse) GetOu() []string` + +GetOu returns the Ou field if non-nil, zero value otherwise. + +### GetOuOk + +`func (o *PkiPatchRoleResponse) GetOuOk() (*[]string, bool)` + +GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOu + +`func (o *PkiPatchRoleResponse) SetOu(v []string)` + +SetOu sets Ou field to given value. + + +### HasOu + +`func (o *PkiPatchRoleResponse) HasOu() bool` + +HasOu returns a boolean if a field has been set. + + + + +### GetPolicyIdentifiers + +`func (o *PkiPatchRoleResponse) GetPolicyIdentifiers() []string` + +GetPolicyIdentifiers returns the PolicyIdentifiers field if non-nil, zero value otherwise. + +### GetPolicyIdentifiersOk + +`func (o *PkiPatchRoleResponse) GetPolicyIdentifiersOk() (*[]string, bool)` + +GetPolicyIdentifiersOk returns a tuple with the PolicyIdentifiers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicyIdentifiers + +`func (o *PkiPatchRoleResponse) SetPolicyIdentifiers(v []string)` + +SetPolicyIdentifiers sets PolicyIdentifiers field to given value. + + +### HasPolicyIdentifiers + +`func (o *PkiPatchRoleResponse) HasPolicyIdentifiers() bool` + +HasPolicyIdentifiers returns a boolean if a field has been set. + + + + +### GetPostalCode + +`func (o *PkiPatchRoleResponse) GetPostalCode() []string` + +GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. + +### GetPostalCodeOk + +`func (o *PkiPatchRoleResponse) GetPostalCodeOk() (*[]string, bool)` + +GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPostalCode + +`func (o *PkiPatchRoleResponse) SetPostalCode(v []string)` + +SetPostalCode sets PostalCode field to given value. + + +### HasPostalCode + +`func (o *PkiPatchRoleResponse) HasPostalCode() bool` + +HasPostalCode returns a boolean if a field has been set. + + + + +### GetProvince + +`func (o *PkiPatchRoleResponse) GetProvince() []string` + +GetProvince returns the Province field if non-nil, zero value otherwise. + +### GetProvinceOk + +`func (o *PkiPatchRoleResponse) GetProvinceOk() (*[]string, bool)` + +GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProvince + +`func (o *PkiPatchRoleResponse) SetProvince(v []string)` + +SetProvince sets Province field to given value. + + +### HasProvince + +`func (o *PkiPatchRoleResponse) HasProvince() bool` + +HasProvince returns a boolean if a field has been set. + + + + +### GetRequireCn + +`func (o *PkiPatchRoleResponse) GetRequireCn() bool` + +GetRequireCn returns the RequireCn field if non-nil, zero value otherwise. + +### GetRequireCnOk + +`func (o *PkiPatchRoleResponse) GetRequireCnOk() (*bool, bool)` + +GetRequireCnOk returns a tuple with the RequireCn field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequireCn + +`func (o *PkiPatchRoleResponse) SetRequireCn(v bool)` + +SetRequireCn sets RequireCn field to given value. + + +### HasRequireCn + +`func (o *PkiPatchRoleResponse) HasRequireCn() bool` + +HasRequireCn returns a boolean if a field has been set. + + + + +### GetServerFlag + +`func (o *PkiPatchRoleResponse) GetServerFlag() bool` + +GetServerFlag returns the ServerFlag field if non-nil, zero value otherwise. + +### GetServerFlagOk + +`func (o *PkiPatchRoleResponse) GetServerFlagOk() (*bool, bool)` + +GetServerFlagOk returns a tuple with the ServerFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetServerFlag + +`func (o *PkiPatchRoleResponse) SetServerFlag(v bool)` + +SetServerFlag sets ServerFlag field to given value. + + +### HasServerFlag + +`func (o *PkiPatchRoleResponse) HasServerFlag() bool` + +HasServerFlag returns a boolean if a field has been set. + + + + +### GetSignatureBits + +`func (o *PkiPatchRoleResponse) GetSignatureBits() int32` + +GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. + +### GetSignatureBitsOk + +`func (o *PkiPatchRoleResponse) GetSignatureBitsOk() (*int32, bool)` + +GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSignatureBits + +`func (o *PkiPatchRoleResponse) SetSignatureBits(v int32)` + +SetSignatureBits sets SignatureBits field to given value. + + +### HasSignatureBits + +`func (o *PkiPatchRoleResponse) HasSignatureBits() bool` + +HasSignatureBits returns a boolean if a field has been set. + + + + +### GetStreetAddress + +`func (o *PkiPatchRoleResponse) GetStreetAddress() []string` + +GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. + +### GetStreetAddressOk + +`func (o *PkiPatchRoleResponse) GetStreetAddressOk() (*[]string, bool)` + +GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStreetAddress + +`func (o *PkiPatchRoleResponse) SetStreetAddress(v []string)` + +SetStreetAddress sets StreetAddress field to given value. + + +### HasStreetAddress + +`func (o *PkiPatchRoleResponse) HasStreetAddress() bool` + +HasStreetAddress returns a boolean if a field has been set. + + + + +### GetTtl + +`func (o *PkiPatchRoleResponse) GetTtl() int32` + +GetTtl returns the Ttl field if non-nil, zero value otherwise. + +### GetTtlOk + +`func (o *PkiPatchRoleResponse) GetTtlOk() (*int32, bool)` + +GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTtl + +`func (o *PkiPatchRoleResponse) SetTtl(v int32)` + +SetTtl sets Ttl field to given value. + + +### HasTtl + +`func (o *PkiPatchRoleResponse) HasTtl() bool` + +HasTtl returns a boolean if a field has been set. + + + + +### GetUseCsrCommonName + +`func (o *PkiPatchRoleResponse) GetUseCsrCommonName() bool` + +GetUseCsrCommonName returns the UseCsrCommonName field if non-nil, zero value otherwise. + +### GetUseCsrCommonNameOk + +`func (o *PkiPatchRoleResponse) GetUseCsrCommonNameOk() (*bool, bool)` + +GetUseCsrCommonNameOk returns a tuple with the UseCsrCommonName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUseCsrCommonName + +`func (o *PkiPatchRoleResponse) SetUseCsrCommonName(v bool)` + +SetUseCsrCommonName sets UseCsrCommonName field to given value. + + +### HasUseCsrCommonName + +`func (o *PkiPatchRoleResponse) HasUseCsrCommonName() bool` + +HasUseCsrCommonName returns a boolean if a field has been set. + + + + +### GetUseCsrSans + +`func (o *PkiPatchRoleResponse) GetUseCsrSans() bool` + +GetUseCsrSans returns the UseCsrSans field if non-nil, zero value otherwise. + +### GetUseCsrSansOk + +`func (o *PkiPatchRoleResponse) GetUseCsrSansOk() (*bool, bool)` + +GetUseCsrSansOk returns a tuple with the UseCsrSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUseCsrSans + +`func (o *PkiPatchRoleResponse) SetUseCsrSans(v bool)` + +SetUseCsrSans sets UseCsrSans field to given value. + + +### HasUseCsrSans + +`func (o *PkiPatchRoleResponse) HasUseCsrSans() bool` + +HasUseCsrSans returns a boolean if a field has been set. + + + + +### GetUsePss + +`func (o *PkiPatchRoleResponse) GetUsePss() bool` + +GetUsePss returns the UsePss field if non-nil, zero value otherwise. + +### GetUsePssOk + +`func (o *PkiPatchRoleResponse) GetUsePssOk() (*bool, bool)` + +GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUsePss + +`func (o *PkiPatchRoleResponse) SetUsePss(v bool)` + +SetUsePss sets UsePss field to given value. + + +### HasUsePss + +`func (o *PkiPatchRoleResponse) HasUsePss() bool` + +HasUsePss returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadAutoTidyConfigurationResponse.md b/docs/PkiReadAutoTidyConfigurationResponse.md new file mode 100644 index 00000000..c26e5032 --- /dev/null +++ b/docs/PkiReadAutoTidyConfigurationResponse.md @@ -0,0 +1,489 @@ +# PkiReadAutoTidyConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Enabled** | Pointer to **bool** | Specifies whether automatic tidy is enabled or not | [optional] +**IntervalDuration** | Pointer to **int32** | Specifies the duration between automatic tidy operation | [optional] +**IssuerSafetyBuffer** | Pointer to **int32** | Issuer safety buffer | [optional] +**MaintainStoredCertificateCounts** | Pointer to **bool** | | [optional] +**PauseDuration** | Pointer to **string** | Duration to pause between tidying certificates | [optional] +**PublishStoredCertificateCountMetrics** | Pointer to **bool** | | [optional] +**RevocationQueueSafetyBuffer** | Pointer to **int32** | | [optional] +**SafetyBuffer** | Pointer to **int32** | Safety buffer time duration | [optional] +**TidyCertStore** | Pointer to **bool** | Specifies whether to tidy up the certificate store | [optional] +**TidyCrossClusterRevokedCerts** | Pointer to **bool** | | [optional] +**TidyExpiredIssuers** | Pointer to **bool** | Specifies whether tidy expired issuers | [optional] +**TidyMoveLegacyCaBundle** | Pointer to **bool** | | [optional] +**TidyRevocationQueue** | Pointer to **bool** | | [optional] +**TidyRevokedCertIssuerAssociations** | Pointer to **bool** | Specifies whether to associate revoked certificates with their corresponding issuers | [optional] +**TidyRevokedCerts** | Pointer to **bool** | Specifies whether to remove all invalid and expired certificates from storage | [optional] + + + +## Methods + + +### NewPkiReadAutoTidyConfigurationResponse + +`func NewPkiReadAutoTidyConfigurationResponse() *PkiReadAutoTidyConfigurationResponse` + +NewPkiReadAutoTidyConfigurationResponse instantiates a new PkiReadAutoTidyConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadAutoTidyConfigurationResponseWithDefaults + +`func NewPkiReadAutoTidyConfigurationResponseWithDefaults() *PkiReadAutoTidyConfigurationResponse` + +NewPkiReadAutoTidyConfigurationResponseWithDefaults instantiates a new PkiReadAutoTidyConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetEnabled + +`func (o *PkiReadAutoTidyConfigurationResponse) GetEnabled() bool` + +GetEnabled returns the Enabled field if non-nil, zero value otherwise. + +### GetEnabledOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetEnabledOk() (*bool, bool)` + +GetEnabledOk returns a tuple with the Enabled field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnabled + +`func (o *PkiReadAutoTidyConfigurationResponse) SetEnabled(v bool)` + +SetEnabled sets Enabled field to given value. + + +### HasEnabled + +`func (o *PkiReadAutoTidyConfigurationResponse) HasEnabled() bool` + +HasEnabled returns a boolean if a field has been set. + + + + +### GetIntervalDuration + +`func (o *PkiReadAutoTidyConfigurationResponse) GetIntervalDuration() int32` + +GetIntervalDuration returns the IntervalDuration field if non-nil, zero value otherwise. + +### GetIntervalDurationOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetIntervalDurationOk() (*int32, bool)` + +GetIntervalDurationOk returns a tuple with the IntervalDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIntervalDuration + +`func (o *PkiReadAutoTidyConfigurationResponse) SetIntervalDuration(v int32)` + +SetIntervalDuration sets IntervalDuration field to given value. + + +### HasIntervalDuration + +`func (o *PkiReadAutoTidyConfigurationResponse) HasIntervalDuration() bool` + +HasIntervalDuration returns a boolean if a field has been set. + + + + +### GetIssuerSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) GetIssuerSafetyBuffer() int32` + +GetIssuerSafetyBuffer returns the IssuerSafetyBuffer field if non-nil, zero value otherwise. + +### GetIssuerSafetyBufferOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetIssuerSafetyBufferOk() (*int32, bool)` + +GetIssuerSafetyBufferOk returns a tuple with the IssuerSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) SetIssuerSafetyBuffer(v int32)` + +SetIssuerSafetyBuffer sets IssuerSafetyBuffer field to given value. + + +### HasIssuerSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) HasIssuerSafetyBuffer() bool` + +HasIssuerSafetyBuffer returns a boolean if a field has been set. + + + + +### GetMaintainStoredCertificateCounts + +`func (o *PkiReadAutoTidyConfigurationResponse) GetMaintainStoredCertificateCounts() bool` + +GetMaintainStoredCertificateCounts returns the MaintainStoredCertificateCounts field if non-nil, zero value otherwise. + +### GetMaintainStoredCertificateCountsOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetMaintainStoredCertificateCountsOk() (*bool, bool)` + +GetMaintainStoredCertificateCountsOk returns a tuple with the MaintainStoredCertificateCounts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaintainStoredCertificateCounts + +`func (o *PkiReadAutoTidyConfigurationResponse) SetMaintainStoredCertificateCounts(v bool)` + +SetMaintainStoredCertificateCounts sets MaintainStoredCertificateCounts field to given value. + + +### HasMaintainStoredCertificateCounts + +`func (o *PkiReadAutoTidyConfigurationResponse) HasMaintainStoredCertificateCounts() bool` + +HasMaintainStoredCertificateCounts returns a boolean if a field has been set. + + + + +### GetPauseDuration + +`func (o *PkiReadAutoTidyConfigurationResponse) GetPauseDuration() string` + +GetPauseDuration returns the PauseDuration field if non-nil, zero value otherwise. + +### GetPauseDurationOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetPauseDurationOk() (*string, bool)` + +GetPauseDurationOk returns a tuple with the PauseDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPauseDuration + +`func (o *PkiReadAutoTidyConfigurationResponse) SetPauseDuration(v string)` + +SetPauseDuration sets PauseDuration field to given value. + + +### HasPauseDuration + +`func (o *PkiReadAutoTidyConfigurationResponse) HasPauseDuration() bool` + +HasPauseDuration returns a boolean if a field has been set. + + + + +### GetPublishStoredCertificateCountMetrics + +`func (o *PkiReadAutoTidyConfigurationResponse) GetPublishStoredCertificateCountMetrics() bool` + +GetPublishStoredCertificateCountMetrics returns the PublishStoredCertificateCountMetrics field if non-nil, zero value otherwise. + +### GetPublishStoredCertificateCountMetricsOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetPublishStoredCertificateCountMetricsOk() (*bool, bool)` + +GetPublishStoredCertificateCountMetricsOk returns a tuple with the PublishStoredCertificateCountMetrics field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPublishStoredCertificateCountMetrics + +`func (o *PkiReadAutoTidyConfigurationResponse) SetPublishStoredCertificateCountMetrics(v bool)` + +SetPublishStoredCertificateCountMetrics sets PublishStoredCertificateCountMetrics field to given value. + + +### HasPublishStoredCertificateCountMetrics + +`func (o *PkiReadAutoTidyConfigurationResponse) HasPublishStoredCertificateCountMetrics() bool` + +HasPublishStoredCertificateCountMetrics returns a boolean if a field has been set. + + + + +### GetRevocationQueueSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) GetRevocationQueueSafetyBuffer() int32` + +GetRevocationQueueSafetyBuffer returns the RevocationQueueSafetyBuffer field if non-nil, zero value otherwise. + +### GetRevocationQueueSafetyBufferOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetRevocationQueueSafetyBufferOk() (*int32, bool)` + +GetRevocationQueueSafetyBufferOk returns a tuple with the RevocationQueueSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationQueueSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) SetRevocationQueueSafetyBuffer(v int32)` + +SetRevocationQueueSafetyBuffer sets RevocationQueueSafetyBuffer field to given value. + + +### HasRevocationQueueSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) HasRevocationQueueSafetyBuffer() bool` + +HasRevocationQueueSafetyBuffer returns a boolean if a field has been set. + + + + +### GetSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) GetSafetyBuffer() int32` + +GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. + +### GetSafetyBufferOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetSafetyBufferOk() (*int32, bool)` + +GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) SetSafetyBuffer(v int32)` + +SetSafetyBuffer sets SafetyBuffer field to given value. + + +### HasSafetyBuffer + +`func (o *PkiReadAutoTidyConfigurationResponse) HasSafetyBuffer() bool` + +HasSafetyBuffer returns a boolean if a field has been set. + + + + +### GetTidyCertStore + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyCertStore() bool` + +GetTidyCertStore returns the TidyCertStore field if non-nil, zero value otherwise. + +### GetTidyCertStoreOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyCertStoreOk() (*bool, bool)` + +GetTidyCertStoreOk returns a tuple with the TidyCertStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCertStore + +`func (o *PkiReadAutoTidyConfigurationResponse) SetTidyCertStore(v bool)` + +SetTidyCertStore sets TidyCertStore field to given value. + + +### HasTidyCertStore + +`func (o *PkiReadAutoTidyConfigurationResponse) HasTidyCertStore() bool` + +HasTidyCertStore returns a boolean if a field has been set. + + + + +### GetTidyCrossClusterRevokedCerts + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyCrossClusterRevokedCerts() bool` + +GetTidyCrossClusterRevokedCerts returns the TidyCrossClusterRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyCrossClusterRevokedCertsOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyCrossClusterRevokedCertsOk() (*bool, bool)` + +GetTidyCrossClusterRevokedCertsOk returns a tuple with the TidyCrossClusterRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCrossClusterRevokedCerts + +`func (o *PkiReadAutoTidyConfigurationResponse) SetTidyCrossClusterRevokedCerts(v bool)` + +SetTidyCrossClusterRevokedCerts sets TidyCrossClusterRevokedCerts field to given value. + + +### HasTidyCrossClusterRevokedCerts + +`func (o *PkiReadAutoTidyConfigurationResponse) HasTidyCrossClusterRevokedCerts() bool` + +HasTidyCrossClusterRevokedCerts returns a boolean if a field has been set. + + + + +### GetTidyExpiredIssuers + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyExpiredIssuers() bool` + +GetTidyExpiredIssuers returns the TidyExpiredIssuers field if non-nil, zero value otherwise. + +### GetTidyExpiredIssuersOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyExpiredIssuersOk() (*bool, bool)` + +GetTidyExpiredIssuersOk returns a tuple with the TidyExpiredIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyExpiredIssuers + +`func (o *PkiReadAutoTidyConfigurationResponse) SetTidyExpiredIssuers(v bool)` + +SetTidyExpiredIssuers sets TidyExpiredIssuers field to given value. + + +### HasTidyExpiredIssuers + +`func (o *PkiReadAutoTidyConfigurationResponse) HasTidyExpiredIssuers() bool` + +HasTidyExpiredIssuers returns a boolean if a field has been set. + + + + +### GetTidyMoveLegacyCaBundle + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyMoveLegacyCaBundle() bool` + +GetTidyMoveLegacyCaBundle returns the TidyMoveLegacyCaBundle field if non-nil, zero value otherwise. + +### GetTidyMoveLegacyCaBundleOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyMoveLegacyCaBundleOk() (*bool, bool)` + +GetTidyMoveLegacyCaBundleOk returns a tuple with the TidyMoveLegacyCaBundle field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyMoveLegacyCaBundle + +`func (o *PkiReadAutoTidyConfigurationResponse) SetTidyMoveLegacyCaBundle(v bool)` + +SetTidyMoveLegacyCaBundle sets TidyMoveLegacyCaBundle field to given value. + + +### HasTidyMoveLegacyCaBundle + +`func (o *PkiReadAutoTidyConfigurationResponse) HasTidyMoveLegacyCaBundle() bool` + +HasTidyMoveLegacyCaBundle returns a boolean if a field has been set. + + + + +### GetTidyRevocationQueue + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyRevocationQueue() bool` + +GetTidyRevocationQueue returns the TidyRevocationQueue field if non-nil, zero value otherwise. + +### GetTidyRevocationQueueOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyRevocationQueueOk() (*bool, bool)` + +GetTidyRevocationQueueOk returns a tuple with the TidyRevocationQueue field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevocationQueue + +`func (o *PkiReadAutoTidyConfigurationResponse) SetTidyRevocationQueue(v bool)` + +SetTidyRevocationQueue sets TidyRevocationQueue field to given value. + + +### HasTidyRevocationQueue + +`func (o *PkiReadAutoTidyConfigurationResponse) HasTidyRevocationQueue() bool` + +HasTidyRevocationQueue returns a boolean if a field has been set. + + + + +### GetTidyRevokedCertIssuerAssociations + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyRevokedCertIssuerAssociations() bool` + +GetTidyRevokedCertIssuerAssociations returns the TidyRevokedCertIssuerAssociations field if non-nil, zero value otherwise. + +### GetTidyRevokedCertIssuerAssociationsOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` + +GetTidyRevokedCertIssuerAssociationsOk returns a tuple with the TidyRevokedCertIssuerAssociations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCertIssuerAssociations + +`func (o *PkiReadAutoTidyConfigurationResponse) SetTidyRevokedCertIssuerAssociations(v bool)` + +SetTidyRevokedCertIssuerAssociations sets TidyRevokedCertIssuerAssociations field to given value. + + +### HasTidyRevokedCertIssuerAssociations + +`func (o *PkiReadAutoTidyConfigurationResponse) HasTidyRevokedCertIssuerAssociations() bool` + +HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. + + + + +### GetTidyRevokedCerts + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyRevokedCerts() bool` + +GetTidyRevokedCerts returns the TidyRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyRevokedCertsOk + +`func (o *PkiReadAutoTidyConfigurationResponse) GetTidyRevokedCertsOk() (*bool, bool)` + +GetTidyRevokedCertsOk returns a tuple with the TidyRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCerts + +`func (o *PkiReadAutoTidyConfigurationResponse) SetTidyRevokedCerts(v bool)` + +SetTidyRevokedCerts sets TidyRevokedCerts field to given value. + + +### HasTidyRevokedCerts + +`func (o *PkiReadAutoTidyConfigurationResponse) HasTidyRevokedCerts() bool` + +HasTidyRevokedCerts returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCaChainPemResponse.md b/docs/PkiReadCaChainPemResponse.md new file mode 100644 index 00000000..78eebb62 --- /dev/null +++ b/docs/PkiReadCaChainPemResponse.md @@ -0,0 +1,189 @@ +# PkiReadCaChainPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCaChainPemResponse + +`func NewPkiReadCaChainPemResponse() *PkiReadCaChainPemResponse` + +NewPkiReadCaChainPemResponse instantiates a new PkiReadCaChainPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCaChainPemResponseWithDefaults + +`func NewPkiReadCaChainPemResponseWithDefaults() *PkiReadCaChainPemResponse` + +NewPkiReadCaChainPemResponseWithDefaults instantiates a new PkiReadCaChainPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCaChainPemResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCaChainPemResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCaChainPemResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCaChainPemResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCaChainPemResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCaChainPemResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCaChainPemResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCaChainPemResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCaChainPemResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCaChainPemResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCaChainPemResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCaChainPemResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCaChainPemResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCaChainPemResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCaChainPemResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCaChainPemResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCaChainPemResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCaChainPemResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCaChainPemResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCaChainPemResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCaDerResponse.md b/docs/PkiReadCaDerResponse.md new file mode 100644 index 00000000..2123b436 --- /dev/null +++ b/docs/PkiReadCaDerResponse.md @@ -0,0 +1,189 @@ +# PkiReadCaDerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCaDerResponse + +`func NewPkiReadCaDerResponse() *PkiReadCaDerResponse` + +NewPkiReadCaDerResponse instantiates a new PkiReadCaDerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCaDerResponseWithDefaults + +`func NewPkiReadCaDerResponseWithDefaults() *PkiReadCaDerResponse` + +NewPkiReadCaDerResponseWithDefaults instantiates a new PkiReadCaDerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCaDerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCaDerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCaDerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCaDerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCaDerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCaDerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCaDerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCaDerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCaDerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCaDerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCaDerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCaDerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCaDerResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCaDerResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCaDerResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCaDerResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCaDerResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCaDerResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCaDerResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCaDerResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCaPemResponse.md b/docs/PkiReadCaPemResponse.md new file mode 100644 index 00000000..e3360bfb --- /dev/null +++ b/docs/PkiReadCaPemResponse.md @@ -0,0 +1,189 @@ +# PkiReadCaPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCaPemResponse + +`func NewPkiReadCaPemResponse() *PkiReadCaPemResponse` + +NewPkiReadCaPemResponse instantiates a new PkiReadCaPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCaPemResponseWithDefaults + +`func NewPkiReadCaPemResponseWithDefaults() *PkiReadCaPemResponse` + +NewPkiReadCaPemResponseWithDefaults instantiates a new PkiReadCaPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCaPemResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCaPemResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCaPemResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCaPemResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCaPemResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCaPemResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCaPemResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCaPemResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCaPemResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCaPemResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCaPemResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCaPemResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCaPemResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCaPemResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCaPemResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCaPemResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCaPemResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCaPemResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCaPemResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCaPemResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCertCaChainResponse.md b/docs/PkiReadCertCaChainResponse.md new file mode 100644 index 00000000..a6df3d02 --- /dev/null +++ b/docs/PkiReadCertCaChainResponse.md @@ -0,0 +1,189 @@ +# PkiReadCertCaChainResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCertCaChainResponse + +`func NewPkiReadCertCaChainResponse() *PkiReadCertCaChainResponse` + +NewPkiReadCertCaChainResponse instantiates a new PkiReadCertCaChainResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCertCaChainResponseWithDefaults + +`func NewPkiReadCertCaChainResponseWithDefaults() *PkiReadCertCaChainResponse` + +NewPkiReadCertCaChainResponseWithDefaults instantiates a new PkiReadCertCaChainResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCertCaChainResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCertCaChainResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCertCaChainResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCertCaChainResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCertCaChainResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCertCaChainResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCertCaChainResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCertCaChainResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCertCaChainResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCertCaChainResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCertCaChainResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCertCaChainResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCertCaChainResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCertCaChainResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCertCaChainResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCertCaChainResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCertCaChainResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCertCaChainResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCertCaChainResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCertCaChainResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCertCrlResponse.md b/docs/PkiReadCertCrlResponse.md new file mode 100644 index 00000000..65a5e4eb --- /dev/null +++ b/docs/PkiReadCertCrlResponse.md @@ -0,0 +1,189 @@ +# PkiReadCertCrlResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCertCrlResponse + +`func NewPkiReadCertCrlResponse() *PkiReadCertCrlResponse` + +NewPkiReadCertCrlResponse instantiates a new PkiReadCertCrlResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCertCrlResponseWithDefaults + +`func NewPkiReadCertCrlResponseWithDefaults() *PkiReadCertCrlResponse` + +NewPkiReadCertCrlResponseWithDefaults instantiates a new PkiReadCertCrlResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCertCrlResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCertCrlResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCertCrlResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCertCrlResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCertCrlResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCertCrlResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCertCrlResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCertCrlResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCertCrlResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCertCrlResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCertCrlResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCertCrlResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCertCrlResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCertCrlResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCertCrlResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCertCrlResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCertCrlResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCertCrlResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCertCrlResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCertCrlResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCertDeltaCrlResponse.md b/docs/PkiReadCertDeltaCrlResponse.md new file mode 100644 index 00000000..0be59038 --- /dev/null +++ b/docs/PkiReadCertDeltaCrlResponse.md @@ -0,0 +1,189 @@ +# PkiReadCertDeltaCrlResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCertDeltaCrlResponse + +`func NewPkiReadCertDeltaCrlResponse() *PkiReadCertDeltaCrlResponse` + +NewPkiReadCertDeltaCrlResponse instantiates a new PkiReadCertDeltaCrlResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCertDeltaCrlResponseWithDefaults + +`func NewPkiReadCertDeltaCrlResponseWithDefaults() *PkiReadCertDeltaCrlResponse` + +NewPkiReadCertDeltaCrlResponseWithDefaults instantiates a new PkiReadCertDeltaCrlResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCertDeltaCrlResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCertDeltaCrlResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCertDeltaCrlResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCertDeltaCrlResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCertDeltaCrlResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCertDeltaCrlResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCertDeltaCrlResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCertDeltaCrlResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCertDeltaCrlResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCertDeltaCrlResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCertDeltaCrlResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCertDeltaCrlResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCertDeltaCrlResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCertDeltaCrlResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCertDeltaCrlResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCertDeltaCrlResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCertDeltaCrlResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCertDeltaCrlResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCertDeltaCrlResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCertDeltaCrlResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCertRawDerResponse.md b/docs/PkiReadCertRawDerResponse.md new file mode 100644 index 00000000..bdea7ee8 --- /dev/null +++ b/docs/PkiReadCertRawDerResponse.md @@ -0,0 +1,189 @@ +# PkiReadCertRawDerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCertRawDerResponse + +`func NewPkiReadCertRawDerResponse() *PkiReadCertRawDerResponse` + +NewPkiReadCertRawDerResponse instantiates a new PkiReadCertRawDerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCertRawDerResponseWithDefaults + +`func NewPkiReadCertRawDerResponseWithDefaults() *PkiReadCertRawDerResponse` + +NewPkiReadCertRawDerResponseWithDefaults instantiates a new PkiReadCertRawDerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCertRawDerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCertRawDerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCertRawDerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCertRawDerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCertRawDerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCertRawDerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCertRawDerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCertRawDerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCertRawDerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCertRawDerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCertRawDerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCertRawDerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCertRawDerResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCertRawDerResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCertRawDerResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCertRawDerResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCertRawDerResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCertRawDerResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCertRawDerResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCertRawDerResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCertRawPemResponse.md b/docs/PkiReadCertRawPemResponse.md new file mode 100644 index 00000000..7e74fde5 --- /dev/null +++ b/docs/PkiReadCertRawPemResponse.md @@ -0,0 +1,189 @@ +# PkiReadCertRawPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCertRawPemResponse + +`func NewPkiReadCertRawPemResponse() *PkiReadCertRawPemResponse` + +NewPkiReadCertRawPemResponse instantiates a new PkiReadCertRawPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCertRawPemResponseWithDefaults + +`func NewPkiReadCertRawPemResponseWithDefaults() *PkiReadCertRawPemResponse` + +NewPkiReadCertRawPemResponseWithDefaults instantiates a new PkiReadCertRawPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCertRawPemResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCertRawPemResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCertRawPemResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCertRawPemResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCertRawPemResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCertRawPemResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCertRawPemResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCertRawPemResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCertRawPemResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCertRawPemResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCertRawPemResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCertRawPemResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCertRawPemResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCertRawPemResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCertRawPemResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCertRawPemResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCertRawPemResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCertRawPemResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCertRawPemResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCertRawPemResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCertResponse.md b/docs/PkiReadCertResponse.md new file mode 100644 index 00000000..3666c832 --- /dev/null +++ b/docs/PkiReadCertResponse.md @@ -0,0 +1,189 @@ +# PkiReadCertResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCertResponse + +`func NewPkiReadCertResponse() *PkiReadCertResponse` + +NewPkiReadCertResponse instantiates a new PkiReadCertResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCertResponseWithDefaults + +`func NewPkiReadCertResponseWithDefaults() *PkiReadCertResponse` + +NewPkiReadCertResponseWithDefaults instantiates a new PkiReadCertResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCertResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCertResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCertResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCertResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCertResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCertResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCertResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCertResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCertResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCertResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCertResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCertResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCertResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCertResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCertResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCertResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCertResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCertResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCertResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCertResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadClusterConfigurationResponse.md b/docs/PkiReadClusterConfigurationResponse.md new file mode 100644 index 00000000..70fa583f --- /dev/null +++ b/docs/PkiReadClusterConfigurationResponse.md @@ -0,0 +1,99 @@ +# PkiReadClusterConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AiaPath** | Pointer to **string** | Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki | [optional] +**Path** | Pointer to **string** | Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki | [optional] + + + +## Methods + + +### NewPkiReadClusterConfigurationResponse + +`func NewPkiReadClusterConfigurationResponse() *PkiReadClusterConfigurationResponse` + +NewPkiReadClusterConfigurationResponse instantiates a new PkiReadClusterConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadClusterConfigurationResponseWithDefaults + +`func NewPkiReadClusterConfigurationResponseWithDefaults() *PkiReadClusterConfigurationResponse` + +NewPkiReadClusterConfigurationResponseWithDefaults instantiates a new PkiReadClusterConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAiaPath + +`func (o *PkiReadClusterConfigurationResponse) GetAiaPath() string` + +GetAiaPath returns the AiaPath field if non-nil, zero value otherwise. + +### GetAiaPathOk + +`func (o *PkiReadClusterConfigurationResponse) GetAiaPathOk() (*string, bool)` + +GetAiaPathOk returns a tuple with the AiaPath field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAiaPath + +`func (o *PkiReadClusterConfigurationResponse) SetAiaPath(v string)` + +SetAiaPath sets AiaPath field to given value. + + +### HasAiaPath + +`func (o *PkiReadClusterConfigurationResponse) HasAiaPath() bool` + +HasAiaPath returns a boolean if a field has been set. + + + + +### GetPath + +`func (o *PkiReadClusterConfigurationResponse) GetPath() string` + +GetPath returns the Path field if non-nil, zero value otherwise. + +### GetPathOk + +`func (o *PkiReadClusterConfigurationResponse) GetPathOk() (*string, bool)` + +GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPath + +`func (o *PkiReadClusterConfigurationResponse) SetPath(v string)` + +SetPath sets Path field to given value. + + +### HasPath + +`func (o *PkiReadClusterConfigurationResponse) HasPath() bool` + +HasPath returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCrlConfigurationResponse.md b/docs/PkiReadCrlConfigurationResponse.md new file mode 100644 index 00000000..f370d618 --- /dev/null +++ b/docs/PkiReadCrlConfigurationResponse.md @@ -0,0 +1,369 @@ +# PkiReadCrlConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AutoRebuild** | Pointer to **bool** | If set to true, enables automatic rebuilding of the CRL | [optional] +**AutoRebuildGracePeriod** | Pointer to **string** | The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h. | [optional] +**CrossClusterRevocation** | Pointer to **bool** | Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true. | [optional] +**DeltaRebuildInterval** | Pointer to **string** | The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m. | [optional] +**Disable** | Pointer to **bool** | If set to true, disables generating the CRL entirely. | [optional] +**EnableDelta** | Pointer to **bool** | Whether to enable delta CRLs between authoritative CRL rebuilds | [optional] +**Expiry** | Pointer to **string** | The amount of time the generated CRL should be valid; defaults to 72 hours | [optional] +**OcspDisable** | Pointer to **bool** | If set to true, ocsp unauthorized responses will be returned. | [optional] +**OcspExpiry** | Pointer to **string** | The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours | [optional] +**UnifiedCrl** | Pointer to **bool** | If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP. | [optional] +**UnifiedCrlOnExistingPaths** | Pointer to **bool** | If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data | [optional] + + + +## Methods + + +### NewPkiReadCrlConfigurationResponse + +`func NewPkiReadCrlConfigurationResponse() *PkiReadCrlConfigurationResponse` + +NewPkiReadCrlConfigurationResponse instantiates a new PkiReadCrlConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCrlConfigurationResponseWithDefaults + +`func NewPkiReadCrlConfigurationResponseWithDefaults() *PkiReadCrlConfigurationResponse` + +NewPkiReadCrlConfigurationResponseWithDefaults instantiates a new PkiReadCrlConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAutoRebuild + +`func (o *PkiReadCrlConfigurationResponse) GetAutoRebuild() bool` + +GetAutoRebuild returns the AutoRebuild field if non-nil, zero value otherwise. + +### GetAutoRebuildOk + +`func (o *PkiReadCrlConfigurationResponse) GetAutoRebuildOk() (*bool, bool)` + +GetAutoRebuildOk returns a tuple with the AutoRebuild field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAutoRebuild + +`func (o *PkiReadCrlConfigurationResponse) SetAutoRebuild(v bool)` + +SetAutoRebuild sets AutoRebuild field to given value. + + +### HasAutoRebuild + +`func (o *PkiReadCrlConfigurationResponse) HasAutoRebuild() bool` + +HasAutoRebuild returns a boolean if a field has been set. + + + + +### GetAutoRebuildGracePeriod + +`func (o *PkiReadCrlConfigurationResponse) GetAutoRebuildGracePeriod() string` + +GetAutoRebuildGracePeriod returns the AutoRebuildGracePeriod field if non-nil, zero value otherwise. + +### GetAutoRebuildGracePeriodOk + +`func (o *PkiReadCrlConfigurationResponse) GetAutoRebuildGracePeriodOk() (*string, bool)` + +GetAutoRebuildGracePeriodOk returns a tuple with the AutoRebuildGracePeriod field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAutoRebuildGracePeriod + +`func (o *PkiReadCrlConfigurationResponse) SetAutoRebuildGracePeriod(v string)` + +SetAutoRebuildGracePeriod sets AutoRebuildGracePeriod field to given value. + + +### HasAutoRebuildGracePeriod + +`func (o *PkiReadCrlConfigurationResponse) HasAutoRebuildGracePeriod() bool` + +HasAutoRebuildGracePeriod returns a boolean if a field has been set. + + + + +### GetCrossClusterRevocation + +`func (o *PkiReadCrlConfigurationResponse) GetCrossClusterRevocation() bool` + +GetCrossClusterRevocation returns the CrossClusterRevocation field if non-nil, zero value otherwise. + +### GetCrossClusterRevocationOk + +`func (o *PkiReadCrlConfigurationResponse) GetCrossClusterRevocationOk() (*bool, bool)` + +GetCrossClusterRevocationOk returns a tuple with the CrossClusterRevocation field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrossClusterRevocation + +`func (o *PkiReadCrlConfigurationResponse) SetCrossClusterRevocation(v bool)` + +SetCrossClusterRevocation sets CrossClusterRevocation field to given value. + + +### HasCrossClusterRevocation + +`func (o *PkiReadCrlConfigurationResponse) HasCrossClusterRevocation() bool` + +HasCrossClusterRevocation returns a boolean if a field has been set. + + + + +### GetDeltaRebuildInterval + +`func (o *PkiReadCrlConfigurationResponse) GetDeltaRebuildInterval() string` + +GetDeltaRebuildInterval returns the DeltaRebuildInterval field if non-nil, zero value otherwise. + +### GetDeltaRebuildIntervalOk + +`func (o *PkiReadCrlConfigurationResponse) GetDeltaRebuildIntervalOk() (*string, bool)` + +GetDeltaRebuildIntervalOk returns a tuple with the DeltaRebuildInterval field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeltaRebuildInterval + +`func (o *PkiReadCrlConfigurationResponse) SetDeltaRebuildInterval(v string)` + +SetDeltaRebuildInterval sets DeltaRebuildInterval field to given value. + + +### HasDeltaRebuildInterval + +`func (o *PkiReadCrlConfigurationResponse) HasDeltaRebuildInterval() bool` + +HasDeltaRebuildInterval returns a boolean if a field has been set. + + + + +### GetDisable + +`func (o *PkiReadCrlConfigurationResponse) GetDisable() bool` + +GetDisable returns the Disable field if non-nil, zero value otherwise. + +### GetDisableOk + +`func (o *PkiReadCrlConfigurationResponse) GetDisableOk() (*bool, bool)` + +GetDisableOk returns a tuple with the Disable field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDisable + +`func (o *PkiReadCrlConfigurationResponse) SetDisable(v bool)` + +SetDisable sets Disable field to given value. + + +### HasDisable + +`func (o *PkiReadCrlConfigurationResponse) HasDisable() bool` + +HasDisable returns a boolean if a field has been set. + + + + +### GetEnableDelta + +`func (o *PkiReadCrlConfigurationResponse) GetEnableDelta() bool` + +GetEnableDelta returns the EnableDelta field if non-nil, zero value otherwise. + +### GetEnableDeltaOk + +`func (o *PkiReadCrlConfigurationResponse) GetEnableDeltaOk() (*bool, bool)` + +GetEnableDeltaOk returns a tuple with the EnableDelta field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnableDelta + +`func (o *PkiReadCrlConfigurationResponse) SetEnableDelta(v bool)` + +SetEnableDelta sets EnableDelta field to given value. + + +### HasEnableDelta + +`func (o *PkiReadCrlConfigurationResponse) HasEnableDelta() bool` + +HasEnableDelta returns a boolean if a field has been set. + + + + +### GetExpiry + +`func (o *PkiReadCrlConfigurationResponse) GetExpiry() string` + +GetExpiry returns the Expiry field if non-nil, zero value otherwise. + +### GetExpiryOk + +`func (o *PkiReadCrlConfigurationResponse) GetExpiryOk() (*string, bool)` + +GetExpiryOk returns a tuple with the Expiry field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiry + +`func (o *PkiReadCrlConfigurationResponse) SetExpiry(v string)` + +SetExpiry sets Expiry field to given value. + + +### HasExpiry + +`func (o *PkiReadCrlConfigurationResponse) HasExpiry() bool` + +HasExpiry returns a boolean if a field has been set. + + + + +### GetOcspDisable + +`func (o *PkiReadCrlConfigurationResponse) GetOcspDisable() bool` + +GetOcspDisable returns the OcspDisable field if non-nil, zero value otherwise. + +### GetOcspDisableOk + +`func (o *PkiReadCrlConfigurationResponse) GetOcspDisableOk() (*bool, bool)` + +GetOcspDisableOk returns a tuple with the OcspDisable field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspDisable + +`func (o *PkiReadCrlConfigurationResponse) SetOcspDisable(v bool)` + +SetOcspDisable sets OcspDisable field to given value. + + +### HasOcspDisable + +`func (o *PkiReadCrlConfigurationResponse) HasOcspDisable() bool` + +HasOcspDisable returns a boolean if a field has been set. + + + + +### GetOcspExpiry + +`func (o *PkiReadCrlConfigurationResponse) GetOcspExpiry() string` + +GetOcspExpiry returns the OcspExpiry field if non-nil, zero value otherwise. + +### GetOcspExpiryOk + +`func (o *PkiReadCrlConfigurationResponse) GetOcspExpiryOk() (*string, bool)` + +GetOcspExpiryOk returns a tuple with the OcspExpiry field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspExpiry + +`func (o *PkiReadCrlConfigurationResponse) SetOcspExpiry(v string)` + +SetOcspExpiry sets OcspExpiry field to given value. + + +### HasOcspExpiry + +`func (o *PkiReadCrlConfigurationResponse) HasOcspExpiry() bool` + +HasOcspExpiry returns a boolean if a field has been set. + + + + +### GetUnifiedCrl + +`func (o *PkiReadCrlConfigurationResponse) GetUnifiedCrl() bool` + +GetUnifiedCrl returns the UnifiedCrl field if non-nil, zero value otherwise. + +### GetUnifiedCrlOk + +`func (o *PkiReadCrlConfigurationResponse) GetUnifiedCrlOk() (*bool, bool)` + +GetUnifiedCrlOk returns a tuple with the UnifiedCrl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUnifiedCrl + +`func (o *PkiReadCrlConfigurationResponse) SetUnifiedCrl(v bool)` + +SetUnifiedCrl sets UnifiedCrl field to given value. + + +### HasUnifiedCrl + +`func (o *PkiReadCrlConfigurationResponse) HasUnifiedCrl() bool` + +HasUnifiedCrl returns a boolean if a field has been set. + + + + +### GetUnifiedCrlOnExistingPaths + +`func (o *PkiReadCrlConfigurationResponse) GetUnifiedCrlOnExistingPaths() bool` + +GetUnifiedCrlOnExistingPaths returns the UnifiedCrlOnExistingPaths field if non-nil, zero value otherwise. + +### GetUnifiedCrlOnExistingPathsOk + +`func (o *PkiReadCrlConfigurationResponse) GetUnifiedCrlOnExistingPathsOk() (*bool, bool)` + +GetUnifiedCrlOnExistingPathsOk returns a tuple with the UnifiedCrlOnExistingPaths field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUnifiedCrlOnExistingPaths + +`func (o *PkiReadCrlConfigurationResponse) SetUnifiedCrlOnExistingPaths(v bool)` + +SetUnifiedCrlOnExistingPaths sets UnifiedCrlOnExistingPaths field to given value. + + +### HasUnifiedCrlOnExistingPaths + +`func (o *PkiReadCrlConfigurationResponse) HasUnifiedCrlOnExistingPaths() bool` + +HasUnifiedCrlOnExistingPaths returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCrlDeltaPemResponse.md b/docs/PkiReadCrlDeltaPemResponse.md new file mode 100644 index 00000000..0a210cc8 --- /dev/null +++ b/docs/PkiReadCrlDeltaPemResponse.md @@ -0,0 +1,189 @@ +# PkiReadCrlDeltaPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCrlDeltaPemResponse + +`func NewPkiReadCrlDeltaPemResponse() *PkiReadCrlDeltaPemResponse` + +NewPkiReadCrlDeltaPemResponse instantiates a new PkiReadCrlDeltaPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCrlDeltaPemResponseWithDefaults + +`func NewPkiReadCrlDeltaPemResponseWithDefaults() *PkiReadCrlDeltaPemResponse` + +NewPkiReadCrlDeltaPemResponseWithDefaults instantiates a new PkiReadCrlDeltaPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCrlDeltaPemResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCrlDeltaPemResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCrlDeltaPemResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCrlDeltaPemResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCrlDeltaPemResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCrlDeltaPemResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCrlDeltaPemResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCrlDeltaPemResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCrlDeltaPemResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCrlDeltaPemResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCrlDeltaPemResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCrlDeltaPemResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCrlDeltaPemResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCrlDeltaPemResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCrlDeltaPemResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCrlDeltaPemResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCrlDeltaPemResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCrlDeltaPemResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCrlDeltaPemResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCrlDeltaPemResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCrlDeltaResponse.md b/docs/PkiReadCrlDeltaResponse.md new file mode 100644 index 00000000..234dc6da --- /dev/null +++ b/docs/PkiReadCrlDeltaResponse.md @@ -0,0 +1,189 @@ +# PkiReadCrlDeltaResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCrlDeltaResponse + +`func NewPkiReadCrlDeltaResponse() *PkiReadCrlDeltaResponse` + +NewPkiReadCrlDeltaResponse instantiates a new PkiReadCrlDeltaResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCrlDeltaResponseWithDefaults + +`func NewPkiReadCrlDeltaResponseWithDefaults() *PkiReadCrlDeltaResponse` + +NewPkiReadCrlDeltaResponseWithDefaults instantiates a new PkiReadCrlDeltaResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCrlDeltaResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCrlDeltaResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCrlDeltaResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCrlDeltaResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCrlDeltaResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCrlDeltaResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCrlDeltaResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCrlDeltaResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCrlDeltaResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCrlDeltaResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCrlDeltaResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCrlDeltaResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCrlDeltaResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCrlDeltaResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCrlDeltaResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCrlDeltaResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCrlDeltaResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCrlDeltaResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCrlDeltaResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCrlDeltaResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCrlDerResponse.md b/docs/PkiReadCrlDerResponse.md new file mode 100644 index 00000000..4649c184 --- /dev/null +++ b/docs/PkiReadCrlDerResponse.md @@ -0,0 +1,189 @@ +# PkiReadCrlDerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCrlDerResponse + +`func NewPkiReadCrlDerResponse() *PkiReadCrlDerResponse` + +NewPkiReadCrlDerResponse instantiates a new PkiReadCrlDerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCrlDerResponseWithDefaults + +`func NewPkiReadCrlDerResponseWithDefaults() *PkiReadCrlDerResponse` + +NewPkiReadCrlDerResponseWithDefaults instantiates a new PkiReadCrlDerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCrlDerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCrlDerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCrlDerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCrlDerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCrlDerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCrlDerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCrlDerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCrlDerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCrlDerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCrlDerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCrlDerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCrlDerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCrlDerResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCrlDerResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCrlDerResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCrlDerResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCrlDerResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCrlDerResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCrlDerResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCrlDerResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadCrlPemResponse.md b/docs/PkiReadCrlPemResponse.md new file mode 100644 index 00000000..e7d71254 --- /dev/null +++ b/docs/PkiReadCrlPemResponse.md @@ -0,0 +1,189 @@ +# PkiReadCrlPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Issuing CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**RevocationTime** | Pointer to **string** | Revocation time | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | Revocation time RFC 3339 formatted | [optional] + + + +## Methods + + +### NewPkiReadCrlPemResponse + +`func NewPkiReadCrlPemResponse() *PkiReadCrlPemResponse` + +NewPkiReadCrlPemResponse instantiates a new PkiReadCrlPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadCrlPemResponseWithDefaults + +`func NewPkiReadCrlPemResponseWithDefaults() *PkiReadCrlPemResponse` + +NewPkiReadCrlPemResponseWithDefaults instantiates a new PkiReadCrlPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadCrlPemResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadCrlPemResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadCrlPemResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadCrlPemResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadCrlPemResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadCrlPemResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadCrlPemResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadCrlPemResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadCrlPemResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadCrlPemResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadCrlPemResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadCrlPemResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadCrlPemResponse) GetRevocationTime() string` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadCrlPemResponse) GetRevocationTimeOk() (*string, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadCrlPemResponse) SetRevocationTime(v string)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadCrlPemResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadCrlPemResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadCrlPemResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadCrlPemResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadCrlPemResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadIssuerDerResponse.md b/docs/PkiReadIssuerDerResponse.md new file mode 100644 index 00000000..5612c8da --- /dev/null +++ b/docs/PkiReadIssuerDerResponse.md @@ -0,0 +1,159 @@ +# PkiReadIssuerDerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | Issuer Id | [optional] +**IssuerName** | Pointer to **string** | Issuer Name | [optional] + + + +## Methods + + +### NewPkiReadIssuerDerResponse + +`func NewPkiReadIssuerDerResponse() *PkiReadIssuerDerResponse` + +NewPkiReadIssuerDerResponse instantiates a new PkiReadIssuerDerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadIssuerDerResponseWithDefaults + +`func NewPkiReadIssuerDerResponseWithDefaults() *PkiReadIssuerDerResponse` + +NewPkiReadIssuerDerResponseWithDefaults instantiates a new PkiReadIssuerDerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadIssuerDerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadIssuerDerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadIssuerDerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadIssuerDerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadIssuerDerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadIssuerDerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadIssuerDerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadIssuerDerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadIssuerDerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadIssuerDerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadIssuerDerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadIssuerDerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiReadIssuerDerResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiReadIssuerDerResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiReadIssuerDerResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiReadIssuerDerResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadIssuerJsonResponse.md b/docs/PkiReadIssuerJsonResponse.md new file mode 100644 index 00000000..1809d407 --- /dev/null +++ b/docs/PkiReadIssuerJsonResponse.md @@ -0,0 +1,159 @@ +# PkiReadIssuerJsonResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | Issuer Id | [optional] +**IssuerName** | Pointer to **string** | Issuer Name | [optional] + + + +## Methods + + +### NewPkiReadIssuerJsonResponse + +`func NewPkiReadIssuerJsonResponse() *PkiReadIssuerJsonResponse` + +NewPkiReadIssuerJsonResponse instantiates a new PkiReadIssuerJsonResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadIssuerJsonResponseWithDefaults + +`func NewPkiReadIssuerJsonResponseWithDefaults() *PkiReadIssuerJsonResponse` + +NewPkiReadIssuerJsonResponseWithDefaults instantiates a new PkiReadIssuerJsonResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadIssuerJsonResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadIssuerJsonResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadIssuerJsonResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadIssuerJsonResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadIssuerJsonResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadIssuerJsonResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadIssuerJsonResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadIssuerJsonResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadIssuerJsonResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadIssuerJsonResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadIssuerJsonResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadIssuerJsonResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiReadIssuerJsonResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiReadIssuerJsonResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiReadIssuerJsonResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiReadIssuerJsonResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadIssuerPemResponse.md b/docs/PkiReadIssuerPemResponse.md new file mode 100644 index 00000000..5d866b80 --- /dev/null +++ b/docs/PkiReadIssuerPemResponse.md @@ -0,0 +1,159 @@ +# PkiReadIssuerPemResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuerId** | Pointer to **string** | Issuer Id | [optional] +**IssuerName** | Pointer to **string** | Issuer Name | [optional] + + + +## Methods + + +### NewPkiReadIssuerPemResponse + +`func NewPkiReadIssuerPemResponse() *PkiReadIssuerPemResponse` + +NewPkiReadIssuerPemResponse instantiates a new PkiReadIssuerPemResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadIssuerPemResponseWithDefaults + +`func NewPkiReadIssuerPemResponseWithDefaults() *PkiReadIssuerPemResponse` + +NewPkiReadIssuerPemResponseWithDefaults instantiates a new PkiReadIssuerPemResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadIssuerPemResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadIssuerPemResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadIssuerPemResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadIssuerPemResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadIssuerPemResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadIssuerPemResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadIssuerPemResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadIssuerPemResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadIssuerPemResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadIssuerPemResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadIssuerPemResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadIssuerPemResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiReadIssuerPemResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiReadIssuerPemResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiReadIssuerPemResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiReadIssuerPemResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadIssuerResponse.md b/docs/PkiReadIssuerResponse.md new file mode 100644 index 00000000..c616c075 --- /dev/null +++ b/docs/PkiReadIssuerResponse.md @@ -0,0 +1,489 @@ +# PkiReadIssuerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**CrlDistributionPoints** | Pointer to **[]string** | CRL Distribution Points | [optional] +**IssuerId** | Pointer to **string** | Issuer Id | [optional] +**IssuerName** | Pointer to **string** | Issuer Name | [optional] +**IssuingCertificates** | Pointer to **[]string** | Issuing Certificates | [optional] +**KeyId** | Pointer to **string** | Key Id | [optional] +**LeafNotAfterBehavior** | Pointer to **string** | Leaf Not After Behavior | [optional] +**ManualChain** | Pointer to **[]string** | Manual Chain | [optional] +**OcspServers** | Pointer to **[]string** | OSCP Servers | [optional] +**RevocationSignatureAlgorithm** | Pointer to **string** | Revocation Signature Alogrithm | [optional] +**RevocationTime** | Pointer to **int32** | | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | | [optional] +**Revoked** | Pointer to **bool** | Revoked | [optional] +**Usage** | Pointer to **[]string** | Usage | [optional] + + + +## Methods + + +### NewPkiReadIssuerResponse + +`func NewPkiReadIssuerResponse() *PkiReadIssuerResponse` + +NewPkiReadIssuerResponse instantiates a new PkiReadIssuerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadIssuerResponseWithDefaults + +`func NewPkiReadIssuerResponseWithDefaults() *PkiReadIssuerResponse` + +NewPkiReadIssuerResponseWithDefaults instantiates a new PkiReadIssuerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiReadIssuerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiReadIssuerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiReadIssuerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiReadIssuerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiReadIssuerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiReadIssuerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiReadIssuerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiReadIssuerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetCrlDistributionPoints + +`func (o *PkiReadIssuerResponse) GetCrlDistributionPoints() []string` + +GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. + +### GetCrlDistributionPointsOk + +`func (o *PkiReadIssuerResponse) GetCrlDistributionPointsOk() (*[]string, bool)` + +GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrlDistributionPoints + +`func (o *PkiReadIssuerResponse) SetCrlDistributionPoints(v []string)` + +SetCrlDistributionPoints sets CrlDistributionPoints field to given value. + + +### HasCrlDistributionPoints + +`func (o *PkiReadIssuerResponse) HasCrlDistributionPoints() bool` + +HasCrlDistributionPoints returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiReadIssuerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiReadIssuerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiReadIssuerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiReadIssuerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiReadIssuerResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiReadIssuerResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiReadIssuerResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiReadIssuerResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + +### GetIssuingCertificates + +`func (o *PkiReadIssuerResponse) GetIssuingCertificates() []string` + +GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. + +### GetIssuingCertificatesOk + +`func (o *PkiReadIssuerResponse) GetIssuingCertificatesOk() (*[]string, bool)` + +GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCertificates + +`func (o *PkiReadIssuerResponse) SetIssuingCertificates(v []string)` + +SetIssuingCertificates sets IssuingCertificates field to given value. + + +### HasIssuingCertificates + +`func (o *PkiReadIssuerResponse) HasIssuingCertificates() bool` + +HasIssuingCertificates returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiReadIssuerResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiReadIssuerResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiReadIssuerResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiReadIssuerResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetLeafNotAfterBehavior + +`func (o *PkiReadIssuerResponse) GetLeafNotAfterBehavior() string` + +GetLeafNotAfterBehavior returns the LeafNotAfterBehavior field if non-nil, zero value otherwise. + +### GetLeafNotAfterBehaviorOk + +`func (o *PkiReadIssuerResponse) GetLeafNotAfterBehaviorOk() (*string, bool)` + +GetLeafNotAfterBehaviorOk returns a tuple with the LeafNotAfterBehavior field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeafNotAfterBehavior + +`func (o *PkiReadIssuerResponse) SetLeafNotAfterBehavior(v string)` + +SetLeafNotAfterBehavior sets LeafNotAfterBehavior field to given value. + + +### HasLeafNotAfterBehavior + +`func (o *PkiReadIssuerResponse) HasLeafNotAfterBehavior() bool` + +HasLeafNotAfterBehavior returns a boolean if a field has been set. + + + + +### GetManualChain + +`func (o *PkiReadIssuerResponse) GetManualChain() []string` + +GetManualChain returns the ManualChain field if non-nil, zero value otherwise. + +### GetManualChainOk + +`func (o *PkiReadIssuerResponse) GetManualChainOk() (*[]string, bool)` + +GetManualChainOk returns a tuple with the ManualChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManualChain + +`func (o *PkiReadIssuerResponse) SetManualChain(v []string)` + +SetManualChain sets ManualChain field to given value. + + +### HasManualChain + +`func (o *PkiReadIssuerResponse) HasManualChain() bool` + +HasManualChain returns a boolean if a field has been set. + + + + +### GetOcspServers + +`func (o *PkiReadIssuerResponse) GetOcspServers() []string` + +GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. + +### GetOcspServersOk + +`func (o *PkiReadIssuerResponse) GetOcspServersOk() (*[]string, bool)` + +GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspServers + +`func (o *PkiReadIssuerResponse) SetOcspServers(v []string)` + +SetOcspServers sets OcspServers field to given value. + + +### HasOcspServers + +`func (o *PkiReadIssuerResponse) HasOcspServers() bool` + +HasOcspServers returns a boolean if a field has been set. + + + + +### GetRevocationSignatureAlgorithm + +`func (o *PkiReadIssuerResponse) GetRevocationSignatureAlgorithm() string` + +GetRevocationSignatureAlgorithm returns the RevocationSignatureAlgorithm field if non-nil, zero value otherwise. + +### GetRevocationSignatureAlgorithmOk + +`func (o *PkiReadIssuerResponse) GetRevocationSignatureAlgorithmOk() (*string, bool)` + +GetRevocationSignatureAlgorithmOk returns a tuple with the RevocationSignatureAlgorithm field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationSignatureAlgorithm + +`func (o *PkiReadIssuerResponse) SetRevocationSignatureAlgorithm(v string)` + +SetRevocationSignatureAlgorithm sets RevocationSignatureAlgorithm field to given value. + + +### HasRevocationSignatureAlgorithm + +`func (o *PkiReadIssuerResponse) HasRevocationSignatureAlgorithm() bool` + +HasRevocationSignatureAlgorithm returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiReadIssuerResponse) GetRevocationTime() int32` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiReadIssuerResponse) GetRevocationTimeOk() (*int32, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiReadIssuerResponse) SetRevocationTime(v int32)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiReadIssuerResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiReadIssuerResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiReadIssuerResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiReadIssuerResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiReadIssuerResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + +### GetRevoked + +`func (o *PkiReadIssuerResponse) GetRevoked() bool` + +GetRevoked returns the Revoked field if non-nil, zero value otherwise. + +### GetRevokedOk + +`func (o *PkiReadIssuerResponse) GetRevokedOk() (*bool, bool)` + +GetRevokedOk returns a tuple with the Revoked field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevoked + +`func (o *PkiReadIssuerResponse) SetRevoked(v bool)` + +SetRevoked sets Revoked field to given value. + + +### HasRevoked + +`func (o *PkiReadIssuerResponse) HasRevoked() bool` + +HasRevoked returns a boolean if a field has been set. + + + + +### GetUsage + +`func (o *PkiReadIssuerResponse) GetUsage() []string` + +GetUsage returns the Usage field if non-nil, zero value otherwise. + +### GetUsageOk + +`func (o *PkiReadIssuerResponse) GetUsageOk() (*[]string, bool)` + +GetUsageOk returns a tuple with the Usage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUsage + +`func (o *PkiReadIssuerResponse) SetUsage(v []string)` + +SetUsage sets Usage field to given value. + + +### HasUsage + +`func (o *PkiReadIssuerResponse) HasUsage() bool` + +HasUsage returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadIssuersConfigurationResponse.md b/docs/PkiReadIssuersConfigurationResponse.md new file mode 100644 index 00000000..6c473b8d --- /dev/null +++ b/docs/PkiReadIssuersConfigurationResponse.md @@ -0,0 +1,99 @@ +# PkiReadIssuersConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Default** | Pointer to **string** | Reference (name or identifier) to the default issuer. | [optional] +**DefaultFollowsLatestIssuer** | Pointer to **bool** | Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false. | [optional] + + + +## Methods + + +### NewPkiReadIssuersConfigurationResponse + +`func NewPkiReadIssuersConfigurationResponse() *PkiReadIssuersConfigurationResponse` + +NewPkiReadIssuersConfigurationResponse instantiates a new PkiReadIssuersConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadIssuersConfigurationResponseWithDefaults + +`func NewPkiReadIssuersConfigurationResponseWithDefaults() *PkiReadIssuersConfigurationResponse` + +NewPkiReadIssuersConfigurationResponseWithDefaults instantiates a new PkiReadIssuersConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetDefault + +`func (o *PkiReadIssuersConfigurationResponse) GetDefault() string` + +GetDefault returns the Default field if non-nil, zero value otherwise. + +### GetDefaultOk + +`func (o *PkiReadIssuersConfigurationResponse) GetDefaultOk() (*string, bool)` + +GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefault + +`func (o *PkiReadIssuersConfigurationResponse) SetDefault(v string)` + +SetDefault sets Default field to given value. + + +### HasDefault + +`func (o *PkiReadIssuersConfigurationResponse) HasDefault() bool` + +HasDefault returns a boolean if a field has been set. + + + + +### GetDefaultFollowsLatestIssuer + +`func (o *PkiReadIssuersConfigurationResponse) GetDefaultFollowsLatestIssuer() bool` + +GetDefaultFollowsLatestIssuer returns the DefaultFollowsLatestIssuer field if non-nil, zero value otherwise. + +### GetDefaultFollowsLatestIssuerOk + +`func (o *PkiReadIssuersConfigurationResponse) GetDefaultFollowsLatestIssuerOk() (*bool, bool)` + +GetDefaultFollowsLatestIssuerOk returns a tuple with the DefaultFollowsLatestIssuer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefaultFollowsLatestIssuer + +`func (o *PkiReadIssuersConfigurationResponse) SetDefaultFollowsLatestIssuer(v bool)` + +SetDefaultFollowsLatestIssuer sets DefaultFollowsLatestIssuer field to given value. + + +### HasDefaultFollowsLatestIssuer + +`func (o *PkiReadIssuersConfigurationResponse) HasDefaultFollowsLatestIssuer() bool` + +HasDefaultFollowsLatestIssuer returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadKeyResponse.md b/docs/PkiReadKeyResponse.md new file mode 100644 index 00000000..f0b8d05c --- /dev/null +++ b/docs/PkiReadKeyResponse.md @@ -0,0 +1,189 @@ +# PkiReadKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyId** | Pointer to **string** | Key Id | [optional] +**KeyName** | Pointer to **string** | Key Name | [optional] +**KeyType** | Pointer to **string** | Key Type | [optional] +**ManagedKeyId** | Pointer to **string** | Managed Key Id | [optional] +**ManagedKeyName** | Pointer to **string** | Managed Key Name | [optional] + + + +## Methods + + +### NewPkiReadKeyResponse + +`func NewPkiReadKeyResponse() *PkiReadKeyResponse` + +NewPkiReadKeyResponse instantiates a new PkiReadKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadKeyResponseWithDefaults + +`func NewPkiReadKeyResponseWithDefaults() *PkiReadKeyResponse` + +NewPkiReadKeyResponseWithDefaults instantiates a new PkiReadKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyId + +`func (o *PkiReadKeyResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiReadKeyResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiReadKeyResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiReadKeyResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiReadKeyResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiReadKeyResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiReadKeyResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiReadKeyResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiReadKeyResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiReadKeyResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiReadKeyResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiReadKeyResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetManagedKeyId + +`func (o *PkiReadKeyResponse) GetManagedKeyId() string` + +GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. + +### GetManagedKeyIdOk + +`func (o *PkiReadKeyResponse) GetManagedKeyIdOk() (*string, bool)` + +GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyId + +`func (o *PkiReadKeyResponse) SetManagedKeyId(v string)` + +SetManagedKeyId sets ManagedKeyId field to given value. + + +### HasManagedKeyId + +`func (o *PkiReadKeyResponse) HasManagedKeyId() bool` + +HasManagedKeyId returns a boolean if a field has been set. + + + + +### GetManagedKeyName + +`func (o *PkiReadKeyResponse) GetManagedKeyName() string` + +GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. + +### GetManagedKeyNameOk + +`func (o *PkiReadKeyResponse) GetManagedKeyNameOk() (*string, bool)` + +GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyName + +`func (o *PkiReadKeyResponse) SetManagedKeyName(v string)` + +SetManagedKeyName sets ManagedKeyName field to given value. + + +### HasManagedKeyName + +`func (o *PkiReadKeyResponse) HasManagedKeyName() bool` + +HasManagedKeyName returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadKeysConfigurationResponse.md b/docs/PkiReadKeysConfigurationResponse.md new file mode 100644 index 00000000..6beee07b --- /dev/null +++ b/docs/PkiReadKeysConfigurationResponse.md @@ -0,0 +1,69 @@ +# PkiReadKeysConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Default** | Pointer to **string** | Reference (name or identifier) to the default issuer. | [optional] + + + +## Methods + + +### NewPkiReadKeysConfigurationResponse + +`func NewPkiReadKeysConfigurationResponse() *PkiReadKeysConfigurationResponse` + +NewPkiReadKeysConfigurationResponse instantiates a new PkiReadKeysConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadKeysConfigurationResponseWithDefaults + +`func NewPkiReadKeysConfigurationResponseWithDefaults() *PkiReadKeysConfigurationResponse` + +NewPkiReadKeysConfigurationResponseWithDefaults instantiates a new PkiReadKeysConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetDefault + +`func (o *PkiReadKeysConfigurationResponse) GetDefault() string` + +GetDefault returns the Default field if non-nil, zero value otherwise. + +### GetDefaultOk + +`func (o *PkiReadKeysConfigurationResponse) GetDefaultOk() (*string, bool)` + +GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefault + +`func (o *PkiReadKeysConfigurationResponse) SetDefault(v string)` + +SetDefault sets Default field to given value. + + +### HasDefault + +`func (o *PkiReadKeysConfigurationResponse) HasDefault() bool` + +HasDefault returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadRoleResponse.md b/docs/PkiReadRoleResponse.md new file mode 100644 index 00000000..9acdef11 --- /dev/null +++ b/docs/PkiReadRoleResponse.md @@ -0,0 +1,1449 @@ +# PkiReadRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AllowAnyName** | Pointer to **bool** | If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. | [optional] +**AllowBareDomains** | Pointer to **bool** | If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information. | [optional] +**AllowGlobDomains** | Pointer to **bool** | If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information. | [optional] +**AllowIpSans** | Pointer to **bool** | If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed. | [optional] +**AllowLocalhost** | Pointer to **bool** | Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. | [optional] +**AllowSubdomains** | Pointer to **bool** | If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information. | [optional] +**AllowTokenDisplayname** | Pointer to **bool** | Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. | [optional] +**AllowWildcardCertificates** | Pointer to **bool** | If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information. | [optional] +**AllowedDomains** | Pointer to **[]string** | Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains. | [optional] +**AllowedDomainsTemplate** | Pointer to **bool** | If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. | [optional] +**AllowedOtherSans** | Pointer to **[]string** | If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format <oid>;<type>:<value>. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8). | [optional] +**AllowedSerialNumbers** | Pointer to **[]string** | If set, an array of allowed serial numbers to put in Subject. These values support globbing. | [optional] +**AllowedUriSans** | Pointer to **[]string** | If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. | [optional] +**AllowedUriSansTemplate** | Pointer to **bool** | If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. | [optional] +**AllowedUserIds** | Pointer to **[]string** | If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 | [optional] +**BasicConstraintsValidForNonCa** | Pointer to **bool** | Mark Basic Constraints valid when issuing non-CA certificates. | [optional] +**ClientFlag** | Pointer to **bool** | If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. | [optional] +**CnValidations** | Pointer to **[]string** | List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs. | [optional] +**CodeSigningFlag** | Pointer to **bool** | If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12. | [optional] +**Country** | Pointer to **[]string** | If set, Country will be set to this value in certificates issued by this role. | [optional] +**EmailProtectionFlag** | Pointer to **bool** | If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12. | [optional] +**EnforceHostnames** | Pointer to **bool** | If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true. | [optional] +**ExtKeyUsage** | Pointer to **[]string** | A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12. | [optional] +**ExtKeyUsageOids** | Pointer to **[]string** | A comma-separated string or list of extended key usage oids. | [optional] +**GenerateLease** | Pointer to **bool** | If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke <lease_id>\" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault. | [optional] +**IssuerRef** | Pointer to **string** | Reference to the issuer used to sign requests serviced by this role. | [optional] +**KeyBits** | Pointer to **int32** | The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values. | [optional] +**KeyUsage** | Pointer to **[]string** | A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3. | [optional] +**Locality** | Pointer to **[]string** | If set, Locality will be set to this value in certificates issued by this role. | [optional] +**MaxTtl** | Pointer to **int32** | The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL. | [optional] +**NoStore** | Pointer to **bool** | If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\". | [optional] +**NotAfter** | Pointer to **string** | Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. | [optional] +**NotBeforeDuration** | Pointer to **int32** | The duration before now which the certificate needs to be backdated by. | [optional] +**Organization** | Pointer to **[]string** | If set, O (Organization) will be set to this value in certificates issued by this role. | [optional] +**Ou** | Pointer to **[]string** | If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role. | [optional] +**PolicyIdentifiers** | Pointer to **[]string** | A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}]. | [optional] +**PostalCode** | Pointer to **[]string** | If set, Postal Code will be set to this value in certificates issued by this role. | [optional] +**Province** | Pointer to **[]string** | If set, Province will be set to this value in certificates issued by this role. | [optional] +**RequireCn** | Pointer to **bool** | If set to false, makes the 'common_name' field optional while generating a certificate. | [optional] +**ServerFlag** | Pointer to **bool** | If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. | [optional] [default to true] +**SignatureBits** | Pointer to **int32** | The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). | [optional] +**StreetAddress** | Pointer to **[]string** | If set, Street Address will be set to this value in certificates issued by this role. | [optional] +**Ttl** | Pointer to **int32** | The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter. | [optional] +**UseCsrCommonName** | Pointer to **bool** | If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true. | [optional] +**UseCsrSans** | Pointer to **bool** | If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true. | [optional] +**UsePss** | Pointer to **bool** | Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. | [optional] + + + +## Methods + + +### NewPkiReadRoleResponse + +`func NewPkiReadRoleResponse() *PkiReadRoleResponse` + +NewPkiReadRoleResponse instantiates a new PkiReadRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadRoleResponseWithDefaults + +`func NewPkiReadRoleResponseWithDefaults() *PkiReadRoleResponse` + +NewPkiReadRoleResponseWithDefaults instantiates a new PkiReadRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAllowAnyName + +`func (o *PkiReadRoleResponse) GetAllowAnyName() bool` + +GetAllowAnyName returns the AllowAnyName field if non-nil, zero value otherwise. + +### GetAllowAnyNameOk + +`func (o *PkiReadRoleResponse) GetAllowAnyNameOk() (*bool, bool)` + +GetAllowAnyNameOk returns a tuple with the AllowAnyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowAnyName + +`func (o *PkiReadRoleResponse) SetAllowAnyName(v bool)` + +SetAllowAnyName sets AllowAnyName field to given value. + + +### HasAllowAnyName + +`func (o *PkiReadRoleResponse) HasAllowAnyName() bool` + +HasAllowAnyName returns a boolean if a field has been set. + + + + +### GetAllowBareDomains + +`func (o *PkiReadRoleResponse) GetAllowBareDomains() bool` + +GetAllowBareDomains returns the AllowBareDomains field if non-nil, zero value otherwise. + +### GetAllowBareDomainsOk + +`func (o *PkiReadRoleResponse) GetAllowBareDomainsOk() (*bool, bool)` + +GetAllowBareDomainsOk returns a tuple with the AllowBareDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowBareDomains + +`func (o *PkiReadRoleResponse) SetAllowBareDomains(v bool)` + +SetAllowBareDomains sets AllowBareDomains field to given value. + + +### HasAllowBareDomains + +`func (o *PkiReadRoleResponse) HasAllowBareDomains() bool` + +HasAllowBareDomains returns a boolean if a field has been set. + + + + +### GetAllowGlobDomains + +`func (o *PkiReadRoleResponse) GetAllowGlobDomains() bool` + +GetAllowGlobDomains returns the AllowGlobDomains field if non-nil, zero value otherwise. + +### GetAllowGlobDomainsOk + +`func (o *PkiReadRoleResponse) GetAllowGlobDomainsOk() (*bool, bool)` + +GetAllowGlobDomainsOk returns a tuple with the AllowGlobDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowGlobDomains + +`func (o *PkiReadRoleResponse) SetAllowGlobDomains(v bool)` + +SetAllowGlobDomains sets AllowGlobDomains field to given value. + + +### HasAllowGlobDomains + +`func (o *PkiReadRoleResponse) HasAllowGlobDomains() bool` + +HasAllowGlobDomains returns a boolean if a field has been set. + + + + +### GetAllowIpSans + +`func (o *PkiReadRoleResponse) GetAllowIpSans() bool` + +GetAllowIpSans returns the AllowIpSans field if non-nil, zero value otherwise. + +### GetAllowIpSansOk + +`func (o *PkiReadRoleResponse) GetAllowIpSansOk() (*bool, bool)` + +GetAllowIpSansOk returns a tuple with the AllowIpSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowIpSans + +`func (o *PkiReadRoleResponse) SetAllowIpSans(v bool)` + +SetAllowIpSans sets AllowIpSans field to given value. + + +### HasAllowIpSans + +`func (o *PkiReadRoleResponse) HasAllowIpSans() bool` + +HasAllowIpSans returns a boolean if a field has been set. + + + + +### GetAllowLocalhost + +`func (o *PkiReadRoleResponse) GetAllowLocalhost() bool` + +GetAllowLocalhost returns the AllowLocalhost field if non-nil, zero value otherwise. + +### GetAllowLocalhostOk + +`func (o *PkiReadRoleResponse) GetAllowLocalhostOk() (*bool, bool)` + +GetAllowLocalhostOk returns a tuple with the AllowLocalhost field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowLocalhost + +`func (o *PkiReadRoleResponse) SetAllowLocalhost(v bool)` + +SetAllowLocalhost sets AllowLocalhost field to given value. + + +### HasAllowLocalhost + +`func (o *PkiReadRoleResponse) HasAllowLocalhost() bool` + +HasAllowLocalhost returns a boolean if a field has been set. + + + + +### GetAllowSubdomains + +`func (o *PkiReadRoleResponse) GetAllowSubdomains() bool` + +GetAllowSubdomains returns the AllowSubdomains field if non-nil, zero value otherwise. + +### GetAllowSubdomainsOk + +`func (o *PkiReadRoleResponse) GetAllowSubdomainsOk() (*bool, bool)` + +GetAllowSubdomainsOk returns a tuple with the AllowSubdomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowSubdomains + +`func (o *PkiReadRoleResponse) SetAllowSubdomains(v bool)` + +SetAllowSubdomains sets AllowSubdomains field to given value. + + +### HasAllowSubdomains + +`func (o *PkiReadRoleResponse) HasAllowSubdomains() bool` + +HasAllowSubdomains returns a boolean if a field has been set. + + + + +### GetAllowTokenDisplayname + +`func (o *PkiReadRoleResponse) GetAllowTokenDisplayname() bool` + +GetAllowTokenDisplayname returns the AllowTokenDisplayname field if non-nil, zero value otherwise. + +### GetAllowTokenDisplaynameOk + +`func (o *PkiReadRoleResponse) GetAllowTokenDisplaynameOk() (*bool, bool)` + +GetAllowTokenDisplaynameOk returns a tuple with the AllowTokenDisplayname field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowTokenDisplayname + +`func (o *PkiReadRoleResponse) SetAllowTokenDisplayname(v bool)` + +SetAllowTokenDisplayname sets AllowTokenDisplayname field to given value. + + +### HasAllowTokenDisplayname + +`func (o *PkiReadRoleResponse) HasAllowTokenDisplayname() bool` + +HasAllowTokenDisplayname returns a boolean if a field has been set. + + + + +### GetAllowWildcardCertificates + +`func (o *PkiReadRoleResponse) GetAllowWildcardCertificates() bool` + +GetAllowWildcardCertificates returns the AllowWildcardCertificates field if non-nil, zero value otherwise. + +### GetAllowWildcardCertificatesOk + +`func (o *PkiReadRoleResponse) GetAllowWildcardCertificatesOk() (*bool, bool)` + +GetAllowWildcardCertificatesOk returns a tuple with the AllowWildcardCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowWildcardCertificates + +`func (o *PkiReadRoleResponse) SetAllowWildcardCertificates(v bool)` + +SetAllowWildcardCertificates sets AllowWildcardCertificates field to given value. + + +### HasAllowWildcardCertificates + +`func (o *PkiReadRoleResponse) HasAllowWildcardCertificates() bool` + +HasAllowWildcardCertificates returns a boolean if a field has been set. + + + + +### GetAllowedDomains + +`func (o *PkiReadRoleResponse) GetAllowedDomains() []string` + +GetAllowedDomains returns the AllowedDomains field if non-nil, zero value otherwise. + +### GetAllowedDomainsOk + +`func (o *PkiReadRoleResponse) GetAllowedDomainsOk() (*[]string, bool)` + +GetAllowedDomainsOk returns a tuple with the AllowedDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedDomains + +`func (o *PkiReadRoleResponse) SetAllowedDomains(v []string)` + +SetAllowedDomains sets AllowedDomains field to given value. + + +### HasAllowedDomains + +`func (o *PkiReadRoleResponse) HasAllowedDomains() bool` + +HasAllowedDomains returns a boolean if a field has been set. + + + + +### GetAllowedDomainsTemplate + +`func (o *PkiReadRoleResponse) GetAllowedDomainsTemplate() bool` + +GetAllowedDomainsTemplate returns the AllowedDomainsTemplate field if non-nil, zero value otherwise. + +### GetAllowedDomainsTemplateOk + +`func (o *PkiReadRoleResponse) GetAllowedDomainsTemplateOk() (*bool, bool)` + +GetAllowedDomainsTemplateOk returns a tuple with the AllowedDomainsTemplate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedDomainsTemplate + +`func (o *PkiReadRoleResponse) SetAllowedDomainsTemplate(v bool)` + +SetAllowedDomainsTemplate sets AllowedDomainsTemplate field to given value. + + +### HasAllowedDomainsTemplate + +`func (o *PkiReadRoleResponse) HasAllowedDomainsTemplate() bool` + +HasAllowedDomainsTemplate returns a boolean if a field has been set. + + + + +### GetAllowedOtherSans + +`func (o *PkiReadRoleResponse) GetAllowedOtherSans() []string` + +GetAllowedOtherSans returns the AllowedOtherSans field if non-nil, zero value otherwise. + +### GetAllowedOtherSansOk + +`func (o *PkiReadRoleResponse) GetAllowedOtherSansOk() (*[]string, bool)` + +GetAllowedOtherSansOk returns a tuple with the AllowedOtherSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedOtherSans + +`func (o *PkiReadRoleResponse) SetAllowedOtherSans(v []string)` + +SetAllowedOtherSans sets AllowedOtherSans field to given value. + + +### HasAllowedOtherSans + +`func (o *PkiReadRoleResponse) HasAllowedOtherSans() bool` + +HasAllowedOtherSans returns a boolean if a field has been set. + + + + +### GetAllowedSerialNumbers + +`func (o *PkiReadRoleResponse) GetAllowedSerialNumbers() []string` + +GetAllowedSerialNumbers returns the AllowedSerialNumbers field if non-nil, zero value otherwise. + +### GetAllowedSerialNumbersOk + +`func (o *PkiReadRoleResponse) GetAllowedSerialNumbersOk() (*[]string, bool)` + +GetAllowedSerialNumbersOk returns a tuple with the AllowedSerialNumbers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedSerialNumbers + +`func (o *PkiReadRoleResponse) SetAllowedSerialNumbers(v []string)` + +SetAllowedSerialNumbers sets AllowedSerialNumbers field to given value. + + +### HasAllowedSerialNumbers + +`func (o *PkiReadRoleResponse) HasAllowedSerialNumbers() bool` + +HasAllowedSerialNumbers returns a boolean if a field has been set. + + + + +### GetAllowedUriSans + +`func (o *PkiReadRoleResponse) GetAllowedUriSans() []string` + +GetAllowedUriSans returns the AllowedUriSans field if non-nil, zero value otherwise. + +### GetAllowedUriSansOk + +`func (o *PkiReadRoleResponse) GetAllowedUriSansOk() (*[]string, bool)` + +GetAllowedUriSansOk returns a tuple with the AllowedUriSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUriSans + +`func (o *PkiReadRoleResponse) SetAllowedUriSans(v []string)` + +SetAllowedUriSans sets AllowedUriSans field to given value. + + +### HasAllowedUriSans + +`func (o *PkiReadRoleResponse) HasAllowedUriSans() bool` + +HasAllowedUriSans returns a boolean if a field has been set. + + + + +### GetAllowedUriSansTemplate + +`func (o *PkiReadRoleResponse) GetAllowedUriSansTemplate() bool` + +GetAllowedUriSansTemplate returns the AllowedUriSansTemplate field if non-nil, zero value otherwise. + +### GetAllowedUriSansTemplateOk + +`func (o *PkiReadRoleResponse) GetAllowedUriSansTemplateOk() (*bool, bool)` + +GetAllowedUriSansTemplateOk returns a tuple with the AllowedUriSansTemplate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUriSansTemplate + +`func (o *PkiReadRoleResponse) SetAllowedUriSansTemplate(v bool)` + +SetAllowedUriSansTemplate sets AllowedUriSansTemplate field to given value. + + +### HasAllowedUriSansTemplate + +`func (o *PkiReadRoleResponse) HasAllowedUriSansTemplate() bool` + +HasAllowedUriSansTemplate returns a boolean if a field has been set. + + + + +### GetAllowedUserIds + +`func (o *PkiReadRoleResponse) GetAllowedUserIds() []string` + +GetAllowedUserIds returns the AllowedUserIds field if non-nil, zero value otherwise. + +### GetAllowedUserIdsOk + +`func (o *PkiReadRoleResponse) GetAllowedUserIdsOk() (*[]string, bool)` + +GetAllowedUserIdsOk returns a tuple with the AllowedUserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUserIds + +`func (o *PkiReadRoleResponse) SetAllowedUserIds(v []string)` + +SetAllowedUserIds sets AllowedUserIds field to given value. + + +### HasAllowedUserIds + +`func (o *PkiReadRoleResponse) HasAllowedUserIds() bool` + +HasAllowedUserIds returns a boolean if a field has been set. + + + + +### GetBasicConstraintsValidForNonCa + +`func (o *PkiReadRoleResponse) GetBasicConstraintsValidForNonCa() bool` + +GetBasicConstraintsValidForNonCa returns the BasicConstraintsValidForNonCa field if non-nil, zero value otherwise. + +### GetBasicConstraintsValidForNonCaOk + +`func (o *PkiReadRoleResponse) GetBasicConstraintsValidForNonCaOk() (*bool, bool)` + +GetBasicConstraintsValidForNonCaOk returns a tuple with the BasicConstraintsValidForNonCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBasicConstraintsValidForNonCa + +`func (o *PkiReadRoleResponse) SetBasicConstraintsValidForNonCa(v bool)` + +SetBasicConstraintsValidForNonCa sets BasicConstraintsValidForNonCa field to given value. + + +### HasBasicConstraintsValidForNonCa + +`func (o *PkiReadRoleResponse) HasBasicConstraintsValidForNonCa() bool` + +HasBasicConstraintsValidForNonCa returns a boolean if a field has been set. + + + + +### GetClientFlag + +`func (o *PkiReadRoleResponse) GetClientFlag() bool` + +GetClientFlag returns the ClientFlag field if non-nil, zero value otherwise. + +### GetClientFlagOk + +`func (o *PkiReadRoleResponse) GetClientFlagOk() (*bool, bool)` + +GetClientFlagOk returns a tuple with the ClientFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetClientFlag + +`func (o *PkiReadRoleResponse) SetClientFlag(v bool)` + +SetClientFlag sets ClientFlag field to given value. + + +### HasClientFlag + +`func (o *PkiReadRoleResponse) HasClientFlag() bool` + +HasClientFlag returns a boolean if a field has been set. + + + + +### GetCnValidations + +`func (o *PkiReadRoleResponse) GetCnValidations() []string` + +GetCnValidations returns the CnValidations field if non-nil, zero value otherwise. + +### GetCnValidationsOk + +`func (o *PkiReadRoleResponse) GetCnValidationsOk() (*[]string, bool)` + +GetCnValidationsOk returns a tuple with the CnValidations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCnValidations + +`func (o *PkiReadRoleResponse) SetCnValidations(v []string)` + +SetCnValidations sets CnValidations field to given value. + + +### HasCnValidations + +`func (o *PkiReadRoleResponse) HasCnValidations() bool` + +HasCnValidations returns a boolean if a field has been set. + + + + +### GetCodeSigningFlag + +`func (o *PkiReadRoleResponse) GetCodeSigningFlag() bool` + +GetCodeSigningFlag returns the CodeSigningFlag field if non-nil, zero value otherwise. + +### GetCodeSigningFlagOk + +`func (o *PkiReadRoleResponse) GetCodeSigningFlagOk() (*bool, bool)` + +GetCodeSigningFlagOk returns a tuple with the CodeSigningFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCodeSigningFlag + +`func (o *PkiReadRoleResponse) SetCodeSigningFlag(v bool)` + +SetCodeSigningFlag sets CodeSigningFlag field to given value. + + +### HasCodeSigningFlag + +`func (o *PkiReadRoleResponse) HasCodeSigningFlag() bool` + +HasCodeSigningFlag returns a boolean if a field has been set. + + + + +### GetCountry + +`func (o *PkiReadRoleResponse) GetCountry() []string` + +GetCountry returns the Country field if non-nil, zero value otherwise. + +### GetCountryOk + +`func (o *PkiReadRoleResponse) GetCountryOk() (*[]string, bool)` + +GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCountry + +`func (o *PkiReadRoleResponse) SetCountry(v []string)` + +SetCountry sets Country field to given value. + + +### HasCountry + +`func (o *PkiReadRoleResponse) HasCountry() bool` + +HasCountry returns a boolean if a field has been set. + + + + +### GetEmailProtectionFlag + +`func (o *PkiReadRoleResponse) GetEmailProtectionFlag() bool` + +GetEmailProtectionFlag returns the EmailProtectionFlag field if non-nil, zero value otherwise. + +### GetEmailProtectionFlagOk + +`func (o *PkiReadRoleResponse) GetEmailProtectionFlagOk() (*bool, bool)` + +GetEmailProtectionFlagOk returns a tuple with the EmailProtectionFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEmailProtectionFlag + +`func (o *PkiReadRoleResponse) SetEmailProtectionFlag(v bool)` + +SetEmailProtectionFlag sets EmailProtectionFlag field to given value. + + +### HasEmailProtectionFlag + +`func (o *PkiReadRoleResponse) HasEmailProtectionFlag() bool` + +HasEmailProtectionFlag returns a boolean if a field has been set. + + + + +### GetEnforceHostnames + +`func (o *PkiReadRoleResponse) GetEnforceHostnames() bool` + +GetEnforceHostnames returns the EnforceHostnames field if non-nil, zero value otherwise. + +### GetEnforceHostnamesOk + +`func (o *PkiReadRoleResponse) GetEnforceHostnamesOk() (*bool, bool)` + +GetEnforceHostnamesOk returns a tuple with the EnforceHostnames field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnforceHostnames + +`func (o *PkiReadRoleResponse) SetEnforceHostnames(v bool)` + +SetEnforceHostnames sets EnforceHostnames field to given value. + + +### HasEnforceHostnames + +`func (o *PkiReadRoleResponse) HasEnforceHostnames() bool` + +HasEnforceHostnames returns a boolean if a field has been set. + + + + +### GetExtKeyUsage + +`func (o *PkiReadRoleResponse) GetExtKeyUsage() []string` + +GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. + +### GetExtKeyUsageOk + +`func (o *PkiReadRoleResponse) GetExtKeyUsageOk() (*[]string, bool)` + +GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExtKeyUsage + +`func (o *PkiReadRoleResponse) SetExtKeyUsage(v []string)` + +SetExtKeyUsage sets ExtKeyUsage field to given value. + + +### HasExtKeyUsage + +`func (o *PkiReadRoleResponse) HasExtKeyUsage() bool` + +HasExtKeyUsage returns a boolean if a field has been set. + + + + +### GetExtKeyUsageOids + +`func (o *PkiReadRoleResponse) GetExtKeyUsageOids() []string` + +GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. + +### GetExtKeyUsageOidsOk + +`func (o *PkiReadRoleResponse) GetExtKeyUsageOidsOk() (*[]string, bool)` + +GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExtKeyUsageOids + +`func (o *PkiReadRoleResponse) SetExtKeyUsageOids(v []string)` + +SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. + + +### HasExtKeyUsageOids + +`func (o *PkiReadRoleResponse) HasExtKeyUsageOids() bool` + +HasExtKeyUsageOids returns a boolean if a field has been set. + + + + +### GetGenerateLease + +`func (o *PkiReadRoleResponse) GetGenerateLease() bool` + +GetGenerateLease returns the GenerateLease field if non-nil, zero value otherwise. + +### GetGenerateLeaseOk + +`func (o *PkiReadRoleResponse) GetGenerateLeaseOk() (*bool, bool)` + +GetGenerateLeaseOk returns a tuple with the GenerateLease field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetGenerateLease + +`func (o *PkiReadRoleResponse) SetGenerateLease(v bool)` + +SetGenerateLease sets GenerateLease field to given value. + + +### HasGenerateLease + +`func (o *PkiReadRoleResponse) HasGenerateLease() bool` + +HasGenerateLease returns a boolean if a field has been set. + + + + +### GetIssuerRef + +`func (o *PkiReadRoleResponse) GetIssuerRef() string` + +GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. + +### GetIssuerRefOk + +`func (o *PkiReadRoleResponse) GetIssuerRefOk() (*string, bool)` + +GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerRef + +`func (o *PkiReadRoleResponse) SetIssuerRef(v string)` + +SetIssuerRef sets IssuerRef field to given value. + + +### HasIssuerRef + +`func (o *PkiReadRoleResponse) HasIssuerRef() bool` + +HasIssuerRef returns a boolean if a field has been set. + + + + +### GetKeyBits + +`func (o *PkiReadRoleResponse) GetKeyBits() int32` + +GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. + +### GetKeyBitsOk + +`func (o *PkiReadRoleResponse) GetKeyBitsOk() (*int32, bool)` + +GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyBits + +`func (o *PkiReadRoleResponse) SetKeyBits(v int32)` + +SetKeyBits sets KeyBits field to given value. + + +### HasKeyBits + +`func (o *PkiReadRoleResponse) HasKeyBits() bool` + +HasKeyBits returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiReadRoleResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiReadRoleResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiReadRoleResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiReadRoleResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetKeyUsage + +`func (o *PkiReadRoleResponse) GetKeyUsage() []string` + +GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. + +### GetKeyUsageOk + +`func (o *PkiReadRoleResponse) GetKeyUsageOk() (*[]string, bool)` + +GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyUsage + +`func (o *PkiReadRoleResponse) SetKeyUsage(v []string)` + +SetKeyUsage sets KeyUsage field to given value. + + +### HasKeyUsage + +`func (o *PkiReadRoleResponse) HasKeyUsage() bool` + +HasKeyUsage returns a boolean if a field has been set. + + + + +### GetLocality + +`func (o *PkiReadRoleResponse) GetLocality() []string` + +GetLocality returns the Locality field if non-nil, zero value otherwise. + +### GetLocalityOk + +`func (o *PkiReadRoleResponse) GetLocalityOk() (*[]string, bool)` + +GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLocality + +`func (o *PkiReadRoleResponse) SetLocality(v []string)` + +SetLocality sets Locality field to given value. + + +### HasLocality + +`func (o *PkiReadRoleResponse) HasLocality() bool` + +HasLocality returns a boolean if a field has been set. + + + + +### GetMaxTtl + +`func (o *PkiReadRoleResponse) GetMaxTtl() int32` + +GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. + +### GetMaxTtlOk + +`func (o *PkiReadRoleResponse) GetMaxTtlOk() (*int32, bool)` + +GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxTtl + +`func (o *PkiReadRoleResponse) SetMaxTtl(v int32)` + +SetMaxTtl sets MaxTtl field to given value. + + +### HasMaxTtl + +`func (o *PkiReadRoleResponse) HasMaxTtl() bool` + +HasMaxTtl returns a boolean if a field has been set. + + + + +### GetNoStore + +`func (o *PkiReadRoleResponse) GetNoStore() bool` + +GetNoStore returns the NoStore field if non-nil, zero value otherwise. + +### GetNoStoreOk + +`func (o *PkiReadRoleResponse) GetNoStoreOk() (*bool, bool)` + +GetNoStoreOk returns a tuple with the NoStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNoStore + +`func (o *PkiReadRoleResponse) SetNoStore(v bool)` + +SetNoStore sets NoStore field to given value. + + +### HasNoStore + +`func (o *PkiReadRoleResponse) HasNoStore() bool` + +HasNoStore returns a boolean if a field has been set. + + + + +### GetNotAfter + +`func (o *PkiReadRoleResponse) GetNotAfter() string` + +GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. + +### GetNotAfterOk + +`func (o *PkiReadRoleResponse) GetNotAfterOk() (*string, bool)` + +GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNotAfter + +`func (o *PkiReadRoleResponse) SetNotAfter(v string)` + +SetNotAfter sets NotAfter field to given value. + + +### HasNotAfter + +`func (o *PkiReadRoleResponse) HasNotAfter() bool` + +HasNotAfter returns a boolean if a field has been set. + + + + +### GetNotBeforeDuration + +`func (o *PkiReadRoleResponse) GetNotBeforeDuration() int32` + +GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. + +### GetNotBeforeDurationOk + +`func (o *PkiReadRoleResponse) GetNotBeforeDurationOk() (*int32, bool)` + +GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNotBeforeDuration + +`func (o *PkiReadRoleResponse) SetNotBeforeDuration(v int32)` + +SetNotBeforeDuration sets NotBeforeDuration field to given value. + + +### HasNotBeforeDuration + +`func (o *PkiReadRoleResponse) HasNotBeforeDuration() bool` + +HasNotBeforeDuration returns a boolean if a field has been set. + + + + +### GetOrganization + +`func (o *PkiReadRoleResponse) GetOrganization() []string` + +GetOrganization returns the Organization field if non-nil, zero value otherwise. + +### GetOrganizationOk + +`func (o *PkiReadRoleResponse) GetOrganizationOk() (*[]string, bool)` + +GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOrganization + +`func (o *PkiReadRoleResponse) SetOrganization(v []string)` + +SetOrganization sets Organization field to given value. + + +### HasOrganization + +`func (o *PkiReadRoleResponse) HasOrganization() bool` + +HasOrganization returns a boolean if a field has been set. + + + + +### GetOu + +`func (o *PkiReadRoleResponse) GetOu() []string` + +GetOu returns the Ou field if non-nil, zero value otherwise. + +### GetOuOk + +`func (o *PkiReadRoleResponse) GetOuOk() (*[]string, bool)` + +GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOu + +`func (o *PkiReadRoleResponse) SetOu(v []string)` + +SetOu sets Ou field to given value. + + +### HasOu + +`func (o *PkiReadRoleResponse) HasOu() bool` + +HasOu returns a boolean if a field has been set. + + + + +### GetPolicyIdentifiers + +`func (o *PkiReadRoleResponse) GetPolicyIdentifiers() []string` + +GetPolicyIdentifiers returns the PolicyIdentifiers field if non-nil, zero value otherwise. + +### GetPolicyIdentifiersOk + +`func (o *PkiReadRoleResponse) GetPolicyIdentifiersOk() (*[]string, bool)` + +GetPolicyIdentifiersOk returns a tuple with the PolicyIdentifiers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicyIdentifiers + +`func (o *PkiReadRoleResponse) SetPolicyIdentifiers(v []string)` + +SetPolicyIdentifiers sets PolicyIdentifiers field to given value. + + +### HasPolicyIdentifiers + +`func (o *PkiReadRoleResponse) HasPolicyIdentifiers() bool` + +HasPolicyIdentifiers returns a boolean if a field has been set. + + + + +### GetPostalCode + +`func (o *PkiReadRoleResponse) GetPostalCode() []string` + +GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. + +### GetPostalCodeOk + +`func (o *PkiReadRoleResponse) GetPostalCodeOk() (*[]string, bool)` + +GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPostalCode + +`func (o *PkiReadRoleResponse) SetPostalCode(v []string)` + +SetPostalCode sets PostalCode field to given value. + + +### HasPostalCode + +`func (o *PkiReadRoleResponse) HasPostalCode() bool` + +HasPostalCode returns a boolean if a field has been set. + + + + +### GetProvince + +`func (o *PkiReadRoleResponse) GetProvince() []string` + +GetProvince returns the Province field if non-nil, zero value otherwise. + +### GetProvinceOk + +`func (o *PkiReadRoleResponse) GetProvinceOk() (*[]string, bool)` + +GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProvince + +`func (o *PkiReadRoleResponse) SetProvince(v []string)` + +SetProvince sets Province field to given value. + + +### HasProvince + +`func (o *PkiReadRoleResponse) HasProvince() bool` + +HasProvince returns a boolean if a field has been set. + + + + +### GetRequireCn + +`func (o *PkiReadRoleResponse) GetRequireCn() bool` + +GetRequireCn returns the RequireCn field if non-nil, zero value otherwise. + +### GetRequireCnOk + +`func (o *PkiReadRoleResponse) GetRequireCnOk() (*bool, bool)` + +GetRequireCnOk returns a tuple with the RequireCn field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequireCn + +`func (o *PkiReadRoleResponse) SetRequireCn(v bool)` + +SetRequireCn sets RequireCn field to given value. + + +### HasRequireCn + +`func (o *PkiReadRoleResponse) HasRequireCn() bool` + +HasRequireCn returns a boolean if a field has been set. + + + + +### GetServerFlag + +`func (o *PkiReadRoleResponse) GetServerFlag() bool` + +GetServerFlag returns the ServerFlag field if non-nil, zero value otherwise. + +### GetServerFlagOk + +`func (o *PkiReadRoleResponse) GetServerFlagOk() (*bool, bool)` + +GetServerFlagOk returns a tuple with the ServerFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetServerFlag + +`func (o *PkiReadRoleResponse) SetServerFlag(v bool)` + +SetServerFlag sets ServerFlag field to given value. + + +### HasServerFlag + +`func (o *PkiReadRoleResponse) HasServerFlag() bool` + +HasServerFlag returns a boolean if a field has been set. + + + + +### GetSignatureBits + +`func (o *PkiReadRoleResponse) GetSignatureBits() int32` + +GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. + +### GetSignatureBitsOk + +`func (o *PkiReadRoleResponse) GetSignatureBitsOk() (*int32, bool)` + +GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSignatureBits + +`func (o *PkiReadRoleResponse) SetSignatureBits(v int32)` + +SetSignatureBits sets SignatureBits field to given value. + + +### HasSignatureBits + +`func (o *PkiReadRoleResponse) HasSignatureBits() bool` + +HasSignatureBits returns a boolean if a field has been set. + + + + +### GetStreetAddress + +`func (o *PkiReadRoleResponse) GetStreetAddress() []string` + +GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. + +### GetStreetAddressOk + +`func (o *PkiReadRoleResponse) GetStreetAddressOk() (*[]string, bool)` + +GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStreetAddress + +`func (o *PkiReadRoleResponse) SetStreetAddress(v []string)` + +SetStreetAddress sets StreetAddress field to given value. + + +### HasStreetAddress + +`func (o *PkiReadRoleResponse) HasStreetAddress() bool` + +HasStreetAddress returns a boolean if a field has been set. + + + + +### GetTtl + +`func (o *PkiReadRoleResponse) GetTtl() int32` + +GetTtl returns the Ttl field if non-nil, zero value otherwise. + +### GetTtlOk + +`func (o *PkiReadRoleResponse) GetTtlOk() (*int32, bool)` + +GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTtl + +`func (o *PkiReadRoleResponse) SetTtl(v int32)` + +SetTtl sets Ttl field to given value. + + +### HasTtl + +`func (o *PkiReadRoleResponse) HasTtl() bool` + +HasTtl returns a boolean if a field has been set. + + + + +### GetUseCsrCommonName + +`func (o *PkiReadRoleResponse) GetUseCsrCommonName() bool` + +GetUseCsrCommonName returns the UseCsrCommonName field if non-nil, zero value otherwise. + +### GetUseCsrCommonNameOk + +`func (o *PkiReadRoleResponse) GetUseCsrCommonNameOk() (*bool, bool)` + +GetUseCsrCommonNameOk returns a tuple with the UseCsrCommonName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUseCsrCommonName + +`func (o *PkiReadRoleResponse) SetUseCsrCommonName(v bool)` + +SetUseCsrCommonName sets UseCsrCommonName field to given value. + + +### HasUseCsrCommonName + +`func (o *PkiReadRoleResponse) HasUseCsrCommonName() bool` + +HasUseCsrCommonName returns a boolean if a field has been set. + + + + +### GetUseCsrSans + +`func (o *PkiReadRoleResponse) GetUseCsrSans() bool` + +GetUseCsrSans returns the UseCsrSans field if non-nil, zero value otherwise. + +### GetUseCsrSansOk + +`func (o *PkiReadRoleResponse) GetUseCsrSansOk() (*bool, bool)` + +GetUseCsrSansOk returns a tuple with the UseCsrSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUseCsrSans + +`func (o *PkiReadRoleResponse) SetUseCsrSans(v bool)` + +SetUseCsrSans sets UseCsrSans field to given value. + + +### HasUseCsrSans + +`func (o *PkiReadRoleResponse) HasUseCsrSans() bool` + +HasUseCsrSans returns a boolean if a field has been set. + + + + +### GetUsePss + +`func (o *PkiReadRoleResponse) GetUsePss() bool` + +GetUsePss returns the UsePss field if non-nil, zero value otherwise. + +### GetUsePssOk + +`func (o *PkiReadRoleResponse) GetUsePssOk() (*bool, bool)` + +GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUsePss + +`func (o *PkiReadRoleResponse) SetUsePss(v bool)` + +SetUsePss sets UsePss field to given value. + + +### HasUsePss + +`func (o *PkiReadRoleResponse) HasUsePss() bool` + +HasUsePss returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReadUrlsConfigurationResponse.md b/docs/PkiReadUrlsConfigurationResponse.md new file mode 100644 index 00000000..55ad6fbd --- /dev/null +++ b/docs/PkiReadUrlsConfigurationResponse.md @@ -0,0 +1,159 @@ +# PkiReadUrlsConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CrlDistributionPoints** | Pointer to **[]string** | Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. | [optional] +**EnableTemplating** | Pointer to **bool** | Whether or not to enable templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URI validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. | [optional] +**IssuingCertificates** | Pointer to **[]string** | Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. | [optional] +**OcspServers** | Pointer to **[]string** | Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. | [optional] + + + +## Methods + + +### NewPkiReadUrlsConfigurationResponse + +`func NewPkiReadUrlsConfigurationResponse() *PkiReadUrlsConfigurationResponse` + +NewPkiReadUrlsConfigurationResponse instantiates a new PkiReadUrlsConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReadUrlsConfigurationResponseWithDefaults + +`func NewPkiReadUrlsConfigurationResponseWithDefaults() *PkiReadUrlsConfigurationResponse` + +NewPkiReadUrlsConfigurationResponseWithDefaults instantiates a new PkiReadUrlsConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCrlDistributionPoints + +`func (o *PkiReadUrlsConfigurationResponse) GetCrlDistributionPoints() []string` + +GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. + +### GetCrlDistributionPointsOk + +`func (o *PkiReadUrlsConfigurationResponse) GetCrlDistributionPointsOk() (*[]string, bool)` + +GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrlDistributionPoints + +`func (o *PkiReadUrlsConfigurationResponse) SetCrlDistributionPoints(v []string)` + +SetCrlDistributionPoints sets CrlDistributionPoints field to given value. + + +### HasCrlDistributionPoints + +`func (o *PkiReadUrlsConfigurationResponse) HasCrlDistributionPoints() bool` + +HasCrlDistributionPoints returns a boolean if a field has been set. + + + + +### GetEnableTemplating + +`func (o *PkiReadUrlsConfigurationResponse) GetEnableTemplating() bool` + +GetEnableTemplating returns the EnableTemplating field if non-nil, zero value otherwise. + +### GetEnableTemplatingOk + +`func (o *PkiReadUrlsConfigurationResponse) GetEnableTemplatingOk() (*bool, bool)` + +GetEnableTemplatingOk returns a tuple with the EnableTemplating field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnableTemplating + +`func (o *PkiReadUrlsConfigurationResponse) SetEnableTemplating(v bool)` + +SetEnableTemplating sets EnableTemplating field to given value. + + +### HasEnableTemplating + +`func (o *PkiReadUrlsConfigurationResponse) HasEnableTemplating() bool` + +HasEnableTemplating returns a boolean if a field has been set. + + + + +### GetIssuingCertificates + +`func (o *PkiReadUrlsConfigurationResponse) GetIssuingCertificates() []string` + +GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. + +### GetIssuingCertificatesOk + +`func (o *PkiReadUrlsConfigurationResponse) GetIssuingCertificatesOk() (*[]string, bool)` + +GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCertificates + +`func (o *PkiReadUrlsConfigurationResponse) SetIssuingCertificates(v []string)` + +SetIssuingCertificates sets IssuingCertificates field to given value. + + +### HasIssuingCertificates + +`func (o *PkiReadUrlsConfigurationResponse) HasIssuingCertificates() bool` + +HasIssuingCertificates returns a boolean if a field has been set. + + + + +### GetOcspServers + +`func (o *PkiReadUrlsConfigurationResponse) GetOcspServers() []string` + +GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. + +### GetOcspServersOk + +`func (o *PkiReadUrlsConfigurationResponse) GetOcspServersOk() (*[]string, bool)` + +GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspServers + +`func (o *PkiReadUrlsConfigurationResponse) SetOcspServers(v []string)` + +SetOcspServers sets OcspServers field to given value. + + +### HasOcspServers + +`func (o *PkiReadUrlsConfigurationResponse) HasOcspServers() bool` + +HasOcspServers returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiReplaceRootResponse.md b/docs/PkiReplaceRootResponse.md new file mode 100644 index 00000000..83d935cc --- /dev/null +++ b/docs/PkiReplaceRootResponse.md @@ -0,0 +1,99 @@ +# PkiReplaceRootResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Default** | Pointer to **string** | Reference (name or identifier) to the default issuer. | [optional] +**DefaultFollowsLatestIssuer** | Pointer to **bool** | Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false. | [optional] + + + +## Methods + + +### NewPkiReplaceRootResponse + +`func NewPkiReplaceRootResponse() *PkiReplaceRootResponse` + +NewPkiReplaceRootResponse instantiates a new PkiReplaceRootResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiReplaceRootResponseWithDefaults + +`func NewPkiReplaceRootResponseWithDefaults() *PkiReplaceRootResponse` + +NewPkiReplaceRootResponseWithDefaults instantiates a new PkiReplaceRootResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetDefault + +`func (o *PkiReplaceRootResponse) GetDefault() string` + +GetDefault returns the Default field if non-nil, zero value otherwise. + +### GetDefaultOk + +`func (o *PkiReplaceRootResponse) GetDefaultOk() (*string, bool)` + +GetDefaultOk returns a tuple with the Default field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefault + +`func (o *PkiReplaceRootResponse) SetDefault(v string)` + +SetDefault sets Default field to given value. + + +### HasDefault + +`func (o *PkiReplaceRootResponse) HasDefault() bool` + +HasDefault returns a boolean if a field has been set. + + + + +### GetDefaultFollowsLatestIssuer + +`func (o *PkiReplaceRootResponse) GetDefaultFollowsLatestIssuer() bool` + +GetDefaultFollowsLatestIssuer returns the DefaultFollowsLatestIssuer field if non-nil, zero value otherwise. + +### GetDefaultFollowsLatestIssuerOk + +`func (o *PkiReplaceRootResponse) GetDefaultFollowsLatestIssuerOk() (*bool, bool)` + +GetDefaultFollowsLatestIssuerOk returns a tuple with the DefaultFollowsLatestIssuer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDefaultFollowsLatestIssuer + +`func (o *PkiReplaceRootResponse) SetDefaultFollowsLatestIssuer(v bool)` + +SetDefaultFollowsLatestIssuer sets DefaultFollowsLatestIssuer field to given value. + + +### HasDefaultFollowsLatestIssuer + +`func (o *PkiReplaceRootResponse) HasDefaultFollowsLatestIssuer() bool` + +HasDefaultFollowsLatestIssuer returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiRevokeIssuerResponse.md b/docs/PkiRevokeIssuerResponse.md new file mode 100644 index 00000000..20294049 --- /dev/null +++ b/docs/PkiRevokeIssuerResponse.md @@ -0,0 +1,489 @@ +# PkiRevokeIssuerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Authority Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**CrlDistributionPoints** | Pointer to **[]string** | Specifies the URL values for the CRL Distribution Points field | [optional] +**IssuerId** | Pointer to **string** | ID of the issuer | [optional] +**IssuerName** | Pointer to **string** | Name of the issuer | [optional] +**IssuingCertificates** | Pointer to **[]string** | Specifies the URL values for the Issuing Certificate field | [optional] +**KeyId** | Pointer to **string** | ID of the Key | [optional] +**LeafNotAfterBehavior** | Pointer to **string** | | [optional] +**ManualChain** | Pointer to **[]string** | Manual Chain | [optional] +**OcspServers** | Pointer to **[]string** | Specifies the URL values for the OCSP Servers field | [optional] +**RevocationSignatureAlgorithm** | Pointer to **string** | Which signature algorithm to use when building CRLs | [optional] +**RevocationTime** | Pointer to **int64** | Time of revocation | [optional] +**RevocationTimeRfc3339** | Pointer to **time.Time** | RFC formatted time of revocation | [optional] +**Revoked** | Pointer to **bool** | Whether the issuer was revoked | [optional] +**Usage** | Pointer to **string** | Allowed usage | [optional] + + + +## Methods + + +### NewPkiRevokeIssuerResponse + +`func NewPkiRevokeIssuerResponse() *PkiRevokeIssuerResponse` + +NewPkiRevokeIssuerResponse instantiates a new PkiRevokeIssuerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiRevokeIssuerResponseWithDefaults + +`func NewPkiRevokeIssuerResponseWithDefaults() *PkiRevokeIssuerResponse` + +NewPkiRevokeIssuerResponseWithDefaults instantiates a new PkiRevokeIssuerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiRevokeIssuerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiRevokeIssuerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiRevokeIssuerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiRevokeIssuerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiRevokeIssuerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiRevokeIssuerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiRevokeIssuerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiRevokeIssuerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetCrlDistributionPoints + +`func (o *PkiRevokeIssuerResponse) GetCrlDistributionPoints() []string` + +GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. + +### GetCrlDistributionPointsOk + +`func (o *PkiRevokeIssuerResponse) GetCrlDistributionPointsOk() (*[]string, bool)` + +GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrlDistributionPoints + +`func (o *PkiRevokeIssuerResponse) SetCrlDistributionPoints(v []string)` + +SetCrlDistributionPoints sets CrlDistributionPoints field to given value. + + +### HasCrlDistributionPoints + +`func (o *PkiRevokeIssuerResponse) HasCrlDistributionPoints() bool` + +HasCrlDistributionPoints returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiRevokeIssuerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiRevokeIssuerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiRevokeIssuerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiRevokeIssuerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiRevokeIssuerResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiRevokeIssuerResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiRevokeIssuerResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiRevokeIssuerResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + +### GetIssuingCertificates + +`func (o *PkiRevokeIssuerResponse) GetIssuingCertificates() []string` + +GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. + +### GetIssuingCertificatesOk + +`func (o *PkiRevokeIssuerResponse) GetIssuingCertificatesOk() (*[]string, bool)` + +GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCertificates + +`func (o *PkiRevokeIssuerResponse) SetIssuingCertificates(v []string)` + +SetIssuingCertificates sets IssuingCertificates field to given value. + + +### HasIssuingCertificates + +`func (o *PkiRevokeIssuerResponse) HasIssuingCertificates() bool` + +HasIssuingCertificates returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiRevokeIssuerResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiRevokeIssuerResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiRevokeIssuerResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiRevokeIssuerResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetLeafNotAfterBehavior + +`func (o *PkiRevokeIssuerResponse) GetLeafNotAfterBehavior() string` + +GetLeafNotAfterBehavior returns the LeafNotAfterBehavior field if non-nil, zero value otherwise. + +### GetLeafNotAfterBehaviorOk + +`func (o *PkiRevokeIssuerResponse) GetLeafNotAfterBehaviorOk() (*string, bool)` + +GetLeafNotAfterBehaviorOk returns a tuple with the LeafNotAfterBehavior field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeafNotAfterBehavior + +`func (o *PkiRevokeIssuerResponse) SetLeafNotAfterBehavior(v string)` + +SetLeafNotAfterBehavior sets LeafNotAfterBehavior field to given value. + + +### HasLeafNotAfterBehavior + +`func (o *PkiRevokeIssuerResponse) HasLeafNotAfterBehavior() bool` + +HasLeafNotAfterBehavior returns a boolean if a field has been set. + + + + +### GetManualChain + +`func (o *PkiRevokeIssuerResponse) GetManualChain() []string` + +GetManualChain returns the ManualChain field if non-nil, zero value otherwise. + +### GetManualChainOk + +`func (o *PkiRevokeIssuerResponse) GetManualChainOk() (*[]string, bool)` + +GetManualChainOk returns a tuple with the ManualChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManualChain + +`func (o *PkiRevokeIssuerResponse) SetManualChain(v []string)` + +SetManualChain sets ManualChain field to given value. + + +### HasManualChain + +`func (o *PkiRevokeIssuerResponse) HasManualChain() bool` + +HasManualChain returns a boolean if a field has been set. + + + + +### GetOcspServers + +`func (o *PkiRevokeIssuerResponse) GetOcspServers() []string` + +GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. + +### GetOcspServersOk + +`func (o *PkiRevokeIssuerResponse) GetOcspServersOk() (*[]string, bool)` + +GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspServers + +`func (o *PkiRevokeIssuerResponse) SetOcspServers(v []string)` + +SetOcspServers sets OcspServers field to given value. + + +### HasOcspServers + +`func (o *PkiRevokeIssuerResponse) HasOcspServers() bool` + +HasOcspServers returns a boolean if a field has been set. + + + + +### GetRevocationSignatureAlgorithm + +`func (o *PkiRevokeIssuerResponse) GetRevocationSignatureAlgorithm() string` + +GetRevocationSignatureAlgorithm returns the RevocationSignatureAlgorithm field if non-nil, zero value otherwise. + +### GetRevocationSignatureAlgorithmOk + +`func (o *PkiRevokeIssuerResponse) GetRevocationSignatureAlgorithmOk() (*string, bool)` + +GetRevocationSignatureAlgorithmOk returns a tuple with the RevocationSignatureAlgorithm field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationSignatureAlgorithm + +`func (o *PkiRevokeIssuerResponse) SetRevocationSignatureAlgorithm(v string)` + +SetRevocationSignatureAlgorithm sets RevocationSignatureAlgorithm field to given value. + + +### HasRevocationSignatureAlgorithm + +`func (o *PkiRevokeIssuerResponse) HasRevocationSignatureAlgorithm() bool` + +HasRevocationSignatureAlgorithm returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiRevokeIssuerResponse) GetRevocationTime() int64` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiRevokeIssuerResponse) GetRevocationTimeOk() (*int64, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiRevokeIssuerResponse) SetRevocationTime(v int64)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiRevokeIssuerResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiRevokeIssuerResponse) GetRevocationTimeRfc3339() time.Time` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiRevokeIssuerResponse) GetRevocationTimeRfc3339Ok() (*time.Time, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiRevokeIssuerResponse) SetRevocationTimeRfc3339(v time.Time)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiRevokeIssuerResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + +### GetRevoked + +`func (o *PkiRevokeIssuerResponse) GetRevoked() bool` + +GetRevoked returns the Revoked field if non-nil, zero value otherwise. + +### GetRevokedOk + +`func (o *PkiRevokeIssuerResponse) GetRevokedOk() (*bool, bool)` + +GetRevokedOk returns a tuple with the Revoked field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevoked + +`func (o *PkiRevokeIssuerResponse) SetRevoked(v bool)` + +SetRevoked sets Revoked field to given value. + + +### HasRevoked + +`func (o *PkiRevokeIssuerResponse) HasRevoked() bool` + +HasRevoked returns a boolean if a field has been set. + + + + +### GetUsage + +`func (o *PkiRevokeIssuerResponse) GetUsage() string` + +GetUsage returns the Usage field if non-nil, zero value otherwise. + +### GetUsageOk + +`func (o *PkiRevokeIssuerResponse) GetUsageOk() (*string, bool)` + +GetUsageOk returns a tuple with the Usage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUsage + +`func (o *PkiRevokeIssuerResponse) SetUsage(v string)` + +SetUsage sets Usage field to given value. + + +### HasUsage + +`func (o *PkiRevokeIssuerResponse) HasUsage() bool` + +HasUsage returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiRevokeRequest.md b/docs/PkiRevokeRequest.md index b2cd181a..93f74a9d 100644 --- a/docs/PkiRevokeRequest.md +++ b/docs/PkiRevokeRequest.md @@ -1,4 +1,4 @@ -# PKIRevokeRequest +# PkiRevokeRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIRevokeRequest +### NewPkiRevokeRequest -`func NewPKIRevokeRequest() *PKIRevokeRequest` +`func NewPkiRevokeRequest() *PkiRevokeRequest` -NewPKIRevokeRequest instantiates a new PKIRevokeRequest object +NewPkiRevokeRequest instantiates a new PkiRevokeRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIRevokeRequestWithDefaults +### NewPkiRevokeRequestWithDefaults -`func NewPKIRevokeRequestWithDefaults() *PKIRevokeRequest` +`func NewPkiRevokeRequestWithDefaults() *PkiRevokeRequest` -NewPKIRevokeRequestWithDefaults instantiates a new PKIRevokeRequest object +NewPkiRevokeRequestWithDefaults instantiates a new PkiRevokeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCertificate -`func (o *PKIRevokeRequest) GetCertificate() string` +`func (o *PkiRevokeRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *PKIRevokeRequest) GetCertificateOk() (*string, bool)` +`func (o *PkiRevokeRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *PKIRevokeRequest) SetCertificate(v string)` +`func (o *PkiRevokeRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *PKIRevokeRequest) HasCertificate() bool` +`func (o *PkiRevokeRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasCertificate returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIRevokeRequest) GetSerialNumber() string` +`func (o *PkiRevokeRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIRevokeRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiRevokeRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIRevokeRequest) SetSerialNumber(v string)` +`func (o *PkiRevokeRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIRevokeRequest) HasSerialNumber() bool` +`func (o *PkiRevokeRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. diff --git a/docs/PkiRevokeResponse.md b/docs/PkiRevokeResponse.md new file mode 100644 index 00000000..644010fd --- /dev/null +++ b/docs/PkiRevokeResponse.md @@ -0,0 +1,129 @@ +# PkiRevokeResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**RevocationTime** | Pointer to **int32** | Revocation Time | [optional] +**RevocationTimeRfc3339** | Pointer to **time.Time** | Revocation Time | [optional] +**State** | Pointer to **string** | Revocation State | [optional] + + + +## Methods + + +### NewPkiRevokeResponse + +`func NewPkiRevokeResponse() *PkiRevokeResponse` + +NewPkiRevokeResponse instantiates a new PkiRevokeResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiRevokeResponseWithDefaults + +`func NewPkiRevokeResponseWithDefaults() *PkiRevokeResponse` + +NewPkiRevokeResponseWithDefaults instantiates a new PkiRevokeResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetRevocationTime + +`func (o *PkiRevokeResponse) GetRevocationTime() int32` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiRevokeResponse) GetRevocationTimeOk() (*int32, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiRevokeResponse) SetRevocationTime(v int32)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiRevokeResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiRevokeResponse) GetRevocationTimeRfc3339() time.Time` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiRevokeResponse) GetRevocationTimeRfc3339Ok() (*time.Time, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiRevokeResponse) SetRevocationTimeRfc3339(v time.Time)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiRevokeResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + +### GetState + +`func (o *PkiRevokeResponse) GetState() string` + +GetState returns the State field if non-nil, zero value otherwise. + +### GetStateOk + +`func (o *PkiRevokeResponse) GetStateOk() (*string, bool)` + +GetStateOk returns a tuple with the State field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetState + +`func (o *PkiRevokeResponse) SetState(v string)` + +SetState sets State field to given value. + + +### HasState + +`func (o *PkiRevokeResponse) HasState() bool` + +HasState returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiRevokeWithKeyRequest.md b/docs/PkiRevokeWithKeyRequest.md index 65f2f36d..b3415d9c 100644 --- a/docs/PkiRevokeWithKeyRequest.md +++ b/docs/PkiRevokeWithKeyRequest.md @@ -1,4 +1,4 @@ -# PKIRevokeWithKeyRequest +# PkiRevokeWithKeyRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIRevokeWithKeyRequest +### NewPkiRevokeWithKeyRequest -`func NewPKIRevokeWithKeyRequest() *PKIRevokeWithKeyRequest` +`func NewPkiRevokeWithKeyRequest() *PkiRevokeWithKeyRequest` -NewPKIRevokeWithKeyRequest instantiates a new PKIRevokeWithKeyRequest object +NewPkiRevokeWithKeyRequest instantiates a new PkiRevokeWithKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIRevokeWithKeyRequestWithDefaults +### NewPkiRevokeWithKeyRequestWithDefaults -`func NewPKIRevokeWithKeyRequestWithDefaults() *PKIRevokeWithKeyRequest` +`func NewPkiRevokeWithKeyRequestWithDefaults() *PkiRevokeWithKeyRequest` -NewPKIRevokeWithKeyRequestWithDefaults instantiates a new PKIRevokeWithKeyRequest object +NewPkiRevokeWithKeyRequestWithDefaults instantiates a new PkiRevokeWithKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCertificate -`func (o *PKIRevokeWithKeyRequest) GetCertificate() string` +`func (o *PkiRevokeWithKeyRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *PKIRevokeWithKeyRequest) GetCertificateOk() (*string, bool)` +`func (o *PkiRevokeWithKeyRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *PKIRevokeWithKeyRequest) SetCertificate(v string)` +`func (o *PkiRevokeWithKeyRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *PKIRevokeWithKeyRequest) HasCertificate() bool` +`func (o *PkiRevokeWithKeyRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasCertificate returns a boolean if a field has been set. ### GetPrivateKey -`func (o *PKIRevokeWithKeyRequest) GetPrivateKey() string` +`func (o *PkiRevokeWithKeyRequest) GetPrivateKey() string` GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. ### GetPrivateKeyOk -`func (o *PKIRevokeWithKeyRequest) GetPrivateKeyOk() (*string, bool)` +`func (o *PkiRevokeWithKeyRequest) GetPrivateKeyOk() (*string, bool)` GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKey -`func (o *PKIRevokeWithKeyRequest) SetPrivateKey(v string)` +`func (o *PkiRevokeWithKeyRequest) SetPrivateKey(v string)` SetPrivateKey sets PrivateKey field to given value. ### HasPrivateKey -`func (o *PKIRevokeWithKeyRequest) HasPrivateKey() bool` +`func (o *PkiRevokeWithKeyRequest) HasPrivateKey() bool` HasPrivateKey returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasPrivateKey returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIRevokeWithKeyRequest) GetSerialNumber() string` +`func (o *PkiRevokeWithKeyRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIRevokeWithKeyRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiRevokeWithKeyRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIRevokeWithKeyRequest) SetSerialNumber(v string)` +`func (o *PkiRevokeWithKeyRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIRevokeWithKeyRequest) HasSerialNumber() bool` +`func (o *PkiRevokeWithKeyRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. diff --git a/docs/PkiRevokeWithKeyResponse.md b/docs/PkiRevokeWithKeyResponse.md new file mode 100644 index 00000000..4fb75528 --- /dev/null +++ b/docs/PkiRevokeWithKeyResponse.md @@ -0,0 +1,129 @@ +# PkiRevokeWithKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**RevocationTime** | Pointer to **int32** | Revocation Time | [optional] +**RevocationTimeRfc3339** | Pointer to **time.Time** | Revocation Time | [optional] +**State** | Pointer to **string** | Revocation State | [optional] + + + +## Methods + + +### NewPkiRevokeWithKeyResponse + +`func NewPkiRevokeWithKeyResponse() *PkiRevokeWithKeyResponse` + +NewPkiRevokeWithKeyResponse instantiates a new PkiRevokeWithKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiRevokeWithKeyResponseWithDefaults + +`func NewPkiRevokeWithKeyResponseWithDefaults() *PkiRevokeWithKeyResponse` + +NewPkiRevokeWithKeyResponseWithDefaults instantiates a new PkiRevokeWithKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetRevocationTime + +`func (o *PkiRevokeWithKeyResponse) GetRevocationTime() int32` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiRevokeWithKeyResponse) GetRevocationTimeOk() (*int32, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiRevokeWithKeyResponse) SetRevocationTime(v int32)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiRevokeWithKeyResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiRevokeWithKeyResponse) GetRevocationTimeRfc3339() time.Time` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiRevokeWithKeyResponse) GetRevocationTimeRfc3339Ok() (*time.Time, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiRevokeWithKeyResponse) SetRevocationTimeRfc3339(v time.Time)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiRevokeWithKeyResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + +### GetState + +`func (o *PkiRevokeWithKeyResponse) GetState() string` + +GetState returns the State field if non-nil, zero value otherwise. + +### GetStateOk + +`func (o *PkiRevokeWithKeyResponse) GetStateOk() (*string, bool)` + +GetStateOk returns a tuple with the State field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetState + +`func (o *PkiRevokeWithKeyResponse) SetState(v string)` + +SetState sets State field to given value. + + +### HasState + +`func (o *PkiRevokeWithKeyResponse) HasState() bool` + +HasState returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiRootSignIntermediateRequest.md b/docs/PkiRootSignIntermediateRequest.md index 0debb4aa..ed76d53f 100644 --- a/docs/PkiRootSignIntermediateRequest.md +++ b/docs/PkiRootSignIntermediateRequest.md @@ -1,4 +1,4 @@ -# PKIRootSignIntermediateRequest +# PkiRootSignIntermediateRequest ## Properties @@ -39,47 +39,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIRootSignIntermediateRequest +### NewPkiRootSignIntermediateRequest -`func NewPKIRootSignIntermediateRequest() *PKIRootSignIntermediateRequest` +`func NewPkiRootSignIntermediateRequest() *PkiRootSignIntermediateRequest` -NewPKIRootSignIntermediateRequest instantiates a new PKIRootSignIntermediateRequest object +NewPkiRootSignIntermediateRequest instantiates a new PkiRootSignIntermediateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIRootSignIntermediateRequestWithDefaults +### NewPkiRootSignIntermediateRequestWithDefaults -`func NewPKIRootSignIntermediateRequestWithDefaults() *PKIRootSignIntermediateRequest` +`func NewPkiRootSignIntermediateRequestWithDefaults() *PkiRootSignIntermediateRequest` -NewPKIRootSignIntermediateRequestWithDefaults instantiates a new PKIRootSignIntermediateRequest object +NewPkiRootSignIntermediateRequestWithDefaults instantiates a new PkiRootSignIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIRootSignIntermediateRequest) GetAltNames() string` +`func (o *PkiRootSignIntermediateRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIRootSignIntermediateRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIRootSignIntermediateRequest) SetAltNames(v string)` +`func (o *PkiRootSignIntermediateRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIRootSignIntermediateRequest) HasAltNames() bool` +`func (o *PkiRootSignIntermediateRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -88,27 +88,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIRootSignIntermediateRequest) GetCommonName() string` +`func (o *PkiRootSignIntermediateRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIRootSignIntermediateRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIRootSignIntermediateRequest) SetCommonName(v string)` +`func (o *PkiRootSignIntermediateRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIRootSignIntermediateRequest) HasCommonName() bool` +`func (o *PkiRootSignIntermediateRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -117,27 +117,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCountry -`func (o *PKIRootSignIntermediateRequest) GetCountry() []string` +`func (o *PkiRootSignIntermediateRequest) GetCountry() []string` GetCountry returns the Country field if non-nil, zero value otherwise. ### GetCountryOk -`func (o *PKIRootSignIntermediateRequest) GetCountryOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetCountryOk() (*[]string, bool)` GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCountry -`func (o *PKIRootSignIntermediateRequest) SetCountry(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetCountry(v []string)` SetCountry sets Country field to given value. ### HasCountry -`func (o *PKIRootSignIntermediateRequest) HasCountry() bool` +`func (o *PkiRootSignIntermediateRequest) HasCountry() bool` HasCountry returns a boolean if a field has been set. @@ -146,27 +146,27 @@ HasCountry returns a boolean if a field has been set. ### GetCsr -`func (o *PKIRootSignIntermediateRequest) GetCsr() string` +`func (o *PkiRootSignIntermediateRequest) GetCsr() string` GetCsr returns the Csr field if non-nil, zero value otherwise. ### GetCsrOk -`func (o *PKIRootSignIntermediateRequest) GetCsrOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetCsrOk() (*string, bool)` GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCsr -`func (o *PKIRootSignIntermediateRequest) SetCsr(v string)` +`func (o *PkiRootSignIntermediateRequest) SetCsr(v string)` SetCsr sets Csr field to given value. ### HasCsr -`func (o *PKIRootSignIntermediateRequest) HasCsr() bool` +`func (o *PkiRootSignIntermediateRequest) HasCsr() bool` HasCsr returns a boolean if a field has been set. @@ -175,27 +175,27 @@ HasCsr returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKIRootSignIntermediateRequest) GetExcludeCnFromSans() bool` +`func (o *PkiRootSignIntermediateRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIRootSignIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiRootSignIntermediateRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIRootSignIntermediateRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiRootSignIntermediateRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIRootSignIntermediateRequest) HasExcludeCnFromSans() bool` +`func (o *PkiRootSignIntermediateRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -204,27 +204,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIRootSignIntermediateRequest) GetFormat() string` +`func (o *PkiRootSignIntermediateRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIRootSignIntermediateRequest) GetFormatOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIRootSignIntermediateRequest) SetFormat(v string)` +`func (o *PkiRootSignIntermediateRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIRootSignIntermediateRequest) HasFormat() bool` +`func (o *PkiRootSignIntermediateRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -233,27 +233,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIRootSignIntermediateRequest) GetIpSans() []string` +`func (o *PkiRootSignIntermediateRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIRootSignIntermediateRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIRootSignIntermediateRequest) SetIpSans(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIRootSignIntermediateRequest) HasIpSans() bool` +`func (o *PkiRootSignIntermediateRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -262,27 +262,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerName -`func (o *PKIRootSignIntermediateRequest) GetIssuerName() string` +`func (o *PkiRootSignIntermediateRequest) GetIssuerName() string` GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. ### GetIssuerNameOk -`func (o *PKIRootSignIntermediateRequest) GetIssuerNameOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetIssuerNameOk() (*string, bool)` GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerName -`func (o *PKIRootSignIntermediateRequest) SetIssuerName(v string)` +`func (o *PkiRootSignIntermediateRequest) SetIssuerName(v string)` SetIssuerName sets IssuerName field to given value. ### HasIssuerName -`func (o *PKIRootSignIntermediateRequest) HasIssuerName() bool` +`func (o *PkiRootSignIntermediateRequest) HasIssuerName() bool` HasIssuerName returns a boolean if a field has been set. @@ -291,27 +291,27 @@ HasIssuerName returns a boolean if a field has been set. ### GetIssuerRef -`func (o *PKIRootSignIntermediateRequest) GetIssuerRef() string` +`func (o *PkiRootSignIntermediateRequest) GetIssuerRef() string` GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. ### GetIssuerRefOk -`func (o *PKIRootSignIntermediateRequest) GetIssuerRefOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetIssuerRefOk() (*string, bool)` GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerRef -`func (o *PKIRootSignIntermediateRequest) SetIssuerRef(v string)` +`func (o *PkiRootSignIntermediateRequest) SetIssuerRef(v string)` SetIssuerRef sets IssuerRef field to given value. ### HasIssuerRef -`func (o *PKIRootSignIntermediateRequest) HasIssuerRef() bool` +`func (o *PkiRootSignIntermediateRequest) HasIssuerRef() bool` HasIssuerRef returns a boolean if a field has been set. @@ -320,27 +320,27 @@ HasIssuerRef returns a boolean if a field has been set. ### GetLocality -`func (o *PKIRootSignIntermediateRequest) GetLocality() []string` +`func (o *PkiRootSignIntermediateRequest) GetLocality() []string` GetLocality returns the Locality field if non-nil, zero value otherwise. ### GetLocalityOk -`func (o *PKIRootSignIntermediateRequest) GetLocalityOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetLocalityOk() (*[]string, bool)` GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLocality -`func (o *PKIRootSignIntermediateRequest) SetLocality(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetLocality(v []string)` SetLocality sets Locality field to given value. ### HasLocality -`func (o *PKIRootSignIntermediateRequest) HasLocality() bool` +`func (o *PkiRootSignIntermediateRequest) HasLocality() bool` HasLocality returns a boolean if a field has been set. @@ -349,27 +349,27 @@ HasLocality returns a boolean if a field has been set. ### GetMaxPathLength -`func (o *PKIRootSignIntermediateRequest) GetMaxPathLength() int32` +`func (o *PkiRootSignIntermediateRequest) GetMaxPathLength() int32` GetMaxPathLength returns the MaxPathLength field if non-nil, zero value otherwise. ### GetMaxPathLengthOk -`func (o *PKIRootSignIntermediateRequest) GetMaxPathLengthOk() (*int32, bool)` +`func (o *PkiRootSignIntermediateRequest) GetMaxPathLengthOk() (*int32, bool)` GetMaxPathLengthOk returns a tuple with the MaxPathLength field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxPathLength -`func (o *PKIRootSignIntermediateRequest) SetMaxPathLength(v int32)` +`func (o *PkiRootSignIntermediateRequest) SetMaxPathLength(v int32)` SetMaxPathLength sets MaxPathLength field to given value. ### HasMaxPathLength -`func (o *PKIRootSignIntermediateRequest) HasMaxPathLength() bool` +`func (o *PkiRootSignIntermediateRequest) HasMaxPathLength() bool` HasMaxPathLength returns a boolean if a field has been set. @@ -378,27 +378,27 @@ HasMaxPathLength returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKIRootSignIntermediateRequest) GetNotAfter() string` +`func (o *PkiRootSignIntermediateRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIRootSignIntermediateRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIRootSignIntermediateRequest) SetNotAfter(v string)` +`func (o *PkiRootSignIntermediateRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIRootSignIntermediateRequest) HasNotAfter() bool` +`func (o *PkiRootSignIntermediateRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -407,27 +407,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *PKIRootSignIntermediateRequest) GetNotBeforeDuration() int32` +`func (o *PkiRootSignIntermediateRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *PKIRootSignIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *PkiRootSignIntermediateRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *PKIRootSignIntermediateRequest) SetNotBeforeDuration(v int32)` +`func (o *PkiRootSignIntermediateRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *PKIRootSignIntermediateRequest) HasNotBeforeDuration() bool` +`func (o *PkiRootSignIntermediateRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -436,27 +436,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetOrganization -`func (o *PKIRootSignIntermediateRequest) GetOrganization() []string` +`func (o *PkiRootSignIntermediateRequest) GetOrganization() []string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *PKIRootSignIntermediateRequest) GetOrganizationOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetOrganizationOk() (*[]string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *PKIRootSignIntermediateRequest) SetOrganization(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetOrganization(v []string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *PKIRootSignIntermediateRequest) HasOrganization() bool` +`func (o *PkiRootSignIntermediateRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -465,27 +465,27 @@ HasOrganization returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIRootSignIntermediateRequest) GetOtherSans() []string` +`func (o *PkiRootSignIntermediateRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIRootSignIntermediateRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIRootSignIntermediateRequest) SetOtherSans(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIRootSignIntermediateRequest) HasOtherSans() bool` +`func (o *PkiRootSignIntermediateRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -494,27 +494,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetOu -`func (o *PKIRootSignIntermediateRequest) GetOu() []string` +`func (o *PkiRootSignIntermediateRequest) GetOu() []string` GetOu returns the Ou field if non-nil, zero value otherwise. ### GetOuOk -`func (o *PKIRootSignIntermediateRequest) GetOuOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetOuOk() (*[]string, bool)` GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOu -`func (o *PKIRootSignIntermediateRequest) SetOu(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetOu(v []string)` SetOu sets Ou field to given value. ### HasOu -`func (o *PKIRootSignIntermediateRequest) HasOu() bool` +`func (o *PkiRootSignIntermediateRequest) HasOu() bool` HasOu returns a boolean if a field has been set. @@ -523,27 +523,27 @@ HasOu returns a boolean if a field has been set. ### GetPermittedDnsDomains -`func (o *PKIRootSignIntermediateRequest) GetPermittedDnsDomains() []string` +`func (o *PkiRootSignIntermediateRequest) GetPermittedDnsDomains() []string` GetPermittedDnsDomains returns the PermittedDnsDomains field if non-nil, zero value otherwise. ### GetPermittedDnsDomainsOk -`func (o *PKIRootSignIntermediateRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetPermittedDnsDomainsOk() (*[]string, bool)` GetPermittedDnsDomainsOk returns a tuple with the PermittedDnsDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPermittedDnsDomains -`func (o *PKIRootSignIntermediateRequest) SetPermittedDnsDomains(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetPermittedDnsDomains(v []string)` SetPermittedDnsDomains sets PermittedDnsDomains field to given value. ### HasPermittedDnsDomains -`func (o *PKIRootSignIntermediateRequest) HasPermittedDnsDomains() bool` +`func (o *PkiRootSignIntermediateRequest) HasPermittedDnsDomains() bool` HasPermittedDnsDomains returns a boolean if a field has been set. @@ -552,27 +552,27 @@ HasPermittedDnsDomains returns a boolean if a field has been set. ### GetPostalCode -`func (o *PKIRootSignIntermediateRequest) GetPostalCode() []string` +`func (o *PkiRootSignIntermediateRequest) GetPostalCode() []string` GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. ### GetPostalCodeOk -`func (o *PKIRootSignIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetPostalCodeOk() (*[]string, bool)` GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPostalCode -`func (o *PKIRootSignIntermediateRequest) SetPostalCode(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetPostalCode(v []string)` SetPostalCode sets PostalCode field to given value. ### HasPostalCode -`func (o *PKIRootSignIntermediateRequest) HasPostalCode() bool` +`func (o *PkiRootSignIntermediateRequest) HasPostalCode() bool` HasPostalCode returns a boolean if a field has been set. @@ -581,27 +581,27 @@ HasPostalCode returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIRootSignIntermediateRequest) GetPrivateKeyFormat() string` +`func (o *PkiRootSignIntermediateRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIRootSignIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIRootSignIntermediateRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiRootSignIntermediateRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIRootSignIntermediateRequest) HasPrivateKeyFormat() bool` +`func (o *PkiRootSignIntermediateRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -610,27 +610,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetProvince -`func (o *PKIRootSignIntermediateRequest) GetProvince() []string` +`func (o *PkiRootSignIntermediateRequest) GetProvince() []string` GetProvince returns the Province field if non-nil, zero value otherwise. ### GetProvinceOk -`func (o *PKIRootSignIntermediateRequest) GetProvinceOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetProvinceOk() (*[]string, bool)` GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetProvince -`func (o *PKIRootSignIntermediateRequest) SetProvince(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetProvince(v []string)` SetProvince sets Province field to given value. ### HasProvince -`func (o *PKIRootSignIntermediateRequest) HasProvince() bool` +`func (o *PkiRootSignIntermediateRequest) HasProvince() bool` HasProvince returns a boolean if a field has been set. @@ -639,27 +639,27 @@ HasProvince returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIRootSignIntermediateRequest) GetSerialNumber() string` +`func (o *PkiRootSignIntermediateRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIRootSignIntermediateRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIRootSignIntermediateRequest) SetSerialNumber(v string)` +`func (o *PkiRootSignIntermediateRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIRootSignIntermediateRequest) HasSerialNumber() bool` +`func (o *PkiRootSignIntermediateRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -668,27 +668,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKIRootSignIntermediateRequest) GetSignatureBits() int32` +`func (o *PkiRootSignIntermediateRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKIRootSignIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiRootSignIntermediateRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKIRootSignIntermediateRequest) SetSignatureBits(v int32)` +`func (o *PkiRootSignIntermediateRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKIRootSignIntermediateRequest) HasSignatureBits() bool` +`func (o *PkiRootSignIntermediateRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -697,27 +697,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetSkid -`func (o *PKIRootSignIntermediateRequest) GetSkid() string` +`func (o *PkiRootSignIntermediateRequest) GetSkid() string` GetSkid returns the Skid field if non-nil, zero value otherwise. ### GetSkidOk -`func (o *PKIRootSignIntermediateRequest) GetSkidOk() (*string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetSkidOk() (*string, bool)` GetSkidOk returns a tuple with the Skid field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSkid -`func (o *PKIRootSignIntermediateRequest) SetSkid(v string)` +`func (o *PkiRootSignIntermediateRequest) SetSkid(v string)` SetSkid sets Skid field to given value. ### HasSkid -`func (o *PKIRootSignIntermediateRequest) HasSkid() bool` +`func (o *PkiRootSignIntermediateRequest) HasSkid() bool` HasSkid returns a boolean if a field has been set. @@ -726,27 +726,27 @@ HasSkid returns a boolean if a field has been set. ### GetStreetAddress -`func (o *PKIRootSignIntermediateRequest) GetStreetAddress() []string` +`func (o *PkiRootSignIntermediateRequest) GetStreetAddress() []string` GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. ### GetStreetAddressOk -`func (o *PKIRootSignIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetStreetAddressOk() (*[]string, bool)` GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetStreetAddress -`func (o *PKIRootSignIntermediateRequest) SetStreetAddress(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetStreetAddress(v []string)` SetStreetAddress sets StreetAddress field to given value. ### HasStreetAddress -`func (o *PKIRootSignIntermediateRequest) HasStreetAddress() bool` +`func (o *PkiRootSignIntermediateRequest) HasStreetAddress() bool` HasStreetAddress returns a boolean if a field has been set. @@ -755,27 +755,27 @@ HasStreetAddress returns a boolean if a field has been set. ### GetTtl -`func (o *PKIRootSignIntermediateRequest) GetTtl() int32` +`func (o *PkiRootSignIntermediateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIRootSignIntermediateRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiRootSignIntermediateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIRootSignIntermediateRequest) SetTtl(v int32)` +`func (o *PkiRootSignIntermediateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIRootSignIntermediateRequest) HasTtl() bool` +`func (o *PkiRootSignIntermediateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -784,27 +784,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIRootSignIntermediateRequest) GetUriSans() []string` +`func (o *PkiRootSignIntermediateRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIRootSignIntermediateRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiRootSignIntermediateRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIRootSignIntermediateRequest) SetUriSans(v []string)` +`func (o *PkiRootSignIntermediateRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIRootSignIntermediateRequest) HasUriSans() bool` +`func (o *PkiRootSignIntermediateRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -813,27 +813,27 @@ HasUriSans returns a boolean if a field has been set. ### GetUseCsrValues -`func (o *PKIRootSignIntermediateRequest) GetUseCsrValues() bool` +`func (o *PkiRootSignIntermediateRequest) GetUseCsrValues() bool` GetUseCsrValues returns the UseCsrValues field if non-nil, zero value otherwise. ### GetUseCsrValuesOk -`func (o *PKIRootSignIntermediateRequest) GetUseCsrValuesOk() (*bool, bool)` +`func (o *PkiRootSignIntermediateRequest) GetUseCsrValuesOk() (*bool, bool)` GetUseCsrValuesOk returns a tuple with the UseCsrValues field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUseCsrValues -`func (o *PKIRootSignIntermediateRequest) SetUseCsrValues(v bool)` +`func (o *PkiRootSignIntermediateRequest) SetUseCsrValues(v bool)` SetUseCsrValues sets UseCsrValues field to given value. ### HasUseCsrValues -`func (o *PKIRootSignIntermediateRequest) HasUseCsrValues() bool` +`func (o *PkiRootSignIntermediateRequest) HasUseCsrValues() bool` HasUseCsrValues returns a boolean if a field has been set. @@ -842,27 +842,27 @@ HasUseCsrValues returns a boolean if a field has been set. ### GetUsePss -`func (o *PKIRootSignIntermediateRequest) GetUsePss() bool` +`func (o *PkiRootSignIntermediateRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKIRootSignIntermediateRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiRootSignIntermediateRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKIRootSignIntermediateRequest) SetUsePss(v bool)` +`func (o *PkiRootSignIntermediateRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKIRootSignIntermediateRequest) HasUsePss() bool` +`func (o *PkiRootSignIntermediateRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. diff --git a/docs/PkiRootSignIntermediateResponse.md b/docs/PkiRootSignIntermediateResponse.md new file mode 100644 index 00000000..2f552ef7 --- /dev/null +++ b/docs/PkiRootSignIntermediateResponse.md @@ -0,0 +1,189 @@ +# PkiRootSignIntermediateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **int64** | Expiration Time | [optional] +**IssuingCa** | Pointer to **string** | Issuing CA | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiRootSignIntermediateResponse + +`func NewPkiRootSignIntermediateResponse() *PkiRootSignIntermediateResponse` + +NewPkiRootSignIntermediateResponse instantiates a new PkiRootSignIntermediateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiRootSignIntermediateResponseWithDefaults + +`func NewPkiRootSignIntermediateResponseWithDefaults() *PkiRootSignIntermediateResponse` + +NewPkiRootSignIntermediateResponseWithDefaults instantiates a new PkiRootSignIntermediateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiRootSignIntermediateResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiRootSignIntermediateResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiRootSignIntermediateResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiRootSignIntermediateResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiRootSignIntermediateResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiRootSignIntermediateResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiRootSignIntermediateResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiRootSignIntermediateResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiRootSignIntermediateResponse) GetExpiration() int64` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiRootSignIntermediateResponse) GetExpirationOk() (*int64, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiRootSignIntermediateResponse) SetExpiration(v int64)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiRootSignIntermediateResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiRootSignIntermediateResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiRootSignIntermediateResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiRootSignIntermediateResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiRootSignIntermediateResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiRootSignIntermediateResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiRootSignIntermediateResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiRootSignIntermediateResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiRootSignIntermediateResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiRootSignSelfIssuedRequest.md b/docs/PkiRootSignSelfIssuedRequest.md index 3852e3af..d5cbc109 100644 --- a/docs/PkiRootSignSelfIssuedRequest.md +++ b/docs/PkiRootSignSelfIssuedRequest.md @@ -1,4 +1,4 @@ -# PKIRootSignSelfIssuedRequest +# PkiRootSignSelfIssuedRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIRootSignSelfIssuedRequest +### NewPkiRootSignSelfIssuedRequest -`func NewPKIRootSignSelfIssuedRequest() *PKIRootSignSelfIssuedRequest` +`func NewPkiRootSignSelfIssuedRequest() *PkiRootSignSelfIssuedRequest` -NewPKIRootSignSelfIssuedRequest instantiates a new PKIRootSignSelfIssuedRequest object +NewPkiRootSignSelfIssuedRequest instantiates a new PkiRootSignSelfIssuedRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIRootSignSelfIssuedRequestWithDefaults +### NewPkiRootSignSelfIssuedRequestWithDefaults -`func NewPKIRootSignSelfIssuedRequestWithDefaults() *PKIRootSignSelfIssuedRequest` +`func NewPkiRootSignSelfIssuedRequestWithDefaults() *PkiRootSignSelfIssuedRequest` -NewPKIRootSignSelfIssuedRequestWithDefaults instantiates a new PKIRootSignSelfIssuedRequest object +NewPkiRootSignSelfIssuedRequestWithDefaults instantiates a new PkiRootSignSelfIssuedRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCertificate -`func (o *PKIRootSignSelfIssuedRequest) GetCertificate() string` +`func (o *PkiRootSignSelfIssuedRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *PKIRootSignSelfIssuedRequest) GetCertificateOk() (*string, bool)` +`func (o *PkiRootSignSelfIssuedRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *PKIRootSignSelfIssuedRequest) SetCertificate(v string)` +`func (o *PkiRootSignSelfIssuedRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *PKIRootSignSelfIssuedRequest) HasCertificate() bool` +`func (o *PkiRootSignSelfIssuedRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasCertificate returns a boolean if a field has been set. ### GetIssuerRef -`func (o *PKIRootSignSelfIssuedRequest) GetIssuerRef() string` +`func (o *PkiRootSignSelfIssuedRequest) GetIssuerRef() string` GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. ### GetIssuerRefOk -`func (o *PKIRootSignSelfIssuedRequest) GetIssuerRefOk() (*string, bool)` +`func (o *PkiRootSignSelfIssuedRequest) GetIssuerRefOk() (*string, bool)` GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerRef -`func (o *PKIRootSignSelfIssuedRequest) SetIssuerRef(v string)` +`func (o *PkiRootSignSelfIssuedRequest) SetIssuerRef(v string)` SetIssuerRef sets IssuerRef field to given value. ### HasIssuerRef -`func (o *PKIRootSignSelfIssuedRequest) HasIssuerRef() bool` +`func (o *PkiRootSignSelfIssuedRequest) HasIssuerRef() bool` HasIssuerRef returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasIssuerRef returns a boolean if a field has been set. ### GetRequireMatchingCertificateAlgorithms -`func (o *PKIRootSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithms() bool` +`func (o *PkiRootSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithms() bool` GetRequireMatchingCertificateAlgorithms returns the RequireMatchingCertificateAlgorithms field if non-nil, zero value otherwise. ### GetRequireMatchingCertificateAlgorithmsOk -`func (o *PKIRootSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithmsOk() (*bool, bool)` +`func (o *PkiRootSignSelfIssuedRequest) GetRequireMatchingCertificateAlgorithmsOk() (*bool, bool)` GetRequireMatchingCertificateAlgorithmsOk returns a tuple with the RequireMatchingCertificateAlgorithms field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequireMatchingCertificateAlgorithms -`func (o *PKIRootSignSelfIssuedRequest) SetRequireMatchingCertificateAlgorithms(v bool)` +`func (o *PkiRootSignSelfIssuedRequest) SetRequireMatchingCertificateAlgorithms(v bool)` SetRequireMatchingCertificateAlgorithms sets RequireMatchingCertificateAlgorithms field to given value. ### HasRequireMatchingCertificateAlgorithms -`func (o *PKIRootSignSelfIssuedRequest) HasRequireMatchingCertificateAlgorithms() bool` +`func (o *PkiRootSignSelfIssuedRequest) HasRequireMatchingCertificateAlgorithms() bool` HasRequireMatchingCertificateAlgorithms returns a boolean if a field has been set. diff --git a/docs/PkiRootSignSelfIssuedResponse.md b/docs/PkiRootSignSelfIssuedResponse.md new file mode 100644 index 00000000..45cc683a --- /dev/null +++ b/docs/PkiRootSignSelfIssuedResponse.md @@ -0,0 +1,99 @@ +# PkiRootSignSelfIssuedResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Certificate** | Pointer to **string** | Certificate | [optional] +**IssuingCa** | Pointer to **string** | Issuing CA | [optional] + + + +## Methods + + +### NewPkiRootSignSelfIssuedResponse + +`func NewPkiRootSignSelfIssuedResponse() *PkiRootSignSelfIssuedResponse` + +NewPkiRootSignSelfIssuedResponse instantiates a new PkiRootSignSelfIssuedResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiRootSignSelfIssuedResponseWithDefaults + +`func NewPkiRootSignSelfIssuedResponseWithDefaults() *PkiRootSignSelfIssuedResponse` + +NewPkiRootSignSelfIssuedResponseWithDefaults instantiates a new PkiRootSignSelfIssuedResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCertificate + +`func (o *PkiRootSignSelfIssuedResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiRootSignSelfIssuedResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiRootSignSelfIssuedResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiRootSignSelfIssuedResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiRootSignSelfIssuedResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiRootSignSelfIssuedResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiRootSignSelfIssuedResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiRootSignSelfIssuedResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiRotateCrlResponse.md b/docs/PkiRotateCrlResponse.md new file mode 100644 index 00000000..0f3b1078 --- /dev/null +++ b/docs/PkiRotateCrlResponse.md @@ -0,0 +1,69 @@ +# PkiRotateCrlResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Success** | Pointer to **bool** | Whether rotation was successful | [optional] + + + +## Methods + + +### NewPkiRotateCrlResponse + +`func NewPkiRotateCrlResponse() *PkiRotateCrlResponse` + +NewPkiRotateCrlResponse instantiates a new PkiRotateCrlResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiRotateCrlResponseWithDefaults + +`func NewPkiRotateCrlResponseWithDefaults() *PkiRotateCrlResponse` + +NewPkiRotateCrlResponseWithDefaults instantiates a new PkiRotateCrlResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetSuccess + +`func (o *PkiRotateCrlResponse) GetSuccess() bool` + +GetSuccess returns the Success field if non-nil, zero value otherwise. + +### GetSuccessOk + +`func (o *PkiRotateCrlResponse) GetSuccessOk() (*bool, bool)` + +GetSuccessOk returns a tuple with the Success field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSuccess + +`func (o *PkiRotateCrlResponse) SetSuccess(v bool)` + +SetSuccess sets Success field to given value. + + +### HasSuccess + +`func (o *PkiRotateCrlResponse) HasSuccess() bool` + +HasSuccess returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiRotateDeltaCrlResponse.md b/docs/PkiRotateDeltaCrlResponse.md new file mode 100644 index 00000000..1be2c898 --- /dev/null +++ b/docs/PkiRotateDeltaCrlResponse.md @@ -0,0 +1,69 @@ +# PkiRotateDeltaCrlResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Success** | Pointer to **bool** | Whether rotation was successful | [optional] + + + +## Methods + + +### NewPkiRotateDeltaCrlResponse + +`func NewPkiRotateDeltaCrlResponse() *PkiRotateDeltaCrlResponse` + +NewPkiRotateDeltaCrlResponse instantiates a new PkiRotateDeltaCrlResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiRotateDeltaCrlResponseWithDefaults + +`func NewPkiRotateDeltaCrlResponseWithDefaults() *PkiRotateDeltaCrlResponse` + +NewPkiRotateDeltaCrlResponseWithDefaults instantiates a new PkiRotateDeltaCrlResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetSuccess + +`func (o *PkiRotateDeltaCrlResponse) GetSuccess() bool` + +GetSuccess returns the Success field if non-nil, zero value otherwise. + +### GetSuccessOk + +`func (o *PkiRotateDeltaCrlResponse) GetSuccessOk() (*bool, bool)` + +GetSuccessOk returns a tuple with the Success field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSuccess + +`func (o *PkiRotateDeltaCrlResponse) SetSuccess(v bool)` + +SetSuccess sets Success field to given value. + + +### HasSuccess + +`func (o *PkiRotateDeltaCrlResponse) HasSuccess() bool` + +HasSuccess returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIWriteIntermediateSetSignedRequest.md b/docs/PkiSetSignedIntermediateRequest.md similarity index 61% rename from docs/PKIWriteIntermediateSetSignedRequest.md rename to docs/PkiSetSignedIntermediateRequest.md index eba576bf..fd886abf 100644 --- a/docs/PKIWriteIntermediateSetSignedRequest.md +++ b/docs/PkiSetSignedIntermediateRequest.md @@ -1,4 +1,4 @@ -# PKIWriteIntermediateSetSignedRequest +# PkiSetSignedIntermediateRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewPKIWriteIntermediateSetSignedRequest +### NewPkiSetSignedIntermediateRequest -`func NewPKIWriteIntermediateSetSignedRequest() *PKIWriteIntermediateSetSignedRequest` +`func NewPkiSetSignedIntermediateRequest() *PkiSetSignedIntermediateRequest` -NewPKIWriteIntermediateSetSignedRequest instantiates a new PKIWriteIntermediateSetSignedRequest object +NewPkiSetSignedIntermediateRequest instantiates a new PkiSetSignedIntermediateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIWriteIntermediateSetSignedRequestWithDefaults +### NewPkiSetSignedIntermediateRequestWithDefaults -`func NewPKIWriteIntermediateSetSignedRequestWithDefaults() *PKIWriteIntermediateSetSignedRequest` +`func NewPkiSetSignedIntermediateRequestWithDefaults() *PkiSetSignedIntermediateRequest` -NewPKIWriteIntermediateSetSignedRequestWithDefaults instantiates a new PKIWriteIntermediateSetSignedRequest object +NewPkiSetSignedIntermediateRequestWithDefaults instantiates a new PkiSetSignedIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCertificate -`func (o *PKIWriteIntermediateSetSignedRequest) GetCertificate() string` +`func (o *PkiSetSignedIntermediateRequest) GetCertificate() string` GetCertificate returns the Certificate field if non-nil, zero value otherwise. ### GetCertificateOk -`func (o *PKIWriteIntermediateSetSignedRequest) GetCertificateOk() (*string, bool)` +`func (o *PkiSetSignedIntermediateRequest) GetCertificateOk() (*string, bool)` GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertificate -`func (o *PKIWriteIntermediateSetSignedRequest) SetCertificate(v string)` +`func (o *PkiSetSignedIntermediateRequest) SetCertificate(v string)` SetCertificate sets Certificate field to given value. ### HasCertificate -`func (o *PKIWriteIntermediateSetSignedRequest) HasCertificate() bool` +`func (o *PkiSetSignedIntermediateRequest) HasCertificate() bool` HasCertificate returns a boolean if a field has been set. diff --git a/docs/PkiSetSignedIntermediateResponse.md b/docs/PkiSetSignedIntermediateResponse.md new file mode 100644 index 00000000..67968cdf --- /dev/null +++ b/docs/PkiSetSignedIntermediateResponse.md @@ -0,0 +1,129 @@ +# PkiSetSignedIntermediateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ImportedIssuers** | Pointer to **[]string** | Net-new issuers imported as a part of this request | [optional] +**ImportedKeys** | Pointer to **[]string** | Net-new keys imported as a part of this request | [optional] +**Mapping** | Pointer to **map[string]interface{}** | A mapping of issuer_id to key_id for all issuers included in this request | [optional] + + + +## Methods + + +### NewPkiSetSignedIntermediateResponse + +`func NewPkiSetSignedIntermediateResponse() *PkiSetSignedIntermediateResponse` + +NewPkiSetSignedIntermediateResponse instantiates a new PkiSetSignedIntermediateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiSetSignedIntermediateResponseWithDefaults + +`func NewPkiSetSignedIntermediateResponseWithDefaults() *PkiSetSignedIntermediateResponse` + +NewPkiSetSignedIntermediateResponseWithDefaults instantiates a new PkiSetSignedIntermediateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetImportedIssuers + +`func (o *PkiSetSignedIntermediateResponse) GetImportedIssuers() []string` + +GetImportedIssuers returns the ImportedIssuers field if non-nil, zero value otherwise. + +### GetImportedIssuersOk + +`func (o *PkiSetSignedIntermediateResponse) GetImportedIssuersOk() (*[]string, bool)` + +GetImportedIssuersOk returns a tuple with the ImportedIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedIssuers + +`func (o *PkiSetSignedIntermediateResponse) SetImportedIssuers(v []string)` + +SetImportedIssuers sets ImportedIssuers field to given value. + + +### HasImportedIssuers + +`func (o *PkiSetSignedIntermediateResponse) HasImportedIssuers() bool` + +HasImportedIssuers returns a boolean if a field has been set. + + + + +### GetImportedKeys + +`func (o *PkiSetSignedIntermediateResponse) GetImportedKeys() []string` + +GetImportedKeys returns the ImportedKeys field if non-nil, zero value otherwise. + +### GetImportedKeysOk + +`func (o *PkiSetSignedIntermediateResponse) GetImportedKeysOk() (*[]string, bool)` + +GetImportedKeysOk returns a tuple with the ImportedKeys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetImportedKeys + +`func (o *PkiSetSignedIntermediateResponse) SetImportedKeys(v []string)` + +SetImportedKeys sets ImportedKeys field to given value. + + +### HasImportedKeys + +`func (o *PkiSetSignedIntermediateResponse) HasImportedKeys() bool` + +HasImportedKeys returns a boolean if a field has been set. + + + + +### GetMapping + +`func (o *PkiSetSignedIntermediateResponse) GetMapping() map[string]interface{}` + +GetMapping returns the Mapping field if non-nil, zero value otherwise. + +### GetMappingOk + +`func (o *PkiSetSignedIntermediateResponse) GetMappingOk() (*map[string]interface{}, bool)` + +GetMappingOk returns a tuple with the Mapping field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMapping + +`func (o *PkiSetSignedIntermediateResponse) SetMapping(v map[string]interface{})` + +SetMapping sets Mapping field to given value. + + +### HasMapping + +`func (o *PkiSetSignedIntermediateResponse) HasMapping() bool` + +HasMapping returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiSignVerbatimRequest.md b/docs/PkiSignVerbatimRequest.md index 4720b37d..8ee1fd85 100644 --- a/docs/PkiSignVerbatimRequest.md +++ b/docs/PkiSignVerbatimRequest.md @@ -1,4 +1,4 @@ -# PKISignVerbatimRequest +# PkiSignVerbatimRequest ## Properties @@ -25,53 +25,54 @@ Name | Type | Description | Notes **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] **UsePss** | Pointer to **bool** | Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. | [optional] [default to false] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKISignVerbatimRequest +### NewPkiSignVerbatimRequest -`func NewPKISignVerbatimRequest() *PKISignVerbatimRequest` +`func NewPkiSignVerbatimRequest() *PkiSignVerbatimRequest` -NewPKISignVerbatimRequest instantiates a new PKISignVerbatimRequest object +NewPkiSignVerbatimRequest instantiates a new PkiSignVerbatimRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKISignVerbatimRequestWithDefaults +### NewPkiSignVerbatimRequestWithDefaults -`func NewPKISignVerbatimRequestWithDefaults() *PKISignVerbatimRequest` +`func NewPkiSignVerbatimRequestWithDefaults() *PkiSignVerbatimRequest` -NewPKISignVerbatimRequestWithDefaults instantiates a new PKISignVerbatimRequest object +NewPkiSignVerbatimRequestWithDefaults instantiates a new PkiSignVerbatimRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKISignVerbatimRequest) GetAltNames() string` +`func (o *PkiSignVerbatimRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKISignVerbatimRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKISignVerbatimRequest) SetAltNames(v string)` +`func (o *PkiSignVerbatimRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKISignVerbatimRequest) HasAltNames() bool` +`func (o *PkiSignVerbatimRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -80,27 +81,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKISignVerbatimRequest) GetCommonName() string` +`func (o *PkiSignVerbatimRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKISignVerbatimRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKISignVerbatimRequest) SetCommonName(v string)` +`func (o *PkiSignVerbatimRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKISignVerbatimRequest) HasCommonName() bool` +`func (o *PkiSignVerbatimRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -109,27 +110,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCsr -`func (o *PKISignVerbatimRequest) GetCsr() string` +`func (o *PkiSignVerbatimRequest) GetCsr() string` GetCsr returns the Csr field if non-nil, zero value otherwise. ### GetCsrOk -`func (o *PKISignVerbatimRequest) GetCsrOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetCsrOk() (*string, bool)` GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCsr -`func (o *PKISignVerbatimRequest) SetCsr(v string)` +`func (o *PkiSignVerbatimRequest) SetCsr(v string)` SetCsr sets Csr field to given value. ### HasCsr -`func (o *PKISignVerbatimRequest) HasCsr() bool` +`func (o *PkiSignVerbatimRequest) HasCsr() bool` HasCsr returns a boolean if a field has been set. @@ -138,27 +139,27 @@ HasCsr returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKISignVerbatimRequest) GetExcludeCnFromSans() bool` +`func (o *PkiSignVerbatimRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKISignVerbatimRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiSignVerbatimRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKISignVerbatimRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiSignVerbatimRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKISignVerbatimRequest) HasExcludeCnFromSans() bool` +`func (o *PkiSignVerbatimRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -167,27 +168,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetExtKeyUsage -`func (o *PKISignVerbatimRequest) GetExtKeyUsage() []string` +`func (o *PkiSignVerbatimRequest) GetExtKeyUsage() []string` GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. ### GetExtKeyUsageOk -`func (o *PKISignVerbatimRequest) GetExtKeyUsageOk() (*[]string, bool)` +`func (o *PkiSignVerbatimRequest) GetExtKeyUsageOk() (*[]string, bool)` GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsage -`func (o *PKISignVerbatimRequest) SetExtKeyUsage(v []string)` +`func (o *PkiSignVerbatimRequest) SetExtKeyUsage(v []string)` SetExtKeyUsage sets ExtKeyUsage field to given value. ### HasExtKeyUsage -`func (o *PKISignVerbatimRequest) HasExtKeyUsage() bool` +`func (o *PkiSignVerbatimRequest) HasExtKeyUsage() bool` HasExtKeyUsage returns a boolean if a field has been set. @@ -196,27 +197,27 @@ HasExtKeyUsage returns a boolean if a field has been set. ### GetExtKeyUsageOids -`func (o *PKISignVerbatimRequest) GetExtKeyUsageOids() []string` +`func (o *PkiSignVerbatimRequest) GetExtKeyUsageOids() []string` GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. ### GetExtKeyUsageOidsOk -`func (o *PKISignVerbatimRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` +`func (o *PkiSignVerbatimRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsageOids -`func (o *PKISignVerbatimRequest) SetExtKeyUsageOids(v []string)` +`func (o *PkiSignVerbatimRequest) SetExtKeyUsageOids(v []string)` SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. ### HasExtKeyUsageOids -`func (o *PKISignVerbatimRequest) HasExtKeyUsageOids() bool` +`func (o *PkiSignVerbatimRequest) HasExtKeyUsageOids() bool` HasExtKeyUsageOids returns a boolean if a field has been set. @@ -225,27 +226,27 @@ HasExtKeyUsageOids returns a boolean if a field has been set. ### GetFormat -`func (o *PKISignVerbatimRequest) GetFormat() string` +`func (o *PkiSignVerbatimRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKISignVerbatimRequest) GetFormatOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKISignVerbatimRequest) SetFormat(v string)` +`func (o *PkiSignVerbatimRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKISignVerbatimRequest) HasFormat() bool` +`func (o *PkiSignVerbatimRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -254,27 +255,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKISignVerbatimRequest) GetIpSans() []string` +`func (o *PkiSignVerbatimRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKISignVerbatimRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiSignVerbatimRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKISignVerbatimRequest) SetIpSans(v []string)` +`func (o *PkiSignVerbatimRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKISignVerbatimRequest) HasIpSans() bool` +`func (o *PkiSignVerbatimRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -283,27 +284,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerRef -`func (o *PKISignVerbatimRequest) GetIssuerRef() string` +`func (o *PkiSignVerbatimRequest) GetIssuerRef() string` GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. ### GetIssuerRefOk -`func (o *PKISignVerbatimRequest) GetIssuerRefOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetIssuerRefOk() (*string, bool)` GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerRef -`func (o *PKISignVerbatimRequest) SetIssuerRef(v string)` +`func (o *PkiSignVerbatimRequest) SetIssuerRef(v string)` SetIssuerRef sets IssuerRef field to given value. ### HasIssuerRef -`func (o *PKISignVerbatimRequest) HasIssuerRef() bool` +`func (o *PkiSignVerbatimRequest) HasIssuerRef() bool` HasIssuerRef returns a boolean if a field has been set. @@ -312,27 +313,27 @@ HasIssuerRef returns a boolean if a field has been set. ### GetKeyUsage -`func (o *PKISignVerbatimRequest) GetKeyUsage() []string` +`func (o *PkiSignVerbatimRequest) GetKeyUsage() []string` GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. ### GetKeyUsageOk -`func (o *PKISignVerbatimRequest) GetKeyUsageOk() (*[]string, bool)` +`func (o *PkiSignVerbatimRequest) GetKeyUsageOk() (*[]string, bool)` GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyUsage -`func (o *PKISignVerbatimRequest) SetKeyUsage(v []string)` +`func (o *PkiSignVerbatimRequest) SetKeyUsage(v []string)` SetKeyUsage sets KeyUsage field to given value. ### HasKeyUsage -`func (o *PKISignVerbatimRequest) HasKeyUsage() bool` +`func (o *PkiSignVerbatimRequest) HasKeyUsage() bool` HasKeyUsage returns a boolean if a field has been set. @@ -341,27 +342,27 @@ HasKeyUsage returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKISignVerbatimRequest) GetNotAfter() string` +`func (o *PkiSignVerbatimRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKISignVerbatimRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKISignVerbatimRequest) SetNotAfter(v string)` +`func (o *PkiSignVerbatimRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKISignVerbatimRequest) HasNotAfter() bool` +`func (o *PkiSignVerbatimRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -370,27 +371,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKISignVerbatimRequest) GetOtherSans() []string` +`func (o *PkiSignVerbatimRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKISignVerbatimRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiSignVerbatimRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKISignVerbatimRequest) SetOtherSans(v []string)` +`func (o *PkiSignVerbatimRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKISignVerbatimRequest) HasOtherSans() bool` +`func (o *PkiSignVerbatimRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -399,27 +400,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKISignVerbatimRequest) GetPrivateKeyFormat() string` +`func (o *PkiSignVerbatimRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKISignVerbatimRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKISignVerbatimRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiSignVerbatimRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKISignVerbatimRequest) HasPrivateKeyFormat() bool` +`func (o *PkiSignVerbatimRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -428,27 +429,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKISignVerbatimRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiSignVerbatimRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKISignVerbatimRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiSignVerbatimRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKISignVerbatimRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiSignVerbatimRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKISignVerbatimRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiSignVerbatimRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -457,27 +458,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetRole -`func (o *PKISignVerbatimRequest) GetRole() string` +`func (o *PkiSignVerbatimRequest) GetRole() string` GetRole returns the Role field if non-nil, zero value otherwise. ### GetRoleOk -`func (o *PKISignVerbatimRequest) GetRoleOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetRoleOk() (*string, bool)` GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRole -`func (o *PKISignVerbatimRequest) SetRole(v string)` +`func (o *PkiSignVerbatimRequest) SetRole(v string)` SetRole sets Role field to given value. ### HasRole -`func (o *PKISignVerbatimRequest) HasRole() bool` +`func (o *PkiSignVerbatimRequest) HasRole() bool` HasRole returns a boolean if a field has been set. @@ -486,27 +487,27 @@ HasRole returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKISignVerbatimRequest) GetSerialNumber() string` +`func (o *PkiSignVerbatimRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKISignVerbatimRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiSignVerbatimRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKISignVerbatimRequest) SetSerialNumber(v string)` +`func (o *PkiSignVerbatimRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKISignVerbatimRequest) HasSerialNumber() bool` +`func (o *PkiSignVerbatimRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -515,27 +516,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKISignVerbatimRequest) GetSignatureBits() int32` +`func (o *PkiSignVerbatimRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKISignVerbatimRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiSignVerbatimRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKISignVerbatimRequest) SetSignatureBits(v int32)` +`func (o *PkiSignVerbatimRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKISignVerbatimRequest) HasSignatureBits() bool` +`func (o *PkiSignVerbatimRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -544,27 +545,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetTtl -`func (o *PKISignVerbatimRequest) GetTtl() int32` +`func (o *PkiSignVerbatimRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKISignVerbatimRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiSignVerbatimRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKISignVerbatimRequest) SetTtl(v int32)` +`func (o *PkiSignVerbatimRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKISignVerbatimRequest) HasTtl() bool` +`func (o *PkiSignVerbatimRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -573,27 +574,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKISignVerbatimRequest) GetUriSans() []string` +`func (o *PkiSignVerbatimRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKISignVerbatimRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiSignVerbatimRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKISignVerbatimRequest) SetUriSans(v []string)` +`func (o *PkiSignVerbatimRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKISignVerbatimRequest) HasUriSans() bool` +`func (o *PkiSignVerbatimRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -602,33 +603,62 @@ HasUriSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKISignVerbatimRequest) GetUsePss() bool` +`func (o *PkiSignVerbatimRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKISignVerbatimRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiSignVerbatimRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKISignVerbatimRequest) SetUsePss(v bool)` +`func (o *PkiSignVerbatimRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKISignVerbatimRequest) HasUsePss() bool` +`func (o *PkiSignVerbatimRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiSignVerbatimRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiSignVerbatimRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiSignVerbatimRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiSignVerbatimRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiSignVerbatimResponse.md b/docs/PkiSignVerbatimResponse.md new file mode 100644 index 00000000..027d671e --- /dev/null +++ b/docs/PkiSignVerbatimResponse.md @@ -0,0 +1,249 @@ +# PkiSignVerbatimResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiSignVerbatimResponse + +`func NewPkiSignVerbatimResponse() *PkiSignVerbatimResponse` + +NewPkiSignVerbatimResponse instantiates a new PkiSignVerbatimResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiSignVerbatimResponseWithDefaults + +`func NewPkiSignVerbatimResponseWithDefaults() *PkiSignVerbatimResponse` + +NewPkiSignVerbatimResponseWithDefaults instantiates a new PkiSignVerbatimResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiSignVerbatimResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiSignVerbatimResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiSignVerbatimResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiSignVerbatimResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiSignVerbatimResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiSignVerbatimResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiSignVerbatimResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiSignVerbatimResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiSignVerbatimResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiSignVerbatimResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiSignVerbatimResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiSignVerbatimResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiSignVerbatimResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiSignVerbatimResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiSignVerbatimResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiSignVerbatimResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiSignVerbatimResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiSignVerbatimResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiSignVerbatimResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiSignVerbatimResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiSignVerbatimResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiSignVerbatimResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiSignVerbatimResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiSignVerbatimResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiSignVerbatimResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiSignVerbatimResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiSignVerbatimResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiSignVerbatimResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKISignVerbatimRoleRequest.md b/docs/PkiSignVerbatimWithRoleRequest.md similarity index 67% rename from docs/PKISignVerbatimRoleRequest.md rename to docs/PkiSignVerbatimWithRoleRequest.md index 09a56edd..7e962f03 100644 --- a/docs/PKISignVerbatimRoleRequest.md +++ b/docs/PkiSignVerbatimWithRoleRequest.md @@ -1,4 +1,4 @@ -# PKISignVerbatimRoleRequest +# PkiSignVerbatimWithRoleRequest ## Properties @@ -24,53 +24,54 @@ Name | Type | Description | Notes **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] **UsePss** | Pointer to **bool** | Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. | [optional] [default to false] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKISignVerbatimRoleRequest +### NewPkiSignVerbatimWithRoleRequest -`func NewPKISignVerbatimRoleRequest() *PKISignVerbatimRoleRequest` +`func NewPkiSignVerbatimWithRoleRequest() *PkiSignVerbatimWithRoleRequest` -NewPKISignVerbatimRoleRequest instantiates a new PKISignVerbatimRoleRequest object +NewPkiSignVerbatimWithRoleRequest instantiates a new PkiSignVerbatimWithRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKISignVerbatimRoleRequestWithDefaults +### NewPkiSignVerbatimWithRoleRequestWithDefaults -`func NewPKISignVerbatimRoleRequestWithDefaults() *PKISignVerbatimRoleRequest` +`func NewPkiSignVerbatimWithRoleRequestWithDefaults() *PkiSignVerbatimWithRoleRequest` -NewPKISignVerbatimRoleRequestWithDefaults instantiates a new PKISignVerbatimRoleRequest object +NewPkiSignVerbatimWithRoleRequestWithDefaults instantiates a new PkiSignVerbatimWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKISignVerbatimRoleRequest) GetAltNames() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKISignVerbatimRoleRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKISignVerbatimRoleRequest) SetAltNames(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKISignVerbatimRoleRequest) HasAltNames() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -79,27 +80,27 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKISignVerbatimRoleRequest) GetCommonName() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKISignVerbatimRoleRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKISignVerbatimRoleRequest) SetCommonName(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKISignVerbatimRoleRequest) HasCommonName() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. @@ -108,27 +109,27 @@ HasCommonName returns a boolean if a field has been set. ### GetCsr -`func (o *PKISignVerbatimRoleRequest) GetCsr() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetCsr() string` GetCsr returns the Csr field if non-nil, zero value otherwise. ### GetCsrOk -`func (o *PKISignVerbatimRoleRequest) GetCsrOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetCsrOk() (*string, bool)` GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCsr -`func (o *PKISignVerbatimRoleRequest) SetCsr(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetCsr(v string)` SetCsr sets Csr field to given value. ### HasCsr -`func (o *PKISignVerbatimRoleRequest) HasCsr() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasCsr() bool` HasCsr returns a boolean if a field has been set. @@ -137,27 +138,27 @@ HasCsr returns a boolean if a field has been set. ### GetExcludeCnFromSans -`func (o *PKISignVerbatimRoleRequest) GetExcludeCnFromSans() bool` +`func (o *PkiSignVerbatimWithRoleRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKISignVerbatimRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKISignVerbatimRoleRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiSignVerbatimWithRoleRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKISignVerbatimRoleRequest) HasExcludeCnFromSans() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -166,27 +167,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetExtKeyUsage -`func (o *PKISignVerbatimRoleRequest) GetExtKeyUsage() []string` +`func (o *PkiSignVerbatimWithRoleRequest) GetExtKeyUsage() []string` GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. ### GetExtKeyUsageOk -`func (o *PKISignVerbatimRoleRequest) GetExtKeyUsageOk() (*[]string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetExtKeyUsageOk() (*[]string, bool)` GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsage -`func (o *PKISignVerbatimRoleRequest) SetExtKeyUsage(v []string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetExtKeyUsage(v []string)` SetExtKeyUsage sets ExtKeyUsage field to given value. ### HasExtKeyUsage -`func (o *PKISignVerbatimRoleRequest) HasExtKeyUsage() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasExtKeyUsage() bool` HasExtKeyUsage returns a boolean if a field has been set. @@ -195,27 +196,27 @@ HasExtKeyUsage returns a boolean if a field has been set. ### GetExtKeyUsageOids -`func (o *PKISignVerbatimRoleRequest) GetExtKeyUsageOids() []string` +`func (o *PkiSignVerbatimWithRoleRequest) GetExtKeyUsageOids() []string` GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. ### GetExtKeyUsageOidsOk -`func (o *PKISignVerbatimRoleRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetExtKeyUsageOidsOk() (*[]string, bool)` GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtKeyUsageOids -`func (o *PKISignVerbatimRoleRequest) SetExtKeyUsageOids(v []string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetExtKeyUsageOids(v []string)` SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. ### HasExtKeyUsageOids -`func (o *PKISignVerbatimRoleRequest) HasExtKeyUsageOids() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasExtKeyUsageOids() bool` HasExtKeyUsageOids returns a boolean if a field has been set. @@ -224,27 +225,27 @@ HasExtKeyUsageOids returns a boolean if a field has been set. ### GetFormat -`func (o *PKISignVerbatimRoleRequest) GetFormat() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKISignVerbatimRoleRequest) GetFormatOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKISignVerbatimRoleRequest) SetFormat(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKISignVerbatimRoleRequest) HasFormat() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -253,27 +254,27 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKISignVerbatimRoleRequest) GetIpSans() []string` +`func (o *PkiSignVerbatimWithRoleRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKISignVerbatimRoleRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKISignVerbatimRoleRequest) SetIpSans(v []string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKISignVerbatimRoleRequest) HasIpSans() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. @@ -282,27 +283,27 @@ HasIpSans returns a boolean if a field has been set. ### GetIssuerRef -`func (o *PKISignVerbatimRoleRequest) GetIssuerRef() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetIssuerRef() string` GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. ### GetIssuerRefOk -`func (o *PKISignVerbatimRoleRequest) GetIssuerRefOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetIssuerRefOk() (*string, bool)` GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerRef -`func (o *PKISignVerbatimRoleRequest) SetIssuerRef(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetIssuerRef(v string)` SetIssuerRef sets IssuerRef field to given value. ### HasIssuerRef -`func (o *PKISignVerbatimRoleRequest) HasIssuerRef() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasIssuerRef() bool` HasIssuerRef returns a boolean if a field has been set. @@ -311,27 +312,27 @@ HasIssuerRef returns a boolean if a field has been set. ### GetKeyUsage -`func (o *PKISignVerbatimRoleRequest) GetKeyUsage() []string` +`func (o *PkiSignVerbatimWithRoleRequest) GetKeyUsage() []string` GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. ### GetKeyUsageOk -`func (o *PKISignVerbatimRoleRequest) GetKeyUsageOk() (*[]string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetKeyUsageOk() (*[]string, bool)` GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyUsage -`func (o *PKISignVerbatimRoleRequest) SetKeyUsage(v []string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetKeyUsage(v []string)` SetKeyUsage sets KeyUsage field to given value. ### HasKeyUsage -`func (o *PKISignVerbatimRoleRequest) HasKeyUsage() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasKeyUsage() bool` HasKeyUsage returns a boolean if a field has been set. @@ -340,27 +341,27 @@ HasKeyUsage returns a boolean if a field has been set. ### GetNotAfter -`func (o *PKISignVerbatimRoleRequest) GetNotAfter() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKISignVerbatimRoleRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKISignVerbatimRoleRequest) SetNotAfter(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKISignVerbatimRoleRequest) HasNotAfter() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -369,27 +370,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKISignVerbatimRoleRequest) GetOtherSans() []string` +`func (o *PkiSignVerbatimWithRoleRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKISignVerbatimRoleRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKISignVerbatimRoleRequest) SetOtherSans(v []string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKISignVerbatimRoleRequest) HasOtherSans() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -398,27 +399,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKISignVerbatimRoleRequest) GetPrivateKeyFormat() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKISignVerbatimRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKISignVerbatimRoleRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKISignVerbatimRoleRequest) HasPrivateKeyFormat() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -427,27 +428,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKISignVerbatimRoleRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiSignVerbatimWithRoleRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKISignVerbatimRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKISignVerbatimRoleRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiSignVerbatimWithRoleRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKISignVerbatimRoleRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -456,27 +457,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKISignVerbatimRoleRequest) GetSerialNumber() string` +`func (o *PkiSignVerbatimWithRoleRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKISignVerbatimRoleRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKISignVerbatimRoleRequest) SetSerialNumber(v string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKISignVerbatimRoleRequest) HasSerialNumber() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -485,27 +486,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetSignatureBits -`func (o *PKISignVerbatimRoleRequest) GetSignatureBits() int32` +`func (o *PkiSignVerbatimWithRoleRequest) GetSignatureBits() int32` GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. ### GetSignatureBitsOk -`func (o *PKISignVerbatimRoleRequest) GetSignatureBitsOk() (*int32, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetSignatureBitsOk() (*int32, bool)` GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSignatureBits -`func (o *PKISignVerbatimRoleRequest) SetSignatureBits(v int32)` +`func (o *PkiSignVerbatimWithRoleRequest) SetSignatureBits(v int32)` SetSignatureBits sets SignatureBits field to given value. ### HasSignatureBits -`func (o *PKISignVerbatimRoleRequest) HasSignatureBits() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasSignatureBits() bool` HasSignatureBits returns a boolean if a field has been set. @@ -514,27 +515,27 @@ HasSignatureBits returns a boolean if a field has been set. ### GetTtl -`func (o *PKISignVerbatimRoleRequest) GetTtl() int32` +`func (o *PkiSignVerbatimWithRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKISignVerbatimRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKISignVerbatimRoleRequest) SetTtl(v int32)` +`func (o *PkiSignVerbatimWithRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKISignVerbatimRoleRequest) HasTtl() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -543,27 +544,27 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKISignVerbatimRoleRequest) GetUriSans() []string` +`func (o *PkiSignVerbatimWithRoleRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKISignVerbatimRoleRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKISignVerbatimRoleRequest) SetUriSans(v []string)` +`func (o *PkiSignVerbatimWithRoleRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKISignVerbatimRoleRequest) HasUriSans() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. @@ -572,33 +573,62 @@ HasUriSans returns a boolean if a field has been set. ### GetUsePss -`func (o *PKISignVerbatimRoleRequest) GetUsePss() bool` +`func (o *PkiSignVerbatimWithRoleRequest) GetUsePss() bool` GetUsePss returns the UsePss field if non-nil, zero value otherwise. ### GetUsePssOk -`func (o *PKISignVerbatimRoleRequest) GetUsePssOk() (*bool, bool)` +`func (o *PkiSignVerbatimWithRoleRequest) GetUsePssOk() (*bool, bool)` GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsePss -`func (o *PKISignVerbatimRoleRequest) SetUsePss(v bool)` +`func (o *PkiSignVerbatimWithRoleRequest) SetUsePss(v bool)` SetUsePss sets UsePss field to given value. ### HasUsePss -`func (o *PKISignVerbatimRoleRequest) HasUsePss() bool` +`func (o *PkiSignVerbatimWithRoleRequest) HasUsePss() bool` HasUsePss returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiSignVerbatimWithRoleRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiSignVerbatimWithRoleRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiSignVerbatimWithRoleRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiSignVerbatimWithRoleRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiSignVerbatimWithRoleResponse.md b/docs/PkiSignVerbatimWithRoleResponse.md new file mode 100644 index 00000000..7d7df9fd --- /dev/null +++ b/docs/PkiSignVerbatimWithRoleResponse.md @@ -0,0 +1,249 @@ +# PkiSignVerbatimWithRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiSignVerbatimWithRoleResponse + +`func NewPkiSignVerbatimWithRoleResponse() *PkiSignVerbatimWithRoleResponse` + +NewPkiSignVerbatimWithRoleResponse instantiates a new PkiSignVerbatimWithRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiSignVerbatimWithRoleResponseWithDefaults + +`func NewPkiSignVerbatimWithRoleResponseWithDefaults() *PkiSignVerbatimWithRoleResponse` + +NewPkiSignVerbatimWithRoleResponseWithDefaults instantiates a new PkiSignVerbatimWithRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiSignVerbatimWithRoleResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiSignVerbatimWithRoleResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiSignVerbatimWithRoleResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiSignVerbatimWithRoleResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiSignVerbatimWithRoleResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiSignVerbatimWithRoleResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiSignVerbatimWithRoleResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiSignVerbatimWithRoleResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiSignVerbatimWithRoleResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiSignVerbatimWithRoleResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiSignVerbatimWithRoleResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiSignVerbatimWithRoleResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiSignVerbatimWithRoleResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiSignVerbatimWithRoleResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiSignVerbatimWithRoleResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiSignVerbatimWithRoleResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiSignVerbatimWithRoleResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiSignVerbatimWithRoleResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiSignVerbatimWithRoleResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiSignVerbatimWithRoleResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiSignVerbatimWithRoleResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiSignVerbatimWithRoleResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiSignVerbatimWithRoleResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiSignVerbatimWithRoleResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiSignVerbatimWithRoleResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiSignVerbatimWithRoleResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiSignVerbatimWithRoleResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiSignVerbatimWithRoleResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKIIssuerIssueRoleRequest.md b/docs/PkiSignWithRoleRequest.md similarity index 60% rename from docs/PKIIssuerIssueRoleRequest.md rename to docs/PkiSignWithRoleRequest.md index 16517975..c1041383 100644 --- a/docs/PKIIssuerIssueRoleRequest.md +++ b/docs/PkiSignWithRoleRequest.md @@ -1,4 +1,4 @@ -# PKIIssuerIssueRoleRequest +# PkiSignWithRoleRequest ## Properties @@ -7,9 +7,11 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **AltNames** | Pointer to **string** | The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. | [optional] **CommonName** | Pointer to **string** | The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. | [optional] +**Csr** | Pointer to **string** | PEM-format CSR to be signed. | [optional] [default to ""] **ExcludeCnFromSans** | Pointer to **bool** | If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). | [optional] [default to false] **Format** | Pointer to **string** | Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". | [optional] [default to "pem"] **IpSans** | Pointer to **[]string** | The requested IP SANs, if any, in a comma-delimited list | [optional] +**IssuerRef** | Pointer to **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [optional] [default to "default"] **NotAfter** | Pointer to **string** | Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ | [optional] **OtherSans** | Pointer to **[]string** | Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. | [optional] **PrivateKeyFormat** | Pointer to **string** | Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". | [optional] [default to "der"] @@ -17,53 +19,54 @@ Name | Type | Description | Notes **SerialNumber** | Pointer to **string** | The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. | [optional] **Ttl** | Pointer to **int32** | The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. | [optional] **UriSans** | Pointer to **[]string** | The requested URI SANs, if any, in a comma-delimited list. | [optional] +**UserIds** | Pointer to **[]string** | The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. | [optional] ## Methods -### NewPKIIssuerIssueRoleRequest +### NewPkiSignWithRoleRequest -`func NewPKIIssuerIssueRoleRequest() *PKIIssuerIssueRoleRequest` +`func NewPkiSignWithRoleRequest() *PkiSignWithRoleRequest` -NewPKIIssuerIssueRoleRequest instantiates a new PKIIssuerIssueRoleRequest object +NewPkiSignWithRoleRequest instantiates a new PkiSignWithRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKIIssuerIssueRoleRequestWithDefaults +### NewPkiSignWithRoleRequestWithDefaults -`func NewPKIIssuerIssueRoleRequestWithDefaults() *PKIIssuerIssueRoleRequest` +`func NewPkiSignWithRoleRequestWithDefaults() *PkiSignWithRoleRequest` -NewPKIIssuerIssueRoleRequestWithDefaults instantiates a new PKIIssuerIssueRoleRequest object +NewPkiSignWithRoleRequestWithDefaults instantiates a new PkiSignWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAltNames -`func (o *PKIIssuerIssueRoleRequest) GetAltNames() string` +`func (o *PkiSignWithRoleRequest) GetAltNames() string` GetAltNames returns the AltNames field if non-nil, zero value otherwise. ### GetAltNamesOk -`func (o *PKIIssuerIssueRoleRequest) GetAltNamesOk() (*string, bool)` +`func (o *PkiSignWithRoleRequest) GetAltNamesOk() (*string, bool)` GetAltNamesOk returns a tuple with the AltNames field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAltNames -`func (o *PKIIssuerIssueRoleRequest) SetAltNames(v string)` +`func (o *PkiSignWithRoleRequest) SetAltNames(v string)` SetAltNames sets AltNames field to given value. ### HasAltNames -`func (o *PKIIssuerIssueRoleRequest) HasAltNames() bool` +`func (o *PkiSignWithRoleRequest) HasAltNames() bool` HasAltNames returns a boolean if a field has been set. @@ -72,56 +75,85 @@ HasAltNames returns a boolean if a field has been set. ### GetCommonName -`func (o *PKIIssuerIssueRoleRequest) GetCommonName() string` +`func (o *PkiSignWithRoleRequest) GetCommonName() string` GetCommonName returns the CommonName field if non-nil, zero value otherwise. ### GetCommonNameOk -`func (o *PKIIssuerIssueRoleRequest) GetCommonNameOk() (*string, bool)` +`func (o *PkiSignWithRoleRequest) GetCommonNameOk() (*string, bool)` GetCommonNameOk returns a tuple with the CommonName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommonName -`func (o *PKIIssuerIssueRoleRequest) SetCommonName(v string)` +`func (o *PkiSignWithRoleRequest) SetCommonName(v string)` SetCommonName sets CommonName field to given value. ### HasCommonName -`func (o *PKIIssuerIssueRoleRequest) HasCommonName() bool` +`func (o *PkiSignWithRoleRequest) HasCommonName() bool` HasCommonName returns a boolean if a field has been set. +### GetCsr + +`func (o *PkiSignWithRoleRequest) GetCsr() string` + +GetCsr returns the Csr field if non-nil, zero value otherwise. + +### GetCsrOk + +`func (o *PkiSignWithRoleRequest) GetCsrOk() (*string, bool)` + +GetCsrOk returns a tuple with the Csr field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCsr + +`func (o *PkiSignWithRoleRequest) SetCsr(v string)` + +SetCsr sets Csr field to given value. + + +### HasCsr + +`func (o *PkiSignWithRoleRequest) HasCsr() bool` + +HasCsr returns a boolean if a field has been set. + + + + ### GetExcludeCnFromSans -`func (o *PKIIssuerIssueRoleRequest) GetExcludeCnFromSans() bool` +`func (o *PkiSignWithRoleRequest) GetExcludeCnFromSans() bool` GetExcludeCnFromSans returns the ExcludeCnFromSans field if non-nil, zero value otherwise. ### GetExcludeCnFromSansOk -`func (o *PKIIssuerIssueRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` +`func (o *PkiSignWithRoleRequest) GetExcludeCnFromSansOk() (*bool, bool)` GetExcludeCnFromSansOk returns a tuple with the ExcludeCnFromSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCnFromSans -`func (o *PKIIssuerIssueRoleRequest) SetExcludeCnFromSans(v bool)` +`func (o *PkiSignWithRoleRequest) SetExcludeCnFromSans(v bool)` SetExcludeCnFromSans sets ExcludeCnFromSans field to given value. ### HasExcludeCnFromSans -`func (o *PKIIssuerIssueRoleRequest) HasExcludeCnFromSans() bool` +`func (o *PkiSignWithRoleRequest) HasExcludeCnFromSans() bool` HasExcludeCnFromSans returns a boolean if a field has been set. @@ -130,27 +162,27 @@ HasExcludeCnFromSans returns a boolean if a field has been set. ### GetFormat -`func (o *PKIIssuerIssueRoleRequest) GetFormat() string` +`func (o *PkiSignWithRoleRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *PKIIssuerIssueRoleRequest) GetFormatOk() (*string, bool)` +`func (o *PkiSignWithRoleRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *PKIIssuerIssueRoleRequest) SetFormat(v string)` +`func (o *PkiSignWithRoleRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *PKIIssuerIssueRoleRequest) HasFormat() bool` +`func (o *PkiSignWithRoleRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -159,56 +191,85 @@ HasFormat returns a boolean if a field has been set. ### GetIpSans -`func (o *PKIIssuerIssueRoleRequest) GetIpSans() []string` +`func (o *PkiSignWithRoleRequest) GetIpSans() []string` GetIpSans returns the IpSans field if non-nil, zero value otherwise. ### GetIpSansOk -`func (o *PKIIssuerIssueRoleRequest) GetIpSansOk() (*[]string, bool)` +`func (o *PkiSignWithRoleRequest) GetIpSansOk() (*[]string, bool)` GetIpSansOk returns a tuple with the IpSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIpSans -`func (o *PKIIssuerIssueRoleRequest) SetIpSans(v []string)` +`func (o *PkiSignWithRoleRequest) SetIpSans(v []string)` SetIpSans sets IpSans field to given value. ### HasIpSans -`func (o *PKIIssuerIssueRoleRequest) HasIpSans() bool` +`func (o *PkiSignWithRoleRequest) HasIpSans() bool` HasIpSans returns a boolean if a field has been set. +### GetIssuerRef + +`func (o *PkiSignWithRoleRequest) GetIssuerRef() string` + +GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. + +### GetIssuerRefOk + +`func (o *PkiSignWithRoleRequest) GetIssuerRefOk() (*string, bool)` + +GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerRef + +`func (o *PkiSignWithRoleRequest) SetIssuerRef(v string)` + +SetIssuerRef sets IssuerRef field to given value. + + +### HasIssuerRef + +`func (o *PkiSignWithRoleRequest) HasIssuerRef() bool` + +HasIssuerRef returns a boolean if a field has been set. + + + + ### GetNotAfter -`func (o *PKIIssuerIssueRoleRequest) GetNotAfter() string` +`func (o *PkiSignWithRoleRequest) GetNotAfter() string` GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. ### GetNotAfterOk -`func (o *PKIIssuerIssueRoleRequest) GetNotAfterOk() (*string, bool)` +`func (o *PkiSignWithRoleRequest) GetNotAfterOk() (*string, bool)` GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotAfter -`func (o *PKIIssuerIssueRoleRequest) SetNotAfter(v string)` +`func (o *PkiSignWithRoleRequest) SetNotAfter(v string)` SetNotAfter sets NotAfter field to given value. ### HasNotAfter -`func (o *PKIIssuerIssueRoleRequest) HasNotAfter() bool` +`func (o *PkiSignWithRoleRequest) HasNotAfter() bool` HasNotAfter returns a boolean if a field has been set. @@ -217,27 +278,27 @@ HasNotAfter returns a boolean if a field has been set. ### GetOtherSans -`func (o *PKIIssuerIssueRoleRequest) GetOtherSans() []string` +`func (o *PkiSignWithRoleRequest) GetOtherSans() []string` GetOtherSans returns the OtherSans field if non-nil, zero value otherwise. ### GetOtherSansOk -`func (o *PKIIssuerIssueRoleRequest) GetOtherSansOk() (*[]string, bool)` +`func (o *PkiSignWithRoleRequest) GetOtherSansOk() (*[]string, bool)` GetOtherSansOk returns a tuple with the OtherSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtherSans -`func (o *PKIIssuerIssueRoleRequest) SetOtherSans(v []string)` +`func (o *PkiSignWithRoleRequest) SetOtherSans(v []string)` SetOtherSans sets OtherSans field to given value. ### HasOtherSans -`func (o *PKIIssuerIssueRoleRequest) HasOtherSans() bool` +`func (o *PkiSignWithRoleRequest) HasOtherSans() bool` HasOtherSans returns a boolean if a field has been set. @@ -246,27 +307,27 @@ HasOtherSans returns a boolean if a field has been set. ### GetPrivateKeyFormat -`func (o *PKIIssuerIssueRoleRequest) GetPrivateKeyFormat() string` +`func (o *PkiSignWithRoleRequest) GetPrivateKeyFormat() string` GetPrivateKeyFormat returns the PrivateKeyFormat field if non-nil, zero value otherwise. ### GetPrivateKeyFormatOk -`func (o *PKIIssuerIssueRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` +`func (o *PkiSignWithRoleRequest) GetPrivateKeyFormatOk() (*string, bool)` GetPrivateKeyFormatOk returns a tuple with the PrivateKeyFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKeyFormat -`func (o *PKIIssuerIssueRoleRequest) SetPrivateKeyFormat(v string)` +`func (o *PkiSignWithRoleRequest) SetPrivateKeyFormat(v string)` SetPrivateKeyFormat sets PrivateKeyFormat field to given value. ### HasPrivateKeyFormat -`func (o *PKIIssuerIssueRoleRequest) HasPrivateKeyFormat() bool` +`func (o *PkiSignWithRoleRequest) HasPrivateKeyFormat() bool` HasPrivateKeyFormat returns a boolean if a field has been set. @@ -275,27 +336,27 @@ HasPrivateKeyFormat returns a boolean if a field has been set. ### GetRemoveRootsFromChain -`func (o *PKIIssuerIssueRoleRequest) GetRemoveRootsFromChain() bool` +`func (o *PkiSignWithRoleRequest) GetRemoveRootsFromChain() bool` GetRemoveRootsFromChain returns the RemoveRootsFromChain field if non-nil, zero value otherwise. ### GetRemoveRootsFromChainOk -`func (o *PKIIssuerIssueRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` +`func (o *PkiSignWithRoleRequest) GetRemoveRootsFromChainOk() (*bool, bool)` GetRemoveRootsFromChainOk returns a tuple with the RemoveRootsFromChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRemoveRootsFromChain -`func (o *PKIIssuerIssueRoleRequest) SetRemoveRootsFromChain(v bool)` +`func (o *PkiSignWithRoleRequest) SetRemoveRootsFromChain(v bool)` SetRemoveRootsFromChain sets RemoveRootsFromChain field to given value. ### HasRemoveRootsFromChain -`func (o *PKIIssuerIssueRoleRequest) HasRemoveRootsFromChain() bool` +`func (o *PkiSignWithRoleRequest) HasRemoveRootsFromChain() bool` HasRemoveRootsFromChain returns a boolean if a field has been set. @@ -304,27 +365,27 @@ HasRemoveRootsFromChain returns a boolean if a field has been set. ### GetSerialNumber -`func (o *PKIIssuerIssueRoleRequest) GetSerialNumber() string` +`func (o *PkiSignWithRoleRequest) GetSerialNumber() string` GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. ### GetSerialNumberOk -`func (o *PKIIssuerIssueRoleRequest) GetSerialNumberOk() (*string, bool)` +`func (o *PkiSignWithRoleRequest) GetSerialNumberOk() (*string, bool)` GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSerialNumber -`func (o *PKIIssuerIssueRoleRequest) SetSerialNumber(v string)` +`func (o *PkiSignWithRoleRequest) SetSerialNumber(v string)` SetSerialNumber sets SerialNumber field to given value. ### HasSerialNumber -`func (o *PKIIssuerIssueRoleRequest) HasSerialNumber() bool` +`func (o *PkiSignWithRoleRequest) HasSerialNumber() bool` HasSerialNumber returns a boolean if a field has been set. @@ -333,27 +394,27 @@ HasSerialNumber returns a boolean if a field has been set. ### GetTtl -`func (o *PKIIssuerIssueRoleRequest) GetTtl() int32` +`func (o *PkiSignWithRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *PKIIssuerIssueRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *PkiSignWithRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *PKIIssuerIssueRoleRequest) SetTtl(v int32)` +`func (o *PkiSignWithRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *PKIIssuerIssueRoleRequest) HasTtl() bool` +`func (o *PkiSignWithRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -362,33 +423,62 @@ HasTtl returns a boolean if a field has been set. ### GetUriSans -`func (o *PKIIssuerIssueRoleRequest) GetUriSans() []string` +`func (o *PkiSignWithRoleRequest) GetUriSans() []string` GetUriSans returns the UriSans field if non-nil, zero value otherwise. ### GetUriSansOk -`func (o *PKIIssuerIssueRoleRequest) GetUriSansOk() (*[]string, bool)` +`func (o *PkiSignWithRoleRequest) GetUriSansOk() (*[]string, bool)` GetUriSansOk returns a tuple with the UriSans field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUriSans -`func (o *PKIIssuerIssueRoleRequest) SetUriSans(v []string)` +`func (o *PkiSignWithRoleRequest) SetUriSans(v []string)` SetUriSans sets UriSans field to given value. ### HasUriSans -`func (o *PKIIssuerIssueRoleRequest) HasUriSans() bool` +`func (o *PkiSignWithRoleRequest) HasUriSans() bool` HasUriSans returns a boolean if a field has been set. +### GetUserIds + +`func (o *PkiSignWithRoleRequest) GetUserIds() []string` + +GetUserIds returns the UserIds field if non-nil, zero value otherwise. + +### GetUserIdsOk + +`func (o *PkiSignWithRoleRequest) GetUserIdsOk() (*[]string, bool)` + +GetUserIdsOk returns a tuple with the UserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUserIds + +`func (o *PkiSignWithRoleRequest) SetUserIds(v []string)` + +SetUserIds sets UserIds field to given value. + + +### HasUserIds + +`func (o *PkiSignWithRoleRequest) HasUserIds() bool` + +HasUserIds returns a boolean if a field has been set. + + + + diff --git a/docs/PkiSignWithRoleResponse.md b/docs/PkiSignWithRoleResponse.md new file mode 100644 index 00000000..69e1641f --- /dev/null +++ b/docs/PkiSignWithRoleResponse.md @@ -0,0 +1,249 @@ +# PkiSignWithRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | Certificate Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**Expiration** | Pointer to **string** | Time of expiration | [optional] +**IssuingCa** | Pointer to **string** | Issuing Certificate Authority | [optional] +**PrivateKey** | Pointer to **string** | Private key | [optional] +**PrivateKeyType** | Pointer to **string** | Private key type | [optional] +**SerialNumber** | Pointer to **string** | Serial Number | [optional] + + + +## Methods + + +### NewPkiSignWithRoleResponse + +`func NewPkiSignWithRoleResponse() *PkiSignWithRoleResponse` + +NewPkiSignWithRoleResponse instantiates a new PkiSignWithRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiSignWithRoleResponseWithDefaults + +`func NewPkiSignWithRoleResponseWithDefaults() *PkiSignWithRoleResponse` + +NewPkiSignWithRoleResponseWithDefaults instantiates a new PkiSignWithRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiSignWithRoleResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiSignWithRoleResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiSignWithRoleResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiSignWithRoleResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiSignWithRoleResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiSignWithRoleResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiSignWithRoleResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiSignWithRoleResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetExpiration + +`func (o *PkiSignWithRoleResponse) GetExpiration() string` + +GetExpiration returns the Expiration field if non-nil, zero value otherwise. + +### GetExpirationOk + +`func (o *PkiSignWithRoleResponse) GetExpirationOk() (*string, bool)` + +GetExpirationOk returns a tuple with the Expiration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExpiration + +`func (o *PkiSignWithRoleResponse) SetExpiration(v string)` + +SetExpiration sets Expiration field to given value. + + +### HasExpiration + +`func (o *PkiSignWithRoleResponse) HasExpiration() bool` + +HasExpiration returns a boolean if a field has been set. + + + + +### GetIssuingCa + +`func (o *PkiSignWithRoleResponse) GetIssuingCa() string` + +GetIssuingCa returns the IssuingCa field if non-nil, zero value otherwise. + +### GetIssuingCaOk + +`func (o *PkiSignWithRoleResponse) GetIssuingCaOk() (*string, bool)` + +GetIssuingCaOk returns a tuple with the IssuingCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCa + +`func (o *PkiSignWithRoleResponse) SetIssuingCa(v string)` + +SetIssuingCa sets IssuingCa field to given value. + + +### HasIssuingCa + +`func (o *PkiSignWithRoleResponse) HasIssuingCa() bool` + +HasIssuingCa returns a boolean if a field has been set. + + + + +### GetPrivateKey + +`func (o *PkiSignWithRoleResponse) GetPrivateKey() string` + +GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. + +### GetPrivateKeyOk + +`func (o *PkiSignWithRoleResponse) GetPrivateKeyOk() (*string, bool)` + +GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKey + +`func (o *PkiSignWithRoleResponse) SetPrivateKey(v string)` + +SetPrivateKey sets PrivateKey field to given value. + + +### HasPrivateKey + +`func (o *PkiSignWithRoleResponse) HasPrivateKey() bool` + +HasPrivateKey returns a boolean if a field has been set. + + + + +### GetPrivateKeyType + +`func (o *PkiSignWithRoleResponse) GetPrivateKeyType() string` + +GetPrivateKeyType returns the PrivateKeyType field if non-nil, zero value otherwise. + +### GetPrivateKeyTypeOk + +`func (o *PkiSignWithRoleResponse) GetPrivateKeyTypeOk() (*string, bool)` + +GetPrivateKeyTypeOk returns a tuple with the PrivateKeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPrivateKeyType + +`func (o *PkiSignWithRoleResponse) SetPrivateKeyType(v string)` + +SetPrivateKeyType sets PrivateKeyType field to given value. + + +### HasPrivateKeyType + +`func (o *PkiSignWithRoleResponse) HasPrivateKeyType() bool` + +HasPrivateKeyType returns a boolean if a field has been set. + + + + +### GetSerialNumber + +`func (o *PkiSignWithRoleResponse) GetSerialNumber() string` + +GetSerialNumber returns the SerialNumber field if non-nil, zero value otherwise. + +### GetSerialNumberOk + +`func (o *PkiSignWithRoleResponse) GetSerialNumberOk() (*string, bool)` + +GetSerialNumberOk returns a tuple with the SerialNumber field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSerialNumber + +`func (o *PkiSignWithRoleResponse) SetSerialNumber(v string)` + +SetSerialNumber sets SerialNumber field to given value. + + +### HasSerialNumber + +`func (o *PkiSignWithRoleResponse) HasSerialNumber() bool` + +HasSerialNumber returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiTidyCancelResponse.md b/docs/PkiTidyCancelResponse.md new file mode 100644 index 00000000..500ef0f5 --- /dev/null +++ b/docs/PkiTidyCancelResponse.md @@ -0,0 +1,729 @@ +# PkiTidyCancelResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CertStoreDeletedCount** | Pointer to **int32** | The number of certificate storage entries deleted | [optional] +**CrossRevokedCertDeletedCount** | Pointer to **int32** | | [optional] +**CurrentCertStoreCount** | Pointer to **int32** | The number of revoked certificate entries deleted | [optional] +**CurrentRevokedCertCount** | Pointer to **int32** | The number of revoked certificate entries deleted | [optional] +**Error** | Pointer to **string** | The error message | [optional] +**InternalBackendUuid** | Pointer to **string** | | [optional] +**IssuerSafetyBuffer** | Pointer to **int32** | Issuer safety buffer | [optional] +**Message** | Pointer to **string** | Message of the operation | [optional] +**MissingIssuerCertCount** | Pointer to **int32** | | [optional] +**PauseDuration** | Pointer to **string** | Duration to pause between tidying certificates | [optional] +**RevocationQueueDeletedCount** | Pointer to **int32** | | [optional] +**RevokedCertDeletedCount** | Pointer to **int32** | The number of revoked certificate entries deleted | [optional] +**SafetyBuffer** | Pointer to **int32** | Safety buffer time duration | [optional] +**State** | Pointer to **string** | One of Inactive, Running, Finished, or Error | [optional] +**TidyCertStore** | Pointer to **bool** | Tidy certificate store | [optional] +**TidyCrossClusterRevokedCerts** | Pointer to **bool** | | [optional] +**TidyExpiredIssuers** | Pointer to **bool** | Tidy expired issuers | [optional] +**TidyMoveLegacyCaBundle** | Pointer to **bool** | | [optional] +**TidyRevocationQueue** | Pointer to **bool** | | [optional] +**TidyRevokedCertIssuerAssociations** | Pointer to **bool** | Tidy revoked certificate issuer associations | [optional] +**TidyRevokedCerts** | Pointer to **bool** | Tidy revoked certificates | [optional] +**TimeFinished** | Pointer to **string** | Time the operation finished | [optional] +**TimeStarted** | Pointer to **string** | Time the operation started | [optional] + + + +## Methods + + +### NewPkiTidyCancelResponse + +`func NewPkiTidyCancelResponse() *PkiTidyCancelResponse` + +NewPkiTidyCancelResponse instantiates a new PkiTidyCancelResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiTidyCancelResponseWithDefaults + +`func NewPkiTidyCancelResponseWithDefaults() *PkiTidyCancelResponse` + +NewPkiTidyCancelResponseWithDefaults instantiates a new PkiTidyCancelResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCertStoreDeletedCount + +`func (o *PkiTidyCancelResponse) GetCertStoreDeletedCount() int32` + +GetCertStoreDeletedCount returns the CertStoreDeletedCount field if non-nil, zero value otherwise. + +### GetCertStoreDeletedCountOk + +`func (o *PkiTidyCancelResponse) GetCertStoreDeletedCountOk() (*int32, bool)` + +GetCertStoreDeletedCountOk returns a tuple with the CertStoreDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertStoreDeletedCount + +`func (o *PkiTidyCancelResponse) SetCertStoreDeletedCount(v int32)` + +SetCertStoreDeletedCount sets CertStoreDeletedCount field to given value. + + +### HasCertStoreDeletedCount + +`func (o *PkiTidyCancelResponse) HasCertStoreDeletedCount() bool` + +HasCertStoreDeletedCount returns a boolean if a field has been set. + + + + +### GetCrossRevokedCertDeletedCount + +`func (o *PkiTidyCancelResponse) GetCrossRevokedCertDeletedCount() int32` + +GetCrossRevokedCertDeletedCount returns the CrossRevokedCertDeletedCount field if non-nil, zero value otherwise. + +### GetCrossRevokedCertDeletedCountOk + +`func (o *PkiTidyCancelResponse) GetCrossRevokedCertDeletedCountOk() (*int32, bool)` + +GetCrossRevokedCertDeletedCountOk returns a tuple with the CrossRevokedCertDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrossRevokedCertDeletedCount + +`func (o *PkiTidyCancelResponse) SetCrossRevokedCertDeletedCount(v int32)` + +SetCrossRevokedCertDeletedCount sets CrossRevokedCertDeletedCount field to given value. + + +### HasCrossRevokedCertDeletedCount + +`func (o *PkiTidyCancelResponse) HasCrossRevokedCertDeletedCount() bool` + +HasCrossRevokedCertDeletedCount returns a boolean if a field has been set. + + + + +### GetCurrentCertStoreCount + +`func (o *PkiTidyCancelResponse) GetCurrentCertStoreCount() int32` + +GetCurrentCertStoreCount returns the CurrentCertStoreCount field if non-nil, zero value otherwise. + +### GetCurrentCertStoreCountOk + +`func (o *PkiTidyCancelResponse) GetCurrentCertStoreCountOk() (*int32, bool)` + +GetCurrentCertStoreCountOk returns a tuple with the CurrentCertStoreCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCurrentCertStoreCount + +`func (o *PkiTidyCancelResponse) SetCurrentCertStoreCount(v int32)` + +SetCurrentCertStoreCount sets CurrentCertStoreCount field to given value. + + +### HasCurrentCertStoreCount + +`func (o *PkiTidyCancelResponse) HasCurrentCertStoreCount() bool` + +HasCurrentCertStoreCount returns a boolean if a field has been set. + + + + +### GetCurrentRevokedCertCount + +`func (o *PkiTidyCancelResponse) GetCurrentRevokedCertCount() int32` + +GetCurrentRevokedCertCount returns the CurrentRevokedCertCount field if non-nil, zero value otherwise. + +### GetCurrentRevokedCertCountOk + +`func (o *PkiTidyCancelResponse) GetCurrentRevokedCertCountOk() (*int32, bool)` + +GetCurrentRevokedCertCountOk returns a tuple with the CurrentRevokedCertCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCurrentRevokedCertCount + +`func (o *PkiTidyCancelResponse) SetCurrentRevokedCertCount(v int32)` + +SetCurrentRevokedCertCount sets CurrentRevokedCertCount field to given value. + + +### HasCurrentRevokedCertCount + +`func (o *PkiTidyCancelResponse) HasCurrentRevokedCertCount() bool` + +HasCurrentRevokedCertCount returns a boolean if a field has been set. + + + + +### GetError + +`func (o *PkiTidyCancelResponse) GetError() string` + +GetError returns the Error field if non-nil, zero value otherwise. + +### GetErrorOk + +`func (o *PkiTidyCancelResponse) GetErrorOk() (*string, bool)` + +GetErrorOk returns a tuple with the Error field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetError + +`func (o *PkiTidyCancelResponse) SetError(v string)` + +SetError sets Error field to given value. + + +### HasError + +`func (o *PkiTidyCancelResponse) HasError() bool` + +HasError returns a boolean if a field has been set. + + + + +### GetInternalBackendUuid + +`func (o *PkiTidyCancelResponse) GetInternalBackendUuid() string` + +GetInternalBackendUuid returns the InternalBackendUuid field if non-nil, zero value otherwise. + +### GetInternalBackendUuidOk + +`func (o *PkiTidyCancelResponse) GetInternalBackendUuidOk() (*string, bool)` + +GetInternalBackendUuidOk returns a tuple with the InternalBackendUuid field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetInternalBackendUuid + +`func (o *PkiTidyCancelResponse) SetInternalBackendUuid(v string)` + +SetInternalBackendUuid sets InternalBackendUuid field to given value. + + +### HasInternalBackendUuid + +`func (o *PkiTidyCancelResponse) HasInternalBackendUuid() bool` + +HasInternalBackendUuid returns a boolean if a field has been set. + + + + +### GetIssuerSafetyBuffer + +`func (o *PkiTidyCancelResponse) GetIssuerSafetyBuffer() int32` + +GetIssuerSafetyBuffer returns the IssuerSafetyBuffer field if non-nil, zero value otherwise. + +### GetIssuerSafetyBufferOk + +`func (o *PkiTidyCancelResponse) GetIssuerSafetyBufferOk() (*int32, bool)` + +GetIssuerSafetyBufferOk returns a tuple with the IssuerSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerSafetyBuffer + +`func (o *PkiTidyCancelResponse) SetIssuerSafetyBuffer(v int32)` + +SetIssuerSafetyBuffer sets IssuerSafetyBuffer field to given value. + + +### HasIssuerSafetyBuffer + +`func (o *PkiTidyCancelResponse) HasIssuerSafetyBuffer() bool` + +HasIssuerSafetyBuffer returns a boolean if a field has been set. + + + + +### GetMessage + +`func (o *PkiTidyCancelResponse) GetMessage() string` + +GetMessage returns the Message field if non-nil, zero value otherwise. + +### GetMessageOk + +`func (o *PkiTidyCancelResponse) GetMessageOk() (*string, bool)` + +GetMessageOk returns a tuple with the Message field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMessage + +`func (o *PkiTidyCancelResponse) SetMessage(v string)` + +SetMessage sets Message field to given value. + + +### HasMessage + +`func (o *PkiTidyCancelResponse) HasMessage() bool` + +HasMessage returns a boolean if a field has been set. + + + + +### GetMissingIssuerCertCount + +`func (o *PkiTidyCancelResponse) GetMissingIssuerCertCount() int32` + +GetMissingIssuerCertCount returns the MissingIssuerCertCount field if non-nil, zero value otherwise. + +### GetMissingIssuerCertCountOk + +`func (o *PkiTidyCancelResponse) GetMissingIssuerCertCountOk() (*int32, bool)` + +GetMissingIssuerCertCountOk returns a tuple with the MissingIssuerCertCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMissingIssuerCertCount + +`func (o *PkiTidyCancelResponse) SetMissingIssuerCertCount(v int32)` + +SetMissingIssuerCertCount sets MissingIssuerCertCount field to given value. + + +### HasMissingIssuerCertCount + +`func (o *PkiTidyCancelResponse) HasMissingIssuerCertCount() bool` + +HasMissingIssuerCertCount returns a boolean if a field has been set. + + + + +### GetPauseDuration + +`func (o *PkiTidyCancelResponse) GetPauseDuration() string` + +GetPauseDuration returns the PauseDuration field if non-nil, zero value otherwise. + +### GetPauseDurationOk + +`func (o *PkiTidyCancelResponse) GetPauseDurationOk() (*string, bool)` + +GetPauseDurationOk returns a tuple with the PauseDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPauseDuration + +`func (o *PkiTidyCancelResponse) SetPauseDuration(v string)` + +SetPauseDuration sets PauseDuration field to given value. + + +### HasPauseDuration + +`func (o *PkiTidyCancelResponse) HasPauseDuration() bool` + +HasPauseDuration returns a boolean if a field has been set. + + + + +### GetRevocationQueueDeletedCount + +`func (o *PkiTidyCancelResponse) GetRevocationQueueDeletedCount() int32` + +GetRevocationQueueDeletedCount returns the RevocationQueueDeletedCount field if non-nil, zero value otherwise. + +### GetRevocationQueueDeletedCountOk + +`func (o *PkiTidyCancelResponse) GetRevocationQueueDeletedCountOk() (*int32, bool)` + +GetRevocationQueueDeletedCountOk returns a tuple with the RevocationQueueDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationQueueDeletedCount + +`func (o *PkiTidyCancelResponse) SetRevocationQueueDeletedCount(v int32)` + +SetRevocationQueueDeletedCount sets RevocationQueueDeletedCount field to given value. + + +### HasRevocationQueueDeletedCount + +`func (o *PkiTidyCancelResponse) HasRevocationQueueDeletedCount() bool` + +HasRevocationQueueDeletedCount returns a boolean if a field has been set. + + + + +### GetRevokedCertDeletedCount + +`func (o *PkiTidyCancelResponse) GetRevokedCertDeletedCount() int32` + +GetRevokedCertDeletedCount returns the RevokedCertDeletedCount field if non-nil, zero value otherwise. + +### GetRevokedCertDeletedCountOk + +`func (o *PkiTidyCancelResponse) GetRevokedCertDeletedCountOk() (*int32, bool)` + +GetRevokedCertDeletedCountOk returns a tuple with the RevokedCertDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevokedCertDeletedCount + +`func (o *PkiTidyCancelResponse) SetRevokedCertDeletedCount(v int32)` + +SetRevokedCertDeletedCount sets RevokedCertDeletedCount field to given value. + + +### HasRevokedCertDeletedCount + +`func (o *PkiTidyCancelResponse) HasRevokedCertDeletedCount() bool` + +HasRevokedCertDeletedCount returns a boolean if a field has been set. + + + + +### GetSafetyBuffer + +`func (o *PkiTidyCancelResponse) GetSafetyBuffer() int32` + +GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. + +### GetSafetyBufferOk + +`func (o *PkiTidyCancelResponse) GetSafetyBufferOk() (*int32, bool)` + +GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSafetyBuffer + +`func (o *PkiTidyCancelResponse) SetSafetyBuffer(v int32)` + +SetSafetyBuffer sets SafetyBuffer field to given value. + + +### HasSafetyBuffer + +`func (o *PkiTidyCancelResponse) HasSafetyBuffer() bool` + +HasSafetyBuffer returns a boolean if a field has been set. + + + + +### GetState + +`func (o *PkiTidyCancelResponse) GetState() string` + +GetState returns the State field if non-nil, zero value otherwise. + +### GetStateOk + +`func (o *PkiTidyCancelResponse) GetStateOk() (*string, bool)` + +GetStateOk returns a tuple with the State field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetState + +`func (o *PkiTidyCancelResponse) SetState(v string)` + +SetState sets State field to given value. + + +### HasState + +`func (o *PkiTidyCancelResponse) HasState() bool` + +HasState returns a boolean if a field has been set. + + + + +### GetTidyCertStore + +`func (o *PkiTidyCancelResponse) GetTidyCertStore() bool` + +GetTidyCertStore returns the TidyCertStore field if non-nil, zero value otherwise. + +### GetTidyCertStoreOk + +`func (o *PkiTidyCancelResponse) GetTidyCertStoreOk() (*bool, bool)` + +GetTidyCertStoreOk returns a tuple with the TidyCertStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCertStore + +`func (o *PkiTidyCancelResponse) SetTidyCertStore(v bool)` + +SetTidyCertStore sets TidyCertStore field to given value. + + +### HasTidyCertStore + +`func (o *PkiTidyCancelResponse) HasTidyCertStore() bool` + +HasTidyCertStore returns a boolean if a field has been set. + + + + +### GetTidyCrossClusterRevokedCerts + +`func (o *PkiTidyCancelResponse) GetTidyCrossClusterRevokedCerts() bool` + +GetTidyCrossClusterRevokedCerts returns the TidyCrossClusterRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyCrossClusterRevokedCertsOk + +`func (o *PkiTidyCancelResponse) GetTidyCrossClusterRevokedCertsOk() (*bool, bool)` + +GetTidyCrossClusterRevokedCertsOk returns a tuple with the TidyCrossClusterRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCrossClusterRevokedCerts + +`func (o *PkiTidyCancelResponse) SetTidyCrossClusterRevokedCerts(v bool)` + +SetTidyCrossClusterRevokedCerts sets TidyCrossClusterRevokedCerts field to given value. + + +### HasTidyCrossClusterRevokedCerts + +`func (o *PkiTidyCancelResponse) HasTidyCrossClusterRevokedCerts() bool` + +HasTidyCrossClusterRevokedCerts returns a boolean if a field has been set. + + + + +### GetTidyExpiredIssuers + +`func (o *PkiTidyCancelResponse) GetTidyExpiredIssuers() bool` + +GetTidyExpiredIssuers returns the TidyExpiredIssuers field if non-nil, zero value otherwise. + +### GetTidyExpiredIssuersOk + +`func (o *PkiTidyCancelResponse) GetTidyExpiredIssuersOk() (*bool, bool)` + +GetTidyExpiredIssuersOk returns a tuple with the TidyExpiredIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyExpiredIssuers + +`func (o *PkiTidyCancelResponse) SetTidyExpiredIssuers(v bool)` + +SetTidyExpiredIssuers sets TidyExpiredIssuers field to given value. + + +### HasTidyExpiredIssuers + +`func (o *PkiTidyCancelResponse) HasTidyExpiredIssuers() bool` + +HasTidyExpiredIssuers returns a boolean if a field has been set. + + + + +### GetTidyMoveLegacyCaBundle + +`func (o *PkiTidyCancelResponse) GetTidyMoveLegacyCaBundle() bool` + +GetTidyMoveLegacyCaBundle returns the TidyMoveLegacyCaBundle field if non-nil, zero value otherwise. + +### GetTidyMoveLegacyCaBundleOk + +`func (o *PkiTidyCancelResponse) GetTidyMoveLegacyCaBundleOk() (*bool, bool)` + +GetTidyMoveLegacyCaBundleOk returns a tuple with the TidyMoveLegacyCaBundle field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyMoveLegacyCaBundle + +`func (o *PkiTidyCancelResponse) SetTidyMoveLegacyCaBundle(v bool)` + +SetTidyMoveLegacyCaBundle sets TidyMoveLegacyCaBundle field to given value. + + +### HasTidyMoveLegacyCaBundle + +`func (o *PkiTidyCancelResponse) HasTidyMoveLegacyCaBundle() bool` + +HasTidyMoveLegacyCaBundle returns a boolean if a field has been set. + + + + +### GetTidyRevocationQueue + +`func (o *PkiTidyCancelResponse) GetTidyRevocationQueue() bool` + +GetTidyRevocationQueue returns the TidyRevocationQueue field if non-nil, zero value otherwise. + +### GetTidyRevocationQueueOk + +`func (o *PkiTidyCancelResponse) GetTidyRevocationQueueOk() (*bool, bool)` + +GetTidyRevocationQueueOk returns a tuple with the TidyRevocationQueue field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevocationQueue + +`func (o *PkiTidyCancelResponse) SetTidyRevocationQueue(v bool)` + +SetTidyRevocationQueue sets TidyRevocationQueue field to given value. + + +### HasTidyRevocationQueue + +`func (o *PkiTidyCancelResponse) HasTidyRevocationQueue() bool` + +HasTidyRevocationQueue returns a boolean if a field has been set. + + + + +### GetTidyRevokedCertIssuerAssociations + +`func (o *PkiTidyCancelResponse) GetTidyRevokedCertIssuerAssociations() bool` + +GetTidyRevokedCertIssuerAssociations returns the TidyRevokedCertIssuerAssociations field if non-nil, zero value otherwise. + +### GetTidyRevokedCertIssuerAssociationsOk + +`func (o *PkiTidyCancelResponse) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` + +GetTidyRevokedCertIssuerAssociationsOk returns a tuple with the TidyRevokedCertIssuerAssociations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCertIssuerAssociations + +`func (o *PkiTidyCancelResponse) SetTidyRevokedCertIssuerAssociations(v bool)` + +SetTidyRevokedCertIssuerAssociations sets TidyRevokedCertIssuerAssociations field to given value. + + +### HasTidyRevokedCertIssuerAssociations + +`func (o *PkiTidyCancelResponse) HasTidyRevokedCertIssuerAssociations() bool` + +HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. + + + + +### GetTidyRevokedCerts + +`func (o *PkiTidyCancelResponse) GetTidyRevokedCerts() bool` + +GetTidyRevokedCerts returns the TidyRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyRevokedCertsOk + +`func (o *PkiTidyCancelResponse) GetTidyRevokedCertsOk() (*bool, bool)` + +GetTidyRevokedCertsOk returns a tuple with the TidyRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCerts + +`func (o *PkiTidyCancelResponse) SetTidyRevokedCerts(v bool)` + +SetTidyRevokedCerts sets TidyRevokedCerts field to given value. + + +### HasTidyRevokedCerts + +`func (o *PkiTidyCancelResponse) HasTidyRevokedCerts() bool` + +HasTidyRevokedCerts returns a boolean if a field has been set. + + + + +### GetTimeFinished + +`func (o *PkiTidyCancelResponse) GetTimeFinished() string` + +GetTimeFinished returns the TimeFinished field if non-nil, zero value otherwise. + +### GetTimeFinishedOk + +`func (o *PkiTidyCancelResponse) GetTimeFinishedOk() (*string, bool)` + +GetTimeFinishedOk returns a tuple with the TimeFinished field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTimeFinished + +`func (o *PkiTidyCancelResponse) SetTimeFinished(v string)` + +SetTimeFinished sets TimeFinished field to given value. + + +### HasTimeFinished + +`func (o *PkiTidyCancelResponse) HasTimeFinished() bool` + +HasTimeFinished returns a boolean if a field has been set. + + + + +### GetTimeStarted + +`func (o *PkiTidyCancelResponse) GetTimeStarted() string` + +GetTimeStarted returns the TimeStarted field if non-nil, zero value otherwise. + +### GetTimeStartedOk + +`func (o *PkiTidyCancelResponse) GetTimeStartedOk() (*string, bool)` + +GetTimeStartedOk returns a tuple with the TimeStarted field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTimeStarted + +`func (o *PkiTidyCancelResponse) SetTimeStarted(v string)` + +SetTimeStarted sets TimeStarted field to given value. + + +### HasTimeStarted + +`func (o *PkiTidyCancelResponse) HasTimeStarted() bool` + +HasTimeStarted returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiTidyRequest.md b/docs/PkiTidyRequest.md index b3e2d533..9bddb096 100644 --- a/docs/PkiTidyRequest.md +++ b/docs/PkiTidyRequest.md @@ -1,4 +1,4 @@ -# PKITidyRequest +# PkiTidyRequest ## Properties @@ -6,11 +6,17 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **IssuerSafetyBuffer** | Pointer to **int32** | The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year). | [optional] [default to 31536000] +**MaintainStoredCertificateCounts** | Pointer to **bool** | This configures whether stored certificates are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained. | [optional] [default to false] **PauseDuration** | Pointer to **string** | The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds. | [optional] [default to "0s"] +**PublishStoredCertificateCountMetrics** | Pointer to **bool** | This configures whether the stored certificate count is published to the metrics consumer. It does not affect if the stored certificate count is maintained, and if maintained, it will be available on the tidy-status endpoint. | [optional] [default to false] +**RevocationQueueSafetyBuffer** | Pointer to **int32** | The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal. Setting this too low may remove valid revocation requests before the owning cluster has a chance to process them, especially if the cluster is offline. | [optional] [default to 172800] **SafetyBuffer** | Pointer to **int32** | The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours. | [optional] [default to 259200] **TidyCertStore** | Pointer to **bool** | Set to true to enable tidying up the certificate store | [optional] +**TidyCrossClusterRevokedCerts** | Pointer to **bool** | Set to true to enable tidying up the cross-cluster revoked certificate store. Only runs on the active primary node. | [optional] **TidyExpiredIssuers** | Pointer to **bool** | Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation. | [optional] +**TidyMoveLegacyCaBundle** | Pointer to **bool** | Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak. This prevents downgrades to pre-Vault 1.11 versions (as older PKI engines do not know about the new multi-issuer storage layout), but improves the performance on seal wrapped PKI mounts. This will only occur if at least issuer_safety_buffer time has occurred after the initial storage migration. This backup is saved in case of an issue in future migrations. Operators may consider removing it via sys/raw if they desire. The backup will be removed via a DELETE /root call, but note that this removes ALL issuers within the mount (and is thus not desirable in most operational scenarios). | [optional] **TidyRevocationList** | Pointer to **bool** | Deprecated; synonym for 'tidy_revoked_certs | [optional] +**TidyRevocationQueue** | Pointer to **bool** | Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster. Only runs on the active primary node | [optional] [default to false] **TidyRevokedCertIssuerAssociations** | Pointer to **bool** | Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses. | [optional] **TidyRevokedCerts** | Pointer to **bool** | Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed. | [optional] @@ -19,105 +25,192 @@ Name | Type | Description | Notes ## Methods -### NewPKITidyRequest +### NewPkiTidyRequest -`func NewPKITidyRequest() *PKITidyRequest` +`func NewPkiTidyRequest() *PkiTidyRequest` -NewPKITidyRequest instantiates a new PKITidyRequest object +NewPkiTidyRequest instantiates a new PkiTidyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPKITidyRequestWithDefaults +### NewPkiTidyRequestWithDefaults -`func NewPKITidyRequestWithDefaults() *PKITidyRequest` +`func NewPkiTidyRequestWithDefaults() *PkiTidyRequest` -NewPKITidyRequestWithDefaults instantiates a new PKITidyRequest object +NewPkiTidyRequestWithDefaults instantiates a new PkiTidyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIssuerSafetyBuffer -`func (o *PKITidyRequest) GetIssuerSafetyBuffer() int32` +`func (o *PkiTidyRequest) GetIssuerSafetyBuffer() int32` GetIssuerSafetyBuffer returns the IssuerSafetyBuffer field if non-nil, zero value otherwise. ### GetIssuerSafetyBufferOk -`func (o *PKITidyRequest) GetIssuerSafetyBufferOk() (*int32, bool)` +`func (o *PkiTidyRequest) GetIssuerSafetyBufferOk() (*int32, bool)` GetIssuerSafetyBufferOk returns a tuple with the IssuerSafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerSafetyBuffer -`func (o *PKITidyRequest) SetIssuerSafetyBuffer(v int32)` +`func (o *PkiTidyRequest) SetIssuerSafetyBuffer(v int32)` SetIssuerSafetyBuffer sets IssuerSafetyBuffer field to given value. ### HasIssuerSafetyBuffer -`func (o *PKITidyRequest) HasIssuerSafetyBuffer() bool` +`func (o *PkiTidyRequest) HasIssuerSafetyBuffer() bool` HasIssuerSafetyBuffer returns a boolean if a field has been set. +### GetMaintainStoredCertificateCounts + +`func (o *PkiTidyRequest) GetMaintainStoredCertificateCounts() bool` + +GetMaintainStoredCertificateCounts returns the MaintainStoredCertificateCounts field if non-nil, zero value otherwise. + +### GetMaintainStoredCertificateCountsOk + +`func (o *PkiTidyRequest) GetMaintainStoredCertificateCountsOk() (*bool, bool)` + +GetMaintainStoredCertificateCountsOk returns a tuple with the MaintainStoredCertificateCounts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaintainStoredCertificateCounts + +`func (o *PkiTidyRequest) SetMaintainStoredCertificateCounts(v bool)` + +SetMaintainStoredCertificateCounts sets MaintainStoredCertificateCounts field to given value. + + +### HasMaintainStoredCertificateCounts + +`func (o *PkiTidyRequest) HasMaintainStoredCertificateCounts() bool` + +HasMaintainStoredCertificateCounts returns a boolean if a field has been set. + + + + ### GetPauseDuration -`func (o *PKITidyRequest) GetPauseDuration() string` +`func (o *PkiTidyRequest) GetPauseDuration() string` GetPauseDuration returns the PauseDuration field if non-nil, zero value otherwise. ### GetPauseDurationOk -`func (o *PKITidyRequest) GetPauseDurationOk() (*string, bool)` +`func (o *PkiTidyRequest) GetPauseDurationOk() (*string, bool)` GetPauseDurationOk returns a tuple with the PauseDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPauseDuration -`func (o *PKITidyRequest) SetPauseDuration(v string)` +`func (o *PkiTidyRequest) SetPauseDuration(v string)` SetPauseDuration sets PauseDuration field to given value. ### HasPauseDuration -`func (o *PKITidyRequest) HasPauseDuration() bool` +`func (o *PkiTidyRequest) HasPauseDuration() bool` HasPauseDuration returns a boolean if a field has been set. +### GetPublishStoredCertificateCountMetrics + +`func (o *PkiTidyRequest) GetPublishStoredCertificateCountMetrics() bool` + +GetPublishStoredCertificateCountMetrics returns the PublishStoredCertificateCountMetrics field if non-nil, zero value otherwise. + +### GetPublishStoredCertificateCountMetricsOk + +`func (o *PkiTidyRequest) GetPublishStoredCertificateCountMetricsOk() (*bool, bool)` + +GetPublishStoredCertificateCountMetricsOk returns a tuple with the PublishStoredCertificateCountMetrics field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPublishStoredCertificateCountMetrics + +`func (o *PkiTidyRequest) SetPublishStoredCertificateCountMetrics(v bool)` + +SetPublishStoredCertificateCountMetrics sets PublishStoredCertificateCountMetrics field to given value. + + +### HasPublishStoredCertificateCountMetrics + +`func (o *PkiTidyRequest) HasPublishStoredCertificateCountMetrics() bool` + +HasPublishStoredCertificateCountMetrics returns a boolean if a field has been set. + + + + +### GetRevocationQueueSafetyBuffer + +`func (o *PkiTidyRequest) GetRevocationQueueSafetyBuffer() int32` + +GetRevocationQueueSafetyBuffer returns the RevocationQueueSafetyBuffer field if non-nil, zero value otherwise. + +### GetRevocationQueueSafetyBufferOk + +`func (o *PkiTidyRequest) GetRevocationQueueSafetyBufferOk() (*int32, bool)` + +GetRevocationQueueSafetyBufferOk returns a tuple with the RevocationQueueSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationQueueSafetyBuffer + +`func (o *PkiTidyRequest) SetRevocationQueueSafetyBuffer(v int32)` + +SetRevocationQueueSafetyBuffer sets RevocationQueueSafetyBuffer field to given value. + + +### HasRevocationQueueSafetyBuffer + +`func (o *PkiTidyRequest) HasRevocationQueueSafetyBuffer() bool` + +HasRevocationQueueSafetyBuffer returns a boolean if a field has been set. + + + + ### GetSafetyBuffer -`func (o *PKITidyRequest) GetSafetyBuffer() int32` +`func (o *PkiTidyRequest) GetSafetyBuffer() int32` GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. ### GetSafetyBufferOk -`func (o *PKITidyRequest) GetSafetyBufferOk() (*int32, bool)` +`func (o *PkiTidyRequest) GetSafetyBufferOk() (*int32, bool)` GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSafetyBuffer -`func (o *PKITidyRequest) SetSafetyBuffer(v int32)` +`func (o *PkiTidyRequest) SetSafetyBuffer(v int32)` SetSafetyBuffer sets SafetyBuffer field to given value. ### HasSafetyBuffer -`func (o *PKITidyRequest) HasSafetyBuffer() bool` +`func (o *PkiTidyRequest) HasSafetyBuffer() bool` HasSafetyBuffer returns a boolean if a field has been set. @@ -126,114 +219,201 @@ HasSafetyBuffer returns a boolean if a field has been set. ### GetTidyCertStore -`func (o *PKITidyRequest) GetTidyCertStore() bool` +`func (o *PkiTidyRequest) GetTidyCertStore() bool` GetTidyCertStore returns the TidyCertStore field if non-nil, zero value otherwise. ### GetTidyCertStoreOk -`func (o *PKITidyRequest) GetTidyCertStoreOk() (*bool, bool)` +`func (o *PkiTidyRequest) GetTidyCertStoreOk() (*bool, bool)` GetTidyCertStoreOk returns a tuple with the TidyCertStore field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTidyCertStore -`func (o *PKITidyRequest) SetTidyCertStore(v bool)` +`func (o *PkiTidyRequest) SetTidyCertStore(v bool)` SetTidyCertStore sets TidyCertStore field to given value. ### HasTidyCertStore -`func (o *PKITidyRequest) HasTidyCertStore() bool` +`func (o *PkiTidyRequest) HasTidyCertStore() bool` HasTidyCertStore returns a boolean if a field has been set. +### GetTidyCrossClusterRevokedCerts + +`func (o *PkiTidyRequest) GetTidyCrossClusterRevokedCerts() bool` + +GetTidyCrossClusterRevokedCerts returns the TidyCrossClusterRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyCrossClusterRevokedCertsOk + +`func (o *PkiTidyRequest) GetTidyCrossClusterRevokedCertsOk() (*bool, bool)` + +GetTidyCrossClusterRevokedCertsOk returns a tuple with the TidyCrossClusterRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCrossClusterRevokedCerts + +`func (o *PkiTidyRequest) SetTidyCrossClusterRevokedCerts(v bool)` + +SetTidyCrossClusterRevokedCerts sets TidyCrossClusterRevokedCerts field to given value. + + +### HasTidyCrossClusterRevokedCerts + +`func (o *PkiTidyRequest) HasTidyCrossClusterRevokedCerts() bool` + +HasTidyCrossClusterRevokedCerts returns a boolean if a field has been set. + + + + ### GetTidyExpiredIssuers -`func (o *PKITidyRequest) GetTidyExpiredIssuers() bool` +`func (o *PkiTidyRequest) GetTidyExpiredIssuers() bool` GetTidyExpiredIssuers returns the TidyExpiredIssuers field if non-nil, zero value otherwise. ### GetTidyExpiredIssuersOk -`func (o *PKITidyRequest) GetTidyExpiredIssuersOk() (*bool, bool)` +`func (o *PkiTidyRequest) GetTidyExpiredIssuersOk() (*bool, bool)` GetTidyExpiredIssuersOk returns a tuple with the TidyExpiredIssuers field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTidyExpiredIssuers -`func (o *PKITidyRequest) SetTidyExpiredIssuers(v bool)` +`func (o *PkiTidyRequest) SetTidyExpiredIssuers(v bool)` SetTidyExpiredIssuers sets TidyExpiredIssuers field to given value. ### HasTidyExpiredIssuers -`func (o *PKITidyRequest) HasTidyExpiredIssuers() bool` +`func (o *PkiTidyRequest) HasTidyExpiredIssuers() bool` HasTidyExpiredIssuers returns a boolean if a field has been set. +### GetTidyMoveLegacyCaBundle + +`func (o *PkiTidyRequest) GetTidyMoveLegacyCaBundle() bool` + +GetTidyMoveLegacyCaBundle returns the TidyMoveLegacyCaBundle field if non-nil, zero value otherwise. + +### GetTidyMoveLegacyCaBundleOk + +`func (o *PkiTidyRequest) GetTidyMoveLegacyCaBundleOk() (*bool, bool)` + +GetTidyMoveLegacyCaBundleOk returns a tuple with the TidyMoveLegacyCaBundle field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyMoveLegacyCaBundle + +`func (o *PkiTidyRequest) SetTidyMoveLegacyCaBundle(v bool)` + +SetTidyMoveLegacyCaBundle sets TidyMoveLegacyCaBundle field to given value. + + +### HasTidyMoveLegacyCaBundle + +`func (o *PkiTidyRequest) HasTidyMoveLegacyCaBundle() bool` + +HasTidyMoveLegacyCaBundle returns a boolean if a field has been set. + + + + ### GetTidyRevocationList -`func (o *PKITidyRequest) GetTidyRevocationList() bool` +`func (o *PkiTidyRequest) GetTidyRevocationList() bool` GetTidyRevocationList returns the TidyRevocationList field if non-nil, zero value otherwise. ### GetTidyRevocationListOk -`func (o *PKITidyRequest) GetTidyRevocationListOk() (*bool, bool)` +`func (o *PkiTidyRequest) GetTidyRevocationListOk() (*bool, bool)` GetTidyRevocationListOk returns a tuple with the TidyRevocationList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTidyRevocationList -`func (o *PKITidyRequest) SetTidyRevocationList(v bool)` +`func (o *PkiTidyRequest) SetTidyRevocationList(v bool)` SetTidyRevocationList sets TidyRevocationList field to given value. ### HasTidyRevocationList -`func (o *PKITidyRequest) HasTidyRevocationList() bool` +`func (o *PkiTidyRequest) HasTidyRevocationList() bool` HasTidyRevocationList returns a boolean if a field has been set. +### GetTidyRevocationQueue + +`func (o *PkiTidyRequest) GetTidyRevocationQueue() bool` + +GetTidyRevocationQueue returns the TidyRevocationQueue field if non-nil, zero value otherwise. + +### GetTidyRevocationQueueOk + +`func (o *PkiTidyRequest) GetTidyRevocationQueueOk() (*bool, bool)` + +GetTidyRevocationQueueOk returns a tuple with the TidyRevocationQueue field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevocationQueue + +`func (o *PkiTidyRequest) SetTidyRevocationQueue(v bool)` + +SetTidyRevocationQueue sets TidyRevocationQueue field to given value. + + +### HasTidyRevocationQueue + +`func (o *PkiTidyRequest) HasTidyRevocationQueue() bool` + +HasTidyRevocationQueue returns a boolean if a field has been set. + + + + ### GetTidyRevokedCertIssuerAssociations -`func (o *PKITidyRequest) GetTidyRevokedCertIssuerAssociations() bool` +`func (o *PkiTidyRequest) GetTidyRevokedCertIssuerAssociations() bool` GetTidyRevokedCertIssuerAssociations returns the TidyRevokedCertIssuerAssociations field if non-nil, zero value otherwise. ### GetTidyRevokedCertIssuerAssociationsOk -`func (o *PKITidyRequest) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` +`func (o *PkiTidyRequest) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` GetTidyRevokedCertIssuerAssociationsOk returns a tuple with the TidyRevokedCertIssuerAssociations field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTidyRevokedCertIssuerAssociations -`func (o *PKITidyRequest) SetTidyRevokedCertIssuerAssociations(v bool)` +`func (o *PkiTidyRequest) SetTidyRevokedCertIssuerAssociations(v bool)` SetTidyRevokedCertIssuerAssociations sets TidyRevokedCertIssuerAssociations field to given value. ### HasTidyRevokedCertIssuerAssociations -`func (o *PKITidyRequest) HasTidyRevokedCertIssuerAssociations() bool` +`func (o *PkiTidyRequest) HasTidyRevokedCertIssuerAssociations() bool` HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. @@ -242,27 +422,27 @@ HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. ### GetTidyRevokedCerts -`func (o *PKITidyRequest) GetTidyRevokedCerts() bool` +`func (o *PkiTidyRequest) GetTidyRevokedCerts() bool` GetTidyRevokedCerts returns the TidyRevokedCerts field if non-nil, zero value otherwise. ### GetTidyRevokedCertsOk -`func (o *PKITidyRequest) GetTidyRevokedCertsOk() (*bool, bool)` +`func (o *PkiTidyRequest) GetTidyRevokedCertsOk() (*bool, bool)` GetTidyRevokedCertsOk returns a tuple with the TidyRevokedCerts field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTidyRevokedCerts -`func (o *PKITidyRequest) SetTidyRevokedCerts(v bool)` +`func (o *PkiTidyRequest) SetTidyRevokedCerts(v bool)` SetTidyRevokedCerts sets TidyRevokedCerts field to given value. ### HasTidyRevokedCerts -`func (o *PKITidyRequest) HasTidyRevokedCerts() bool` +`func (o *PkiTidyRequest) HasTidyRevokedCerts() bool` HasTidyRevokedCerts returns a boolean if a field has been set. diff --git a/docs/PkiTidyStatusResponse.md b/docs/PkiTidyStatusResponse.md new file mode 100644 index 00000000..0794a93a --- /dev/null +++ b/docs/PkiTidyStatusResponse.md @@ -0,0 +1,729 @@ +# PkiTidyStatusResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CertStoreDeletedCount** | Pointer to **int32** | The number of certificate storage entries deleted | [optional] +**CrossRevokedCertDeletedCount** | Pointer to **int32** | | [optional] +**CurrentCertStoreCount** | Pointer to **int32** | The number of revoked certificate entries deleted | [optional] +**CurrentRevokedCertCount** | Pointer to **int32** | The number of revoked certificate entries deleted | [optional] +**Error** | Pointer to **string** | The error message | [optional] +**InternalBackendUuid** | Pointer to **string** | | [optional] +**IssuerSafetyBuffer** | Pointer to **int32** | Issuer safety buffer | [optional] +**Message** | Pointer to **string** | Message of the operation | [optional] +**MissingIssuerCertCount** | Pointer to **int32** | | [optional] +**PauseDuration** | Pointer to **string** | Duration to pause between tidying certificates | [optional] +**RevocationQueueDeletedCount** | Pointer to **int32** | | [optional] +**RevokedCertDeletedCount** | Pointer to **int32** | The number of revoked certificate entries deleted | [optional] +**SafetyBuffer** | Pointer to **int32** | Safety buffer time duration | [optional] +**State** | Pointer to **string** | One of Inactive, Running, Finished, or Error | [optional] +**TidyCertStore** | Pointer to **bool** | Tidy certificate store | [optional] +**TidyCrossClusterRevokedCerts** | Pointer to **string** | | [optional] +**TidyExpiredIssuers** | Pointer to **bool** | Tidy expired issuers | [optional] +**TidyMoveLegacyCaBundle** | Pointer to **bool** | | [optional] +**TidyRevocationQueue** | Pointer to **bool** | | [optional] +**TidyRevokedCertIssuerAssociations** | Pointer to **bool** | Tidy revoked certificate issuer associations | [optional] +**TidyRevokedCerts** | Pointer to **bool** | Tidy revoked certificates | [optional] +**TimeFinished** | Pointer to **string** | Time the operation finished | [optional] +**TimeStarted** | Pointer to **string** | Time the operation started | [optional] + + + +## Methods + + +### NewPkiTidyStatusResponse + +`func NewPkiTidyStatusResponse() *PkiTidyStatusResponse` + +NewPkiTidyStatusResponse instantiates a new PkiTidyStatusResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiTidyStatusResponseWithDefaults + +`func NewPkiTidyStatusResponseWithDefaults() *PkiTidyStatusResponse` + +NewPkiTidyStatusResponseWithDefaults instantiates a new PkiTidyStatusResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCertStoreDeletedCount + +`func (o *PkiTidyStatusResponse) GetCertStoreDeletedCount() int32` + +GetCertStoreDeletedCount returns the CertStoreDeletedCount field if non-nil, zero value otherwise. + +### GetCertStoreDeletedCountOk + +`func (o *PkiTidyStatusResponse) GetCertStoreDeletedCountOk() (*int32, bool)` + +GetCertStoreDeletedCountOk returns a tuple with the CertStoreDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertStoreDeletedCount + +`func (o *PkiTidyStatusResponse) SetCertStoreDeletedCount(v int32)` + +SetCertStoreDeletedCount sets CertStoreDeletedCount field to given value. + + +### HasCertStoreDeletedCount + +`func (o *PkiTidyStatusResponse) HasCertStoreDeletedCount() bool` + +HasCertStoreDeletedCount returns a boolean if a field has been set. + + + + +### GetCrossRevokedCertDeletedCount + +`func (o *PkiTidyStatusResponse) GetCrossRevokedCertDeletedCount() int32` + +GetCrossRevokedCertDeletedCount returns the CrossRevokedCertDeletedCount field if non-nil, zero value otherwise. + +### GetCrossRevokedCertDeletedCountOk + +`func (o *PkiTidyStatusResponse) GetCrossRevokedCertDeletedCountOk() (*int32, bool)` + +GetCrossRevokedCertDeletedCountOk returns a tuple with the CrossRevokedCertDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrossRevokedCertDeletedCount + +`func (o *PkiTidyStatusResponse) SetCrossRevokedCertDeletedCount(v int32)` + +SetCrossRevokedCertDeletedCount sets CrossRevokedCertDeletedCount field to given value. + + +### HasCrossRevokedCertDeletedCount + +`func (o *PkiTidyStatusResponse) HasCrossRevokedCertDeletedCount() bool` + +HasCrossRevokedCertDeletedCount returns a boolean if a field has been set. + + + + +### GetCurrentCertStoreCount + +`func (o *PkiTidyStatusResponse) GetCurrentCertStoreCount() int32` + +GetCurrentCertStoreCount returns the CurrentCertStoreCount field if non-nil, zero value otherwise. + +### GetCurrentCertStoreCountOk + +`func (o *PkiTidyStatusResponse) GetCurrentCertStoreCountOk() (*int32, bool)` + +GetCurrentCertStoreCountOk returns a tuple with the CurrentCertStoreCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCurrentCertStoreCount + +`func (o *PkiTidyStatusResponse) SetCurrentCertStoreCount(v int32)` + +SetCurrentCertStoreCount sets CurrentCertStoreCount field to given value. + + +### HasCurrentCertStoreCount + +`func (o *PkiTidyStatusResponse) HasCurrentCertStoreCount() bool` + +HasCurrentCertStoreCount returns a boolean if a field has been set. + + + + +### GetCurrentRevokedCertCount + +`func (o *PkiTidyStatusResponse) GetCurrentRevokedCertCount() int32` + +GetCurrentRevokedCertCount returns the CurrentRevokedCertCount field if non-nil, zero value otherwise. + +### GetCurrentRevokedCertCountOk + +`func (o *PkiTidyStatusResponse) GetCurrentRevokedCertCountOk() (*int32, bool)` + +GetCurrentRevokedCertCountOk returns a tuple with the CurrentRevokedCertCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCurrentRevokedCertCount + +`func (o *PkiTidyStatusResponse) SetCurrentRevokedCertCount(v int32)` + +SetCurrentRevokedCertCount sets CurrentRevokedCertCount field to given value. + + +### HasCurrentRevokedCertCount + +`func (o *PkiTidyStatusResponse) HasCurrentRevokedCertCount() bool` + +HasCurrentRevokedCertCount returns a boolean if a field has been set. + + + + +### GetError + +`func (o *PkiTidyStatusResponse) GetError() string` + +GetError returns the Error field if non-nil, zero value otherwise. + +### GetErrorOk + +`func (o *PkiTidyStatusResponse) GetErrorOk() (*string, bool)` + +GetErrorOk returns a tuple with the Error field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetError + +`func (o *PkiTidyStatusResponse) SetError(v string)` + +SetError sets Error field to given value. + + +### HasError + +`func (o *PkiTidyStatusResponse) HasError() bool` + +HasError returns a boolean if a field has been set. + + + + +### GetInternalBackendUuid + +`func (o *PkiTidyStatusResponse) GetInternalBackendUuid() string` + +GetInternalBackendUuid returns the InternalBackendUuid field if non-nil, zero value otherwise. + +### GetInternalBackendUuidOk + +`func (o *PkiTidyStatusResponse) GetInternalBackendUuidOk() (*string, bool)` + +GetInternalBackendUuidOk returns a tuple with the InternalBackendUuid field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetInternalBackendUuid + +`func (o *PkiTidyStatusResponse) SetInternalBackendUuid(v string)` + +SetInternalBackendUuid sets InternalBackendUuid field to given value. + + +### HasInternalBackendUuid + +`func (o *PkiTidyStatusResponse) HasInternalBackendUuid() bool` + +HasInternalBackendUuid returns a boolean if a field has been set. + + + + +### GetIssuerSafetyBuffer + +`func (o *PkiTidyStatusResponse) GetIssuerSafetyBuffer() int32` + +GetIssuerSafetyBuffer returns the IssuerSafetyBuffer field if non-nil, zero value otherwise. + +### GetIssuerSafetyBufferOk + +`func (o *PkiTidyStatusResponse) GetIssuerSafetyBufferOk() (*int32, bool)` + +GetIssuerSafetyBufferOk returns a tuple with the IssuerSafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerSafetyBuffer + +`func (o *PkiTidyStatusResponse) SetIssuerSafetyBuffer(v int32)` + +SetIssuerSafetyBuffer sets IssuerSafetyBuffer field to given value. + + +### HasIssuerSafetyBuffer + +`func (o *PkiTidyStatusResponse) HasIssuerSafetyBuffer() bool` + +HasIssuerSafetyBuffer returns a boolean if a field has been set. + + + + +### GetMessage + +`func (o *PkiTidyStatusResponse) GetMessage() string` + +GetMessage returns the Message field if non-nil, zero value otherwise. + +### GetMessageOk + +`func (o *PkiTidyStatusResponse) GetMessageOk() (*string, bool)` + +GetMessageOk returns a tuple with the Message field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMessage + +`func (o *PkiTidyStatusResponse) SetMessage(v string)` + +SetMessage sets Message field to given value. + + +### HasMessage + +`func (o *PkiTidyStatusResponse) HasMessage() bool` + +HasMessage returns a boolean if a field has been set. + + + + +### GetMissingIssuerCertCount + +`func (o *PkiTidyStatusResponse) GetMissingIssuerCertCount() int32` + +GetMissingIssuerCertCount returns the MissingIssuerCertCount field if non-nil, zero value otherwise. + +### GetMissingIssuerCertCountOk + +`func (o *PkiTidyStatusResponse) GetMissingIssuerCertCountOk() (*int32, bool)` + +GetMissingIssuerCertCountOk returns a tuple with the MissingIssuerCertCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMissingIssuerCertCount + +`func (o *PkiTidyStatusResponse) SetMissingIssuerCertCount(v int32)` + +SetMissingIssuerCertCount sets MissingIssuerCertCount field to given value. + + +### HasMissingIssuerCertCount + +`func (o *PkiTidyStatusResponse) HasMissingIssuerCertCount() bool` + +HasMissingIssuerCertCount returns a boolean if a field has been set. + + + + +### GetPauseDuration + +`func (o *PkiTidyStatusResponse) GetPauseDuration() string` + +GetPauseDuration returns the PauseDuration field if non-nil, zero value otherwise. + +### GetPauseDurationOk + +`func (o *PkiTidyStatusResponse) GetPauseDurationOk() (*string, bool)` + +GetPauseDurationOk returns a tuple with the PauseDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPauseDuration + +`func (o *PkiTidyStatusResponse) SetPauseDuration(v string)` + +SetPauseDuration sets PauseDuration field to given value. + + +### HasPauseDuration + +`func (o *PkiTidyStatusResponse) HasPauseDuration() bool` + +HasPauseDuration returns a boolean if a field has been set. + + + + +### GetRevocationQueueDeletedCount + +`func (o *PkiTidyStatusResponse) GetRevocationQueueDeletedCount() int32` + +GetRevocationQueueDeletedCount returns the RevocationQueueDeletedCount field if non-nil, zero value otherwise. + +### GetRevocationQueueDeletedCountOk + +`func (o *PkiTidyStatusResponse) GetRevocationQueueDeletedCountOk() (*int32, bool)` + +GetRevocationQueueDeletedCountOk returns a tuple with the RevocationQueueDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationQueueDeletedCount + +`func (o *PkiTidyStatusResponse) SetRevocationQueueDeletedCount(v int32)` + +SetRevocationQueueDeletedCount sets RevocationQueueDeletedCount field to given value. + + +### HasRevocationQueueDeletedCount + +`func (o *PkiTidyStatusResponse) HasRevocationQueueDeletedCount() bool` + +HasRevocationQueueDeletedCount returns a boolean if a field has been set. + + + + +### GetRevokedCertDeletedCount + +`func (o *PkiTidyStatusResponse) GetRevokedCertDeletedCount() int32` + +GetRevokedCertDeletedCount returns the RevokedCertDeletedCount field if non-nil, zero value otherwise. + +### GetRevokedCertDeletedCountOk + +`func (o *PkiTidyStatusResponse) GetRevokedCertDeletedCountOk() (*int32, bool)` + +GetRevokedCertDeletedCountOk returns a tuple with the RevokedCertDeletedCount field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevokedCertDeletedCount + +`func (o *PkiTidyStatusResponse) SetRevokedCertDeletedCount(v int32)` + +SetRevokedCertDeletedCount sets RevokedCertDeletedCount field to given value. + + +### HasRevokedCertDeletedCount + +`func (o *PkiTidyStatusResponse) HasRevokedCertDeletedCount() bool` + +HasRevokedCertDeletedCount returns a boolean if a field has been set. + + + + +### GetSafetyBuffer + +`func (o *PkiTidyStatusResponse) GetSafetyBuffer() int32` + +GetSafetyBuffer returns the SafetyBuffer field if non-nil, zero value otherwise. + +### GetSafetyBufferOk + +`func (o *PkiTidyStatusResponse) GetSafetyBufferOk() (*int32, bool)` + +GetSafetyBufferOk returns a tuple with the SafetyBuffer field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSafetyBuffer + +`func (o *PkiTidyStatusResponse) SetSafetyBuffer(v int32)` + +SetSafetyBuffer sets SafetyBuffer field to given value. + + +### HasSafetyBuffer + +`func (o *PkiTidyStatusResponse) HasSafetyBuffer() bool` + +HasSafetyBuffer returns a boolean if a field has been set. + + + + +### GetState + +`func (o *PkiTidyStatusResponse) GetState() string` + +GetState returns the State field if non-nil, zero value otherwise. + +### GetStateOk + +`func (o *PkiTidyStatusResponse) GetStateOk() (*string, bool)` + +GetStateOk returns a tuple with the State field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetState + +`func (o *PkiTidyStatusResponse) SetState(v string)` + +SetState sets State field to given value. + + +### HasState + +`func (o *PkiTidyStatusResponse) HasState() bool` + +HasState returns a boolean if a field has been set. + + + + +### GetTidyCertStore + +`func (o *PkiTidyStatusResponse) GetTidyCertStore() bool` + +GetTidyCertStore returns the TidyCertStore field if non-nil, zero value otherwise. + +### GetTidyCertStoreOk + +`func (o *PkiTidyStatusResponse) GetTidyCertStoreOk() (*bool, bool)` + +GetTidyCertStoreOk returns a tuple with the TidyCertStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCertStore + +`func (o *PkiTidyStatusResponse) SetTidyCertStore(v bool)` + +SetTidyCertStore sets TidyCertStore field to given value. + + +### HasTidyCertStore + +`func (o *PkiTidyStatusResponse) HasTidyCertStore() bool` + +HasTidyCertStore returns a boolean if a field has been set. + + + + +### GetTidyCrossClusterRevokedCerts + +`func (o *PkiTidyStatusResponse) GetTidyCrossClusterRevokedCerts() string` + +GetTidyCrossClusterRevokedCerts returns the TidyCrossClusterRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyCrossClusterRevokedCertsOk + +`func (o *PkiTidyStatusResponse) GetTidyCrossClusterRevokedCertsOk() (*string, bool)` + +GetTidyCrossClusterRevokedCertsOk returns a tuple with the TidyCrossClusterRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyCrossClusterRevokedCerts + +`func (o *PkiTidyStatusResponse) SetTidyCrossClusterRevokedCerts(v string)` + +SetTidyCrossClusterRevokedCerts sets TidyCrossClusterRevokedCerts field to given value. + + +### HasTidyCrossClusterRevokedCerts + +`func (o *PkiTidyStatusResponse) HasTidyCrossClusterRevokedCerts() bool` + +HasTidyCrossClusterRevokedCerts returns a boolean if a field has been set. + + + + +### GetTidyExpiredIssuers + +`func (o *PkiTidyStatusResponse) GetTidyExpiredIssuers() bool` + +GetTidyExpiredIssuers returns the TidyExpiredIssuers field if non-nil, zero value otherwise. + +### GetTidyExpiredIssuersOk + +`func (o *PkiTidyStatusResponse) GetTidyExpiredIssuersOk() (*bool, bool)` + +GetTidyExpiredIssuersOk returns a tuple with the TidyExpiredIssuers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyExpiredIssuers + +`func (o *PkiTidyStatusResponse) SetTidyExpiredIssuers(v bool)` + +SetTidyExpiredIssuers sets TidyExpiredIssuers field to given value. + + +### HasTidyExpiredIssuers + +`func (o *PkiTidyStatusResponse) HasTidyExpiredIssuers() bool` + +HasTidyExpiredIssuers returns a boolean if a field has been set. + + + + +### GetTidyMoveLegacyCaBundle + +`func (o *PkiTidyStatusResponse) GetTidyMoveLegacyCaBundle() bool` + +GetTidyMoveLegacyCaBundle returns the TidyMoveLegacyCaBundle field if non-nil, zero value otherwise. + +### GetTidyMoveLegacyCaBundleOk + +`func (o *PkiTidyStatusResponse) GetTidyMoveLegacyCaBundleOk() (*bool, bool)` + +GetTidyMoveLegacyCaBundleOk returns a tuple with the TidyMoveLegacyCaBundle field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyMoveLegacyCaBundle + +`func (o *PkiTidyStatusResponse) SetTidyMoveLegacyCaBundle(v bool)` + +SetTidyMoveLegacyCaBundle sets TidyMoveLegacyCaBundle field to given value. + + +### HasTidyMoveLegacyCaBundle + +`func (o *PkiTidyStatusResponse) HasTidyMoveLegacyCaBundle() bool` + +HasTidyMoveLegacyCaBundle returns a boolean if a field has been set. + + + + +### GetTidyRevocationQueue + +`func (o *PkiTidyStatusResponse) GetTidyRevocationQueue() bool` + +GetTidyRevocationQueue returns the TidyRevocationQueue field if non-nil, zero value otherwise. + +### GetTidyRevocationQueueOk + +`func (o *PkiTidyStatusResponse) GetTidyRevocationQueueOk() (*bool, bool)` + +GetTidyRevocationQueueOk returns a tuple with the TidyRevocationQueue field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevocationQueue + +`func (o *PkiTidyStatusResponse) SetTidyRevocationQueue(v bool)` + +SetTidyRevocationQueue sets TidyRevocationQueue field to given value. + + +### HasTidyRevocationQueue + +`func (o *PkiTidyStatusResponse) HasTidyRevocationQueue() bool` + +HasTidyRevocationQueue returns a boolean if a field has been set. + + + + +### GetTidyRevokedCertIssuerAssociations + +`func (o *PkiTidyStatusResponse) GetTidyRevokedCertIssuerAssociations() bool` + +GetTidyRevokedCertIssuerAssociations returns the TidyRevokedCertIssuerAssociations field if non-nil, zero value otherwise. + +### GetTidyRevokedCertIssuerAssociationsOk + +`func (o *PkiTidyStatusResponse) GetTidyRevokedCertIssuerAssociationsOk() (*bool, bool)` + +GetTidyRevokedCertIssuerAssociationsOk returns a tuple with the TidyRevokedCertIssuerAssociations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCertIssuerAssociations + +`func (o *PkiTidyStatusResponse) SetTidyRevokedCertIssuerAssociations(v bool)` + +SetTidyRevokedCertIssuerAssociations sets TidyRevokedCertIssuerAssociations field to given value. + + +### HasTidyRevokedCertIssuerAssociations + +`func (o *PkiTidyStatusResponse) HasTidyRevokedCertIssuerAssociations() bool` + +HasTidyRevokedCertIssuerAssociations returns a boolean if a field has been set. + + + + +### GetTidyRevokedCerts + +`func (o *PkiTidyStatusResponse) GetTidyRevokedCerts() bool` + +GetTidyRevokedCerts returns the TidyRevokedCerts field if non-nil, zero value otherwise. + +### GetTidyRevokedCertsOk + +`func (o *PkiTidyStatusResponse) GetTidyRevokedCertsOk() (*bool, bool)` + +GetTidyRevokedCertsOk returns a tuple with the TidyRevokedCerts field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTidyRevokedCerts + +`func (o *PkiTidyStatusResponse) SetTidyRevokedCerts(v bool)` + +SetTidyRevokedCerts sets TidyRevokedCerts field to given value. + + +### HasTidyRevokedCerts + +`func (o *PkiTidyStatusResponse) HasTidyRevokedCerts() bool` + +HasTidyRevokedCerts returns a boolean if a field has been set. + + + + +### GetTimeFinished + +`func (o *PkiTidyStatusResponse) GetTimeFinished() string` + +GetTimeFinished returns the TimeFinished field if non-nil, zero value otherwise. + +### GetTimeFinishedOk + +`func (o *PkiTidyStatusResponse) GetTimeFinishedOk() (*string, bool)` + +GetTimeFinishedOk returns a tuple with the TimeFinished field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTimeFinished + +`func (o *PkiTidyStatusResponse) SetTimeFinished(v string)` + +SetTimeFinished sets TimeFinished field to given value. + + +### HasTimeFinished + +`func (o *PkiTidyStatusResponse) HasTimeFinished() bool` + +HasTimeFinished returns a boolean if a field has been set. + + + + +### GetTimeStarted + +`func (o *PkiTidyStatusResponse) GetTimeStarted() string` + +GetTimeStarted returns the TimeStarted field if non-nil, zero value otherwise. + +### GetTimeStartedOk + +`func (o *PkiTidyStatusResponse) GetTimeStartedOk() (*string, bool)` + +GetTimeStartedOk returns a tuple with the TimeStarted field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTimeStarted + +`func (o *PkiTidyStatusResponse) SetTimeStarted(v string)` + +SetTimeStarted sets TimeStarted field to given value. + + +### HasTimeStarted + +`func (o *PkiTidyStatusResponse) HasTimeStarted() bool` + +HasTimeStarted returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiWriteIssuerRefDerPemRequest.md b/docs/PkiWriteIssuerRequest.md similarity index 68% rename from docs/PkiWriteIssuerRefDerPemRequest.md rename to docs/PkiWriteIssuerRequest.md index 09e39dc0..afafde4c 100644 --- a/docs/PkiWriteIssuerRefDerPemRequest.md +++ b/docs/PkiWriteIssuerRequest.md @@ -1,4 +1,4 @@ -# PkiWriteIssuerRefDerPemRequest +# PkiWriteIssuerRequest ## Properties @@ -6,7 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **CrlDistributionPoints** | Pointer to **[]string** | Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. | [optional] -**EnableAiaUrlTemplating** | Pointer to **bool** | Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. | [optional] [default to false] +**EnableAiaUrlTemplating** | Pointer to **bool** | Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}', '{{cluster_path}}', '{{cluster_aia_path}}' are available, but the addresses are not checked for URL validity until issuance time. Using '{{cluster_path}}' requires /config/cluster's 'path' member to be set on all PR Secondary clusters and using '{{cluster_aia_path}}' requires /config/cluster's 'aia_path' member to be set on all PR secondary clusters. | [optional] [default to false] **IssuerName** | Pointer to **string** | Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' | [optional] **IssuingCertificates** | Pointer to **[]string** | Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. | [optional] **LeafNotAfterBehavior** | Pointer to **string** | Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs. | [optional] [default to "err"] @@ -20,47 +20,47 @@ Name | Type | Description | Notes ## Methods -### NewPkiWriteIssuerRefDerPemRequest +### NewPkiWriteIssuerRequest -`func NewPkiWriteIssuerRefDerPemRequest() *PkiWriteIssuerRefDerPemRequest` +`func NewPkiWriteIssuerRequest() *PkiWriteIssuerRequest` -NewPkiWriteIssuerRefDerPemRequest instantiates a new PkiWriteIssuerRefDerPemRequest object +NewPkiWriteIssuerRequest instantiates a new PkiWriteIssuerRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewPkiWriteIssuerRefDerPemRequestWithDefaults +### NewPkiWriteIssuerRequestWithDefaults -`func NewPkiWriteIssuerRefDerPemRequestWithDefaults() *PkiWriteIssuerRefDerPemRequest` +`func NewPkiWriteIssuerRequestWithDefaults() *PkiWriteIssuerRequest` -NewPkiWriteIssuerRefDerPemRequestWithDefaults instantiates a new PkiWriteIssuerRefDerPemRequest object +NewPkiWriteIssuerRequestWithDefaults instantiates a new PkiWriteIssuerRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCrlDistributionPoints -`func (o *PkiWriteIssuerRefDerPemRequest) GetCrlDistributionPoints() []string` +`func (o *PkiWriteIssuerRequest) GetCrlDistributionPoints() []string` GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. ### GetCrlDistributionPointsOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetCrlDistributionPointsOk() (*[]string, bool)` +`func (o *PkiWriteIssuerRequest) GetCrlDistributionPointsOk() (*[]string, bool)` GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCrlDistributionPoints -`func (o *PkiWriteIssuerRefDerPemRequest) SetCrlDistributionPoints(v []string)` +`func (o *PkiWriteIssuerRequest) SetCrlDistributionPoints(v []string)` SetCrlDistributionPoints sets CrlDistributionPoints field to given value. ### HasCrlDistributionPoints -`func (o *PkiWriteIssuerRefDerPemRequest) HasCrlDistributionPoints() bool` +`func (o *PkiWriteIssuerRequest) HasCrlDistributionPoints() bool` HasCrlDistributionPoints returns a boolean if a field has been set. @@ -69,27 +69,27 @@ HasCrlDistributionPoints returns a boolean if a field has been set. ### GetEnableAiaUrlTemplating -`func (o *PkiWriteIssuerRefDerPemRequest) GetEnableAiaUrlTemplating() bool` +`func (o *PkiWriteIssuerRequest) GetEnableAiaUrlTemplating() bool` GetEnableAiaUrlTemplating returns the EnableAiaUrlTemplating field if non-nil, zero value otherwise. ### GetEnableAiaUrlTemplatingOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetEnableAiaUrlTemplatingOk() (*bool, bool)` +`func (o *PkiWriteIssuerRequest) GetEnableAiaUrlTemplatingOk() (*bool, bool)` GetEnableAiaUrlTemplatingOk returns a tuple with the EnableAiaUrlTemplating field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnableAiaUrlTemplating -`func (o *PkiWriteIssuerRefDerPemRequest) SetEnableAiaUrlTemplating(v bool)` +`func (o *PkiWriteIssuerRequest) SetEnableAiaUrlTemplating(v bool)` SetEnableAiaUrlTemplating sets EnableAiaUrlTemplating field to given value. ### HasEnableAiaUrlTemplating -`func (o *PkiWriteIssuerRefDerPemRequest) HasEnableAiaUrlTemplating() bool` +`func (o *PkiWriteIssuerRequest) HasEnableAiaUrlTemplating() bool` HasEnableAiaUrlTemplating returns a boolean if a field has been set. @@ -98,27 +98,27 @@ HasEnableAiaUrlTemplating returns a boolean if a field has been set. ### GetIssuerName -`func (o *PkiWriteIssuerRefDerPemRequest) GetIssuerName() string` +`func (o *PkiWriteIssuerRequest) GetIssuerName() string` GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. ### GetIssuerNameOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetIssuerNameOk() (*string, bool)` +`func (o *PkiWriteIssuerRequest) GetIssuerNameOk() (*string, bool)` GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuerName -`func (o *PkiWriteIssuerRefDerPemRequest) SetIssuerName(v string)` +`func (o *PkiWriteIssuerRequest) SetIssuerName(v string)` SetIssuerName sets IssuerName field to given value. ### HasIssuerName -`func (o *PkiWriteIssuerRefDerPemRequest) HasIssuerName() bool` +`func (o *PkiWriteIssuerRequest) HasIssuerName() bool` HasIssuerName returns a boolean if a field has been set. @@ -127,27 +127,27 @@ HasIssuerName returns a boolean if a field has been set. ### GetIssuingCertificates -`func (o *PkiWriteIssuerRefDerPemRequest) GetIssuingCertificates() []string` +`func (o *PkiWriteIssuerRequest) GetIssuingCertificates() []string` GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. ### GetIssuingCertificatesOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetIssuingCertificatesOk() (*[]string, bool)` +`func (o *PkiWriteIssuerRequest) GetIssuingCertificatesOk() (*[]string, bool)` GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuingCertificates -`func (o *PkiWriteIssuerRefDerPemRequest) SetIssuingCertificates(v []string)` +`func (o *PkiWriteIssuerRequest) SetIssuingCertificates(v []string)` SetIssuingCertificates sets IssuingCertificates field to given value. ### HasIssuingCertificates -`func (o *PkiWriteIssuerRefDerPemRequest) HasIssuingCertificates() bool` +`func (o *PkiWriteIssuerRequest) HasIssuingCertificates() bool` HasIssuingCertificates returns a boolean if a field has been set. @@ -156,27 +156,27 @@ HasIssuingCertificates returns a boolean if a field has been set. ### GetLeafNotAfterBehavior -`func (o *PkiWriteIssuerRefDerPemRequest) GetLeafNotAfterBehavior() string` +`func (o *PkiWriteIssuerRequest) GetLeafNotAfterBehavior() string` GetLeafNotAfterBehavior returns the LeafNotAfterBehavior field if non-nil, zero value otherwise. ### GetLeafNotAfterBehaviorOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetLeafNotAfterBehaviorOk() (*string, bool)` +`func (o *PkiWriteIssuerRequest) GetLeafNotAfterBehaviorOk() (*string, bool)` GetLeafNotAfterBehaviorOk returns a tuple with the LeafNotAfterBehavior field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetLeafNotAfterBehavior -`func (o *PkiWriteIssuerRefDerPemRequest) SetLeafNotAfterBehavior(v string)` +`func (o *PkiWriteIssuerRequest) SetLeafNotAfterBehavior(v string)` SetLeafNotAfterBehavior sets LeafNotAfterBehavior field to given value. ### HasLeafNotAfterBehavior -`func (o *PkiWriteIssuerRefDerPemRequest) HasLeafNotAfterBehavior() bool` +`func (o *PkiWriteIssuerRequest) HasLeafNotAfterBehavior() bool` HasLeafNotAfterBehavior returns a boolean if a field has been set. @@ -185,27 +185,27 @@ HasLeafNotAfterBehavior returns a boolean if a field has been set. ### GetManualChain -`func (o *PkiWriteIssuerRefDerPemRequest) GetManualChain() []string` +`func (o *PkiWriteIssuerRequest) GetManualChain() []string` GetManualChain returns the ManualChain field if non-nil, zero value otherwise. ### GetManualChainOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetManualChainOk() (*[]string, bool)` +`func (o *PkiWriteIssuerRequest) GetManualChainOk() (*[]string, bool)` GetManualChainOk returns a tuple with the ManualChain field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetManualChain -`func (o *PkiWriteIssuerRefDerPemRequest) SetManualChain(v []string)` +`func (o *PkiWriteIssuerRequest) SetManualChain(v []string)` SetManualChain sets ManualChain field to given value. ### HasManualChain -`func (o *PkiWriteIssuerRefDerPemRequest) HasManualChain() bool` +`func (o *PkiWriteIssuerRequest) HasManualChain() bool` HasManualChain returns a boolean if a field has been set. @@ -214,27 +214,27 @@ HasManualChain returns a boolean if a field has been set. ### GetOcspServers -`func (o *PkiWriteIssuerRefDerPemRequest) GetOcspServers() []string` +`func (o *PkiWriteIssuerRequest) GetOcspServers() []string` GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. ### GetOcspServersOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetOcspServersOk() (*[]string, bool)` +`func (o *PkiWriteIssuerRequest) GetOcspServersOk() (*[]string, bool)` GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOcspServers -`func (o *PkiWriteIssuerRefDerPemRequest) SetOcspServers(v []string)` +`func (o *PkiWriteIssuerRequest) SetOcspServers(v []string)` SetOcspServers sets OcspServers field to given value. ### HasOcspServers -`func (o *PkiWriteIssuerRefDerPemRequest) HasOcspServers() bool` +`func (o *PkiWriteIssuerRequest) HasOcspServers() bool` HasOcspServers returns a boolean if a field has been set. @@ -243,27 +243,27 @@ HasOcspServers returns a boolean if a field has been set. ### GetRevocationSignatureAlgorithm -`func (o *PkiWriteIssuerRefDerPemRequest) GetRevocationSignatureAlgorithm() string` +`func (o *PkiWriteIssuerRequest) GetRevocationSignatureAlgorithm() string` GetRevocationSignatureAlgorithm returns the RevocationSignatureAlgorithm field if non-nil, zero value otherwise. ### GetRevocationSignatureAlgorithmOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetRevocationSignatureAlgorithmOk() (*string, bool)` +`func (o *PkiWriteIssuerRequest) GetRevocationSignatureAlgorithmOk() (*string, bool)` GetRevocationSignatureAlgorithmOk returns a tuple with the RevocationSignatureAlgorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRevocationSignatureAlgorithm -`func (o *PkiWriteIssuerRefDerPemRequest) SetRevocationSignatureAlgorithm(v string)` +`func (o *PkiWriteIssuerRequest) SetRevocationSignatureAlgorithm(v string)` SetRevocationSignatureAlgorithm sets RevocationSignatureAlgorithm field to given value. ### HasRevocationSignatureAlgorithm -`func (o *PkiWriteIssuerRefDerPemRequest) HasRevocationSignatureAlgorithm() bool` +`func (o *PkiWriteIssuerRequest) HasRevocationSignatureAlgorithm() bool` HasRevocationSignatureAlgorithm returns a boolean if a field has been set. @@ -272,27 +272,27 @@ HasRevocationSignatureAlgorithm returns a boolean if a field has been set. ### GetUsage -`func (o *PkiWriteIssuerRefDerPemRequest) GetUsage() []string` +`func (o *PkiWriteIssuerRequest) GetUsage() []string` GetUsage returns the Usage field if non-nil, zero value otherwise. ### GetUsageOk -`func (o *PkiWriteIssuerRefDerPemRequest) GetUsageOk() (*[]string, bool)` +`func (o *PkiWriteIssuerRequest) GetUsageOk() (*[]string, bool)` GetUsageOk returns a tuple with the Usage field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsage -`func (o *PkiWriteIssuerRefDerPemRequest) SetUsage(v []string)` +`func (o *PkiWriteIssuerRequest) SetUsage(v []string)` SetUsage sets Usage field to given value. ### HasUsage -`func (o *PkiWriteIssuerRefDerPemRequest) HasUsage() bool` +`func (o *PkiWriteIssuerRequest) HasUsage() bool` HasUsage returns a boolean if a field has been set. diff --git a/docs/PkiWriteIssuerResponse.md b/docs/PkiWriteIssuerResponse.md new file mode 100644 index 00000000..97b67270 --- /dev/null +++ b/docs/PkiWriteIssuerResponse.md @@ -0,0 +1,489 @@ +# PkiWriteIssuerResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CaChain** | Pointer to **[]string** | CA Chain | [optional] +**Certificate** | Pointer to **string** | Certificate | [optional] +**CrlDistributionPoints** | Pointer to **[]string** | CRL Distribution Points | [optional] +**IssuerId** | Pointer to **string** | Issuer Id | [optional] +**IssuerName** | Pointer to **string** | Issuer Name | [optional] +**IssuingCertificates** | Pointer to **[]string** | Issuing Certificates | [optional] +**KeyId** | Pointer to **string** | Key Id | [optional] +**LeafNotAfterBehavior** | Pointer to **string** | Leaf Not After Behavior | [optional] +**ManualChain** | Pointer to **[]string** | Manual Chain | [optional] +**OcspServers** | Pointer to **[]string** | OSCP Servers | [optional] +**RevocationSignatureAlgorithm** | Pointer to **string** | Revocation Signature Alogrithm | [optional] +**RevocationTime** | Pointer to **int32** | | [optional] +**RevocationTimeRfc3339** | Pointer to **string** | | [optional] +**Revoked** | Pointer to **bool** | Revoked | [optional] +**Usage** | Pointer to **[]string** | Usage | [optional] + + + +## Methods + + +### NewPkiWriteIssuerResponse + +`func NewPkiWriteIssuerResponse() *PkiWriteIssuerResponse` + +NewPkiWriteIssuerResponse instantiates a new PkiWriteIssuerResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiWriteIssuerResponseWithDefaults + +`func NewPkiWriteIssuerResponseWithDefaults() *PkiWriteIssuerResponse` + +NewPkiWriteIssuerResponseWithDefaults instantiates a new PkiWriteIssuerResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCaChain + +`func (o *PkiWriteIssuerResponse) GetCaChain() []string` + +GetCaChain returns the CaChain field if non-nil, zero value otherwise. + +### GetCaChainOk + +`func (o *PkiWriteIssuerResponse) GetCaChainOk() (*[]string, bool)` + +GetCaChainOk returns a tuple with the CaChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCaChain + +`func (o *PkiWriteIssuerResponse) SetCaChain(v []string)` + +SetCaChain sets CaChain field to given value. + + +### HasCaChain + +`func (o *PkiWriteIssuerResponse) HasCaChain() bool` + +HasCaChain returns a boolean if a field has been set. + + + + +### GetCertificate + +`func (o *PkiWriteIssuerResponse) GetCertificate() string` + +GetCertificate returns the Certificate field if non-nil, zero value otherwise. + +### GetCertificateOk + +`func (o *PkiWriteIssuerResponse) GetCertificateOk() (*string, bool)` + +GetCertificateOk returns a tuple with the Certificate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCertificate + +`func (o *PkiWriteIssuerResponse) SetCertificate(v string)` + +SetCertificate sets Certificate field to given value. + + +### HasCertificate + +`func (o *PkiWriteIssuerResponse) HasCertificate() bool` + +HasCertificate returns a boolean if a field has been set. + + + + +### GetCrlDistributionPoints + +`func (o *PkiWriteIssuerResponse) GetCrlDistributionPoints() []string` + +GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. + +### GetCrlDistributionPointsOk + +`func (o *PkiWriteIssuerResponse) GetCrlDistributionPointsOk() (*[]string, bool)` + +GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCrlDistributionPoints + +`func (o *PkiWriteIssuerResponse) SetCrlDistributionPoints(v []string)` + +SetCrlDistributionPoints sets CrlDistributionPoints field to given value. + + +### HasCrlDistributionPoints + +`func (o *PkiWriteIssuerResponse) HasCrlDistributionPoints() bool` + +HasCrlDistributionPoints returns a boolean if a field has been set. + + + + +### GetIssuerId + +`func (o *PkiWriteIssuerResponse) GetIssuerId() string` + +GetIssuerId returns the IssuerId field if non-nil, zero value otherwise. + +### GetIssuerIdOk + +`func (o *PkiWriteIssuerResponse) GetIssuerIdOk() (*string, bool)` + +GetIssuerIdOk returns a tuple with the IssuerId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerId + +`func (o *PkiWriteIssuerResponse) SetIssuerId(v string)` + +SetIssuerId sets IssuerId field to given value. + + +### HasIssuerId + +`func (o *PkiWriteIssuerResponse) HasIssuerId() bool` + +HasIssuerId returns a boolean if a field has been set. + + + + +### GetIssuerName + +`func (o *PkiWriteIssuerResponse) GetIssuerName() string` + +GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. + +### GetIssuerNameOk + +`func (o *PkiWriteIssuerResponse) GetIssuerNameOk() (*string, bool)` + +GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerName + +`func (o *PkiWriteIssuerResponse) SetIssuerName(v string)` + +SetIssuerName sets IssuerName field to given value. + + +### HasIssuerName + +`func (o *PkiWriteIssuerResponse) HasIssuerName() bool` + +HasIssuerName returns a boolean if a field has been set. + + + + +### GetIssuingCertificates + +`func (o *PkiWriteIssuerResponse) GetIssuingCertificates() []string` + +GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. + +### GetIssuingCertificatesOk + +`func (o *PkiWriteIssuerResponse) GetIssuingCertificatesOk() (*[]string, bool)` + +GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuingCertificates + +`func (o *PkiWriteIssuerResponse) SetIssuingCertificates(v []string)` + +SetIssuingCertificates sets IssuingCertificates field to given value. + + +### HasIssuingCertificates + +`func (o *PkiWriteIssuerResponse) HasIssuingCertificates() bool` + +HasIssuingCertificates returns a boolean if a field has been set. + + + + +### GetKeyId + +`func (o *PkiWriteIssuerResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiWriteIssuerResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiWriteIssuerResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiWriteIssuerResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetLeafNotAfterBehavior + +`func (o *PkiWriteIssuerResponse) GetLeafNotAfterBehavior() string` + +GetLeafNotAfterBehavior returns the LeafNotAfterBehavior field if non-nil, zero value otherwise. + +### GetLeafNotAfterBehaviorOk + +`func (o *PkiWriteIssuerResponse) GetLeafNotAfterBehaviorOk() (*string, bool)` + +GetLeafNotAfterBehaviorOk returns a tuple with the LeafNotAfterBehavior field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLeafNotAfterBehavior + +`func (o *PkiWriteIssuerResponse) SetLeafNotAfterBehavior(v string)` + +SetLeafNotAfterBehavior sets LeafNotAfterBehavior field to given value. + + +### HasLeafNotAfterBehavior + +`func (o *PkiWriteIssuerResponse) HasLeafNotAfterBehavior() bool` + +HasLeafNotAfterBehavior returns a boolean if a field has been set. + + + + +### GetManualChain + +`func (o *PkiWriteIssuerResponse) GetManualChain() []string` + +GetManualChain returns the ManualChain field if non-nil, zero value otherwise. + +### GetManualChainOk + +`func (o *PkiWriteIssuerResponse) GetManualChainOk() (*[]string, bool)` + +GetManualChainOk returns a tuple with the ManualChain field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManualChain + +`func (o *PkiWriteIssuerResponse) SetManualChain(v []string)` + +SetManualChain sets ManualChain field to given value. + + +### HasManualChain + +`func (o *PkiWriteIssuerResponse) HasManualChain() bool` + +HasManualChain returns a boolean if a field has been set. + + + + +### GetOcspServers + +`func (o *PkiWriteIssuerResponse) GetOcspServers() []string` + +GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. + +### GetOcspServersOk + +`func (o *PkiWriteIssuerResponse) GetOcspServersOk() (*[]string, bool)` + +GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOcspServers + +`func (o *PkiWriteIssuerResponse) SetOcspServers(v []string)` + +SetOcspServers sets OcspServers field to given value. + + +### HasOcspServers + +`func (o *PkiWriteIssuerResponse) HasOcspServers() bool` + +HasOcspServers returns a boolean if a field has been set. + + + + +### GetRevocationSignatureAlgorithm + +`func (o *PkiWriteIssuerResponse) GetRevocationSignatureAlgorithm() string` + +GetRevocationSignatureAlgorithm returns the RevocationSignatureAlgorithm field if non-nil, zero value otherwise. + +### GetRevocationSignatureAlgorithmOk + +`func (o *PkiWriteIssuerResponse) GetRevocationSignatureAlgorithmOk() (*string, bool)` + +GetRevocationSignatureAlgorithmOk returns a tuple with the RevocationSignatureAlgorithm field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationSignatureAlgorithm + +`func (o *PkiWriteIssuerResponse) SetRevocationSignatureAlgorithm(v string)` + +SetRevocationSignatureAlgorithm sets RevocationSignatureAlgorithm field to given value. + + +### HasRevocationSignatureAlgorithm + +`func (o *PkiWriteIssuerResponse) HasRevocationSignatureAlgorithm() bool` + +HasRevocationSignatureAlgorithm returns a boolean if a field has been set. + + + + +### GetRevocationTime + +`func (o *PkiWriteIssuerResponse) GetRevocationTime() int32` + +GetRevocationTime returns the RevocationTime field if non-nil, zero value otherwise. + +### GetRevocationTimeOk + +`func (o *PkiWriteIssuerResponse) GetRevocationTimeOk() (*int32, bool)` + +GetRevocationTimeOk returns a tuple with the RevocationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTime + +`func (o *PkiWriteIssuerResponse) SetRevocationTime(v int32)` + +SetRevocationTime sets RevocationTime field to given value. + + +### HasRevocationTime + +`func (o *PkiWriteIssuerResponse) HasRevocationTime() bool` + +HasRevocationTime returns a boolean if a field has been set. + + + + +### GetRevocationTimeRfc3339 + +`func (o *PkiWriteIssuerResponse) GetRevocationTimeRfc3339() string` + +GetRevocationTimeRfc3339 returns the RevocationTimeRfc3339 field if non-nil, zero value otherwise. + +### GetRevocationTimeRfc3339Ok + +`func (o *PkiWriteIssuerResponse) GetRevocationTimeRfc3339Ok() (*string, bool)` + +GetRevocationTimeRfc3339Ok returns a tuple with the RevocationTimeRfc3339 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevocationTimeRfc3339 + +`func (o *PkiWriteIssuerResponse) SetRevocationTimeRfc3339(v string)` + +SetRevocationTimeRfc3339 sets RevocationTimeRfc3339 field to given value. + + +### HasRevocationTimeRfc3339 + +`func (o *PkiWriteIssuerResponse) HasRevocationTimeRfc3339() bool` + +HasRevocationTimeRfc3339 returns a boolean if a field has been set. + + + + +### GetRevoked + +`func (o *PkiWriteIssuerResponse) GetRevoked() bool` + +GetRevoked returns the Revoked field if non-nil, zero value otherwise. + +### GetRevokedOk + +`func (o *PkiWriteIssuerResponse) GetRevokedOk() (*bool, bool)` + +GetRevokedOk returns a tuple with the Revoked field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRevoked + +`func (o *PkiWriteIssuerResponse) SetRevoked(v bool)` + +SetRevoked sets Revoked field to given value. + + +### HasRevoked + +`func (o *PkiWriteIssuerResponse) HasRevoked() bool` + +HasRevoked returns a boolean if a field has been set. + + + + +### GetUsage + +`func (o *PkiWriteIssuerResponse) GetUsage() []string` + +GetUsage returns the Usage field if non-nil, zero value otherwise. + +### GetUsageOk + +`func (o *PkiWriteIssuerResponse) GetUsageOk() (*[]string, bool)` + +GetUsageOk returns a tuple with the Usage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUsage + +`func (o *PkiWriteIssuerResponse) SetUsage(v []string)` + +SetUsage sets Usage field to given value. + + +### HasUsage + +`func (o *PkiWriteIssuerResponse) HasUsage() bool` + +HasUsage returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiWriteJsonRequest.md b/docs/PkiWriteJsonRequest.md deleted file mode 100644 index 95168151..00000000 --- a/docs/PkiWriteJsonRequest.md +++ /dev/null @@ -1,339 +0,0 @@ -# PkiWriteJsonRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**CrlDistributionPoints** | Pointer to **[]string** | Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. | [optional] -**EnableAiaUrlTemplating** | Pointer to **bool** | Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. | [optional] [default to false] -**IssuerName** | Pointer to **string** | Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' | [optional] -**IssuerRef** | Pointer to **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [optional] [default to "default"] -**IssuingCertificates** | Pointer to **[]string** | Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. | [optional] -**LeafNotAfterBehavior** | Pointer to **string** | Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs. | [optional] [default to "err"] -**ManualChain** | Pointer to **[]string** | Chain of issuer references to use to build this issuer's computed CAChain field, when non-empty. | [optional] -**OcspServers** | Pointer to **[]string** | Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. | [optional] -**RevocationSignatureAlgorithm** | Pointer to **string** | Which x509.SignatureAlgorithm name to use for signing CRLs. This parameter allows differentiation between PKCS#1v1.5 and PSS keys and choice of signature hash algorithm. The default (empty string) value is for Go to select the signature algorithm. This can fail if the underlying key does not support the requested signature algorithm, which may not be known at modification time (such as with PKCS#11 managed RSA keys). | [optional] [default to ""] -**Usage** | Pointer to **[]string** | Comma-separated list (or string slice) of usages for this issuer; valid values are \"read-only\", \"issuing-certificates\", \"crl-signing\", and \"ocsp-signing\". Multiple values may be specified. Read-only is implicit and always set. | [optional] [default to ["read-only","issuing-certificates","crl-signing","ocsp-signing"]] - - - -## Methods - - -### NewPkiWriteJsonRequest - -`func NewPkiWriteJsonRequest() *PkiWriteJsonRequest` - -NewPkiWriteJsonRequest instantiates a new PkiWriteJsonRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewPkiWriteJsonRequestWithDefaults - -`func NewPkiWriteJsonRequestWithDefaults() *PkiWriteJsonRequest` - -NewPkiWriteJsonRequestWithDefaults instantiates a new PkiWriteJsonRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetCrlDistributionPoints - -`func (o *PkiWriteJsonRequest) GetCrlDistributionPoints() []string` - -GetCrlDistributionPoints returns the CrlDistributionPoints field if non-nil, zero value otherwise. - -### GetCrlDistributionPointsOk - -`func (o *PkiWriteJsonRequest) GetCrlDistributionPointsOk() (*[]string, bool)` - -GetCrlDistributionPointsOk returns a tuple with the CrlDistributionPoints field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCrlDistributionPoints - -`func (o *PkiWriteJsonRequest) SetCrlDistributionPoints(v []string)` - -SetCrlDistributionPoints sets CrlDistributionPoints field to given value. - - -### HasCrlDistributionPoints - -`func (o *PkiWriteJsonRequest) HasCrlDistributionPoints() bool` - -HasCrlDistributionPoints returns a boolean if a field has been set. - - - - -### GetEnableAiaUrlTemplating - -`func (o *PkiWriteJsonRequest) GetEnableAiaUrlTemplating() bool` - -GetEnableAiaUrlTemplating returns the EnableAiaUrlTemplating field if non-nil, zero value otherwise. - -### GetEnableAiaUrlTemplatingOk - -`func (o *PkiWriteJsonRequest) GetEnableAiaUrlTemplatingOk() (*bool, bool)` - -GetEnableAiaUrlTemplatingOk returns a tuple with the EnableAiaUrlTemplating field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetEnableAiaUrlTemplating - -`func (o *PkiWriteJsonRequest) SetEnableAiaUrlTemplating(v bool)` - -SetEnableAiaUrlTemplating sets EnableAiaUrlTemplating field to given value. - - -### HasEnableAiaUrlTemplating - -`func (o *PkiWriteJsonRequest) HasEnableAiaUrlTemplating() bool` - -HasEnableAiaUrlTemplating returns a boolean if a field has been set. - - - - -### GetIssuerName - -`func (o *PkiWriteJsonRequest) GetIssuerName() string` - -GetIssuerName returns the IssuerName field if non-nil, zero value otherwise. - -### GetIssuerNameOk - -`func (o *PkiWriteJsonRequest) GetIssuerNameOk() (*string, bool)` - -GetIssuerNameOk returns a tuple with the IssuerName field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetIssuerName - -`func (o *PkiWriteJsonRequest) SetIssuerName(v string)` - -SetIssuerName sets IssuerName field to given value. - - -### HasIssuerName - -`func (o *PkiWriteJsonRequest) HasIssuerName() bool` - -HasIssuerName returns a boolean if a field has been set. - - - - -### GetIssuerRef - -`func (o *PkiWriteJsonRequest) GetIssuerRef() string` - -GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. - -### GetIssuerRefOk - -`func (o *PkiWriteJsonRequest) GetIssuerRefOk() (*string, bool)` - -GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetIssuerRef - -`func (o *PkiWriteJsonRequest) SetIssuerRef(v string)` - -SetIssuerRef sets IssuerRef field to given value. - - -### HasIssuerRef - -`func (o *PkiWriteJsonRequest) HasIssuerRef() bool` - -HasIssuerRef returns a boolean if a field has been set. - - - - -### GetIssuingCertificates - -`func (o *PkiWriteJsonRequest) GetIssuingCertificates() []string` - -GetIssuingCertificates returns the IssuingCertificates field if non-nil, zero value otherwise. - -### GetIssuingCertificatesOk - -`func (o *PkiWriteJsonRequest) GetIssuingCertificatesOk() (*[]string, bool)` - -GetIssuingCertificatesOk returns a tuple with the IssuingCertificates field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetIssuingCertificates - -`func (o *PkiWriteJsonRequest) SetIssuingCertificates(v []string)` - -SetIssuingCertificates sets IssuingCertificates field to given value. - - -### HasIssuingCertificates - -`func (o *PkiWriteJsonRequest) HasIssuingCertificates() bool` - -HasIssuingCertificates returns a boolean if a field has been set. - - - - -### GetLeafNotAfterBehavior - -`func (o *PkiWriteJsonRequest) GetLeafNotAfterBehavior() string` - -GetLeafNotAfterBehavior returns the LeafNotAfterBehavior field if non-nil, zero value otherwise. - -### GetLeafNotAfterBehaviorOk - -`func (o *PkiWriteJsonRequest) GetLeafNotAfterBehaviorOk() (*string, bool)` - -GetLeafNotAfterBehaviorOk returns a tuple with the LeafNotAfterBehavior field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetLeafNotAfterBehavior - -`func (o *PkiWriteJsonRequest) SetLeafNotAfterBehavior(v string)` - -SetLeafNotAfterBehavior sets LeafNotAfterBehavior field to given value. - - -### HasLeafNotAfterBehavior - -`func (o *PkiWriteJsonRequest) HasLeafNotAfterBehavior() bool` - -HasLeafNotAfterBehavior returns a boolean if a field has been set. - - - - -### GetManualChain - -`func (o *PkiWriteJsonRequest) GetManualChain() []string` - -GetManualChain returns the ManualChain field if non-nil, zero value otherwise. - -### GetManualChainOk - -`func (o *PkiWriteJsonRequest) GetManualChainOk() (*[]string, bool)` - -GetManualChainOk returns a tuple with the ManualChain field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetManualChain - -`func (o *PkiWriteJsonRequest) SetManualChain(v []string)` - -SetManualChain sets ManualChain field to given value. - - -### HasManualChain - -`func (o *PkiWriteJsonRequest) HasManualChain() bool` - -HasManualChain returns a boolean if a field has been set. - - - - -### GetOcspServers - -`func (o *PkiWriteJsonRequest) GetOcspServers() []string` - -GetOcspServers returns the OcspServers field if non-nil, zero value otherwise. - -### GetOcspServersOk - -`func (o *PkiWriteJsonRequest) GetOcspServersOk() (*[]string, bool)` - -GetOcspServersOk returns a tuple with the OcspServers field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetOcspServers - -`func (o *PkiWriteJsonRequest) SetOcspServers(v []string)` - -SetOcspServers sets OcspServers field to given value. - - -### HasOcspServers - -`func (o *PkiWriteJsonRequest) HasOcspServers() bool` - -HasOcspServers returns a boolean if a field has been set. - - - - -### GetRevocationSignatureAlgorithm - -`func (o *PkiWriteJsonRequest) GetRevocationSignatureAlgorithm() string` - -GetRevocationSignatureAlgorithm returns the RevocationSignatureAlgorithm field if non-nil, zero value otherwise. - -### GetRevocationSignatureAlgorithmOk - -`func (o *PkiWriteJsonRequest) GetRevocationSignatureAlgorithmOk() (*string, bool)` - -GetRevocationSignatureAlgorithmOk returns a tuple with the RevocationSignatureAlgorithm field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetRevocationSignatureAlgorithm - -`func (o *PkiWriteJsonRequest) SetRevocationSignatureAlgorithm(v string)` - -SetRevocationSignatureAlgorithm sets RevocationSignatureAlgorithm field to given value. - - -### HasRevocationSignatureAlgorithm - -`func (o *PkiWriteJsonRequest) HasRevocationSignatureAlgorithm() bool` - -HasRevocationSignatureAlgorithm returns a boolean if a field has been set. - - - - -### GetUsage - -`func (o *PkiWriteJsonRequest) GetUsage() []string` - -GetUsage returns the Usage field if non-nil, zero value otherwise. - -### GetUsageOk - -`func (o *PkiWriteJsonRequest) GetUsageOk() (*[]string, bool)` - -GetUsageOk returns a tuple with the Usage field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetUsage - -`func (o *PkiWriteJsonRequest) SetUsage(v []string)` - -SetUsage sets Usage field to given value. - - -### HasUsage - -`func (o *PkiWriteJsonRequest) HasUsage() bool` - -HasUsage returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/PkiWriteKeyResponse.md b/docs/PkiWriteKeyResponse.md new file mode 100644 index 00000000..0bfc763d --- /dev/null +++ b/docs/PkiWriteKeyResponse.md @@ -0,0 +1,129 @@ +# PkiWriteKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyId** | Pointer to **string** | Key Id | [optional] +**KeyName** | Pointer to **string** | Key Name | [optional] +**KeyType** | Pointer to **string** | Key Type | [optional] + + + +## Methods + + +### NewPkiWriteKeyResponse + +`func NewPkiWriteKeyResponse() *PkiWriteKeyResponse` + +NewPkiWriteKeyResponse instantiates a new PkiWriteKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiWriteKeyResponseWithDefaults + +`func NewPkiWriteKeyResponseWithDefaults() *PkiWriteKeyResponse` + +NewPkiWriteKeyResponseWithDefaults instantiates a new PkiWriteKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyId + +`func (o *PkiWriteKeyResponse) GetKeyId() string` + +GetKeyId returns the KeyId field if non-nil, zero value otherwise. + +### GetKeyIdOk + +`func (o *PkiWriteKeyResponse) GetKeyIdOk() (*string, bool)` + +GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyId + +`func (o *PkiWriteKeyResponse) SetKeyId(v string)` + +SetKeyId sets KeyId field to given value. + + +### HasKeyId + +`func (o *PkiWriteKeyResponse) HasKeyId() bool` + +HasKeyId returns a boolean if a field has been set. + + + + +### GetKeyName + +`func (o *PkiWriteKeyResponse) GetKeyName() string` + +GetKeyName returns the KeyName field if non-nil, zero value otherwise. + +### GetKeyNameOk + +`func (o *PkiWriteKeyResponse) GetKeyNameOk() (*string, bool)` + +GetKeyNameOk returns a tuple with the KeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyName + +`func (o *PkiWriteKeyResponse) SetKeyName(v string)` + +SetKeyName sets KeyName field to given value. + + +### HasKeyName + +`func (o *PkiWriteKeyResponse) HasKeyName() bool` + +HasKeyName returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiWriteKeyResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiWriteKeyResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiWriteKeyResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiWriteKeyResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PkiWriteRoleResponse.md b/docs/PkiWriteRoleResponse.md new file mode 100644 index 00000000..ede0a958 --- /dev/null +++ b/docs/PkiWriteRoleResponse.md @@ -0,0 +1,1449 @@ +# PkiWriteRoleResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AllowAnyName** | Pointer to **bool** | If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. | [optional] +**AllowBareDomains** | Pointer to **bool** | If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information. | [optional] +**AllowGlobDomains** | Pointer to **bool** | If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information. | [optional] +**AllowIpSans** | Pointer to **bool** | If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed. | [optional] +**AllowLocalhost** | Pointer to **bool** | Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. | [optional] +**AllowSubdomains** | Pointer to **bool** | If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information. | [optional] +**AllowTokenDisplayname** | Pointer to **bool** | Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. | [optional] +**AllowWildcardCertificates** | Pointer to **bool** | If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information. | [optional] +**AllowedDomains** | Pointer to **[]string** | Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains. | [optional] +**AllowedDomainsTemplate** | Pointer to **bool** | If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. | [optional] +**AllowedOtherSans** | Pointer to **[]string** | If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format <oid>;<type>:<value>. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8). | [optional] +**AllowedSerialNumbers** | Pointer to **[]string** | If set, an array of allowed serial numbers to put in Subject. These values support globbing. | [optional] +**AllowedUriSans** | Pointer to **[]string** | If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. | [optional] +**AllowedUriSansTemplate** | Pointer to **bool** | If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. | [optional] +**AllowedUserIds** | Pointer to **[]string** | If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 | [optional] +**BasicConstraintsValidForNonCa** | Pointer to **bool** | Mark Basic Constraints valid when issuing non-CA certificates. | [optional] +**ClientFlag** | Pointer to **bool** | If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. | [optional] +**CnValidations** | Pointer to **[]string** | List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs. | [optional] +**CodeSigningFlag** | Pointer to **bool** | If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12. | [optional] +**Country** | Pointer to **[]string** | If set, Country will be set to this value in certificates issued by this role. | [optional] +**EmailProtectionFlag** | Pointer to **bool** | If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12. | [optional] +**EnforceHostnames** | Pointer to **bool** | If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true. | [optional] +**ExtKeyUsage** | Pointer to **[]string** | A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12. | [optional] +**ExtKeyUsageOids** | Pointer to **[]string** | A comma-separated string or list of extended key usage oids. | [optional] +**GenerateLease** | Pointer to **bool** | If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke <lease_id>\" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault. | [optional] +**IssuerRef** | Pointer to **string** | Reference to the issuer used to sign requests serviced by this role. | [optional] +**KeyBits** | Pointer to **int32** | The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. | [optional] +**KeyType** | Pointer to **string** | The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values. | [optional] +**KeyUsage** | Pointer to **[]string** | A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3. | [optional] +**Locality** | Pointer to **[]string** | If set, Locality will be set to this value in certificates issued by this role. | [optional] +**MaxTtl** | Pointer to **int32** | The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL. | [optional] +**NoStore** | Pointer to **bool** | If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\". | [optional] +**NotAfter** | Pointer to **string** | Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. | [optional] +**NotBeforeDuration** | Pointer to **int32** | The duration before now which the certificate needs to be backdated by. | [optional] +**Organization** | Pointer to **[]string** | If set, O (Organization) will be set to this value in certificates issued by this role. | [optional] +**Ou** | Pointer to **[]string** | If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role. | [optional] +**PolicyIdentifiers** | Pointer to **[]string** | A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}]. | [optional] +**PostalCode** | Pointer to **[]string** | If set, Postal Code will be set to this value in certificates issued by this role. | [optional] +**Province** | Pointer to **[]string** | If set, Province will be set to this value in certificates issued by this role. | [optional] +**RequireCn** | Pointer to **bool** | If set to false, makes the 'common_name' field optional while generating a certificate. | [optional] +**ServerFlag** | Pointer to **bool** | If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. | [optional] [default to true] +**SignatureBits** | Pointer to **int32** | The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). | [optional] +**StreetAddress** | Pointer to **[]string** | If set, Street Address will be set to this value in certificates issued by this role. | [optional] +**Ttl** | Pointer to **int32** | The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter. | [optional] +**UseCsrCommonName** | Pointer to **bool** | If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true. | [optional] +**UseCsrSans** | Pointer to **bool** | If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true. | [optional] +**UsePss** | Pointer to **bool** | Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. | [optional] + + + +## Methods + + +### NewPkiWriteRoleResponse + +`func NewPkiWriteRoleResponse() *PkiWriteRoleResponse` + +NewPkiWriteRoleResponse instantiates a new PkiWriteRoleResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPkiWriteRoleResponseWithDefaults + +`func NewPkiWriteRoleResponseWithDefaults() *PkiWriteRoleResponse` + +NewPkiWriteRoleResponseWithDefaults instantiates a new PkiWriteRoleResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetAllowAnyName + +`func (o *PkiWriteRoleResponse) GetAllowAnyName() bool` + +GetAllowAnyName returns the AllowAnyName field if non-nil, zero value otherwise. + +### GetAllowAnyNameOk + +`func (o *PkiWriteRoleResponse) GetAllowAnyNameOk() (*bool, bool)` + +GetAllowAnyNameOk returns a tuple with the AllowAnyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowAnyName + +`func (o *PkiWriteRoleResponse) SetAllowAnyName(v bool)` + +SetAllowAnyName sets AllowAnyName field to given value. + + +### HasAllowAnyName + +`func (o *PkiWriteRoleResponse) HasAllowAnyName() bool` + +HasAllowAnyName returns a boolean if a field has been set. + + + + +### GetAllowBareDomains + +`func (o *PkiWriteRoleResponse) GetAllowBareDomains() bool` + +GetAllowBareDomains returns the AllowBareDomains field if non-nil, zero value otherwise. + +### GetAllowBareDomainsOk + +`func (o *PkiWriteRoleResponse) GetAllowBareDomainsOk() (*bool, bool)` + +GetAllowBareDomainsOk returns a tuple with the AllowBareDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowBareDomains + +`func (o *PkiWriteRoleResponse) SetAllowBareDomains(v bool)` + +SetAllowBareDomains sets AllowBareDomains field to given value. + + +### HasAllowBareDomains + +`func (o *PkiWriteRoleResponse) HasAllowBareDomains() bool` + +HasAllowBareDomains returns a boolean if a field has been set. + + + + +### GetAllowGlobDomains + +`func (o *PkiWriteRoleResponse) GetAllowGlobDomains() bool` + +GetAllowGlobDomains returns the AllowGlobDomains field if non-nil, zero value otherwise. + +### GetAllowGlobDomainsOk + +`func (o *PkiWriteRoleResponse) GetAllowGlobDomainsOk() (*bool, bool)` + +GetAllowGlobDomainsOk returns a tuple with the AllowGlobDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowGlobDomains + +`func (o *PkiWriteRoleResponse) SetAllowGlobDomains(v bool)` + +SetAllowGlobDomains sets AllowGlobDomains field to given value. + + +### HasAllowGlobDomains + +`func (o *PkiWriteRoleResponse) HasAllowGlobDomains() bool` + +HasAllowGlobDomains returns a boolean if a field has been set. + + + + +### GetAllowIpSans + +`func (o *PkiWriteRoleResponse) GetAllowIpSans() bool` + +GetAllowIpSans returns the AllowIpSans field if non-nil, zero value otherwise. + +### GetAllowIpSansOk + +`func (o *PkiWriteRoleResponse) GetAllowIpSansOk() (*bool, bool)` + +GetAllowIpSansOk returns a tuple with the AllowIpSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowIpSans + +`func (o *PkiWriteRoleResponse) SetAllowIpSans(v bool)` + +SetAllowIpSans sets AllowIpSans field to given value. + + +### HasAllowIpSans + +`func (o *PkiWriteRoleResponse) HasAllowIpSans() bool` + +HasAllowIpSans returns a boolean if a field has been set. + + + + +### GetAllowLocalhost + +`func (o *PkiWriteRoleResponse) GetAllowLocalhost() bool` + +GetAllowLocalhost returns the AllowLocalhost field if non-nil, zero value otherwise. + +### GetAllowLocalhostOk + +`func (o *PkiWriteRoleResponse) GetAllowLocalhostOk() (*bool, bool)` + +GetAllowLocalhostOk returns a tuple with the AllowLocalhost field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowLocalhost + +`func (o *PkiWriteRoleResponse) SetAllowLocalhost(v bool)` + +SetAllowLocalhost sets AllowLocalhost field to given value. + + +### HasAllowLocalhost + +`func (o *PkiWriteRoleResponse) HasAllowLocalhost() bool` + +HasAllowLocalhost returns a boolean if a field has been set. + + + + +### GetAllowSubdomains + +`func (o *PkiWriteRoleResponse) GetAllowSubdomains() bool` + +GetAllowSubdomains returns the AllowSubdomains field if non-nil, zero value otherwise. + +### GetAllowSubdomainsOk + +`func (o *PkiWriteRoleResponse) GetAllowSubdomainsOk() (*bool, bool)` + +GetAllowSubdomainsOk returns a tuple with the AllowSubdomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowSubdomains + +`func (o *PkiWriteRoleResponse) SetAllowSubdomains(v bool)` + +SetAllowSubdomains sets AllowSubdomains field to given value. + + +### HasAllowSubdomains + +`func (o *PkiWriteRoleResponse) HasAllowSubdomains() bool` + +HasAllowSubdomains returns a boolean if a field has been set. + + + + +### GetAllowTokenDisplayname + +`func (o *PkiWriteRoleResponse) GetAllowTokenDisplayname() bool` + +GetAllowTokenDisplayname returns the AllowTokenDisplayname field if non-nil, zero value otherwise. + +### GetAllowTokenDisplaynameOk + +`func (o *PkiWriteRoleResponse) GetAllowTokenDisplaynameOk() (*bool, bool)` + +GetAllowTokenDisplaynameOk returns a tuple with the AllowTokenDisplayname field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowTokenDisplayname + +`func (o *PkiWriteRoleResponse) SetAllowTokenDisplayname(v bool)` + +SetAllowTokenDisplayname sets AllowTokenDisplayname field to given value. + + +### HasAllowTokenDisplayname + +`func (o *PkiWriteRoleResponse) HasAllowTokenDisplayname() bool` + +HasAllowTokenDisplayname returns a boolean if a field has been set. + + + + +### GetAllowWildcardCertificates + +`func (o *PkiWriteRoleResponse) GetAllowWildcardCertificates() bool` + +GetAllowWildcardCertificates returns the AllowWildcardCertificates field if non-nil, zero value otherwise. + +### GetAllowWildcardCertificatesOk + +`func (o *PkiWriteRoleResponse) GetAllowWildcardCertificatesOk() (*bool, bool)` + +GetAllowWildcardCertificatesOk returns a tuple with the AllowWildcardCertificates field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowWildcardCertificates + +`func (o *PkiWriteRoleResponse) SetAllowWildcardCertificates(v bool)` + +SetAllowWildcardCertificates sets AllowWildcardCertificates field to given value. + + +### HasAllowWildcardCertificates + +`func (o *PkiWriteRoleResponse) HasAllowWildcardCertificates() bool` + +HasAllowWildcardCertificates returns a boolean if a field has been set. + + + + +### GetAllowedDomains + +`func (o *PkiWriteRoleResponse) GetAllowedDomains() []string` + +GetAllowedDomains returns the AllowedDomains field if non-nil, zero value otherwise. + +### GetAllowedDomainsOk + +`func (o *PkiWriteRoleResponse) GetAllowedDomainsOk() (*[]string, bool)` + +GetAllowedDomainsOk returns a tuple with the AllowedDomains field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedDomains + +`func (o *PkiWriteRoleResponse) SetAllowedDomains(v []string)` + +SetAllowedDomains sets AllowedDomains field to given value. + + +### HasAllowedDomains + +`func (o *PkiWriteRoleResponse) HasAllowedDomains() bool` + +HasAllowedDomains returns a boolean if a field has been set. + + + + +### GetAllowedDomainsTemplate + +`func (o *PkiWriteRoleResponse) GetAllowedDomainsTemplate() bool` + +GetAllowedDomainsTemplate returns the AllowedDomainsTemplate field if non-nil, zero value otherwise. + +### GetAllowedDomainsTemplateOk + +`func (o *PkiWriteRoleResponse) GetAllowedDomainsTemplateOk() (*bool, bool)` + +GetAllowedDomainsTemplateOk returns a tuple with the AllowedDomainsTemplate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedDomainsTemplate + +`func (o *PkiWriteRoleResponse) SetAllowedDomainsTemplate(v bool)` + +SetAllowedDomainsTemplate sets AllowedDomainsTemplate field to given value. + + +### HasAllowedDomainsTemplate + +`func (o *PkiWriteRoleResponse) HasAllowedDomainsTemplate() bool` + +HasAllowedDomainsTemplate returns a boolean if a field has been set. + + + + +### GetAllowedOtherSans + +`func (o *PkiWriteRoleResponse) GetAllowedOtherSans() []string` + +GetAllowedOtherSans returns the AllowedOtherSans field if non-nil, zero value otherwise. + +### GetAllowedOtherSansOk + +`func (o *PkiWriteRoleResponse) GetAllowedOtherSansOk() (*[]string, bool)` + +GetAllowedOtherSansOk returns a tuple with the AllowedOtherSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedOtherSans + +`func (o *PkiWriteRoleResponse) SetAllowedOtherSans(v []string)` + +SetAllowedOtherSans sets AllowedOtherSans field to given value. + + +### HasAllowedOtherSans + +`func (o *PkiWriteRoleResponse) HasAllowedOtherSans() bool` + +HasAllowedOtherSans returns a boolean if a field has been set. + + + + +### GetAllowedSerialNumbers + +`func (o *PkiWriteRoleResponse) GetAllowedSerialNumbers() []string` + +GetAllowedSerialNumbers returns the AllowedSerialNumbers field if non-nil, zero value otherwise. + +### GetAllowedSerialNumbersOk + +`func (o *PkiWriteRoleResponse) GetAllowedSerialNumbersOk() (*[]string, bool)` + +GetAllowedSerialNumbersOk returns a tuple with the AllowedSerialNumbers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedSerialNumbers + +`func (o *PkiWriteRoleResponse) SetAllowedSerialNumbers(v []string)` + +SetAllowedSerialNumbers sets AllowedSerialNumbers field to given value. + + +### HasAllowedSerialNumbers + +`func (o *PkiWriteRoleResponse) HasAllowedSerialNumbers() bool` + +HasAllowedSerialNumbers returns a boolean if a field has been set. + + + + +### GetAllowedUriSans + +`func (o *PkiWriteRoleResponse) GetAllowedUriSans() []string` + +GetAllowedUriSans returns the AllowedUriSans field if non-nil, zero value otherwise. + +### GetAllowedUriSansOk + +`func (o *PkiWriteRoleResponse) GetAllowedUriSansOk() (*[]string, bool)` + +GetAllowedUriSansOk returns a tuple with the AllowedUriSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUriSans + +`func (o *PkiWriteRoleResponse) SetAllowedUriSans(v []string)` + +SetAllowedUriSans sets AllowedUriSans field to given value. + + +### HasAllowedUriSans + +`func (o *PkiWriteRoleResponse) HasAllowedUriSans() bool` + +HasAllowedUriSans returns a boolean if a field has been set. + + + + +### GetAllowedUriSansTemplate + +`func (o *PkiWriteRoleResponse) GetAllowedUriSansTemplate() bool` + +GetAllowedUriSansTemplate returns the AllowedUriSansTemplate field if non-nil, zero value otherwise. + +### GetAllowedUriSansTemplateOk + +`func (o *PkiWriteRoleResponse) GetAllowedUriSansTemplateOk() (*bool, bool)` + +GetAllowedUriSansTemplateOk returns a tuple with the AllowedUriSansTemplate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUriSansTemplate + +`func (o *PkiWriteRoleResponse) SetAllowedUriSansTemplate(v bool)` + +SetAllowedUriSansTemplate sets AllowedUriSansTemplate field to given value. + + +### HasAllowedUriSansTemplate + +`func (o *PkiWriteRoleResponse) HasAllowedUriSansTemplate() bool` + +HasAllowedUriSansTemplate returns a boolean if a field has been set. + + + + +### GetAllowedUserIds + +`func (o *PkiWriteRoleResponse) GetAllowedUserIds() []string` + +GetAllowedUserIds returns the AllowedUserIds field if non-nil, zero value otherwise. + +### GetAllowedUserIdsOk + +`func (o *PkiWriteRoleResponse) GetAllowedUserIdsOk() (*[]string, bool)` + +GetAllowedUserIdsOk returns a tuple with the AllowedUserIds field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetAllowedUserIds + +`func (o *PkiWriteRoleResponse) SetAllowedUserIds(v []string)` + +SetAllowedUserIds sets AllowedUserIds field to given value. + + +### HasAllowedUserIds + +`func (o *PkiWriteRoleResponse) HasAllowedUserIds() bool` + +HasAllowedUserIds returns a boolean if a field has been set. + + + + +### GetBasicConstraintsValidForNonCa + +`func (o *PkiWriteRoleResponse) GetBasicConstraintsValidForNonCa() bool` + +GetBasicConstraintsValidForNonCa returns the BasicConstraintsValidForNonCa field if non-nil, zero value otherwise. + +### GetBasicConstraintsValidForNonCaOk + +`func (o *PkiWriteRoleResponse) GetBasicConstraintsValidForNonCaOk() (*bool, bool)` + +GetBasicConstraintsValidForNonCaOk returns a tuple with the BasicConstraintsValidForNonCa field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBasicConstraintsValidForNonCa + +`func (o *PkiWriteRoleResponse) SetBasicConstraintsValidForNonCa(v bool)` + +SetBasicConstraintsValidForNonCa sets BasicConstraintsValidForNonCa field to given value. + + +### HasBasicConstraintsValidForNonCa + +`func (o *PkiWriteRoleResponse) HasBasicConstraintsValidForNonCa() bool` + +HasBasicConstraintsValidForNonCa returns a boolean if a field has been set. + + + + +### GetClientFlag + +`func (o *PkiWriteRoleResponse) GetClientFlag() bool` + +GetClientFlag returns the ClientFlag field if non-nil, zero value otherwise. + +### GetClientFlagOk + +`func (o *PkiWriteRoleResponse) GetClientFlagOk() (*bool, bool)` + +GetClientFlagOk returns a tuple with the ClientFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetClientFlag + +`func (o *PkiWriteRoleResponse) SetClientFlag(v bool)` + +SetClientFlag sets ClientFlag field to given value. + + +### HasClientFlag + +`func (o *PkiWriteRoleResponse) HasClientFlag() bool` + +HasClientFlag returns a boolean if a field has been set. + + + + +### GetCnValidations + +`func (o *PkiWriteRoleResponse) GetCnValidations() []string` + +GetCnValidations returns the CnValidations field if non-nil, zero value otherwise. + +### GetCnValidationsOk + +`func (o *PkiWriteRoleResponse) GetCnValidationsOk() (*[]string, bool)` + +GetCnValidationsOk returns a tuple with the CnValidations field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCnValidations + +`func (o *PkiWriteRoleResponse) SetCnValidations(v []string)` + +SetCnValidations sets CnValidations field to given value. + + +### HasCnValidations + +`func (o *PkiWriteRoleResponse) HasCnValidations() bool` + +HasCnValidations returns a boolean if a field has been set. + + + + +### GetCodeSigningFlag + +`func (o *PkiWriteRoleResponse) GetCodeSigningFlag() bool` + +GetCodeSigningFlag returns the CodeSigningFlag field if non-nil, zero value otherwise. + +### GetCodeSigningFlagOk + +`func (o *PkiWriteRoleResponse) GetCodeSigningFlagOk() (*bool, bool)` + +GetCodeSigningFlagOk returns a tuple with the CodeSigningFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCodeSigningFlag + +`func (o *PkiWriteRoleResponse) SetCodeSigningFlag(v bool)` + +SetCodeSigningFlag sets CodeSigningFlag field to given value. + + +### HasCodeSigningFlag + +`func (o *PkiWriteRoleResponse) HasCodeSigningFlag() bool` + +HasCodeSigningFlag returns a boolean if a field has been set. + + + + +### GetCountry + +`func (o *PkiWriteRoleResponse) GetCountry() []string` + +GetCountry returns the Country field if non-nil, zero value otherwise. + +### GetCountryOk + +`func (o *PkiWriteRoleResponse) GetCountryOk() (*[]string, bool)` + +GetCountryOk returns a tuple with the Country field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCountry + +`func (o *PkiWriteRoleResponse) SetCountry(v []string)` + +SetCountry sets Country field to given value. + + +### HasCountry + +`func (o *PkiWriteRoleResponse) HasCountry() bool` + +HasCountry returns a boolean if a field has been set. + + + + +### GetEmailProtectionFlag + +`func (o *PkiWriteRoleResponse) GetEmailProtectionFlag() bool` + +GetEmailProtectionFlag returns the EmailProtectionFlag field if non-nil, zero value otherwise. + +### GetEmailProtectionFlagOk + +`func (o *PkiWriteRoleResponse) GetEmailProtectionFlagOk() (*bool, bool)` + +GetEmailProtectionFlagOk returns a tuple with the EmailProtectionFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEmailProtectionFlag + +`func (o *PkiWriteRoleResponse) SetEmailProtectionFlag(v bool)` + +SetEmailProtectionFlag sets EmailProtectionFlag field to given value. + + +### HasEmailProtectionFlag + +`func (o *PkiWriteRoleResponse) HasEmailProtectionFlag() bool` + +HasEmailProtectionFlag returns a boolean if a field has been set. + + + + +### GetEnforceHostnames + +`func (o *PkiWriteRoleResponse) GetEnforceHostnames() bool` + +GetEnforceHostnames returns the EnforceHostnames field if non-nil, zero value otherwise. + +### GetEnforceHostnamesOk + +`func (o *PkiWriteRoleResponse) GetEnforceHostnamesOk() (*bool, bool)` + +GetEnforceHostnamesOk returns a tuple with the EnforceHostnames field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnforceHostnames + +`func (o *PkiWriteRoleResponse) SetEnforceHostnames(v bool)` + +SetEnforceHostnames sets EnforceHostnames field to given value. + + +### HasEnforceHostnames + +`func (o *PkiWriteRoleResponse) HasEnforceHostnames() bool` + +HasEnforceHostnames returns a boolean if a field has been set. + + + + +### GetExtKeyUsage + +`func (o *PkiWriteRoleResponse) GetExtKeyUsage() []string` + +GetExtKeyUsage returns the ExtKeyUsage field if non-nil, zero value otherwise. + +### GetExtKeyUsageOk + +`func (o *PkiWriteRoleResponse) GetExtKeyUsageOk() (*[]string, bool)` + +GetExtKeyUsageOk returns a tuple with the ExtKeyUsage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExtKeyUsage + +`func (o *PkiWriteRoleResponse) SetExtKeyUsage(v []string)` + +SetExtKeyUsage sets ExtKeyUsage field to given value. + + +### HasExtKeyUsage + +`func (o *PkiWriteRoleResponse) HasExtKeyUsage() bool` + +HasExtKeyUsage returns a boolean if a field has been set. + + + + +### GetExtKeyUsageOids + +`func (o *PkiWriteRoleResponse) GetExtKeyUsageOids() []string` + +GetExtKeyUsageOids returns the ExtKeyUsageOids field if non-nil, zero value otherwise. + +### GetExtKeyUsageOidsOk + +`func (o *PkiWriteRoleResponse) GetExtKeyUsageOidsOk() (*[]string, bool)` + +GetExtKeyUsageOidsOk returns a tuple with the ExtKeyUsageOids field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetExtKeyUsageOids + +`func (o *PkiWriteRoleResponse) SetExtKeyUsageOids(v []string)` + +SetExtKeyUsageOids sets ExtKeyUsageOids field to given value. + + +### HasExtKeyUsageOids + +`func (o *PkiWriteRoleResponse) HasExtKeyUsageOids() bool` + +HasExtKeyUsageOids returns a boolean if a field has been set. + + + + +### GetGenerateLease + +`func (o *PkiWriteRoleResponse) GetGenerateLease() bool` + +GetGenerateLease returns the GenerateLease field if non-nil, zero value otherwise. + +### GetGenerateLeaseOk + +`func (o *PkiWriteRoleResponse) GetGenerateLeaseOk() (*bool, bool)` + +GetGenerateLeaseOk returns a tuple with the GenerateLease field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetGenerateLease + +`func (o *PkiWriteRoleResponse) SetGenerateLease(v bool)` + +SetGenerateLease sets GenerateLease field to given value. + + +### HasGenerateLease + +`func (o *PkiWriteRoleResponse) HasGenerateLease() bool` + +HasGenerateLease returns a boolean if a field has been set. + + + + +### GetIssuerRef + +`func (o *PkiWriteRoleResponse) GetIssuerRef() string` + +GetIssuerRef returns the IssuerRef field if non-nil, zero value otherwise. + +### GetIssuerRefOk + +`func (o *PkiWriteRoleResponse) GetIssuerRefOk() (*string, bool)` + +GetIssuerRefOk returns a tuple with the IssuerRef field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetIssuerRef + +`func (o *PkiWriteRoleResponse) SetIssuerRef(v string)` + +SetIssuerRef sets IssuerRef field to given value. + + +### HasIssuerRef + +`func (o *PkiWriteRoleResponse) HasIssuerRef() bool` + +HasIssuerRef returns a boolean if a field has been set. + + + + +### GetKeyBits + +`func (o *PkiWriteRoleResponse) GetKeyBits() int32` + +GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. + +### GetKeyBitsOk + +`func (o *PkiWriteRoleResponse) GetKeyBitsOk() (*int32, bool)` + +GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyBits + +`func (o *PkiWriteRoleResponse) SetKeyBits(v int32)` + +SetKeyBits sets KeyBits field to given value. + + +### HasKeyBits + +`func (o *PkiWriteRoleResponse) HasKeyBits() bool` + +HasKeyBits returns a boolean if a field has been set. + + + + +### GetKeyType + +`func (o *PkiWriteRoleResponse) GetKeyType() string` + +GetKeyType returns the KeyType field if non-nil, zero value otherwise. + +### GetKeyTypeOk + +`func (o *PkiWriteRoleResponse) GetKeyTypeOk() (*string, bool)` + +GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyType + +`func (o *PkiWriteRoleResponse) SetKeyType(v string)` + +SetKeyType sets KeyType field to given value. + + +### HasKeyType + +`func (o *PkiWriteRoleResponse) HasKeyType() bool` + +HasKeyType returns a boolean if a field has been set. + + + + +### GetKeyUsage + +`func (o *PkiWriteRoleResponse) GetKeyUsage() []string` + +GetKeyUsage returns the KeyUsage field if non-nil, zero value otherwise. + +### GetKeyUsageOk + +`func (o *PkiWriteRoleResponse) GetKeyUsageOk() (*[]string, bool)` + +GetKeyUsageOk returns a tuple with the KeyUsage field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyUsage + +`func (o *PkiWriteRoleResponse) SetKeyUsage(v []string)` + +SetKeyUsage sets KeyUsage field to given value. + + +### HasKeyUsage + +`func (o *PkiWriteRoleResponse) HasKeyUsage() bool` + +HasKeyUsage returns a boolean if a field has been set. + + + + +### GetLocality + +`func (o *PkiWriteRoleResponse) GetLocality() []string` + +GetLocality returns the Locality field if non-nil, zero value otherwise. + +### GetLocalityOk + +`func (o *PkiWriteRoleResponse) GetLocalityOk() (*[]string, bool)` + +GetLocalityOk returns a tuple with the Locality field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetLocality + +`func (o *PkiWriteRoleResponse) SetLocality(v []string)` + +SetLocality sets Locality field to given value. + + +### HasLocality + +`func (o *PkiWriteRoleResponse) HasLocality() bool` + +HasLocality returns a boolean if a field has been set. + + + + +### GetMaxTtl + +`func (o *PkiWriteRoleResponse) GetMaxTtl() int32` + +GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. + +### GetMaxTtlOk + +`func (o *PkiWriteRoleResponse) GetMaxTtlOk() (*int32, bool)` + +GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMaxTtl + +`func (o *PkiWriteRoleResponse) SetMaxTtl(v int32)` + +SetMaxTtl sets MaxTtl field to given value. + + +### HasMaxTtl + +`func (o *PkiWriteRoleResponse) HasMaxTtl() bool` + +HasMaxTtl returns a boolean if a field has been set. + + + + +### GetNoStore + +`func (o *PkiWriteRoleResponse) GetNoStore() bool` + +GetNoStore returns the NoStore field if non-nil, zero value otherwise. + +### GetNoStoreOk + +`func (o *PkiWriteRoleResponse) GetNoStoreOk() (*bool, bool)` + +GetNoStoreOk returns a tuple with the NoStore field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNoStore + +`func (o *PkiWriteRoleResponse) SetNoStore(v bool)` + +SetNoStore sets NoStore field to given value. + + +### HasNoStore + +`func (o *PkiWriteRoleResponse) HasNoStore() bool` + +HasNoStore returns a boolean if a field has been set. + + + + +### GetNotAfter + +`func (o *PkiWriteRoleResponse) GetNotAfter() string` + +GetNotAfter returns the NotAfter field if non-nil, zero value otherwise. + +### GetNotAfterOk + +`func (o *PkiWriteRoleResponse) GetNotAfterOk() (*string, bool)` + +GetNotAfterOk returns a tuple with the NotAfter field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNotAfter + +`func (o *PkiWriteRoleResponse) SetNotAfter(v string)` + +SetNotAfter sets NotAfter field to given value. + + +### HasNotAfter + +`func (o *PkiWriteRoleResponse) HasNotAfter() bool` + +HasNotAfter returns a boolean if a field has been set. + + + + +### GetNotBeforeDuration + +`func (o *PkiWriteRoleResponse) GetNotBeforeDuration() int32` + +GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. + +### GetNotBeforeDurationOk + +`func (o *PkiWriteRoleResponse) GetNotBeforeDurationOk() (*int32, bool)` + +GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNotBeforeDuration + +`func (o *PkiWriteRoleResponse) SetNotBeforeDuration(v int32)` + +SetNotBeforeDuration sets NotBeforeDuration field to given value. + + +### HasNotBeforeDuration + +`func (o *PkiWriteRoleResponse) HasNotBeforeDuration() bool` + +HasNotBeforeDuration returns a boolean if a field has been set. + + + + +### GetOrganization + +`func (o *PkiWriteRoleResponse) GetOrganization() []string` + +GetOrganization returns the Organization field if non-nil, zero value otherwise. + +### GetOrganizationOk + +`func (o *PkiWriteRoleResponse) GetOrganizationOk() (*[]string, bool)` + +GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOrganization + +`func (o *PkiWriteRoleResponse) SetOrganization(v []string)` + +SetOrganization sets Organization field to given value. + + +### HasOrganization + +`func (o *PkiWriteRoleResponse) HasOrganization() bool` + +HasOrganization returns a boolean if a field has been set. + + + + +### GetOu + +`func (o *PkiWriteRoleResponse) GetOu() []string` + +GetOu returns the Ou field if non-nil, zero value otherwise. + +### GetOuOk + +`func (o *PkiWriteRoleResponse) GetOuOk() (*[]string, bool)` + +GetOuOk returns a tuple with the Ou field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOu + +`func (o *PkiWriteRoleResponse) SetOu(v []string)` + +SetOu sets Ou field to given value. + + +### HasOu + +`func (o *PkiWriteRoleResponse) HasOu() bool` + +HasOu returns a boolean if a field has been set. + + + + +### GetPolicyIdentifiers + +`func (o *PkiWriteRoleResponse) GetPolicyIdentifiers() []string` + +GetPolicyIdentifiers returns the PolicyIdentifiers field if non-nil, zero value otherwise. + +### GetPolicyIdentifiersOk + +`func (o *PkiWriteRoleResponse) GetPolicyIdentifiersOk() (*[]string, bool)` + +GetPolicyIdentifiersOk returns a tuple with the PolicyIdentifiers field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicyIdentifiers + +`func (o *PkiWriteRoleResponse) SetPolicyIdentifiers(v []string)` + +SetPolicyIdentifiers sets PolicyIdentifiers field to given value. + + +### HasPolicyIdentifiers + +`func (o *PkiWriteRoleResponse) HasPolicyIdentifiers() bool` + +HasPolicyIdentifiers returns a boolean if a field has been set. + + + + +### GetPostalCode + +`func (o *PkiWriteRoleResponse) GetPostalCode() []string` + +GetPostalCode returns the PostalCode field if non-nil, zero value otherwise. + +### GetPostalCodeOk + +`func (o *PkiWriteRoleResponse) GetPostalCodeOk() (*[]string, bool)` + +GetPostalCodeOk returns a tuple with the PostalCode field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPostalCode + +`func (o *PkiWriteRoleResponse) SetPostalCode(v []string)` + +SetPostalCode sets PostalCode field to given value. + + +### HasPostalCode + +`func (o *PkiWriteRoleResponse) HasPostalCode() bool` + +HasPostalCode returns a boolean if a field has been set. + + + + +### GetProvince + +`func (o *PkiWriteRoleResponse) GetProvince() []string` + +GetProvince returns the Province field if non-nil, zero value otherwise. + +### GetProvinceOk + +`func (o *PkiWriteRoleResponse) GetProvinceOk() (*[]string, bool)` + +GetProvinceOk returns a tuple with the Province field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProvince + +`func (o *PkiWriteRoleResponse) SetProvince(v []string)` + +SetProvince sets Province field to given value. + + +### HasProvince + +`func (o *PkiWriteRoleResponse) HasProvince() bool` + +HasProvince returns a boolean if a field has been set. + + + + +### GetRequireCn + +`func (o *PkiWriteRoleResponse) GetRequireCn() bool` + +GetRequireCn returns the RequireCn field if non-nil, zero value otherwise. + +### GetRequireCnOk + +`func (o *PkiWriteRoleResponse) GetRequireCnOk() (*bool, bool)` + +GetRequireCnOk returns a tuple with the RequireCn field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequireCn + +`func (o *PkiWriteRoleResponse) SetRequireCn(v bool)` + +SetRequireCn sets RequireCn field to given value. + + +### HasRequireCn + +`func (o *PkiWriteRoleResponse) HasRequireCn() bool` + +HasRequireCn returns a boolean if a field has been set. + + + + +### GetServerFlag + +`func (o *PkiWriteRoleResponse) GetServerFlag() bool` + +GetServerFlag returns the ServerFlag field if non-nil, zero value otherwise. + +### GetServerFlagOk + +`func (o *PkiWriteRoleResponse) GetServerFlagOk() (*bool, bool)` + +GetServerFlagOk returns a tuple with the ServerFlag field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetServerFlag + +`func (o *PkiWriteRoleResponse) SetServerFlag(v bool)` + +SetServerFlag sets ServerFlag field to given value. + + +### HasServerFlag + +`func (o *PkiWriteRoleResponse) HasServerFlag() bool` + +HasServerFlag returns a boolean if a field has been set. + + + + +### GetSignatureBits + +`func (o *PkiWriteRoleResponse) GetSignatureBits() int32` + +GetSignatureBits returns the SignatureBits field if non-nil, zero value otherwise. + +### GetSignatureBitsOk + +`func (o *PkiWriteRoleResponse) GetSignatureBitsOk() (*int32, bool)` + +GetSignatureBitsOk returns a tuple with the SignatureBits field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSignatureBits + +`func (o *PkiWriteRoleResponse) SetSignatureBits(v int32)` + +SetSignatureBits sets SignatureBits field to given value. + + +### HasSignatureBits + +`func (o *PkiWriteRoleResponse) HasSignatureBits() bool` + +HasSignatureBits returns a boolean if a field has been set. + + + + +### GetStreetAddress + +`func (o *PkiWriteRoleResponse) GetStreetAddress() []string` + +GetStreetAddress returns the StreetAddress field if non-nil, zero value otherwise. + +### GetStreetAddressOk + +`func (o *PkiWriteRoleResponse) GetStreetAddressOk() (*[]string, bool)` + +GetStreetAddressOk returns a tuple with the StreetAddress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStreetAddress + +`func (o *PkiWriteRoleResponse) SetStreetAddress(v []string)` + +SetStreetAddress sets StreetAddress field to given value. + + +### HasStreetAddress + +`func (o *PkiWriteRoleResponse) HasStreetAddress() bool` + +HasStreetAddress returns a boolean if a field has been set. + + + + +### GetTtl + +`func (o *PkiWriteRoleResponse) GetTtl() int32` + +GetTtl returns the Ttl field if non-nil, zero value otherwise. + +### GetTtlOk + +`func (o *PkiWriteRoleResponse) GetTtlOk() (*int32, bool)` + +GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetTtl + +`func (o *PkiWriteRoleResponse) SetTtl(v int32)` + +SetTtl sets Ttl field to given value. + + +### HasTtl + +`func (o *PkiWriteRoleResponse) HasTtl() bool` + +HasTtl returns a boolean if a field has been set. + + + + +### GetUseCsrCommonName + +`func (o *PkiWriteRoleResponse) GetUseCsrCommonName() bool` + +GetUseCsrCommonName returns the UseCsrCommonName field if non-nil, zero value otherwise. + +### GetUseCsrCommonNameOk + +`func (o *PkiWriteRoleResponse) GetUseCsrCommonNameOk() (*bool, bool)` + +GetUseCsrCommonNameOk returns a tuple with the UseCsrCommonName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUseCsrCommonName + +`func (o *PkiWriteRoleResponse) SetUseCsrCommonName(v bool)` + +SetUseCsrCommonName sets UseCsrCommonName field to given value. + + +### HasUseCsrCommonName + +`func (o *PkiWriteRoleResponse) HasUseCsrCommonName() bool` + +HasUseCsrCommonName returns a boolean if a field has been set. + + + + +### GetUseCsrSans + +`func (o *PkiWriteRoleResponse) GetUseCsrSans() bool` + +GetUseCsrSans returns the UseCsrSans field if non-nil, zero value otherwise. + +### GetUseCsrSansOk + +`func (o *PkiWriteRoleResponse) GetUseCsrSansOk() (*bool, bool)` + +GetUseCsrSansOk returns a tuple with the UseCsrSans field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUseCsrSans + +`func (o *PkiWriteRoleResponse) SetUseCsrSans(v bool)` + +SetUseCsrSans sets UseCsrSans field to given value. + + +### HasUseCsrSans + +`func (o *PkiWriteRoleResponse) HasUseCsrSans() bool` + +HasUseCsrSans returns a boolean if a field has been set. + + + + +### GetUsePss + +`func (o *PkiWriteRoleResponse) GetUsePss() bool` + +GetUsePss returns the UsePss field if non-nil, zero value otherwise. + +### GetUsePssOk + +`func (o *PkiWriteRoleResponse) GetUsePssOk() (*bool, bool)` + +GetUsePssOk returns a tuple with the UsePss field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetUsePss + +`func (o *PkiWriteRoleResponse) SetUsePss(v bool)` + +SetUsePss sets UsePss field to given value. + + +### HasUsePss + +`func (o *PkiWriteRoleResponse) HasUsePss() bool` + +HasUsePss returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PluginsCatalogListPluginsResponse.md b/docs/PluginsCatalogListPluginsResponse.md new file mode 100644 index 00000000..8e91e790 --- /dev/null +++ b/docs/PluginsCatalogListPluginsResponse.md @@ -0,0 +1,69 @@ +# PluginsCatalogListPluginsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Detailed** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewPluginsCatalogListPluginsResponse + +`func NewPluginsCatalogListPluginsResponse() *PluginsCatalogListPluginsResponse` + +NewPluginsCatalogListPluginsResponse instantiates a new PluginsCatalogListPluginsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPluginsCatalogListPluginsResponseWithDefaults + +`func NewPluginsCatalogListPluginsResponseWithDefaults() *PluginsCatalogListPluginsResponse` + +NewPluginsCatalogListPluginsResponseWithDefaults instantiates a new PluginsCatalogListPluginsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetDetailed + +`func (o *PluginsCatalogListPluginsResponse) GetDetailed() map[string]interface{}` + +GetDetailed returns the Detailed field if non-nil, zero value otherwise. + +### GetDetailedOk + +`func (o *PluginsCatalogListPluginsResponse) GetDetailedOk() (*map[string]interface{}, bool)` + +GetDetailedOk returns a tuple with the Detailed field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDetailed + +`func (o *PluginsCatalogListPluginsResponse) SetDetailed(v map[string]interface{})` + +SetDetailed sets Detailed field to given value. + + +### HasDetailed + +`func (o *PluginsCatalogListPluginsResponse) HasDetailed() bool` + +HasDetailed returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PluginsCatalogListPluginsWithTypeResponse.md b/docs/PluginsCatalogListPluginsWithTypeResponse.md new file mode 100644 index 00000000..3809a300 --- /dev/null +++ b/docs/PluginsCatalogListPluginsWithTypeResponse.md @@ -0,0 +1,69 @@ +# PluginsCatalogListPluginsWithTypeResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | List of plugin names in the catalog | [optional] + + + +## Methods + + +### NewPluginsCatalogListPluginsWithTypeResponse + +`func NewPluginsCatalogListPluginsWithTypeResponse() *PluginsCatalogListPluginsWithTypeResponse` + +NewPluginsCatalogListPluginsWithTypeResponse instantiates a new PluginsCatalogListPluginsWithTypeResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPluginsCatalogListPluginsWithTypeResponseWithDefaults + +`func NewPluginsCatalogListPluginsWithTypeResponseWithDefaults() *PluginsCatalogListPluginsWithTypeResponse` + +NewPluginsCatalogListPluginsWithTypeResponseWithDefaults instantiates a new PluginsCatalogListPluginsWithTypeResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *PluginsCatalogListPluginsWithTypeResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PluginsCatalogListPluginsWithTypeResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PluginsCatalogListPluginsWithTypeResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PluginsCatalogListPluginsWithTypeResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PluginsCatalogReadPluginConfigurationResponse.md b/docs/PluginsCatalogReadPluginConfigurationResponse.md new file mode 100644 index 00000000..d5c94687 --- /dev/null +++ b/docs/PluginsCatalogReadPluginConfigurationResponse.md @@ -0,0 +1,249 @@ +# PluginsCatalogReadPluginConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Args** | Pointer to **[]string** | The args passed to plugin command. | [optional] +**Builtin** | Pointer to **bool** | | [optional] +**Command** | Pointer to **string** | The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. | [optional] +**DeprecationStatus** | Pointer to **string** | | [optional] +**Name** | Pointer to **string** | The name of the plugin | [optional] +**Sha256** | Pointer to **string** | The SHA256 sum of the executable used in the command field. This should be HEX encoded. | [optional] +**Version** | Pointer to **string** | The semantic version of the plugin to use. | [optional] + + + +## Methods + + +### NewPluginsCatalogReadPluginConfigurationResponse + +`func NewPluginsCatalogReadPluginConfigurationResponse() *PluginsCatalogReadPluginConfigurationResponse` + +NewPluginsCatalogReadPluginConfigurationResponse instantiates a new PluginsCatalogReadPluginConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPluginsCatalogReadPluginConfigurationResponseWithDefaults + +`func NewPluginsCatalogReadPluginConfigurationResponseWithDefaults() *PluginsCatalogReadPluginConfigurationResponse` + +NewPluginsCatalogReadPluginConfigurationResponseWithDefaults instantiates a new PluginsCatalogReadPluginConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetArgs + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetArgs() []string` + +GetArgs returns the Args field if non-nil, zero value otherwise. + +### GetArgsOk + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetArgsOk() (*[]string, bool)` + +GetArgsOk returns a tuple with the Args field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetArgs + +`func (o *PluginsCatalogReadPluginConfigurationResponse) SetArgs(v []string)` + +SetArgs sets Args field to given value. + + +### HasArgs + +`func (o *PluginsCatalogReadPluginConfigurationResponse) HasArgs() bool` + +HasArgs returns a boolean if a field has been set. + + + + +### GetBuiltin + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetBuiltin() bool` + +GetBuiltin returns the Builtin field if non-nil, zero value otherwise. + +### GetBuiltinOk + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetBuiltinOk() (*bool, bool)` + +GetBuiltinOk returns a tuple with the Builtin field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBuiltin + +`func (o *PluginsCatalogReadPluginConfigurationResponse) SetBuiltin(v bool)` + +SetBuiltin sets Builtin field to given value. + + +### HasBuiltin + +`func (o *PluginsCatalogReadPluginConfigurationResponse) HasBuiltin() bool` + +HasBuiltin returns a boolean if a field has been set. + + + + +### GetCommand + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetCommand() string` + +GetCommand returns the Command field if non-nil, zero value otherwise. + +### GetCommandOk + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetCommandOk() (*string, bool)` + +GetCommandOk returns a tuple with the Command field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCommand + +`func (o *PluginsCatalogReadPluginConfigurationResponse) SetCommand(v string)` + +SetCommand sets Command field to given value. + + +### HasCommand + +`func (o *PluginsCatalogReadPluginConfigurationResponse) HasCommand() bool` + +HasCommand returns a boolean if a field has been set. + + + + +### GetDeprecationStatus + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetDeprecationStatus() string` + +GetDeprecationStatus returns the DeprecationStatus field if non-nil, zero value otherwise. + +### GetDeprecationStatusOk + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetDeprecationStatusOk() (*string, bool)` + +GetDeprecationStatusOk returns a tuple with the DeprecationStatus field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeprecationStatus + +`func (o *PluginsCatalogReadPluginConfigurationResponse) SetDeprecationStatus(v string)` + +SetDeprecationStatus sets DeprecationStatus field to given value. + + +### HasDeprecationStatus + +`func (o *PluginsCatalogReadPluginConfigurationResponse) HasDeprecationStatus() bool` + +HasDeprecationStatus returns a boolean if a field has been set. + + + + +### GetName + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetName() string` + +GetName returns the Name field if non-nil, zero value otherwise. + +### GetNameOk + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetNameOk() (*string, bool)` + +GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetName + +`func (o *PluginsCatalogReadPluginConfigurationResponse) SetName(v string)` + +SetName sets Name field to given value. + + +### HasName + +`func (o *PluginsCatalogReadPluginConfigurationResponse) HasName() bool` + +HasName returns a boolean if a field has been set. + + + + +### GetSha256 + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetSha256() string` + +GetSha256 returns the Sha256 field if non-nil, zero value otherwise. + +### GetSha256Ok + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetSha256Ok() (*string, bool)` + +GetSha256Ok returns a tuple with the Sha256 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSha256 + +`func (o *PluginsCatalogReadPluginConfigurationResponse) SetSha256(v string)` + +SetSha256 sets Sha256 field to given value. + + +### HasSha256 + +`func (o *PluginsCatalogReadPluginConfigurationResponse) HasSha256() bool` + +HasSha256 returns a boolean if a field has been set. + + + + +### GetVersion + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetVersion() string` + +GetVersion returns the Version field if non-nil, zero value otherwise. + +### GetVersionOk + +`func (o *PluginsCatalogReadPluginConfigurationResponse) GetVersionOk() (*string, bool)` + +GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVersion + +`func (o *PluginsCatalogReadPluginConfigurationResponse) SetVersion(v string)` + +SetVersion sets Version field to given value. + + +### HasVersion + +`func (o *PluginsCatalogReadPluginConfigurationResponse) HasVersion() bool` + +HasVersion returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md b/docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md new file mode 100644 index 00000000..15fe04c2 --- /dev/null +++ b/docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md @@ -0,0 +1,249 @@ +# PluginsCatalogReadPluginConfigurationWithTypeResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Args** | Pointer to **[]string** | The args passed to plugin command. | [optional] +**Builtin** | Pointer to **bool** | | [optional] +**Command** | Pointer to **string** | The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. | [optional] +**DeprecationStatus** | Pointer to **string** | | [optional] +**Name** | Pointer to **string** | The name of the plugin | [optional] +**Sha256** | Pointer to **string** | The SHA256 sum of the executable used in the command field. This should be HEX encoded. | [optional] +**Version** | Pointer to **string** | The semantic version of the plugin to use. | [optional] + + + +## Methods + + +### NewPluginsCatalogReadPluginConfigurationWithTypeResponse + +`func NewPluginsCatalogReadPluginConfigurationWithTypeResponse() *PluginsCatalogReadPluginConfigurationWithTypeResponse` + +NewPluginsCatalogReadPluginConfigurationWithTypeResponse instantiates a new PluginsCatalogReadPluginConfigurationWithTypeResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPluginsCatalogReadPluginConfigurationWithTypeResponseWithDefaults + +`func NewPluginsCatalogReadPluginConfigurationWithTypeResponseWithDefaults() *PluginsCatalogReadPluginConfigurationWithTypeResponse` + +NewPluginsCatalogReadPluginConfigurationWithTypeResponseWithDefaults instantiates a new PluginsCatalogReadPluginConfigurationWithTypeResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetArgs + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetArgs() []string` + +GetArgs returns the Args field if non-nil, zero value otherwise. + +### GetArgsOk + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetArgsOk() (*[]string, bool)` + +GetArgsOk returns a tuple with the Args field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetArgs + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) SetArgs(v []string)` + +SetArgs sets Args field to given value. + + +### HasArgs + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) HasArgs() bool` + +HasArgs returns a boolean if a field has been set. + + + + +### GetBuiltin + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetBuiltin() bool` + +GetBuiltin returns the Builtin field if non-nil, zero value otherwise. + +### GetBuiltinOk + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetBuiltinOk() (*bool, bool)` + +GetBuiltinOk returns a tuple with the Builtin field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBuiltin + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) SetBuiltin(v bool)` + +SetBuiltin sets Builtin field to given value. + + +### HasBuiltin + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) HasBuiltin() bool` + +HasBuiltin returns a boolean if a field has been set. + + + + +### GetCommand + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetCommand() string` + +GetCommand returns the Command field if non-nil, zero value otherwise. + +### GetCommandOk + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetCommandOk() (*string, bool)` + +GetCommandOk returns a tuple with the Command field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCommand + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) SetCommand(v string)` + +SetCommand sets Command field to given value. + + +### HasCommand + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) HasCommand() bool` + +HasCommand returns a boolean if a field has been set. + + + + +### GetDeprecationStatus + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetDeprecationStatus() string` + +GetDeprecationStatus returns the DeprecationStatus field if non-nil, zero value otherwise. + +### GetDeprecationStatusOk + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetDeprecationStatusOk() (*string, bool)` + +GetDeprecationStatusOk returns a tuple with the DeprecationStatus field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetDeprecationStatus + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) SetDeprecationStatus(v string)` + +SetDeprecationStatus sets DeprecationStatus field to given value. + + +### HasDeprecationStatus + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) HasDeprecationStatus() bool` + +HasDeprecationStatus returns a boolean if a field has been set. + + + + +### GetName + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetName() string` + +GetName returns the Name field if non-nil, zero value otherwise. + +### GetNameOk + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetNameOk() (*string, bool)` + +GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetName + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) SetName(v string)` + +SetName sets Name field to given value. + + +### HasName + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) HasName() bool` + +HasName returns a boolean if a field has been set. + + + + +### GetSha256 + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetSha256() string` + +GetSha256 returns the Sha256 field if non-nil, zero value otherwise. + +### GetSha256Ok + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetSha256Ok() (*string, bool)` + +GetSha256Ok returns a tuple with the Sha256 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSha256 + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) SetSha256(v string)` + +SetSha256 sets Sha256 field to given value. + + +### HasSha256 + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) HasSha256() bool` + +HasSha256 returns a boolean if a field has been set. + + + + +### GetVersion + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetVersion() string` + +GetVersion returns the Version field if non-nil, zero value otherwise. + +### GetVersionOk + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) GetVersionOk() (*string, bool)` + +GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVersion + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) SetVersion(v string)` + +SetVersion sets Version field to given value. + + +### HasVersion + +`func (o *PluginsCatalogReadPluginConfigurationWithTypeResponse) HasVersion() bool` + +HasVersion returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SysWritePluginsCatalogNameRequest.md b/docs/PluginsCatalogRegisterPluginRequest.md similarity index 63% rename from docs/SysWritePluginsCatalogNameRequest.md rename to docs/PluginsCatalogRegisterPluginRequest.md index 21c4134b..6a0b130f 100644 --- a/docs/SysWritePluginsCatalogNameRequest.md +++ b/docs/PluginsCatalogRegisterPluginRequest.md @@ -1,4 +1,4 @@ -# SysWritePluginsCatalogNameRequest +# PluginsCatalogRegisterPluginRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewSysWritePluginsCatalogNameRequest +### NewPluginsCatalogRegisterPluginRequest -`func NewSysWritePluginsCatalogNameRequest() *SysWritePluginsCatalogNameRequest` +`func NewPluginsCatalogRegisterPluginRequest() *PluginsCatalogRegisterPluginRequest` -NewSysWritePluginsCatalogNameRequest instantiates a new SysWritePluginsCatalogNameRequest object +NewPluginsCatalogRegisterPluginRequest instantiates a new PluginsCatalogRegisterPluginRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSysWritePluginsCatalogNameRequestWithDefaults +### NewPluginsCatalogRegisterPluginRequestWithDefaults -`func NewSysWritePluginsCatalogNameRequestWithDefaults() *SysWritePluginsCatalogNameRequest` +`func NewPluginsCatalogRegisterPluginRequestWithDefaults() *PluginsCatalogRegisterPluginRequest` -NewSysWritePluginsCatalogNameRequestWithDefaults instantiates a new SysWritePluginsCatalogNameRequest object +NewPluginsCatalogRegisterPluginRequestWithDefaults instantiates a new PluginsCatalogRegisterPluginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetArgs -`func (o *SysWritePluginsCatalogNameRequest) GetArgs() []string` +`func (o *PluginsCatalogRegisterPluginRequest) GetArgs() []string` GetArgs returns the Args field if non-nil, zero value otherwise. ### GetArgsOk -`func (o *SysWritePluginsCatalogNameRequest) GetArgsOk() (*[]string, bool)` +`func (o *PluginsCatalogRegisterPluginRequest) GetArgsOk() (*[]string, bool)` GetArgsOk returns a tuple with the Args field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetArgs -`func (o *SysWritePluginsCatalogNameRequest) SetArgs(v []string)` +`func (o *PluginsCatalogRegisterPluginRequest) SetArgs(v []string)` SetArgs sets Args field to given value. ### HasArgs -`func (o *SysWritePluginsCatalogNameRequest) HasArgs() bool` +`func (o *PluginsCatalogRegisterPluginRequest) HasArgs() bool` HasArgs returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasArgs returns a boolean if a field has been set. ### GetCommand -`func (o *SysWritePluginsCatalogNameRequest) GetCommand() string` +`func (o *PluginsCatalogRegisterPluginRequest) GetCommand() string` GetCommand returns the Command field if non-nil, zero value otherwise. ### GetCommandOk -`func (o *SysWritePluginsCatalogNameRequest) GetCommandOk() (*string, bool)` +`func (o *PluginsCatalogRegisterPluginRequest) GetCommandOk() (*string, bool)` GetCommandOk returns a tuple with the Command field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommand -`func (o *SysWritePluginsCatalogNameRequest) SetCommand(v string)` +`func (o *PluginsCatalogRegisterPluginRequest) SetCommand(v string)` SetCommand sets Command field to given value. ### HasCommand -`func (o *SysWritePluginsCatalogNameRequest) HasCommand() bool` +`func (o *PluginsCatalogRegisterPluginRequest) HasCommand() bool` HasCommand returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasCommand returns a boolean if a field has been set. ### GetEnv -`func (o *SysWritePluginsCatalogNameRequest) GetEnv() []string` +`func (o *PluginsCatalogRegisterPluginRequest) GetEnv() []string` GetEnv returns the Env field if non-nil, zero value otherwise. ### GetEnvOk -`func (o *SysWritePluginsCatalogNameRequest) GetEnvOk() (*[]string, bool)` +`func (o *PluginsCatalogRegisterPluginRequest) GetEnvOk() (*[]string, bool)` GetEnvOk returns a tuple with the Env field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnv -`func (o *SysWritePluginsCatalogNameRequest) SetEnv(v []string)` +`func (o *PluginsCatalogRegisterPluginRequest) SetEnv(v []string)` SetEnv sets Env field to given value. ### HasEnv -`func (o *SysWritePluginsCatalogNameRequest) HasEnv() bool` +`func (o *PluginsCatalogRegisterPluginRequest) HasEnv() bool` HasEnv returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasEnv returns a boolean if a field has been set. ### GetSha256 -`func (o *SysWritePluginsCatalogNameRequest) GetSha256() string` +`func (o *PluginsCatalogRegisterPluginRequest) GetSha256() string` GetSha256 returns the Sha256 field if non-nil, zero value otherwise. ### GetSha256Ok -`func (o *SysWritePluginsCatalogNameRequest) GetSha256Ok() (*string, bool)` +`func (o *PluginsCatalogRegisterPluginRequest) GetSha256Ok() (*string, bool)` GetSha256Ok returns a tuple with the Sha256 field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSha256 -`func (o *SysWritePluginsCatalogNameRequest) SetSha256(v string)` +`func (o *PluginsCatalogRegisterPluginRequest) SetSha256(v string)` SetSha256 sets Sha256 field to given value. ### HasSha256 -`func (o *SysWritePluginsCatalogNameRequest) HasSha256() bool` +`func (o *PluginsCatalogRegisterPluginRequest) HasSha256() bool` HasSha256 returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasSha256 returns a boolean if a field has been set. ### GetType -`func (o *SysWritePluginsCatalogNameRequest) GetType() string` +`func (o *PluginsCatalogRegisterPluginRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *SysWritePluginsCatalogNameRequest) GetTypeOk() (*string, bool)` +`func (o *PluginsCatalogRegisterPluginRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *SysWritePluginsCatalogNameRequest) SetType(v string)` +`func (o *PluginsCatalogRegisterPluginRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *SysWritePluginsCatalogNameRequest) HasType() bool` +`func (o *PluginsCatalogRegisterPluginRequest) HasType() bool` HasType returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasType returns a boolean if a field has been set. ### GetVersion -`func (o *SysWritePluginsCatalogNameRequest) GetVersion() string` +`func (o *PluginsCatalogRegisterPluginRequest) GetVersion() string` GetVersion returns the Version field if non-nil, zero value otherwise. ### GetVersionOk -`func (o *SysWritePluginsCatalogNameRequest) GetVersionOk() (*string, bool)` +`func (o *PluginsCatalogRegisterPluginRequest) GetVersionOk() (*string, bool)` GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVersion -`func (o *SysWritePluginsCatalogNameRequest) SetVersion(v string)` +`func (o *PluginsCatalogRegisterPluginRequest) SetVersion(v string)` SetVersion sets Version field to given value. ### HasVersion -`func (o *SysWritePluginsCatalogNameRequest) HasVersion() bool` +`func (o *PluginsCatalogRegisterPluginRequest) HasVersion() bool` HasVersion returns a boolean if a field has been set. diff --git a/docs/WritePluginsCatalogByTypeByNameRequest.md b/docs/PluginsCatalogRegisterPluginWithTypeRequest.md similarity index 59% rename from docs/WritePluginsCatalogByTypeByNameRequest.md rename to docs/PluginsCatalogRegisterPluginWithTypeRequest.md index a39614fc..e4f10540 100644 --- a/docs/WritePluginsCatalogByTypeByNameRequest.md +++ b/docs/PluginsCatalogRegisterPluginWithTypeRequest.md @@ -1,4 +1,4 @@ -# WritePluginsCatalogByTypeByNameRequest +# PluginsCatalogRegisterPluginWithTypeRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewWritePluginsCatalogByTypeByNameRequest +### NewPluginsCatalogRegisterPluginWithTypeRequest -`func NewWritePluginsCatalogByTypeByNameRequest() *WritePluginsCatalogByTypeByNameRequest` +`func NewPluginsCatalogRegisterPluginWithTypeRequest() *PluginsCatalogRegisterPluginWithTypeRequest` -NewWritePluginsCatalogByTypeByNameRequest instantiates a new WritePluginsCatalogByTypeByNameRequest object +NewPluginsCatalogRegisterPluginWithTypeRequest instantiates a new PluginsCatalogRegisterPluginWithTypeRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWritePluginsCatalogByTypeByNameRequestWithDefaults +### NewPluginsCatalogRegisterPluginWithTypeRequestWithDefaults -`func NewWritePluginsCatalogByTypeByNameRequestWithDefaults() *WritePluginsCatalogByTypeByNameRequest` +`func NewPluginsCatalogRegisterPluginWithTypeRequestWithDefaults() *PluginsCatalogRegisterPluginWithTypeRequest` -NewWritePluginsCatalogByTypeByNameRequestWithDefaults instantiates a new WritePluginsCatalogByTypeByNameRequest object +NewPluginsCatalogRegisterPluginWithTypeRequestWithDefaults instantiates a new PluginsCatalogRegisterPluginWithTypeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetArgs -`func (o *WritePluginsCatalogByTypeByNameRequest) GetArgs() []string` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetArgs() []string` GetArgs returns the Args field if non-nil, zero value otherwise. ### GetArgsOk -`func (o *WritePluginsCatalogByTypeByNameRequest) GetArgsOk() (*[]string, bool)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetArgsOk() (*[]string, bool)` GetArgsOk returns a tuple with the Args field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetArgs -`func (o *WritePluginsCatalogByTypeByNameRequest) SetArgs(v []string)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) SetArgs(v []string)` SetArgs sets Args field to given value. ### HasArgs -`func (o *WritePluginsCatalogByTypeByNameRequest) HasArgs() bool` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) HasArgs() bool` HasArgs returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasArgs returns a boolean if a field has been set. ### GetCommand -`func (o *WritePluginsCatalogByTypeByNameRequest) GetCommand() string` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetCommand() string` GetCommand returns the Command field if non-nil, zero value otherwise. ### GetCommandOk -`func (o *WritePluginsCatalogByTypeByNameRequest) GetCommandOk() (*string, bool)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetCommandOk() (*string, bool)` GetCommandOk returns a tuple with the Command field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCommand -`func (o *WritePluginsCatalogByTypeByNameRequest) SetCommand(v string)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) SetCommand(v string)` SetCommand sets Command field to given value. ### HasCommand -`func (o *WritePluginsCatalogByTypeByNameRequest) HasCommand() bool` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) HasCommand() bool` HasCommand returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasCommand returns a boolean if a field has been set. ### GetEnv -`func (o *WritePluginsCatalogByTypeByNameRequest) GetEnv() []string` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetEnv() []string` GetEnv returns the Env field if non-nil, zero value otherwise. ### GetEnvOk -`func (o *WritePluginsCatalogByTypeByNameRequest) GetEnvOk() (*[]string, bool)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetEnvOk() (*[]string, bool)` GetEnvOk returns a tuple with the Env field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnv -`func (o *WritePluginsCatalogByTypeByNameRequest) SetEnv(v []string)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) SetEnv(v []string)` SetEnv sets Env field to given value. ### HasEnv -`func (o *WritePluginsCatalogByTypeByNameRequest) HasEnv() bool` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) HasEnv() bool` HasEnv returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasEnv returns a boolean if a field has been set. ### GetSha256 -`func (o *WritePluginsCatalogByTypeByNameRequest) GetSha256() string` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetSha256() string` GetSha256 returns the Sha256 field if non-nil, zero value otherwise. ### GetSha256Ok -`func (o *WritePluginsCatalogByTypeByNameRequest) GetSha256Ok() (*string, bool)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetSha256Ok() (*string, bool)` GetSha256Ok returns a tuple with the Sha256 field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSha256 -`func (o *WritePluginsCatalogByTypeByNameRequest) SetSha256(v string)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) SetSha256(v string)` SetSha256 sets Sha256 field to given value. ### HasSha256 -`func (o *WritePluginsCatalogByTypeByNameRequest) HasSha256() bool` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) HasSha256() bool` HasSha256 returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasSha256 returns a boolean if a field has been set. ### GetVersion -`func (o *WritePluginsCatalogByTypeByNameRequest) GetVersion() string` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetVersion() string` GetVersion returns the Version field if non-nil, zero value otherwise. ### GetVersionOk -`func (o *WritePluginsCatalogByTypeByNameRequest) GetVersionOk() (*string, bool)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) GetVersionOk() (*string, bool)` GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVersion -`func (o *WritePluginsCatalogByTypeByNameRequest) SetVersion(v string)` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) SetVersion(v string)` SetVersion sets Version field to given value. ### HasVersion -`func (o *WritePluginsCatalogByTypeByNameRequest) HasVersion() bool` +`func (o *PluginsCatalogRegisterPluginWithTypeRequest) HasVersion() bool` HasVersion returns a boolean if a field has been set. diff --git a/docs/WritePluginsReloadBackendRequest.md b/docs/PluginsReloadBackendsRequest.md similarity index 61% rename from docs/WritePluginsReloadBackendRequest.md rename to docs/PluginsReloadBackendsRequest.md index 0d22e815..d500e536 100644 --- a/docs/WritePluginsReloadBackendRequest.md +++ b/docs/PluginsReloadBackendsRequest.md @@ -1,4 +1,4 @@ -# WritePluginsReloadBackendRequest +# PluginsReloadBackendsRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWritePluginsReloadBackendRequest +### NewPluginsReloadBackendsRequest -`func NewWritePluginsReloadBackendRequest() *WritePluginsReloadBackendRequest` +`func NewPluginsReloadBackendsRequest() *PluginsReloadBackendsRequest` -NewWritePluginsReloadBackendRequest instantiates a new WritePluginsReloadBackendRequest object +NewPluginsReloadBackendsRequest instantiates a new PluginsReloadBackendsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWritePluginsReloadBackendRequestWithDefaults +### NewPluginsReloadBackendsRequestWithDefaults -`func NewWritePluginsReloadBackendRequestWithDefaults() *WritePluginsReloadBackendRequest` +`func NewPluginsReloadBackendsRequestWithDefaults() *PluginsReloadBackendsRequest` -NewWritePluginsReloadBackendRequestWithDefaults instantiates a new WritePluginsReloadBackendRequest object +NewPluginsReloadBackendsRequestWithDefaults instantiates a new PluginsReloadBackendsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMounts -`func (o *WritePluginsReloadBackendRequest) GetMounts() []string` +`func (o *PluginsReloadBackendsRequest) GetMounts() []string` GetMounts returns the Mounts field if non-nil, zero value otherwise. ### GetMountsOk -`func (o *WritePluginsReloadBackendRequest) GetMountsOk() (*[]string, bool)` +`func (o *PluginsReloadBackendsRequest) GetMountsOk() (*[]string, bool)` GetMountsOk returns a tuple with the Mounts field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMounts -`func (o *WritePluginsReloadBackendRequest) SetMounts(v []string)` +`func (o *PluginsReloadBackendsRequest) SetMounts(v []string)` SetMounts sets Mounts field to given value. ### HasMounts -`func (o *WritePluginsReloadBackendRequest) HasMounts() bool` +`func (o *PluginsReloadBackendsRequest) HasMounts() bool` HasMounts returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasMounts returns a boolean if a field has been set. ### GetPlugin -`func (o *WritePluginsReloadBackendRequest) GetPlugin() string` +`func (o *PluginsReloadBackendsRequest) GetPlugin() string` GetPlugin returns the Plugin field if non-nil, zero value otherwise. ### GetPluginOk -`func (o *WritePluginsReloadBackendRequest) GetPluginOk() (*string, bool)` +`func (o *PluginsReloadBackendsRequest) GetPluginOk() (*string, bool)` GetPluginOk returns a tuple with the Plugin field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPlugin -`func (o *WritePluginsReloadBackendRequest) SetPlugin(v string)` +`func (o *PluginsReloadBackendsRequest) SetPlugin(v string)` SetPlugin sets Plugin field to given value. ### HasPlugin -`func (o *WritePluginsReloadBackendRequest) HasPlugin() bool` +`func (o *PluginsReloadBackendsRequest) HasPlugin() bool` HasPlugin returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasPlugin returns a boolean if a field has been set. ### GetScope -`func (o *WritePluginsReloadBackendRequest) GetScope() string` +`func (o *PluginsReloadBackendsRequest) GetScope() string` GetScope returns the Scope field if non-nil, zero value otherwise. ### GetScopeOk -`func (o *WritePluginsReloadBackendRequest) GetScopeOk() (*string, bool)` +`func (o *PluginsReloadBackendsRequest) GetScopeOk() (*string, bool)` GetScopeOk returns a tuple with the Scope field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetScope -`func (o *WritePluginsReloadBackendRequest) SetScope(v string)` +`func (o *PluginsReloadBackendsRequest) SetScope(v string)` SetScope sets Scope field to given value. ### HasScope -`func (o *WritePluginsReloadBackendRequest) HasScope() bool` +`func (o *PluginsReloadBackendsRequest) HasScope() bool` HasScope returns a boolean if a field has been set. diff --git a/docs/PluginsReloadBackendsResponse.md b/docs/PluginsReloadBackendsResponse.md new file mode 100644 index 00000000..9baf581b --- /dev/null +++ b/docs/PluginsReloadBackendsResponse.md @@ -0,0 +1,69 @@ +# PluginsReloadBackendsResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ReloadId** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPluginsReloadBackendsResponse + +`func NewPluginsReloadBackendsResponse() *PluginsReloadBackendsResponse` + +NewPluginsReloadBackendsResponse instantiates a new PluginsReloadBackendsResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPluginsReloadBackendsResponseWithDefaults + +`func NewPluginsReloadBackendsResponseWithDefaults() *PluginsReloadBackendsResponse` + +NewPluginsReloadBackendsResponseWithDefaults instantiates a new PluginsReloadBackendsResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetReloadId + +`func (o *PluginsReloadBackendsResponse) GetReloadId() string` + +GetReloadId returns the ReloadId field if non-nil, zero value otherwise. + +### GetReloadIdOk + +`func (o *PluginsReloadBackendsResponse) GetReloadIdOk() (*string, bool)` + +GetReloadIdOk returns a tuple with the ReloadId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetReloadId + +`func (o *PluginsReloadBackendsResponse) SetReloadId(v string)` + +SetReloadId sets ReloadId field to given value. + + +### HasReloadId + +`func (o *PluginsReloadBackendsResponse) HasReloadId() bool` + +HasReloadId returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PoliciesGeneratePasswordFromPasswordPolicyResponse.md b/docs/PoliciesGeneratePasswordFromPasswordPolicyResponse.md new file mode 100644 index 00000000..e9ae4201 --- /dev/null +++ b/docs/PoliciesGeneratePasswordFromPasswordPolicyResponse.md @@ -0,0 +1,69 @@ +# PoliciesGeneratePasswordFromPasswordPolicyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Password** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPoliciesGeneratePasswordFromPasswordPolicyResponse + +`func NewPoliciesGeneratePasswordFromPasswordPolicyResponse() *PoliciesGeneratePasswordFromPasswordPolicyResponse` + +NewPoliciesGeneratePasswordFromPasswordPolicyResponse instantiates a new PoliciesGeneratePasswordFromPasswordPolicyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPoliciesGeneratePasswordFromPasswordPolicyResponseWithDefaults + +`func NewPoliciesGeneratePasswordFromPasswordPolicyResponseWithDefaults() *PoliciesGeneratePasswordFromPasswordPolicyResponse` + +NewPoliciesGeneratePasswordFromPasswordPolicyResponseWithDefaults instantiates a new PoliciesGeneratePasswordFromPasswordPolicyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetPassword + +`func (o *PoliciesGeneratePasswordFromPasswordPolicyResponse) GetPassword() string` + +GetPassword returns the Password field if non-nil, zero value otherwise. + +### GetPasswordOk + +`func (o *PoliciesGeneratePasswordFromPasswordPolicyResponse) GetPasswordOk() (*string, bool)` + +GetPasswordOk returns a tuple with the Password field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPassword + +`func (o *PoliciesGeneratePasswordFromPasswordPolicyResponse) SetPassword(v string)` + +SetPassword sets Password field to given value. + + +### HasPassword + +`func (o *PoliciesGeneratePasswordFromPasswordPolicyResponse) HasPassword() bool` + +HasPassword returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PoliciesListAclPoliciesResponse.md b/docs/PoliciesListAclPoliciesResponse.md new file mode 100644 index 00000000..db06aab1 --- /dev/null +++ b/docs/PoliciesListAclPoliciesResponse.md @@ -0,0 +1,99 @@ +# PoliciesListAclPoliciesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | | [optional] +**Policies** | Pointer to **[]string** | | [optional] + + + +## Methods + + +### NewPoliciesListAclPoliciesResponse + +`func NewPoliciesListAclPoliciesResponse() *PoliciesListAclPoliciesResponse` + +NewPoliciesListAclPoliciesResponse instantiates a new PoliciesListAclPoliciesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPoliciesListAclPoliciesResponseWithDefaults + +`func NewPoliciesListAclPoliciesResponseWithDefaults() *PoliciesListAclPoliciesResponse` + +NewPoliciesListAclPoliciesResponseWithDefaults instantiates a new PoliciesListAclPoliciesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *PoliciesListAclPoliciesResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PoliciesListAclPoliciesResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PoliciesListAclPoliciesResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PoliciesListAclPoliciesResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + +### GetPolicies + +`func (o *PoliciesListAclPoliciesResponse) GetPolicies() []string` + +GetPolicies returns the Policies field if non-nil, zero value otherwise. + +### GetPoliciesOk + +`func (o *PoliciesListAclPoliciesResponse) GetPoliciesOk() (*[]string, bool)` + +GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicies + +`func (o *PoliciesListAclPoliciesResponse) SetPolicies(v []string)` + +SetPolicies sets Policies field to given value. + + +### HasPolicies + +`func (o *PoliciesListAclPoliciesResponse) HasPolicies() bool` + +HasPolicies returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PoliciesListPasswordPoliciesResponse.md b/docs/PoliciesListPasswordPoliciesResponse.md new file mode 100644 index 00000000..43826b1e --- /dev/null +++ b/docs/PoliciesListPasswordPoliciesResponse.md @@ -0,0 +1,69 @@ +# PoliciesListPasswordPoliciesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | | [optional] + + + +## Methods + + +### NewPoliciesListPasswordPoliciesResponse + +`func NewPoliciesListPasswordPoliciesResponse() *PoliciesListPasswordPoliciesResponse` + +NewPoliciesListPasswordPoliciesResponse instantiates a new PoliciesListPasswordPoliciesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPoliciesListPasswordPoliciesResponseWithDefaults + +`func NewPoliciesListPasswordPoliciesResponseWithDefaults() *PoliciesListPasswordPoliciesResponse` + +NewPoliciesListPasswordPoliciesResponseWithDefaults instantiates a new PoliciesListPasswordPoliciesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *PoliciesListPasswordPoliciesResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PoliciesListPasswordPoliciesResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PoliciesListPasswordPoliciesResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PoliciesListPasswordPoliciesResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PoliciesListResponse.md b/docs/PoliciesListResponse.md new file mode 100644 index 00000000..6cdebe0f --- /dev/null +++ b/docs/PoliciesListResponse.md @@ -0,0 +1,99 @@ +# PoliciesListResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | | [optional] +**Policies** | Pointer to **[]string** | | [optional] + + + +## Methods + + +### NewPoliciesListResponse + +`func NewPoliciesListResponse() *PoliciesListResponse` + +NewPoliciesListResponse instantiates a new PoliciesListResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPoliciesListResponseWithDefaults + +`func NewPoliciesListResponseWithDefaults() *PoliciesListResponse` + +NewPoliciesListResponseWithDefaults instantiates a new PoliciesListResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *PoliciesListResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *PoliciesListResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *PoliciesListResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *PoliciesListResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + +### GetPolicies + +`func (o *PoliciesListResponse) GetPolicies() []string` + +GetPolicies returns the Policies field if non-nil, zero value otherwise. + +### GetPoliciesOk + +`func (o *PoliciesListResponse) GetPoliciesOk() (*[]string, bool)` + +GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicies + +`func (o *PoliciesListResponse) SetPolicies(v []string)` + +SetPolicies sets Policies field to given value. + + +### HasPolicies + +`func (o *PoliciesListResponse) HasPolicies() bool` + +HasPolicies returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PoliciesReadAclPolicy2Response.md b/docs/PoliciesReadAclPolicy2Response.md new file mode 100644 index 00000000..a1ea3614 --- /dev/null +++ b/docs/PoliciesReadAclPolicy2Response.md @@ -0,0 +1,129 @@ +# PoliciesReadAclPolicy2Response + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Name** | Pointer to **string** | | [optional] +**Policy** | Pointer to **string** | | [optional] +**Rules** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPoliciesReadAclPolicy2Response + +`func NewPoliciesReadAclPolicy2Response() *PoliciesReadAclPolicy2Response` + +NewPoliciesReadAclPolicy2Response instantiates a new PoliciesReadAclPolicy2Response object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPoliciesReadAclPolicy2ResponseWithDefaults + +`func NewPoliciesReadAclPolicy2ResponseWithDefaults() *PoliciesReadAclPolicy2Response` + +NewPoliciesReadAclPolicy2ResponseWithDefaults instantiates a new PoliciesReadAclPolicy2Response object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetName + +`func (o *PoliciesReadAclPolicy2Response) GetName() string` + +GetName returns the Name field if non-nil, zero value otherwise. + +### GetNameOk + +`func (o *PoliciesReadAclPolicy2Response) GetNameOk() (*string, bool)` + +GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetName + +`func (o *PoliciesReadAclPolicy2Response) SetName(v string)` + +SetName sets Name field to given value. + + +### HasName + +`func (o *PoliciesReadAclPolicy2Response) HasName() bool` + +HasName returns a boolean if a field has been set. + + + + +### GetPolicy + +`func (o *PoliciesReadAclPolicy2Response) GetPolicy() string` + +GetPolicy returns the Policy field if non-nil, zero value otherwise. + +### GetPolicyOk + +`func (o *PoliciesReadAclPolicy2Response) GetPolicyOk() (*string, bool)` + +GetPolicyOk returns a tuple with the Policy field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicy + +`func (o *PoliciesReadAclPolicy2Response) SetPolicy(v string)` + +SetPolicy sets Policy field to given value. + + +### HasPolicy + +`func (o *PoliciesReadAclPolicy2Response) HasPolicy() bool` + +HasPolicy returns a boolean if a field has been set. + + + + +### GetRules + +`func (o *PoliciesReadAclPolicy2Response) GetRules() string` + +GetRules returns the Rules field if non-nil, zero value otherwise. + +### GetRulesOk + +`func (o *PoliciesReadAclPolicy2Response) GetRulesOk() (*string, bool)` + +GetRulesOk returns a tuple with the Rules field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRules + +`func (o *PoliciesReadAclPolicy2Response) SetRules(v string)` + +SetRules sets Rules field to given value. + + +### HasRules + +`func (o *PoliciesReadAclPolicy2Response) HasRules() bool` + +HasRules returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PoliciesReadAclPolicyResponse.md b/docs/PoliciesReadAclPolicyResponse.md new file mode 100644 index 00000000..0fef6ca4 --- /dev/null +++ b/docs/PoliciesReadAclPolicyResponse.md @@ -0,0 +1,129 @@ +# PoliciesReadAclPolicyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Name** | Pointer to **string** | | [optional] +**Policy** | Pointer to **string** | | [optional] +**Rules** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPoliciesReadAclPolicyResponse + +`func NewPoliciesReadAclPolicyResponse() *PoliciesReadAclPolicyResponse` + +NewPoliciesReadAclPolicyResponse instantiates a new PoliciesReadAclPolicyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPoliciesReadAclPolicyResponseWithDefaults + +`func NewPoliciesReadAclPolicyResponseWithDefaults() *PoliciesReadAclPolicyResponse` + +NewPoliciesReadAclPolicyResponseWithDefaults instantiates a new PoliciesReadAclPolicyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetName + +`func (o *PoliciesReadAclPolicyResponse) GetName() string` + +GetName returns the Name field if non-nil, zero value otherwise. + +### GetNameOk + +`func (o *PoliciesReadAclPolicyResponse) GetNameOk() (*string, bool)` + +GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetName + +`func (o *PoliciesReadAclPolicyResponse) SetName(v string)` + +SetName sets Name field to given value. + + +### HasName + +`func (o *PoliciesReadAclPolicyResponse) HasName() bool` + +HasName returns a boolean if a field has been set. + + + + +### GetPolicy + +`func (o *PoliciesReadAclPolicyResponse) GetPolicy() string` + +GetPolicy returns the Policy field if non-nil, zero value otherwise. + +### GetPolicyOk + +`func (o *PoliciesReadAclPolicyResponse) GetPolicyOk() (*string, bool)` + +GetPolicyOk returns a tuple with the Policy field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicy + +`func (o *PoliciesReadAclPolicyResponse) SetPolicy(v string)` + +SetPolicy sets Policy field to given value. + + +### HasPolicy + +`func (o *PoliciesReadAclPolicyResponse) HasPolicy() bool` + +HasPolicy returns a boolean if a field has been set. + + + + +### GetRules + +`func (o *PoliciesReadAclPolicyResponse) GetRules() string` + +GetRules returns the Rules field if non-nil, zero value otherwise. + +### GetRulesOk + +`func (o *PoliciesReadAclPolicyResponse) GetRulesOk() (*string, bool)` + +GetRulesOk returns a tuple with the Rules field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRules + +`func (o *PoliciesReadAclPolicyResponse) SetRules(v string)` + +SetRules sets Rules field to given value. + + +### HasRules + +`func (o *PoliciesReadAclPolicyResponse) HasRules() bool` + +HasRules returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PoliciesReadPasswordPolicyResponse.md b/docs/PoliciesReadPasswordPolicyResponse.md new file mode 100644 index 00000000..0c75675f --- /dev/null +++ b/docs/PoliciesReadPasswordPolicyResponse.md @@ -0,0 +1,69 @@ +# PoliciesReadPasswordPolicyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Policy** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewPoliciesReadPasswordPolicyResponse + +`func NewPoliciesReadPasswordPolicyResponse() *PoliciesReadPasswordPolicyResponse` + +NewPoliciesReadPasswordPolicyResponse instantiates a new PoliciesReadPasswordPolicyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewPoliciesReadPasswordPolicyResponseWithDefaults + +`func NewPoliciesReadPasswordPolicyResponseWithDefaults() *PoliciesReadPasswordPolicyResponse` + +NewPoliciesReadPasswordPolicyResponseWithDefaults instantiates a new PoliciesReadPasswordPolicyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetPolicy + +`func (o *PoliciesReadPasswordPolicyResponse) GetPolicy() string` + +GetPolicy returns the Policy field if non-nil, zero value otherwise. + +### GetPolicyOk + +`func (o *PoliciesReadPasswordPolicyResponse) GetPolicyOk() (*string, bool)` + +GetPolicyOk returns a tuple with the Policy field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPolicy + +`func (o *PoliciesReadPasswordPolicyResponse) SetPolicy(v string)` + +SetPolicy sets Policy field to given value. + + +### HasPolicy + +`func (o *PoliciesReadPasswordPolicyResponse) HasPolicy() bool` + +HasPolicy returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WritePolicyRequest.md b/docs/PoliciesWriteAclPolicy2Request.md similarity index 61% rename from docs/WritePolicyRequest.md rename to docs/PoliciesWriteAclPolicy2Request.md index 1c05007a..81f2cb35 100644 --- a/docs/WritePolicyRequest.md +++ b/docs/PoliciesWriteAclPolicy2Request.md @@ -1,4 +1,4 @@ -# WritePolicyRequest +# PoliciesWriteAclPolicy2Request ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewWritePolicyRequest +### NewPoliciesWriteAclPolicy2Request -`func NewWritePolicyRequest() *WritePolicyRequest` +`func NewPoliciesWriteAclPolicy2Request() *PoliciesWriteAclPolicy2Request` -NewWritePolicyRequest instantiates a new WritePolicyRequest object +NewPoliciesWriteAclPolicy2Request instantiates a new PoliciesWriteAclPolicy2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWritePolicyRequestWithDefaults +### NewPoliciesWriteAclPolicy2RequestWithDefaults -`func NewWritePolicyRequestWithDefaults() *WritePolicyRequest` +`func NewPoliciesWriteAclPolicy2RequestWithDefaults() *PoliciesWriteAclPolicy2Request` -NewWritePolicyRequestWithDefaults instantiates a new WritePolicyRequest object +NewPoliciesWriteAclPolicy2RequestWithDefaults instantiates a new PoliciesWriteAclPolicy2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPolicy -`func (o *WritePolicyRequest) GetPolicy() string` +`func (o *PoliciesWriteAclPolicy2Request) GetPolicy() string` GetPolicy returns the Policy field if non-nil, zero value otherwise. ### GetPolicyOk -`func (o *WritePolicyRequest) GetPolicyOk() (*string, bool)` +`func (o *PoliciesWriteAclPolicy2Request) GetPolicyOk() (*string, bool)` GetPolicyOk returns a tuple with the Policy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicy -`func (o *WritePolicyRequest) SetPolicy(v string)` +`func (o *PoliciesWriteAclPolicy2Request) SetPolicy(v string)` SetPolicy sets Policy field to given value. ### HasPolicy -`func (o *WritePolicyRequest) HasPolicy() bool` +`func (o *PoliciesWriteAclPolicy2Request) HasPolicy() bool` HasPolicy returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasPolicy returns a boolean if a field has been set. ### GetRules -`func (o *WritePolicyRequest) GetRules() string` +`func (o *PoliciesWriteAclPolicy2Request) GetRules() string` GetRules returns the Rules field if non-nil, zero value otherwise. ### GetRulesOk -`func (o *WritePolicyRequest) GetRulesOk() (*string, bool)` +`func (o *PoliciesWriteAclPolicy2Request) GetRulesOk() (*string, bool)` GetRulesOk returns a tuple with the Rules field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRules -`func (o *WritePolicyRequest) SetRules(v string)` +`func (o *PoliciesWriteAclPolicy2Request) SetRules(v string)` SetRules sets Rules field to given value. ### HasRules -`func (o *WritePolicyRequest) HasRules() bool` +`func (o *PoliciesWriteAclPolicy2Request) HasRules() bool` HasRules returns a boolean if a field has been set. diff --git a/docs/WritePoliciesACLRequest.md b/docs/PoliciesWriteAclPolicyRequest.md similarity index 61% rename from docs/WritePoliciesACLRequest.md rename to docs/PoliciesWriteAclPolicyRequest.md index b2a90854..c8c3ed40 100644 --- a/docs/WritePoliciesACLRequest.md +++ b/docs/PoliciesWriteAclPolicyRequest.md @@ -1,4 +1,4 @@ -# WritePoliciesACLRequest +# PoliciesWriteAclPolicyRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWritePoliciesACLRequest +### NewPoliciesWriteAclPolicyRequest -`func NewWritePoliciesACLRequest() *WritePoliciesACLRequest` +`func NewPoliciesWriteAclPolicyRequest() *PoliciesWriteAclPolicyRequest` -NewWritePoliciesACLRequest instantiates a new WritePoliciesACLRequest object +NewPoliciesWriteAclPolicyRequest instantiates a new PoliciesWriteAclPolicyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWritePoliciesACLRequestWithDefaults +### NewPoliciesWriteAclPolicyRequestWithDefaults -`func NewWritePoliciesACLRequestWithDefaults() *WritePoliciesACLRequest` +`func NewPoliciesWriteAclPolicyRequestWithDefaults() *PoliciesWriteAclPolicyRequest` -NewWritePoliciesACLRequestWithDefaults instantiates a new WritePoliciesACLRequest object +NewPoliciesWriteAclPolicyRequestWithDefaults instantiates a new PoliciesWriteAclPolicyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPolicy -`func (o *WritePoliciesACLRequest) GetPolicy() string` +`func (o *PoliciesWriteAclPolicyRequest) GetPolicy() string` GetPolicy returns the Policy field if non-nil, zero value otherwise. ### GetPolicyOk -`func (o *WritePoliciesACLRequest) GetPolicyOk() (*string, bool)` +`func (o *PoliciesWriteAclPolicyRequest) GetPolicyOk() (*string, bool)` GetPolicyOk returns a tuple with the Policy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicy -`func (o *WritePoliciesACLRequest) SetPolicy(v string)` +`func (o *PoliciesWriteAclPolicyRequest) SetPolicy(v string)` SetPolicy sets Policy field to given value. ### HasPolicy -`func (o *WritePoliciesACLRequest) HasPolicy() bool` +`func (o *PoliciesWriteAclPolicyRequest) HasPolicy() bool` HasPolicy returns a boolean if a field has been set. diff --git a/docs/WritePoliciesPasswordRequest.md b/docs/PoliciesWritePasswordPolicyRequest.md similarity index 58% rename from docs/WritePoliciesPasswordRequest.md rename to docs/PoliciesWritePasswordPolicyRequest.md index 25e51155..7182a961 100644 --- a/docs/WritePoliciesPasswordRequest.md +++ b/docs/PoliciesWritePasswordPolicyRequest.md @@ -1,4 +1,4 @@ -# WritePoliciesPasswordRequest +# PoliciesWritePasswordPolicyRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWritePoliciesPasswordRequest +### NewPoliciesWritePasswordPolicyRequest -`func NewWritePoliciesPasswordRequest() *WritePoliciesPasswordRequest` +`func NewPoliciesWritePasswordPolicyRequest() *PoliciesWritePasswordPolicyRequest` -NewWritePoliciesPasswordRequest instantiates a new WritePoliciesPasswordRequest object +NewPoliciesWritePasswordPolicyRequest instantiates a new PoliciesWritePasswordPolicyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWritePoliciesPasswordRequestWithDefaults +### NewPoliciesWritePasswordPolicyRequestWithDefaults -`func NewWritePoliciesPasswordRequestWithDefaults() *WritePoliciesPasswordRequest` +`func NewPoliciesWritePasswordPolicyRequestWithDefaults() *PoliciesWritePasswordPolicyRequest` -NewWritePoliciesPasswordRequestWithDefaults instantiates a new WritePoliciesPasswordRequest object +NewPoliciesWritePasswordPolicyRequestWithDefaults instantiates a new PoliciesWritePasswordPolicyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPolicy -`func (o *WritePoliciesPasswordRequest) GetPolicy() string` +`func (o *PoliciesWritePasswordPolicyRequest) GetPolicy() string` GetPolicy returns the Policy field if non-nil, zero value otherwise. ### GetPolicyOk -`func (o *WritePoliciesPasswordRequest) GetPolicyOk() (*string, bool)` +`func (o *PoliciesWritePasswordPolicyRequest) GetPolicyOk() (*string, bool)` GetPolicyOk returns a tuple with the Policy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicy -`func (o *WritePoliciesPasswordRequest) SetPolicy(v string)` +`func (o *PoliciesWritePasswordPolicyRequest) SetPolicy(v string)` SetPolicy sets Policy field to given value. ### HasPolicy -`func (o *WritePoliciesPasswordRequest) HasPolicy() bool` +`func (o *PoliciesWritePasswordPolicyRequest) HasPolicy() bool` HasPolicy returns a boolean if a field has been set. diff --git a/docs/WriteCapabilitiesAccessorRequest.md b/docs/QueryTokenAccessorCapabilitiesRequest.md similarity index 59% rename from docs/WriteCapabilitiesAccessorRequest.md rename to docs/QueryTokenAccessorCapabilitiesRequest.md index 340c8894..8da11dd2 100644 --- a/docs/WriteCapabilitiesAccessorRequest.md +++ b/docs/QueryTokenAccessorCapabilitiesRequest.md @@ -1,4 +1,4 @@ -# WriteCapabilitiesAccessorRequest +# QueryTokenAccessorCapabilitiesRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteCapabilitiesAccessorRequest +### NewQueryTokenAccessorCapabilitiesRequest -`func NewWriteCapabilitiesAccessorRequest() *WriteCapabilitiesAccessorRequest` +`func NewQueryTokenAccessorCapabilitiesRequest() *QueryTokenAccessorCapabilitiesRequest` -NewWriteCapabilitiesAccessorRequest instantiates a new WriteCapabilitiesAccessorRequest object +NewQueryTokenAccessorCapabilitiesRequest instantiates a new QueryTokenAccessorCapabilitiesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteCapabilitiesAccessorRequestWithDefaults +### NewQueryTokenAccessorCapabilitiesRequestWithDefaults -`func NewWriteCapabilitiesAccessorRequestWithDefaults() *WriteCapabilitiesAccessorRequest` +`func NewQueryTokenAccessorCapabilitiesRequestWithDefaults() *QueryTokenAccessorCapabilitiesRequest` -NewWriteCapabilitiesAccessorRequestWithDefaults instantiates a new WriteCapabilitiesAccessorRequest object +NewQueryTokenAccessorCapabilitiesRequestWithDefaults instantiates a new QueryTokenAccessorCapabilitiesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAccessor -`func (o *WriteCapabilitiesAccessorRequest) GetAccessor() string` +`func (o *QueryTokenAccessorCapabilitiesRequest) GetAccessor() string` GetAccessor returns the Accessor field if non-nil, zero value otherwise. ### GetAccessorOk -`func (o *WriteCapabilitiesAccessorRequest) GetAccessorOk() (*string, bool)` +`func (o *QueryTokenAccessorCapabilitiesRequest) GetAccessorOk() (*string, bool)` GetAccessorOk returns a tuple with the Accessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAccessor -`func (o *WriteCapabilitiesAccessorRequest) SetAccessor(v string)` +`func (o *QueryTokenAccessorCapabilitiesRequest) SetAccessor(v string)` SetAccessor sets Accessor field to given value. ### HasAccessor -`func (o *WriteCapabilitiesAccessorRequest) HasAccessor() bool` +`func (o *QueryTokenAccessorCapabilitiesRequest) HasAccessor() bool` HasAccessor returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAccessor returns a boolean if a field has been set. ### GetPath -`func (o *WriteCapabilitiesAccessorRequest) GetPath() []string` +`func (o *QueryTokenAccessorCapabilitiesRequest) GetPath() []string` GetPath returns the Path field if non-nil, zero value otherwise. ### GetPathOk -`func (o *WriteCapabilitiesAccessorRequest) GetPathOk() (*[]string, bool)` +`func (o *QueryTokenAccessorCapabilitiesRequest) GetPathOk() (*[]string, bool)` GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPath -`func (o *WriteCapabilitiesAccessorRequest) SetPath(v []string)` +`func (o *QueryTokenAccessorCapabilitiesRequest) SetPath(v []string)` SetPath sets Path field to given value. ### HasPath -`func (o *WriteCapabilitiesAccessorRequest) HasPath() bool` +`func (o *QueryTokenAccessorCapabilitiesRequest) HasPath() bool` HasPath returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasPath returns a boolean if a field has been set. ### GetPaths -`func (o *WriteCapabilitiesAccessorRequest) GetPaths() []string` +`func (o *QueryTokenAccessorCapabilitiesRequest) GetPaths() []string` GetPaths returns the Paths field if non-nil, zero value otherwise. ### GetPathsOk -`func (o *WriteCapabilitiesAccessorRequest) GetPathsOk() (*[]string, bool)` +`func (o *QueryTokenAccessorCapabilitiesRequest) GetPathsOk() (*[]string, bool)` GetPathsOk returns a tuple with the Paths field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPaths -`func (o *WriteCapabilitiesAccessorRequest) SetPaths(v []string)` +`func (o *QueryTokenAccessorCapabilitiesRequest) SetPaths(v []string)` SetPaths sets Paths field to given value. ### HasPaths -`func (o *WriteCapabilitiesAccessorRequest) HasPaths() bool` +`func (o *QueryTokenAccessorCapabilitiesRequest) HasPaths() bool` HasPaths returns a boolean if a field has been set. diff --git a/docs/WriteCapabilitiesSelfRequest.md b/docs/QueryTokenCapabilitiesRequest.md similarity index 62% rename from docs/WriteCapabilitiesSelfRequest.md rename to docs/QueryTokenCapabilitiesRequest.md index 9fd30976..4ed08a96 100644 --- a/docs/WriteCapabilitiesSelfRequest.md +++ b/docs/QueryTokenCapabilitiesRequest.md @@ -1,4 +1,4 @@ -# WriteCapabilitiesSelfRequest +# QueryTokenCapabilitiesRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteCapabilitiesSelfRequest +### NewQueryTokenCapabilitiesRequest -`func NewWriteCapabilitiesSelfRequest() *WriteCapabilitiesSelfRequest` +`func NewQueryTokenCapabilitiesRequest() *QueryTokenCapabilitiesRequest` -NewWriteCapabilitiesSelfRequest instantiates a new WriteCapabilitiesSelfRequest object +NewQueryTokenCapabilitiesRequest instantiates a new QueryTokenCapabilitiesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteCapabilitiesSelfRequestWithDefaults +### NewQueryTokenCapabilitiesRequestWithDefaults -`func NewWriteCapabilitiesSelfRequestWithDefaults() *WriteCapabilitiesSelfRequest` +`func NewQueryTokenCapabilitiesRequestWithDefaults() *QueryTokenCapabilitiesRequest` -NewWriteCapabilitiesSelfRequestWithDefaults instantiates a new WriteCapabilitiesSelfRequest object +NewQueryTokenCapabilitiesRequestWithDefaults instantiates a new QueryTokenCapabilitiesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPath -`func (o *WriteCapabilitiesSelfRequest) GetPath() []string` +`func (o *QueryTokenCapabilitiesRequest) GetPath() []string` GetPath returns the Path field if non-nil, zero value otherwise. ### GetPathOk -`func (o *WriteCapabilitiesSelfRequest) GetPathOk() (*[]string, bool)` +`func (o *QueryTokenCapabilitiesRequest) GetPathOk() (*[]string, bool)` GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPath -`func (o *WriteCapabilitiesSelfRequest) SetPath(v []string)` +`func (o *QueryTokenCapabilitiesRequest) SetPath(v []string)` SetPath sets Path field to given value. ### HasPath -`func (o *WriteCapabilitiesSelfRequest) HasPath() bool` +`func (o *QueryTokenCapabilitiesRequest) HasPath() bool` HasPath returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasPath returns a boolean if a field has been set. ### GetPaths -`func (o *WriteCapabilitiesSelfRequest) GetPaths() []string` +`func (o *QueryTokenCapabilitiesRequest) GetPaths() []string` GetPaths returns the Paths field if non-nil, zero value otherwise. ### GetPathsOk -`func (o *WriteCapabilitiesSelfRequest) GetPathsOk() (*[]string, bool)` +`func (o *QueryTokenCapabilitiesRequest) GetPathsOk() (*[]string, bool)` GetPathsOk returns a tuple with the Paths field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPaths -`func (o *WriteCapabilitiesSelfRequest) SetPaths(v []string)` +`func (o *QueryTokenCapabilitiesRequest) SetPaths(v []string)` SetPaths sets Paths field to given value. ### HasPaths -`func (o *WriteCapabilitiesSelfRequest) HasPaths() bool` +`func (o *QueryTokenCapabilitiesRequest) HasPaths() bool` HasPaths returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasPaths returns a boolean if a field has been set. ### GetToken -`func (o *WriteCapabilitiesSelfRequest) GetToken() string` +`func (o *QueryTokenCapabilitiesRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *WriteCapabilitiesSelfRequest) GetTokenOk() (*string, bool)` +`func (o *QueryTokenCapabilitiesRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *WriteCapabilitiesSelfRequest) SetToken(v string)` +`func (o *QueryTokenCapabilitiesRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *WriteCapabilitiesSelfRequest) HasToken() bool` +`func (o *QueryTokenCapabilitiesRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/WriteCapabilitiesRequest.md b/docs/QueryTokenSelfCapabilitiesRequest.md similarity index 60% rename from docs/WriteCapabilitiesRequest.md rename to docs/QueryTokenSelfCapabilitiesRequest.md index 35b7a768..66499b24 100644 --- a/docs/WriteCapabilitiesRequest.md +++ b/docs/QueryTokenSelfCapabilitiesRequest.md @@ -1,4 +1,4 @@ -# WriteCapabilitiesRequest +# QueryTokenSelfCapabilitiesRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteCapabilitiesRequest +### NewQueryTokenSelfCapabilitiesRequest -`func NewWriteCapabilitiesRequest() *WriteCapabilitiesRequest` +`func NewQueryTokenSelfCapabilitiesRequest() *QueryTokenSelfCapabilitiesRequest` -NewWriteCapabilitiesRequest instantiates a new WriteCapabilitiesRequest object +NewQueryTokenSelfCapabilitiesRequest instantiates a new QueryTokenSelfCapabilitiesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteCapabilitiesRequestWithDefaults +### NewQueryTokenSelfCapabilitiesRequestWithDefaults -`func NewWriteCapabilitiesRequestWithDefaults() *WriteCapabilitiesRequest` +`func NewQueryTokenSelfCapabilitiesRequestWithDefaults() *QueryTokenSelfCapabilitiesRequest` -NewWriteCapabilitiesRequestWithDefaults instantiates a new WriteCapabilitiesRequest object +NewQueryTokenSelfCapabilitiesRequestWithDefaults instantiates a new QueryTokenSelfCapabilitiesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPath -`func (o *WriteCapabilitiesRequest) GetPath() []string` +`func (o *QueryTokenSelfCapabilitiesRequest) GetPath() []string` GetPath returns the Path field if non-nil, zero value otherwise. ### GetPathOk -`func (o *WriteCapabilitiesRequest) GetPathOk() (*[]string, bool)` +`func (o *QueryTokenSelfCapabilitiesRequest) GetPathOk() (*[]string, bool)` GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPath -`func (o *WriteCapabilitiesRequest) SetPath(v []string)` +`func (o *QueryTokenSelfCapabilitiesRequest) SetPath(v []string)` SetPath sets Path field to given value. ### HasPath -`func (o *WriteCapabilitiesRequest) HasPath() bool` +`func (o *QueryTokenSelfCapabilitiesRequest) HasPath() bool` HasPath returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasPath returns a boolean if a field has been set. ### GetPaths -`func (o *WriteCapabilitiesRequest) GetPaths() []string` +`func (o *QueryTokenSelfCapabilitiesRequest) GetPaths() []string` GetPaths returns the Paths field if non-nil, zero value otherwise. ### GetPathsOk -`func (o *WriteCapabilitiesRequest) GetPathsOk() (*[]string, bool)` +`func (o *QueryTokenSelfCapabilitiesRequest) GetPathsOk() (*[]string, bool)` GetPathsOk returns a tuple with the Paths field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPaths -`func (o *WriteCapabilitiesRequest) SetPaths(v []string)` +`func (o *QueryTokenSelfCapabilitiesRequest) SetPaths(v []string)` SetPaths sets Paths field to given value. ### HasPaths -`func (o *WriteCapabilitiesRequest) HasPaths() bool` +`func (o *QueryTokenSelfCapabilitiesRequest) HasPaths() bool` HasPaths returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasPaths returns a boolean if a field has been set. ### GetToken -`func (o *WriteCapabilitiesRequest) GetToken() string` +`func (o *QueryTokenSelfCapabilitiesRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *WriteCapabilitiesRequest) GetTokenOk() (*string, bool)` +`func (o *QueryTokenSelfCapabilitiesRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *WriteCapabilitiesRequest) SetToken(v string)` +`func (o *QueryTokenSelfCapabilitiesRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *WriteCapabilitiesRequest) HasToken() bool` +`func (o *QueryTokenSelfCapabilitiesRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/RabbitMQWriteRoleRequest.md b/docs/RabbitMQWriteRoleRequest.md index c4184116..47983a92 100644 --- a/docs/RabbitMQWriteRoleRequest.md +++ b/docs/RabbitMQWriteRoleRequest.md @@ -1,4 +1,4 @@ -# RabbitMQWriteRoleRequest +# RabbitMqWriteRoleRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewRabbitMQWriteRoleRequest +### NewRabbitMqWriteRoleRequest -`func NewRabbitMQWriteRoleRequest() *RabbitMQWriteRoleRequest` +`func NewRabbitMqWriteRoleRequest() *RabbitMqWriteRoleRequest` -NewRabbitMQWriteRoleRequest instantiates a new RabbitMQWriteRoleRequest object +NewRabbitMqWriteRoleRequest instantiates a new RabbitMqWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRabbitMQWriteRoleRequestWithDefaults +### NewRabbitMqWriteRoleRequestWithDefaults -`func NewRabbitMQWriteRoleRequestWithDefaults() *RabbitMQWriteRoleRequest` +`func NewRabbitMqWriteRoleRequestWithDefaults() *RabbitMqWriteRoleRequest` -NewRabbitMQWriteRoleRequestWithDefaults instantiates a new RabbitMQWriteRoleRequest object +NewRabbitMqWriteRoleRequestWithDefaults instantiates a new RabbitMqWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetTags -`func (o *RabbitMQWriteRoleRequest) GetTags() string` +`func (o *RabbitMqWriteRoleRequest) GetTags() string` GetTags returns the Tags field if non-nil, zero value otherwise. ### GetTagsOk -`func (o *RabbitMQWriteRoleRequest) GetTagsOk() (*string, bool)` +`func (o *RabbitMqWriteRoleRequest) GetTagsOk() (*string, bool)` GetTagsOk returns a tuple with the Tags field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTags -`func (o *RabbitMQWriteRoleRequest) SetTags(v string)` +`func (o *RabbitMqWriteRoleRequest) SetTags(v string)` SetTags sets Tags field to given value. ### HasTags -`func (o *RabbitMQWriteRoleRequest) HasTags() bool` +`func (o *RabbitMqWriteRoleRequest) HasTags() bool` HasTags returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasTags returns a boolean if a field has been set. ### GetVhostTopics -`func (o *RabbitMQWriteRoleRequest) GetVhostTopics() string` +`func (o *RabbitMqWriteRoleRequest) GetVhostTopics() string` GetVhostTopics returns the VhostTopics field if non-nil, zero value otherwise. ### GetVhostTopicsOk -`func (o *RabbitMQWriteRoleRequest) GetVhostTopicsOk() (*string, bool)` +`func (o *RabbitMqWriteRoleRequest) GetVhostTopicsOk() (*string, bool)` GetVhostTopicsOk returns a tuple with the VhostTopics field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVhostTopics -`func (o *RabbitMQWriteRoleRequest) SetVhostTopics(v string)` +`func (o *RabbitMqWriteRoleRequest) SetVhostTopics(v string)` SetVhostTopics sets VhostTopics field to given value. ### HasVhostTopics -`func (o *RabbitMQWriteRoleRequest) HasVhostTopics() bool` +`func (o *RabbitMqWriteRoleRequest) HasVhostTopics() bool` HasVhostTopics returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasVhostTopics returns a boolean if a field has been set. ### GetVhosts -`func (o *RabbitMQWriteRoleRequest) GetVhosts() string` +`func (o *RabbitMqWriteRoleRequest) GetVhosts() string` GetVhosts returns the Vhosts field if non-nil, zero value otherwise. ### GetVhostsOk -`func (o *RabbitMQWriteRoleRequest) GetVhostsOk() (*string, bool)` +`func (o *RabbitMqWriteRoleRequest) GetVhostsOk() (*string, bool)` GetVhostsOk returns a tuple with the Vhosts field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVhosts -`func (o *RabbitMQWriteRoleRequest) SetVhosts(v string)` +`func (o *RabbitMqWriteRoleRequest) SetVhosts(v string)` SetVhosts sets Vhosts field to given value. ### HasVhosts -`func (o *RabbitMQWriteRoleRequest) HasVhosts() bool` +`func (o *RabbitMqWriteRoleRequest) HasVhosts() bool` HasVhosts returns a boolean if a field has been set. diff --git a/docs/RabbitMQWriteConnectionConfigRequest.md b/docs/RabbitMqConfigureConnectionRequest.md similarity index 63% rename from docs/RabbitMQWriteConnectionConfigRequest.md rename to docs/RabbitMqConfigureConnectionRequest.md index 5c33be56..84ad4754 100644 --- a/docs/RabbitMQWriteConnectionConfigRequest.md +++ b/docs/RabbitMqConfigureConnectionRequest.md @@ -1,4 +1,4 @@ -# RabbitMQWriteConnectionConfigRequest +# RabbitMqConfigureConnectionRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewRabbitMQWriteConnectionConfigRequest +### NewRabbitMqConfigureConnectionRequest -`func NewRabbitMQWriteConnectionConfigRequest() *RabbitMQWriteConnectionConfigRequest` +`func NewRabbitMqConfigureConnectionRequest() *RabbitMqConfigureConnectionRequest` -NewRabbitMQWriteConnectionConfigRequest instantiates a new RabbitMQWriteConnectionConfigRequest object +NewRabbitMqConfigureConnectionRequest instantiates a new RabbitMqConfigureConnectionRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRabbitMQWriteConnectionConfigRequestWithDefaults +### NewRabbitMqConfigureConnectionRequestWithDefaults -`func NewRabbitMQWriteConnectionConfigRequestWithDefaults() *RabbitMQWriteConnectionConfigRequest` +`func NewRabbitMqConfigureConnectionRequestWithDefaults() *RabbitMqConfigureConnectionRequest` -NewRabbitMQWriteConnectionConfigRequestWithDefaults instantiates a new RabbitMQWriteConnectionConfigRequest object +NewRabbitMqConfigureConnectionRequestWithDefaults instantiates a new RabbitMqConfigureConnectionRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetConnectionUri -`func (o *RabbitMQWriteConnectionConfigRequest) GetConnectionUri() string` +`func (o *RabbitMqConfigureConnectionRequest) GetConnectionUri() string` GetConnectionUri returns the ConnectionUri field if non-nil, zero value otherwise. ### GetConnectionUriOk -`func (o *RabbitMQWriteConnectionConfigRequest) GetConnectionUriOk() (*string, bool)` +`func (o *RabbitMqConfigureConnectionRequest) GetConnectionUriOk() (*string, bool)` GetConnectionUriOk returns a tuple with the ConnectionUri field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetConnectionUri -`func (o *RabbitMQWriteConnectionConfigRequest) SetConnectionUri(v string)` +`func (o *RabbitMqConfigureConnectionRequest) SetConnectionUri(v string)` SetConnectionUri sets ConnectionUri field to given value. ### HasConnectionUri -`func (o *RabbitMQWriteConnectionConfigRequest) HasConnectionUri() bool` +`func (o *RabbitMqConfigureConnectionRequest) HasConnectionUri() bool` HasConnectionUri returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasConnectionUri returns a boolean if a field has been set. ### GetPassword -`func (o *RabbitMQWriteConnectionConfigRequest) GetPassword() string` +`func (o *RabbitMqConfigureConnectionRequest) GetPassword() string` GetPassword returns the Password field if non-nil, zero value otherwise. ### GetPasswordOk -`func (o *RabbitMQWriteConnectionConfigRequest) GetPasswordOk() (*string, bool)` +`func (o *RabbitMqConfigureConnectionRequest) GetPasswordOk() (*string, bool)` GetPasswordOk returns a tuple with the Password field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPassword -`func (o *RabbitMQWriteConnectionConfigRequest) SetPassword(v string)` +`func (o *RabbitMqConfigureConnectionRequest) SetPassword(v string)` SetPassword sets Password field to given value. ### HasPassword -`func (o *RabbitMQWriteConnectionConfigRequest) HasPassword() bool` +`func (o *RabbitMqConfigureConnectionRequest) HasPassword() bool` HasPassword returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasPassword returns a boolean if a field has been set. ### GetPasswordPolicy -`func (o *RabbitMQWriteConnectionConfigRequest) GetPasswordPolicy() string` +`func (o *RabbitMqConfigureConnectionRequest) GetPasswordPolicy() string` GetPasswordPolicy returns the PasswordPolicy field if non-nil, zero value otherwise. ### GetPasswordPolicyOk -`func (o *RabbitMQWriteConnectionConfigRequest) GetPasswordPolicyOk() (*string, bool)` +`func (o *RabbitMqConfigureConnectionRequest) GetPasswordPolicyOk() (*string, bool)` GetPasswordPolicyOk returns a tuple with the PasswordPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPasswordPolicy -`func (o *RabbitMQWriteConnectionConfigRequest) SetPasswordPolicy(v string)` +`func (o *RabbitMqConfigureConnectionRequest) SetPasswordPolicy(v string)` SetPasswordPolicy sets PasswordPolicy field to given value. ### HasPasswordPolicy -`func (o *RabbitMQWriteConnectionConfigRequest) HasPasswordPolicy() bool` +`func (o *RabbitMqConfigureConnectionRequest) HasPasswordPolicy() bool` HasPasswordPolicy returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasPasswordPolicy returns a boolean if a field has been set. ### GetUsername -`func (o *RabbitMQWriteConnectionConfigRequest) GetUsername() string` +`func (o *RabbitMqConfigureConnectionRequest) GetUsername() string` GetUsername returns the Username field if non-nil, zero value otherwise. ### GetUsernameOk -`func (o *RabbitMQWriteConnectionConfigRequest) GetUsernameOk() (*string, bool)` +`func (o *RabbitMqConfigureConnectionRequest) GetUsernameOk() (*string, bool)` GetUsernameOk returns a tuple with the Username field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsername -`func (o *RabbitMQWriteConnectionConfigRequest) SetUsername(v string)` +`func (o *RabbitMqConfigureConnectionRequest) SetUsername(v string)` SetUsername sets Username field to given value. ### HasUsername -`func (o *RabbitMQWriteConnectionConfigRequest) HasUsername() bool` +`func (o *RabbitMqConfigureConnectionRequest) HasUsername() bool` HasUsername returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasUsername returns a boolean if a field has been set. ### GetUsernameTemplate -`func (o *RabbitMQWriteConnectionConfigRequest) GetUsernameTemplate() string` +`func (o *RabbitMqConfigureConnectionRequest) GetUsernameTemplate() string` GetUsernameTemplate returns the UsernameTemplate field if non-nil, zero value otherwise. ### GetUsernameTemplateOk -`func (o *RabbitMQWriteConnectionConfigRequest) GetUsernameTemplateOk() (*string, bool)` +`func (o *RabbitMqConfigureConnectionRequest) GetUsernameTemplateOk() (*string, bool)` GetUsernameTemplateOk returns a tuple with the UsernameTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsernameTemplate -`func (o *RabbitMQWriteConnectionConfigRequest) SetUsernameTemplate(v string)` +`func (o *RabbitMqConfigureConnectionRequest) SetUsernameTemplate(v string)` SetUsernameTemplate sets UsernameTemplate field to given value. ### HasUsernameTemplate -`func (o *RabbitMQWriteConnectionConfigRequest) HasUsernameTemplate() bool` +`func (o *RabbitMqConfigureConnectionRequest) HasUsernameTemplate() bool` HasUsernameTemplate returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasUsernameTemplate returns a boolean if a field has been set. ### GetVerifyConnection -`func (o *RabbitMQWriteConnectionConfigRequest) GetVerifyConnection() bool` +`func (o *RabbitMqConfigureConnectionRequest) GetVerifyConnection() bool` GetVerifyConnection returns the VerifyConnection field if non-nil, zero value otherwise. ### GetVerifyConnectionOk -`func (o *RabbitMQWriteConnectionConfigRequest) GetVerifyConnectionOk() (*bool, bool)` +`func (o *RabbitMqConfigureConnectionRequest) GetVerifyConnectionOk() (*bool, bool)` GetVerifyConnectionOk returns a tuple with the VerifyConnection field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetVerifyConnection -`func (o *RabbitMQWriteConnectionConfigRequest) SetVerifyConnection(v bool)` +`func (o *RabbitMqConfigureConnectionRequest) SetVerifyConnection(v bool)` SetVerifyConnection sets VerifyConnection field to given value. ### HasVerifyConnection -`func (o *RabbitMQWriteConnectionConfigRequest) HasVerifyConnection() bool` +`func (o *RabbitMqConfigureConnectionRequest) HasVerifyConnection() bool` HasVerifyConnection returns a boolean if a field has been set. diff --git a/docs/RabbitMQWriteLeaseConfigRequest.md b/docs/RabbitMqConfigureLeaseRequest.md similarity index 62% rename from docs/RabbitMQWriteLeaseConfigRequest.md rename to docs/RabbitMqConfigureLeaseRequest.md index ad6733b7..1a2c79fe 100644 --- a/docs/RabbitMQWriteLeaseConfigRequest.md +++ b/docs/RabbitMqConfigureLeaseRequest.md @@ -1,4 +1,4 @@ -# RabbitMQWriteLeaseConfigRequest +# RabbitMqConfigureLeaseRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewRabbitMQWriteLeaseConfigRequest +### NewRabbitMqConfigureLeaseRequest -`func NewRabbitMQWriteLeaseConfigRequest() *RabbitMQWriteLeaseConfigRequest` +`func NewRabbitMqConfigureLeaseRequest() *RabbitMqConfigureLeaseRequest` -NewRabbitMQWriteLeaseConfigRequest instantiates a new RabbitMQWriteLeaseConfigRequest object +NewRabbitMqConfigureLeaseRequest instantiates a new RabbitMqConfigureLeaseRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRabbitMQWriteLeaseConfigRequestWithDefaults +### NewRabbitMqConfigureLeaseRequestWithDefaults -`func NewRabbitMQWriteLeaseConfigRequestWithDefaults() *RabbitMQWriteLeaseConfigRequest` +`func NewRabbitMqConfigureLeaseRequestWithDefaults() *RabbitMqConfigureLeaseRequest` -NewRabbitMQWriteLeaseConfigRequestWithDefaults instantiates a new RabbitMQWriteLeaseConfigRequest object +NewRabbitMqConfigureLeaseRequestWithDefaults instantiates a new RabbitMqConfigureLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMaxTtl -`func (o *RabbitMQWriteLeaseConfigRequest) GetMaxTtl() int32` +`func (o *RabbitMqConfigureLeaseRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *RabbitMQWriteLeaseConfigRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *RabbitMqConfigureLeaseRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *RabbitMQWriteLeaseConfigRequest) SetMaxTtl(v int32)` +`func (o *RabbitMqConfigureLeaseRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *RabbitMQWriteLeaseConfigRequest) HasMaxTtl() bool` +`func (o *RabbitMqConfigureLeaseRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetTtl -`func (o *RabbitMQWriteLeaseConfigRequest) GetTtl() int32` +`func (o *RabbitMqConfigureLeaseRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *RabbitMQWriteLeaseConfigRequest) GetTtlOk() (*int32, bool)` +`func (o *RabbitMqConfigureLeaseRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *RabbitMQWriteLeaseConfigRequest) SetTtl(v int32)` +`func (o *RabbitMqConfigureLeaseRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *RabbitMQWriteLeaseConfigRequest) HasTtl() bool` +`func (o *RabbitMqConfigureLeaseRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/RadiusWriteConfigRequest.md b/docs/RadiusConfigureRequest.md similarity index 69% rename from docs/RadiusWriteConfigRequest.md rename to docs/RadiusConfigureRequest.md index 3b154e02..b206838e 100644 --- a/docs/RadiusWriteConfigRequest.md +++ b/docs/RadiusConfigureRequest.md @@ -1,4 +1,4 @@ -# RadiusWriteConfigRequest +# RadiusConfigureRequest ## Properties @@ -21,54 +21,54 @@ Name | Type | Description | Notes **TokenPolicies** | Pointer to **[]string** | Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any configured for specific users. | [optional] **TokenTtl** | Pointer to **int32** | The initial ttl of the token to generate | [optional] **TokenType** | Pointer to **string** | The type of token to generate, service or batch | [optional] [default to "default-service"] -**UnregisteredUserPolicies** | Pointer to **string** | Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: empty) | [optional] [default to ""] +**UnregisteredUserPolicies** | Pointer to **string** | Comma-separated list of policies to grant upon successful RADIUS authentication of an unregistered user (default: empty) | [optional] [default to ""] ## Methods -### NewRadiusWriteConfigRequest +### NewRadiusConfigureRequest -`func NewRadiusWriteConfigRequest() *RadiusWriteConfigRequest` +`func NewRadiusConfigureRequest() *RadiusConfigureRequest` -NewRadiusWriteConfigRequest instantiates a new RadiusWriteConfigRequest object +NewRadiusConfigureRequest instantiates a new RadiusConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewRadiusWriteConfigRequestWithDefaults +### NewRadiusConfigureRequestWithDefaults -`func NewRadiusWriteConfigRequestWithDefaults() *RadiusWriteConfigRequest` +`func NewRadiusConfigureRequestWithDefaults() *RadiusConfigureRequest` -NewRadiusWriteConfigRequestWithDefaults instantiates a new RadiusWriteConfigRequest object +NewRadiusConfigureRequestWithDefaults instantiates a new RadiusConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDialTimeout -`func (o *RadiusWriteConfigRequest) GetDialTimeout() int32` +`func (o *RadiusConfigureRequest) GetDialTimeout() int32` GetDialTimeout returns the DialTimeout field if non-nil, zero value otherwise. ### GetDialTimeoutOk -`func (o *RadiusWriteConfigRequest) GetDialTimeoutOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetDialTimeoutOk() (*int32, bool)` GetDialTimeoutOk returns a tuple with the DialTimeout field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDialTimeout -`func (o *RadiusWriteConfigRequest) SetDialTimeout(v int32)` +`func (o *RadiusConfigureRequest) SetDialTimeout(v int32)` SetDialTimeout sets DialTimeout field to given value. ### HasDialTimeout -`func (o *RadiusWriteConfigRequest) HasDialTimeout() bool` +`func (o *RadiusConfigureRequest) HasDialTimeout() bool` HasDialTimeout returns a boolean if a field has been set. @@ -77,27 +77,27 @@ HasDialTimeout returns a boolean if a field has been set. ### GetHost -`func (o *RadiusWriteConfigRequest) GetHost() string` +`func (o *RadiusConfigureRequest) GetHost() string` GetHost returns the Host field if non-nil, zero value otherwise. ### GetHostOk -`func (o *RadiusWriteConfigRequest) GetHostOk() (*string, bool)` +`func (o *RadiusConfigureRequest) GetHostOk() (*string, bool)` GetHostOk returns a tuple with the Host field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetHost -`func (o *RadiusWriteConfigRequest) SetHost(v string)` +`func (o *RadiusConfigureRequest) SetHost(v string)` SetHost sets Host field to given value. ### HasHost -`func (o *RadiusWriteConfigRequest) HasHost() bool` +`func (o *RadiusConfigureRequest) HasHost() bool` HasHost returns a boolean if a field has been set. @@ -106,27 +106,27 @@ HasHost returns a boolean if a field has been set. ### GetNasIdentifier -`func (o *RadiusWriteConfigRequest) GetNasIdentifier() string` +`func (o *RadiusConfigureRequest) GetNasIdentifier() string` GetNasIdentifier returns the NasIdentifier field if non-nil, zero value otherwise. ### GetNasIdentifierOk -`func (o *RadiusWriteConfigRequest) GetNasIdentifierOk() (*string, bool)` +`func (o *RadiusConfigureRequest) GetNasIdentifierOk() (*string, bool)` GetNasIdentifierOk returns a tuple with the NasIdentifier field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNasIdentifier -`func (o *RadiusWriteConfigRequest) SetNasIdentifier(v string)` +`func (o *RadiusConfigureRequest) SetNasIdentifier(v string)` SetNasIdentifier sets NasIdentifier field to given value. ### HasNasIdentifier -`func (o *RadiusWriteConfigRequest) HasNasIdentifier() bool` +`func (o *RadiusConfigureRequest) HasNasIdentifier() bool` HasNasIdentifier returns a boolean if a field has been set. @@ -135,27 +135,27 @@ HasNasIdentifier returns a boolean if a field has been set. ### GetNasPort -`func (o *RadiusWriteConfigRequest) GetNasPort() int32` +`func (o *RadiusConfigureRequest) GetNasPort() int32` GetNasPort returns the NasPort field if non-nil, zero value otherwise. ### GetNasPortOk -`func (o *RadiusWriteConfigRequest) GetNasPortOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetNasPortOk() (*int32, bool)` GetNasPortOk returns a tuple with the NasPort field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNasPort -`func (o *RadiusWriteConfigRequest) SetNasPort(v int32)` +`func (o *RadiusConfigureRequest) SetNasPort(v int32)` SetNasPort sets NasPort field to given value. ### HasNasPort -`func (o *RadiusWriteConfigRequest) HasNasPort() bool` +`func (o *RadiusConfigureRequest) HasNasPort() bool` HasNasPort returns a boolean if a field has been set. @@ -164,27 +164,27 @@ HasNasPort returns a boolean if a field has been set. ### GetPort -`func (o *RadiusWriteConfigRequest) GetPort() int32` +`func (o *RadiusConfigureRequest) GetPort() int32` GetPort returns the Port field if non-nil, zero value otherwise. ### GetPortOk -`func (o *RadiusWriteConfigRequest) GetPortOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetPortOk() (*int32, bool)` GetPortOk returns a tuple with the Port field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPort -`func (o *RadiusWriteConfigRequest) SetPort(v int32)` +`func (o *RadiusConfigureRequest) SetPort(v int32)` SetPort sets Port field to given value. ### HasPort -`func (o *RadiusWriteConfigRequest) HasPort() bool` +`func (o *RadiusConfigureRequest) HasPort() bool` HasPort returns a boolean if a field has been set. @@ -193,27 +193,27 @@ HasPort returns a boolean if a field has been set. ### GetReadTimeout -`func (o *RadiusWriteConfigRequest) GetReadTimeout() int32` +`func (o *RadiusConfigureRequest) GetReadTimeout() int32` GetReadTimeout returns the ReadTimeout field if non-nil, zero value otherwise. ### GetReadTimeoutOk -`func (o *RadiusWriteConfigRequest) GetReadTimeoutOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetReadTimeoutOk() (*int32, bool)` GetReadTimeoutOk returns a tuple with the ReadTimeout field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetReadTimeout -`func (o *RadiusWriteConfigRequest) SetReadTimeout(v int32)` +`func (o *RadiusConfigureRequest) SetReadTimeout(v int32)` SetReadTimeout sets ReadTimeout field to given value. ### HasReadTimeout -`func (o *RadiusWriteConfigRequest) HasReadTimeout() bool` +`func (o *RadiusConfigureRequest) HasReadTimeout() bool` HasReadTimeout returns a boolean if a field has been set. @@ -222,27 +222,27 @@ HasReadTimeout returns a boolean if a field has been set. ### GetSecret -`func (o *RadiusWriteConfigRequest) GetSecret() string` +`func (o *RadiusConfigureRequest) GetSecret() string` GetSecret returns the Secret field if non-nil, zero value otherwise. ### GetSecretOk -`func (o *RadiusWriteConfigRequest) GetSecretOk() (*string, bool)` +`func (o *RadiusConfigureRequest) GetSecretOk() (*string, bool)` GetSecretOk returns a tuple with the Secret field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecret -`func (o *RadiusWriteConfigRequest) SetSecret(v string)` +`func (o *RadiusConfigureRequest) SetSecret(v string)` SetSecret sets Secret field to given value. ### HasSecret -`func (o *RadiusWriteConfigRequest) HasSecret() bool` +`func (o *RadiusConfigureRequest) HasSecret() bool` HasSecret returns a boolean if a field has been set. @@ -251,27 +251,27 @@ HasSecret returns a boolean if a field has been set. ### GetTokenBoundCidrs -`func (o *RadiusWriteConfigRequest) GetTokenBoundCidrs() []string` +`func (o *RadiusConfigureRequest) GetTokenBoundCidrs() []string` GetTokenBoundCidrs returns the TokenBoundCidrs field if non-nil, zero value otherwise. ### GetTokenBoundCidrsOk -`func (o *RadiusWriteConfigRequest) GetTokenBoundCidrsOk() (*[]string, bool)` +`func (o *RadiusConfigureRequest) GetTokenBoundCidrsOk() (*[]string, bool)` GetTokenBoundCidrsOk returns a tuple with the TokenBoundCidrs field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenBoundCidrs -`func (o *RadiusWriteConfigRequest) SetTokenBoundCidrs(v []string)` +`func (o *RadiusConfigureRequest) SetTokenBoundCidrs(v []string)` SetTokenBoundCidrs sets TokenBoundCidrs field to given value. ### HasTokenBoundCidrs -`func (o *RadiusWriteConfigRequest) HasTokenBoundCidrs() bool` +`func (o *RadiusConfigureRequest) HasTokenBoundCidrs() bool` HasTokenBoundCidrs returns a boolean if a field has been set. @@ -280,27 +280,27 @@ HasTokenBoundCidrs returns a boolean if a field has been set. ### GetTokenExplicitMaxTtl -`func (o *RadiusWriteConfigRequest) GetTokenExplicitMaxTtl() int32` +`func (o *RadiusConfigureRequest) GetTokenExplicitMaxTtl() int32` GetTokenExplicitMaxTtl returns the TokenExplicitMaxTtl field if non-nil, zero value otherwise. ### GetTokenExplicitMaxTtlOk -`func (o *RadiusWriteConfigRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetTokenExplicitMaxTtlOk() (*int32, bool)` GetTokenExplicitMaxTtlOk returns a tuple with the TokenExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenExplicitMaxTtl -`func (o *RadiusWriteConfigRequest) SetTokenExplicitMaxTtl(v int32)` +`func (o *RadiusConfigureRequest) SetTokenExplicitMaxTtl(v int32)` SetTokenExplicitMaxTtl sets TokenExplicitMaxTtl field to given value. ### HasTokenExplicitMaxTtl -`func (o *RadiusWriteConfigRequest) HasTokenExplicitMaxTtl() bool` +`func (o *RadiusConfigureRequest) HasTokenExplicitMaxTtl() bool` HasTokenExplicitMaxTtl returns a boolean if a field has been set. @@ -309,27 +309,27 @@ HasTokenExplicitMaxTtl returns a boolean if a field has been set. ### GetTokenMaxTtl -`func (o *RadiusWriteConfigRequest) GetTokenMaxTtl() int32` +`func (o *RadiusConfigureRequest) GetTokenMaxTtl() int32` GetTokenMaxTtl returns the TokenMaxTtl field if non-nil, zero value otherwise. ### GetTokenMaxTtlOk -`func (o *RadiusWriteConfigRequest) GetTokenMaxTtlOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetTokenMaxTtlOk() (*int32, bool)` GetTokenMaxTtlOk returns a tuple with the TokenMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenMaxTtl -`func (o *RadiusWriteConfigRequest) SetTokenMaxTtl(v int32)` +`func (o *RadiusConfigureRequest) SetTokenMaxTtl(v int32)` SetTokenMaxTtl sets TokenMaxTtl field to given value. ### HasTokenMaxTtl -`func (o *RadiusWriteConfigRequest) HasTokenMaxTtl() bool` +`func (o *RadiusConfigureRequest) HasTokenMaxTtl() bool` HasTokenMaxTtl returns a boolean if a field has been set. @@ -338,27 +338,27 @@ HasTokenMaxTtl returns a boolean if a field has been set. ### GetTokenNoDefaultPolicy -`func (o *RadiusWriteConfigRequest) GetTokenNoDefaultPolicy() bool` +`func (o *RadiusConfigureRequest) GetTokenNoDefaultPolicy() bool` GetTokenNoDefaultPolicy returns the TokenNoDefaultPolicy field if non-nil, zero value otherwise. ### GetTokenNoDefaultPolicyOk -`func (o *RadiusWriteConfigRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` +`func (o *RadiusConfigureRequest) GetTokenNoDefaultPolicyOk() (*bool, bool)` GetTokenNoDefaultPolicyOk returns a tuple with the TokenNoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNoDefaultPolicy -`func (o *RadiusWriteConfigRequest) SetTokenNoDefaultPolicy(v bool)` +`func (o *RadiusConfigureRequest) SetTokenNoDefaultPolicy(v bool)` SetTokenNoDefaultPolicy sets TokenNoDefaultPolicy field to given value. ### HasTokenNoDefaultPolicy -`func (o *RadiusWriteConfigRequest) HasTokenNoDefaultPolicy() bool` +`func (o *RadiusConfigureRequest) HasTokenNoDefaultPolicy() bool` HasTokenNoDefaultPolicy returns a boolean if a field has been set. @@ -367,27 +367,27 @@ HasTokenNoDefaultPolicy returns a boolean if a field has been set. ### GetTokenNumUses -`func (o *RadiusWriteConfigRequest) GetTokenNumUses() int32` +`func (o *RadiusConfigureRequest) GetTokenNumUses() int32` GetTokenNumUses returns the TokenNumUses field if non-nil, zero value otherwise. ### GetTokenNumUsesOk -`func (o *RadiusWriteConfigRequest) GetTokenNumUsesOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetTokenNumUsesOk() (*int32, bool)` GetTokenNumUsesOk returns a tuple with the TokenNumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenNumUses -`func (o *RadiusWriteConfigRequest) SetTokenNumUses(v int32)` +`func (o *RadiusConfigureRequest) SetTokenNumUses(v int32)` SetTokenNumUses sets TokenNumUses field to given value. ### HasTokenNumUses -`func (o *RadiusWriteConfigRequest) HasTokenNumUses() bool` +`func (o *RadiusConfigureRequest) HasTokenNumUses() bool` HasTokenNumUses returns a boolean if a field has been set. @@ -396,27 +396,27 @@ HasTokenNumUses returns a boolean if a field has been set. ### GetTokenPeriod -`func (o *RadiusWriteConfigRequest) GetTokenPeriod() int32` +`func (o *RadiusConfigureRequest) GetTokenPeriod() int32` GetTokenPeriod returns the TokenPeriod field if non-nil, zero value otherwise. ### GetTokenPeriodOk -`func (o *RadiusWriteConfigRequest) GetTokenPeriodOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetTokenPeriodOk() (*int32, bool)` GetTokenPeriodOk returns a tuple with the TokenPeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPeriod -`func (o *RadiusWriteConfigRequest) SetTokenPeriod(v int32)` +`func (o *RadiusConfigureRequest) SetTokenPeriod(v int32)` SetTokenPeriod sets TokenPeriod field to given value. ### HasTokenPeriod -`func (o *RadiusWriteConfigRequest) HasTokenPeriod() bool` +`func (o *RadiusConfigureRequest) HasTokenPeriod() bool` HasTokenPeriod returns a boolean if a field has been set. @@ -425,27 +425,27 @@ HasTokenPeriod returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *RadiusWriteConfigRequest) GetTokenPolicies() []string` +`func (o *RadiusConfigureRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *RadiusWriteConfigRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *RadiusConfigureRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *RadiusWriteConfigRequest) SetTokenPolicies(v []string)` +`func (o *RadiusConfigureRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *RadiusWriteConfigRequest) HasTokenPolicies() bool` +`func (o *RadiusConfigureRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. @@ -454,27 +454,27 @@ HasTokenPolicies returns a boolean if a field has been set. ### GetTokenTtl -`func (o *RadiusWriteConfigRequest) GetTokenTtl() int32` +`func (o *RadiusConfigureRequest) GetTokenTtl() int32` GetTokenTtl returns the TokenTtl field if non-nil, zero value otherwise. ### GetTokenTtlOk -`func (o *RadiusWriteConfigRequest) GetTokenTtlOk() (*int32, bool)` +`func (o *RadiusConfigureRequest) GetTokenTtlOk() (*int32, bool)` GetTokenTtlOk returns a tuple with the TokenTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenTtl -`func (o *RadiusWriteConfigRequest) SetTokenTtl(v int32)` +`func (o *RadiusConfigureRequest) SetTokenTtl(v int32)` SetTokenTtl sets TokenTtl field to given value. ### HasTokenTtl -`func (o *RadiusWriteConfigRequest) HasTokenTtl() bool` +`func (o *RadiusConfigureRequest) HasTokenTtl() bool` HasTokenTtl returns a boolean if a field has been set. @@ -483,27 +483,27 @@ HasTokenTtl returns a boolean if a field has been set. ### GetTokenType -`func (o *RadiusWriteConfigRequest) GetTokenType() string` +`func (o *RadiusConfigureRequest) GetTokenType() string` GetTokenType returns the TokenType field if non-nil, zero value otherwise. ### GetTokenTypeOk -`func (o *RadiusWriteConfigRequest) GetTokenTypeOk() (*string, bool)` +`func (o *RadiusConfigureRequest) GetTokenTypeOk() (*string, bool)` GetTokenTypeOk returns a tuple with the TokenType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenType -`func (o *RadiusWriteConfigRequest) SetTokenType(v string)` +`func (o *RadiusConfigureRequest) SetTokenType(v string)` SetTokenType sets TokenType field to given value. ### HasTokenType -`func (o *RadiusWriteConfigRequest) HasTokenType() bool` +`func (o *RadiusConfigureRequest) HasTokenType() bool` HasTokenType returns a boolean if a field has been set. @@ -512,27 +512,27 @@ HasTokenType returns a boolean if a field has been set. ### GetUnregisteredUserPolicies -`func (o *RadiusWriteConfigRequest) GetUnregisteredUserPolicies() string` +`func (o *RadiusConfigureRequest) GetUnregisteredUserPolicies() string` GetUnregisteredUserPolicies returns the UnregisteredUserPolicies field if non-nil, zero value otherwise. ### GetUnregisteredUserPoliciesOk -`func (o *RadiusWriteConfigRequest) GetUnregisteredUserPoliciesOk() (*string, bool)` +`func (o *RadiusConfigureRequest) GetUnregisteredUserPoliciesOk() (*string, bool)` GetUnregisteredUserPoliciesOk returns a tuple with the UnregisteredUserPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUnregisteredUserPolicies -`func (o *RadiusWriteConfigRequest) SetUnregisteredUserPolicies(v string)` +`func (o *RadiusConfigureRequest) SetUnregisteredUserPolicies(v string)` SetUnregisteredUserPolicies sets UnregisteredUserPolicies field to given value. ### HasUnregisteredUserPolicies -`func (o *RadiusWriteConfigRequest) HasUnregisteredUserPolicies() bool` +`func (o *RadiusConfigureRequest) HasUnregisteredUserPolicies() bool` HasUnregisteredUserPolicies returns a boolean if a field has been set. diff --git a/docs/WriteQuotasConfigRequest.md b/docs/RateLimitQuotasConfigureRequest.md similarity index 66% rename from docs/WriteQuotasConfigRequest.md rename to docs/RateLimitQuotasConfigureRequest.md index 97facba6..8443385b 100644 --- a/docs/WriteQuotasConfigRequest.md +++ b/docs/RateLimitQuotasConfigureRequest.md @@ -1,4 +1,4 @@ -# WriteQuotasConfigRequest +# RateLimitQuotasConfigureRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteQuotasConfigRequest +### NewRateLimitQuotasConfigureRequest -`func NewWriteQuotasConfigRequest() *WriteQuotasConfigRequest` +`func NewRateLimitQuotasConfigureRequest() *RateLimitQuotasConfigureRequest` -NewWriteQuotasConfigRequest instantiates a new WriteQuotasConfigRequest object +NewRateLimitQuotasConfigureRequest instantiates a new RateLimitQuotasConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteQuotasConfigRequestWithDefaults +### NewRateLimitQuotasConfigureRequestWithDefaults -`func NewWriteQuotasConfigRequestWithDefaults() *WriteQuotasConfigRequest` +`func NewRateLimitQuotasConfigureRequestWithDefaults() *RateLimitQuotasConfigureRequest` -NewWriteQuotasConfigRequestWithDefaults instantiates a new WriteQuotasConfigRequest object +NewRateLimitQuotasConfigureRequestWithDefaults instantiates a new RateLimitQuotasConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetEnableRateLimitAuditLogging -`func (o *WriteQuotasConfigRequest) GetEnableRateLimitAuditLogging() bool` +`func (o *RateLimitQuotasConfigureRequest) GetEnableRateLimitAuditLogging() bool` GetEnableRateLimitAuditLogging returns the EnableRateLimitAuditLogging field if non-nil, zero value otherwise. ### GetEnableRateLimitAuditLoggingOk -`func (o *WriteQuotasConfigRequest) GetEnableRateLimitAuditLoggingOk() (*bool, bool)` +`func (o *RateLimitQuotasConfigureRequest) GetEnableRateLimitAuditLoggingOk() (*bool, bool)` GetEnableRateLimitAuditLoggingOk returns a tuple with the EnableRateLimitAuditLogging field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnableRateLimitAuditLogging -`func (o *WriteQuotasConfigRequest) SetEnableRateLimitAuditLogging(v bool)` +`func (o *RateLimitQuotasConfigureRequest) SetEnableRateLimitAuditLogging(v bool)` SetEnableRateLimitAuditLogging sets EnableRateLimitAuditLogging field to given value. ### HasEnableRateLimitAuditLogging -`func (o *WriteQuotasConfigRequest) HasEnableRateLimitAuditLogging() bool` +`func (o *RateLimitQuotasConfigureRequest) HasEnableRateLimitAuditLogging() bool` HasEnableRateLimitAuditLogging returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasEnableRateLimitAuditLogging returns a boolean if a field has been set. ### GetEnableRateLimitResponseHeaders -`func (o *WriteQuotasConfigRequest) GetEnableRateLimitResponseHeaders() bool` +`func (o *RateLimitQuotasConfigureRequest) GetEnableRateLimitResponseHeaders() bool` GetEnableRateLimitResponseHeaders returns the EnableRateLimitResponseHeaders field if non-nil, zero value otherwise. ### GetEnableRateLimitResponseHeadersOk -`func (o *WriteQuotasConfigRequest) GetEnableRateLimitResponseHeadersOk() (*bool, bool)` +`func (o *RateLimitQuotasConfigureRequest) GetEnableRateLimitResponseHeadersOk() (*bool, bool)` GetEnableRateLimitResponseHeadersOk returns a tuple with the EnableRateLimitResponseHeaders field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEnableRateLimitResponseHeaders -`func (o *WriteQuotasConfigRequest) SetEnableRateLimitResponseHeaders(v bool)` +`func (o *RateLimitQuotasConfigureRequest) SetEnableRateLimitResponseHeaders(v bool)` SetEnableRateLimitResponseHeaders sets EnableRateLimitResponseHeaders field to given value. ### HasEnableRateLimitResponseHeaders -`func (o *WriteQuotasConfigRequest) HasEnableRateLimitResponseHeaders() bool` +`func (o *RateLimitQuotasConfigureRequest) HasEnableRateLimitResponseHeaders() bool` HasEnableRateLimitResponseHeaders returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasEnableRateLimitResponseHeaders returns a boolean if a field has been set. ### GetRateLimitExemptPaths -`func (o *WriteQuotasConfigRequest) GetRateLimitExemptPaths() []string` +`func (o *RateLimitQuotasConfigureRequest) GetRateLimitExemptPaths() []string` GetRateLimitExemptPaths returns the RateLimitExemptPaths field if non-nil, zero value otherwise. ### GetRateLimitExemptPathsOk -`func (o *WriteQuotasConfigRequest) GetRateLimitExemptPathsOk() (*[]string, bool)` +`func (o *RateLimitQuotasConfigureRequest) GetRateLimitExemptPathsOk() (*[]string, bool)` GetRateLimitExemptPathsOk returns a tuple with the RateLimitExemptPaths field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRateLimitExemptPaths -`func (o *WriteQuotasConfigRequest) SetRateLimitExemptPaths(v []string)` +`func (o *RateLimitQuotasConfigureRequest) SetRateLimitExemptPaths(v []string)` SetRateLimitExemptPaths sets RateLimitExemptPaths field to given value. ### HasRateLimitExemptPaths -`func (o *WriteQuotasConfigRequest) HasRateLimitExemptPaths() bool` +`func (o *RateLimitQuotasConfigureRequest) HasRateLimitExemptPaths() bool` HasRateLimitExemptPaths returns a boolean if a field has been set. diff --git a/docs/AppRoleListSecretIDResponse.md b/docs/RateLimitQuotasListResponse.md similarity index 61% rename from docs/AppRoleListSecretIDResponse.md rename to docs/RateLimitQuotasListResponse.md index 9bf53159..f32ee5e5 100644 --- a/docs/AppRoleListSecretIDResponse.md +++ b/docs/RateLimitQuotasListResponse.md @@ -1,4 +1,4 @@ -# AppRoleListSecretIDResponse +# RateLimitQuotasListResponse ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewAppRoleListSecretIDResponse +### NewRateLimitQuotasListResponse -`func NewAppRoleListSecretIDResponse() *AppRoleListSecretIDResponse` +`func NewRateLimitQuotasListResponse() *RateLimitQuotasListResponse` -NewAppRoleListSecretIDResponse instantiates a new AppRoleListSecretIDResponse object +NewRateLimitQuotasListResponse instantiates a new RateLimitQuotasListResponse object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewAppRoleListSecretIDResponseWithDefaults +### NewRateLimitQuotasListResponseWithDefaults -`func NewAppRoleListSecretIDResponseWithDefaults() *AppRoleListSecretIDResponse` +`func NewRateLimitQuotasListResponseWithDefaults() *RateLimitQuotasListResponse` -NewAppRoleListSecretIDResponseWithDefaults instantiates a new AppRoleListSecretIDResponse object +NewRateLimitQuotasListResponseWithDefaults instantiates a new RateLimitQuotasListResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKeys -`func (o *AppRoleListSecretIDResponse) GetKeys() []string` +`func (o *RateLimitQuotasListResponse) GetKeys() []string` GetKeys returns the Keys field if non-nil, zero value otherwise. ### GetKeysOk -`func (o *AppRoleListSecretIDResponse) GetKeysOk() (*[]string, bool)` +`func (o *RateLimitQuotasListResponse) GetKeysOk() (*[]string, bool)` GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeys -`func (o *AppRoleListSecretIDResponse) SetKeys(v []string)` +`func (o *RateLimitQuotasListResponse) SetKeys(v []string)` SetKeys sets Keys field to given value. ### HasKeys -`func (o *AppRoleListSecretIDResponse) HasKeys() bool` +`func (o *RateLimitQuotasListResponse) HasKeys() bool` HasKeys returns a boolean if a field has been set. diff --git a/docs/RateLimitQuotasReadConfigurationResponse.md b/docs/RateLimitQuotasReadConfigurationResponse.md new file mode 100644 index 00000000..6b678a8a --- /dev/null +++ b/docs/RateLimitQuotasReadConfigurationResponse.md @@ -0,0 +1,129 @@ +# RateLimitQuotasReadConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**EnableRateLimitAuditLogging** | Pointer to **bool** | | [optional] +**EnableRateLimitResponseHeaders** | Pointer to **bool** | | [optional] +**RateLimitExemptPaths** | Pointer to **[]string** | | [optional] + + + +## Methods + + +### NewRateLimitQuotasReadConfigurationResponse + +`func NewRateLimitQuotasReadConfigurationResponse() *RateLimitQuotasReadConfigurationResponse` + +NewRateLimitQuotasReadConfigurationResponse instantiates a new RateLimitQuotasReadConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRateLimitQuotasReadConfigurationResponseWithDefaults + +`func NewRateLimitQuotasReadConfigurationResponseWithDefaults() *RateLimitQuotasReadConfigurationResponse` + +NewRateLimitQuotasReadConfigurationResponseWithDefaults instantiates a new RateLimitQuotasReadConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetEnableRateLimitAuditLogging + +`func (o *RateLimitQuotasReadConfigurationResponse) GetEnableRateLimitAuditLogging() bool` + +GetEnableRateLimitAuditLogging returns the EnableRateLimitAuditLogging field if non-nil, zero value otherwise. + +### GetEnableRateLimitAuditLoggingOk + +`func (o *RateLimitQuotasReadConfigurationResponse) GetEnableRateLimitAuditLoggingOk() (*bool, bool)` + +GetEnableRateLimitAuditLoggingOk returns a tuple with the EnableRateLimitAuditLogging field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnableRateLimitAuditLogging + +`func (o *RateLimitQuotasReadConfigurationResponse) SetEnableRateLimitAuditLogging(v bool)` + +SetEnableRateLimitAuditLogging sets EnableRateLimitAuditLogging field to given value. + + +### HasEnableRateLimitAuditLogging + +`func (o *RateLimitQuotasReadConfigurationResponse) HasEnableRateLimitAuditLogging() bool` + +HasEnableRateLimitAuditLogging returns a boolean if a field has been set. + + + + +### GetEnableRateLimitResponseHeaders + +`func (o *RateLimitQuotasReadConfigurationResponse) GetEnableRateLimitResponseHeaders() bool` + +GetEnableRateLimitResponseHeaders returns the EnableRateLimitResponseHeaders field if non-nil, zero value otherwise. + +### GetEnableRateLimitResponseHeadersOk + +`func (o *RateLimitQuotasReadConfigurationResponse) GetEnableRateLimitResponseHeadersOk() (*bool, bool)` + +GetEnableRateLimitResponseHeadersOk returns a tuple with the EnableRateLimitResponseHeaders field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEnableRateLimitResponseHeaders + +`func (o *RateLimitQuotasReadConfigurationResponse) SetEnableRateLimitResponseHeaders(v bool)` + +SetEnableRateLimitResponseHeaders sets EnableRateLimitResponseHeaders field to given value. + + +### HasEnableRateLimitResponseHeaders + +`func (o *RateLimitQuotasReadConfigurationResponse) HasEnableRateLimitResponseHeaders() bool` + +HasEnableRateLimitResponseHeaders returns a boolean if a field has been set. + + + + +### GetRateLimitExemptPaths + +`func (o *RateLimitQuotasReadConfigurationResponse) GetRateLimitExemptPaths() []string` + +GetRateLimitExemptPaths returns the RateLimitExemptPaths field if non-nil, zero value otherwise. + +### GetRateLimitExemptPathsOk + +`func (o *RateLimitQuotasReadConfigurationResponse) GetRateLimitExemptPathsOk() (*[]string, bool)` + +GetRateLimitExemptPathsOk returns a tuple with the RateLimitExemptPaths field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRateLimitExemptPaths + +`func (o *RateLimitQuotasReadConfigurationResponse) SetRateLimitExemptPaths(v []string)` + +SetRateLimitExemptPaths sets RateLimitExemptPaths field to given value. + + +### HasRateLimitExemptPaths + +`func (o *RateLimitQuotasReadConfigurationResponse) HasRateLimitExemptPaths() bool` + +HasRateLimitExemptPaths returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RateLimitQuotasReadResponse.md b/docs/RateLimitQuotasReadResponse.md new file mode 100644 index 00000000..fa1da40a --- /dev/null +++ b/docs/RateLimitQuotasReadResponse.md @@ -0,0 +1,249 @@ +# RateLimitQuotasReadResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**BlockInterval** | Pointer to **int32** | | [optional] +**Interval** | Pointer to **int32** | | [optional] +**Name** | Pointer to **string** | | [optional] +**Path** | Pointer to **string** | | [optional] +**Rate** | Pointer to **float32** | | [optional] +**Role** | Pointer to **string** | | [optional] +**Type** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewRateLimitQuotasReadResponse + +`func NewRateLimitQuotasReadResponse() *RateLimitQuotasReadResponse` + +NewRateLimitQuotasReadResponse instantiates a new RateLimitQuotasReadResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRateLimitQuotasReadResponseWithDefaults + +`func NewRateLimitQuotasReadResponseWithDefaults() *RateLimitQuotasReadResponse` + +NewRateLimitQuotasReadResponseWithDefaults instantiates a new RateLimitQuotasReadResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetBlockInterval + +`func (o *RateLimitQuotasReadResponse) GetBlockInterval() int32` + +GetBlockInterval returns the BlockInterval field if non-nil, zero value otherwise. + +### GetBlockIntervalOk + +`func (o *RateLimitQuotasReadResponse) GetBlockIntervalOk() (*int32, bool)` + +GetBlockIntervalOk returns a tuple with the BlockInterval field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBlockInterval + +`func (o *RateLimitQuotasReadResponse) SetBlockInterval(v int32)` + +SetBlockInterval sets BlockInterval field to given value. + + +### HasBlockInterval + +`func (o *RateLimitQuotasReadResponse) HasBlockInterval() bool` + +HasBlockInterval returns a boolean if a field has been set. + + + + +### GetInterval + +`func (o *RateLimitQuotasReadResponse) GetInterval() int32` + +GetInterval returns the Interval field if non-nil, zero value otherwise. + +### GetIntervalOk + +`func (o *RateLimitQuotasReadResponse) GetIntervalOk() (*int32, bool)` + +GetIntervalOk returns a tuple with the Interval field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetInterval + +`func (o *RateLimitQuotasReadResponse) SetInterval(v int32)` + +SetInterval sets Interval field to given value. + + +### HasInterval + +`func (o *RateLimitQuotasReadResponse) HasInterval() bool` + +HasInterval returns a boolean if a field has been set. + + + + +### GetName + +`func (o *RateLimitQuotasReadResponse) GetName() string` + +GetName returns the Name field if non-nil, zero value otherwise. + +### GetNameOk + +`func (o *RateLimitQuotasReadResponse) GetNameOk() (*string, bool)` + +GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetName + +`func (o *RateLimitQuotasReadResponse) SetName(v string)` + +SetName sets Name field to given value. + + +### HasName + +`func (o *RateLimitQuotasReadResponse) HasName() bool` + +HasName returns a boolean if a field has been set. + + + + +### GetPath + +`func (o *RateLimitQuotasReadResponse) GetPath() string` + +GetPath returns the Path field if non-nil, zero value otherwise. + +### GetPathOk + +`func (o *RateLimitQuotasReadResponse) GetPathOk() (*string, bool)` + +GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPath + +`func (o *RateLimitQuotasReadResponse) SetPath(v string)` + +SetPath sets Path field to given value. + + +### HasPath + +`func (o *RateLimitQuotasReadResponse) HasPath() bool` + +HasPath returns a boolean if a field has been set. + + + + +### GetRate + +`func (o *RateLimitQuotasReadResponse) GetRate() float32` + +GetRate returns the Rate field if non-nil, zero value otherwise. + +### GetRateOk + +`func (o *RateLimitQuotasReadResponse) GetRateOk() (*float32, bool)` + +GetRateOk returns a tuple with the Rate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRate + +`func (o *RateLimitQuotasReadResponse) SetRate(v float32)` + +SetRate sets Rate field to given value. + + +### HasRate + +`func (o *RateLimitQuotasReadResponse) HasRate() bool` + +HasRate returns a boolean if a field has been set. + + + + +### GetRole + +`func (o *RateLimitQuotasReadResponse) GetRole() string` + +GetRole returns the Role field if non-nil, zero value otherwise. + +### GetRoleOk + +`func (o *RateLimitQuotasReadResponse) GetRoleOk() (*string, bool)` + +GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRole + +`func (o *RateLimitQuotasReadResponse) SetRole(v string)` + +SetRole sets Role field to given value. + + +### HasRole + +`func (o *RateLimitQuotasReadResponse) HasRole() bool` + +HasRole returns a boolean if a field has been set. + + + + +### GetType + +`func (o *RateLimitQuotasReadResponse) GetType() string` + +GetType returns the Type field if non-nil, zero value otherwise. + +### GetTypeOk + +`func (o *RateLimitQuotasReadResponse) GetTypeOk() (*string, bool)` + +GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetType + +`func (o *RateLimitQuotasReadResponse) SetType(v string)` + +SetType sets Type field to given value. + + +### HasType + +`func (o *RateLimitQuotasReadResponse) HasType() bool` + +HasType returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteQuotasRateLimitRequest.md b/docs/RateLimitQuotasWriteRequest.md similarity index 68% rename from docs/WriteQuotasRateLimitRequest.md rename to docs/RateLimitQuotasWriteRequest.md index ea7cb5d5..e0582953 100644 --- a/docs/WriteQuotasRateLimitRequest.md +++ b/docs/RateLimitQuotasWriteRequest.md @@ -1,4 +1,4 @@ -# WriteQuotasRateLimitRequest +# RateLimitQuotasWriteRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteQuotasRateLimitRequest +### NewRateLimitQuotasWriteRequest -`func NewWriteQuotasRateLimitRequest() *WriteQuotasRateLimitRequest` +`func NewRateLimitQuotasWriteRequest() *RateLimitQuotasWriteRequest` -NewWriteQuotasRateLimitRequest instantiates a new WriteQuotasRateLimitRequest object +NewRateLimitQuotasWriteRequest instantiates a new RateLimitQuotasWriteRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteQuotasRateLimitRequestWithDefaults +### NewRateLimitQuotasWriteRequestWithDefaults -`func NewWriteQuotasRateLimitRequestWithDefaults() *WriteQuotasRateLimitRequest` +`func NewRateLimitQuotasWriteRequestWithDefaults() *RateLimitQuotasWriteRequest` -NewWriteQuotasRateLimitRequestWithDefaults instantiates a new WriteQuotasRateLimitRequest object +NewRateLimitQuotasWriteRequestWithDefaults instantiates a new RateLimitQuotasWriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBlockInterval -`func (o *WriteQuotasRateLimitRequest) GetBlockInterval() int32` +`func (o *RateLimitQuotasWriteRequest) GetBlockInterval() int32` GetBlockInterval returns the BlockInterval field if non-nil, zero value otherwise. ### GetBlockIntervalOk -`func (o *WriteQuotasRateLimitRequest) GetBlockIntervalOk() (*int32, bool)` +`func (o *RateLimitQuotasWriteRequest) GetBlockIntervalOk() (*int32, bool)` GetBlockIntervalOk returns a tuple with the BlockInterval field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBlockInterval -`func (o *WriteQuotasRateLimitRequest) SetBlockInterval(v int32)` +`func (o *RateLimitQuotasWriteRequest) SetBlockInterval(v int32)` SetBlockInterval sets BlockInterval field to given value. ### HasBlockInterval -`func (o *WriteQuotasRateLimitRequest) HasBlockInterval() bool` +`func (o *RateLimitQuotasWriteRequest) HasBlockInterval() bool` HasBlockInterval returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasBlockInterval returns a boolean if a field has been set. ### GetInterval -`func (o *WriteQuotasRateLimitRequest) GetInterval() int32` +`func (o *RateLimitQuotasWriteRequest) GetInterval() int32` GetInterval returns the Interval field if non-nil, zero value otherwise. ### GetIntervalOk -`func (o *WriteQuotasRateLimitRequest) GetIntervalOk() (*int32, bool)` +`func (o *RateLimitQuotasWriteRequest) GetIntervalOk() (*int32, bool)` GetIntervalOk returns a tuple with the Interval field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInterval -`func (o *WriteQuotasRateLimitRequest) SetInterval(v int32)` +`func (o *RateLimitQuotasWriteRequest) SetInterval(v int32)` SetInterval sets Interval field to given value. ### HasInterval -`func (o *WriteQuotasRateLimitRequest) HasInterval() bool` +`func (o *RateLimitQuotasWriteRequest) HasInterval() bool` HasInterval returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasInterval returns a boolean if a field has been set. ### GetPath -`func (o *WriteQuotasRateLimitRequest) GetPath() string` +`func (o *RateLimitQuotasWriteRequest) GetPath() string` GetPath returns the Path field if non-nil, zero value otherwise. ### GetPathOk -`func (o *WriteQuotasRateLimitRequest) GetPathOk() (*string, bool)` +`func (o *RateLimitQuotasWriteRequest) GetPathOk() (*string, bool)` GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPath -`func (o *WriteQuotasRateLimitRequest) SetPath(v string)` +`func (o *RateLimitQuotasWriteRequest) SetPath(v string)` SetPath sets Path field to given value. ### HasPath -`func (o *WriteQuotasRateLimitRequest) HasPath() bool` +`func (o *RateLimitQuotasWriteRequest) HasPath() bool` HasPath returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasPath returns a boolean if a field has been set. ### GetRate -`func (o *WriteQuotasRateLimitRequest) GetRate() float32` +`func (o *RateLimitQuotasWriteRequest) GetRate() float32` GetRate returns the Rate field if non-nil, zero value otherwise. ### GetRateOk -`func (o *WriteQuotasRateLimitRequest) GetRateOk() (*float32, bool)` +`func (o *RateLimitQuotasWriteRequest) GetRateOk() (*float32, bool)` GetRateOk returns a tuple with the Rate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRate -`func (o *WriteQuotasRateLimitRequest) SetRate(v float32)` +`func (o *RateLimitQuotasWriteRequest) SetRate(v float32)` SetRate sets Rate field to given value. ### HasRate -`func (o *WriteQuotasRateLimitRequest) HasRate() bool` +`func (o *RateLimitQuotasWriteRequest) HasRate() bool` HasRate returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasRate returns a boolean if a field has been set. ### GetRole -`func (o *WriteQuotasRateLimitRequest) GetRole() string` +`func (o *RateLimitQuotasWriteRequest) GetRole() string` GetRole returns the Role field if non-nil, zero value otherwise. ### GetRoleOk -`func (o *WriteQuotasRateLimitRequest) GetRoleOk() (*string, bool)` +`func (o *RateLimitQuotasWriteRequest) GetRoleOk() (*string, bool)` GetRoleOk returns a tuple with the Role field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRole -`func (o *WriteQuotasRateLimitRequest) SetRole(v string)` +`func (o *RateLimitQuotasWriteRequest) SetRole(v string)` SetRole sets Role field to given value. ### HasRole -`func (o *WriteQuotasRateLimitRequest) HasRole() bool` +`func (o *RateLimitQuotasWriteRequest) HasRole() bool` HasRole returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasRole returns a boolean if a field has been set. ### GetType -`func (o *WriteQuotasRateLimitRequest) GetType() string` +`func (o *RateLimitQuotasWriteRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *WriteQuotasRateLimitRequest) GetTypeOk() (*string, bool)` +`func (o *RateLimitQuotasWriteRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *WriteQuotasRateLimitRequest) SetType(v string)` +`func (o *RateLimitQuotasWriteRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *WriteQuotasRateLimitRequest) HasType() bool` +`func (o *RateLimitQuotasWriteRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/ReadWrappingProperties2Response.md b/docs/ReadWrappingProperties2Response.md new file mode 100644 index 00000000..92df2a88 --- /dev/null +++ b/docs/ReadWrappingProperties2Response.md @@ -0,0 +1,129 @@ +# ReadWrappingProperties2Response + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CreationPath** | Pointer to **string** | | [optional] +**CreationTime** | Pointer to **time.Time** | | [optional] +**CreationTtl** | Pointer to **int32** | | [optional] + + + +## Methods + + +### NewReadWrappingProperties2Response + +`func NewReadWrappingProperties2Response() *ReadWrappingProperties2Response` + +NewReadWrappingProperties2Response instantiates a new ReadWrappingProperties2Response object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewReadWrappingProperties2ResponseWithDefaults + +`func NewReadWrappingProperties2ResponseWithDefaults() *ReadWrappingProperties2Response` + +NewReadWrappingProperties2ResponseWithDefaults instantiates a new ReadWrappingProperties2Response object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCreationPath + +`func (o *ReadWrappingProperties2Response) GetCreationPath() string` + +GetCreationPath returns the CreationPath field if non-nil, zero value otherwise. + +### GetCreationPathOk + +`func (o *ReadWrappingProperties2Response) GetCreationPathOk() (*string, bool)` + +GetCreationPathOk returns a tuple with the CreationPath field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreationPath + +`func (o *ReadWrappingProperties2Response) SetCreationPath(v string)` + +SetCreationPath sets CreationPath field to given value. + + +### HasCreationPath + +`func (o *ReadWrappingProperties2Response) HasCreationPath() bool` + +HasCreationPath returns a boolean if a field has been set. + + + + +### GetCreationTime + +`func (o *ReadWrappingProperties2Response) GetCreationTime() time.Time` + +GetCreationTime returns the CreationTime field if non-nil, zero value otherwise. + +### GetCreationTimeOk + +`func (o *ReadWrappingProperties2Response) GetCreationTimeOk() (*time.Time, bool)` + +GetCreationTimeOk returns a tuple with the CreationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreationTime + +`func (o *ReadWrappingProperties2Response) SetCreationTime(v time.Time)` + +SetCreationTime sets CreationTime field to given value. + + +### HasCreationTime + +`func (o *ReadWrappingProperties2Response) HasCreationTime() bool` + +HasCreationTime returns a boolean if a field has been set. + + + + +### GetCreationTtl + +`func (o *ReadWrappingProperties2Response) GetCreationTtl() int32` + +GetCreationTtl returns the CreationTtl field if non-nil, zero value otherwise. + +### GetCreationTtlOk + +`func (o *ReadWrappingProperties2Response) GetCreationTtlOk() (*int32, bool)` + +GetCreationTtlOk returns a tuple with the CreationTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreationTtl + +`func (o *ReadWrappingProperties2Response) SetCreationTtl(v int32)` + +SetCreationTtl sets CreationTtl field to given value. + + +### HasCreationTtl + +`func (o *ReadWrappingProperties2Response) HasCreationTtl() bool` + +HasCreationTtl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WrappingWriteLookupRequest.md b/docs/ReadWrappingPropertiesRequest.md similarity index 60% rename from docs/WrappingWriteLookupRequest.md rename to docs/ReadWrappingPropertiesRequest.md index 35e1c4fe..f5e87bee 100644 --- a/docs/WrappingWriteLookupRequest.md +++ b/docs/ReadWrappingPropertiesRequest.md @@ -1,4 +1,4 @@ -# WrappingWriteLookupRequest +# ReadWrappingPropertiesRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWrappingWriteLookupRequest +### NewReadWrappingPropertiesRequest -`func NewWrappingWriteLookupRequest() *WrappingWriteLookupRequest` +`func NewReadWrappingPropertiesRequest() *ReadWrappingPropertiesRequest` -NewWrappingWriteLookupRequest instantiates a new WrappingWriteLookupRequest object +NewReadWrappingPropertiesRequest instantiates a new ReadWrappingPropertiesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWrappingWriteLookupRequestWithDefaults +### NewReadWrappingPropertiesRequestWithDefaults -`func NewWrappingWriteLookupRequestWithDefaults() *WrappingWriteLookupRequest` +`func NewReadWrappingPropertiesRequestWithDefaults() *ReadWrappingPropertiesRequest` -NewWrappingWriteLookupRequestWithDefaults instantiates a new WrappingWriteLookupRequest object +NewReadWrappingPropertiesRequestWithDefaults instantiates a new ReadWrappingPropertiesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetToken -`func (o *WrappingWriteLookupRequest) GetToken() string` +`func (o *ReadWrappingPropertiesRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *WrappingWriteLookupRequest) GetTokenOk() (*string, bool)` +`func (o *ReadWrappingPropertiesRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *WrappingWriteLookupRequest) SetToken(v string)` +`func (o *ReadWrappingPropertiesRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *WrappingWriteLookupRequest) HasToken() bool` +`func (o *ReadWrappingPropertiesRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/ReadWrappingPropertiesResponse.md b/docs/ReadWrappingPropertiesResponse.md new file mode 100644 index 00000000..8ab06096 --- /dev/null +++ b/docs/ReadWrappingPropertiesResponse.md @@ -0,0 +1,129 @@ +# ReadWrappingPropertiesResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CreationPath** | Pointer to **string** | | [optional] +**CreationTime** | Pointer to **time.Time** | | [optional] +**CreationTtl** | Pointer to **int32** | | [optional] + + + +## Methods + + +### NewReadWrappingPropertiesResponse + +`func NewReadWrappingPropertiesResponse() *ReadWrappingPropertiesResponse` + +NewReadWrappingPropertiesResponse instantiates a new ReadWrappingPropertiesResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewReadWrappingPropertiesResponseWithDefaults + +`func NewReadWrappingPropertiesResponseWithDefaults() *ReadWrappingPropertiesResponse` + +NewReadWrappingPropertiesResponseWithDefaults instantiates a new ReadWrappingPropertiesResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetCreationPath + +`func (o *ReadWrappingPropertiesResponse) GetCreationPath() string` + +GetCreationPath returns the CreationPath field if non-nil, zero value otherwise. + +### GetCreationPathOk + +`func (o *ReadWrappingPropertiesResponse) GetCreationPathOk() (*string, bool)` + +GetCreationPathOk returns a tuple with the CreationPath field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreationPath + +`func (o *ReadWrappingPropertiesResponse) SetCreationPath(v string)` + +SetCreationPath sets CreationPath field to given value. + + +### HasCreationPath + +`func (o *ReadWrappingPropertiesResponse) HasCreationPath() bool` + +HasCreationPath returns a boolean if a field has been set. + + + + +### GetCreationTime + +`func (o *ReadWrappingPropertiesResponse) GetCreationTime() time.Time` + +GetCreationTime returns the CreationTime field if non-nil, zero value otherwise. + +### GetCreationTimeOk + +`func (o *ReadWrappingPropertiesResponse) GetCreationTimeOk() (*time.Time, bool)` + +GetCreationTimeOk returns a tuple with the CreationTime field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreationTime + +`func (o *ReadWrappingPropertiesResponse) SetCreationTime(v time.Time)` + +SetCreationTime sets CreationTime field to given value. + + +### HasCreationTime + +`func (o *ReadWrappingPropertiesResponse) HasCreationTime() bool` + +HasCreationTime returns a boolean if a field has been set. + + + + +### GetCreationTtl + +`func (o *ReadWrappingPropertiesResponse) GetCreationTtl() int32` + +GetCreationTtl returns the CreationTtl field if non-nil, zero value otherwise. + +### GetCreationTtlOk + +`func (o *ReadWrappingPropertiesResponse) GetCreationTtlOk() (*int32, bool)` + +GetCreationTtlOk returns a tuple with the CreationTtl field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetCreationTtl + +`func (o *ReadWrappingPropertiesResponse) SetCreationTtl(v int32)` + +SetCreationTtl sets CreationTtl field to given value. + + +### HasCreationTtl + +`func (o *ReadWrappingPropertiesResponse) HasCreationTtl() bool` + +HasCreationTtl returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteRekeyInitRequest.md b/docs/RekeyAttemptInitializeRequest.md similarity index 67% rename from docs/WriteRekeyInitRequest.md rename to docs/RekeyAttemptInitializeRequest.md index 69f5c2cb..b74ad027 100644 --- a/docs/WriteRekeyInitRequest.md +++ b/docs/RekeyAttemptInitializeRequest.md @@ -1,4 +1,4 @@ -# WriteRekeyInitRequest +# RekeyAttemptInitializeRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteRekeyInitRequest +### NewRekeyAttemptInitializeRequest -`func NewWriteRekeyInitRequest() *WriteRekeyInitRequest` +`func NewRekeyAttemptInitializeRequest() *RekeyAttemptInitializeRequest` -NewWriteRekeyInitRequest instantiates a new WriteRekeyInitRequest object +NewRekeyAttemptInitializeRequest instantiates a new RekeyAttemptInitializeRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteRekeyInitRequestWithDefaults +### NewRekeyAttemptInitializeRequestWithDefaults -`func NewWriteRekeyInitRequestWithDefaults() *WriteRekeyInitRequest` +`func NewRekeyAttemptInitializeRequestWithDefaults() *RekeyAttemptInitializeRequest` -NewWriteRekeyInitRequestWithDefaults instantiates a new WriteRekeyInitRequest object +NewRekeyAttemptInitializeRequestWithDefaults instantiates a new RekeyAttemptInitializeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBackup -`func (o *WriteRekeyInitRequest) GetBackup() bool` +`func (o *RekeyAttemptInitializeRequest) GetBackup() bool` GetBackup returns the Backup field if non-nil, zero value otherwise. ### GetBackupOk -`func (o *WriteRekeyInitRequest) GetBackupOk() (*bool, bool)` +`func (o *RekeyAttemptInitializeRequest) GetBackupOk() (*bool, bool)` GetBackupOk returns a tuple with the Backup field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBackup -`func (o *WriteRekeyInitRequest) SetBackup(v bool)` +`func (o *RekeyAttemptInitializeRequest) SetBackup(v bool)` SetBackup sets Backup field to given value. ### HasBackup -`func (o *WriteRekeyInitRequest) HasBackup() bool` +`func (o *RekeyAttemptInitializeRequest) HasBackup() bool` HasBackup returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasBackup returns a boolean if a field has been set. ### GetPgpKeys -`func (o *WriteRekeyInitRequest) GetPgpKeys() []string` +`func (o *RekeyAttemptInitializeRequest) GetPgpKeys() []string` GetPgpKeys returns the PgpKeys field if non-nil, zero value otherwise. ### GetPgpKeysOk -`func (o *WriteRekeyInitRequest) GetPgpKeysOk() (*[]string, bool)` +`func (o *RekeyAttemptInitializeRequest) GetPgpKeysOk() (*[]string, bool)` GetPgpKeysOk returns a tuple with the PgpKeys field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPgpKeys -`func (o *WriteRekeyInitRequest) SetPgpKeys(v []string)` +`func (o *RekeyAttemptInitializeRequest) SetPgpKeys(v []string)` SetPgpKeys sets PgpKeys field to given value. ### HasPgpKeys -`func (o *WriteRekeyInitRequest) HasPgpKeys() bool` +`func (o *RekeyAttemptInitializeRequest) HasPgpKeys() bool` HasPgpKeys returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasPgpKeys returns a boolean if a field has been set. ### GetRequireVerification -`func (o *WriteRekeyInitRequest) GetRequireVerification() bool` +`func (o *RekeyAttemptInitializeRequest) GetRequireVerification() bool` GetRequireVerification returns the RequireVerification field if non-nil, zero value otherwise. ### GetRequireVerificationOk -`func (o *WriteRekeyInitRequest) GetRequireVerificationOk() (*bool, bool)` +`func (o *RekeyAttemptInitializeRequest) GetRequireVerificationOk() (*bool, bool)` GetRequireVerificationOk returns a tuple with the RequireVerification field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRequireVerification -`func (o *WriteRekeyInitRequest) SetRequireVerification(v bool)` +`func (o *RekeyAttemptInitializeRequest) SetRequireVerification(v bool)` SetRequireVerification sets RequireVerification field to given value. ### HasRequireVerification -`func (o *WriteRekeyInitRequest) HasRequireVerification() bool` +`func (o *RekeyAttemptInitializeRequest) HasRequireVerification() bool` HasRequireVerification returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasRequireVerification returns a boolean if a field has been set. ### GetSecretShares -`func (o *WriteRekeyInitRequest) GetSecretShares() int32` +`func (o *RekeyAttemptInitializeRequest) GetSecretShares() int32` GetSecretShares returns the SecretShares field if non-nil, zero value otherwise. ### GetSecretSharesOk -`func (o *WriteRekeyInitRequest) GetSecretSharesOk() (*int32, bool)` +`func (o *RekeyAttemptInitializeRequest) GetSecretSharesOk() (*int32, bool)` GetSecretSharesOk returns a tuple with the SecretShares field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretShares -`func (o *WriteRekeyInitRequest) SetSecretShares(v int32)` +`func (o *RekeyAttemptInitializeRequest) SetSecretShares(v int32)` SetSecretShares sets SecretShares field to given value. ### HasSecretShares -`func (o *WriteRekeyInitRequest) HasSecretShares() bool` +`func (o *RekeyAttemptInitializeRequest) HasSecretShares() bool` HasSecretShares returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasSecretShares returns a boolean if a field has been set. ### GetSecretThreshold -`func (o *WriteRekeyInitRequest) GetSecretThreshold() int32` +`func (o *RekeyAttemptInitializeRequest) GetSecretThreshold() int32` GetSecretThreshold returns the SecretThreshold field if non-nil, zero value otherwise. ### GetSecretThresholdOk -`func (o *WriteRekeyInitRequest) GetSecretThresholdOk() (*int32, bool)` +`func (o *RekeyAttemptInitializeRequest) GetSecretThresholdOk() (*int32, bool)` GetSecretThresholdOk returns a tuple with the SecretThreshold field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSecretThreshold -`func (o *WriteRekeyInitRequest) SetSecretThreshold(v int32)` +`func (o *RekeyAttemptInitializeRequest) SetSecretThreshold(v int32)` SetSecretThreshold sets SecretThreshold field to given value. ### HasSecretThreshold -`func (o *WriteRekeyInitRequest) HasSecretThreshold() bool` +`func (o *RekeyAttemptInitializeRequest) HasSecretThreshold() bool` HasSecretThreshold returns a boolean if a field has been set. diff --git a/docs/RekeyAttemptInitializeResponse.md b/docs/RekeyAttemptInitializeResponse.md new file mode 100644 index 00000000..e7878578 --- /dev/null +++ b/docs/RekeyAttemptInitializeResponse.md @@ -0,0 +1,339 @@ +# RekeyAttemptInitializeResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Backup** | Pointer to **bool** | | [optional] +**N** | Pointer to **int32** | | [optional] +**Nounce** | Pointer to **string** | | [optional] +**PgpFingerprints** | Pointer to **[]string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **string** | | [optional] +**T** | Pointer to **int32** | | [optional] +**VerificationNonce** | Pointer to **string** | | [optional] +**VerificationRequired** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRekeyAttemptInitializeResponse + +`func NewRekeyAttemptInitializeResponse() *RekeyAttemptInitializeResponse` + +NewRekeyAttemptInitializeResponse instantiates a new RekeyAttemptInitializeResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyAttemptInitializeResponseWithDefaults + +`func NewRekeyAttemptInitializeResponseWithDefaults() *RekeyAttemptInitializeResponse` + +NewRekeyAttemptInitializeResponseWithDefaults instantiates a new RekeyAttemptInitializeResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetBackup + +`func (o *RekeyAttemptInitializeResponse) GetBackup() bool` + +GetBackup returns the Backup field if non-nil, zero value otherwise. + +### GetBackupOk + +`func (o *RekeyAttemptInitializeResponse) GetBackupOk() (*bool, bool)` + +GetBackupOk returns a tuple with the Backup field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBackup + +`func (o *RekeyAttemptInitializeResponse) SetBackup(v bool)` + +SetBackup sets Backup field to given value. + + +### HasBackup + +`func (o *RekeyAttemptInitializeResponse) HasBackup() bool` + +HasBackup returns a boolean if a field has been set. + + + + +### GetN + +`func (o *RekeyAttemptInitializeResponse) GetN() int32` + +GetN returns the N field if non-nil, zero value otherwise. + +### GetNOk + +`func (o *RekeyAttemptInitializeResponse) GetNOk() (*int32, bool)` + +GetNOk returns a tuple with the N field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetN + +`func (o *RekeyAttemptInitializeResponse) SetN(v int32)` + +SetN sets N field to given value. + + +### HasN + +`func (o *RekeyAttemptInitializeResponse) HasN() bool` + +HasN returns a boolean if a field has been set. + + + + +### GetNounce + +`func (o *RekeyAttemptInitializeResponse) GetNounce() string` + +GetNounce returns the Nounce field if non-nil, zero value otherwise. + +### GetNounceOk + +`func (o *RekeyAttemptInitializeResponse) GetNounceOk() (*string, bool)` + +GetNounceOk returns a tuple with the Nounce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNounce + +`func (o *RekeyAttemptInitializeResponse) SetNounce(v string)` + +SetNounce sets Nounce field to given value. + + +### HasNounce + +`func (o *RekeyAttemptInitializeResponse) HasNounce() bool` + +HasNounce returns a boolean if a field has been set. + + + + +### GetPgpFingerprints + +`func (o *RekeyAttemptInitializeResponse) GetPgpFingerprints() []string` + +GetPgpFingerprints returns the PgpFingerprints field if non-nil, zero value otherwise. + +### GetPgpFingerprintsOk + +`func (o *RekeyAttemptInitializeResponse) GetPgpFingerprintsOk() (*[]string, bool)` + +GetPgpFingerprintsOk returns a tuple with the PgpFingerprints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprints + +`func (o *RekeyAttemptInitializeResponse) SetPgpFingerprints(v []string)` + +SetPgpFingerprints sets PgpFingerprints field to given value. + + +### HasPgpFingerprints + +`func (o *RekeyAttemptInitializeResponse) HasPgpFingerprints() bool` + +HasPgpFingerprints returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RekeyAttemptInitializeResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RekeyAttemptInitializeResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RekeyAttemptInitializeResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RekeyAttemptInitializeResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RekeyAttemptInitializeResponse) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RekeyAttemptInitializeResponse) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RekeyAttemptInitializeResponse) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RekeyAttemptInitializeResponse) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RekeyAttemptInitializeResponse) GetStarted() string` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RekeyAttemptInitializeResponse) GetStartedOk() (*string, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RekeyAttemptInitializeResponse) SetStarted(v string)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RekeyAttemptInitializeResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + +### GetT + +`func (o *RekeyAttemptInitializeResponse) GetT() int32` + +GetT returns the T field if non-nil, zero value otherwise. + +### GetTOk + +`func (o *RekeyAttemptInitializeResponse) GetTOk() (*int32, bool)` + +GetTOk returns a tuple with the T field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetT + +`func (o *RekeyAttemptInitializeResponse) SetT(v int32)` + +SetT sets T field to given value. + + +### HasT + +`func (o *RekeyAttemptInitializeResponse) HasT() bool` + +HasT returns a boolean if a field has been set. + + + + +### GetVerificationNonce + +`func (o *RekeyAttemptInitializeResponse) GetVerificationNonce() string` + +GetVerificationNonce returns the VerificationNonce field if non-nil, zero value otherwise. + +### GetVerificationNonceOk + +`func (o *RekeyAttemptInitializeResponse) GetVerificationNonceOk() (*string, bool)` + +GetVerificationNonceOk returns a tuple with the VerificationNonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVerificationNonce + +`func (o *RekeyAttemptInitializeResponse) SetVerificationNonce(v string)` + +SetVerificationNonce sets VerificationNonce field to given value. + + +### HasVerificationNonce + +`func (o *RekeyAttemptInitializeResponse) HasVerificationNonce() bool` + +HasVerificationNonce returns a boolean if a field has been set. + + + + +### GetVerificationRequired + +`func (o *RekeyAttemptInitializeResponse) GetVerificationRequired() bool` + +GetVerificationRequired returns the VerificationRequired field if non-nil, zero value otherwise. + +### GetVerificationRequiredOk + +`func (o *RekeyAttemptInitializeResponse) GetVerificationRequiredOk() (*bool, bool)` + +GetVerificationRequiredOk returns a tuple with the VerificationRequired field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVerificationRequired + +`func (o *RekeyAttemptInitializeResponse) SetVerificationRequired(v bool)` + +SetVerificationRequired sets VerificationRequired field to given value. + + +### HasVerificationRequired + +`func (o *RekeyAttemptInitializeResponse) HasVerificationRequired() bool` + +HasVerificationRequired returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RekeyAttemptReadProgressResponse.md b/docs/RekeyAttemptReadProgressResponse.md new file mode 100644 index 00000000..a63bc210 --- /dev/null +++ b/docs/RekeyAttemptReadProgressResponse.md @@ -0,0 +1,339 @@ +# RekeyAttemptReadProgressResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Backup** | Pointer to **bool** | | [optional] +**N** | Pointer to **int32** | | [optional] +**Nounce** | Pointer to **string** | | [optional] +**PgpFingerprints** | Pointer to **[]string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **string** | | [optional] +**T** | Pointer to **int32** | | [optional] +**VerificationNonce** | Pointer to **string** | | [optional] +**VerificationRequired** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRekeyAttemptReadProgressResponse + +`func NewRekeyAttemptReadProgressResponse() *RekeyAttemptReadProgressResponse` + +NewRekeyAttemptReadProgressResponse instantiates a new RekeyAttemptReadProgressResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyAttemptReadProgressResponseWithDefaults + +`func NewRekeyAttemptReadProgressResponseWithDefaults() *RekeyAttemptReadProgressResponse` + +NewRekeyAttemptReadProgressResponseWithDefaults instantiates a new RekeyAttemptReadProgressResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetBackup + +`func (o *RekeyAttemptReadProgressResponse) GetBackup() bool` + +GetBackup returns the Backup field if non-nil, zero value otherwise. + +### GetBackupOk + +`func (o *RekeyAttemptReadProgressResponse) GetBackupOk() (*bool, bool)` + +GetBackupOk returns a tuple with the Backup field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBackup + +`func (o *RekeyAttemptReadProgressResponse) SetBackup(v bool)` + +SetBackup sets Backup field to given value. + + +### HasBackup + +`func (o *RekeyAttemptReadProgressResponse) HasBackup() bool` + +HasBackup returns a boolean if a field has been set. + + + + +### GetN + +`func (o *RekeyAttemptReadProgressResponse) GetN() int32` + +GetN returns the N field if non-nil, zero value otherwise. + +### GetNOk + +`func (o *RekeyAttemptReadProgressResponse) GetNOk() (*int32, bool)` + +GetNOk returns a tuple with the N field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetN + +`func (o *RekeyAttemptReadProgressResponse) SetN(v int32)` + +SetN sets N field to given value. + + +### HasN + +`func (o *RekeyAttemptReadProgressResponse) HasN() bool` + +HasN returns a boolean if a field has been set. + + + + +### GetNounce + +`func (o *RekeyAttemptReadProgressResponse) GetNounce() string` + +GetNounce returns the Nounce field if non-nil, zero value otherwise. + +### GetNounceOk + +`func (o *RekeyAttemptReadProgressResponse) GetNounceOk() (*string, bool)` + +GetNounceOk returns a tuple with the Nounce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNounce + +`func (o *RekeyAttemptReadProgressResponse) SetNounce(v string)` + +SetNounce sets Nounce field to given value. + + +### HasNounce + +`func (o *RekeyAttemptReadProgressResponse) HasNounce() bool` + +HasNounce returns a boolean if a field has been set. + + + + +### GetPgpFingerprints + +`func (o *RekeyAttemptReadProgressResponse) GetPgpFingerprints() []string` + +GetPgpFingerprints returns the PgpFingerprints field if non-nil, zero value otherwise. + +### GetPgpFingerprintsOk + +`func (o *RekeyAttemptReadProgressResponse) GetPgpFingerprintsOk() (*[]string, bool)` + +GetPgpFingerprintsOk returns a tuple with the PgpFingerprints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprints + +`func (o *RekeyAttemptReadProgressResponse) SetPgpFingerprints(v []string)` + +SetPgpFingerprints sets PgpFingerprints field to given value. + + +### HasPgpFingerprints + +`func (o *RekeyAttemptReadProgressResponse) HasPgpFingerprints() bool` + +HasPgpFingerprints returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RekeyAttemptReadProgressResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RekeyAttemptReadProgressResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RekeyAttemptReadProgressResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RekeyAttemptReadProgressResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RekeyAttemptReadProgressResponse) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RekeyAttemptReadProgressResponse) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RekeyAttemptReadProgressResponse) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RekeyAttemptReadProgressResponse) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RekeyAttemptReadProgressResponse) GetStarted() string` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RekeyAttemptReadProgressResponse) GetStartedOk() (*string, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RekeyAttemptReadProgressResponse) SetStarted(v string)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RekeyAttemptReadProgressResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + +### GetT + +`func (o *RekeyAttemptReadProgressResponse) GetT() int32` + +GetT returns the T field if non-nil, zero value otherwise. + +### GetTOk + +`func (o *RekeyAttemptReadProgressResponse) GetTOk() (*int32, bool)` + +GetTOk returns a tuple with the T field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetT + +`func (o *RekeyAttemptReadProgressResponse) SetT(v int32)` + +SetT sets T field to given value. + + +### HasT + +`func (o *RekeyAttemptReadProgressResponse) HasT() bool` + +HasT returns a boolean if a field has been set. + + + + +### GetVerificationNonce + +`func (o *RekeyAttemptReadProgressResponse) GetVerificationNonce() string` + +GetVerificationNonce returns the VerificationNonce field if non-nil, zero value otherwise. + +### GetVerificationNonceOk + +`func (o *RekeyAttemptReadProgressResponse) GetVerificationNonceOk() (*string, bool)` + +GetVerificationNonceOk returns a tuple with the VerificationNonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVerificationNonce + +`func (o *RekeyAttemptReadProgressResponse) SetVerificationNonce(v string)` + +SetVerificationNonce sets VerificationNonce field to given value. + + +### HasVerificationNonce + +`func (o *RekeyAttemptReadProgressResponse) HasVerificationNonce() bool` + +HasVerificationNonce returns a boolean if a field has been set. + + + + +### GetVerificationRequired + +`func (o *RekeyAttemptReadProgressResponse) GetVerificationRequired() bool` + +GetVerificationRequired returns the VerificationRequired field if non-nil, zero value otherwise. + +### GetVerificationRequiredOk + +`func (o *RekeyAttemptReadProgressResponse) GetVerificationRequiredOk() (*bool, bool)` + +GetVerificationRequiredOk returns a tuple with the VerificationRequired field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVerificationRequired + +`func (o *RekeyAttemptReadProgressResponse) SetVerificationRequired(v bool)` + +SetVerificationRequired sets VerificationRequired field to given value. + + +### HasVerificationRequired + +`func (o *RekeyAttemptReadProgressResponse) HasVerificationRequired() bool` + +HasVerificationRequired returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteRekeyUpdateRequest.md b/docs/RekeyAttemptUpdateRequest.md similarity index 63% rename from docs/WriteRekeyUpdateRequest.md rename to docs/RekeyAttemptUpdateRequest.md index ecefc7a2..638ea548 100644 --- a/docs/WriteRekeyUpdateRequest.md +++ b/docs/RekeyAttemptUpdateRequest.md @@ -1,4 +1,4 @@ -# WriteRekeyUpdateRequest +# RekeyAttemptUpdateRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteRekeyUpdateRequest +### NewRekeyAttemptUpdateRequest -`func NewWriteRekeyUpdateRequest() *WriteRekeyUpdateRequest` +`func NewRekeyAttemptUpdateRequest() *RekeyAttemptUpdateRequest` -NewWriteRekeyUpdateRequest instantiates a new WriteRekeyUpdateRequest object +NewRekeyAttemptUpdateRequest instantiates a new RekeyAttemptUpdateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteRekeyUpdateRequestWithDefaults +### NewRekeyAttemptUpdateRequestWithDefaults -`func NewWriteRekeyUpdateRequestWithDefaults() *WriteRekeyUpdateRequest` +`func NewRekeyAttemptUpdateRequestWithDefaults() *RekeyAttemptUpdateRequest` -NewWriteRekeyUpdateRequestWithDefaults instantiates a new WriteRekeyUpdateRequest object +NewRekeyAttemptUpdateRequestWithDefaults instantiates a new RekeyAttemptUpdateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKey -`func (o *WriteRekeyUpdateRequest) GetKey() string` +`func (o *RekeyAttemptUpdateRequest) GetKey() string` GetKey returns the Key field if non-nil, zero value otherwise. ### GetKeyOk -`func (o *WriteRekeyUpdateRequest) GetKeyOk() (*string, bool)` +`func (o *RekeyAttemptUpdateRequest) GetKeyOk() (*string, bool)` GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKey -`func (o *WriteRekeyUpdateRequest) SetKey(v string)` +`func (o *RekeyAttemptUpdateRequest) SetKey(v string)` SetKey sets Key field to given value. ### HasKey -`func (o *WriteRekeyUpdateRequest) HasKey() bool` +`func (o *RekeyAttemptUpdateRequest) HasKey() bool` HasKey returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasKey returns a boolean if a field has been set. ### GetNonce -`func (o *WriteRekeyUpdateRequest) GetNonce() string` +`func (o *RekeyAttemptUpdateRequest) GetNonce() string` GetNonce returns the Nonce field if non-nil, zero value otherwise. ### GetNonceOk -`func (o *WriteRekeyUpdateRequest) GetNonceOk() (*string, bool)` +`func (o *RekeyAttemptUpdateRequest) GetNonceOk() (*string, bool)` GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNonce -`func (o *WriteRekeyUpdateRequest) SetNonce(v string)` +`func (o *RekeyAttemptUpdateRequest) SetNonce(v string)` SetNonce sets Nonce field to given value. ### HasNonce -`func (o *WriteRekeyUpdateRequest) HasNonce() bool` +`func (o *RekeyAttemptUpdateRequest) HasNonce() bool` HasNonce returns a boolean if a field has been set. diff --git a/docs/RekeyAttemptUpdateResponse.md b/docs/RekeyAttemptUpdateResponse.md new file mode 100644 index 00000000..86d14fe7 --- /dev/null +++ b/docs/RekeyAttemptUpdateResponse.md @@ -0,0 +1,429 @@ +# RekeyAttemptUpdateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Backup** | Pointer to **bool** | | [optional] +**Complete** | Pointer to **bool** | | [optional] +**Keys** | Pointer to **[]string** | | [optional] +**KeysBase64** | Pointer to **[]string** | | [optional] +**N** | Pointer to **int32** | | [optional] +**Nounce** | Pointer to **string** | | [optional] +**PgpFingerprints** | Pointer to **[]string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **string** | | [optional] +**T** | Pointer to **int32** | | [optional] +**VerificationNonce** | Pointer to **string** | | [optional] +**VerificationRequired** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRekeyAttemptUpdateResponse + +`func NewRekeyAttemptUpdateResponse() *RekeyAttemptUpdateResponse` + +NewRekeyAttemptUpdateResponse instantiates a new RekeyAttemptUpdateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyAttemptUpdateResponseWithDefaults + +`func NewRekeyAttemptUpdateResponseWithDefaults() *RekeyAttemptUpdateResponse` + +NewRekeyAttemptUpdateResponseWithDefaults instantiates a new RekeyAttemptUpdateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetBackup + +`func (o *RekeyAttemptUpdateResponse) GetBackup() bool` + +GetBackup returns the Backup field if non-nil, zero value otherwise. + +### GetBackupOk + +`func (o *RekeyAttemptUpdateResponse) GetBackupOk() (*bool, bool)` + +GetBackupOk returns a tuple with the Backup field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBackup + +`func (o *RekeyAttemptUpdateResponse) SetBackup(v bool)` + +SetBackup sets Backup field to given value. + + +### HasBackup + +`func (o *RekeyAttemptUpdateResponse) HasBackup() bool` + +HasBackup returns a boolean if a field has been set. + + + + +### GetComplete + +`func (o *RekeyAttemptUpdateResponse) GetComplete() bool` + +GetComplete returns the Complete field if non-nil, zero value otherwise. + +### GetCompleteOk + +`func (o *RekeyAttemptUpdateResponse) GetCompleteOk() (*bool, bool)` + +GetCompleteOk returns a tuple with the Complete field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetComplete + +`func (o *RekeyAttemptUpdateResponse) SetComplete(v bool)` + +SetComplete sets Complete field to given value. + + +### HasComplete + +`func (o *RekeyAttemptUpdateResponse) HasComplete() bool` + +HasComplete returns a boolean if a field has been set. + + + + +### GetKeys + +`func (o *RekeyAttemptUpdateResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *RekeyAttemptUpdateResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *RekeyAttemptUpdateResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *RekeyAttemptUpdateResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + +### GetKeysBase64 + +`func (o *RekeyAttemptUpdateResponse) GetKeysBase64() []string` + +GetKeysBase64 returns the KeysBase64 field if non-nil, zero value otherwise. + +### GetKeysBase64Ok + +`func (o *RekeyAttemptUpdateResponse) GetKeysBase64Ok() (*[]string, bool)` + +GetKeysBase64Ok returns a tuple with the KeysBase64 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeysBase64 + +`func (o *RekeyAttemptUpdateResponse) SetKeysBase64(v []string)` + +SetKeysBase64 sets KeysBase64 field to given value. + + +### HasKeysBase64 + +`func (o *RekeyAttemptUpdateResponse) HasKeysBase64() bool` + +HasKeysBase64 returns a boolean if a field has been set. + + + + +### GetN + +`func (o *RekeyAttemptUpdateResponse) GetN() int32` + +GetN returns the N field if non-nil, zero value otherwise. + +### GetNOk + +`func (o *RekeyAttemptUpdateResponse) GetNOk() (*int32, bool)` + +GetNOk returns a tuple with the N field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetN + +`func (o *RekeyAttemptUpdateResponse) SetN(v int32)` + +SetN sets N field to given value. + + +### HasN + +`func (o *RekeyAttemptUpdateResponse) HasN() bool` + +HasN returns a boolean if a field has been set. + + + + +### GetNounce + +`func (o *RekeyAttemptUpdateResponse) GetNounce() string` + +GetNounce returns the Nounce field if non-nil, zero value otherwise. + +### GetNounceOk + +`func (o *RekeyAttemptUpdateResponse) GetNounceOk() (*string, bool)` + +GetNounceOk returns a tuple with the Nounce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNounce + +`func (o *RekeyAttemptUpdateResponse) SetNounce(v string)` + +SetNounce sets Nounce field to given value. + + +### HasNounce + +`func (o *RekeyAttemptUpdateResponse) HasNounce() bool` + +HasNounce returns a boolean if a field has been set. + + + + +### GetPgpFingerprints + +`func (o *RekeyAttemptUpdateResponse) GetPgpFingerprints() []string` + +GetPgpFingerprints returns the PgpFingerprints field if non-nil, zero value otherwise. + +### GetPgpFingerprintsOk + +`func (o *RekeyAttemptUpdateResponse) GetPgpFingerprintsOk() (*[]string, bool)` + +GetPgpFingerprintsOk returns a tuple with the PgpFingerprints field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprints + +`func (o *RekeyAttemptUpdateResponse) SetPgpFingerprints(v []string)` + +SetPgpFingerprints sets PgpFingerprints field to given value. + + +### HasPgpFingerprints + +`func (o *RekeyAttemptUpdateResponse) HasPgpFingerprints() bool` + +HasPgpFingerprints returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RekeyAttemptUpdateResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RekeyAttemptUpdateResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RekeyAttemptUpdateResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RekeyAttemptUpdateResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RekeyAttemptUpdateResponse) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RekeyAttemptUpdateResponse) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RekeyAttemptUpdateResponse) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RekeyAttemptUpdateResponse) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RekeyAttemptUpdateResponse) GetStarted() string` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RekeyAttemptUpdateResponse) GetStartedOk() (*string, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RekeyAttemptUpdateResponse) SetStarted(v string)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RekeyAttemptUpdateResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + +### GetT + +`func (o *RekeyAttemptUpdateResponse) GetT() int32` + +GetT returns the T field if non-nil, zero value otherwise. + +### GetTOk + +`func (o *RekeyAttemptUpdateResponse) GetTOk() (*int32, bool)` + +GetTOk returns a tuple with the T field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetT + +`func (o *RekeyAttemptUpdateResponse) SetT(v int32)` + +SetT sets T field to given value. + + +### HasT + +`func (o *RekeyAttemptUpdateResponse) HasT() bool` + +HasT returns a boolean if a field has been set. + + + + +### GetVerificationNonce + +`func (o *RekeyAttemptUpdateResponse) GetVerificationNonce() string` + +GetVerificationNonce returns the VerificationNonce field if non-nil, zero value otherwise. + +### GetVerificationNonceOk + +`func (o *RekeyAttemptUpdateResponse) GetVerificationNonceOk() (*string, bool)` + +GetVerificationNonceOk returns a tuple with the VerificationNonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVerificationNonce + +`func (o *RekeyAttemptUpdateResponse) SetVerificationNonce(v string)` + +SetVerificationNonce sets VerificationNonce field to given value. + + +### HasVerificationNonce + +`func (o *RekeyAttemptUpdateResponse) HasVerificationNonce() bool` + +HasVerificationNonce returns a boolean if a field has been set. + + + + +### GetVerificationRequired + +`func (o *RekeyAttemptUpdateResponse) GetVerificationRequired() bool` + +GetVerificationRequired returns the VerificationRequired field if non-nil, zero value otherwise. + +### GetVerificationRequiredOk + +`func (o *RekeyAttemptUpdateResponse) GetVerificationRequiredOk() (*bool, bool)` + +GetVerificationRequiredOk returns a tuple with the VerificationRequired field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVerificationRequired + +`func (o *RekeyAttemptUpdateResponse) SetVerificationRequired(v bool)` + +SetVerificationRequired sets VerificationRequired field to given value. + + +### HasVerificationRequired + +`func (o *RekeyAttemptUpdateResponse) HasVerificationRequired() bool` + +HasVerificationRequired returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RekeyReadBackupKeyResponse.md b/docs/RekeyReadBackupKeyResponse.md new file mode 100644 index 00000000..80e83f3f --- /dev/null +++ b/docs/RekeyReadBackupKeyResponse.md @@ -0,0 +1,129 @@ +# RekeyReadBackupKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **map[string]interface{}** | | [optional] +**KeysBase64** | Pointer to **map[string]interface{}** | | [optional] +**Nonce** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewRekeyReadBackupKeyResponse + +`func NewRekeyReadBackupKeyResponse() *RekeyReadBackupKeyResponse` + +NewRekeyReadBackupKeyResponse instantiates a new RekeyReadBackupKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyReadBackupKeyResponseWithDefaults + +`func NewRekeyReadBackupKeyResponseWithDefaults() *RekeyReadBackupKeyResponse` + +NewRekeyReadBackupKeyResponseWithDefaults instantiates a new RekeyReadBackupKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *RekeyReadBackupKeyResponse) GetKeys() map[string]interface{}` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *RekeyReadBackupKeyResponse) GetKeysOk() (*map[string]interface{}, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *RekeyReadBackupKeyResponse) SetKeys(v map[string]interface{})` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *RekeyReadBackupKeyResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + +### GetKeysBase64 + +`func (o *RekeyReadBackupKeyResponse) GetKeysBase64() map[string]interface{}` + +GetKeysBase64 returns the KeysBase64 field if non-nil, zero value otherwise. + +### GetKeysBase64Ok + +`func (o *RekeyReadBackupKeyResponse) GetKeysBase64Ok() (*map[string]interface{}, bool)` + +GetKeysBase64Ok returns a tuple with the KeysBase64 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeysBase64 + +`func (o *RekeyReadBackupKeyResponse) SetKeysBase64(v map[string]interface{})` + +SetKeysBase64 sets KeysBase64 field to given value. + + +### HasKeysBase64 + +`func (o *RekeyReadBackupKeyResponse) HasKeysBase64() bool` + +HasKeysBase64 returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *RekeyReadBackupKeyResponse) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *RekeyReadBackupKeyResponse) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *RekeyReadBackupKeyResponse) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *RekeyReadBackupKeyResponse) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RekeyReadBackupRecoveryKeyResponse.md b/docs/RekeyReadBackupRecoveryKeyResponse.md new file mode 100644 index 00000000..253280e5 --- /dev/null +++ b/docs/RekeyReadBackupRecoveryKeyResponse.md @@ -0,0 +1,129 @@ +# RekeyReadBackupRecoveryKeyResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **map[string]interface{}** | | [optional] +**KeysBase64** | Pointer to **map[string]interface{}** | | [optional] +**Nonce** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewRekeyReadBackupRecoveryKeyResponse + +`func NewRekeyReadBackupRecoveryKeyResponse() *RekeyReadBackupRecoveryKeyResponse` + +NewRekeyReadBackupRecoveryKeyResponse instantiates a new RekeyReadBackupRecoveryKeyResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyReadBackupRecoveryKeyResponseWithDefaults + +`func NewRekeyReadBackupRecoveryKeyResponseWithDefaults() *RekeyReadBackupRecoveryKeyResponse` + +NewRekeyReadBackupRecoveryKeyResponseWithDefaults instantiates a new RekeyReadBackupRecoveryKeyResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *RekeyReadBackupRecoveryKeyResponse) GetKeys() map[string]interface{}` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *RekeyReadBackupRecoveryKeyResponse) GetKeysOk() (*map[string]interface{}, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *RekeyReadBackupRecoveryKeyResponse) SetKeys(v map[string]interface{})` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *RekeyReadBackupRecoveryKeyResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + +### GetKeysBase64 + +`func (o *RekeyReadBackupRecoveryKeyResponse) GetKeysBase64() map[string]interface{}` + +GetKeysBase64 returns the KeysBase64 field if non-nil, zero value otherwise. + +### GetKeysBase64Ok + +`func (o *RekeyReadBackupRecoveryKeyResponse) GetKeysBase64Ok() (*map[string]interface{}, bool)` + +GetKeysBase64Ok returns a tuple with the KeysBase64 field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeysBase64 + +`func (o *RekeyReadBackupRecoveryKeyResponse) SetKeysBase64(v map[string]interface{})` + +SetKeysBase64 sets KeysBase64 field to given value. + + +### HasKeysBase64 + +`func (o *RekeyReadBackupRecoveryKeyResponse) HasKeysBase64() bool` + +HasKeysBase64 returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *RekeyReadBackupRecoveryKeyResponse) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *RekeyReadBackupRecoveryKeyResponse) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *RekeyReadBackupRecoveryKeyResponse) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *RekeyReadBackupRecoveryKeyResponse) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RekeyVerificationCancelResponse.md b/docs/RekeyVerificationCancelResponse.md new file mode 100644 index 00000000..1738da4a --- /dev/null +++ b/docs/RekeyVerificationCancelResponse.md @@ -0,0 +1,189 @@ +# RekeyVerificationCancelResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**N** | Pointer to **int32** | | [optional] +**Nounce** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Started** | Pointer to **string** | | [optional] +**T** | Pointer to **int32** | | [optional] + + + +## Methods + + +### NewRekeyVerificationCancelResponse + +`func NewRekeyVerificationCancelResponse() *RekeyVerificationCancelResponse` + +NewRekeyVerificationCancelResponse instantiates a new RekeyVerificationCancelResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyVerificationCancelResponseWithDefaults + +`func NewRekeyVerificationCancelResponseWithDefaults() *RekeyVerificationCancelResponse` + +NewRekeyVerificationCancelResponseWithDefaults instantiates a new RekeyVerificationCancelResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetN + +`func (o *RekeyVerificationCancelResponse) GetN() int32` + +GetN returns the N field if non-nil, zero value otherwise. + +### GetNOk + +`func (o *RekeyVerificationCancelResponse) GetNOk() (*int32, bool)` + +GetNOk returns a tuple with the N field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetN + +`func (o *RekeyVerificationCancelResponse) SetN(v int32)` + +SetN sets N field to given value. + + +### HasN + +`func (o *RekeyVerificationCancelResponse) HasN() bool` + +HasN returns a boolean if a field has been set. + + + + +### GetNounce + +`func (o *RekeyVerificationCancelResponse) GetNounce() string` + +GetNounce returns the Nounce field if non-nil, zero value otherwise. + +### GetNounceOk + +`func (o *RekeyVerificationCancelResponse) GetNounceOk() (*string, bool)` + +GetNounceOk returns a tuple with the Nounce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNounce + +`func (o *RekeyVerificationCancelResponse) SetNounce(v string)` + +SetNounce sets Nounce field to given value. + + +### HasNounce + +`func (o *RekeyVerificationCancelResponse) HasNounce() bool` + +HasNounce returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RekeyVerificationCancelResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RekeyVerificationCancelResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RekeyVerificationCancelResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RekeyVerificationCancelResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RekeyVerificationCancelResponse) GetStarted() string` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RekeyVerificationCancelResponse) GetStartedOk() (*string, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RekeyVerificationCancelResponse) SetStarted(v string)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RekeyVerificationCancelResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + +### GetT + +`func (o *RekeyVerificationCancelResponse) GetT() int32` + +GetT returns the T field if non-nil, zero value otherwise. + +### GetTOk + +`func (o *RekeyVerificationCancelResponse) GetTOk() (*int32, bool)` + +GetTOk returns a tuple with the T field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetT + +`func (o *RekeyVerificationCancelResponse) SetT(v int32)` + +SetT sets T field to given value. + + +### HasT + +`func (o *RekeyVerificationCancelResponse) HasT() bool` + +HasT returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RekeyVerificationReadProgressResponse.md b/docs/RekeyVerificationReadProgressResponse.md new file mode 100644 index 00000000..9155fda6 --- /dev/null +++ b/docs/RekeyVerificationReadProgressResponse.md @@ -0,0 +1,189 @@ +# RekeyVerificationReadProgressResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**N** | Pointer to **int32** | | [optional] +**Nounce** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Started** | Pointer to **string** | | [optional] +**T** | Pointer to **int32** | | [optional] + + + +## Methods + + +### NewRekeyVerificationReadProgressResponse + +`func NewRekeyVerificationReadProgressResponse() *RekeyVerificationReadProgressResponse` + +NewRekeyVerificationReadProgressResponse instantiates a new RekeyVerificationReadProgressResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyVerificationReadProgressResponseWithDefaults + +`func NewRekeyVerificationReadProgressResponseWithDefaults() *RekeyVerificationReadProgressResponse` + +NewRekeyVerificationReadProgressResponseWithDefaults instantiates a new RekeyVerificationReadProgressResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetN + +`func (o *RekeyVerificationReadProgressResponse) GetN() int32` + +GetN returns the N field if non-nil, zero value otherwise. + +### GetNOk + +`func (o *RekeyVerificationReadProgressResponse) GetNOk() (*int32, bool)` + +GetNOk returns a tuple with the N field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetN + +`func (o *RekeyVerificationReadProgressResponse) SetN(v int32)` + +SetN sets N field to given value. + + +### HasN + +`func (o *RekeyVerificationReadProgressResponse) HasN() bool` + +HasN returns a boolean if a field has been set. + + + + +### GetNounce + +`func (o *RekeyVerificationReadProgressResponse) GetNounce() string` + +GetNounce returns the Nounce field if non-nil, zero value otherwise. + +### GetNounceOk + +`func (o *RekeyVerificationReadProgressResponse) GetNounceOk() (*string, bool)` + +GetNounceOk returns a tuple with the Nounce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNounce + +`func (o *RekeyVerificationReadProgressResponse) SetNounce(v string)` + +SetNounce sets Nounce field to given value. + + +### HasNounce + +`func (o *RekeyVerificationReadProgressResponse) HasNounce() bool` + +HasNounce returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RekeyVerificationReadProgressResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RekeyVerificationReadProgressResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RekeyVerificationReadProgressResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RekeyVerificationReadProgressResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RekeyVerificationReadProgressResponse) GetStarted() string` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RekeyVerificationReadProgressResponse) GetStartedOk() (*string, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RekeyVerificationReadProgressResponse) SetStarted(v string)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RekeyVerificationReadProgressResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + +### GetT + +`func (o *RekeyVerificationReadProgressResponse) GetT() int32` + +GetT returns the T field if non-nil, zero value otherwise. + +### GetTOk + +`func (o *RekeyVerificationReadProgressResponse) GetTOk() (*int32, bool)` + +GetTOk returns a tuple with the T field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetT + +`func (o *RekeyVerificationReadProgressResponse) SetT(v int32)` + +SetT sets T field to given value. + + +### HasT + +`func (o *RekeyVerificationReadProgressResponse) HasT() bool` + +HasT returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteRekeyVerifyRequest.md b/docs/RekeyVerificationUpdateRequest.md similarity index 62% rename from docs/WriteRekeyVerifyRequest.md rename to docs/RekeyVerificationUpdateRequest.md index 9badd615..413801f3 100644 --- a/docs/WriteRekeyVerifyRequest.md +++ b/docs/RekeyVerificationUpdateRequest.md @@ -1,4 +1,4 @@ -# WriteRekeyVerifyRequest +# RekeyVerificationUpdateRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteRekeyVerifyRequest +### NewRekeyVerificationUpdateRequest -`func NewWriteRekeyVerifyRequest() *WriteRekeyVerifyRequest` +`func NewRekeyVerificationUpdateRequest() *RekeyVerificationUpdateRequest` -NewWriteRekeyVerifyRequest instantiates a new WriteRekeyVerifyRequest object +NewRekeyVerificationUpdateRequest instantiates a new RekeyVerificationUpdateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteRekeyVerifyRequestWithDefaults +### NewRekeyVerificationUpdateRequestWithDefaults -`func NewWriteRekeyVerifyRequestWithDefaults() *WriteRekeyVerifyRequest` +`func NewRekeyVerificationUpdateRequestWithDefaults() *RekeyVerificationUpdateRequest` -NewWriteRekeyVerifyRequestWithDefaults instantiates a new WriteRekeyVerifyRequest object +NewRekeyVerificationUpdateRequestWithDefaults instantiates a new RekeyVerificationUpdateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKey -`func (o *WriteRekeyVerifyRequest) GetKey() string` +`func (o *RekeyVerificationUpdateRequest) GetKey() string` GetKey returns the Key field if non-nil, zero value otherwise. ### GetKeyOk -`func (o *WriteRekeyVerifyRequest) GetKeyOk() (*string, bool)` +`func (o *RekeyVerificationUpdateRequest) GetKeyOk() (*string, bool)` GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKey -`func (o *WriteRekeyVerifyRequest) SetKey(v string)` +`func (o *RekeyVerificationUpdateRequest) SetKey(v string)` SetKey sets Key field to given value. ### HasKey -`func (o *WriteRekeyVerifyRequest) HasKey() bool` +`func (o *RekeyVerificationUpdateRequest) HasKey() bool` HasKey returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasKey returns a boolean if a field has been set. ### GetNonce -`func (o *WriteRekeyVerifyRequest) GetNonce() string` +`func (o *RekeyVerificationUpdateRequest) GetNonce() string` GetNonce returns the Nonce field if non-nil, zero value otherwise. ### GetNonceOk -`func (o *WriteRekeyVerifyRequest) GetNonceOk() (*string, bool)` +`func (o *RekeyVerificationUpdateRequest) GetNonceOk() (*string, bool)` GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNonce -`func (o *WriteRekeyVerifyRequest) SetNonce(v string)` +`func (o *RekeyVerificationUpdateRequest) SetNonce(v string)` SetNonce sets Nonce field to given value. ### HasNonce -`func (o *WriteRekeyVerifyRequest) HasNonce() bool` +`func (o *RekeyVerificationUpdateRequest) HasNonce() bool` HasNonce returns a boolean if a field has been set. diff --git a/docs/RekeyVerificationUpdateResponse.md b/docs/RekeyVerificationUpdateResponse.md new file mode 100644 index 00000000..e7e5890b --- /dev/null +++ b/docs/RekeyVerificationUpdateResponse.md @@ -0,0 +1,99 @@ +# RekeyVerificationUpdateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Complete** | Pointer to **bool** | | [optional] +**Nounce** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewRekeyVerificationUpdateResponse + +`func NewRekeyVerificationUpdateResponse() *RekeyVerificationUpdateResponse` + +NewRekeyVerificationUpdateResponse instantiates a new RekeyVerificationUpdateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRekeyVerificationUpdateResponseWithDefaults + +`func NewRekeyVerificationUpdateResponseWithDefaults() *RekeyVerificationUpdateResponse` + +NewRekeyVerificationUpdateResponseWithDefaults instantiates a new RekeyVerificationUpdateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetComplete + +`func (o *RekeyVerificationUpdateResponse) GetComplete() bool` + +GetComplete returns the Complete field if non-nil, zero value otherwise. + +### GetCompleteOk + +`func (o *RekeyVerificationUpdateResponse) GetCompleteOk() (*bool, bool)` + +GetCompleteOk returns a tuple with the Complete field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetComplete + +`func (o *RekeyVerificationUpdateResponse) SetComplete(v bool)` + +SetComplete sets Complete field to given value. + + +### HasComplete + +`func (o *RekeyVerificationUpdateResponse) HasComplete() bool` + +HasComplete returns a boolean if a field has been set. + + + + +### GetNounce + +`func (o *RekeyVerificationUpdateResponse) GetNounce() string` + +GetNounce returns the Nounce field if non-nil, zero value otherwise. + +### GetNounceOk + +`func (o *RekeyVerificationUpdateResponse) GetNounceOk() (*string, bool)` + +GetNounceOk returns a tuple with the Nounce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNounce + +`func (o *RekeyVerificationUpdateResponse) SetNounce(v string)` + +SetNounce sets Nounce field to given value. + + +### HasNounce + +`func (o *RekeyVerificationUpdateResponse) HasNounce() bool` + +HasNounce returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RemountResponse.md b/docs/RemountResponse.md new file mode 100644 index 00000000..2f3e16bb --- /dev/null +++ b/docs/RemountResponse.md @@ -0,0 +1,69 @@ +# RemountResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**MigrationId** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewRemountResponse + +`func NewRemountResponse() *RemountResponse` + +NewRemountResponse instantiates a new RemountResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRemountResponseWithDefaults + +`func NewRemountResponseWithDefaults() *RemountResponse` + +NewRemountResponseWithDefaults instantiates a new RemountResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetMigrationId + +`func (o *RemountResponse) GetMigrationId() string` + +GetMigrationId returns the MigrationId field if non-nil, zero value otherwise. + +### GetMigrationIdOk + +`func (o *RemountResponse) GetMigrationIdOk() (*string, bool)` + +GetMigrationIdOk returns a tuple with the MigrationId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMigrationId + +`func (o *RemountResponse) SetMigrationId(v string)` + +SetMigrationId sets MigrationId field to given value. + + +### HasMigrationId + +`func (o *RemountResponse) HasMigrationId() bool` + +HasMigrationId returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RemountStatusResponse.md b/docs/RemountStatusResponse.md new file mode 100644 index 00000000..1f873a60 --- /dev/null +++ b/docs/RemountStatusResponse.md @@ -0,0 +1,99 @@ +# RemountStatusResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**MigrationId** | Pointer to **string** | | [optional] +**MigrationInfo** | Pointer to **map[string]interface{}** | | [optional] + + + +## Methods + + +### NewRemountStatusResponse + +`func NewRemountStatusResponse() *RemountStatusResponse` + +NewRemountStatusResponse instantiates a new RemountStatusResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRemountStatusResponseWithDefaults + +`func NewRemountStatusResponseWithDefaults() *RemountStatusResponse` + +NewRemountStatusResponseWithDefaults instantiates a new RemountStatusResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetMigrationId + +`func (o *RemountStatusResponse) GetMigrationId() string` + +GetMigrationId returns the MigrationId field if non-nil, zero value otherwise. + +### GetMigrationIdOk + +`func (o *RemountStatusResponse) GetMigrationIdOk() (*string, bool)` + +GetMigrationIdOk returns a tuple with the MigrationId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMigrationId + +`func (o *RemountStatusResponse) SetMigrationId(v string)` + +SetMigrationId sets MigrationId field to given value. + + +### HasMigrationId + +`func (o *RemountStatusResponse) HasMigrationId() bool` + +HasMigrationId returns a boolean if a field has been set. + + + + +### GetMigrationInfo + +`func (o *RemountStatusResponse) GetMigrationInfo() map[string]interface{}` + +GetMigrationInfo returns the MigrationInfo field if non-nil, zero value otherwise. + +### GetMigrationInfoOk + +`func (o *RemountStatusResponse) GetMigrationInfoOk() (*map[string]interface{}, bool)` + +GetMigrationInfoOk returns a tuple with the MigrationInfo field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMigrationInfo + +`func (o *RemountStatusResponse) SetMigrationInfo(v map[string]interface{})` + +SetMigrationInfo sets MigrationInfo field to given value. + + +### HasMigrationInfo + +`func (o *RemountStatusResponse) HasMigrationInfo() bool` + +HasMigrationInfo returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WrappingRewrapRequest.md b/docs/RewrapRequest.md similarity index 64% rename from docs/WrappingRewrapRequest.md rename to docs/RewrapRequest.md index bac2793c..480d53c6 100644 --- a/docs/WrappingRewrapRequest.md +++ b/docs/RewrapRequest.md @@ -1,4 +1,4 @@ -# WrappingRewrapRequest +# RewrapRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWrappingRewrapRequest +### NewRewrapRequest -`func NewWrappingRewrapRequest() *WrappingRewrapRequest` +`func NewRewrapRequest() *RewrapRequest` -NewWrappingRewrapRequest instantiates a new WrappingRewrapRequest object +NewRewrapRequest instantiates a new RewrapRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWrappingRewrapRequestWithDefaults +### NewRewrapRequestWithDefaults -`func NewWrappingRewrapRequestWithDefaults() *WrappingRewrapRequest` +`func NewRewrapRequestWithDefaults() *RewrapRequest` -NewWrappingRewrapRequestWithDefaults instantiates a new WrappingRewrapRequest object +NewRewrapRequestWithDefaults instantiates a new RewrapRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetToken -`func (o *WrappingRewrapRequest) GetToken() string` +`func (o *RewrapRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *WrappingRewrapRequest) GetTokenOk() (*string, bool)` +`func (o *RewrapRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *WrappingRewrapRequest) SetToken(v string)` +`func (o *RewrapRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *WrappingRewrapRequest) HasToken() bool` +`func (o *RewrapRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/WriteGenerateRootRequest.md b/docs/RootTokenGenerationInitialize2Request.md similarity index 57% rename from docs/WriteGenerateRootRequest.md rename to docs/RootTokenGenerationInitialize2Request.md index ec6698d9..b9fea47b 100644 --- a/docs/WriteGenerateRootRequest.md +++ b/docs/RootTokenGenerationInitialize2Request.md @@ -1,4 +1,4 @@ -# WriteGenerateRootRequest +# RootTokenGenerationInitialize2Request ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteGenerateRootRequest +### NewRootTokenGenerationInitialize2Request -`func NewWriteGenerateRootRequest() *WriteGenerateRootRequest` +`func NewRootTokenGenerationInitialize2Request() *RootTokenGenerationInitialize2Request` -NewWriteGenerateRootRequest instantiates a new WriteGenerateRootRequest object +NewRootTokenGenerationInitialize2Request instantiates a new RootTokenGenerationInitialize2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteGenerateRootRequestWithDefaults +### NewRootTokenGenerationInitialize2RequestWithDefaults -`func NewWriteGenerateRootRequestWithDefaults() *WriteGenerateRootRequest` +`func NewRootTokenGenerationInitialize2RequestWithDefaults() *RootTokenGenerationInitialize2Request` -NewWriteGenerateRootRequestWithDefaults instantiates a new WriteGenerateRootRequest object +NewRootTokenGenerationInitialize2RequestWithDefaults instantiates a new RootTokenGenerationInitialize2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPgpKey -`func (o *WriteGenerateRootRequest) GetPgpKey() string` +`func (o *RootTokenGenerationInitialize2Request) GetPgpKey() string` GetPgpKey returns the PgpKey field if non-nil, zero value otherwise. ### GetPgpKeyOk -`func (o *WriteGenerateRootRequest) GetPgpKeyOk() (*string, bool)` +`func (o *RootTokenGenerationInitialize2Request) GetPgpKeyOk() (*string, bool)` GetPgpKeyOk returns a tuple with the PgpKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPgpKey -`func (o *WriteGenerateRootRequest) SetPgpKey(v string)` +`func (o *RootTokenGenerationInitialize2Request) SetPgpKey(v string)` SetPgpKey sets PgpKey field to given value. ### HasPgpKey -`func (o *WriteGenerateRootRequest) HasPgpKey() bool` +`func (o *RootTokenGenerationInitialize2Request) HasPgpKey() bool` HasPgpKey returns a boolean if a field has been set. diff --git a/docs/RootTokenGenerationInitialize2Response.md b/docs/RootTokenGenerationInitialize2Response.md new file mode 100644 index 00000000..df230971 --- /dev/null +++ b/docs/RootTokenGenerationInitialize2Response.md @@ -0,0 +1,339 @@ +# RootTokenGenerationInitialize2Response + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Complete** | Pointer to **bool** | | [optional] +**EncodedRootToken** | Pointer to **string** | | [optional] +**EncodedToken** | Pointer to **string** | | [optional] +**Nonce** | Pointer to **string** | | [optional] +**Otp** | Pointer to **string** | | [optional] +**OtpLength** | Pointer to **int32** | | [optional] +**PgpFingerprint** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRootTokenGenerationInitialize2Response + +`func NewRootTokenGenerationInitialize2Response() *RootTokenGenerationInitialize2Response` + +NewRootTokenGenerationInitialize2Response instantiates a new RootTokenGenerationInitialize2Response object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRootTokenGenerationInitialize2ResponseWithDefaults + +`func NewRootTokenGenerationInitialize2ResponseWithDefaults() *RootTokenGenerationInitialize2Response` + +NewRootTokenGenerationInitialize2ResponseWithDefaults instantiates a new RootTokenGenerationInitialize2Response object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetComplete + +`func (o *RootTokenGenerationInitialize2Response) GetComplete() bool` + +GetComplete returns the Complete field if non-nil, zero value otherwise. + +### GetCompleteOk + +`func (o *RootTokenGenerationInitialize2Response) GetCompleteOk() (*bool, bool)` + +GetCompleteOk returns a tuple with the Complete field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetComplete + +`func (o *RootTokenGenerationInitialize2Response) SetComplete(v bool)` + +SetComplete sets Complete field to given value. + + +### HasComplete + +`func (o *RootTokenGenerationInitialize2Response) HasComplete() bool` + +HasComplete returns a boolean if a field has been set. + + + + +### GetEncodedRootToken + +`func (o *RootTokenGenerationInitialize2Response) GetEncodedRootToken() string` + +GetEncodedRootToken returns the EncodedRootToken field if non-nil, zero value otherwise. + +### GetEncodedRootTokenOk + +`func (o *RootTokenGenerationInitialize2Response) GetEncodedRootTokenOk() (*string, bool)` + +GetEncodedRootTokenOk returns a tuple with the EncodedRootToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedRootToken + +`func (o *RootTokenGenerationInitialize2Response) SetEncodedRootToken(v string)` + +SetEncodedRootToken sets EncodedRootToken field to given value. + + +### HasEncodedRootToken + +`func (o *RootTokenGenerationInitialize2Response) HasEncodedRootToken() bool` + +HasEncodedRootToken returns a boolean if a field has been set. + + + + +### GetEncodedToken + +`func (o *RootTokenGenerationInitialize2Response) GetEncodedToken() string` + +GetEncodedToken returns the EncodedToken field if non-nil, zero value otherwise. + +### GetEncodedTokenOk + +`func (o *RootTokenGenerationInitialize2Response) GetEncodedTokenOk() (*string, bool)` + +GetEncodedTokenOk returns a tuple with the EncodedToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedToken + +`func (o *RootTokenGenerationInitialize2Response) SetEncodedToken(v string)` + +SetEncodedToken sets EncodedToken field to given value. + + +### HasEncodedToken + +`func (o *RootTokenGenerationInitialize2Response) HasEncodedToken() bool` + +HasEncodedToken returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *RootTokenGenerationInitialize2Response) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *RootTokenGenerationInitialize2Response) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *RootTokenGenerationInitialize2Response) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *RootTokenGenerationInitialize2Response) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + +### GetOtp + +`func (o *RootTokenGenerationInitialize2Response) GetOtp() string` + +GetOtp returns the Otp field if non-nil, zero value otherwise. + +### GetOtpOk + +`func (o *RootTokenGenerationInitialize2Response) GetOtpOk() (*string, bool)` + +GetOtpOk returns a tuple with the Otp field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtp + +`func (o *RootTokenGenerationInitialize2Response) SetOtp(v string)` + +SetOtp sets Otp field to given value. + + +### HasOtp + +`func (o *RootTokenGenerationInitialize2Response) HasOtp() bool` + +HasOtp returns a boolean if a field has been set. + + + + +### GetOtpLength + +`func (o *RootTokenGenerationInitialize2Response) GetOtpLength() int32` + +GetOtpLength returns the OtpLength field if non-nil, zero value otherwise. + +### GetOtpLengthOk + +`func (o *RootTokenGenerationInitialize2Response) GetOtpLengthOk() (*int32, bool)` + +GetOtpLengthOk returns a tuple with the OtpLength field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtpLength + +`func (o *RootTokenGenerationInitialize2Response) SetOtpLength(v int32)` + +SetOtpLength sets OtpLength field to given value. + + +### HasOtpLength + +`func (o *RootTokenGenerationInitialize2Response) HasOtpLength() bool` + +HasOtpLength returns a boolean if a field has been set. + + + + +### GetPgpFingerprint + +`func (o *RootTokenGenerationInitialize2Response) GetPgpFingerprint() string` + +GetPgpFingerprint returns the PgpFingerprint field if non-nil, zero value otherwise. + +### GetPgpFingerprintOk + +`func (o *RootTokenGenerationInitialize2Response) GetPgpFingerprintOk() (*string, bool)` + +GetPgpFingerprintOk returns a tuple with the PgpFingerprint field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprint + +`func (o *RootTokenGenerationInitialize2Response) SetPgpFingerprint(v string)` + +SetPgpFingerprint sets PgpFingerprint field to given value. + + +### HasPgpFingerprint + +`func (o *RootTokenGenerationInitialize2Response) HasPgpFingerprint() bool` + +HasPgpFingerprint returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RootTokenGenerationInitialize2Response) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RootTokenGenerationInitialize2Response) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RootTokenGenerationInitialize2Response) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RootTokenGenerationInitialize2Response) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RootTokenGenerationInitialize2Response) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RootTokenGenerationInitialize2Response) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RootTokenGenerationInitialize2Response) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RootTokenGenerationInitialize2Response) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RootTokenGenerationInitialize2Response) GetStarted() bool` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RootTokenGenerationInitialize2Response) GetStartedOk() (*bool, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RootTokenGenerationInitialize2Response) SetStarted(v bool)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RootTokenGenerationInitialize2Response) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteGenerateRootAttemptRequest.md b/docs/RootTokenGenerationInitializeRequest.md similarity index 58% rename from docs/WriteGenerateRootAttemptRequest.md rename to docs/RootTokenGenerationInitializeRequest.md index 819a8ad5..2bf84125 100644 --- a/docs/WriteGenerateRootAttemptRequest.md +++ b/docs/RootTokenGenerationInitializeRequest.md @@ -1,4 +1,4 @@ -# WriteGenerateRootAttemptRequest +# RootTokenGenerationInitializeRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteGenerateRootAttemptRequest +### NewRootTokenGenerationInitializeRequest -`func NewWriteGenerateRootAttemptRequest() *WriteGenerateRootAttemptRequest` +`func NewRootTokenGenerationInitializeRequest() *RootTokenGenerationInitializeRequest` -NewWriteGenerateRootAttemptRequest instantiates a new WriteGenerateRootAttemptRequest object +NewRootTokenGenerationInitializeRequest instantiates a new RootTokenGenerationInitializeRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteGenerateRootAttemptRequestWithDefaults +### NewRootTokenGenerationInitializeRequestWithDefaults -`func NewWriteGenerateRootAttemptRequestWithDefaults() *WriteGenerateRootAttemptRequest` +`func NewRootTokenGenerationInitializeRequestWithDefaults() *RootTokenGenerationInitializeRequest` -NewWriteGenerateRootAttemptRequestWithDefaults instantiates a new WriteGenerateRootAttemptRequest object +NewRootTokenGenerationInitializeRequestWithDefaults instantiates a new RootTokenGenerationInitializeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPgpKey -`func (o *WriteGenerateRootAttemptRequest) GetPgpKey() string` +`func (o *RootTokenGenerationInitializeRequest) GetPgpKey() string` GetPgpKey returns the PgpKey field if non-nil, zero value otherwise. ### GetPgpKeyOk -`func (o *WriteGenerateRootAttemptRequest) GetPgpKeyOk() (*string, bool)` +`func (o *RootTokenGenerationInitializeRequest) GetPgpKeyOk() (*string, bool)` GetPgpKeyOk returns a tuple with the PgpKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPgpKey -`func (o *WriteGenerateRootAttemptRequest) SetPgpKey(v string)` +`func (o *RootTokenGenerationInitializeRequest) SetPgpKey(v string)` SetPgpKey sets PgpKey field to given value. ### HasPgpKey -`func (o *WriteGenerateRootAttemptRequest) HasPgpKey() bool` +`func (o *RootTokenGenerationInitializeRequest) HasPgpKey() bool` HasPgpKey returns a boolean if a field has been set. diff --git a/docs/RootTokenGenerationInitializeResponse.md b/docs/RootTokenGenerationInitializeResponse.md new file mode 100644 index 00000000..1a709c3e --- /dev/null +++ b/docs/RootTokenGenerationInitializeResponse.md @@ -0,0 +1,339 @@ +# RootTokenGenerationInitializeResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Complete** | Pointer to **bool** | | [optional] +**EncodedRootToken** | Pointer to **string** | | [optional] +**EncodedToken** | Pointer to **string** | | [optional] +**Nonce** | Pointer to **string** | | [optional] +**Otp** | Pointer to **string** | | [optional] +**OtpLength** | Pointer to **int32** | | [optional] +**PgpFingerprint** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRootTokenGenerationInitializeResponse + +`func NewRootTokenGenerationInitializeResponse() *RootTokenGenerationInitializeResponse` + +NewRootTokenGenerationInitializeResponse instantiates a new RootTokenGenerationInitializeResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRootTokenGenerationInitializeResponseWithDefaults + +`func NewRootTokenGenerationInitializeResponseWithDefaults() *RootTokenGenerationInitializeResponse` + +NewRootTokenGenerationInitializeResponseWithDefaults instantiates a new RootTokenGenerationInitializeResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetComplete + +`func (o *RootTokenGenerationInitializeResponse) GetComplete() bool` + +GetComplete returns the Complete field if non-nil, zero value otherwise. + +### GetCompleteOk + +`func (o *RootTokenGenerationInitializeResponse) GetCompleteOk() (*bool, bool)` + +GetCompleteOk returns a tuple with the Complete field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetComplete + +`func (o *RootTokenGenerationInitializeResponse) SetComplete(v bool)` + +SetComplete sets Complete field to given value. + + +### HasComplete + +`func (o *RootTokenGenerationInitializeResponse) HasComplete() bool` + +HasComplete returns a boolean if a field has been set. + + + + +### GetEncodedRootToken + +`func (o *RootTokenGenerationInitializeResponse) GetEncodedRootToken() string` + +GetEncodedRootToken returns the EncodedRootToken field if non-nil, zero value otherwise. + +### GetEncodedRootTokenOk + +`func (o *RootTokenGenerationInitializeResponse) GetEncodedRootTokenOk() (*string, bool)` + +GetEncodedRootTokenOk returns a tuple with the EncodedRootToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedRootToken + +`func (o *RootTokenGenerationInitializeResponse) SetEncodedRootToken(v string)` + +SetEncodedRootToken sets EncodedRootToken field to given value. + + +### HasEncodedRootToken + +`func (o *RootTokenGenerationInitializeResponse) HasEncodedRootToken() bool` + +HasEncodedRootToken returns a boolean if a field has been set. + + + + +### GetEncodedToken + +`func (o *RootTokenGenerationInitializeResponse) GetEncodedToken() string` + +GetEncodedToken returns the EncodedToken field if non-nil, zero value otherwise. + +### GetEncodedTokenOk + +`func (o *RootTokenGenerationInitializeResponse) GetEncodedTokenOk() (*string, bool)` + +GetEncodedTokenOk returns a tuple with the EncodedToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedToken + +`func (o *RootTokenGenerationInitializeResponse) SetEncodedToken(v string)` + +SetEncodedToken sets EncodedToken field to given value. + + +### HasEncodedToken + +`func (o *RootTokenGenerationInitializeResponse) HasEncodedToken() bool` + +HasEncodedToken returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *RootTokenGenerationInitializeResponse) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *RootTokenGenerationInitializeResponse) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *RootTokenGenerationInitializeResponse) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *RootTokenGenerationInitializeResponse) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + +### GetOtp + +`func (o *RootTokenGenerationInitializeResponse) GetOtp() string` + +GetOtp returns the Otp field if non-nil, zero value otherwise. + +### GetOtpOk + +`func (o *RootTokenGenerationInitializeResponse) GetOtpOk() (*string, bool)` + +GetOtpOk returns a tuple with the Otp field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtp + +`func (o *RootTokenGenerationInitializeResponse) SetOtp(v string)` + +SetOtp sets Otp field to given value. + + +### HasOtp + +`func (o *RootTokenGenerationInitializeResponse) HasOtp() bool` + +HasOtp returns a boolean if a field has been set. + + + + +### GetOtpLength + +`func (o *RootTokenGenerationInitializeResponse) GetOtpLength() int32` + +GetOtpLength returns the OtpLength field if non-nil, zero value otherwise. + +### GetOtpLengthOk + +`func (o *RootTokenGenerationInitializeResponse) GetOtpLengthOk() (*int32, bool)` + +GetOtpLengthOk returns a tuple with the OtpLength field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtpLength + +`func (o *RootTokenGenerationInitializeResponse) SetOtpLength(v int32)` + +SetOtpLength sets OtpLength field to given value. + + +### HasOtpLength + +`func (o *RootTokenGenerationInitializeResponse) HasOtpLength() bool` + +HasOtpLength returns a boolean if a field has been set. + + + + +### GetPgpFingerprint + +`func (o *RootTokenGenerationInitializeResponse) GetPgpFingerprint() string` + +GetPgpFingerprint returns the PgpFingerprint field if non-nil, zero value otherwise. + +### GetPgpFingerprintOk + +`func (o *RootTokenGenerationInitializeResponse) GetPgpFingerprintOk() (*string, bool)` + +GetPgpFingerprintOk returns a tuple with the PgpFingerprint field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprint + +`func (o *RootTokenGenerationInitializeResponse) SetPgpFingerprint(v string)` + +SetPgpFingerprint sets PgpFingerprint field to given value. + + +### HasPgpFingerprint + +`func (o *RootTokenGenerationInitializeResponse) HasPgpFingerprint() bool` + +HasPgpFingerprint returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RootTokenGenerationInitializeResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RootTokenGenerationInitializeResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RootTokenGenerationInitializeResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RootTokenGenerationInitializeResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RootTokenGenerationInitializeResponse) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RootTokenGenerationInitializeResponse) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RootTokenGenerationInitializeResponse) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RootTokenGenerationInitializeResponse) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RootTokenGenerationInitializeResponse) GetStarted() bool` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RootTokenGenerationInitializeResponse) GetStartedOk() (*bool, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RootTokenGenerationInitializeResponse) SetStarted(v bool)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RootTokenGenerationInitializeResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RootTokenGenerationReadProgress2Response.md b/docs/RootTokenGenerationReadProgress2Response.md new file mode 100644 index 00000000..17a142b0 --- /dev/null +++ b/docs/RootTokenGenerationReadProgress2Response.md @@ -0,0 +1,339 @@ +# RootTokenGenerationReadProgress2Response + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Complete** | Pointer to **bool** | | [optional] +**EncodedRootToken** | Pointer to **string** | | [optional] +**EncodedToken** | Pointer to **string** | | [optional] +**Nonce** | Pointer to **string** | | [optional] +**Otp** | Pointer to **string** | | [optional] +**OtpLength** | Pointer to **int32** | | [optional] +**PgpFingerprint** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRootTokenGenerationReadProgress2Response + +`func NewRootTokenGenerationReadProgress2Response() *RootTokenGenerationReadProgress2Response` + +NewRootTokenGenerationReadProgress2Response instantiates a new RootTokenGenerationReadProgress2Response object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRootTokenGenerationReadProgress2ResponseWithDefaults + +`func NewRootTokenGenerationReadProgress2ResponseWithDefaults() *RootTokenGenerationReadProgress2Response` + +NewRootTokenGenerationReadProgress2ResponseWithDefaults instantiates a new RootTokenGenerationReadProgress2Response object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetComplete + +`func (o *RootTokenGenerationReadProgress2Response) GetComplete() bool` + +GetComplete returns the Complete field if non-nil, zero value otherwise. + +### GetCompleteOk + +`func (o *RootTokenGenerationReadProgress2Response) GetCompleteOk() (*bool, bool)` + +GetCompleteOk returns a tuple with the Complete field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetComplete + +`func (o *RootTokenGenerationReadProgress2Response) SetComplete(v bool)` + +SetComplete sets Complete field to given value. + + +### HasComplete + +`func (o *RootTokenGenerationReadProgress2Response) HasComplete() bool` + +HasComplete returns a boolean if a field has been set. + + + + +### GetEncodedRootToken + +`func (o *RootTokenGenerationReadProgress2Response) GetEncodedRootToken() string` + +GetEncodedRootToken returns the EncodedRootToken field if non-nil, zero value otherwise. + +### GetEncodedRootTokenOk + +`func (o *RootTokenGenerationReadProgress2Response) GetEncodedRootTokenOk() (*string, bool)` + +GetEncodedRootTokenOk returns a tuple with the EncodedRootToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedRootToken + +`func (o *RootTokenGenerationReadProgress2Response) SetEncodedRootToken(v string)` + +SetEncodedRootToken sets EncodedRootToken field to given value. + + +### HasEncodedRootToken + +`func (o *RootTokenGenerationReadProgress2Response) HasEncodedRootToken() bool` + +HasEncodedRootToken returns a boolean if a field has been set. + + + + +### GetEncodedToken + +`func (o *RootTokenGenerationReadProgress2Response) GetEncodedToken() string` + +GetEncodedToken returns the EncodedToken field if non-nil, zero value otherwise. + +### GetEncodedTokenOk + +`func (o *RootTokenGenerationReadProgress2Response) GetEncodedTokenOk() (*string, bool)` + +GetEncodedTokenOk returns a tuple with the EncodedToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedToken + +`func (o *RootTokenGenerationReadProgress2Response) SetEncodedToken(v string)` + +SetEncodedToken sets EncodedToken field to given value. + + +### HasEncodedToken + +`func (o *RootTokenGenerationReadProgress2Response) HasEncodedToken() bool` + +HasEncodedToken returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *RootTokenGenerationReadProgress2Response) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *RootTokenGenerationReadProgress2Response) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *RootTokenGenerationReadProgress2Response) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *RootTokenGenerationReadProgress2Response) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + +### GetOtp + +`func (o *RootTokenGenerationReadProgress2Response) GetOtp() string` + +GetOtp returns the Otp field if non-nil, zero value otherwise. + +### GetOtpOk + +`func (o *RootTokenGenerationReadProgress2Response) GetOtpOk() (*string, bool)` + +GetOtpOk returns a tuple with the Otp field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtp + +`func (o *RootTokenGenerationReadProgress2Response) SetOtp(v string)` + +SetOtp sets Otp field to given value. + + +### HasOtp + +`func (o *RootTokenGenerationReadProgress2Response) HasOtp() bool` + +HasOtp returns a boolean if a field has been set. + + + + +### GetOtpLength + +`func (o *RootTokenGenerationReadProgress2Response) GetOtpLength() int32` + +GetOtpLength returns the OtpLength field if non-nil, zero value otherwise. + +### GetOtpLengthOk + +`func (o *RootTokenGenerationReadProgress2Response) GetOtpLengthOk() (*int32, bool)` + +GetOtpLengthOk returns a tuple with the OtpLength field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtpLength + +`func (o *RootTokenGenerationReadProgress2Response) SetOtpLength(v int32)` + +SetOtpLength sets OtpLength field to given value. + + +### HasOtpLength + +`func (o *RootTokenGenerationReadProgress2Response) HasOtpLength() bool` + +HasOtpLength returns a boolean if a field has been set. + + + + +### GetPgpFingerprint + +`func (o *RootTokenGenerationReadProgress2Response) GetPgpFingerprint() string` + +GetPgpFingerprint returns the PgpFingerprint field if non-nil, zero value otherwise. + +### GetPgpFingerprintOk + +`func (o *RootTokenGenerationReadProgress2Response) GetPgpFingerprintOk() (*string, bool)` + +GetPgpFingerprintOk returns a tuple with the PgpFingerprint field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprint + +`func (o *RootTokenGenerationReadProgress2Response) SetPgpFingerprint(v string)` + +SetPgpFingerprint sets PgpFingerprint field to given value. + + +### HasPgpFingerprint + +`func (o *RootTokenGenerationReadProgress2Response) HasPgpFingerprint() bool` + +HasPgpFingerprint returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RootTokenGenerationReadProgress2Response) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RootTokenGenerationReadProgress2Response) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RootTokenGenerationReadProgress2Response) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RootTokenGenerationReadProgress2Response) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RootTokenGenerationReadProgress2Response) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RootTokenGenerationReadProgress2Response) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RootTokenGenerationReadProgress2Response) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RootTokenGenerationReadProgress2Response) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RootTokenGenerationReadProgress2Response) GetStarted() bool` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RootTokenGenerationReadProgress2Response) GetStartedOk() (*bool, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RootTokenGenerationReadProgress2Response) SetStarted(v bool)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RootTokenGenerationReadProgress2Response) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/RootTokenGenerationReadProgressResponse.md b/docs/RootTokenGenerationReadProgressResponse.md new file mode 100644 index 00000000..9046be44 --- /dev/null +++ b/docs/RootTokenGenerationReadProgressResponse.md @@ -0,0 +1,339 @@ +# RootTokenGenerationReadProgressResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Complete** | Pointer to **bool** | | [optional] +**EncodedRootToken** | Pointer to **string** | | [optional] +**EncodedToken** | Pointer to **string** | | [optional] +**Nonce** | Pointer to **string** | | [optional] +**Otp** | Pointer to **string** | | [optional] +**OtpLength** | Pointer to **int32** | | [optional] +**PgpFingerprint** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRootTokenGenerationReadProgressResponse + +`func NewRootTokenGenerationReadProgressResponse() *RootTokenGenerationReadProgressResponse` + +NewRootTokenGenerationReadProgressResponse instantiates a new RootTokenGenerationReadProgressResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRootTokenGenerationReadProgressResponseWithDefaults + +`func NewRootTokenGenerationReadProgressResponseWithDefaults() *RootTokenGenerationReadProgressResponse` + +NewRootTokenGenerationReadProgressResponseWithDefaults instantiates a new RootTokenGenerationReadProgressResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetComplete + +`func (o *RootTokenGenerationReadProgressResponse) GetComplete() bool` + +GetComplete returns the Complete field if non-nil, zero value otherwise. + +### GetCompleteOk + +`func (o *RootTokenGenerationReadProgressResponse) GetCompleteOk() (*bool, bool)` + +GetCompleteOk returns a tuple with the Complete field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetComplete + +`func (o *RootTokenGenerationReadProgressResponse) SetComplete(v bool)` + +SetComplete sets Complete field to given value. + + +### HasComplete + +`func (o *RootTokenGenerationReadProgressResponse) HasComplete() bool` + +HasComplete returns a boolean if a field has been set. + + + + +### GetEncodedRootToken + +`func (o *RootTokenGenerationReadProgressResponse) GetEncodedRootToken() string` + +GetEncodedRootToken returns the EncodedRootToken field if non-nil, zero value otherwise. + +### GetEncodedRootTokenOk + +`func (o *RootTokenGenerationReadProgressResponse) GetEncodedRootTokenOk() (*string, bool)` + +GetEncodedRootTokenOk returns a tuple with the EncodedRootToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedRootToken + +`func (o *RootTokenGenerationReadProgressResponse) SetEncodedRootToken(v string)` + +SetEncodedRootToken sets EncodedRootToken field to given value. + + +### HasEncodedRootToken + +`func (o *RootTokenGenerationReadProgressResponse) HasEncodedRootToken() bool` + +HasEncodedRootToken returns a boolean if a field has been set. + + + + +### GetEncodedToken + +`func (o *RootTokenGenerationReadProgressResponse) GetEncodedToken() string` + +GetEncodedToken returns the EncodedToken field if non-nil, zero value otherwise. + +### GetEncodedTokenOk + +`func (o *RootTokenGenerationReadProgressResponse) GetEncodedTokenOk() (*string, bool)` + +GetEncodedTokenOk returns a tuple with the EncodedToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedToken + +`func (o *RootTokenGenerationReadProgressResponse) SetEncodedToken(v string)` + +SetEncodedToken sets EncodedToken field to given value. + + +### HasEncodedToken + +`func (o *RootTokenGenerationReadProgressResponse) HasEncodedToken() bool` + +HasEncodedToken returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *RootTokenGenerationReadProgressResponse) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *RootTokenGenerationReadProgressResponse) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *RootTokenGenerationReadProgressResponse) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *RootTokenGenerationReadProgressResponse) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + +### GetOtp + +`func (o *RootTokenGenerationReadProgressResponse) GetOtp() string` + +GetOtp returns the Otp field if non-nil, zero value otherwise. + +### GetOtpOk + +`func (o *RootTokenGenerationReadProgressResponse) GetOtpOk() (*string, bool)` + +GetOtpOk returns a tuple with the Otp field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtp + +`func (o *RootTokenGenerationReadProgressResponse) SetOtp(v string)` + +SetOtp sets Otp field to given value. + + +### HasOtp + +`func (o *RootTokenGenerationReadProgressResponse) HasOtp() bool` + +HasOtp returns a boolean if a field has been set. + + + + +### GetOtpLength + +`func (o *RootTokenGenerationReadProgressResponse) GetOtpLength() int32` + +GetOtpLength returns the OtpLength field if non-nil, zero value otherwise. + +### GetOtpLengthOk + +`func (o *RootTokenGenerationReadProgressResponse) GetOtpLengthOk() (*int32, bool)` + +GetOtpLengthOk returns a tuple with the OtpLength field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtpLength + +`func (o *RootTokenGenerationReadProgressResponse) SetOtpLength(v int32)` + +SetOtpLength sets OtpLength field to given value. + + +### HasOtpLength + +`func (o *RootTokenGenerationReadProgressResponse) HasOtpLength() bool` + +HasOtpLength returns a boolean if a field has been set. + + + + +### GetPgpFingerprint + +`func (o *RootTokenGenerationReadProgressResponse) GetPgpFingerprint() string` + +GetPgpFingerprint returns the PgpFingerprint field if non-nil, zero value otherwise. + +### GetPgpFingerprintOk + +`func (o *RootTokenGenerationReadProgressResponse) GetPgpFingerprintOk() (*string, bool)` + +GetPgpFingerprintOk returns a tuple with the PgpFingerprint field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprint + +`func (o *RootTokenGenerationReadProgressResponse) SetPgpFingerprint(v string)` + +SetPgpFingerprint sets PgpFingerprint field to given value. + + +### HasPgpFingerprint + +`func (o *RootTokenGenerationReadProgressResponse) HasPgpFingerprint() bool` + +HasPgpFingerprint returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RootTokenGenerationReadProgressResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RootTokenGenerationReadProgressResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RootTokenGenerationReadProgressResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RootTokenGenerationReadProgressResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RootTokenGenerationReadProgressResponse) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RootTokenGenerationReadProgressResponse) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RootTokenGenerationReadProgressResponse) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RootTokenGenerationReadProgressResponse) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RootTokenGenerationReadProgressResponse) GetStarted() bool` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RootTokenGenerationReadProgressResponse) GetStartedOk() (*bool, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RootTokenGenerationReadProgressResponse) SetStarted(v bool)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RootTokenGenerationReadProgressResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteGenerateRootUpdateRequest.md b/docs/RootTokenGenerationUpdateRequest.md similarity index 60% rename from docs/WriteGenerateRootUpdateRequest.md rename to docs/RootTokenGenerationUpdateRequest.md index d115b99a..4c3458b0 100644 --- a/docs/WriteGenerateRootUpdateRequest.md +++ b/docs/RootTokenGenerationUpdateRequest.md @@ -1,4 +1,4 @@ -# WriteGenerateRootUpdateRequest +# RootTokenGenerationUpdateRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteGenerateRootUpdateRequest +### NewRootTokenGenerationUpdateRequest -`func NewWriteGenerateRootUpdateRequest() *WriteGenerateRootUpdateRequest` +`func NewRootTokenGenerationUpdateRequest() *RootTokenGenerationUpdateRequest` -NewWriteGenerateRootUpdateRequest instantiates a new WriteGenerateRootUpdateRequest object +NewRootTokenGenerationUpdateRequest instantiates a new RootTokenGenerationUpdateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteGenerateRootUpdateRequestWithDefaults +### NewRootTokenGenerationUpdateRequestWithDefaults -`func NewWriteGenerateRootUpdateRequestWithDefaults() *WriteGenerateRootUpdateRequest` +`func NewRootTokenGenerationUpdateRequestWithDefaults() *RootTokenGenerationUpdateRequest` -NewWriteGenerateRootUpdateRequestWithDefaults instantiates a new WriteGenerateRootUpdateRequest object +NewRootTokenGenerationUpdateRequestWithDefaults instantiates a new RootTokenGenerationUpdateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetKey -`func (o *WriteGenerateRootUpdateRequest) GetKey() string` +`func (o *RootTokenGenerationUpdateRequest) GetKey() string` GetKey returns the Key field if non-nil, zero value otherwise. ### GetKeyOk -`func (o *WriteGenerateRootUpdateRequest) GetKeyOk() (*string, bool)` +`func (o *RootTokenGenerationUpdateRequest) GetKeyOk() (*string, bool)` GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKey -`func (o *WriteGenerateRootUpdateRequest) SetKey(v string)` +`func (o *RootTokenGenerationUpdateRequest) SetKey(v string)` SetKey sets Key field to given value. ### HasKey -`func (o *WriteGenerateRootUpdateRequest) HasKey() bool` +`func (o *RootTokenGenerationUpdateRequest) HasKey() bool` HasKey returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasKey returns a boolean if a field has been set. ### GetNonce -`func (o *WriteGenerateRootUpdateRequest) GetNonce() string` +`func (o *RootTokenGenerationUpdateRequest) GetNonce() string` GetNonce returns the Nonce field if non-nil, zero value otherwise. ### GetNonceOk -`func (o *WriteGenerateRootUpdateRequest) GetNonceOk() (*string, bool)` +`func (o *RootTokenGenerationUpdateRequest) GetNonceOk() (*string, bool)` GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNonce -`func (o *WriteGenerateRootUpdateRequest) SetNonce(v string)` +`func (o *RootTokenGenerationUpdateRequest) SetNonce(v string)` SetNonce sets Nonce field to given value. ### HasNonce -`func (o *WriteGenerateRootUpdateRequest) HasNonce() bool` +`func (o *RootTokenGenerationUpdateRequest) HasNonce() bool` HasNonce returns a boolean if a field has been set. diff --git a/docs/RootTokenGenerationUpdateResponse.md b/docs/RootTokenGenerationUpdateResponse.md new file mode 100644 index 00000000..c1b38a35 --- /dev/null +++ b/docs/RootTokenGenerationUpdateResponse.md @@ -0,0 +1,339 @@ +# RootTokenGenerationUpdateResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Complete** | Pointer to **bool** | | [optional] +**EncodedRootToken** | Pointer to **string** | | [optional] +**EncodedToken** | Pointer to **string** | | [optional] +**Nonce** | Pointer to **string** | | [optional] +**Otp** | Pointer to **string** | | [optional] +**OtpLength** | Pointer to **int32** | | [optional] +**PgpFingerprint** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**Required** | Pointer to **int32** | | [optional] +**Started** | Pointer to **bool** | | [optional] + + + +## Methods + + +### NewRootTokenGenerationUpdateResponse + +`func NewRootTokenGenerationUpdateResponse() *RootTokenGenerationUpdateResponse` + +NewRootTokenGenerationUpdateResponse instantiates a new RootTokenGenerationUpdateResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewRootTokenGenerationUpdateResponseWithDefaults + +`func NewRootTokenGenerationUpdateResponseWithDefaults() *RootTokenGenerationUpdateResponse` + +NewRootTokenGenerationUpdateResponseWithDefaults instantiates a new RootTokenGenerationUpdateResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetComplete + +`func (o *RootTokenGenerationUpdateResponse) GetComplete() bool` + +GetComplete returns the Complete field if non-nil, zero value otherwise. + +### GetCompleteOk + +`func (o *RootTokenGenerationUpdateResponse) GetCompleteOk() (*bool, bool)` + +GetCompleteOk returns a tuple with the Complete field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetComplete + +`func (o *RootTokenGenerationUpdateResponse) SetComplete(v bool)` + +SetComplete sets Complete field to given value. + + +### HasComplete + +`func (o *RootTokenGenerationUpdateResponse) HasComplete() bool` + +HasComplete returns a boolean if a field has been set. + + + + +### GetEncodedRootToken + +`func (o *RootTokenGenerationUpdateResponse) GetEncodedRootToken() string` + +GetEncodedRootToken returns the EncodedRootToken field if non-nil, zero value otherwise. + +### GetEncodedRootTokenOk + +`func (o *RootTokenGenerationUpdateResponse) GetEncodedRootTokenOk() (*string, bool)` + +GetEncodedRootTokenOk returns a tuple with the EncodedRootToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedRootToken + +`func (o *RootTokenGenerationUpdateResponse) SetEncodedRootToken(v string)` + +SetEncodedRootToken sets EncodedRootToken field to given value. + + +### HasEncodedRootToken + +`func (o *RootTokenGenerationUpdateResponse) HasEncodedRootToken() bool` + +HasEncodedRootToken returns a boolean if a field has been set. + + + + +### GetEncodedToken + +`func (o *RootTokenGenerationUpdateResponse) GetEncodedToken() string` + +GetEncodedToken returns the EncodedToken field if non-nil, zero value otherwise. + +### GetEncodedTokenOk + +`func (o *RootTokenGenerationUpdateResponse) GetEncodedTokenOk() (*string, bool)` + +GetEncodedTokenOk returns a tuple with the EncodedToken field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetEncodedToken + +`func (o *RootTokenGenerationUpdateResponse) SetEncodedToken(v string)` + +SetEncodedToken sets EncodedToken field to given value. + + +### HasEncodedToken + +`func (o *RootTokenGenerationUpdateResponse) HasEncodedToken() bool` + +HasEncodedToken returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *RootTokenGenerationUpdateResponse) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *RootTokenGenerationUpdateResponse) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *RootTokenGenerationUpdateResponse) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *RootTokenGenerationUpdateResponse) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + +### GetOtp + +`func (o *RootTokenGenerationUpdateResponse) GetOtp() string` + +GetOtp returns the Otp field if non-nil, zero value otherwise. + +### GetOtpOk + +`func (o *RootTokenGenerationUpdateResponse) GetOtpOk() (*string, bool)` + +GetOtpOk returns a tuple with the Otp field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtp + +`func (o *RootTokenGenerationUpdateResponse) SetOtp(v string)` + +SetOtp sets Otp field to given value. + + +### HasOtp + +`func (o *RootTokenGenerationUpdateResponse) HasOtp() bool` + +HasOtp returns a boolean if a field has been set. + + + + +### GetOtpLength + +`func (o *RootTokenGenerationUpdateResponse) GetOtpLength() int32` + +GetOtpLength returns the OtpLength field if non-nil, zero value otherwise. + +### GetOtpLengthOk + +`func (o *RootTokenGenerationUpdateResponse) GetOtpLengthOk() (*int32, bool)` + +GetOtpLengthOk returns a tuple with the OtpLength field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetOtpLength + +`func (o *RootTokenGenerationUpdateResponse) SetOtpLength(v int32)` + +SetOtpLength sets OtpLength field to given value. + + +### HasOtpLength + +`func (o *RootTokenGenerationUpdateResponse) HasOtpLength() bool` + +HasOtpLength returns a boolean if a field has been set. + + + + +### GetPgpFingerprint + +`func (o *RootTokenGenerationUpdateResponse) GetPgpFingerprint() string` + +GetPgpFingerprint returns the PgpFingerprint field if non-nil, zero value otherwise. + +### GetPgpFingerprintOk + +`func (o *RootTokenGenerationUpdateResponse) GetPgpFingerprintOk() (*string, bool)` + +GetPgpFingerprintOk returns a tuple with the PgpFingerprint field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetPgpFingerprint + +`func (o *RootTokenGenerationUpdateResponse) SetPgpFingerprint(v string)` + +SetPgpFingerprint sets PgpFingerprint field to given value. + + +### HasPgpFingerprint + +`func (o *RootTokenGenerationUpdateResponse) HasPgpFingerprint() bool` + +HasPgpFingerprint returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *RootTokenGenerationUpdateResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *RootTokenGenerationUpdateResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *RootTokenGenerationUpdateResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *RootTokenGenerationUpdateResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRequired + +`func (o *RootTokenGenerationUpdateResponse) GetRequired() int32` + +GetRequired returns the Required field if non-nil, zero value otherwise. + +### GetRequiredOk + +`func (o *RootTokenGenerationUpdateResponse) GetRequiredOk() (*int32, bool)` + +GetRequiredOk returns a tuple with the Required field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRequired + +`func (o *RootTokenGenerationUpdateResponse) SetRequired(v int32)` + +SetRequired sets Required field to given value. + + +### HasRequired + +`func (o *RootTokenGenerationUpdateResponse) HasRequired() bool` + +HasRequired returns a boolean if a field has been set. + + + + +### GetStarted + +`func (o *RootTokenGenerationUpdateResponse) GetStarted() bool` + +GetStarted returns the Started field if non-nil, zero value otherwise. + +### GetStartedOk + +`func (o *RootTokenGenerationUpdateResponse) GetStartedOk() (*bool, bool)` + +GetStartedOk returns a tuple with the Started field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStarted + +`func (o *RootTokenGenerationUpdateResponse) SetStarted(v bool)` + +SetStarted sets Started field to given value. + + +### HasStarted + +`func (o *RootTokenGenerationUpdateResponse) HasStarted() bool` + +HasStarted returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SSHWriteKeysRequest.md b/docs/SSHWriteKeysRequest.md deleted file mode 100644 index c5ad39cb..00000000 --- a/docs/SSHWriteKeysRequest.md +++ /dev/null @@ -1,69 +0,0 @@ -# SSHWriteKeysRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Key** | Pointer to **string** | [Required] SSH private key with super user privileges in host | [optional] - - - -## Methods - - -### NewSSHWriteKeysRequest - -`func NewSSHWriteKeysRequest() *SSHWriteKeysRequest` - -NewSSHWriteKeysRequest instantiates a new SSHWriteKeysRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewSSHWriteKeysRequestWithDefaults - -`func NewSSHWriteKeysRequestWithDefaults() *SSHWriteKeysRequest` - -NewSSHWriteKeysRequestWithDefaults instantiates a new SSHWriteKeysRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetKey - -`func (o *SSHWriteKeysRequest) GetKey() string` - -GetKey returns the Key field if non-nil, zero value otherwise. - -### GetKeyOk - -`func (o *SSHWriteKeysRequest) GetKeyOk() (*string, bool)` - -GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetKey - -`func (o *SSHWriteKeysRequest) SetKey(v string)` - -SetKey sets Key field to given value. - - -### HasKey - -`func (o *SSHWriteKeysRequest) HasKey() bool` - -HasKey returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/SSHWriteRoleRequest.md b/docs/SSHWriteRoleRequest.md index 9143d51a..f0d8b102 100644 --- a/docs/SSHWriteRoleRequest.md +++ b/docs/SSHWriteRoleRequest.md @@ -1,117 +1,83 @@ -# SSHWriteRoleRequest +# SshWriteRoleRequest ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**AdminUser** | Pointer to **string** | [Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Admin user at remote host. The shared key being registered should be for this user and should have root privileges. Everytime a dynamic credential is being generated for other users, Vault uses this admin username to login to remote host and install the generated credential for the other user. | [optional] -**AlgorithmSigner** | Pointer to **string** | When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string. | [optional] -**AllowBareDomains** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use the base domains listed in \"allowed_domains\", e.g. \"example.com\". This is a separate option as in some cases this can be considered a security threat. | [optional] -**AllowHostCertificates** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'host'. | [optional] [default to false] -**AllowSubdomains** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use subdomains of those listed in \"allowed_domains\". | [optional] -**AllowUserCertificates** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'user'. | [optional] [default to false] -**AllowUserKeyIds** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If true, users can override the key ID for a signed certificate with the \"key_id\" field. When false, the key ID will always be the token display name. The key ID is logged by the SSH server and can be useful for auditing. | [optional] -**AllowedCriticalOptions** | Pointer to **string** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of critical options that certificates can have when signed. To allow any critical options, set this to an empty string. | [optional] -**AllowedDomains** | Pointer to **string** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If this option is not specified, client can request for a signed certificate for any valid host. If only certain domains are allowed, then this list enforces it. | [optional] -**AllowedDomainsTemplate** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. | [optional] [default to false] -**AllowedExtensions** | Pointer to **string** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of extensions that certificates can have when signed. An empty list means that no extension overrides are allowed by an end-user; explicitly specify '*' to allow any extensions to be set. | [optional] -**AllowedUserKeyLengths** | Pointer to **map[string]interface{}** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, allows the enforcement of key types and minimum key sizes to be signed. | [optional] +**AlgorithmSigner** | Pointer to **string** | [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string. | [optional] +**AllowBareDomains** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use the base domains listed in \"allowed_domains\", e.g. \"example.com\". This is a separate option as in some cases this can be considered a security threat. | [optional] +**AllowHostCertificates** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'host'. | [optional] [default to false] +**AllowSubdomains** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use subdomains of those listed in \"allowed_domains\". | [optional] +**AllowUserCertificates** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'user'. | [optional] [default to false] +**AllowUserKeyIds** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If true, users can override the key ID for a signed certificate with the \"key_id\" field. When false, the key ID will always be the token display name. The key ID is logged by the SSH server and can be useful for auditing. | [optional] +**AllowedCriticalOptions** | Pointer to **string** | [Not applicable for OTP type] [Optional for CA type] A comma-separated list of critical options that certificates can have when signed. To allow any critical options, set this to an empty string. | [optional] +**AllowedDomains** | Pointer to **string** | [Not applicable for OTP type] [Optional for CA type] If this option is not specified, client can request for a signed certificate for any valid host. If only certain domains are allowed, then this list enforces it. | [optional] +**AllowedDomainsTemplate** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. | [optional] [default to false] +**AllowedExtensions** | Pointer to **string** | [Not applicable for OTP type] [Optional for CA type] A comma-separated list of extensions that certificates can have when signed. An empty list means that no extension overrides are allowed by an end-user; explicitly specify '*' to allow any extensions to be set. | [optional] +**AllowedUserKeyLengths** | Pointer to **map[string]interface{}** | [Not applicable for OTP type] [Optional for CA type] If set, allows the enforcement of key types and minimum key sizes to be signed. | [optional] **AllowedUsers** | Pointer to **string** | [Optional for all types] [Works differently for CA type] If this option is not specified, or is '*', client can request a credential for any valid user at the remote host, including the admin user. If only certain usernames are to be allowed, then this list enforces it. If this field is set, then credentials can only be created for default_user and usernames present in this list. Setting this option will enable all the users with access to this role to fetch credentials for all other usernames in this list. Use with caution. N.B.: with the CA type, an empty list means that no users are allowed; explicitly specify '*' to allow any user. | [optional] -**AllowedUsersTemplate** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed users can be specified using identity template policies. Non-templated users are also permitted. | [optional] [default to false] -**CidrList** | Pointer to **string** | [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks for which the role is applicable for. CIDR blocks can belong to more than one role. | [optional] -**DefaultCriticalOptions** | Pointer to **map[string]interface{}** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Critical options certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_critical_options\". Defaults to none. | [optional] -**DefaultExtensions** | Pointer to **map[string]interface{}** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Extensions certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_extensions\". Defaults to none. | [optional] -**DefaultExtensionsTemplate** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default extension values can be specified using identity template policies. Non-templated extension values are also permitted. | [optional] [default to false] -**DefaultUser** | Pointer to **string** | [Required for Dynamic type] [Required for OTP type] [Optional for CA type] Default username for which a credential will be generated. When the endpoint 'creds/' is used without a username, this value will be used as default username. | [optional] -**DefaultUserTemplate** | Pointer to **bool** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default user can be specified using identity template policies. Non-templated users are also permitted. | [optional] [default to false] -**ExcludeCidrList** | Pointer to **string** | [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks. IP addresses belonging to these blocks are not accepted by the role. This is particularly useful when big CIDR blocks are being used by the role and certain parts of it needs to be kept out. | [optional] -**InstallScript** | Pointer to **string** | [Optional for Dynamic type] [Not-applicable for OTP type] [Not applicable for CA type] Script used to install and uninstall public keys in the target machine. The inbuilt default install script will be for Linux hosts. For sample script, refer the project documentation website. | [optional] -**Key** | Pointer to **string** | [Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Name of the registered key in Vault. Before creating the role, use the 'keys/' endpoint to create a named key. | [optional] -**KeyBits** | Pointer to **int32** | [Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Length of the RSA dynamic key in bits. It is 1024 by default or it can be 2048. | [optional] -**KeyIdFormat** | Pointer to **string** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a custom format for the key id of a signed certificate. The following variables are available for use: '{{token_display_name}}' - The display name of the token used to make the request. '{{role_name}}' - The name of the role signing the request. '{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed. | [optional] -**KeyOptionSpecs** | Pointer to **string** | [Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Comma separated option specifications which will be prefixed to RSA key in authorized_keys file. Options should be valid and comply with authorized_keys file format and should not contain spaces. | [optional] -**KeyType** | Pointer to **string** | [Required for all types] Type of key used to login to hosts. It can be either 'otp', 'dynamic' or 'ca'. 'otp' type requires agent to be installed in remote hosts. | [optional] -**MaxTtl** | Pointer to **int32** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The maximum allowed lease duration | [optional] -**NotBeforeDuration** | Pointer to **int32** | The duration that the SSH certificate should be backdated by at issuance. | [optional] [default to 30] -**Port** | Pointer to **int32** | [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Port number for SSH connection. Default is '22'. Port number does not play any role in creation of OTP. For 'otp' type, this is just a way to inform client about the port number to use. Port number will be returned to client by Vault server along with OTP. | [optional] -**Ttl** | Pointer to **int32** | [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The lease duration if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the value of max_ttl. | [optional] +**AllowedUsersTemplate** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, Allowed users can be specified using identity template policies. Non-templated users are also permitted. | [optional] [default to false] +**CidrList** | Pointer to **string** | [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks for which the role is applicable for. CIDR blocks can belong to more than one role. | [optional] +**DefaultCriticalOptions** | Pointer to **map[string]interface{}** | [Not applicable for OTP type] [Optional for CA type] Critical options certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_critical_options\". Defaults to none. | [optional] +**DefaultExtensions** | Pointer to **map[string]interface{}** | [Not applicable for OTP type] [Optional for CA type] Extensions certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_extensions\". Defaults to none. | [optional] +**DefaultExtensionsTemplate** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, Default extension values can be specified using identity template policies. Non-templated extension values are also permitted. | [optional] [default to false] +**DefaultUser** | Pointer to **string** | [Required for OTP type] [Optional for CA type] Default username for which a credential will be generated. When the endpoint 'creds/' is used without a username, this value will be used as default username. | [optional] +**DefaultUserTemplate** | Pointer to **bool** | [Not applicable for OTP type] [Optional for CA type] If set, Default user can be specified using identity template policies. Non-templated users are also permitted. | [optional] [default to false] +**ExcludeCidrList** | Pointer to **string** | [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks. IP addresses belonging to these blocks are not accepted by the role. This is particularly useful when big CIDR blocks are being used by the role and certain parts of it needs to be kept out. | [optional] +**KeyIdFormat** | Pointer to **string** | [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a custom format for the key id of a signed certificate. The following variables are available for use: '{{token_display_name}}' - The display name of the token used to make the request. '{{role_name}}' - The name of the role signing the request. '{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed. | [optional] +**KeyType** | Pointer to **string** | [Required for all types] Type of key used to login to hosts. It can be either 'otp' or 'ca'. 'otp' type requires agent to be installed in remote hosts. | [optional] +**MaxTtl** | Pointer to **int32** | [Not applicable for OTP type] [Optional for CA type] The maximum allowed lease duration | [optional] +**NotBeforeDuration** | Pointer to **int32** | [Not applicable for OTP type] [Optional for CA type] The duration that the SSH certificate should be backdated by at issuance. | [optional] [default to 30] +**Port** | Pointer to **int32** | [Optional for OTP type] [Not applicable for CA type] Port number for SSH connection. Default is '22'. Port number does not play any role in creation of OTP. For 'otp' type, this is just a way to inform client about the port number to use. Port number will be returned to client by Vault server along with OTP. | [optional] +**Ttl** | Pointer to **int32** | [Not applicable for OTP type] [Optional for CA type] The lease duration if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the value of max_ttl. | [optional] ## Methods -### NewSSHWriteRoleRequest +### NewSshWriteRoleRequest -`func NewSSHWriteRoleRequest() *SSHWriteRoleRequest` +`func NewSshWriteRoleRequest() *SshWriteRoleRequest` -NewSSHWriteRoleRequest instantiates a new SSHWriteRoleRequest object +NewSshWriteRoleRequest instantiates a new SshWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHWriteRoleRequestWithDefaults +### NewSshWriteRoleRequestWithDefaults -`func NewSSHWriteRoleRequestWithDefaults() *SSHWriteRoleRequest` +`func NewSshWriteRoleRequestWithDefaults() *SshWriteRoleRequest` -NewSSHWriteRoleRequestWithDefaults instantiates a new SSHWriteRoleRequest object +NewSshWriteRoleRequestWithDefaults instantiates a new SshWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set -### GetAdminUser - -`func (o *SSHWriteRoleRequest) GetAdminUser() string` - -GetAdminUser returns the AdminUser field if non-nil, zero value otherwise. - -### GetAdminUserOk - -`func (o *SSHWriteRoleRequest) GetAdminUserOk() (*string, bool)` - -GetAdminUserOk returns a tuple with the AdminUser field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetAdminUser - -`func (o *SSHWriteRoleRequest) SetAdminUser(v string)` - -SetAdminUser sets AdminUser field to given value. - - -### HasAdminUser - -`func (o *SSHWriteRoleRequest) HasAdminUser() bool` - -HasAdminUser returns a boolean if a field has been set. - - - - ### GetAlgorithmSigner -`func (o *SSHWriteRoleRequest) GetAlgorithmSigner() string` +`func (o *SshWriteRoleRequest) GetAlgorithmSigner() string` GetAlgorithmSigner returns the AlgorithmSigner field if non-nil, zero value otherwise. ### GetAlgorithmSignerOk -`func (o *SSHWriteRoleRequest) GetAlgorithmSignerOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetAlgorithmSignerOk() (*string, bool)` GetAlgorithmSignerOk returns a tuple with the AlgorithmSigner field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithmSigner -`func (o *SSHWriteRoleRequest) SetAlgorithmSigner(v string)` +`func (o *SshWriteRoleRequest) SetAlgorithmSigner(v string)` SetAlgorithmSigner sets AlgorithmSigner field to given value. ### HasAlgorithmSigner -`func (o *SSHWriteRoleRequest) HasAlgorithmSigner() bool` +`func (o *SshWriteRoleRequest) HasAlgorithmSigner() bool` HasAlgorithmSigner returns a boolean if a field has been set. @@ -120,27 +86,27 @@ HasAlgorithmSigner returns a boolean if a field has been set. ### GetAllowBareDomains -`func (o *SSHWriteRoleRequest) GetAllowBareDomains() bool` +`func (o *SshWriteRoleRequest) GetAllowBareDomains() bool` GetAllowBareDomains returns the AllowBareDomains field if non-nil, zero value otherwise. ### GetAllowBareDomainsOk -`func (o *SSHWriteRoleRequest) GetAllowBareDomainsOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetAllowBareDomainsOk() (*bool, bool)` GetAllowBareDomainsOk returns a tuple with the AllowBareDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowBareDomains -`func (o *SSHWriteRoleRequest) SetAllowBareDomains(v bool)` +`func (o *SshWriteRoleRequest) SetAllowBareDomains(v bool)` SetAllowBareDomains sets AllowBareDomains field to given value. ### HasAllowBareDomains -`func (o *SSHWriteRoleRequest) HasAllowBareDomains() bool` +`func (o *SshWriteRoleRequest) HasAllowBareDomains() bool` HasAllowBareDomains returns a boolean if a field has been set. @@ -149,27 +115,27 @@ HasAllowBareDomains returns a boolean if a field has been set. ### GetAllowHostCertificates -`func (o *SSHWriteRoleRequest) GetAllowHostCertificates() bool` +`func (o *SshWriteRoleRequest) GetAllowHostCertificates() bool` GetAllowHostCertificates returns the AllowHostCertificates field if non-nil, zero value otherwise. ### GetAllowHostCertificatesOk -`func (o *SSHWriteRoleRequest) GetAllowHostCertificatesOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetAllowHostCertificatesOk() (*bool, bool)` GetAllowHostCertificatesOk returns a tuple with the AllowHostCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowHostCertificates -`func (o *SSHWriteRoleRequest) SetAllowHostCertificates(v bool)` +`func (o *SshWriteRoleRequest) SetAllowHostCertificates(v bool)` SetAllowHostCertificates sets AllowHostCertificates field to given value. ### HasAllowHostCertificates -`func (o *SSHWriteRoleRequest) HasAllowHostCertificates() bool` +`func (o *SshWriteRoleRequest) HasAllowHostCertificates() bool` HasAllowHostCertificates returns a boolean if a field has been set. @@ -178,27 +144,27 @@ HasAllowHostCertificates returns a boolean if a field has been set. ### GetAllowSubdomains -`func (o *SSHWriteRoleRequest) GetAllowSubdomains() bool` +`func (o *SshWriteRoleRequest) GetAllowSubdomains() bool` GetAllowSubdomains returns the AllowSubdomains field if non-nil, zero value otherwise. ### GetAllowSubdomainsOk -`func (o *SSHWriteRoleRequest) GetAllowSubdomainsOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetAllowSubdomainsOk() (*bool, bool)` GetAllowSubdomainsOk returns a tuple with the AllowSubdomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowSubdomains -`func (o *SSHWriteRoleRequest) SetAllowSubdomains(v bool)` +`func (o *SshWriteRoleRequest) SetAllowSubdomains(v bool)` SetAllowSubdomains sets AllowSubdomains field to given value. ### HasAllowSubdomains -`func (o *SSHWriteRoleRequest) HasAllowSubdomains() bool` +`func (o *SshWriteRoleRequest) HasAllowSubdomains() bool` HasAllowSubdomains returns a boolean if a field has been set. @@ -207,27 +173,27 @@ HasAllowSubdomains returns a boolean if a field has been set. ### GetAllowUserCertificates -`func (o *SSHWriteRoleRequest) GetAllowUserCertificates() bool` +`func (o *SshWriteRoleRequest) GetAllowUserCertificates() bool` GetAllowUserCertificates returns the AllowUserCertificates field if non-nil, zero value otherwise. ### GetAllowUserCertificatesOk -`func (o *SSHWriteRoleRequest) GetAllowUserCertificatesOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetAllowUserCertificatesOk() (*bool, bool)` GetAllowUserCertificatesOk returns a tuple with the AllowUserCertificates field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowUserCertificates -`func (o *SSHWriteRoleRequest) SetAllowUserCertificates(v bool)` +`func (o *SshWriteRoleRequest) SetAllowUserCertificates(v bool)` SetAllowUserCertificates sets AllowUserCertificates field to given value. ### HasAllowUserCertificates -`func (o *SSHWriteRoleRequest) HasAllowUserCertificates() bool` +`func (o *SshWriteRoleRequest) HasAllowUserCertificates() bool` HasAllowUserCertificates returns a boolean if a field has been set. @@ -236,27 +202,27 @@ HasAllowUserCertificates returns a boolean if a field has been set. ### GetAllowUserKeyIds -`func (o *SSHWriteRoleRequest) GetAllowUserKeyIds() bool` +`func (o *SshWriteRoleRequest) GetAllowUserKeyIds() bool` GetAllowUserKeyIds returns the AllowUserKeyIds field if non-nil, zero value otherwise. ### GetAllowUserKeyIdsOk -`func (o *SSHWriteRoleRequest) GetAllowUserKeyIdsOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetAllowUserKeyIdsOk() (*bool, bool)` GetAllowUserKeyIdsOk returns a tuple with the AllowUserKeyIds field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowUserKeyIds -`func (o *SSHWriteRoleRequest) SetAllowUserKeyIds(v bool)` +`func (o *SshWriteRoleRequest) SetAllowUserKeyIds(v bool)` SetAllowUserKeyIds sets AllowUserKeyIds field to given value. ### HasAllowUserKeyIds -`func (o *SSHWriteRoleRequest) HasAllowUserKeyIds() bool` +`func (o *SshWriteRoleRequest) HasAllowUserKeyIds() bool` HasAllowUserKeyIds returns a boolean if a field has been set. @@ -265,27 +231,27 @@ HasAllowUserKeyIds returns a boolean if a field has been set. ### GetAllowedCriticalOptions -`func (o *SSHWriteRoleRequest) GetAllowedCriticalOptions() string` +`func (o *SshWriteRoleRequest) GetAllowedCriticalOptions() string` GetAllowedCriticalOptions returns the AllowedCriticalOptions field if non-nil, zero value otherwise. ### GetAllowedCriticalOptionsOk -`func (o *SSHWriteRoleRequest) GetAllowedCriticalOptionsOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetAllowedCriticalOptionsOk() (*string, bool)` GetAllowedCriticalOptionsOk returns a tuple with the AllowedCriticalOptions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedCriticalOptions -`func (o *SSHWriteRoleRequest) SetAllowedCriticalOptions(v string)` +`func (o *SshWriteRoleRequest) SetAllowedCriticalOptions(v string)` SetAllowedCriticalOptions sets AllowedCriticalOptions field to given value. ### HasAllowedCriticalOptions -`func (o *SSHWriteRoleRequest) HasAllowedCriticalOptions() bool` +`func (o *SshWriteRoleRequest) HasAllowedCriticalOptions() bool` HasAllowedCriticalOptions returns a boolean if a field has been set. @@ -294,27 +260,27 @@ HasAllowedCriticalOptions returns a boolean if a field has been set. ### GetAllowedDomains -`func (o *SSHWriteRoleRequest) GetAllowedDomains() string` +`func (o *SshWriteRoleRequest) GetAllowedDomains() string` GetAllowedDomains returns the AllowedDomains field if non-nil, zero value otherwise. ### GetAllowedDomainsOk -`func (o *SSHWriteRoleRequest) GetAllowedDomainsOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetAllowedDomainsOk() (*string, bool)` GetAllowedDomainsOk returns a tuple with the AllowedDomains field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedDomains -`func (o *SSHWriteRoleRequest) SetAllowedDomains(v string)` +`func (o *SshWriteRoleRequest) SetAllowedDomains(v string)` SetAllowedDomains sets AllowedDomains field to given value. ### HasAllowedDomains -`func (o *SSHWriteRoleRequest) HasAllowedDomains() bool` +`func (o *SshWriteRoleRequest) HasAllowedDomains() bool` HasAllowedDomains returns a boolean if a field has been set. @@ -323,27 +289,27 @@ HasAllowedDomains returns a boolean if a field has been set. ### GetAllowedDomainsTemplate -`func (o *SSHWriteRoleRequest) GetAllowedDomainsTemplate() bool` +`func (o *SshWriteRoleRequest) GetAllowedDomainsTemplate() bool` GetAllowedDomainsTemplate returns the AllowedDomainsTemplate field if non-nil, zero value otherwise. ### GetAllowedDomainsTemplateOk -`func (o *SSHWriteRoleRequest) GetAllowedDomainsTemplateOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetAllowedDomainsTemplateOk() (*bool, bool)` GetAllowedDomainsTemplateOk returns a tuple with the AllowedDomainsTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedDomainsTemplate -`func (o *SSHWriteRoleRequest) SetAllowedDomainsTemplate(v bool)` +`func (o *SshWriteRoleRequest) SetAllowedDomainsTemplate(v bool)` SetAllowedDomainsTemplate sets AllowedDomainsTemplate field to given value. ### HasAllowedDomainsTemplate -`func (o *SSHWriteRoleRequest) HasAllowedDomainsTemplate() bool` +`func (o *SshWriteRoleRequest) HasAllowedDomainsTemplate() bool` HasAllowedDomainsTemplate returns a boolean if a field has been set. @@ -352,27 +318,27 @@ HasAllowedDomainsTemplate returns a boolean if a field has been set. ### GetAllowedExtensions -`func (o *SSHWriteRoleRequest) GetAllowedExtensions() string` +`func (o *SshWriteRoleRequest) GetAllowedExtensions() string` GetAllowedExtensions returns the AllowedExtensions field if non-nil, zero value otherwise. ### GetAllowedExtensionsOk -`func (o *SSHWriteRoleRequest) GetAllowedExtensionsOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetAllowedExtensionsOk() (*string, bool)` GetAllowedExtensionsOk returns a tuple with the AllowedExtensions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedExtensions -`func (o *SSHWriteRoleRequest) SetAllowedExtensions(v string)` +`func (o *SshWriteRoleRequest) SetAllowedExtensions(v string)` SetAllowedExtensions sets AllowedExtensions field to given value. ### HasAllowedExtensions -`func (o *SSHWriteRoleRequest) HasAllowedExtensions() bool` +`func (o *SshWriteRoleRequest) HasAllowedExtensions() bool` HasAllowedExtensions returns a boolean if a field has been set. @@ -381,27 +347,27 @@ HasAllowedExtensions returns a boolean if a field has been set. ### GetAllowedUserKeyLengths -`func (o *SSHWriteRoleRequest) GetAllowedUserKeyLengths() map[string]interface{}` +`func (o *SshWriteRoleRequest) GetAllowedUserKeyLengths() map[string]interface{}` GetAllowedUserKeyLengths returns the AllowedUserKeyLengths field if non-nil, zero value otherwise. ### GetAllowedUserKeyLengthsOk -`func (o *SSHWriteRoleRequest) GetAllowedUserKeyLengthsOk() (*map[string]interface{}, bool)` +`func (o *SshWriteRoleRequest) GetAllowedUserKeyLengthsOk() (*map[string]interface{}, bool)` GetAllowedUserKeyLengthsOk returns a tuple with the AllowedUserKeyLengths field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedUserKeyLengths -`func (o *SSHWriteRoleRequest) SetAllowedUserKeyLengths(v map[string]interface{})` +`func (o *SshWriteRoleRequest) SetAllowedUserKeyLengths(v map[string]interface{})` SetAllowedUserKeyLengths sets AllowedUserKeyLengths field to given value. ### HasAllowedUserKeyLengths -`func (o *SSHWriteRoleRequest) HasAllowedUserKeyLengths() bool` +`func (o *SshWriteRoleRequest) HasAllowedUserKeyLengths() bool` HasAllowedUserKeyLengths returns a boolean if a field has been set. @@ -410,27 +376,27 @@ HasAllowedUserKeyLengths returns a boolean if a field has been set. ### GetAllowedUsers -`func (o *SSHWriteRoleRequest) GetAllowedUsers() string` +`func (o *SshWriteRoleRequest) GetAllowedUsers() string` GetAllowedUsers returns the AllowedUsers field if non-nil, zero value otherwise. ### GetAllowedUsersOk -`func (o *SSHWriteRoleRequest) GetAllowedUsersOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetAllowedUsersOk() (*string, bool)` GetAllowedUsersOk returns a tuple with the AllowedUsers field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedUsers -`func (o *SSHWriteRoleRequest) SetAllowedUsers(v string)` +`func (o *SshWriteRoleRequest) SetAllowedUsers(v string)` SetAllowedUsers sets AllowedUsers field to given value. ### HasAllowedUsers -`func (o *SSHWriteRoleRequest) HasAllowedUsers() bool` +`func (o *SshWriteRoleRequest) HasAllowedUsers() bool` HasAllowedUsers returns a boolean if a field has been set. @@ -439,27 +405,27 @@ HasAllowedUsers returns a boolean if a field has been set. ### GetAllowedUsersTemplate -`func (o *SSHWriteRoleRequest) GetAllowedUsersTemplate() bool` +`func (o *SshWriteRoleRequest) GetAllowedUsersTemplate() bool` GetAllowedUsersTemplate returns the AllowedUsersTemplate field if non-nil, zero value otherwise. ### GetAllowedUsersTemplateOk -`func (o *SSHWriteRoleRequest) GetAllowedUsersTemplateOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetAllowedUsersTemplateOk() (*bool, bool)` GetAllowedUsersTemplateOk returns a tuple with the AllowedUsersTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowedUsersTemplate -`func (o *SSHWriteRoleRequest) SetAllowedUsersTemplate(v bool)` +`func (o *SshWriteRoleRequest) SetAllowedUsersTemplate(v bool)` SetAllowedUsersTemplate sets AllowedUsersTemplate field to given value. ### HasAllowedUsersTemplate -`func (o *SSHWriteRoleRequest) HasAllowedUsersTemplate() bool` +`func (o *SshWriteRoleRequest) HasAllowedUsersTemplate() bool` HasAllowedUsersTemplate returns a boolean if a field has been set. @@ -468,27 +434,27 @@ HasAllowedUsersTemplate returns a boolean if a field has been set. ### GetCidrList -`func (o *SSHWriteRoleRequest) GetCidrList() string` +`func (o *SshWriteRoleRequest) GetCidrList() string` GetCidrList returns the CidrList field if non-nil, zero value otherwise. ### GetCidrListOk -`func (o *SSHWriteRoleRequest) GetCidrListOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetCidrListOk() (*string, bool)` GetCidrListOk returns a tuple with the CidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCidrList -`func (o *SSHWriteRoleRequest) SetCidrList(v string)` +`func (o *SshWriteRoleRequest) SetCidrList(v string)` SetCidrList sets CidrList field to given value. ### HasCidrList -`func (o *SSHWriteRoleRequest) HasCidrList() bool` +`func (o *SshWriteRoleRequest) HasCidrList() bool` HasCidrList returns a boolean if a field has been set. @@ -497,27 +463,27 @@ HasCidrList returns a boolean if a field has been set. ### GetDefaultCriticalOptions -`func (o *SSHWriteRoleRequest) GetDefaultCriticalOptions() map[string]interface{}` +`func (o *SshWriteRoleRequest) GetDefaultCriticalOptions() map[string]interface{}` GetDefaultCriticalOptions returns the DefaultCriticalOptions field if non-nil, zero value otherwise. ### GetDefaultCriticalOptionsOk -`func (o *SSHWriteRoleRequest) GetDefaultCriticalOptionsOk() (*map[string]interface{}, bool)` +`func (o *SshWriteRoleRequest) GetDefaultCriticalOptionsOk() (*map[string]interface{}, bool)` GetDefaultCriticalOptionsOk returns a tuple with the DefaultCriticalOptions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultCriticalOptions -`func (o *SSHWriteRoleRequest) SetDefaultCriticalOptions(v map[string]interface{})` +`func (o *SshWriteRoleRequest) SetDefaultCriticalOptions(v map[string]interface{})` SetDefaultCriticalOptions sets DefaultCriticalOptions field to given value. ### HasDefaultCriticalOptions -`func (o *SSHWriteRoleRequest) HasDefaultCriticalOptions() bool` +`func (o *SshWriteRoleRequest) HasDefaultCriticalOptions() bool` HasDefaultCriticalOptions returns a boolean if a field has been set. @@ -526,27 +492,27 @@ HasDefaultCriticalOptions returns a boolean if a field has been set. ### GetDefaultExtensions -`func (o *SSHWriteRoleRequest) GetDefaultExtensions() map[string]interface{}` +`func (o *SshWriteRoleRequest) GetDefaultExtensions() map[string]interface{}` GetDefaultExtensions returns the DefaultExtensions field if non-nil, zero value otherwise. ### GetDefaultExtensionsOk -`func (o *SSHWriteRoleRequest) GetDefaultExtensionsOk() (*map[string]interface{}, bool)` +`func (o *SshWriteRoleRequest) GetDefaultExtensionsOk() (*map[string]interface{}, bool)` GetDefaultExtensionsOk returns a tuple with the DefaultExtensions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultExtensions -`func (o *SSHWriteRoleRequest) SetDefaultExtensions(v map[string]interface{})` +`func (o *SshWriteRoleRequest) SetDefaultExtensions(v map[string]interface{})` SetDefaultExtensions sets DefaultExtensions field to given value. ### HasDefaultExtensions -`func (o *SSHWriteRoleRequest) HasDefaultExtensions() bool` +`func (o *SshWriteRoleRequest) HasDefaultExtensions() bool` HasDefaultExtensions returns a boolean if a field has been set. @@ -555,27 +521,27 @@ HasDefaultExtensions returns a boolean if a field has been set. ### GetDefaultExtensionsTemplate -`func (o *SSHWriteRoleRequest) GetDefaultExtensionsTemplate() bool` +`func (o *SshWriteRoleRequest) GetDefaultExtensionsTemplate() bool` GetDefaultExtensionsTemplate returns the DefaultExtensionsTemplate field if non-nil, zero value otherwise. ### GetDefaultExtensionsTemplateOk -`func (o *SSHWriteRoleRequest) GetDefaultExtensionsTemplateOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetDefaultExtensionsTemplateOk() (*bool, bool)` GetDefaultExtensionsTemplateOk returns a tuple with the DefaultExtensionsTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultExtensionsTemplate -`func (o *SSHWriteRoleRequest) SetDefaultExtensionsTemplate(v bool)` +`func (o *SshWriteRoleRequest) SetDefaultExtensionsTemplate(v bool)` SetDefaultExtensionsTemplate sets DefaultExtensionsTemplate field to given value. ### HasDefaultExtensionsTemplate -`func (o *SSHWriteRoleRequest) HasDefaultExtensionsTemplate() bool` +`func (o *SshWriteRoleRequest) HasDefaultExtensionsTemplate() bool` HasDefaultExtensionsTemplate returns a boolean if a field has been set. @@ -584,27 +550,27 @@ HasDefaultExtensionsTemplate returns a boolean if a field has been set. ### GetDefaultUser -`func (o *SSHWriteRoleRequest) GetDefaultUser() string` +`func (o *SshWriteRoleRequest) GetDefaultUser() string` GetDefaultUser returns the DefaultUser field if non-nil, zero value otherwise. ### GetDefaultUserOk -`func (o *SSHWriteRoleRequest) GetDefaultUserOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetDefaultUserOk() (*string, bool)` GetDefaultUserOk returns a tuple with the DefaultUser field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultUser -`func (o *SSHWriteRoleRequest) SetDefaultUser(v string)` +`func (o *SshWriteRoleRequest) SetDefaultUser(v string)` SetDefaultUser sets DefaultUser field to given value. ### HasDefaultUser -`func (o *SSHWriteRoleRequest) HasDefaultUser() bool` +`func (o *SshWriteRoleRequest) HasDefaultUser() bool` HasDefaultUser returns a boolean if a field has been set. @@ -613,27 +579,27 @@ HasDefaultUser returns a boolean if a field has been set. ### GetDefaultUserTemplate -`func (o *SSHWriteRoleRequest) GetDefaultUserTemplate() bool` +`func (o *SshWriteRoleRequest) GetDefaultUserTemplate() bool` GetDefaultUserTemplate returns the DefaultUserTemplate field if non-nil, zero value otherwise. ### GetDefaultUserTemplateOk -`func (o *SSHWriteRoleRequest) GetDefaultUserTemplateOk() (*bool, bool)` +`func (o *SshWriteRoleRequest) GetDefaultUserTemplateOk() (*bool, bool)` GetDefaultUserTemplateOk returns a tuple with the DefaultUserTemplate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDefaultUserTemplate -`func (o *SSHWriteRoleRequest) SetDefaultUserTemplate(v bool)` +`func (o *SshWriteRoleRequest) SetDefaultUserTemplate(v bool)` SetDefaultUserTemplate sets DefaultUserTemplate field to given value. ### HasDefaultUserTemplate -`func (o *SSHWriteRoleRequest) HasDefaultUserTemplate() bool` +`func (o *SshWriteRoleRequest) HasDefaultUserTemplate() bool` HasDefaultUserTemplate returns a boolean if a field has been set. @@ -642,201 +608,85 @@ HasDefaultUserTemplate returns a boolean if a field has been set. ### GetExcludeCidrList -`func (o *SSHWriteRoleRequest) GetExcludeCidrList() string` +`func (o *SshWriteRoleRequest) GetExcludeCidrList() string` GetExcludeCidrList returns the ExcludeCidrList field if non-nil, zero value otherwise. ### GetExcludeCidrListOk -`func (o *SSHWriteRoleRequest) GetExcludeCidrListOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetExcludeCidrListOk() (*string, bool)` GetExcludeCidrListOk returns a tuple with the ExcludeCidrList field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExcludeCidrList -`func (o *SSHWriteRoleRequest) SetExcludeCidrList(v string)` +`func (o *SshWriteRoleRequest) SetExcludeCidrList(v string)` SetExcludeCidrList sets ExcludeCidrList field to given value. ### HasExcludeCidrList -`func (o *SSHWriteRoleRequest) HasExcludeCidrList() bool` +`func (o *SshWriteRoleRequest) HasExcludeCidrList() bool` HasExcludeCidrList returns a boolean if a field has been set. -### GetInstallScript - -`func (o *SSHWriteRoleRequest) GetInstallScript() string` - -GetInstallScript returns the InstallScript field if non-nil, zero value otherwise. - -### GetInstallScriptOk - -`func (o *SSHWriteRoleRequest) GetInstallScriptOk() (*string, bool)` - -GetInstallScriptOk returns a tuple with the InstallScript field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetInstallScript - -`func (o *SSHWriteRoleRequest) SetInstallScript(v string)` - -SetInstallScript sets InstallScript field to given value. - - -### HasInstallScript - -`func (o *SSHWriteRoleRequest) HasInstallScript() bool` - -HasInstallScript returns a boolean if a field has been set. - - - - -### GetKey - -`func (o *SSHWriteRoleRequest) GetKey() string` - -GetKey returns the Key field if non-nil, zero value otherwise. - -### GetKeyOk - -`func (o *SSHWriteRoleRequest) GetKeyOk() (*string, bool)` - -GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetKey - -`func (o *SSHWriteRoleRequest) SetKey(v string)` - -SetKey sets Key field to given value. - - -### HasKey - -`func (o *SSHWriteRoleRequest) HasKey() bool` - -HasKey returns a boolean if a field has been set. - - - - -### GetKeyBits - -`func (o *SSHWriteRoleRequest) GetKeyBits() int32` - -GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. - -### GetKeyBitsOk - -`func (o *SSHWriteRoleRequest) GetKeyBitsOk() (*int32, bool)` - -GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetKeyBits - -`func (o *SSHWriteRoleRequest) SetKeyBits(v int32)` - -SetKeyBits sets KeyBits field to given value. - - -### HasKeyBits - -`func (o *SSHWriteRoleRequest) HasKeyBits() bool` - -HasKeyBits returns a boolean if a field has been set. - - - - ### GetKeyIdFormat -`func (o *SSHWriteRoleRequest) GetKeyIdFormat() string` +`func (o *SshWriteRoleRequest) GetKeyIdFormat() string` GetKeyIdFormat returns the KeyIdFormat field if non-nil, zero value otherwise. ### GetKeyIdFormatOk -`func (o *SSHWriteRoleRequest) GetKeyIdFormatOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetKeyIdFormatOk() (*string, bool)` GetKeyIdFormatOk returns a tuple with the KeyIdFormat field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyIdFormat -`func (o *SSHWriteRoleRequest) SetKeyIdFormat(v string)` +`func (o *SshWriteRoleRequest) SetKeyIdFormat(v string)` SetKeyIdFormat sets KeyIdFormat field to given value. ### HasKeyIdFormat -`func (o *SSHWriteRoleRequest) HasKeyIdFormat() bool` +`func (o *SshWriteRoleRequest) HasKeyIdFormat() bool` HasKeyIdFormat returns a boolean if a field has been set. -### GetKeyOptionSpecs - -`func (o *SSHWriteRoleRequest) GetKeyOptionSpecs() string` - -GetKeyOptionSpecs returns the KeyOptionSpecs field if non-nil, zero value otherwise. - -### GetKeyOptionSpecsOk - -`func (o *SSHWriteRoleRequest) GetKeyOptionSpecsOk() (*string, bool)` - -GetKeyOptionSpecsOk returns a tuple with the KeyOptionSpecs field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetKeyOptionSpecs - -`func (o *SSHWriteRoleRequest) SetKeyOptionSpecs(v string)` - -SetKeyOptionSpecs sets KeyOptionSpecs field to given value. - - -### HasKeyOptionSpecs - -`func (o *SSHWriteRoleRequest) HasKeyOptionSpecs() bool` - -HasKeyOptionSpecs returns a boolean if a field has been set. - - - - ### GetKeyType -`func (o *SSHWriteRoleRequest) GetKeyType() string` +`func (o *SshWriteRoleRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *SSHWriteRoleRequest) GetKeyTypeOk() (*string, bool)` +`func (o *SshWriteRoleRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *SSHWriteRoleRequest) SetKeyType(v string)` +`func (o *SshWriteRoleRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *SSHWriteRoleRequest) HasKeyType() bool` +`func (o *SshWriteRoleRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -845,27 +695,27 @@ HasKeyType returns a boolean if a field has been set. ### GetMaxTtl -`func (o *SSHWriteRoleRequest) GetMaxTtl() int32` +`func (o *SshWriteRoleRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *SSHWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *SshWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *SSHWriteRoleRequest) SetMaxTtl(v int32)` +`func (o *SshWriteRoleRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *SSHWriteRoleRequest) HasMaxTtl() bool` +`func (o *SshWriteRoleRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -874,27 +724,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetNotBeforeDuration -`func (o *SSHWriteRoleRequest) GetNotBeforeDuration() int32` +`func (o *SshWriteRoleRequest) GetNotBeforeDuration() int32` GetNotBeforeDuration returns the NotBeforeDuration field if non-nil, zero value otherwise. ### GetNotBeforeDurationOk -`func (o *SSHWriteRoleRequest) GetNotBeforeDurationOk() (*int32, bool)` +`func (o *SshWriteRoleRequest) GetNotBeforeDurationOk() (*int32, bool)` GetNotBeforeDurationOk returns a tuple with the NotBeforeDuration field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNotBeforeDuration -`func (o *SSHWriteRoleRequest) SetNotBeforeDuration(v int32)` +`func (o *SshWriteRoleRequest) SetNotBeforeDuration(v int32)` SetNotBeforeDuration sets NotBeforeDuration field to given value. ### HasNotBeforeDuration -`func (o *SSHWriteRoleRequest) HasNotBeforeDuration() bool` +`func (o *SshWriteRoleRequest) HasNotBeforeDuration() bool` HasNotBeforeDuration returns a boolean if a field has been set. @@ -903,27 +753,27 @@ HasNotBeforeDuration returns a boolean if a field has been set. ### GetPort -`func (o *SSHWriteRoleRequest) GetPort() int32` +`func (o *SshWriteRoleRequest) GetPort() int32` GetPort returns the Port field if non-nil, zero value otherwise. ### GetPortOk -`func (o *SSHWriteRoleRequest) GetPortOk() (*int32, bool)` +`func (o *SshWriteRoleRequest) GetPortOk() (*int32, bool)` GetPortOk returns a tuple with the Port field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPort -`func (o *SSHWriteRoleRequest) SetPort(v int32)` +`func (o *SshWriteRoleRequest) SetPort(v int32)` SetPort sets Port field to given value. ### HasPort -`func (o *SSHWriteRoleRequest) HasPort() bool` +`func (o *SshWriteRoleRequest) HasPort() bool` HasPort returns a boolean if a field has been set. @@ -932,27 +782,27 @@ HasPort returns a boolean if a field has been set. ### GetTtl -`func (o *SSHWriteRoleRequest) GetTtl() int32` +`func (o *SshWriteRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *SSHWriteRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *SshWriteRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *SSHWriteRoleRequest) SetTtl(v int32)` +`func (o *SshWriteRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *SSHWriteRoleRequest) HasTtl() bool` +`func (o *SshWriteRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. diff --git a/docs/SealStatusResponse.md b/docs/SealStatusResponse.md new file mode 100644 index 00000000..e86e2808 --- /dev/null +++ b/docs/SealStatusResponse.md @@ -0,0 +1,519 @@ +# SealStatusResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**BuildDate** | Pointer to **string** | | [optional] +**ClusterId** | Pointer to **string** | | [optional] +**ClusterName** | Pointer to **string** | | [optional] +**HcpLinkResourceID** | Pointer to **string** | | [optional] +**HcpLinkStatus** | Pointer to **string** | | [optional] +**Initialized** | Pointer to **bool** | | [optional] +**Migration** | Pointer to **bool** | | [optional] +**N** | Pointer to **int32** | | [optional] +**Nonce** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**RecoverySeal** | Pointer to **bool** | | [optional] +**Sealed** | Pointer to **bool** | | [optional] +**StorageType** | Pointer to **string** | | [optional] +**T** | Pointer to **int32** | | [optional] +**Type** | Pointer to **string** | | [optional] +**Version** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewSealStatusResponse + +`func NewSealStatusResponse() *SealStatusResponse` + +NewSealStatusResponse instantiates a new SealStatusResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewSealStatusResponseWithDefaults + +`func NewSealStatusResponseWithDefaults() *SealStatusResponse` + +NewSealStatusResponseWithDefaults instantiates a new SealStatusResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetBuildDate + +`func (o *SealStatusResponse) GetBuildDate() string` + +GetBuildDate returns the BuildDate field if non-nil, zero value otherwise. + +### GetBuildDateOk + +`func (o *SealStatusResponse) GetBuildDateOk() (*string, bool)` + +GetBuildDateOk returns a tuple with the BuildDate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBuildDate + +`func (o *SealStatusResponse) SetBuildDate(v string)` + +SetBuildDate sets BuildDate field to given value. + + +### HasBuildDate + +`func (o *SealStatusResponse) HasBuildDate() bool` + +HasBuildDate returns a boolean if a field has been set. + + + + +### GetClusterId + +`func (o *SealStatusResponse) GetClusterId() string` + +GetClusterId returns the ClusterId field if non-nil, zero value otherwise. + +### GetClusterIdOk + +`func (o *SealStatusResponse) GetClusterIdOk() (*string, bool)` + +GetClusterIdOk returns a tuple with the ClusterId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetClusterId + +`func (o *SealStatusResponse) SetClusterId(v string)` + +SetClusterId sets ClusterId field to given value. + + +### HasClusterId + +`func (o *SealStatusResponse) HasClusterId() bool` + +HasClusterId returns a boolean if a field has been set. + + + + +### GetClusterName + +`func (o *SealStatusResponse) GetClusterName() string` + +GetClusterName returns the ClusterName field if non-nil, zero value otherwise. + +### GetClusterNameOk + +`func (o *SealStatusResponse) GetClusterNameOk() (*string, bool)` + +GetClusterNameOk returns a tuple with the ClusterName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetClusterName + +`func (o *SealStatusResponse) SetClusterName(v string)` + +SetClusterName sets ClusterName field to given value. + + +### HasClusterName + +`func (o *SealStatusResponse) HasClusterName() bool` + +HasClusterName returns a boolean if a field has been set. + + + + +### GetHcpLinkResourceID + +`func (o *SealStatusResponse) GetHcpLinkResourceID() string` + +GetHcpLinkResourceID returns the HcpLinkResourceID field if non-nil, zero value otherwise. + +### GetHcpLinkResourceIDOk + +`func (o *SealStatusResponse) GetHcpLinkResourceIDOk() (*string, bool)` + +GetHcpLinkResourceIDOk returns a tuple with the HcpLinkResourceID field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHcpLinkResourceID + +`func (o *SealStatusResponse) SetHcpLinkResourceID(v string)` + +SetHcpLinkResourceID sets HcpLinkResourceID field to given value. + + +### HasHcpLinkResourceID + +`func (o *SealStatusResponse) HasHcpLinkResourceID() bool` + +HasHcpLinkResourceID returns a boolean if a field has been set. + + + + +### GetHcpLinkStatus + +`func (o *SealStatusResponse) GetHcpLinkStatus() string` + +GetHcpLinkStatus returns the HcpLinkStatus field if non-nil, zero value otherwise. + +### GetHcpLinkStatusOk + +`func (o *SealStatusResponse) GetHcpLinkStatusOk() (*string, bool)` + +GetHcpLinkStatusOk returns a tuple with the HcpLinkStatus field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHcpLinkStatus + +`func (o *SealStatusResponse) SetHcpLinkStatus(v string)` + +SetHcpLinkStatus sets HcpLinkStatus field to given value. + + +### HasHcpLinkStatus + +`func (o *SealStatusResponse) HasHcpLinkStatus() bool` + +HasHcpLinkStatus returns a boolean if a field has been set. + + + + +### GetInitialized + +`func (o *SealStatusResponse) GetInitialized() bool` + +GetInitialized returns the Initialized field if non-nil, zero value otherwise. + +### GetInitializedOk + +`func (o *SealStatusResponse) GetInitializedOk() (*bool, bool)` + +GetInitializedOk returns a tuple with the Initialized field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetInitialized + +`func (o *SealStatusResponse) SetInitialized(v bool)` + +SetInitialized sets Initialized field to given value. + + +### HasInitialized + +`func (o *SealStatusResponse) HasInitialized() bool` + +HasInitialized returns a boolean if a field has been set. + + + + +### GetMigration + +`func (o *SealStatusResponse) GetMigration() bool` + +GetMigration returns the Migration field if non-nil, zero value otherwise. + +### GetMigrationOk + +`func (o *SealStatusResponse) GetMigrationOk() (*bool, bool)` + +GetMigrationOk returns a tuple with the Migration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMigration + +`func (o *SealStatusResponse) SetMigration(v bool)` + +SetMigration sets Migration field to given value. + + +### HasMigration + +`func (o *SealStatusResponse) HasMigration() bool` + +HasMigration returns a boolean if a field has been set. + + + + +### GetN + +`func (o *SealStatusResponse) GetN() int32` + +GetN returns the N field if non-nil, zero value otherwise. + +### GetNOk + +`func (o *SealStatusResponse) GetNOk() (*int32, bool)` + +GetNOk returns a tuple with the N field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetN + +`func (o *SealStatusResponse) SetN(v int32)` + +SetN sets N field to given value. + + +### HasN + +`func (o *SealStatusResponse) HasN() bool` + +HasN returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *SealStatusResponse) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *SealStatusResponse) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *SealStatusResponse) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *SealStatusResponse) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *SealStatusResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *SealStatusResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *SealStatusResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *SealStatusResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRecoverySeal + +`func (o *SealStatusResponse) GetRecoverySeal() bool` + +GetRecoverySeal returns the RecoverySeal field if non-nil, zero value otherwise. + +### GetRecoverySealOk + +`func (o *SealStatusResponse) GetRecoverySealOk() (*bool, bool)` + +GetRecoverySealOk returns a tuple with the RecoverySeal field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRecoverySeal + +`func (o *SealStatusResponse) SetRecoverySeal(v bool)` + +SetRecoverySeal sets RecoverySeal field to given value. + + +### HasRecoverySeal + +`func (o *SealStatusResponse) HasRecoverySeal() bool` + +HasRecoverySeal returns a boolean if a field has been set. + + + + +### GetSealed + +`func (o *SealStatusResponse) GetSealed() bool` + +GetSealed returns the Sealed field if non-nil, zero value otherwise. + +### GetSealedOk + +`func (o *SealStatusResponse) GetSealedOk() (*bool, bool)` + +GetSealedOk returns a tuple with the Sealed field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSealed + +`func (o *SealStatusResponse) SetSealed(v bool)` + +SetSealed sets Sealed field to given value. + + +### HasSealed + +`func (o *SealStatusResponse) HasSealed() bool` + +HasSealed returns a boolean if a field has been set. + + + + +### GetStorageType + +`func (o *SealStatusResponse) GetStorageType() string` + +GetStorageType returns the StorageType field if non-nil, zero value otherwise. + +### GetStorageTypeOk + +`func (o *SealStatusResponse) GetStorageTypeOk() (*string, bool)` + +GetStorageTypeOk returns a tuple with the StorageType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStorageType + +`func (o *SealStatusResponse) SetStorageType(v string)` + +SetStorageType sets StorageType field to given value. + + +### HasStorageType + +`func (o *SealStatusResponse) HasStorageType() bool` + +HasStorageType returns a boolean if a field has been set. + + + + +### GetT + +`func (o *SealStatusResponse) GetT() int32` + +GetT returns the T field if non-nil, zero value otherwise. + +### GetTOk + +`func (o *SealStatusResponse) GetTOk() (*int32, bool)` + +GetTOk returns a tuple with the T field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetT + +`func (o *SealStatusResponse) SetT(v int32)` + +SetT sets T field to given value. + + +### HasT + +`func (o *SealStatusResponse) HasT() bool` + +HasT returns a boolean if a field has been set. + + + + +### GetType + +`func (o *SealStatusResponse) GetType() string` + +GetType returns the Type field if non-nil, zero value otherwise. + +### GetTypeOk + +`func (o *SealStatusResponse) GetTypeOk() (*string, bool)` + +GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetType + +`func (o *SealStatusResponse) SetType(v string)` + +SetType sets Type field to given value. + + +### HasType + +`func (o *SealStatusResponse) HasType() bool` + +HasType returns a boolean if a field has been set. + + + + +### GetVersion + +`func (o *SealStatusResponse) GetVersion() string` + +GetVersion returns the Version field if non-nil, zero value otherwise. + +### GetVersionOk + +`func (o *SealStatusResponse) GetVersionOk() (*string, bool)` + +GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVersion + +`func (o *SealStatusResponse) SetVersion(v string)` + +SetVersion sets Version field to given value. + + +### HasVersion + +`func (o *SealStatusResponse) HasVersion() bool` + +HasVersion returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index 4b6234ad..258076e2 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -2,361 +2,342 @@ Method | HTTP request | Description ------------- | ------------- | ------------- -[**AWSConfigReadLease**](SecretsApi.md#AWSConfigReadLease) | **Get** /{aws_mount_path}/config/lease | Configure the default lease information for generated credentials. -[**AWSConfigReadRootIAMCredentials**](SecretsApi.md#AWSConfigReadRootIAMCredentials) | **Get** /{aws_mount_path}/config/root | Configure the root credentials that are used to manage IAM. -[**AWSConfigRotateRootIAMCredentials**](SecretsApi.md#AWSConfigRotateRootIAMCredentials) | **Post** /{aws_mount_path}/config/rotate-root | -[**AWSConfigWriteLease**](SecretsApi.md#AWSConfigWriteLease) | **Post** /{aws_mount_path}/config/lease | Configure the default lease information for generated credentials. -[**AWSConfigWriteRootIAMCredentials**](SecretsApi.md#AWSConfigWriteRootIAMCredentials) | **Post** /{aws_mount_path}/config/root | Configure the root credentials that are used to manage IAM. -[**AWSDeleteRole**](SecretsApi.md#AWSDeleteRole) | **Delete** /{aws_mount_path}/roles/{name} | Read, write and reference IAM policies that access keys can be made for. -[**AWSListRoles**](SecretsApi.md#AWSListRoles) | **Get** /{aws_mount_path}/roles | List the existing roles in this backend -[**AWSReadCredentials**](SecretsApi.md#AWSReadCredentials) | **Get** /{aws_mount_path}/creds | Generate AWS credentials from a specific Vault role. -[**AWSReadRole**](SecretsApi.md#AWSReadRole) | **Get** /{aws_mount_path}/roles/{name} | Read, write and reference IAM policies that access keys can be made for. -[**AWSReadSecurityTokenService**](SecretsApi.md#AWSReadSecurityTokenService) | **Get** /{aws_mount_path}/sts/{name} | Generate AWS credentials from a specific Vault role. -[**AWSWriteCredentials**](SecretsApi.md#AWSWriteCredentials) | **Post** /{aws_mount_path}/creds | Generate AWS credentials from a specific Vault role. -[**AWSWriteRole**](SecretsApi.md#AWSWriteRole) | **Post** /{aws_mount_path}/roles/{name} | Read, write and reference IAM policies that access keys can be made for. -[**AWSWriteSecurityTokenService**](SecretsApi.md#AWSWriteSecurityTokenService) | **Post** /{aws_mount_path}/sts/{name} | Generate AWS credentials from a specific Vault role. -[**ActiveDirectoryCheckInLibrary**](SecretsApi.md#ActiveDirectoryCheckInLibrary) | **Post** /{ad_mount_path}/library/{name}/check-in | Check service accounts in to the library. -[**ActiveDirectoryCheckInManageLibrary**](SecretsApi.md#ActiveDirectoryCheckInManageLibrary) | **Post** /{ad_mount_path}/library/manage/{name}/check-in | Check service accounts in to the library. -[**ActiveDirectoryCheckOutLibrary**](SecretsApi.md#ActiveDirectoryCheckOutLibrary) | **Post** /{ad_mount_path}/library/{name}/check-out | Check a service account out from the library. -[**ActiveDirectoryDeleteConfig**](SecretsApi.md#ActiveDirectoryDeleteConfig) | **Delete** /{ad_mount_path}/config | Configure the AD server to connect to, along with password options. -[**ActiveDirectoryDeleteLibrary**](SecretsApi.md#ActiveDirectoryDeleteLibrary) | **Delete** /{ad_mount_path}/library/{name} | Delete a library set. -[**ActiveDirectoryDeleteRole**](SecretsApi.md#ActiveDirectoryDeleteRole) | **Delete** /{ad_mount_path}/roles/{name} | Manage roles to build links between Vault and Active Directory service accounts. -[**ActiveDirectoryListLibraries**](SecretsApi.md#ActiveDirectoryListLibraries) | **Get** /{ad_mount_path}/library | -[**ActiveDirectoryListRoles**](SecretsApi.md#ActiveDirectoryListRoles) | **Get** /{ad_mount_path}/roles | List the name of each role currently stored. -[**ActiveDirectoryReadConfig**](SecretsApi.md#ActiveDirectoryReadConfig) | **Get** /{ad_mount_path}/config | Configure the AD server to connect to, along with password options. -[**ActiveDirectoryReadCredentials**](SecretsApi.md#ActiveDirectoryReadCredentials) | **Get** /{ad_mount_path}/creds/{name} | -[**ActiveDirectoryReadLibrary**](SecretsApi.md#ActiveDirectoryReadLibrary) | **Get** /{ad_mount_path}/library/{name} | Read a library set. -[**ActiveDirectoryReadLibraryStatus**](SecretsApi.md#ActiveDirectoryReadLibraryStatus) | **Get** /{ad_mount_path}/library/{name}/status | Check the status of the service accounts in a library set. -[**ActiveDirectoryReadRole**](SecretsApi.md#ActiveDirectoryReadRole) | **Get** /{ad_mount_path}/roles/{name} | Manage roles to build links between Vault and Active Directory service accounts. -[**ActiveDirectoryRotateRole**](SecretsApi.md#ActiveDirectoryRotateRole) | **Post** /{ad_mount_path}/rotate-role/{name} | -[**ActiveDirectoryRotateRoot**](SecretsApi.md#ActiveDirectoryRotateRoot) | **Post** /{ad_mount_path}/rotate-root | -[**ActiveDirectoryWriteConfig**](SecretsApi.md#ActiveDirectoryWriteConfig) | **Post** /{ad_mount_path}/config | Configure the AD server to connect to, along with password options. -[**ActiveDirectoryWriteLibrary**](SecretsApi.md#ActiveDirectoryWriteLibrary) | **Post** /{ad_mount_path}/library/{name} | Update a library set. -[**ActiveDirectoryWriteRole**](SecretsApi.md#ActiveDirectoryWriteRole) | **Post** /{ad_mount_path}/roles/{name} | Manage roles to build links between Vault and Active Directory service accounts. -[**AliCloudDeleteConfig**](SecretsApi.md#AliCloudDeleteConfig) | **Delete** /{alicloud_mount_path}/config | Configure the access key and secret to use for RAM and STS calls. +[**AliCloudConfigure**](SecretsApi.md#AliCloudConfigure) | **Post** /{alicloud_mount_path}/config | +[**AliCloudDeleteConfiguration**](SecretsApi.md#AliCloudDeleteConfiguration) | **Delete** /{alicloud_mount_path}/config | [**AliCloudDeleteRole**](SecretsApi.md#AliCloudDeleteRole) | **Delete** /{alicloud_mount_path}/role/{name} | Read, write and reference policies and roles that API keys or STS credentials can be made for. +[**AliCloudGenerateCredentials**](SecretsApi.md#AliCloudGenerateCredentials) | **Get** /{alicloud_mount_path}/creds/{name} | Generate an API key or STS credential using the given role's configuration.' [**AliCloudListRoles**](SecretsApi.md#AliCloudListRoles) | **Get** /{alicloud_mount_path}/role | List the existing roles in this backend. -[**AliCloudReadConfig**](SecretsApi.md#AliCloudReadConfig) | **Get** /{alicloud_mount_path}/config | Configure the access key and secret to use for RAM and STS calls. -[**AliCloudReadCredentials**](SecretsApi.md#AliCloudReadCredentials) | **Get** /{alicloud_mount_path}/creds/{name} | Generate an API key or STS credential using the given role's configuration.' +[**AliCloudReadConfiguration**](SecretsApi.md#AliCloudReadConfiguration) | **Get** /{alicloud_mount_path}/config | [**AliCloudReadRole**](SecretsApi.md#AliCloudReadRole) | **Get** /{alicloud_mount_path}/role/{name} | Read, write and reference policies and roles that API keys or STS credentials can be made for. -[**AliCloudWriteConfig**](SecretsApi.md#AliCloudWriteConfig) | **Post** /{alicloud_mount_path}/config | Configure the access key and secret to use for RAM and STS calls. [**AliCloudWriteRole**](SecretsApi.md#AliCloudWriteRole) | **Post** /{alicloud_mount_path}/role/{name} | Read, write and reference policies and roles that API keys or STS credentials can be made for. -[**AzureDeleteConfig**](SecretsApi.md#AzureDeleteConfig) | **Delete** /{azure_mount_path}/config | +[**AwsConfigureLease**](SecretsApi.md#AwsConfigureLease) | **Post** /{aws_mount_path}/config/lease | +[**AwsConfigureRootIamCredentials**](SecretsApi.md#AwsConfigureRootIamCredentials) | **Post** /{aws_mount_path}/config/root | +[**AwsDeleteRole**](SecretsApi.md#AwsDeleteRole) | **Delete** /{aws_mount_path}/roles/{name} | Read, write and reference IAM policies that access keys can be made for. +[**AwsGenerateCredentials**](SecretsApi.md#AwsGenerateCredentials) | **Get** /{aws_mount_path}/creds/{name} | +[**AwsGenerateCredentials2**](SecretsApi.md#AwsGenerateCredentials2) | **Post** /{aws_mount_path}/creds/{name} | +[**AwsGenerateStsCredentials**](SecretsApi.md#AwsGenerateStsCredentials) | **Get** /{aws_mount_path}/sts/{name} | +[**AwsGenerateStsCredentials2**](SecretsApi.md#AwsGenerateStsCredentials2) | **Post** /{aws_mount_path}/sts/{name} | +[**AwsListRoles**](SecretsApi.md#AwsListRoles) | **Get** /{aws_mount_path}/roles | List the existing roles in this backend +[**AwsReadLeaseConfiguration**](SecretsApi.md#AwsReadLeaseConfiguration) | **Get** /{aws_mount_path}/config/lease | +[**AwsReadRole**](SecretsApi.md#AwsReadRole) | **Get** /{aws_mount_path}/roles/{name} | Read, write and reference IAM policies that access keys can be made for. +[**AwsReadRootIamCredentialsConfiguration**](SecretsApi.md#AwsReadRootIamCredentialsConfiguration) | **Get** /{aws_mount_path}/config/root | +[**AwsRotateRootIamCredentials**](SecretsApi.md#AwsRotateRootIamCredentials) | **Post** /{aws_mount_path}/config/rotate-root | +[**AwsWriteRole**](SecretsApi.md#AwsWriteRole) | **Post** /{aws_mount_path}/roles/{name} | Read, write and reference IAM policies that access keys can be made for. +[**AzureConfigure**](SecretsApi.md#AzureConfigure) | **Post** /{azure_mount_path}/config | +[**AzureDeleteConfiguration**](SecretsApi.md#AzureDeleteConfiguration) | **Delete** /{azure_mount_path}/config | [**AzureDeleteRole**](SecretsApi.md#AzureDeleteRole) | **Delete** /{azure_mount_path}/roles/{name} | Manage the Vault roles used to generate Azure credentials. [**AzureListRoles**](SecretsApi.md#AzureListRoles) | **Get** /{azure_mount_path}/roles | List existing roles. -[**AzureReadConfig**](SecretsApi.md#AzureReadConfig) | **Get** /{azure_mount_path}/config | -[**AzureReadCredentials**](SecretsApi.md#AzureReadCredentials) | **Get** /{azure_mount_path}/creds/{role} | +[**AzureReadConfiguration**](SecretsApi.md#AzureReadConfiguration) | **Get** /{azure_mount_path}/config | [**AzureReadRole**](SecretsApi.md#AzureReadRole) | **Get** /{azure_mount_path}/roles/{name} | Manage the Vault roles used to generate Azure credentials. +[**AzureRequestServicePrincipalCredentials**](SecretsApi.md#AzureRequestServicePrincipalCredentials) | **Get** /{azure_mount_path}/creds/{role} | [**AzureRotateRoot**](SecretsApi.md#AzureRotateRoot) | **Post** /{azure_mount_path}/rotate-root | -[**AzureWriteConfig**](SecretsApi.md#AzureWriteConfig) | **Post** /{azure_mount_path}/config | [**AzureWriteRole**](SecretsApi.md#AzureWriteRole) | **Post** /{azure_mount_path}/roles/{name} | Manage the Vault roles used to generate Azure credentials. +[**ConsulConfigureAccess**](SecretsApi.md#ConsulConfigureAccess) | **Post** /{consul_mount_path}/config/access | [**ConsulDeleteRole**](SecretsApi.md#ConsulDeleteRole) | **Delete** /{consul_mount_path}/roles/{name} | +[**ConsulGenerateCredentials**](SecretsApi.md#ConsulGenerateCredentials) | **Get** /{consul_mount_path}/creds/{role} | [**ConsulListRoles**](SecretsApi.md#ConsulListRoles) | **Get** /{consul_mount_path}/roles | -[**ConsulReadAccessConfig**](SecretsApi.md#ConsulReadAccessConfig) | **Get** /{consul_mount_path}/config/access | -[**ConsulReadCredentials**](SecretsApi.md#ConsulReadCredentials) | **Get** /{consul_mount_path}/creds/{role} | +[**ConsulReadAccessConfiguration**](SecretsApi.md#ConsulReadAccessConfiguration) | **Get** /{consul_mount_path}/config/access | [**ConsulReadRole**](SecretsApi.md#ConsulReadRole) | **Get** /{consul_mount_path}/roles/{name} | -[**ConsulWriteAccessConfig**](SecretsApi.md#ConsulWriteAccessConfig) | **Post** /{consul_mount_path}/config/access | [**ConsulWriteRole**](SecretsApi.md#ConsulWriteRole) | **Post** /{consul_mount_path}/roles/{name} | -[**CubbyholeDelete**](SecretsApi.md#CubbyholeDelete) | **Delete** /{cubbyhole_mount_path}/{path} | Deletes the secret at the specified location. -[**CubbyholeRead**](SecretsApi.md#CubbyholeRead) | **Get** /{cubbyhole_mount_path}/{path} | Retrieve the secret at the specified location. -[**CubbyholeWrite**](SecretsApi.md#CubbyholeWrite) | **Post** /{cubbyhole_mount_path}/{path} | Store a secret at the specified location. -[**DatabaseDeleteConfig**](SecretsApi.md#DatabaseDeleteConfig) | **Delete** /{database_mount_path}/config/{name} | Configure connection details to a database plugin. +[**CubbyholeDelete**](SecretsApi.md#CubbyholeDelete) | **Delete** /cubbyhole/{path} | Deletes the secret at the specified location. +[**CubbyholeRead**](SecretsApi.md#CubbyholeRead) | **Get** /cubbyhole/{path} | Retrieve the secret at the specified location. +[**CubbyholeWrite**](SecretsApi.md#CubbyholeWrite) | **Post** /cubbyhole/{path} | Store a secret at the specified location. +[**DatabaseConfigureConnection**](SecretsApi.md#DatabaseConfigureConnection) | **Post** /{database_mount_path}/config/{name} | +[**DatabaseDeleteConnectionConfiguration**](SecretsApi.md#DatabaseDeleteConnectionConfiguration) | **Delete** /{database_mount_path}/config/{name} | [**DatabaseDeleteRole**](SecretsApi.md#DatabaseDeleteRole) | **Delete** /{database_mount_path}/roles/{name} | Manage the roles that can be created with this backend. [**DatabaseDeleteStaticRole**](SecretsApi.md#DatabaseDeleteStaticRole) | **Delete** /{database_mount_path}/static-roles/{name} | Manage the static roles that can be created with this backend. -[**DatabaseListConfig**](SecretsApi.md#DatabaseListConfig) | **Get** /{database_mount_path}/config | Configure connection details to a database plugin. +[**DatabaseGenerateCredentials**](SecretsApi.md#DatabaseGenerateCredentials) | **Get** /{database_mount_path}/creds/{name} | Request database credentials for a certain role. +[**DatabaseListConnections**](SecretsApi.md#DatabaseListConnections) | **Get** /{database_mount_path}/config | Configure connection details to a database plugin. [**DatabaseListRoles**](SecretsApi.md#DatabaseListRoles) | **Get** /{database_mount_path}/roles | Manage the roles that can be created with this backend. [**DatabaseListStaticRoles**](SecretsApi.md#DatabaseListStaticRoles) | **Get** /{database_mount_path}/static-roles | Manage the static roles that can be created with this backend. -[**DatabaseReadConfig**](SecretsApi.md#DatabaseReadConfig) | **Get** /{database_mount_path}/config/{name} | Configure connection details to a database plugin. -[**DatabaseReadCredentials**](SecretsApi.md#DatabaseReadCredentials) | **Get** /{database_mount_path}/creds/{name} | Request database credentials for a certain role. +[**DatabaseReadConnectionConfiguration**](SecretsApi.md#DatabaseReadConnectionConfiguration) | **Get** /{database_mount_path}/config/{name} | [**DatabaseReadRole**](SecretsApi.md#DatabaseReadRole) | **Get** /{database_mount_path}/roles/{name} | Manage the roles that can be created with this backend. -[**DatabaseReadStaticCredentials**](SecretsApi.md#DatabaseReadStaticCredentials) | **Get** /{database_mount_path}/static-creds/{name} | Request database credentials for a certain static role. These credentials are rotated periodically. [**DatabaseReadStaticRole**](SecretsApi.md#DatabaseReadStaticRole) | **Get** /{database_mount_path}/static-roles/{name} | Manage the static roles that can be created with this backend. -[**DatabaseReset**](SecretsApi.md#DatabaseReset) | **Post** /{database_mount_path}/reset/{name} | Resets a database plugin. -[**DatabaseRotateRole**](SecretsApi.md#DatabaseRotateRole) | **Post** /{database_mount_path}/rotate-role/{name} | -[**DatabaseRotateRoot**](SecretsApi.md#DatabaseRotateRoot) | **Post** /{database_mount_path}/rotate-root/{name} | -[**DatabaseWriteConfig**](SecretsApi.md#DatabaseWriteConfig) | **Post** /{database_mount_path}/config/{name} | Configure connection details to a database plugin. +[**DatabaseReadStaticRoleCredentials**](SecretsApi.md#DatabaseReadStaticRoleCredentials) | **Get** /{database_mount_path}/static-creds/{name} | Request database credentials for a certain static role. These credentials are rotated periodically. +[**DatabaseResetConnection**](SecretsApi.md#DatabaseResetConnection) | **Post** /{database_mount_path}/reset/{name} | Resets a database plugin. +[**DatabaseRotateRootCredentials**](SecretsApi.md#DatabaseRotateRootCredentials) | **Post** /{database_mount_path}/rotate-root/{name} | +[**DatabaseRotateStaticRoleCredentials**](SecretsApi.md#DatabaseRotateStaticRoleCredentials) | **Post** /{database_mount_path}/rotate-role/{name} | [**DatabaseWriteRole**](SecretsApi.md#DatabaseWriteRole) | **Post** /{database_mount_path}/roles/{name} | Manage the roles that can be created with this backend. [**DatabaseWriteStaticRole**](SecretsApi.md#DatabaseWriteStaticRole) | **Post** /{database_mount_path}/static-roles/{name} | Manage the static roles that can be created with this backend. +[**GoogleCloudConfigure**](SecretsApi.md#GoogleCloudConfigure) | **Post** /{gcp_mount_path}/config | +[**GoogleCloudDeleteImpersonatedAccount**](SecretsApi.md#GoogleCloudDeleteImpersonatedAccount) | **Delete** /{gcp_mount_path}/impersonated-account/{name} | [**GoogleCloudDeleteRoleset**](SecretsApi.md#GoogleCloudDeleteRoleset) | **Delete** /{gcp_mount_path}/roleset/{name} | [**GoogleCloudDeleteStaticAccount**](SecretsApi.md#GoogleCloudDeleteStaticAccount) | **Delete** /{gcp_mount_path}/static-account/{name} | -[**GoogleCloudKMSDecrypt**](SecretsApi.md#GoogleCloudKMSDecrypt) | **Post** /{gcpkms_mount_path}/decrypt/{key} | Decrypt a ciphertext value using a named key -[**GoogleCloudKMSDeleteConfig**](SecretsApi.md#GoogleCloudKMSDeleteConfig) | **Delete** /{gcpkms_mount_path}/config | Configure the GCP KMS secrets engine -[**GoogleCloudKMSDeleteKey**](SecretsApi.md#GoogleCloudKMSDeleteKey) | **Delete** /{gcpkms_mount_path}/keys/{key} | Interact with crypto keys in Vault and Google Cloud KMS -[**GoogleCloudKMSDeregisterKey**](SecretsApi.md#GoogleCloudKMSDeregisterKey) | **Post** /{gcpkms_mount_path}/keys/deregister/{key} | Deregister an existing key in Vault -[**GoogleCloudKMSEncrypt**](SecretsApi.md#GoogleCloudKMSEncrypt) | **Post** /{gcpkms_mount_path}/encrypt/{key} | Encrypt a plaintext value using a named key -[**GoogleCloudKMSListKeys**](SecretsApi.md#GoogleCloudKMSListKeys) | **Get** /{gcpkms_mount_path}/keys | List named keys -[**GoogleCloudKMSReadConfig**](SecretsApi.md#GoogleCloudKMSReadConfig) | **Get** /{gcpkms_mount_path}/config | Configure the GCP KMS secrets engine -[**GoogleCloudKMSReadKey**](SecretsApi.md#GoogleCloudKMSReadKey) | **Get** /{gcpkms_mount_path}/keys/{key} | Interact with crypto keys in Vault and Google Cloud KMS -[**GoogleCloudKMSReadKeyConfig**](SecretsApi.md#GoogleCloudKMSReadKeyConfig) | **Get** /{gcpkms_mount_path}/keys/config/{key} | Configure the key in Vault -[**GoogleCloudKMSReadPubkey**](SecretsApi.md#GoogleCloudKMSReadPubkey) | **Get** /{gcpkms_mount_path}/pubkey/{key} | Retrieve the public key associated with the named key -[**GoogleCloudKMSReencrypt**](SecretsApi.md#GoogleCloudKMSReencrypt) | **Post** /{gcpkms_mount_path}/reencrypt/{key} | Re-encrypt existing ciphertext data to a new version -[**GoogleCloudKMSRegisterKey**](SecretsApi.md#GoogleCloudKMSRegisterKey) | **Post** /{gcpkms_mount_path}/keys/register/{key} | Register an existing crypto key in Google Cloud KMS -[**GoogleCloudKMSRotateKey**](SecretsApi.md#GoogleCloudKMSRotateKey) | **Post** /{gcpkms_mount_path}/keys/rotate/{key} | Rotate a crypto key to a new primary version -[**GoogleCloudKMSSign**](SecretsApi.md#GoogleCloudKMSSign) | **Post** /{gcpkms_mount_path}/sign/{key} | Signs a message or digest using a named key -[**GoogleCloudKMSTrimKey**](SecretsApi.md#GoogleCloudKMSTrimKey) | **Post** /{gcpkms_mount_path}/keys/trim/{key} | Delete old crypto key versions from Google Cloud KMS -[**GoogleCloudKMSVerify**](SecretsApi.md#GoogleCloudKMSVerify) | **Post** /{gcpkms_mount_path}/verify/{key} | Verify a signature using a named key -[**GoogleCloudKMSWriteConfig**](SecretsApi.md#GoogleCloudKMSWriteConfig) | **Post** /{gcpkms_mount_path}/config | Configure the GCP KMS secrets engine -[**GoogleCloudKMSWriteKey**](SecretsApi.md#GoogleCloudKMSWriteKey) | **Post** /{gcpkms_mount_path}/keys/{key} | Interact with crypto keys in Vault and Google Cloud KMS -[**GoogleCloudKMSWriteKeyConfig**](SecretsApi.md#GoogleCloudKMSWriteKeyConfig) | **Post** /{gcpkms_mount_path}/keys/config/{key} | Configure the key in Vault -[**GoogleCloudListRolesets**](SecretsApi.md#GoogleCloudListRolesets) | **Get** /{gcp_mount_path}/rolesets | -[**GoogleCloudListStaticAccounts**](SecretsApi.md#GoogleCloudListStaticAccounts) | **Get** /{gcp_mount_path}/static-accounts | -[**GoogleCloudReadConfig**](SecretsApi.md#GoogleCloudReadConfig) | **Get** /{gcp_mount_path}/config | -[**GoogleCloudReadKey**](SecretsApi.md#GoogleCloudReadKey) | **Get** /{gcp_mount_path}/key/{roleset} | +[**GoogleCloudGenerateImpersonatedAccountAccessToken**](SecretsApi.md#GoogleCloudGenerateImpersonatedAccountAccessToken) | **Get** /{gcp_mount_path}/impersonated-account/{name}/token | +[**GoogleCloudGenerateImpersonatedAccountAccessToken2**](SecretsApi.md#GoogleCloudGenerateImpersonatedAccountAccessToken2) | **Post** /{gcp_mount_path}/impersonated-account/{name}/token | +[**GoogleCloudGenerateRolesetAccessToken**](SecretsApi.md#GoogleCloudGenerateRolesetAccessToken) | **Get** /{gcp_mount_path}/roleset/{roleset}/token | +[**GoogleCloudGenerateRolesetAccessToken2**](SecretsApi.md#GoogleCloudGenerateRolesetAccessToken2) | **Get** /{gcp_mount_path}/token/{roleset} | +[**GoogleCloudGenerateRolesetAccessTokenWithParameters**](SecretsApi.md#GoogleCloudGenerateRolesetAccessTokenWithParameters) | **Post** /{gcp_mount_path}/roleset/{roleset}/token | +[**GoogleCloudGenerateRolesetAccessTokenWithParameters2**](SecretsApi.md#GoogleCloudGenerateRolesetAccessTokenWithParameters2) | **Post** /{gcp_mount_path}/token/{roleset} | +[**GoogleCloudGenerateRolesetKey**](SecretsApi.md#GoogleCloudGenerateRolesetKey) | **Get** /{gcp_mount_path}/roleset/{roleset}/key | +[**GoogleCloudGenerateRolesetKey2**](SecretsApi.md#GoogleCloudGenerateRolesetKey2) | **Get** /{gcp_mount_path}/key/{roleset} | +[**GoogleCloudGenerateRolesetKeyWithParameters**](SecretsApi.md#GoogleCloudGenerateRolesetKeyWithParameters) | **Post** /{gcp_mount_path}/roleset/{roleset}/key | +[**GoogleCloudGenerateRolesetKeyWithParameters2**](SecretsApi.md#GoogleCloudGenerateRolesetKeyWithParameters2) | **Post** /{gcp_mount_path}/key/{roleset} | +[**GoogleCloudGenerateStaticAccountAccessToken**](SecretsApi.md#GoogleCloudGenerateStaticAccountAccessToken) | **Get** /{gcp_mount_path}/static-account/{name}/token | +[**GoogleCloudGenerateStaticAccountAccessTokenWithParameters**](SecretsApi.md#GoogleCloudGenerateStaticAccountAccessTokenWithParameters) | **Post** /{gcp_mount_path}/static-account/{name}/token | +[**GoogleCloudGenerateStaticAccountKey**](SecretsApi.md#GoogleCloudGenerateStaticAccountKey) | **Get** /{gcp_mount_path}/static-account/{name}/key | +[**GoogleCloudGenerateStaticAccountKeyWithParameters**](SecretsApi.md#GoogleCloudGenerateStaticAccountKeyWithParameters) | **Post** /{gcp_mount_path}/static-account/{name}/key | +[**GoogleCloudKmsConfigure**](SecretsApi.md#GoogleCloudKmsConfigure) | **Post** /{gcpkms_mount_path}/config | +[**GoogleCloudKmsConfigureKey**](SecretsApi.md#GoogleCloudKmsConfigureKey) | **Post** /{gcpkms_mount_path}/keys/config/{key} | +[**GoogleCloudKmsDecrypt**](SecretsApi.md#GoogleCloudKmsDecrypt) | **Post** /{gcpkms_mount_path}/decrypt/{key} | Decrypt a ciphertext value using a named key +[**GoogleCloudKmsDeleteConfiguration**](SecretsApi.md#GoogleCloudKmsDeleteConfiguration) | **Delete** /{gcpkms_mount_path}/config | +[**GoogleCloudKmsDeleteKey**](SecretsApi.md#GoogleCloudKmsDeleteKey) | **Delete** /{gcpkms_mount_path}/keys/{key} | Interact with crypto keys in Vault and Google Cloud KMS +[**GoogleCloudKmsDeregisterKey**](SecretsApi.md#GoogleCloudKmsDeregisterKey) | **Post** /{gcpkms_mount_path}/keys/deregister/{key} | +[**GoogleCloudKmsDeregisterKey2**](SecretsApi.md#GoogleCloudKmsDeregisterKey2) | **Delete** /{gcpkms_mount_path}/keys/deregister/{key} | +[**GoogleCloudKmsEncrypt**](SecretsApi.md#GoogleCloudKmsEncrypt) | **Post** /{gcpkms_mount_path}/encrypt/{key} | Encrypt a plaintext value using a named key +[**GoogleCloudKmsListKeys**](SecretsApi.md#GoogleCloudKmsListKeys) | **Get** /{gcpkms_mount_path}/keys | List named keys +[**GoogleCloudKmsReadConfiguration**](SecretsApi.md#GoogleCloudKmsReadConfiguration) | **Get** /{gcpkms_mount_path}/config | +[**GoogleCloudKmsReadKey**](SecretsApi.md#GoogleCloudKmsReadKey) | **Get** /{gcpkms_mount_path}/keys/{key} | Interact with crypto keys in Vault and Google Cloud KMS +[**GoogleCloudKmsReadKeyConfiguration**](SecretsApi.md#GoogleCloudKmsReadKeyConfiguration) | **Get** /{gcpkms_mount_path}/keys/config/{key} | +[**GoogleCloudKmsReencrypt**](SecretsApi.md#GoogleCloudKmsReencrypt) | **Post** /{gcpkms_mount_path}/reencrypt/{key} | Re-encrypt existing ciphertext data to a new version +[**GoogleCloudKmsRegisterKey**](SecretsApi.md#GoogleCloudKmsRegisterKey) | **Post** /{gcpkms_mount_path}/keys/register/{key} | Register an existing crypto key in Google Cloud KMS +[**GoogleCloudKmsRetrievePublicKey**](SecretsApi.md#GoogleCloudKmsRetrievePublicKey) | **Get** /{gcpkms_mount_path}/pubkey/{key} | Retrieve the public key associated with the named key +[**GoogleCloudKmsRotateKey**](SecretsApi.md#GoogleCloudKmsRotateKey) | **Post** /{gcpkms_mount_path}/keys/rotate/{key} | Rotate a crypto key to a new primary version +[**GoogleCloudKmsSign**](SecretsApi.md#GoogleCloudKmsSign) | **Post** /{gcpkms_mount_path}/sign/{key} | Signs a message or digest using a named key +[**GoogleCloudKmsTrimKeyVersions**](SecretsApi.md#GoogleCloudKmsTrimKeyVersions) | **Post** /{gcpkms_mount_path}/keys/trim/{key} | +[**GoogleCloudKmsTrimKeyVersions2**](SecretsApi.md#GoogleCloudKmsTrimKeyVersions2) | **Delete** /{gcpkms_mount_path}/keys/trim/{key} | +[**GoogleCloudKmsVerify**](SecretsApi.md#GoogleCloudKmsVerify) | **Post** /{gcpkms_mount_path}/verify/{key} | Verify a signature using a named key +[**GoogleCloudKmsWriteKey**](SecretsApi.md#GoogleCloudKmsWriteKey) | **Post** /{gcpkms_mount_path}/keys/{key} | Interact with crypto keys in Vault and Google Cloud KMS +[**GoogleCloudListImpersonatedAccounts**](SecretsApi.md#GoogleCloudListImpersonatedAccounts) | **Get** /{gcp_mount_path}/impersonated-account | +[**GoogleCloudListImpersonatedAccounts2**](SecretsApi.md#GoogleCloudListImpersonatedAccounts2) | **Get** /{gcp_mount_path}/impersonated-accounts | +[**GoogleCloudListRolesets**](SecretsApi.md#GoogleCloudListRolesets) | **Get** /{gcp_mount_path}/roleset | +[**GoogleCloudListRolesets2**](SecretsApi.md#GoogleCloudListRolesets2) | **Get** /{gcp_mount_path}/rolesets | +[**GoogleCloudListStaticAccounts**](SecretsApi.md#GoogleCloudListStaticAccounts) | **Get** /{gcp_mount_path}/static-account | +[**GoogleCloudListStaticAccounts2**](SecretsApi.md#GoogleCloudListStaticAccounts2) | **Get** /{gcp_mount_path}/static-accounts | +[**GoogleCloudReadConfiguration**](SecretsApi.md#GoogleCloudReadConfiguration) | **Get** /{gcp_mount_path}/config | +[**GoogleCloudReadImpersonatedAccount**](SecretsApi.md#GoogleCloudReadImpersonatedAccount) | **Get** /{gcp_mount_path}/impersonated-account/{name} | [**GoogleCloudReadRoleset**](SecretsApi.md#GoogleCloudReadRoleset) | **Get** /{gcp_mount_path}/roleset/{name} | -[**GoogleCloudReadRolesetKey**](SecretsApi.md#GoogleCloudReadRolesetKey) | **Get** /{gcp_mount_path}/roleset/{roleset}/key | -[**GoogleCloudReadRolesetToken**](SecretsApi.md#GoogleCloudReadRolesetToken) | **Get** /{gcp_mount_path}/roleset/{roleset}/token | [**GoogleCloudReadStaticAccount**](SecretsApi.md#GoogleCloudReadStaticAccount) | **Get** /{gcp_mount_path}/static-account/{name} | -[**GoogleCloudReadStaticAccountKey**](SecretsApi.md#GoogleCloudReadStaticAccountKey) | **Get** /{gcp_mount_path}/static-account/{name}/key | -[**GoogleCloudReadStaticAccountToken**](SecretsApi.md#GoogleCloudReadStaticAccountToken) | **Get** /{gcp_mount_path}/static-account/{name}/token | -[**GoogleCloudReadToken**](SecretsApi.md#GoogleCloudReadToken) | **Get** /{gcp_mount_path}/token/{roleset} | [**GoogleCloudRotateRoleset**](SecretsApi.md#GoogleCloudRotateRoleset) | **Post** /{gcp_mount_path}/roleset/{name}/rotate | [**GoogleCloudRotateRolesetKey**](SecretsApi.md#GoogleCloudRotateRolesetKey) | **Post** /{gcp_mount_path}/roleset/{name}/rotate-key | -[**GoogleCloudRotateRoot**](SecretsApi.md#GoogleCloudRotateRoot) | **Post** /{gcp_mount_path}/config/rotate-root | +[**GoogleCloudRotateRootCredentials**](SecretsApi.md#GoogleCloudRotateRootCredentials) | **Post** /{gcp_mount_path}/config/rotate-root | [**GoogleCloudRotateStaticAccountKey**](SecretsApi.md#GoogleCloudRotateStaticAccountKey) | **Post** /{gcp_mount_path}/static-account/{name}/rotate-key | -[**GoogleCloudWriteConfig**](SecretsApi.md#GoogleCloudWriteConfig) | **Post** /{gcp_mount_path}/config | -[**GoogleCloudWriteKey**](SecretsApi.md#GoogleCloudWriteKey) | **Post** /{gcp_mount_path}/key/{roleset} | +[**GoogleCloudWriteImpersonatedAccount**](SecretsApi.md#GoogleCloudWriteImpersonatedAccount) | **Post** /{gcp_mount_path}/impersonated-account/{name} | [**GoogleCloudWriteRoleset**](SecretsApi.md#GoogleCloudWriteRoleset) | **Post** /{gcp_mount_path}/roleset/{name} | -[**GoogleCloudWriteRolesetKey**](SecretsApi.md#GoogleCloudWriteRolesetKey) | **Post** /{gcp_mount_path}/roleset/{roleset}/key | -[**GoogleCloudWriteRolesetToken**](SecretsApi.md#GoogleCloudWriteRolesetToken) | **Post** /{gcp_mount_path}/roleset/{roleset}/token | [**GoogleCloudWriteStaticAccount**](SecretsApi.md#GoogleCloudWriteStaticAccount) | **Post** /{gcp_mount_path}/static-account/{name} | -[**GoogleCloudWriteStaticAccountKey**](SecretsApi.md#GoogleCloudWriteStaticAccountKey) | **Post** /{gcp_mount_path}/static-account/{name}/key | -[**GoogleCloudWriteStaticAccountToken**](SecretsApi.md#GoogleCloudWriteStaticAccountToken) | **Post** /{gcp_mount_path}/static-account/{name}/token | -[**GoogleCloudWriteToken**](SecretsApi.md#GoogleCloudWriteToken) | **Post** /{gcp_mount_path}/token/{roleset} | -[**KVv1Delete**](SecretsApi.md#KVv1Delete) | **Delete** /{kv_mount_path}/{path} | Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. -[**KVv1Read**](SecretsApi.md#KVv1Read) | **Get** /{kv_mount_path}/{path} | Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. -[**KVv1Write**](SecretsApi.md#KVv1Write) | **Post** /{kv_mount_path}/{path} | Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. -[**KVv2Delete**](SecretsApi.md#KVv2Delete) | **Delete** /{secret_mount_path}/data/{path} | Write, Patch, Read, and Delete data in the Key-Value Store. -[**KVv2DeleteMetadata**](SecretsApi.md#KVv2DeleteMetadata) | **Delete** /{secret_mount_path}/metadata/{path} | Configures settings for the KV store -[**KVv2DeleteVersions**](SecretsApi.md#KVv2DeleteVersions) | **Post** /{secret_mount_path}/delete/{path} | Marks one or more versions as deleted in the KV store. -[**KVv2DestroyVersions**](SecretsApi.md#KVv2DestroyVersions) | **Post** /{secret_mount_path}/destroy/{path} | Permanently removes one or more versions in the KV store -[**KVv2Read**](SecretsApi.md#KVv2Read) | **Get** /{secret_mount_path}/data/{path} | Write, Patch, Read, and Delete data in the Key-Value Store. -[**KVv2ReadConfig**](SecretsApi.md#KVv2ReadConfig) | **Get** /{secret_mount_path}/config | Read the backend level settings. -[**KVv2ReadMetadata**](SecretsApi.md#KVv2ReadMetadata) | **Get** /{secret_mount_path}/metadata/{path} | Configures settings for the KV store -[**KVv2ReadSubkeys**](SecretsApi.md#KVv2ReadSubkeys) | **Get** /{secret_mount_path}/subkeys/{path} | Read the structure of a secret entry from the Key-Value store with the values removed. -[**KVv2UndeleteVersions**](SecretsApi.md#KVv2UndeleteVersions) | **Post** /{secret_mount_path}/undelete/{path} | Undeletes one or more versions from the KV store. -[**KVv2Write**](SecretsApi.md#KVv2Write) | **Post** /{secret_mount_path}/data/{path} | Write, Patch, Read, and Delete data in the Key-Value Store. -[**KVv2WriteConfig**](SecretsApi.md#KVv2WriteConfig) | **Post** /{secret_mount_path}/config | Configure backend level settings that are applied to every key in the key-value store. -[**KVv2WriteMetadata**](SecretsApi.md#KVv2WriteMetadata) | **Post** /{secret_mount_path}/metadata/{path} | Configures settings for the KV store -[**KubernetesDeleteConfig**](SecretsApi.md#KubernetesDeleteConfig) | **Delete** /{kubernetes_mount_path}/config | +[**KubernetesCheckConfiguration**](SecretsApi.md#KubernetesCheckConfiguration) | **Get** /{kubernetes_mount_path}/check | +[**KubernetesConfigure**](SecretsApi.md#KubernetesConfigure) | **Post** /{kubernetes_mount_path}/config | +[**KubernetesDeleteConfiguration**](SecretsApi.md#KubernetesDeleteConfiguration) | **Delete** /{kubernetes_mount_path}/config | [**KubernetesDeleteRole**](SecretsApi.md#KubernetesDeleteRole) | **Delete** /{kubernetes_mount_path}/roles/{name} | +[**KubernetesGenerateCredentials**](SecretsApi.md#KubernetesGenerateCredentials) | **Post** /{kubernetes_mount_path}/creds/{name} | [**KubernetesListRoles**](SecretsApi.md#KubernetesListRoles) | **Get** /{kubernetes_mount_path}/roles | -[**KubernetesReadConfig**](SecretsApi.md#KubernetesReadConfig) | **Get** /{kubernetes_mount_path}/config | +[**KubernetesReadConfiguration**](SecretsApi.md#KubernetesReadConfiguration) | **Get** /{kubernetes_mount_path}/config | [**KubernetesReadRole**](SecretsApi.md#KubernetesReadRole) | **Get** /{kubernetes_mount_path}/roles/{name} | -[**KubernetesWriteConfig**](SecretsApi.md#KubernetesWriteConfig) | **Post** /{kubernetes_mount_path}/config | -[**KubernetesWriteCredentials**](SecretsApi.md#KubernetesWriteCredentials) | **Post** /{kubernetes_mount_path}/creds/{name} | [**KubernetesWriteRole**](SecretsApi.md#KubernetesWriteRole) | **Post** /{kubernetes_mount_path}/roles/{name} | -[**LDAPCheckInLibrary**](SecretsApi.md#LDAPCheckInLibrary) | **Post** /{ldap_mount_path}/library/{name}/check-in | Check service accounts in to the library. -[**LDAPCheckInManageLibrary**](SecretsApi.md#LDAPCheckInManageLibrary) | **Post** /{ldap_mount_path}/library/manage/{name}/check-in | Check service accounts in to the library. -[**LDAPCheckOutLibrary**](SecretsApi.md#LDAPCheckOutLibrary) | **Post** /{ldap_mount_path}/library/{name}/check-out | Check a service account out from the library. -[**LDAPDeleteConfig**](SecretsApi.md#LDAPDeleteConfig) | **Delete** /{ldap_mount_path}/config | -[**LDAPDeleteLibrary**](SecretsApi.md#LDAPDeleteLibrary) | **Delete** /{ldap_mount_path}/library/{name} | Delete a library set. -[**LDAPDeleteRole**](SecretsApi.md#LDAPDeleteRole) | **Delete** /{ldap_mount_path}/role/{name} | -[**LDAPDeleteStaticRole**](SecretsApi.md#LDAPDeleteStaticRole) | **Delete** /{ldap_mount_path}/static-role/{name} | -[**LDAPListLibraries**](SecretsApi.md#LDAPListLibraries) | **Get** /{ldap_mount_path}/library | -[**LDAPListRoles**](SecretsApi.md#LDAPListRoles) | **Get** /{ldap_mount_path}/role | -[**LDAPListStaticRoles**](SecretsApi.md#LDAPListStaticRoles) | **Get** /{ldap_mount_path}/static-role | -[**LDAPReadConfig**](SecretsApi.md#LDAPReadConfig) | **Get** /{ldap_mount_path}/config | -[**LDAPReadCredentials**](SecretsApi.md#LDAPReadCredentials) | **Get** /{ldap_mount_path}/creds/{name} | -[**LDAPReadLibrary**](SecretsApi.md#LDAPReadLibrary) | **Get** /{ldap_mount_path}/library/{name} | Read a library set. -[**LDAPReadLibraryStatus**](SecretsApi.md#LDAPReadLibraryStatus) | **Get** /{ldap_mount_path}/library/{name}/status | Check the status of the service accounts in a library set. -[**LDAPReadRole**](SecretsApi.md#LDAPReadRole) | **Get** /{ldap_mount_path}/role/{name} | -[**LDAPReadStaticCredentials**](SecretsApi.md#LDAPReadStaticCredentials) | **Get** /{ldap_mount_path}/static-cred/{name} | -[**LDAPReadStaticRole**](SecretsApi.md#LDAPReadStaticRole) | **Get** /{ldap_mount_path}/static-role/{name} | -[**LDAPRotateRole**](SecretsApi.md#LDAPRotateRole) | **Post** /{ldap_mount_path}/rotate-role/{name} | -[**LDAPRotateRoot**](SecretsApi.md#LDAPRotateRoot) | **Post** /{ldap_mount_path}/rotate-root | -[**LDAPWriteConfig**](SecretsApi.md#LDAPWriteConfig) | **Post** /{ldap_mount_path}/config | -[**LDAPWriteLibrary**](SecretsApi.md#LDAPWriteLibrary) | **Post** /{ldap_mount_path}/library/{name} | Update a library set. -[**LDAPWriteRole**](SecretsApi.md#LDAPWriteRole) | **Post** /{ldap_mount_path}/role/{name} | -[**LDAPWriteStaticRole**](SecretsApi.md#LDAPWriteStaticRole) | **Post** /{ldap_mount_path}/static-role/{name} | -[**MongoDBAtlasDeleteRole**](SecretsApi.md#MongoDBAtlasDeleteRole) | **Delete** /{mongodbatlas_mount_path}/roles/{name} | Manage the roles used to generate MongoDB Atlas Programmatic API Keys. -[**MongoDBAtlasListRoles**](SecretsApi.md#MongoDBAtlasListRoles) | **Get** /{mongodbatlas_mount_path}/roles | List the existing roles in this backend -[**MongoDBAtlasReadConfig**](SecretsApi.md#MongoDBAtlasReadConfig) | **Get** /{mongodbatlas_mount_path}/config | Configure the credentials that are used to manage Database Users. -[**MongoDBAtlasReadCredentials**](SecretsApi.md#MongoDBAtlasReadCredentials) | **Get** /{mongodbatlas_mount_path}/creds/{name} | Generate MongoDB Atlas Programmatic API from a specific Vault role. -[**MongoDBAtlasReadRole**](SecretsApi.md#MongoDBAtlasReadRole) | **Get** /{mongodbatlas_mount_path}/roles/{name} | Manage the roles used to generate MongoDB Atlas Programmatic API Keys. -[**MongoDBAtlasWriteConfig**](SecretsApi.md#MongoDBAtlasWriteConfig) | **Post** /{mongodbatlas_mount_path}/config | Configure the credentials that are used to manage Database Users. -[**MongoDBAtlasWriteCredentials**](SecretsApi.md#MongoDBAtlasWriteCredentials) | **Post** /{mongodbatlas_mount_path}/creds/{name} | Generate MongoDB Atlas Programmatic API from a specific Vault role. -[**MongoDBAtlasWriteRole**](SecretsApi.md#MongoDBAtlasWriteRole) | **Post** /{mongodbatlas_mount_path}/roles/{name} | Manage the roles used to generate MongoDB Atlas Programmatic API Keys. -[**NomadDeleteAccessConfig**](SecretsApi.md#NomadDeleteAccessConfig) | **Delete** /{nomad_mount_path}/config/access | -[**NomadDeleteLeaseConfig**](SecretsApi.md#NomadDeleteLeaseConfig) | **Delete** /{nomad_mount_path}/config/lease | Configure the lease parameters for generated tokens +[**KvV1Delete**](SecretsApi.md#KvV1Delete) | **Delete** /{kv-v1_mount_path}/{path} | +[**KvV1Read**](SecretsApi.md#KvV1Read) | **Get** /{kv-v1_mount_path}/{path} | +[**KvV1Write**](SecretsApi.md#KvV1Write) | **Post** /{kv-v1_mount_path}/{path} | +[**KvV2Configure**](SecretsApi.md#KvV2Configure) | **Post** /{kv-v2_mount_path}/config | Configure backend level settings that are applied to every key in the key-value store. +[**KvV2Delete**](SecretsApi.md#KvV2Delete) | **Delete** /{kv-v2_mount_path}/data/{path} | +[**KvV2DeleteMetadata**](SecretsApi.md#KvV2DeleteMetadata) | **Delete** /{kv-v2_mount_path}/metadata/{path} | +[**KvV2DeleteVersions**](SecretsApi.md#KvV2DeleteVersions) | **Post** /{kv-v2_mount_path}/delete/{path} | +[**KvV2DestroyVersions**](SecretsApi.md#KvV2DestroyVersions) | **Post** /{kv-v2_mount_path}/destroy/{path} | +[**KvV2Read**](SecretsApi.md#KvV2Read) | **Get** /{kv-v2_mount_path}/data/{path} | +[**KvV2ReadConfiguration**](SecretsApi.md#KvV2ReadConfiguration) | **Get** /{kv-v2_mount_path}/config | Read the backend level settings. +[**KvV2ReadMetadata**](SecretsApi.md#KvV2ReadMetadata) | **Get** /{kv-v2_mount_path}/metadata/{path} | +[**KvV2ReadSubkeys**](SecretsApi.md#KvV2ReadSubkeys) | **Get** /{kv-v2_mount_path}/subkeys/{path} | +[**KvV2UndeleteVersions**](SecretsApi.md#KvV2UndeleteVersions) | **Post** /{kv-v2_mount_path}/undelete/{path} | +[**KvV2Write**](SecretsApi.md#KvV2Write) | **Post** /{kv-v2_mount_path}/data/{path} | +[**KvV2WriteMetadata**](SecretsApi.md#KvV2WriteMetadata) | **Post** /{kv-v2_mount_path}/metadata/{path} | +[**LdapConfigure**](SecretsApi.md#LdapConfigure) | **Post** /{ldap_mount_path}/config | +[**LdapDeleteConfiguration**](SecretsApi.md#LdapDeleteConfiguration) | **Delete** /{ldap_mount_path}/config | +[**LdapDeleteDynamicRole**](SecretsApi.md#LdapDeleteDynamicRole) | **Delete** /{ldap_mount_path}/role/{name} | +[**LdapDeleteStaticRole**](SecretsApi.md#LdapDeleteStaticRole) | **Delete** /{ldap_mount_path}/static-role/{name} | +[**LdapLibraryCheckIn**](SecretsApi.md#LdapLibraryCheckIn) | **Post** /{ldap_mount_path}/library/{name}/check-in | Check service accounts in to the library. +[**LdapLibraryCheckOut**](SecretsApi.md#LdapLibraryCheckOut) | **Post** /{ldap_mount_path}/library/{name}/check-out | Check a service account out from the library. +[**LdapLibraryCheckStatus**](SecretsApi.md#LdapLibraryCheckStatus) | **Get** /{ldap_mount_path}/library/{name}/status | Check the status of the service accounts in a library set. +[**LdapLibraryConfigure**](SecretsApi.md#LdapLibraryConfigure) | **Post** /{ldap_mount_path}/library/{name} | Update a library set. +[**LdapLibraryDelete**](SecretsApi.md#LdapLibraryDelete) | **Delete** /{ldap_mount_path}/library/{name} | Delete a library set. +[**LdapLibraryForceCheckIn**](SecretsApi.md#LdapLibraryForceCheckIn) | **Post** /{ldap_mount_path}/library/manage/{name}/check-in | Check service accounts in to the library. +[**LdapLibraryList**](SecretsApi.md#LdapLibraryList) | **Get** /{ldap_mount_path}/library | +[**LdapLibraryRead**](SecretsApi.md#LdapLibraryRead) | **Get** /{ldap_mount_path}/library/{name} | Read a library set. +[**LdapListDynamicRoles**](SecretsApi.md#LdapListDynamicRoles) | **Get** /{ldap_mount_path}/role | +[**LdapListStaticRoles**](SecretsApi.md#LdapListStaticRoles) | **Get** /{ldap_mount_path}/static-role | +[**LdapReadConfiguration**](SecretsApi.md#LdapReadConfiguration) | **Get** /{ldap_mount_path}/config | +[**LdapReadDynamicRole**](SecretsApi.md#LdapReadDynamicRole) | **Get** /{ldap_mount_path}/role/{name} | +[**LdapReadStaticRole**](SecretsApi.md#LdapReadStaticRole) | **Get** /{ldap_mount_path}/static-role/{name} | +[**LdapRequestDynamicRoleCredentials**](SecretsApi.md#LdapRequestDynamicRoleCredentials) | **Get** /{ldap_mount_path}/creds/{name} | +[**LdapRequestStaticRoleCredentials**](SecretsApi.md#LdapRequestStaticRoleCredentials) | **Get** /{ldap_mount_path}/static-cred/{name} | +[**LdapRotateRootCredentials**](SecretsApi.md#LdapRotateRootCredentials) | **Post** /{ldap_mount_path}/rotate-root | +[**LdapRotateStaticRole**](SecretsApi.md#LdapRotateStaticRole) | **Post** /{ldap_mount_path}/rotate-role/{name} | +[**LdapWriteDynamicRole**](SecretsApi.md#LdapWriteDynamicRole) | **Post** /{ldap_mount_path}/role/{name} | +[**LdapWriteStaticRole**](SecretsApi.md#LdapWriteStaticRole) | **Post** /{ldap_mount_path}/static-role/{name} | +[**MongoDbAtlasConfigure**](SecretsApi.md#MongoDbAtlasConfigure) | **Post** /{mongodbatlas_mount_path}/config | +[**MongoDbAtlasDeleteRole**](SecretsApi.md#MongoDbAtlasDeleteRole) | **Delete** /{mongodbatlas_mount_path}/roles/{name} | Manage the roles used to generate MongoDB Atlas Programmatic API Keys. +[**MongoDbAtlasGenerateCredentials**](SecretsApi.md#MongoDbAtlasGenerateCredentials) | **Get** /{mongodbatlas_mount_path}/creds/{name} | +[**MongoDbAtlasGenerateCredentials2**](SecretsApi.md#MongoDbAtlasGenerateCredentials2) | **Post** /{mongodbatlas_mount_path}/creds/{name} | +[**MongoDbAtlasListRoles**](SecretsApi.md#MongoDbAtlasListRoles) | **Get** /{mongodbatlas_mount_path}/roles | List the existing roles in this backend +[**MongoDbAtlasReadConfiguration**](SecretsApi.md#MongoDbAtlasReadConfiguration) | **Get** /{mongodbatlas_mount_path}/config | +[**MongoDbAtlasReadRole**](SecretsApi.md#MongoDbAtlasReadRole) | **Get** /{mongodbatlas_mount_path}/roles/{name} | Manage the roles used to generate MongoDB Atlas Programmatic API Keys. +[**MongoDbAtlasWriteRole**](SecretsApi.md#MongoDbAtlasWriteRole) | **Post** /{mongodbatlas_mount_path}/roles/{name} | Manage the roles used to generate MongoDB Atlas Programmatic API Keys. +[**NomadConfigureAccess**](SecretsApi.md#NomadConfigureAccess) | **Post** /{nomad_mount_path}/config/access | +[**NomadConfigureLease**](SecretsApi.md#NomadConfigureLease) | **Post** /{nomad_mount_path}/config/lease | +[**NomadDeleteAccessConfiguration**](SecretsApi.md#NomadDeleteAccessConfiguration) | **Delete** /{nomad_mount_path}/config/access | +[**NomadDeleteLeaseConfiguration**](SecretsApi.md#NomadDeleteLeaseConfiguration) | **Delete** /{nomad_mount_path}/config/lease | [**NomadDeleteRole**](SecretsApi.md#NomadDeleteRole) | **Delete** /{nomad_mount_path}/role/{name} | +[**NomadGenerateCredentials**](SecretsApi.md#NomadGenerateCredentials) | **Get** /{nomad_mount_path}/creds/{name} | [**NomadListRoles**](SecretsApi.md#NomadListRoles) | **Get** /{nomad_mount_path}/role | -[**NomadReadAccessConfig**](SecretsApi.md#NomadReadAccessConfig) | **Get** /{nomad_mount_path}/config/access | -[**NomadReadCredentials**](SecretsApi.md#NomadReadCredentials) | **Get** /{nomad_mount_path}/creds/{name} | -[**NomadReadLeaseConfig**](SecretsApi.md#NomadReadLeaseConfig) | **Get** /{nomad_mount_path}/config/lease | Configure the lease parameters for generated tokens +[**NomadReadAccessConfiguration**](SecretsApi.md#NomadReadAccessConfiguration) | **Get** /{nomad_mount_path}/config/access | +[**NomadReadLeaseConfiguration**](SecretsApi.md#NomadReadLeaseConfiguration) | **Get** /{nomad_mount_path}/config/lease | [**NomadReadRole**](SecretsApi.md#NomadReadRole) | **Get** /{nomad_mount_path}/role/{name} | -[**NomadWriteAccessConfig**](SecretsApi.md#NomadWriteAccessConfig) | **Post** /{nomad_mount_path}/config/access | -[**NomadWriteLeaseConfig**](SecretsApi.md#NomadWriteLeaseConfig) | **Post** /{nomad_mount_path}/config/lease | Configure the lease parameters for generated tokens [**NomadWriteRole**](SecretsApi.md#NomadWriteRole) | **Post** /{nomad_mount_path}/role/{name} | -[**OpenLDAPCheckInLibrary**](SecretsApi.md#OpenLDAPCheckInLibrary) | **Post** /{openldap_mount_path}/library/{name}/check-in | Check service accounts in to the library. -[**OpenLDAPCheckInManageLibrary**](SecretsApi.md#OpenLDAPCheckInManageLibrary) | **Post** /{openldap_mount_path}/library/manage/{name}/check-in | Check service accounts in to the library. -[**OpenLDAPCheckOutLibrary**](SecretsApi.md#OpenLDAPCheckOutLibrary) | **Post** /{openldap_mount_path}/library/{name}/check-out | Check a service account out from the library. -[**OpenLDAPDeleteConfig**](SecretsApi.md#OpenLDAPDeleteConfig) | **Delete** /{openldap_mount_path}/config | -[**OpenLDAPDeleteLibrary**](SecretsApi.md#OpenLDAPDeleteLibrary) | **Delete** /{openldap_mount_path}/library/{name} | Delete a library set. -[**OpenLDAPDeleteRole**](SecretsApi.md#OpenLDAPDeleteRole) | **Delete** /{openldap_mount_path}/role/{name} | -[**OpenLDAPDeleteStaticRole**](SecretsApi.md#OpenLDAPDeleteStaticRole) | **Delete** /{openldap_mount_path}/static-role/{name} | -[**OpenLDAPListLibraries**](SecretsApi.md#OpenLDAPListLibraries) | **Get** /{openldap_mount_path}/library | -[**OpenLDAPListRoles**](SecretsApi.md#OpenLDAPListRoles) | **Get** /{openldap_mount_path}/role | -[**OpenLDAPListStaticRoles**](SecretsApi.md#OpenLDAPListStaticRoles) | **Get** /{openldap_mount_path}/static-role | -[**OpenLDAPReadConfig**](SecretsApi.md#OpenLDAPReadConfig) | **Get** /{openldap_mount_path}/config | -[**OpenLDAPReadCredentials**](SecretsApi.md#OpenLDAPReadCredentials) | **Get** /{openldap_mount_path}/creds/{name} | -[**OpenLDAPReadLibrary**](SecretsApi.md#OpenLDAPReadLibrary) | **Get** /{openldap_mount_path}/library/{name} | Read a library set. -[**OpenLDAPReadLibraryStatus**](SecretsApi.md#OpenLDAPReadLibraryStatus) | **Get** /{openldap_mount_path}/library/{name}/status | Check the status of the service accounts in a library set. -[**OpenLDAPReadRole**](SecretsApi.md#OpenLDAPReadRole) | **Get** /{openldap_mount_path}/role/{name} | -[**OpenLDAPReadStaticCredentials**](SecretsApi.md#OpenLDAPReadStaticCredentials) | **Get** /{openldap_mount_path}/static-cred/{name} | -[**OpenLDAPReadStaticRole**](SecretsApi.md#OpenLDAPReadStaticRole) | **Get** /{openldap_mount_path}/static-role/{name} | -[**OpenLDAPRotateRole**](SecretsApi.md#OpenLDAPRotateRole) | **Post** /{openldap_mount_path}/rotate-role/{name} | -[**OpenLDAPRotateRoot**](SecretsApi.md#OpenLDAPRotateRoot) | **Post** /{openldap_mount_path}/rotate-root | -[**OpenLDAPWriteConfig**](SecretsApi.md#OpenLDAPWriteConfig) | **Post** /{openldap_mount_path}/config | -[**OpenLDAPWriteLibrary**](SecretsApi.md#OpenLDAPWriteLibrary) | **Post** /{openldap_mount_path}/library/{name} | Update a library set. -[**OpenLDAPWriteRole**](SecretsApi.md#OpenLDAPWriteRole) | **Post** /{openldap_mount_path}/role/{name} | -[**OpenLDAPWriteStaticRole**](SecretsApi.md#OpenLDAPWriteStaticRole) | **Post** /{openldap_mount_path}/static-role/{name} | -[**PKIBundleWrite**](SecretsApi.md#PKIBundleWrite) | **Post** /{pki_mount_path}/bundle | -[**PKIDeleteKey**](SecretsApi.md#PKIDeleteKey) | **Delete** /{pki_mount_path}/key/{key_ref} | -[**PKIDeleteRole**](SecretsApi.md#PKIDeleteRole) | **Delete** /{pki_mount_path}/roles/{name} | -[**PKIDeleteRoot**](SecretsApi.md#PKIDeleteRoot) | **Delete** /{pki_mount_path}/root | -[**PKIGenerateRoot**](SecretsApi.md#PKIGenerateRoot) | **Post** /{pki_mount_path}/root/generate/{exported} | -[**PKIImportKeys**](SecretsApi.md#PKIImportKeys) | **Post** /{pki_mount_path}/keys/import | -[**PKIIssuerIssueRole**](SecretsApi.md#PKIIssuerIssueRole) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/issue/{role} | -[**PKIIssuerResignCRLs**](SecretsApi.md#PKIIssuerResignCRLs) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/resign-crls | -[**PKIIssuerRevoke**](SecretsApi.md#PKIIssuerRevoke) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/revoke | -[**PKIIssuerSignIntermediate**](SecretsApi.md#PKIIssuerSignIntermediate) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-intermediate | -[**PKIIssuerSignRevocationList**](SecretsApi.md#PKIIssuerSignRevocationList) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-revocation-list | -[**PKIIssuerSignRole**](SecretsApi.md#PKIIssuerSignRole) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign/{role} | -[**PKIIssuerSignSelfIssued**](SecretsApi.md#PKIIssuerSignSelfIssued) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-self-issued | -[**PKIIssuerSignVerbatim**](SecretsApi.md#PKIIssuerSignVerbatim) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim | -[**PKIIssuerSignVerbatimRole**](SecretsApi.md#PKIIssuerSignVerbatimRole) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim/{role} | -[**PKIIssuersGenerateIntermediate**](SecretsApi.md#PKIIssuersGenerateIntermediate) | **Post** /{pki_mount_path}/issuers/generate/intermediate/{exported} | -[**PKIIssuersGenerateRoot**](SecretsApi.md#PKIIssuersGenerateRoot) | **Post** /{pki_mount_path}/issuers/generate/root/{exported} | -[**PKIIssuersList**](SecretsApi.md#PKIIssuersList) | **Get** /{pki_mount_path}/issuers | -[**PKIListCerts**](SecretsApi.md#PKIListCerts) | **Get** /{pki_mount_path}/certs | -[**PKIListCertsRevoked**](SecretsApi.md#PKIListCertsRevoked) | **Get** /{pki_mount_path}/certs/revoked | -[**PKIListKeys**](SecretsApi.md#PKIListKeys) | **Get** /{pki_mount_path}/keys | -[**PKIListRoles**](SecretsApi.md#PKIListRoles) | **Get** /{pki_mount_path}/roles | -[**PKIReadAutoTidyConfig**](SecretsApi.md#PKIReadAutoTidyConfig) | **Get** /{pki_mount_path}/config/auto-tidy | -[**PKIReadCA**](SecretsApi.md#PKIReadCA) | **Get** /{pki_mount_path}/ca | -[**PKIReadCAChain**](SecretsApi.md#PKIReadCAChain) | **Get** /{pki_mount_path}/ca_chain | -[**PKIReadCAPem**](SecretsApi.md#PKIReadCAPem) | **Get** /{pki_mount_path}/ca/pem | -[**PKIReadCRL**](SecretsApi.md#PKIReadCRL) | **Get** /{pki_mount_path}/crl | -[**PKIReadCRLConfig**](SecretsApi.md#PKIReadCRLConfig) | **Get** /{pki_mount_path}/config/crl | -[**PKIReadCRLRotate**](SecretsApi.md#PKIReadCRLRotate) | **Get** /{pki_mount_path}/crl/rotate | -[**PKIReadCRLRotateDelta**](SecretsApi.md#PKIReadCRLRotateDelta) | **Get** /{pki_mount_path}/crl/rotate-delta | -[**PKIReadCert**](SecretsApi.md#PKIReadCert) | **Get** /{pki_mount_path}/cert/{serial} | -[**PKIReadCertCAChain**](SecretsApi.md#PKIReadCertCAChain) | **Get** /{pki_mount_path}/cert/ca_chain | -[**PKIReadCertRaw**](SecretsApi.md#PKIReadCertRaw) | **Get** /{pki_mount_path}/cert/{serial}/raw | -[**PKIReadCertRawPem**](SecretsApi.md#PKIReadCertRawPem) | **Get** /{pki_mount_path}/cert/{serial}/raw/pem | -[**PKIReadClusterConfig**](SecretsApi.md#PKIReadClusterConfig) | **Get** /{pki_mount_path}/config/cluster | -[**PKIReadDeltaCRL**](SecretsApi.md#PKIReadDeltaCRL) | **Get** /{pki_mount_path}/delta-crl | -[**PKIReadIssuersConfig**](SecretsApi.md#PKIReadIssuersConfig) | **Get** /{pki_mount_path}/config/issuers | -[**PKIReadKey**](SecretsApi.md#PKIReadKey) | **Get** /{pki_mount_path}/key/{key_ref} | -[**PKIReadKeysConfig**](SecretsApi.md#PKIReadKeysConfig) | **Get** /{pki_mount_path}/config/keys | -[**PKIReadOCSPReq**](SecretsApi.md#PKIReadOCSPReq) | **Get** /{pki_mount_path}/ocsp/{req} | -[**PKIReadRole**](SecretsApi.md#PKIReadRole) | **Get** /{pki_mount_path}/roles/{name} | -[**PKIReadURLConfig**](SecretsApi.md#PKIReadURLConfig) | **Get** /{pki_mount_path}/config/urls | -[**PKIReplaceRoot**](SecretsApi.md#PKIReplaceRoot) | **Post** /{pki_mount_path}/root/replace | -[**PKIRevoke**](SecretsApi.md#PKIRevoke) | **Post** /{pki_mount_path}/revoke | -[**PKIRevokeWithKey**](SecretsApi.md#PKIRevokeWithKey) | **Post** /{pki_mount_path}/revoke-with-key | -[**PKIRootSignIntermediate**](SecretsApi.md#PKIRootSignIntermediate) | **Post** /{pki_mount_path}/root/sign-intermediate | -[**PKIRootSignSelfIssued**](SecretsApi.md#PKIRootSignSelfIssued) | **Post** /{pki_mount_path}/root/sign-self-issued | -[**PKIRotateRoot**](SecretsApi.md#PKIRotateRoot) | **Post** /{pki_mount_path}/root/rotate/{exported} | -[**PKISignRole**](SecretsApi.md#PKISignRole) | **Post** /{pki_mount_path}/sign/{role} | -[**PKISignVerbatim**](SecretsApi.md#PKISignVerbatim) | **Post** /{pki_mount_path}/sign-verbatim | -[**PKISignVerbatimRole**](SecretsApi.md#PKISignVerbatimRole) | **Post** /{pki_mount_path}/sign-verbatim/{role} | -[**PKITidy**](SecretsApi.md#PKITidy) | **Post** /{pki_mount_path}/tidy | -[**PKITidyCancel**](SecretsApi.md#PKITidyCancel) | **Post** /{pki_mount_path}/tidy-cancel | -[**PKITidyStatus**](SecretsApi.md#PKITidyStatus) | **Get** /{pki_mount_path}/tidy-status | -[**PKIWriteAutoTidyConfig**](SecretsApi.md#PKIWriteAutoTidyConfig) | **Post** /{pki_mount_path}/config/auto-tidy | -[**PKIWriteCAConfig**](SecretsApi.md#PKIWriteCAConfig) | **Post** /{pki_mount_path}/config/ca | -[**PKIWriteCRLConfig**](SecretsApi.md#PKIWriteCRLConfig) | **Post** /{pki_mount_path}/config/crl | -[**PKIWriteCerts**](SecretsApi.md#PKIWriteCerts) | **Post** /{pki_mount_path}/cert | -[**PKIWriteClusterConfig**](SecretsApi.md#PKIWriteClusterConfig) | **Post** /{pki_mount_path}/config/cluster | -[**PKIWriteIntermediateCrossSign**](SecretsApi.md#PKIWriteIntermediateCrossSign) | **Post** /{pki_mount_path}/intermediate/cross-sign | -[**PKIWriteIntermediateGenerate**](SecretsApi.md#PKIWriteIntermediateGenerate) | **Post** /{pki_mount_path}/intermediate/generate/{exported} | -[**PKIWriteIntermediateSetSigned**](SecretsApi.md#PKIWriteIntermediateSetSigned) | **Post** /{pki_mount_path}/intermediate/set-signed | -[**PKIWriteInternalExported**](SecretsApi.md#PKIWriteInternalExported) | **Post** /{pki_mount_path}/internal|exported | -[**PKIWriteIssueRole**](SecretsApi.md#PKIWriteIssueRole) | **Post** /{pki_mount_path}/issue/{role} | -[**PKIWriteIssuersConfig**](SecretsApi.md#PKIWriteIssuersConfig) | **Post** /{pki_mount_path}/config/issuers | -[**PKIWriteKMS**](SecretsApi.md#PKIWriteKMS) | **Post** /{pki_mount_path}/kms | -[**PKIWriteKey**](SecretsApi.md#PKIWriteKey) | **Post** /{pki_mount_path}/key/{key_ref} | -[**PKIWriteKeysConfig**](SecretsApi.md#PKIWriteKeysConfig) | **Post** /{pki_mount_path}/config/keys | -[**PKIWriteOCSP**](SecretsApi.md#PKIWriteOCSP) | **Post** /{pki_mount_path}/ocsp | -[**PKIWriteRole**](SecretsApi.md#PKIWriteRole) | **Post** /{pki_mount_path}/roles/{name} | -[**PKIWriteURLConfig**](SecretsApi.md#PKIWriteURLConfig) | **Post** /{pki_mount_path}/config/urls | -[**PkiDeleteIssuerRefDerPem**](SecretsApi.md#PkiDeleteIssuerRefDerPem) | **Delete** /{pki_mount_path}/{issuer_ref}/der|/pem | -[**PkiDeleteJson**](SecretsApi.md#PkiDeleteJson) | **Delete** /{pki_mount_path}//json | -[**PkiReadDelta**](SecretsApi.md#PkiReadDelta) | **Get** /{pki_mount_path}//delta | -[**PkiReadDeltaPem**](SecretsApi.md#PkiReadDeltaPem) | **Get** /{pki_mount_path}//delta/pem | -[**PkiReadDer**](SecretsApi.md#PkiReadDer) | **Get** /{pki_mount_path}//der | -[**PkiReadIssuerRefCrlPemDerDeltaPem**](SecretsApi.md#PkiReadIssuerRefCrlPemDerDeltaPem) | **Get** /{pki_mount_path}/{issuer_ref}/crl/pem|/der|/delta/pem | -[**PkiReadIssuerRefDerPem**](SecretsApi.md#PkiReadIssuerRefDerPem) | **Get** /{pki_mount_path}/{issuer_ref}/der|/pem | -[**PkiReadJson**](SecretsApi.md#PkiReadJson) | **Get** /{pki_mount_path}//json | -[**PkiReadPem**](SecretsApi.md#PkiReadPem) | **Get** /{pki_mount_path}//pem | -[**PkiWriteIssuerRefDerPem**](SecretsApi.md#PkiWriteIssuerRefDerPem) | **Post** /{pki_mount_path}/{issuer_ref}/der|/pem | -[**PkiWriteJson**](SecretsApi.md#PkiWriteJson) | **Post** /{pki_mount_path}//json | -[**RabbitMQDeleteRole**](SecretsApi.md#RabbitMQDeleteRole) | **Delete** /{rabbitmq_mount_path}/roles/{name} | Manage the roles that can be created with this backend. -[**RabbitMQListRoles**](SecretsApi.md#RabbitMQListRoles) | **Get** /{rabbitmq_mount_path}/roles | Manage the roles that can be created with this backend. -[**RabbitMQReadCredentials**](SecretsApi.md#RabbitMQReadCredentials) | **Get** /{rabbitmq_mount_path}/creds/{name} | Request RabbitMQ credentials for a certain role. -[**RabbitMQReadLeaseConfig**](SecretsApi.md#RabbitMQReadLeaseConfig) | **Get** /{rabbitmq_mount_path}/config/lease | Configure the lease parameters for generated credentials -[**RabbitMQReadRole**](SecretsApi.md#RabbitMQReadRole) | **Get** /{rabbitmq_mount_path}/roles/{name} | Manage the roles that can be created with this backend. -[**RabbitMQWriteConnectionConfig**](SecretsApi.md#RabbitMQWriteConnectionConfig) | **Post** /{rabbitmq_mount_path}/config/connection | Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API. -[**RabbitMQWriteLeaseConfig**](SecretsApi.md#RabbitMQWriteLeaseConfig) | **Post** /{rabbitmq_mount_path}/config/lease | Configure the lease parameters for generated credentials -[**RabbitMQWriteRole**](SecretsApi.md#RabbitMQWriteRole) | **Post** /{rabbitmq_mount_path}/roles/{name} | Manage the roles that can be created with this backend. -[**SSHDeleteCAConfig**](SecretsApi.md#SSHDeleteCAConfig) | **Delete** /{ssh_mount_path}/config/ca | Set the SSH private key used for signing certificates. -[**SSHDeleteKeys**](SecretsApi.md#SSHDeleteKeys) | **Delete** /{ssh_mount_path}/keys/{key_name} | Register a shared private key with Vault. -[**SSHDeleteRole**](SecretsApi.md#SSHDeleteRole) | **Delete** /{ssh_mount_path}/roles/{role} | Manage the 'roles' that can be created with this backend. -[**SSHDeleteZeroAddressConfig**](SecretsApi.md#SSHDeleteZeroAddressConfig) | **Delete** /{ssh_mount_path}/config/zeroaddress | Assign zero address as default CIDR block for select roles. -[**SSHListRoles**](SecretsApi.md#SSHListRoles) | **Get** /{ssh_mount_path}/roles | Manage the 'roles' that can be created with this backend. -[**SSHLookup**](SecretsApi.md#SSHLookup) | **Post** /{ssh_mount_path}/lookup | List all the roles associated with the given IP address. -[**SSHReadCAConfig**](SecretsApi.md#SSHReadCAConfig) | **Get** /{ssh_mount_path}/config/ca | Set the SSH private key used for signing certificates. -[**SSHReadPublicKey**](SecretsApi.md#SSHReadPublicKey) | **Get** /{ssh_mount_path}/public_key | Retrieve the public key. -[**SSHReadRole**](SecretsApi.md#SSHReadRole) | **Get** /{ssh_mount_path}/roles/{role} | Manage the 'roles' that can be created with this backend. -[**SSHReadZeroAddressConfig**](SecretsApi.md#SSHReadZeroAddressConfig) | **Get** /{ssh_mount_path}/config/zeroaddress | Assign zero address as default CIDR block for select roles. -[**SSHSign**](SecretsApi.md#SSHSign) | **Post** /{ssh_mount_path}/sign/{role} | Request signing an SSH key using a certain role with the provided details. -[**SSHVerify**](SecretsApi.md#SSHVerify) | **Post** /{ssh_mount_path}/verify | Validate the OTP provided by Vault SSH Agent. -[**SSHWriteCAConfig**](SecretsApi.md#SSHWriteCAConfig) | **Post** /{ssh_mount_path}/config/ca | Set the SSH private key used for signing certificates. -[**SSHWriteCredentials**](SecretsApi.md#SSHWriteCredentials) | **Post** /{ssh_mount_path}/creds/{role} | Creates a credential for establishing SSH connection with the remote host. -[**SSHWriteIssue**](SecretsApi.md#SSHWriteIssue) | **Post** /{ssh_mount_path}/issue/{role} | -[**SSHWriteKeys**](SecretsApi.md#SSHWriteKeys) | **Post** /{ssh_mount_path}/keys/{key_name} | Register a shared private key with Vault. -[**SSHWriteRole**](SecretsApi.md#SSHWriteRole) | **Post** /{ssh_mount_path}/roles/{role} | Manage the 'roles' that can be created with this backend. -[**SSHWriteZeroAddressConfig**](SecretsApi.md#SSHWriteZeroAddressConfig) | **Post** /{ssh_mount_path}/config/zeroaddress | Assign zero address as default CIDR block for select roles. -[**TOTPDeleteKey**](SecretsApi.md#TOTPDeleteKey) | **Delete** /{totp_mount_path}/keys/{name} | Manage the keys that can be created with this backend. -[**TOTPListKeys**](SecretsApi.md#TOTPListKeys) | **Get** /{totp_mount_path}/keys | Manage the keys that can be created with this backend. -[**TOTPReadCode**](SecretsApi.md#TOTPReadCode) | **Get** /{totp_mount_path}/code/{name} | Request time-based one-time use password or validate a password for a certain key . -[**TOTPReadKey**](SecretsApi.md#TOTPReadKey) | **Get** /{totp_mount_path}/keys/{name} | Manage the keys that can be created with this backend. -[**TOTPWriteCode**](SecretsApi.md#TOTPWriteCode) | **Post** /{totp_mount_path}/code/{name} | Request time-based one-time use password or validate a password for a certain key . -[**TOTPWriteKey**](SecretsApi.md#TOTPWriteKey) | **Post** /{totp_mount_path}/keys/{name} | Manage the keys that can be created with this backend. -[**TerraformDeleteConfig**](SecretsApi.md#TerraformDeleteConfig) | **Delete** /{terraform_mount_path}/config | -[**TerraformDeleteRole**](SecretsApi.md#TerraformDeleteRole) | **Delete** /{terraform_mount_path}/role/{name} | -[**TerraformListRoles**](SecretsApi.md#TerraformListRoles) | **Get** /{terraform_mount_path}/role | -[**TerraformReadConfig**](SecretsApi.md#TerraformReadConfig) | **Get** /{terraform_mount_path}/config | -[**TerraformReadCredentials**](SecretsApi.md#TerraformReadCredentials) | **Get** /{terraform_mount_path}/creds/{name} | Generate a Terraform Cloud or Enterprise API token from a specific Vault role. -[**TerraformReadRole**](SecretsApi.md#TerraformReadRole) | **Get** /{terraform_mount_path}/role/{name} | -[**TerraformRotateRole**](SecretsApi.md#TerraformRotateRole) | **Post** /{terraform_mount_path}/rotate-role/{name} | -[**TerraformWriteConfig**](SecretsApi.md#TerraformWriteConfig) | **Post** /{terraform_mount_path}/config | -[**TerraformWriteCredentials**](SecretsApi.md#TerraformWriteCredentials) | **Post** /{terraform_mount_path}/creds/{name} | Generate a Terraform Cloud or Enterprise API token from a specific Vault role. -[**TerraformWriteRole**](SecretsApi.md#TerraformWriteRole) | **Post** /{terraform_mount_path}/role/{name} | -[**TransitBackup**](SecretsApi.md#TransitBackup) | **Get** /{transit_mount_path}/backup/{name} | Backup the named key +[**PkiConfigureAutoTidy**](SecretsApi.md#PkiConfigureAutoTidy) | **Post** /{pki_mount_path}/config/auto-tidy | +[**PkiConfigureCa**](SecretsApi.md#PkiConfigureCa) | **Post** /{pki_mount_path}/config/ca | +[**PkiConfigureCluster**](SecretsApi.md#PkiConfigureCluster) | **Post** /{pki_mount_path}/config/cluster | +[**PkiConfigureCrl**](SecretsApi.md#PkiConfigureCrl) | **Post** /{pki_mount_path}/config/crl | +[**PkiConfigureIssuers**](SecretsApi.md#PkiConfigureIssuers) | **Post** /{pki_mount_path}/config/issuers | +[**PkiConfigureKeys**](SecretsApi.md#PkiConfigureKeys) | **Post** /{pki_mount_path}/config/keys | +[**PkiConfigureUrls**](SecretsApi.md#PkiConfigureUrls) | **Post** /{pki_mount_path}/config/urls | +[**PkiCrossSignIntermediate**](SecretsApi.md#PkiCrossSignIntermediate) | **Post** /{pki_mount_path}/intermediate/cross-sign | +[**PkiDeleteIssuer**](SecretsApi.md#PkiDeleteIssuer) | **Delete** /{pki_mount_path}/issuer/{issuer_ref} | +[**PkiDeleteKey**](SecretsApi.md#PkiDeleteKey) | **Delete** /{pki_mount_path}/key/{key_ref} | +[**PkiDeleteRole**](SecretsApi.md#PkiDeleteRole) | **Delete** /{pki_mount_path}/roles/{name} | +[**PkiDeleteRoot**](SecretsApi.md#PkiDeleteRoot) | **Delete** /{pki_mount_path}/root | +[**PkiGenerateExportedKey**](SecretsApi.md#PkiGenerateExportedKey) | **Post** /{pki_mount_path}/keys/generate/exported | +[**PkiGenerateIntermediate**](SecretsApi.md#PkiGenerateIntermediate) | **Post** /{pki_mount_path}/intermediate/generate/{exported} | +[**PkiGenerateInternalKey**](SecretsApi.md#PkiGenerateInternalKey) | **Post** /{pki_mount_path}/keys/generate/internal | +[**PkiGenerateKmsKey**](SecretsApi.md#PkiGenerateKmsKey) | **Post** /{pki_mount_path}/keys/generate/kms | +[**PkiGenerateRoot**](SecretsApi.md#PkiGenerateRoot) | **Post** /{pki_mount_path}/root/generate/{exported} | +[**PkiImportKey**](SecretsApi.md#PkiImportKey) | **Post** /{pki_mount_path}/keys/import | +[**PkiIssueWithRole**](SecretsApi.md#PkiIssueWithRole) | **Post** /{pki_mount_path}/issue/{role} | +[**PkiIssuerIssueWithRole**](SecretsApi.md#PkiIssuerIssueWithRole) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/issue/{role} | +[**PkiIssuerReadCrl**](SecretsApi.md#PkiIssuerReadCrl) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/crl | +[**PkiIssuerReadCrlDelta**](SecretsApi.md#PkiIssuerReadCrlDelta) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/crl/delta | +[**PkiIssuerReadCrlDeltaDer**](SecretsApi.md#PkiIssuerReadCrlDeltaDer) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/crl/delta/der | +[**PkiIssuerReadCrlDeltaPem**](SecretsApi.md#PkiIssuerReadCrlDeltaPem) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/crl/delta/pem | +[**PkiIssuerReadCrlDer**](SecretsApi.md#PkiIssuerReadCrlDer) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/crl/der | +[**PkiIssuerReadCrlPem**](SecretsApi.md#PkiIssuerReadCrlPem) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/crl/pem | +[**PkiIssuerResignCrls**](SecretsApi.md#PkiIssuerResignCrls) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/resign-crls | +[**PkiIssuerSignIntermediate**](SecretsApi.md#PkiIssuerSignIntermediate) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-intermediate | +[**PkiIssuerSignRevocationList**](SecretsApi.md#PkiIssuerSignRevocationList) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-revocation-list | +[**PkiIssuerSignSelfIssued**](SecretsApi.md#PkiIssuerSignSelfIssued) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-self-issued | +[**PkiIssuerSignVerbatim**](SecretsApi.md#PkiIssuerSignVerbatim) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim | +[**PkiIssuerSignVerbatimWithRole**](SecretsApi.md#PkiIssuerSignVerbatimWithRole) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign-verbatim/{role} | +[**PkiIssuerSignWithRole**](SecretsApi.md#PkiIssuerSignWithRole) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/sign/{role} | +[**PkiIssuersGenerateIntermediate**](SecretsApi.md#PkiIssuersGenerateIntermediate) | **Post** /{pki_mount_path}/issuers/generate/intermediate/{exported} | +[**PkiIssuersGenerateRoot**](SecretsApi.md#PkiIssuersGenerateRoot) | **Post** /{pki_mount_path}/issuers/generate/root/{exported} | +[**PkiIssuersImportBundle**](SecretsApi.md#PkiIssuersImportBundle) | **Post** /{pki_mount_path}/issuers/import/bundle | +[**PkiIssuersImportCert**](SecretsApi.md#PkiIssuersImportCert) | **Post** /{pki_mount_path}/issuers/import/cert | +[**PkiIssuersRotateRoot**](SecretsApi.md#PkiIssuersRotateRoot) | **Post** /{pki_mount_path}/root/rotate/{exported} | +[**PkiListCerts**](SecretsApi.md#PkiListCerts) | **Get** /{pki_mount_path}/certs | +[**PkiListIssuers**](SecretsApi.md#PkiListIssuers) | **Get** /{pki_mount_path}/issuers | +[**PkiListKeys**](SecretsApi.md#PkiListKeys) | **Get** /{pki_mount_path}/keys | +[**PkiListRevokedCerts**](SecretsApi.md#PkiListRevokedCerts) | **Get** /{pki_mount_path}/certs/revoked | +[**PkiListRoles**](SecretsApi.md#PkiListRoles) | **Get** /{pki_mount_path}/roles | +[**PkiQueryOcsp**](SecretsApi.md#PkiQueryOcsp) | **Post** /{pki_mount_path}/ocsp | +[**PkiQueryOcspWithGetReq**](SecretsApi.md#PkiQueryOcspWithGetReq) | **Get** /{pki_mount_path}/ocsp/{req} | +[**PkiReadAutoTidyConfiguration**](SecretsApi.md#PkiReadAutoTidyConfiguration) | **Get** /{pki_mount_path}/config/auto-tidy | +[**PkiReadCaChainPem**](SecretsApi.md#PkiReadCaChainPem) | **Get** /{pki_mount_path}/ca_chain | +[**PkiReadCaDer**](SecretsApi.md#PkiReadCaDer) | **Get** /{pki_mount_path}/ca | +[**PkiReadCaPem**](SecretsApi.md#PkiReadCaPem) | **Get** /{pki_mount_path}/ca/pem | +[**PkiReadCert**](SecretsApi.md#PkiReadCert) | **Get** /{pki_mount_path}/cert/{serial} | +[**PkiReadCertCaChain**](SecretsApi.md#PkiReadCertCaChain) | **Get** /{pki_mount_path}/cert/ca_chain | +[**PkiReadCertCrl**](SecretsApi.md#PkiReadCertCrl) | **Get** /{pki_mount_path}/cert/crl | +[**PkiReadCertDeltaCrl**](SecretsApi.md#PkiReadCertDeltaCrl) | **Get** /{pki_mount_path}/cert/delta-crl | +[**PkiReadCertRawDer**](SecretsApi.md#PkiReadCertRawDer) | **Get** /{pki_mount_path}/cert/{serial}/raw | +[**PkiReadCertRawPem**](SecretsApi.md#PkiReadCertRawPem) | **Get** /{pki_mount_path}/cert/{serial}/raw/pem | +[**PkiReadClusterConfiguration**](SecretsApi.md#PkiReadClusterConfiguration) | **Get** /{pki_mount_path}/config/cluster | +[**PkiReadCrlConfiguration**](SecretsApi.md#PkiReadCrlConfiguration) | **Get** /{pki_mount_path}/config/crl | +[**PkiReadCrlDelta**](SecretsApi.md#PkiReadCrlDelta) | **Get** /{pki_mount_path}/crl/delta | +[**PkiReadCrlDeltaPem**](SecretsApi.md#PkiReadCrlDeltaPem) | **Get** /{pki_mount_path}/crl/delta/pem | +[**PkiReadCrlDer**](SecretsApi.md#PkiReadCrlDer) | **Get** /{pki_mount_path}/crl | +[**PkiReadCrlPem**](SecretsApi.md#PkiReadCrlPem) | **Get** /{pki_mount_path}/crl/pem | +[**PkiReadIssuer**](SecretsApi.md#PkiReadIssuer) | **Get** /{pki_mount_path}/issuer/{issuer_ref} | +[**PkiReadIssuerDer**](SecretsApi.md#PkiReadIssuerDer) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/der | +[**PkiReadIssuerJson**](SecretsApi.md#PkiReadIssuerJson) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/json | +[**PkiReadIssuerPem**](SecretsApi.md#PkiReadIssuerPem) | **Get** /{pki_mount_path}/issuer/{issuer_ref}/pem | +[**PkiReadIssuersConfiguration**](SecretsApi.md#PkiReadIssuersConfiguration) | **Get** /{pki_mount_path}/config/issuers | +[**PkiReadKey**](SecretsApi.md#PkiReadKey) | **Get** /{pki_mount_path}/key/{key_ref} | +[**PkiReadKeysConfiguration**](SecretsApi.md#PkiReadKeysConfiguration) | **Get** /{pki_mount_path}/config/keys | +[**PkiReadRole**](SecretsApi.md#PkiReadRole) | **Get** /{pki_mount_path}/roles/{name} | +[**PkiReadUrlsConfiguration**](SecretsApi.md#PkiReadUrlsConfiguration) | **Get** /{pki_mount_path}/config/urls | +[**PkiReplaceRoot**](SecretsApi.md#PkiReplaceRoot) | **Post** /{pki_mount_path}/root/replace | +[**PkiRevoke**](SecretsApi.md#PkiRevoke) | **Post** /{pki_mount_path}/revoke | +[**PkiRevokeIssuer**](SecretsApi.md#PkiRevokeIssuer) | **Post** /{pki_mount_path}/issuer/{issuer_ref}/revoke | +[**PkiRevokeWithKey**](SecretsApi.md#PkiRevokeWithKey) | **Post** /{pki_mount_path}/revoke-with-key | +[**PkiRootSignIntermediate**](SecretsApi.md#PkiRootSignIntermediate) | **Post** /{pki_mount_path}/root/sign-intermediate | +[**PkiRootSignSelfIssued**](SecretsApi.md#PkiRootSignSelfIssued) | **Post** /{pki_mount_path}/root/sign-self-issued | +[**PkiRotateCrl**](SecretsApi.md#PkiRotateCrl) | **Get** /{pki_mount_path}/crl/rotate | +[**PkiRotateDeltaCrl**](SecretsApi.md#PkiRotateDeltaCrl) | **Get** /{pki_mount_path}/crl/rotate-delta | +[**PkiSetSignedIntermediate**](SecretsApi.md#PkiSetSignedIntermediate) | **Post** /{pki_mount_path}/intermediate/set-signed | +[**PkiSignVerbatim**](SecretsApi.md#PkiSignVerbatim) | **Post** /{pki_mount_path}/sign-verbatim | +[**PkiSignVerbatimWithRole**](SecretsApi.md#PkiSignVerbatimWithRole) | **Post** /{pki_mount_path}/sign-verbatim/{role} | +[**PkiSignWithRole**](SecretsApi.md#PkiSignWithRole) | **Post** /{pki_mount_path}/sign/{role} | +[**PkiTidy**](SecretsApi.md#PkiTidy) | **Post** /{pki_mount_path}/tidy | +[**PkiTidyCancel**](SecretsApi.md#PkiTidyCancel) | **Post** /{pki_mount_path}/tidy-cancel | +[**PkiTidyStatus**](SecretsApi.md#PkiTidyStatus) | **Get** /{pki_mount_path}/tidy-status | +[**PkiWriteIssuer**](SecretsApi.md#PkiWriteIssuer) | **Post** /{pki_mount_path}/issuer/{issuer_ref} | +[**PkiWriteKey**](SecretsApi.md#PkiWriteKey) | **Post** /{pki_mount_path}/key/{key_ref} | +[**PkiWriteRole**](SecretsApi.md#PkiWriteRole) | **Post** /{pki_mount_path}/roles/{name} | +[**RabbitMqConfigureConnection**](SecretsApi.md#RabbitMqConfigureConnection) | **Post** /{rabbitmq_mount_path}/config/connection | Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API. +[**RabbitMqConfigureLease**](SecretsApi.md#RabbitMqConfigureLease) | **Post** /{rabbitmq_mount_path}/config/lease | +[**RabbitMqDeleteRole**](SecretsApi.md#RabbitMqDeleteRole) | **Delete** /{rabbitmq_mount_path}/roles/{name} | Manage the roles that can be created with this backend. +[**RabbitMqListRoles**](SecretsApi.md#RabbitMqListRoles) | **Get** /{rabbitmq_mount_path}/roles | Manage the roles that can be created with this backend. +[**RabbitMqReadLeaseConfiguration**](SecretsApi.md#RabbitMqReadLeaseConfiguration) | **Get** /{rabbitmq_mount_path}/config/lease | +[**RabbitMqReadRole**](SecretsApi.md#RabbitMqReadRole) | **Get** /{rabbitmq_mount_path}/roles/{name} | Manage the roles that can be created with this backend. +[**RabbitMqRequestCredentials**](SecretsApi.md#RabbitMqRequestCredentials) | **Get** /{rabbitmq_mount_path}/creds/{name} | Request RabbitMQ credentials for a certain role. +[**RabbitMqWriteRole**](SecretsApi.md#RabbitMqWriteRole) | **Post** /{rabbitmq_mount_path}/roles/{name} | Manage the roles that can be created with this backend. +[**SshConfigureCa**](SecretsApi.md#SshConfigureCa) | **Post** /{ssh_mount_path}/config/ca | +[**SshConfigureZeroAddress**](SecretsApi.md#SshConfigureZeroAddress) | **Post** /{ssh_mount_path}/config/zeroaddress | +[**SshDeleteCaConfiguration**](SecretsApi.md#SshDeleteCaConfiguration) | **Delete** /{ssh_mount_path}/config/ca | +[**SshDeleteRole**](SecretsApi.md#SshDeleteRole) | **Delete** /{ssh_mount_path}/roles/{role} | Manage the 'roles' that can be created with this backend. +[**SshDeleteZeroAddressConfiguration**](SecretsApi.md#SshDeleteZeroAddressConfiguration) | **Delete** /{ssh_mount_path}/config/zeroaddress | +[**SshGenerateCredentials**](SecretsApi.md#SshGenerateCredentials) | **Post** /{ssh_mount_path}/creds/{role} | Creates a credential for establishing SSH connection with the remote host. +[**SshIssueCertificate**](SecretsApi.md#SshIssueCertificate) | **Post** /{ssh_mount_path}/issue/{role} | +[**SshListRoles**](SecretsApi.md#SshListRoles) | **Get** /{ssh_mount_path}/roles | Manage the 'roles' that can be created with this backend. +[**SshListRolesByIp**](SecretsApi.md#SshListRolesByIp) | **Post** /{ssh_mount_path}/lookup | List all the roles associated with the given IP address. +[**SshReadCaConfiguration**](SecretsApi.md#SshReadCaConfiguration) | **Get** /{ssh_mount_path}/config/ca | +[**SshReadPublicKey**](SecretsApi.md#SshReadPublicKey) | **Get** /{ssh_mount_path}/public_key | Retrieve the public key. +[**SshReadRole**](SecretsApi.md#SshReadRole) | **Get** /{ssh_mount_path}/roles/{role} | Manage the 'roles' that can be created with this backend. +[**SshReadZeroAddressConfiguration**](SecretsApi.md#SshReadZeroAddressConfiguration) | **Get** /{ssh_mount_path}/config/zeroaddress | +[**SshSignCertificate**](SecretsApi.md#SshSignCertificate) | **Post** /{ssh_mount_path}/sign/{role} | Request signing an SSH key using a certain role with the provided details. +[**SshTidyDynamicHostKeys**](SecretsApi.md#SshTidyDynamicHostKeys) | **Delete** /{ssh_mount_path}/tidy/dynamic-keys | This endpoint removes the stored host keys used for the removed Dynamic Key feature, if present. +[**SshVerifyOtp**](SecretsApi.md#SshVerifyOtp) | **Post** /{ssh_mount_path}/verify | Validate the OTP provided by Vault SSH Agent. +[**SshWriteRole**](SecretsApi.md#SshWriteRole) | **Post** /{ssh_mount_path}/roles/{role} | Manage the 'roles' that can be created with this backend. +[**TerraformCloudConfigure**](SecretsApi.md#TerraformCloudConfigure) | **Post** /{terraform_mount_path}/config | +[**TerraformCloudDeleteConfiguration**](SecretsApi.md#TerraformCloudDeleteConfiguration) | **Delete** /{terraform_mount_path}/config | +[**TerraformCloudDeleteRole**](SecretsApi.md#TerraformCloudDeleteRole) | **Delete** /{terraform_mount_path}/role/{name} | +[**TerraformCloudGenerateCredentials**](SecretsApi.md#TerraformCloudGenerateCredentials) | **Get** /{terraform_mount_path}/creds/{name} | +[**TerraformCloudGenerateCredentials2**](SecretsApi.md#TerraformCloudGenerateCredentials2) | **Post** /{terraform_mount_path}/creds/{name} | +[**TerraformCloudListRoles**](SecretsApi.md#TerraformCloudListRoles) | **Get** /{terraform_mount_path}/role | +[**TerraformCloudReadConfiguration**](SecretsApi.md#TerraformCloudReadConfiguration) | **Get** /{terraform_mount_path}/config | +[**TerraformCloudReadRole**](SecretsApi.md#TerraformCloudReadRole) | **Get** /{terraform_mount_path}/role/{name} | +[**TerraformCloudRotateRole**](SecretsApi.md#TerraformCloudRotateRole) | **Post** /{terraform_mount_path}/rotate-role/{name} | +[**TerraformCloudWriteRole**](SecretsApi.md#TerraformCloudWriteRole) | **Post** /{terraform_mount_path}/role/{name} | +[**TotpCreateKey**](SecretsApi.md#TotpCreateKey) | **Post** /{totp_mount_path}/keys/{name} | +[**TotpDeleteKey**](SecretsApi.md#TotpDeleteKey) | **Delete** /{totp_mount_path}/keys/{name} | +[**TotpGenerateCode**](SecretsApi.md#TotpGenerateCode) | **Get** /{totp_mount_path}/code/{name} | +[**TotpListKeys**](SecretsApi.md#TotpListKeys) | **Get** /{totp_mount_path}/keys | Manage the keys that can be created with this backend. +[**TotpReadKey**](SecretsApi.md#TotpReadKey) | **Get** /{totp_mount_path}/keys/{name} | +[**TotpValidateCode**](SecretsApi.md#TotpValidateCode) | **Post** /{totp_mount_path}/code/{name} | +[**TransitBackUpKey**](SecretsApi.md#TransitBackUpKey) | **Get** /{transit_mount_path}/backup/{name} | Backup the named key +[**TransitConfigureCache**](SecretsApi.md#TransitConfigureCache) | **Post** /{transit_mount_path}/cache-config | Configures a new cache of the specified size +[**TransitConfigureKey**](SecretsApi.md#TransitConfigureKey) | **Post** /{transit_mount_path}/keys/{name}/config | Configure a named encryption key +[**TransitConfigureKeys**](SecretsApi.md#TransitConfigureKeys) | **Post** /{transit_mount_path}/config/keys | +[**TransitCreateKey**](SecretsApi.md#TransitCreateKey) | **Post** /{transit_mount_path}/keys/{name} | [**TransitDecrypt**](SecretsApi.md#TransitDecrypt) | **Post** /{transit_mount_path}/decrypt/{name} | Decrypt a ciphertext value using a named key -[**TransitDeleteKey**](SecretsApi.md#TransitDeleteKey) | **Delete** /{transit_mount_path}/keys/{name} | Managed named encryption keys +[**TransitDeleteKey**](SecretsApi.md#TransitDeleteKey) | **Delete** /{transit_mount_path}/keys/{name} | [**TransitEncrypt**](SecretsApi.md#TransitEncrypt) | **Post** /{transit_mount_path}/encrypt/{name} | Encrypt a plaintext value or a batch of plaintext blocks using a named key -[**TransitExport**](SecretsApi.md#TransitExport) | **Get** /{transit_mount_path}/export/{type}/{name} | Export named encryption or signing key -[**TransitExportVersion**](SecretsApi.md#TransitExportVersion) | **Get** /{transit_mount_path}/export/{type}/{name}/{version} | Export named encryption or signing key +[**TransitExportKey**](SecretsApi.md#TransitExportKey) | **Get** /{transit_mount_path}/export/{type}/{name} | Export named encryption or signing key +[**TransitExportKeyVersion**](SecretsApi.md#TransitExportKeyVersion) | **Get** /{transit_mount_path}/export/{type}/{name}/{version} | Export named encryption or signing key [**TransitGenerateDataKey**](SecretsApi.md#TransitGenerateDataKey) | **Post** /{transit_mount_path}/datakey/{plaintext}/{name} | Generate a data key -[**TransitGenerateHMAC**](SecretsApi.md#TransitGenerateHMAC) | **Post** /{transit_mount_path}/hmac/{name} | Generate an HMAC for input data using the named key -[**TransitGenerateHMACWithAlgorithm**](SecretsApi.md#TransitGenerateHMACWithAlgorithm) | **Post** /{transit_mount_path}/hmac/{name}/{urlalgorithm} | Generate an HMAC for input data using the named key +[**TransitGenerateHmac**](SecretsApi.md#TransitGenerateHmac) | **Post** /{transit_mount_path}/hmac/{name} | Generate an HMAC for input data using the named key +[**TransitGenerateHmacWithAlgorithm**](SecretsApi.md#TransitGenerateHmacWithAlgorithm) | **Post** /{transit_mount_path}/hmac/{name}/{urlalgorithm} | Generate an HMAC for input data using the named key [**TransitGenerateRandom**](SecretsApi.md#TransitGenerateRandom) | **Post** /{transit_mount_path}/random | Generate random bytes -[**TransitGenerateRandomSource**](SecretsApi.md#TransitGenerateRandomSource) | **Post** /{transit_mount_path}/random/{source} | Generate random bytes -[**TransitGenerateRandomSourceBytes**](SecretsApi.md#TransitGenerateRandomSourceBytes) | **Post** /{transit_mount_path}/random/{source}/{urlbytes} | Generate random bytes +[**TransitGenerateRandomWithBytes**](SecretsApi.md#TransitGenerateRandomWithBytes) | **Post** /{transit_mount_path}/random/{urlbytes} | Generate random bytes +[**TransitGenerateRandomWithSource**](SecretsApi.md#TransitGenerateRandomWithSource) | **Post** /{transit_mount_path}/random/{source} | Generate random bytes +[**TransitGenerateRandomWithSourceAndBytes**](SecretsApi.md#TransitGenerateRandomWithSourceAndBytes) | **Post** /{transit_mount_path}/random/{source}/{urlbytes} | Generate random bytes [**TransitHash**](SecretsApi.md#TransitHash) | **Post** /{transit_mount_path}/hash | Generate a hash sum for input data [**TransitHashWithAlgorithm**](SecretsApi.md#TransitHashWithAlgorithm) | **Post** /{transit_mount_path}/hash/{urlalgorithm} | Generate a hash sum for input data [**TransitImportKey**](SecretsApi.md#TransitImportKey) | **Post** /{transit_mount_path}/keys/{name}/import | Imports an externally-generated key into a new transit key [**TransitImportKeyVersion**](SecretsApi.md#TransitImportKeyVersion) | **Post** /{transit_mount_path}/keys/{name}/import_version | Imports an externally-generated key into an existing imported key [**TransitListKeys**](SecretsApi.md#TransitListKeys) | **Get** /{transit_mount_path}/keys | Managed named encryption keys -[**TransitReadCacheConfig**](SecretsApi.md#TransitReadCacheConfig) | **Get** /{transit_mount_path}/cache-config | Returns the size of the active cache -[**TransitReadConfigKeys**](SecretsApi.md#TransitReadConfigKeys) | **Get** /{transit_mount_path}/config/keys | Configuration common across all keys -[**TransitReadKey**](SecretsApi.md#TransitReadKey) | **Get** /{transit_mount_path}/keys/{name} | Managed named encryption keys +[**TransitReadCacheConfiguration**](SecretsApi.md#TransitReadCacheConfiguration) | **Get** /{transit_mount_path}/cache-config | Returns the size of the active cache +[**TransitReadKey**](SecretsApi.md#TransitReadKey) | **Get** /{transit_mount_path}/keys/{name} | +[**TransitReadKeysConfiguration**](SecretsApi.md#TransitReadKeysConfiguration) | **Get** /{transit_mount_path}/config/keys | [**TransitReadWrappingKey**](SecretsApi.md#TransitReadWrappingKey) | **Get** /{transit_mount_path}/wrapping_key | Returns the public key to use for wrapping imported keys -[**TransitRestore**](SecretsApi.md#TransitRestore) | **Post** /{transit_mount_path}/restore | Restore the named key -[**TransitRestoreKey**](SecretsApi.md#TransitRestoreKey) | **Post** /{transit_mount_path}/restore/{name} | Restore the named key +[**TransitRestoreAndRenameKey**](SecretsApi.md#TransitRestoreAndRenameKey) | **Post** /{transit_mount_path}/restore/{name} | Restore the named key +[**TransitRestoreKey**](SecretsApi.md#TransitRestoreKey) | **Post** /{transit_mount_path}/restore | Restore the named key [**TransitRewrap**](SecretsApi.md#TransitRewrap) | **Post** /{transit_mount_path}/rewrap/{name} | Rewrap ciphertext [**TransitRotateKey**](SecretsApi.md#TransitRotateKey) | **Post** /{transit_mount_path}/keys/{name}/rotate | Rotate named encryption key [**TransitSign**](SecretsApi.md#TransitSign) | **Post** /{transit_mount_path}/sign/{name} | Generate a signature for input data using the named key @@ -364,19 +345,14 @@ Method | HTTP request | Description [**TransitTrimKey**](SecretsApi.md#TransitTrimKey) | **Post** /{transit_mount_path}/keys/{name}/trim | Trim key versions of a named key [**TransitVerify**](SecretsApi.md#TransitVerify) | **Post** /{transit_mount_path}/verify/{name} | Verify a signature or HMAC for input data created using the named key [**TransitVerifyWithAlgorithm**](SecretsApi.md#TransitVerifyWithAlgorithm) | **Post** /{transit_mount_path}/verify/{name}/{urlalgorithm} | Verify a signature or HMAC for input data created using the named key -[**TransitWriteCacheConfig**](SecretsApi.md#TransitWriteCacheConfig) | **Post** /{transit_mount_path}/cache-config | Configures a new cache of the specified size -[**TransitWriteConfigKeys**](SecretsApi.md#TransitWriteConfigKeys) | **Post** /{transit_mount_path}/config/keys | Configuration common across all keys -[**TransitWriteKey**](SecretsApi.md#TransitWriteKey) | **Post** /{transit_mount_path}/keys/{name} | Managed named encryption keys -[**TransitWriteKeyConfig**](SecretsApi.md#TransitWriteKeyConfig) | **Post** /{transit_mount_path}/keys/{name}/config | Configure a named encryption key -[**TransitWriteRandomUrlbytes**](SecretsApi.md#TransitWriteRandomUrlbytes) | **Post** /{transit_mount_path}/random/{urlbytes} | Generate random bytes -## AWSConfigReadLease +## AliCloudConfigure + -Configure the default lease information for generated credentials. ### Example @@ -389,6 +365,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -399,8 +376,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AWSConfigReadLease( + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + request := schema.NewAliCloudConfigureRequestWithDefaults() + resp, err := client.Secrets.AliCloudConfigure( context.Background(), + alicloudMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -417,6 +398,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -424,6 +406,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **aliCloudConfigureRequest** | [**AliCloudConfigureRequest**](AliCloudConfigureRequest.md) | | (empty response body) @@ -432,9 +415,9 @@ Name | Type | Description | Notes -## AWSConfigReadRootIAMCredentials +## AliCloudDeleteConfiguration + -Configure the root credentials that are used to manage IAM. ### Example @@ -457,8 +440,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AWSConfigReadRootIAMCredentials( + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Secrets.AliCloudDeleteConfiguration( context.Background(), + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -475,6 +460,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -490,9 +476,9 @@ Name | Type | Description | Notes -## AWSConfigRotateRootIAMCredentials - +## AliCloudDeleteRole +Read, write and reference policies and roles that API keys or STS credentials can be made for. ### Example @@ -515,8 +501,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AWSConfigRotateRootIAMCredentials( + name := "name_example" // string | The name of the role. + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Secrets.AliCloudDeleteRole( context.Background(), + name, + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -533,6 +523,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the role. | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -541,6 +533,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -548,9 +541,9 @@ Name | Type | Description | Notes -## AWSConfigWriteLease +## AliCloudGenerateCredentials -Configure the default lease information for generated credentials. +Generate an API key or STS credential using the given role's configuration.' ### Example @@ -563,7 +556,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -574,10 +566,12 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteLeaseRequestWithDefaults() - resp, err := client.Secrets.AWSConfigWriteLease( + name := "name_example" // string | The name of the role. + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Secrets.AliCloudGenerateCredentials( context.Background(), - request, + name, + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -594,13 +588,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the role. | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteLeaseRequest** | [**AWSConfigWriteLeaseRequest**](AWSConfigWriteLeaseRequest.md) | | + (empty response body) @@ -610,9 +606,9 @@ Name | Type | Description | Notes -## AWSConfigWriteRootIAMCredentials +## AliCloudListRoles -Configure the root credentials that are used to manage IAM. +List the existing roles in this backend. ### Example @@ -625,7 +621,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -636,10 +631,10 @@ func main() { log.Fatal(err) } - request := schema.NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults() - resp, err := client.Secrets.AWSConfigWriteRootIAMCredentials( + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Secrets.AliCloudListRoles( context.Background(), - request, + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -656,14 +651,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSConfigWriteRootIAMCredentialsRequest** | [**AWSConfigWriteRootIAMCredentialsRequest**](AWSConfigWriteRootIAMCredentialsRequest.md) | | + **list** | **string** | Must be set to `true` | (empty response body) @@ -672,9 +668,9 @@ Name | Type | Description | Notes -## AWSDeleteRole +## AliCloudReadConfiguration + -Read, write and reference IAM policies that access keys can be made for. ### Example @@ -697,10 +693,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the policy - resp, err := client.Secrets.AWSDeleteRole( + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Secrets.AliCloudReadConfiguration( context.Background(), - name, + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -717,7 +713,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the policy | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -726,7 +722,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -734,9 +729,9 @@ Name | Type | Description | Notes -## AWSListRoles +## AliCloudReadRole -List the existing roles in this backend +Read, write and reference policies and roles that API keys or STS credentials can be made for. ### Example @@ -759,8 +754,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AWSListRoles( + name := "name_example" // string | The name of the role. + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + resp, err := client.Secrets.AliCloudReadRole( context.Background(), + name, + alicloudMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -777,13 +776,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the role. | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -793,9 +794,9 @@ Name | Type | Description | Notes -## AWSReadCredentials +## AliCloudWriteRole -Generate AWS credentials from a specific Vault role. +Read, write and reference policies and roles that API keys or STS credentials can be made for. ### Example @@ -808,6 +809,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -818,8 +820,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AWSReadCredentials( + name := "name_example" // string | The name of the role. + alicloudMountPath := "alicloudMountPath_example" // string | Path that the backend was mounted at (defaults to "alicloud") + request := schema.NewAliCloudWriteRoleRequestWithDefaults() + resp, err := client.Secrets.AliCloudWriteRole( context.Background(), + name, + alicloudMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -836,6 +844,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the role. | +**alicloudMountPath** | **string** | Path that the backend was mounted at | [default to "alicloud"] ### Other Parameters @@ -844,6 +854,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **aliCloudWriteRoleRequest** | [**AliCloudWriteRoleRequest**](AliCloudWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -851,9 +863,9 @@ Name | Type | Description | Notes -## AWSReadRole +## AwsConfigureLease + -Read, write and reference IAM policies that access keys can be made for. ### Example @@ -866,6 +878,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -876,10 +889,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the policy - resp, err := client.Secrets.AWSReadRole( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureLeaseRequestWithDefaults() + resp, err := client.Secrets.AwsConfigureLease( context.Background(), - name, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -896,7 +911,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the policy | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -904,7 +919,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureLeaseRequest** | [**AwsConfigureLeaseRequest**](AwsConfigureLeaseRequest.md) | | (empty response body) @@ -913,9 +928,9 @@ Name | Type | Description | Notes -## AWSReadSecurityTokenService +## AwsConfigureRootIamCredentials + -Generate AWS credentials from a specific Vault role. ### Example @@ -928,6 +943,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -938,10 +954,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.AWSReadSecurityTokenService( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsConfigureRootIamCredentialsRequestWithDefaults() + resp, err := client.Secrets.AwsConfigureRootIamCredentials( context.Background(), - name, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -958,7 +976,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -966,7 +984,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **awsConfigureRootIamCredentialsRequest** | [**AwsConfigureRootIamCredentialsRequest**](AwsConfigureRootIamCredentialsRequest.md) | | (empty response body) @@ -975,9 +993,9 @@ Name | Type | Description | Notes -## AWSWriteCredentials +## AwsDeleteRole -Generate AWS credentials from a specific Vault role. +Read, write and reference IAM policies that access keys can be made for. ### Example @@ -990,7 +1008,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1001,10 +1018,12 @@ func main() { log.Fatal(err) } - request := schema.NewAWSWriteCredentialsRequestWithDefaults() - resp, err := client.Secrets.AWSWriteCredentials( + name := "name_example" // string | Name of the policy + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsDeleteRole( context.Background(), - request, + name, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1021,13 +1040,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the policy | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteCredentialsRequest** | [**AWSWriteCredentialsRequest**](AWSWriteCredentialsRequest.md) | | + (empty response body) @@ -1037,9 +1058,9 @@ Name | Type | Description | Notes -## AWSWriteRole +## AwsGenerateCredentials + -Read, write and reference IAM policies that access keys can be made for. ### Example @@ -1052,7 +1073,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1063,12 +1083,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the policy - request := schema.NewAWSWriteRoleRequestWithDefaults() - resp, err := client.Secrets.AWSWriteRole( + name := "name_example" // string | Name of the role + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsGenerateCredentials( context.Background(), name, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1085,7 +1105,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the policy | +**name** | **string** | Name of the role | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1093,7 +1114,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteRoleRequest** | [**AWSWriteRoleRequest**](AWSWriteRoleRequest.md) | | (empty response body) @@ -1103,9 +1123,9 @@ Name | Type | Description | Notes -## AWSWriteSecurityTokenService +## AwsGenerateCredentials2 + -Generate AWS credentials from a specific Vault role. ### Example @@ -1130,10 +1150,12 @@ func main() { } name := "name_example" // string | Name of the role - request := schema.NewAWSWriteSecurityTokenServiceRequestWithDefaults() - resp, err := client.Secrets.AWSWriteSecurityTokenService( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsGenerateCredentials2RequestWithDefaults() + resp, err := client.Secrets.AwsGenerateCredentials2( context.Background(), name, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -1152,6 +1174,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1159,8 +1182,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aWSWriteSecurityTokenServiceRequest** | [**AWSWriteSecurityTokenServiceRequest**](AWSWriteSecurityTokenServiceRequest.md) | | + **awsGenerateCredentials2Request** | [**AwsGenerateCredentials2Request**](AwsGenerateCredentials2Request.md) | | (empty response body) @@ -1169,9 +1192,9 @@ Name | Type | Description | Notes -## ActiveDirectoryCheckInLibrary +## AwsGenerateStsCredentials + -Check service accounts in to the library. ### Example @@ -1184,7 +1207,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1195,12 +1217,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - request := schema.NewActiveDirectoryCheckInLibraryRequestWithDefaults() - resp, err := client.Secrets.ActiveDirectoryCheckInLibrary( + name := "name_example" // string | Name of the role + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsGenerateStsCredentials( context.Background(), name, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1217,7 +1239,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the role | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1225,7 +1248,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **activeDirectoryCheckInLibraryRequest** | [**ActiveDirectoryCheckInLibraryRequest**](ActiveDirectoryCheckInLibraryRequest.md) | | (empty response body) @@ -1235,9 +1257,9 @@ Name | Type | Description | Notes -## ActiveDirectoryCheckInManageLibrary +## AwsGenerateStsCredentials2 + -Check service accounts in to the library. ### Example @@ -1261,11 +1283,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - request := schema.NewActiveDirectoryCheckInManageLibraryRequestWithDefaults() - resp, err := client.Secrets.ActiveDirectoryCheckInManageLibrary( + name := "name_example" // string | Name of the role + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsGenerateStsCredentials2RequestWithDefaults() + resp, err := client.Secrets.AwsGenerateStsCredentials2( context.Background(), name, + awsMountPath, request, vault.WithToken("my-token"), ) @@ -1283,7 +1307,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the role | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1291,8 +1316,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **activeDirectoryCheckInManageLibraryRequest** | [**ActiveDirectoryCheckInManageLibraryRequest**](ActiveDirectoryCheckInManageLibraryRequest.md) | | + **awsGenerateStsCredentials2Request** | [**AwsGenerateStsCredentials2Request**](AwsGenerateStsCredentials2Request.md) | | (empty response body) @@ -1301,9 +1326,9 @@ Name | Type | Description | Notes -## ActiveDirectoryCheckOutLibrary +## AwsListRoles -Check a service account out from the library. +List the existing roles in this backend ### Example @@ -1316,7 +1341,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1327,12 +1351,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set - request := schema.NewActiveDirectoryCheckOutLibraryRequestWithDefaults() - resp, err := client.Secrets.ActiveDirectoryCheckOutLibrary( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsListRoles( context.Background(), - name, - request, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1349,7 +1371,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1357,8 +1379,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **activeDirectoryCheckOutLibraryRequest** | [**ActiveDirectoryCheckOutLibraryRequest**](ActiveDirectoryCheckOutLibraryRequest.md) | | - + **list** | **string** | Must be set to `true` | (empty response body) @@ -1367,9 +1388,9 @@ Name | Type | Description | Notes -## ActiveDirectoryDeleteConfig +## AwsReadLeaseConfiguration + -Configure the AD server to connect to, along with password options. ### Example @@ -1392,8 +1413,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.ActiveDirectoryDeleteConfig( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsReadLeaseConfiguration( context.Background(), + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1410,6 +1433,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1425,9 +1449,9 @@ Name | Type | Description | Notes -## ActiveDirectoryDeleteLibrary +## AwsReadRole -Delete a library set. +Read, write and reference IAM policies that access keys can be made for. ### Example @@ -1450,10 +1474,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.ActiveDirectoryDeleteLibrary( + name := "name_example" // string | Name of the policy + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsReadRole( context.Background(), name, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1470,7 +1496,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the policy | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1487,9 +1514,9 @@ Name | Type | Description | Notes -## ActiveDirectoryDeleteRole +## AwsReadRootIamCredentialsConfiguration + -Manage roles to build links between Vault and Active Directory service accounts. ### Example @@ -1512,10 +1539,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.ActiveDirectoryDeleteRole( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsReadRootIamCredentialsConfiguration( context.Background(), - name, + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1532,7 +1559,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters @@ -1541,7 +1568,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -1549,7 +1575,7 @@ Name | Type | Description | Notes -## ActiveDirectoryListLibraries +## AwsRotateRootIamCredentials @@ -1574,8 +1600,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.ActiveDirectoryListLibraries( + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + resp, err := client.Secrets.AwsRotateRootIamCredentials( context.Background(), + awsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1592,13 +1620,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | (empty response body) @@ -1608,9 +1636,9 @@ Name | Type | Description | Notes -## ActiveDirectoryListRoles +## AwsWriteRole -List the name of each role currently stored. +Read, write and reference IAM policies that access keys can be made for. ### Example @@ -1623,6 +1651,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1633,8 +1662,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.ActiveDirectoryListRoles( + name := "name_example" // string | Name of the policy + awsMountPath := "awsMountPath_example" // string | Path that the backend was mounted at (defaults to "aws") + request := schema.NewAwsWriteRoleRequestWithDefaults() + resp, err := client.Secrets.AwsWriteRole( context.Background(), + name, + awsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1651,15 +1686,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the policy | +**awsMountPath** | **string** | Path that the backend was mounted at | [default to "aws"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **awsWriteRoleRequest** | [**AwsWriteRoleRequest**](AwsWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -1667,9 +1705,9 @@ Name | Type | Description | Notes -## ActiveDirectoryReadConfig +## AzureConfigure + -Configure the AD server to connect to, along with password options. ### Example @@ -1682,6 +1720,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1692,8 +1731,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.ActiveDirectoryReadConfig( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + request := schema.NewAzureConfigureRequestWithDefaults() + resp, err := client.Secrets.AzureConfigure( context.Background(), + azureMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1710,6 +1753,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -1717,6 +1761,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **azureConfigureRequest** | [**AzureConfigureRequest**](AzureConfigureRequest.md) | | (empty response body) @@ -1725,7 +1770,7 @@ Name | Type | Description | Notes -## ActiveDirectoryReadCredentials +## AzureDeleteConfiguration @@ -1750,10 +1795,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.ActiveDirectoryReadCredentials( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Secrets.AzureDeleteConfiguration( context.Background(), - name, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1770,7 +1815,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -1779,7 +1824,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -1787,9 +1831,9 @@ Name | Type | Description | Notes -## ActiveDirectoryReadLibrary +## AzureDeleteRole -Read a library set. +Manage the Vault roles used to generate Azure credentials. ### Example @@ -1812,10 +1856,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.ActiveDirectoryReadLibrary( + name := "name_example" // string | Name of the role. + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Secrets.AzureDeleteRole( context.Background(), name, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1832,7 +1878,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the role. | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -1849,9 +1896,9 @@ Name | Type | Description | Notes -## ActiveDirectoryReadLibraryStatus +## AzureListRoles -Check the status of the service accounts in a library set. +List existing roles. ### Example @@ -1874,10 +1921,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.ActiveDirectoryReadLibraryStatus( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Secrets.AzureListRoles( context.Background(), - name, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1894,7 +1941,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -1902,7 +1949,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -1911,9 +1958,9 @@ Name | Type | Description | Notes -## ActiveDirectoryReadRole +## AzureReadConfiguration + -Manage roles to build links between Vault and Active Directory service accounts. ### Example @@ -1936,10 +1983,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.ActiveDirectoryReadRole( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Secrets.AzureReadConfiguration( context.Background(), - name, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -1956,7 +2003,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -1965,7 +2012,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -1973,9 +2019,9 @@ Name | Type | Description | Notes -## ActiveDirectoryRotateRole - +## AzureReadRole +Manage the Vault roles used to generate Azure credentials. ### Example @@ -1998,10 +2044,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the static role - resp, err := client.Secrets.ActiveDirectoryRotateRole( + name := "name_example" // string | Name of the role. + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Secrets.AzureReadRole( context.Background(), name, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2018,7 +2066,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the static role | +**name** | **string** | Name of the role. | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -2035,7 +2084,7 @@ Name | Type | Description | Notes -## ActiveDirectoryRotateRoot +## AzureRequestServicePrincipalCredentials @@ -2060,8 +2109,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.ActiveDirectoryRotateRoot( + role := "role_example" // string | Name of the Vault role + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Secrets.AzureRequestServicePrincipalCredentials( context.Background(), + role, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2078,6 +2131,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | Name of the Vault role | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -2086,6 +2141,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -2093,9 +2149,9 @@ Name | Type | Description | Notes -## ActiveDirectoryWriteConfig +## AzureRotateRoot + -Configure the AD server to connect to, along with password options. ### Example @@ -2108,7 +2164,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2119,10 +2174,10 @@ func main() { log.Fatal(err) } - request := schema.NewActiveDirectoryWriteConfigRequestWithDefaults() - resp, err := client.Secrets.ActiveDirectoryWriteConfig( + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + resp, err := client.Secrets.AzureRotateRoot( context.Background(), - request, + azureMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2139,13 +2194,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **activeDirectoryWriteConfigRequest** | [**ActiveDirectoryWriteConfigRequest**](ActiveDirectoryWriteConfigRequest.md) | | (empty response body) @@ -2155,9 +2210,9 @@ Name | Type | Description | Notes -## ActiveDirectoryWriteLibrary +## AzureWriteRole -Update a library set. +Manage the Vault roles used to generate Azure credentials. ### Example @@ -2181,11 +2236,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - request := schema.NewActiveDirectoryWriteLibraryRequestWithDefaults() - resp, err := client.Secrets.ActiveDirectoryWriteLibrary( + name := "name_example" // string | Name of the role. + azureMountPath := "azureMountPath_example" // string | Path that the backend was mounted at (defaults to "azure") + request := schema.NewAzureWriteRoleRequestWithDefaults() + resp, err := client.Secrets.AzureWriteRole( context.Background(), name, + azureMountPath, request, vault.WithToken("my-token"), ) @@ -2203,7 +2260,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the role. | +**azureMountPath** | **string** | Path that the backend was mounted at | [default to "azure"] ### Other Parameters @@ -2211,8 +2269,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **activeDirectoryWriteLibraryRequest** | [**ActiveDirectoryWriteLibraryRequest**](ActiveDirectoryWriteLibraryRequest.md) | | + **azureWriteRoleRequest** | [**AzureWriteRoleRequest**](AzureWriteRoleRequest.md) | | (empty response body) @@ -2221,9 +2279,9 @@ Name | Type | Description | Notes -## ActiveDirectoryWriteRole +## ConsulConfigureAccess + -Manage roles to build links between Vault and Active Directory service accounts. ### Example @@ -2247,11 +2305,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - request := schema.NewActiveDirectoryWriteRoleRequestWithDefaults() - resp, err := client.Secrets.ActiveDirectoryWriteRole( + consulMountPath := "consulMountPath_example" // string | Path that the backend was mounted at (defaults to "consul") + request := schema.NewConsulConfigureAccessRequestWithDefaults() + resp, err := client.Secrets.ConsulConfigureAccess( context.Background(), - name, + consulMountPath, request, vault.WithToken("my-token"), ) @@ -2269,7 +2327,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**consulMountPath** | **string** | Path that the backend was mounted at | [default to "consul"] ### Other Parameters @@ -2277,8 +2335,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **activeDirectoryWriteRoleRequest** | [**ActiveDirectoryWriteRoleRequest**](ActiveDirectoryWriteRoleRequest.md) | | - + **consulConfigureAccessRequest** | [**ConsulConfigureAccessRequest**](ConsulConfigureAccessRequest.md) | | (empty response body) @@ -2287,9 +2344,9 @@ Name | Type | Description | Notes -## AliCloudDeleteConfig +## ConsulDeleteRole + -Configure the access key and secret to use for RAM and STS calls. ### Example @@ -2312,8 +2369,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AliCloudDeleteConfig( + name := "name_example" // string | Name of the role. + consulMountPath := "consulMountPath_example" // string | Path that the backend was mounted at (defaults to "consul") + resp, err := client.Secrets.ConsulDeleteRole( context.Background(), + name, + consulMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2330,6 +2391,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**consulMountPath** | **string** | Path that the backend was mounted at | [default to "consul"] ### Other Parameters @@ -2338,6 +2401,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -2345,9 +2409,9 @@ Name | Type | Description | Notes -## AliCloudDeleteRole +## ConsulGenerateCredentials + -Read, write and reference policies and roles that API keys or STS credentials can be made for. ### Example @@ -2370,10 +2434,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the role. - resp, err := client.Secrets.AliCloudDeleteRole( + role := "role_example" // string | Name of the role. + consulMountPath := "consulMountPath_example" // string | Path that the backend was mounted at (defaults to "consul") + resp, err := client.Secrets.ConsulGenerateCredentials( context.Background(), - name, + role, + consulMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2390,7 +2456,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the role. | +**role** | **string** | Name of the role. | +**consulMountPath** | **string** | Path that the backend was mounted at | [default to "consul"] ### Other Parameters @@ -2407,9 +2474,9 @@ Name | Type | Description | Notes -## AliCloudListRoles +## ConsulListRoles + -List the existing roles in this backend. ### Example @@ -2432,8 +2499,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AliCloudListRoles( + consulMountPath := "consulMountPath_example" // string | Path that the backend was mounted at (defaults to "consul") + resp, err := client.Secrets.ConsulListRoles( context.Background(), + consulMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2450,14 +2519,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**consulMountPath** | **string** | Path that the backend was mounted at | [default to "consul"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -2466,9 +2536,9 @@ Name | Type | Description | Notes -## AliCloudReadConfig +## ConsulReadAccessConfiguration + -Configure the access key and secret to use for RAM and STS calls. ### Example @@ -2491,8 +2561,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AliCloudReadConfig( + consulMountPath := "consulMountPath_example" // string | Path that the backend was mounted at (defaults to "consul") + resp, err := client.Secrets.ConsulReadAccessConfiguration( context.Background(), + consulMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2509,6 +2581,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**consulMountPath** | **string** | Path that the backend was mounted at | [default to "consul"] ### Other Parameters @@ -2524,9 +2597,9 @@ Name | Type | Description | Notes -## AliCloudReadCredentials +## ConsulReadRole + -Generate an API key or STS credential using the given role's configuration.' ### Example @@ -2549,10 +2622,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the role. - resp, err := client.Secrets.AliCloudReadCredentials( + name := "name_example" // string | Name of the role. + consulMountPath := "consulMountPath_example" // string | Path that the backend was mounted at (defaults to "consul") + resp, err := client.Secrets.ConsulReadRole( context.Background(), name, + consulMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2569,7 +2644,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the role. | +**name** | **string** | Name of the role. | +**consulMountPath** | **string** | Path that the backend was mounted at | [default to "consul"] ### Other Parameters @@ -2586,9 +2662,9 @@ Name | Type | Description | Notes -## AliCloudReadRole +## ConsulWriteRole + -Read, write and reference policies and roles that API keys or STS credentials can be made for. ### Example @@ -2601,6 +2677,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2611,10 +2688,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the role. - resp, err := client.Secrets.AliCloudReadRole( + name := "name_example" // string | Name of the role. + consulMountPath := "consulMountPath_example" // string | Path that the backend was mounted at (defaults to "consul") + request := schema.NewConsulWriteRoleRequestWithDefaults() + resp, err := client.Secrets.ConsulWriteRole( context.Background(), name, + consulMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -2631,7 +2712,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the role. | +**name** | **string** | Name of the role. | +**consulMountPath** | **string** | Path that the backend was mounted at | [default to "consul"] ### Other Parameters @@ -2640,6 +2722,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **consulWriteRoleRequest** | [**ConsulWriteRoleRequest**](ConsulWriteRoleRequest.md) | | (empty response body) @@ -2648,9 +2731,9 @@ Name | Type | Description | Notes -## AliCloudWriteConfig +## CubbyholeDelete -Configure the access key and secret to use for RAM and STS calls. +Deletes the secret at the specified location. ### Example @@ -2663,7 +2746,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2674,10 +2756,10 @@ func main() { log.Fatal(err) } - request := schema.NewAliCloudWriteConfigRequestWithDefaults() - resp, err := client.Secrets.AliCloudWriteConfig( + path := "path_example" // string | Specifies the path of the secret. + resp, err := client.Secrets.CubbyholeDelete( context.Background(), - request, + path, vault.WithToken("my-token"), ) if err != nil { @@ -2694,13 +2776,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**path** | **string** | Specifies the path of the secret. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aliCloudWriteConfigRequest** | [**AliCloudWriteConfigRequest**](AliCloudWriteConfigRequest.md) | | (empty response body) @@ -2710,9 +2792,9 @@ Name | Type | Description | Notes -## AliCloudWriteRole +## CubbyholeRead -Read, write and reference policies and roles that API keys or STS credentials can be made for. +Retrieve the secret at the specified location. ### Example @@ -2725,7 +2807,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2736,12 +2817,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the role. - request := schema.NewAliCloudWriteRoleRequestWithDefaults() - resp, err := client.Secrets.AliCloudWriteRole( + path := "path_example" // string | Specifies the path of the secret. + resp, err := client.Secrets.CubbyholeRead( context.Background(), - name, - request, + path, vault.WithToken("my-token"), ) if err != nil { @@ -2758,7 +2837,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the role. | +**path** | **string** | Specifies the path of the secret. | ### Other Parameters @@ -2766,8 +2845,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **aliCloudWriteRoleRequest** | [**AliCloudWriteRoleRequest**](AliCloudWriteRoleRequest.md) | | - + **list** | **string** | Return a list if `true` | (empty response body) @@ -2776,9 +2854,9 @@ Name | Type | Description | Notes -## AzureDeleteConfig - +## CubbyholeWrite +Store a secret at the specified location. ### Example @@ -2801,8 +2879,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AzureDeleteConfig( + path := "path_example" // string | Specifies the path of the secret. + resp, err := client.Secrets.CubbyholeWrite( context.Background(), + path, vault.WithToken("my-token"), ) if err != nil { @@ -2819,6 +2899,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**path** | **string** | Specifies the path of the secret. | ### Other Parameters @@ -2834,9 +2915,9 @@ Name | Type | Description | Notes -## AzureDeleteRole +## DatabaseConfigureConnection + -Manage the Vault roles used to generate Azure credentials. ### Example @@ -2849,6 +2930,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2859,10 +2941,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.AzureDeleteRole( + name := "name_example" // string | Name of this database connection + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + request := schema.NewDatabaseConfigureConnectionRequestWithDefaults() + resp, err := client.Secrets.DatabaseConfigureConnection( context.Background(), name, + databaseMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -2879,7 +2965,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Name of this database connection | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -2888,6 +2975,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **databaseConfigureConnectionRequest** | [**DatabaseConfigureConnectionRequest**](DatabaseConfigureConnectionRequest.md) | | (empty response body) @@ -2896,9 +2984,9 @@ Name | Type | Description | Notes -## AzureListRoles +## DatabaseDeleteConnectionConfiguration + -List existing roles. ### Example @@ -2921,8 +3009,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AzureListRoles( + name := "name_example" // string | Name of this database connection + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseDeleteConnectionConfiguration( context.Background(), + name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2939,13 +3031,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of this database connection | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -2955,9 +3049,9 @@ Name | Type | Description | Notes -## AzureReadConfig - +## DatabaseDeleteRole +Manage the roles that can be created with this backend. ### Example @@ -2980,8 +3074,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AzureReadConfig( + name := "name_example" // string | Name of the role. + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseDeleteRole( context.Background(), + name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -2998,6 +3096,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3006,6 +3106,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -3013,9 +3114,9 @@ Name | Type | Description | Notes -## AzureReadCredentials - +## DatabaseDeleteStaticRole +Manage the static roles that can be created with this backend. ### Example @@ -3038,10 +3139,12 @@ func main() { log.Fatal(err) } - role := "role_example" // string | Name of the Vault role - resp, err := client.Secrets.AzureReadCredentials( + name := "name_example" // string | Name of the role. + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseDeleteStaticRole( context.Background(), - role, + name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3058,7 +3161,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | Name of the Vault role | +**name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3075,9 +3179,9 @@ Name | Type | Description | Notes -## AzureReadRole +## DatabaseGenerateCredentials -Manage the Vault roles used to generate Azure credentials. +Request database credentials for a certain role. ### Example @@ -3101,9 +3205,11 @@ func main() { } name := "name_example" // string | Name of the role. - resp, err := client.Secrets.AzureReadRole( + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseGenerateCredentials( context.Background(), name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3121,6 +3227,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3137,9 +3244,9 @@ Name | Type | Description | Notes -## AzureRotateRoot - +## DatabaseListConnections +Configure connection details to a database plugin. ### Example @@ -3162,8 +3269,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.AzureRotateRoot( + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseListConnections( context.Background(), + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3180,6 +3289,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3187,6 +3297,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -3195,9 +3306,9 @@ Name | Type | Description | Notes -## AzureWriteConfig - +## DatabaseListRoles +Manage the roles that can be created with this backend. ### Example @@ -3210,7 +3321,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3221,10 +3331,10 @@ func main() { log.Fatal(err) } - request := schema.NewAzureWriteConfigRequestWithDefaults() - resp, err := client.Secrets.AzureWriteConfig( + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseListRoles( context.Background(), - request, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3241,14 +3351,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **azureWriteConfigRequest** | [**AzureWriteConfigRequest**](AzureWriteConfigRequest.md) | | + **list** | **string** | Must be set to `true` | (empty response body) @@ -3257,9 +3368,9 @@ Name | Type | Description | Notes -## AzureWriteRole +## DatabaseListStaticRoles -Manage the Vault roles used to generate Azure credentials. +Manage the static roles that can be created with this backend. ### Example @@ -3272,7 +3383,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3283,12 +3393,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewAzureWriteRoleRequestWithDefaults() - resp, err := client.Secrets.AzureWriteRole( + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseListStaticRoles( context.Background(), - name, - request, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3305,7 +3413,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3313,8 +3421,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **azureWriteRoleRequest** | [**AzureWriteRoleRequest**](AzureWriteRoleRequest.md) | | - + **list** | **string** | Must be set to `true` | (empty response body) @@ -3323,7 +3430,7 @@ Name | Type | Description | Notes -## ConsulDeleteRole +## DatabaseReadConnectionConfiguration @@ -3348,10 +3455,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.ConsulDeleteRole( + name := "name_example" // string | Name of this database connection + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseReadConnectionConfiguration( context.Background(), name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3368,7 +3477,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Name of this database connection | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3385,9 +3495,9 @@ Name | Type | Description | Notes -## ConsulListRoles - +## DatabaseReadRole +Manage the roles that can be created with this backend. ### Example @@ -3410,8 +3520,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.ConsulListRoles( + name := "name_example" // string | Name of the role. + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseReadRole( context.Background(), + name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3428,13 +3542,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -3444,9 +3560,9 @@ Name | Type | Description | Notes -## ConsulReadAccessConfig - +## DatabaseReadStaticRole +Manage the static roles that can be created with this backend. ### Example @@ -3469,8 +3585,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.ConsulReadAccessConfig( + name := "name_example" // string | Name of the role. + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseReadStaticRole( context.Background(), + name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3487,6 +3607,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3495,6 +3617,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -3502,9 +3625,9 @@ Name | Type | Description | Notes -## ConsulReadCredentials - +## DatabaseReadStaticRoleCredentials +Request database credentials for a certain static role. These credentials are rotated periodically. ### Example @@ -3527,10 +3650,12 @@ func main() { log.Fatal(err) } - role := "role_example" // string | Name of the role. - resp, err := client.Secrets.ConsulReadCredentials( + name := "name_example" // string | Name of the static role. + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseReadStaticRoleCredentials( context.Background(), - role, + name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3547,7 +3672,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | Name of the role. | +**name** | **string** | Name of the static role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3564,9 +3690,9 @@ Name | Type | Description | Notes -## ConsulReadRole - +## DatabaseResetConnection +Resets a database plugin. ### Example @@ -3589,10 +3715,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.ConsulReadRole( + name := "name_example" // string | Name of this database connection + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseResetConnection( context.Background(), name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3609,7 +3737,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Name of this database connection | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3626,7 +3755,7 @@ Name | Type | Description | Notes -## ConsulWriteAccessConfig +## DatabaseRotateRootCredentials @@ -3641,7 +3770,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3652,10 +3780,12 @@ func main() { log.Fatal(err) } - request := schema.NewConsulWriteAccessConfigRequestWithDefaults() - resp, err := client.Secrets.ConsulWriteAccessConfig( + name := "name_example" // string | Name of this database connection + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseRotateRootCredentials( context.Background(), - request, + name, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3672,13 +3802,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of this database connection | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **consulWriteAccessConfigRequest** | [**ConsulWriteAccessConfigRequest**](ConsulWriteAccessConfigRequest.md) | | + (empty response body) @@ -3688,7 +3820,7 @@ Name | Type | Description | Notes -## ConsulWriteRole +## DatabaseRotateStaticRoleCredentials @@ -3703,7 +3835,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3714,12 +3845,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewConsulWriteRoleRequestWithDefaults() - resp, err := client.Secrets.ConsulWriteRole( + name := "name_example" // string | Name of the static role + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + resp, err := client.Secrets.DatabaseRotateStaticRoleCredentials( context.Background(), name, - request, + databaseMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3736,7 +3867,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Name of the static role | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3744,7 +3876,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **consulWriteRoleRequest** | [**ConsulWriteRoleRequest**](ConsulWriteRoleRequest.md) | | (empty response body) @@ -3754,9 +3885,9 @@ Name | Type | Description | Notes -## CubbyholeDelete +## DatabaseWriteRole -Deletes the secret at the specified location. +Manage the roles that can be created with this backend. ### Example @@ -3769,6 +3900,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3779,10 +3911,14 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Specifies the path of the secret. - resp, err := client.Secrets.CubbyholeDelete( + name := "name_example" // string | Name of the role. + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + request := schema.NewDatabaseWriteRoleRequestWithDefaults() + resp, err := client.Secrets.DatabaseWriteRole( context.Background(), - path, + name, + databaseMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3799,7 +3935,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | Specifies the path of the secret. | +**name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3808,6 +3945,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **databaseWriteRoleRequest** | [**DatabaseWriteRoleRequest**](DatabaseWriteRoleRequest.md) | | (empty response body) @@ -3816,9 +3954,9 @@ Name | Type | Description | Notes -## CubbyholeRead +## DatabaseWriteStaticRole -Retrieve the secret at the specified location. +Manage the static roles that can be created with this backend. ### Example @@ -3831,6 +3969,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3841,10 +3980,14 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Specifies the path of the secret. - resp, err := client.Secrets.CubbyholeRead( + name := "name_example" // string | Name of the role. + databaseMountPath := "databaseMountPath_example" // string | Path that the backend was mounted at (defaults to "database") + request := schema.NewDatabaseWriteStaticRoleRequestWithDefaults() + resp, err := client.Secrets.DatabaseWriteStaticRole( context.Background(), - path, + name, + databaseMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3861,7 +4004,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | Specifies the path of the secret. | +**name** | **string** | Name of the role. | +**databaseMountPath** | **string** | Path that the backend was mounted at | [default to "database"] ### Other Parameters @@ -3870,7 +4014,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Return a list if `true` | + **databaseWriteStaticRoleRequest** | [**DatabaseWriteStaticRoleRequest**](DatabaseWriteStaticRoleRequest.md) | | (empty response body) @@ -3879,9 +4023,9 @@ Name | Type | Description | Notes -## CubbyholeWrite +## GoogleCloudConfigure + -Store a secret at the specified location. ### Example @@ -3894,6 +4038,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3904,10 +4049,12 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Specifies the path of the secret. - resp, err := client.Secrets.CubbyholeWrite( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudConfigureRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudConfigure( context.Background(), - path, + gcpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3924,7 +4071,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | Specifies the path of the secret. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -3932,7 +4079,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **googleCloudConfigureRequest** | [**GoogleCloudConfigureRequest**](GoogleCloudConfigureRequest.md) | | (empty response body) @@ -3941,9 +4088,9 @@ Name | Type | Description | Notes -## DatabaseDeleteConfig +## GoogleCloudDeleteImpersonatedAccount + -Configure connection details to a database plugin. ### Example @@ -3966,10 +4113,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of this database connection - resp, err := client.Secrets.DatabaseDeleteConfig( + name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudDeleteImpersonatedAccount( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -3986,7 +4135,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of this database connection | +**name** | **string** | Required. Name to refer to this impersonated account in Vault. Cannot be updated. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4003,9 +4153,9 @@ Name | Type | Description | Notes -## DatabaseDeleteRole +## GoogleCloudDeleteRoleset + -Manage the roles that can be created with this backend. ### Example @@ -4028,10 +4178,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.DatabaseDeleteRole( + name := "name_example" // string | Required. Name of the role. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudDeleteRoleset( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4048,7 +4200,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Required. Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4065,9 +4218,9 @@ Name | Type | Description | Notes -## DatabaseDeleteStaticRole +## GoogleCloudDeleteStaticAccount + -Manage the static roles that can be created with this backend. ### Example @@ -4090,10 +4243,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.DatabaseDeleteStaticRole( + name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudDeleteStaticAccount( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4110,7 +4265,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Required. Name to refer to this static account in Vault. Cannot be updated. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4127,9 +4283,9 @@ Name | Type | Description | Notes -## DatabaseListConfig +## GoogleCloudGenerateImpersonatedAccountAccessToken + -Configure connection details to a database plugin. ### Example @@ -4152,8 +4308,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.DatabaseListConfig( + name := "name_example" // string | Required. Name of the impersonated account. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateImpersonatedAccountAccessToken( context.Background(), + name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4170,13 +4330,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Required. Name of the impersonated account. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -4186,9 +4348,9 @@ Name | Type | Description | Notes -## DatabaseListRoles +## GoogleCloudGenerateImpersonatedAccountAccessToken2 + -Manage the roles that can be created with this backend. ### Example @@ -4211,8 +4373,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.DatabaseListRoles( + name := "name_example" // string | Required. Name of the impersonated account. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateImpersonatedAccountAccessToken2( context.Background(), + name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4229,13 +4395,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Required. Name of the impersonated account. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -4245,9 +4413,9 @@ Name | Type | Description | Notes -## DatabaseListStaticRoles +## GoogleCloudGenerateRolesetAccessToken + -Manage the static roles that can be created with this backend. ### Example @@ -4270,8 +4438,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.DatabaseListStaticRoles( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessToken( context.Background(), + roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4288,13 +4460,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -4304,9 +4478,9 @@ Name | Type | Description | Notes -## DatabaseReadConfig +## GoogleCloudGenerateRolesetAccessToken2 + -Configure connection details to a database plugin. ### Example @@ -4329,10 +4503,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of this database connection - resp, err := client.Secrets.DatabaseReadConfig( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessToken2( context.Background(), - name, + roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4349,7 +4525,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of this database connection | +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4366,9 +4543,9 @@ Name | Type | Description | Notes -## DatabaseReadCredentials +## GoogleCloudGenerateRolesetAccessTokenWithParameters + -Request database credentials for a certain role. ### Example @@ -4391,10 +4568,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.DatabaseReadCredentials( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessTokenWithParameters( context.Background(), - name, + roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4411,7 +4590,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4428,9 +4608,9 @@ Name | Type | Description | Notes -## DatabaseReadRole +## GoogleCloudGenerateRolesetAccessTokenWithParameters2 + -Manage the roles that can be created with this backend. ### Example @@ -4453,10 +4633,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.DatabaseReadRole( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessTokenWithParameters2( context.Background(), - name, + roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4473,7 +4655,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4490,9 +4673,9 @@ Name | Type | Description | Notes -## DatabaseReadStaticCredentials +## GoogleCloudGenerateRolesetKey + -Request database credentials for a certain static role. These credentials are rotated periodically. ### Example @@ -4515,10 +4698,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the static role. - resp, err := client.Secrets.DatabaseReadStaticCredentials( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateRolesetKey( context.Background(), - name, + roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4535,7 +4720,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the static role. | +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4552,9 +4738,9 @@ Name | Type | Description | Notes -## DatabaseReadStaticRole +## GoogleCloudGenerateRolesetKey2 + -Manage the static roles that can be created with this backend. ### Example @@ -4577,10 +4763,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.DatabaseReadStaticRole( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateRolesetKey2( context.Background(), - name, + roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4597,7 +4785,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4614,9 +4803,9 @@ Name | Type | Description | Notes -## DatabaseReset +## GoogleCloudGenerateRolesetKeyWithParameters + -Resets a database plugin. ### Example @@ -4629,6 +4818,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4639,10 +4829,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of this database connection - resp, err := client.Secrets.DatabaseReset( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudGenerateRolesetKeyWithParametersRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudGenerateRolesetKeyWithParameters( context.Background(), - name, + roleset, + gcpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4659,7 +4853,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of this database connection | +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4668,6 +4863,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **googleCloudGenerateRolesetKeyWithParametersRequest** | [**GoogleCloudGenerateRolesetKeyWithParametersRequest**](GoogleCloudGenerateRolesetKeyWithParametersRequest.md) | | (empty response body) @@ -4676,7 +4872,7 @@ Name | Type | Description | Notes -## DatabaseRotateRole +## GoogleCloudGenerateRolesetKeyWithParameters2 @@ -4691,6 +4887,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4701,10 +4898,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the static role - resp, err := client.Secrets.DatabaseRotateRole( + roleset := "roleset_example" // string | Required. Name of the role set. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudGenerateRolesetKeyWithParameters2RequestWithDefaults() + resp, err := client.Secrets.GoogleCloudGenerateRolesetKeyWithParameters2( context.Background(), - name, + roleset, + gcpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4721,7 +4922,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the static role | +**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4730,6 +4932,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **googleCloudGenerateRolesetKeyWithParameters2Request** | [**GoogleCloudGenerateRolesetKeyWithParameters2Request**](GoogleCloudGenerateRolesetKeyWithParameters2Request.md) | | (empty response body) @@ -4738,7 +4941,7 @@ Name | Type | Description | Notes -## DatabaseRotateRoot +## GoogleCloudGenerateStaticAccountAccessToken @@ -4763,10 +4966,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of this database connection - resp, err := client.Secrets.DatabaseRotateRoot( + name := "name_example" // string | Required. Name of the static account. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateStaticAccountAccessToken( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4783,7 +4988,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of this database connection | +**name** | **string** | Required. Name of the static account. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4800,9 +5006,9 @@ Name | Type | Description | Notes -## DatabaseWriteConfig +## GoogleCloudGenerateStaticAccountAccessTokenWithParameters + -Configure connection details to a database plugin. ### Example @@ -4815,7 +5021,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4826,12 +5031,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of this database connection - request := schema.NewDatabaseWriteConfigRequestWithDefaults() - resp, err := client.Secrets.DatabaseWriteConfig( + name := "name_example" // string | Required. Name of the static account. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateStaticAccountAccessTokenWithParameters( context.Background(), name, - request, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4848,7 +5053,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of this database connection | +**name** | **string** | Required. Name of the static account. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4856,7 +5062,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **databaseWriteConfigRequest** | [**DatabaseWriteConfigRequest**](DatabaseWriteConfigRequest.md) | | (empty response body) @@ -4866,9 +5071,9 @@ Name | Type | Description | Notes -## DatabaseWriteRole +## GoogleCloudGenerateStaticAccountKey + -Manage the roles that can be created with this backend. ### Example @@ -4881,7 +5086,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4892,12 +5096,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewDatabaseWriteRoleRequestWithDefaults() - resp, err := client.Secrets.DatabaseWriteRole( + name := "name_example" // string | Required. Name of the static account. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudGenerateStaticAccountKey( context.Background(), name, - request, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -4914,7 +5118,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Required. Name of the static account. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4922,7 +5127,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **databaseWriteRoleRequest** | [**DatabaseWriteRoleRequest**](DatabaseWriteRoleRequest.md) | | (empty response body) @@ -4932,9 +5136,9 @@ Name | Type | Description | Notes -## DatabaseWriteStaticRole +## GoogleCloudGenerateStaticAccountKeyWithParameters + -Manage the static roles that can be created with this backend. ### Example @@ -4958,11 +5162,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewDatabaseWriteStaticRoleRequestWithDefaults() - resp, err := client.Secrets.DatabaseWriteStaticRole( + name := "name_example" // string | Required. Name of the static account. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudGenerateStaticAccountKeyWithParametersRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudGenerateStaticAccountKeyWithParameters( context.Background(), name, + gcpMountPath, request, vault.WithToken("my-token"), ) @@ -4980,7 +5186,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Required. Name of the static account. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -4988,8 +5195,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **databaseWriteStaticRoleRequest** | [**DatabaseWriteStaticRoleRequest**](DatabaseWriteStaticRoleRequest.md) | | + **googleCloudGenerateStaticAccountKeyWithParametersRequest** | [**GoogleCloudGenerateStaticAccountKeyWithParametersRequest**](GoogleCloudGenerateStaticAccountKeyWithParametersRequest.md) | | (empty response body) @@ -4998,7 +5205,7 @@ Name | Type | Description | Notes -## GoogleCloudDeleteRoleset +## GoogleCloudKmsConfigure @@ -5013,6 +5220,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5023,10 +5231,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name of the role. - resp, err := client.Secrets.GoogleCloudDeleteRoleset( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsConfigureRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsConfigure( context.Background(), - name, + gcpkmsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -5043,7 +5253,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name of the role. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5051,7 +5261,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **googleCloudKmsConfigureRequest** | [**GoogleCloudKmsConfigureRequest**](GoogleCloudKmsConfigureRequest.md) | | (empty response body) @@ -5060,7 +5270,7 @@ Name | Type | Description | Notes -## GoogleCloudDeleteStaticAccount +## GoogleCloudKmsConfigureKey @@ -5075,6 +5285,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5085,10 +5296,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. - resp, err := client.Secrets.GoogleCloudDeleteStaticAccount( + key := "key_example" // string | Name of the key in Vault. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsConfigureKeyRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsConfigureKey( context.Background(), - name, + key, + gcpkmsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -5105,7 +5320,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name to refer to this static account in Vault. Cannot be updated. | +**key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5114,6 +5330,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **googleCloudKmsConfigureKeyRequest** | [**GoogleCloudKmsConfigureKeyRequest**](GoogleCloudKmsConfigureKeyRequest.md) | | (empty response body) @@ -5122,7 +5339,7 @@ Name | Type | Description | Notes -## GoogleCloudKMSDecrypt +## GoogleCloudKmsDecrypt Decrypt a ciphertext value using a named key @@ -5149,10 +5366,12 @@ func main() { } key := "key_example" // string | Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. - request := schema.NewGoogleCloudKMSDecryptRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSDecrypt( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsDecryptRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsDecrypt( context.Background(), key, + gcpkmsMountPath, request, vault.WithToken("my-token"), ) @@ -5171,6 +5390,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5178,8 +5398,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSDecryptRequest** | [**GoogleCloudKMSDecryptRequest**](GoogleCloudKMSDecryptRequest.md) | | + **googleCloudKmsDecryptRequest** | [**GoogleCloudKmsDecryptRequest**](GoogleCloudKmsDecryptRequest.md) | | (empty response body) @@ -5188,9 +5408,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSDeleteConfig +## GoogleCloudKmsDeleteConfiguration + -Configure the GCP KMS secrets engine ### Example @@ -5213,8 +5433,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.GoogleCloudKMSDeleteConfig( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsDeleteConfiguration( context.Background(), + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5231,6 +5453,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5246,7 +5469,7 @@ Name | Type | Description | Notes -## GoogleCloudKMSDeleteKey +## GoogleCloudKmsDeleteKey Interact with crypto keys in Vault and Google Cloud KMS @@ -5272,9 +5495,11 @@ func main() { } key := "key_example" // string | Name of the key in Vault. - resp, err := client.Secrets.GoogleCloudKMSDeleteKey( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsDeleteKey( context.Background(), key, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5292,6 +5517,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5308,9 +5534,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSDeregisterKey +## GoogleCloudKmsDeregisterKey + -Deregister an existing key in Vault ### Example @@ -5334,9 +5560,11 @@ func main() { } key := "key_example" // string | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. - resp, err := client.Secrets.GoogleCloudKMSDeregisterKey( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsDeregisterKey( context.Background(), key, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5354,6 +5582,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5370,9 +5599,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSEncrypt +## GoogleCloudKmsDeregisterKey2 + -Encrypt a plaintext value using a named key ### Example @@ -5385,7 +5614,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5396,12 +5624,12 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. - request := schema.NewGoogleCloudKMSEncryptRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSEncrypt( + key := "key_example" // string | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsDeregisterKey2( context.Background(), key, - request, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5418,7 +5646,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. | +**key** | **string** | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5426,7 +5655,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSEncryptRequest** | [**GoogleCloudKMSEncryptRequest**](GoogleCloudKMSEncryptRequest.md) | | (empty response body) @@ -5436,9 +5664,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSListKeys +## GoogleCloudKmsEncrypt -List named keys +Encrypt a plaintext value using a named key ### Example @@ -5451,6 +5679,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5461,8 +5690,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.GoogleCloudKMSListKeys( + key := "key_example" // string | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsEncryptRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsEncrypt( context.Background(), + key, + gcpkmsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -5479,15 +5714,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**key** | **string** | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **googleCloudKmsEncryptRequest** | [**GoogleCloudKmsEncryptRequest**](GoogleCloudKmsEncryptRequest.md) | | + (empty response body) [[Back to top]](#) @@ -5495,9 +5733,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSReadConfig +## GoogleCloudKmsListKeys -Configure the GCP KMS secrets engine +List named keys ### Example @@ -5520,8 +5758,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.GoogleCloudKMSReadConfig( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsListKeys( context.Background(), + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5538,6 +5778,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5545,6 +5786,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -5553,9 +5795,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSReadKey +## GoogleCloudKmsReadConfiguration + -Interact with crypto keys in Vault and Google Cloud KMS ### Example @@ -5578,10 +5820,10 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key in Vault. - resp, err := client.Secrets.GoogleCloudKMSReadKey( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsReadConfiguration( context.Background(), - key, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5598,7 +5840,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5607,7 +5849,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -5615,9 +5856,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSReadKeyConfig +## GoogleCloudKmsReadKey -Configure the key in Vault +Interact with crypto keys in Vault and Google Cloud KMS ### Example @@ -5641,9 +5882,11 @@ func main() { } key := "key_example" // string | Name of the key in Vault. - resp, err := client.Secrets.GoogleCloudKMSReadKeyConfig( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsReadKey( context.Background(), key, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5661,6 +5904,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5677,9 +5921,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSReadPubkey +## GoogleCloudKmsReadKeyConfiguration + -Retrieve the public key associated with the named key ### Example @@ -5702,10 +5946,12 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. - resp, err := client.Secrets.GoogleCloudKMSReadPubkey( + key := "key_example" // string | Name of the key in Vault. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsReadKeyConfiguration( context.Background(), key, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5722,7 +5968,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. | +**key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5739,7 +5986,7 @@ Name | Type | Description | Notes -## GoogleCloudKMSReencrypt +## GoogleCloudKmsReencrypt Re-encrypt existing ciphertext data to a new version @@ -5766,10 +6013,12 @@ func main() { } key := "key_example" // string | Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. - request := schema.NewGoogleCloudKMSReencryptRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSReencrypt( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsReencryptRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsReencrypt( context.Background(), key, + gcpkmsMountPath, request, vault.WithToken("my-token"), ) @@ -5788,6 +6037,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5795,8 +6045,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSReencryptRequest** | [**GoogleCloudKMSReencryptRequest**](GoogleCloudKMSReencryptRequest.md) | | + **googleCloudKmsReencryptRequest** | [**GoogleCloudKmsReencryptRequest**](GoogleCloudKmsReencryptRequest.md) | | (empty response body) @@ -5805,7 +6055,7 @@ Name | Type | Description | Notes -## GoogleCloudKMSRegisterKey +## GoogleCloudKmsRegisterKey Register an existing crypto key in Google Cloud KMS @@ -5832,10 +6082,12 @@ func main() { } key := "key_example" // string | Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. - request := schema.NewGoogleCloudKMSRegisterKeyRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSRegisterKey( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsRegisterKeyRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsRegisterKey( context.Background(), key, + gcpkmsMountPath, request, vault.WithToken("my-token"), ) @@ -5854,6 +6106,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5861,8 +6114,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSRegisterKeyRequest** | [**GoogleCloudKMSRegisterKeyRequest**](GoogleCloudKMSRegisterKeyRequest.md) | | + **googleCloudKmsRegisterKeyRequest** | [**GoogleCloudKmsRegisterKeyRequest**](GoogleCloudKmsRegisterKeyRequest.md) | | (empty response body) @@ -5871,9 +6124,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSRotateKey +## GoogleCloudKmsRetrievePublicKey -Rotate a crypto key to a new primary version +Retrieve the public key associated with the named key ### Example @@ -5896,10 +6149,12 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. - resp, err := client.Secrets.GoogleCloudKMSRotateKey( + key := "key_example" // string | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsRetrievePublicKey( context.Background(), key, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5916,7 +6171,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. | +**key** | **string** | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5933,9 +6189,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSSign +## GoogleCloudKmsRotateKey -Signs a message or digest using a named key +Rotate a crypto key to a new primary version ### Example @@ -5948,7 +6204,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5959,12 +6214,12 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. - request := schema.NewGoogleCloudKMSSignRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSSign( + key := "key_example" // string | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsRotateKey( context.Background(), key, - request, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -5981,7 +6236,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. | +**key** | **string** | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -5989,7 +6245,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSSignRequest** | [**GoogleCloudKMSSignRequest**](GoogleCloudKMSSignRequest.md) | | (empty response body) @@ -5999,9 +6254,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSTrimKey +## GoogleCloudKmsSign -Delete old crypto key versions from Google Cloud KMS +Signs a message or digest using a named key ### Example @@ -6014,6 +6269,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6024,10 +6280,14 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key in Vault. - resp, err := client.Secrets.GoogleCloudKMSTrimKey( + key := "key_example" // string | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsSignRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsSign( context.Background(), key, + gcpkmsMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -6044,7 +6304,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key in Vault. | +**key** | **string** | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -6053,6 +6314,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **googleCloudKmsSignRequest** | [**GoogleCloudKmsSignRequest**](GoogleCloudKmsSignRequest.md) | | (empty response body) @@ -6061,9 +6323,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSVerify +## GoogleCloudKmsTrimKeyVersions + -Verify a signature using a named key ### Example @@ -6076,7 +6338,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6087,12 +6348,12 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. - request := schema.NewGoogleCloudKMSVerifyRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSVerify( + key := "key_example" // string | Name of the key in Vault. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsTrimKeyVersions( context.Background(), key, - request, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6109,7 +6370,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. | +**key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -6117,7 +6379,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSVerifyRequest** | [**GoogleCloudKMSVerifyRequest**](GoogleCloudKMSVerifyRequest.md) | | (empty response body) @@ -6127,9 +6388,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSWriteConfig +## GoogleCloudKmsTrimKeyVersions2 + -Configure the GCP KMS secrets engine ### Example @@ -6142,7 +6403,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6153,10 +6413,12 @@ func main() { log.Fatal(err) } - request := schema.NewGoogleCloudKMSWriteConfigRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSWriteConfig( + key := "key_example" // string | Name of the key in Vault. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + resp, err := client.Secrets.GoogleCloudKmsTrimKeyVersions2( context.Background(), - request, + key, + gcpkmsMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6173,13 +6435,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSWriteConfigRequest** | [**GoogleCloudKMSWriteConfigRequest**](GoogleCloudKMSWriteConfigRequest.md) | | + (empty response body) @@ -6189,9 +6453,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSWriteKey +## GoogleCloudKmsVerify -Interact with crypto keys in Vault and Google Cloud KMS +Verify a signature using a named key ### Example @@ -6215,11 +6479,13 @@ func main() { log.Fatal(err) } - key := "key_example" // string | Name of the key in Vault. - request := schema.NewGoogleCloudKMSWriteKeyRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSWriteKey( + key := "key_example" // string | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsVerifyRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsVerify( context.Background(), key, + gcpkmsMountPath, request, vault.WithToken("my-token"), ) @@ -6237,7 +6503,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**key** | **string** | Name of the key in Vault. | +**key** | **string** | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -6245,8 +6512,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSWriteKeyRequest** | [**GoogleCloudKMSWriteKeyRequest**](GoogleCloudKMSWriteKeyRequest.md) | | + **googleCloudKmsVerifyRequest** | [**GoogleCloudKmsVerifyRequest**](GoogleCloudKmsVerifyRequest.md) | | (empty response body) @@ -6255,9 +6522,9 @@ Name | Type | Description | Notes -## GoogleCloudKMSWriteKeyConfig +## GoogleCloudKmsWriteKey -Configure the key in Vault +Interact with crypto keys in Vault and Google Cloud KMS ### Example @@ -6282,10 +6549,12 @@ func main() { } key := "key_example" // string | Name of the key in Vault. - request := schema.NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudKMSWriteKeyConfig( + gcpkmsMountPath := "gcpkmsMountPath_example" // string | Path that the backend was mounted at (defaults to "gcpkms") + request := schema.NewGoogleCloudKmsWriteKeyRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudKmsWriteKey( context.Background(), key, + gcpkmsMountPath, request, vault.WithToken("my-token"), ) @@ -6304,6 +6573,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **key** | **string** | Name of the key in Vault. | +**gcpkmsMountPath** | **string** | Path that the backend was mounted at | [default to "gcpkms"] ### Other Parameters @@ -6311,8 +6581,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudKMSWriteKeyConfigRequest** | [**GoogleCloudKMSWriteKeyConfigRequest**](GoogleCloudKMSWriteKeyConfigRequest.md) | | + **googleCloudKmsWriteKeyRequest** | [**GoogleCloudKmsWriteKeyRequest**](GoogleCloudKmsWriteKeyRequest.md) | | (empty response body) @@ -6321,7 +6591,7 @@ Name | Type | Description | Notes -## GoogleCloudListRolesets +## GoogleCloudListImpersonatedAccounts @@ -6346,8 +6616,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.GoogleCloudListRolesets( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudListImpersonatedAccounts( context.Background(), + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6364,14 +6636,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -6380,7 +6653,7 @@ Name | Type | Description | Notes -## GoogleCloudListStaticAccounts +## GoogleCloudListImpersonatedAccounts2 @@ -6405,8 +6678,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.GoogleCloudListStaticAccounts( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudListImpersonatedAccounts2( context.Background(), + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6423,14 +6698,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -6439,7 +6715,7 @@ Name | Type | Description | Notes -## GoogleCloudReadConfig +## GoogleCloudListRolesets @@ -6464,8 +6740,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.GoogleCloudReadConfig( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudListRolesets( context.Background(), + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6482,6 +6760,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6489,6 +6768,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -6497,7 +6777,7 @@ Name | Type | Description | Notes -## GoogleCloudReadKey +## GoogleCloudListRolesets2 @@ -6522,10 +6802,10 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - resp, err := client.Secrets.GoogleCloudReadKey( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudListRolesets2( context.Background(), - roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6542,7 +6822,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6550,7 +6830,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -6559,7 +6839,7 @@ Name | Type | Description | Notes -## GoogleCloudReadRoleset +## GoogleCloudListStaticAccounts @@ -6584,10 +6864,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name of the role. - resp, err := client.Secrets.GoogleCloudReadRoleset( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudListStaticAccounts( context.Background(), - name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6604,7 +6884,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6612,7 +6892,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -6621,7 +6901,7 @@ Name | Type | Description | Notes -## GoogleCloudReadRolesetKey +## GoogleCloudListStaticAccounts2 @@ -6646,10 +6926,10 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - resp, err := client.Secrets.GoogleCloudReadRolesetKey( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudListStaticAccounts2( context.Background(), - roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6666,7 +6946,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6674,7 +6954,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -6683,7 +6963,7 @@ Name | Type | Description | Notes -## GoogleCloudReadRolesetToken +## GoogleCloudReadConfiguration @@ -6708,10 +6988,10 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - resp, err := client.Secrets.GoogleCloudReadRolesetToken( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudReadConfiguration( context.Background(), - roleset, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6728,7 +7008,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6737,7 +7017,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -6745,7 +7024,7 @@ Name | Type | Description | Notes -## GoogleCloudReadStaticAccount +## GoogleCloudReadImpersonatedAccount @@ -6770,10 +7049,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. - resp, err := client.Secrets.GoogleCloudReadStaticAccount( + name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudReadImpersonatedAccount( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6790,7 +7071,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name to refer to this static account in Vault. Cannot be updated. | +**name** | **string** | Required. Name to refer to this impersonated account in Vault. Cannot be updated. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6807,7 +7089,7 @@ Name | Type | Description | Notes -## GoogleCloudReadStaticAccountKey +## GoogleCloudReadRoleset @@ -6832,10 +7114,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name of the static account. - resp, err := client.Secrets.GoogleCloudReadStaticAccountKey( + name := "name_example" // string | Required. Name of the role. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudReadRoleset( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6852,7 +7136,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name of the static account. | +**name** | **string** | Required. Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6869,7 +7154,7 @@ Name | Type | Description | Notes -## GoogleCloudReadStaticAccountToken +## GoogleCloudReadStaticAccount @@ -6894,10 +7179,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name of the static account. - resp, err := client.Secrets.GoogleCloudReadStaticAccountToken( + name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudReadStaticAccount( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6914,7 +7201,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name of the static account. | +**name** | **string** | Required. Name to refer to this static account in Vault. Cannot be updated. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6931,7 +7219,7 @@ Name | Type | Description | Notes -## GoogleCloudReadToken +## GoogleCloudRotateRoleset @@ -6956,10 +7244,12 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - resp, err := client.Secrets.GoogleCloudReadToken( + name := "name_example" // string | Name of the role. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudRotateRoleset( context.Background(), - roleset, + name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -6976,7 +7266,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -6993,7 +7284,7 @@ Name | Type | Description | Notes -## GoogleCloudRotateRoleset +## GoogleCloudRotateRolesetKey @@ -7019,9 +7310,11 @@ func main() { } name := "name_example" // string | Name of the role. - resp, err := client.Secrets.GoogleCloudRotateRoleset( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudRotateRolesetKey( context.Background(), name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7039,6 +7332,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -7055,7 +7349,7 @@ Name | Type | Description | Notes -## GoogleCloudRotateRolesetKey +## GoogleCloudRotateRootCredentials @@ -7080,10 +7374,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.GoogleCloudRotateRolesetKey( + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudRotateRootCredentials( context.Background(), - name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7100,7 +7394,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -7109,7 +7403,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -7117,7 +7410,7 @@ Name | Type | Description | Notes -## GoogleCloudRotateRoot +## GoogleCloudRotateStaticAccountKey @@ -7142,8 +7435,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.GoogleCloudRotateRoot( + name := "name_example" // string | Name of the account. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + resp, err := client.Secrets.GoogleCloudRotateStaticAccountKey( context.Background(), + name, + gcpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7160,6 +7457,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the account. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -7168,6 +7467,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -7175,7 +7475,7 @@ Name | Type | Description | Notes -## GoogleCloudRotateStaticAccountKey +## GoogleCloudWriteImpersonatedAccount @@ -7190,6 +7490,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7200,10 +7501,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the account. - resp, err := client.Secrets.GoogleCloudRotateStaticAccountKey( + name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudWriteImpersonatedAccountRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudWriteImpersonatedAccount( context.Background(), name, + gcpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -7220,7 +7525,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the account. | +**name** | **string** | Required. Name to refer to this impersonated account in Vault. Cannot be updated. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -7229,6 +7535,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **googleCloudWriteImpersonatedAccountRequest** | [**GoogleCloudWriteImpersonatedAccountRequest**](GoogleCloudWriteImpersonatedAccountRequest.md) | | (empty response body) @@ -7237,7 +7544,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteConfig +## GoogleCloudWriteRoleset @@ -7263,9 +7570,13 @@ func main() { log.Fatal(err) } - request := schema.NewGoogleCloudWriteConfigRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudWriteConfig( + name := "name_example" // string | Required. Name of the role. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudWriteRolesetRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudWriteRoleset( context.Background(), + name, + gcpMountPath, request, vault.WithToken("my-token"), ) @@ -7283,15 +7594,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Required. Name of the role. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteConfigRequest** | [**GoogleCloudWriteConfigRequest**](GoogleCloudWriteConfigRequest.md) | | + **googleCloudWriteRolesetRequest** | [**GoogleCloudWriteRolesetRequest**](GoogleCloudWriteRolesetRequest.md) | | + (empty response body) [[Back to top]](#) @@ -7299,7 +7613,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteKey +## GoogleCloudWriteStaticAccount @@ -7325,11 +7639,13 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - request := schema.NewGoogleCloudWriteKeyRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudWriteKey( + name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. + gcpMountPath := "gcpMountPath_example" // string | Path that the backend was mounted at (defaults to "gcp") + request := schema.NewGoogleCloudWriteStaticAccountRequestWithDefaults() + resp, err := client.Secrets.GoogleCloudWriteStaticAccount( context.Background(), - roleset, + name, + gcpMountPath, request, vault.WithToken("my-token"), ) @@ -7347,7 +7663,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**name** | **string** | Required. Name to refer to this static account in Vault. Cannot be updated. | +**gcpMountPath** | **string** | Path that the backend was mounted at | [default to "gcp"] ### Other Parameters @@ -7355,8 +7672,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteKeyRequest** | [**GoogleCloudWriteKeyRequest**](GoogleCloudWriteKeyRequest.md) | | + **googleCloudWriteStaticAccountRequest** | [**GoogleCloudWriteStaticAccountRequest**](GoogleCloudWriteStaticAccountRequest.md) | | (empty response body) @@ -7365,7 +7682,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteRoleset +## KubernetesCheckConfiguration @@ -7380,7 +7697,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7391,12 +7707,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name of the role. - request := schema.NewGoogleCloudWriteRolesetRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudWriteRoleset( + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + resp, err := client.Secrets.KubernetesCheckConfiguration( context.Background(), - name, - request, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7413,7 +7727,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name of the role. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7421,8 +7735,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteRolesetRequest** | [**GoogleCloudWriteRolesetRequest**](GoogleCloudWriteRolesetRequest.md) | | - (empty response body) @@ -7431,7 +7743,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteRolesetKey +## KubernetesConfigure @@ -7457,11 +7769,11 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - request := schema.NewGoogleCloudWriteRolesetKeyRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudWriteRolesetKey( + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + request := schema.NewKubernetesConfigureRequestWithDefaults() + resp, err := client.Secrets.KubernetesConfigure( context.Background(), - roleset, + kubernetesMountPath, request, vault.WithToken("my-token"), ) @@ -7479,7 +7791,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7487,8 +7799,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteRolesetKeyRequest** | [**GoogleCloudWriteRolesetKeyRequest**](GoogleCloudWriteRolesetKeyRequest.md) | | - + **kubernetesConfigureRequest** | [**KubernetesConfigureRequest**](KubernetesConfigureRequest.md) | | (empty response body) @@ -7497,7 +7808,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteRolesetToken +## KubernetesDeleteConfiguration @@ -7522,10 +7833,10 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - resp, err := client.Secrets.GoogleCloudWriteRolesetToken( + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + resp, err := client.Secrets.KubernetesDeleteConfiguration( context.Background(), - roleset, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7542,7 +7853,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7551,7 +7862,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -7559,7 +7869,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteStaticAccount +## KubernetesDeleteRole @@ -7574,7 +7884,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7585,12 +7894,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. - request := schema.NewGoogleCloudWriteStaticAccountRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudWriteStaticAccount( + name := "name_example" // string | Name of the role + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + resp, err := client.Secrets.KubernetesDeleteRole( context.Background(), name, - request, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7607,7 +7916,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name to refer to this static account in Vault. Cannot be updated. | +**name** | **string** | Name of the role | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7615,7 +7925,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteStaticAccountRequest** | [**GoogleCloudWriteStaticAccountRequest**](GoogleCloudWriteStaticAccountRequest.md) | | (empty response body) @@ -7625,7 +7934,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteStaticAccountKey +## KubernetesGenerateCredentials @@ -7651,11 +7960,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name of the static account. - request := schema.NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults() - resp, err := client.Secrets.GoogleCloudWriteStaticAccountKey( + name := "name_example" // string | Name of the Vault role + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + request := schema.NewKubernetesGenerateCredentialsRequestWithDefaults() + resp, err := client.Secrets.KubernetesGenerateCredentials( context.Background(), name, + kubernetesMountPath, request, vault.WithToken("my-token"), ) @@ -7673,7 +7984,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name of the static account. | +**name** | **string** | Name of the Vault role | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7681,8 +7993,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **googleCloudWriteStaticAccountKeyRequest** | [**GoogleCloudWriteStaticAccountKeyRequest**](GoogleCloudWriteStaticAccountKeyRequest.md) | | + **kubernetesGenerateCredentialsRequest** | [**KubernetesGenerateCredentialsRequest**](KubernetesGenerateCredentialsRequest.md) | | (empty response body) @@ -7691,7 +8003,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteStaticAccountToken +## KubernetesListRoles @@ -7716,10 +8028,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Required. Name of the static account. - resp, err := client.Secrets.GoogleCloudWriteStaticAccountToken( + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + resp, err := client.Secrets.KubernetesListRoles( context.Background(), - name, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7736,7 +8048,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Required. Name of the static account. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7744,7 +8056,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -7753,7 +8065,7 @@ Name | Type | Description | Notes -## GoogleCloudWriteToken +## KubernetesReadConfiguration @@ -7778,10 +8090,10 @@ func main() { log.Fatal(err) } - roleset := "roleset_example" // string | Required. Name of the role set. - resp, err := client.Secrets.GoogleCloudWriteToken( + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + resp, err := client.Secrets.KubernetesReadConfiguration( context.Background(), - roleset, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7798,7 +8110,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**roleset** | **string** | Required. Name of the role set. | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7807,7 +8119,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -7815,9 +8126,9 @@ Name | Type | Description | Notes -## KVv1Delete +## KubernetesReadRole + -Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. ### Example @@ -7840,10 +8151,12 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv1Delete( + name := "name_example" // string | Name of the role + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + resp, err := client.Secrets.KubernetesReadRole( context.Background(), - path, + name, + kubernetesMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7860,7 +8173,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | Location of the secret. | +**name** | **string** | Name of the role | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7877,9 +8191,9 @@ Name | Type | Description | Notes -## KVv1Read +## KubernetesWriteRole + -Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. ### Example @@ -7892,6 +8206,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7902,10 +8217,14 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv1Read( + name := "name_example" // string | Name of the role + kubernetesMountPath := "kubernetesMountPath_example" // string | Path that the backend was mounted at (defaults to "kubernetes") + request := schema.NewKubernetesWriteRoleRequestWithDefaults() + resp, err := client.Secrets.KubernetesWriteRole( context.Background(), - path, + name, + kubernetesMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -7922,7 +8241,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | Location of the secret. | +**name** | **string** | Name of the role | +**kubernetesMountPath** | **string** | Path that the backend was mounted at | [default to "kubernetes"] ### Other Parameters @@ -7931,7 +8251,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Return a list if `true` | + **kubernetesWriteRoleRequest** | [**KubernetesWriteRoleRequest**](KubernetesWriteRoleRequest.md) | | (empty response body) @@ -7940,9 +8260,9 @@ Name | Type | Description | Notes -## KVv1Write +## KvV1Delete + -Pass-through secret storage to the storage backend, allowing you to read/write arbitrary data into secret storage. ### Example @@ -7966,9 +8286,11 @@ func main() { } path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv1Write( + kvV1MountPath := "kvV1MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v1") + resp, err := client.Secrets.KvV1Delete( context.Background(), path, + kvV1MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -7986,6 +8308,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV1MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v1"] ### Other Parameters @@ -8002,9 +8325,9 @@ Name | Type | Description | Notes -## KVv2Delete +## KvV1Read + -Write, Patch, Read, and Delete data in the Key-Value Store. ### Example @@ -8028,9 +8351,11 @@ func main() { } path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv2Delete( + kvV1MountPath := "kvV1MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v1") + resp, err := client.Secrets.KvV1Read( context.Background(), path, + kvV1MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8048,6 +8373,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV1MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v1"] ### Other Parameters @@ -8056,6 +8382,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Return a list if `true` | (empty response body) @@ -8064,9 +8391,9 @@ Name | Type | Description | Notes -## KVv2DeleteMetadata +## KvV1Write + -Configures settings for the KV store ### Example @@ -8090,9 +8417,11 @@ func main() { } path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv2DeleteMetadata( + kvV1MountPath := "kvV1MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v1") + resp, err := client.Secrets.KvV1Write( context.Background(), path, + kvV1MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8110,6 +8439,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV1MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v1"] ### Other Parameters @@ -8126,9 +8456,9 @@ Name | Type | Description | Notes -## KVv2DeleteVersions +## KvV2Configure -Marks one or more versions as deleted in the KV store. +Configure backend level settings that are applied to every key in the key-value store. ### Example @@ -8152,11 +8482,11 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Location of the secret. - request := schema.NewKVv2DeleteVersionsRequestWithDefaults() - resp, err := client.Secrets.KVv2DeleteVersions( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + request := schema.NewKvV2ConfigureRequestWithDefaults() + resp, err := client.Secrets.KvV2Configure( context.Background(), - path, + kvV2MountPath, request, vault.WithToken("my-token"), ) @@ -8174,7 +8504,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8182,8 +8512,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kVv2DeleteVersionsRequest** | [**KVv2DeleteVersionsRequest**](KVv2DeleteVersionsRequest.md) | | - + **kvV2ConfigureRequest** | [**KvV2ConfigureRequest**](KvV2ConfigureRequest.md) | | (empty response body) @@ -8192,9 +8521,9 @@ Name | Type | Description | Notes -## KVv2DestroyVersions +## KvV2Delete + -Permanently removes one or more versions in the KV store ### Example @@ -8207,7 +8536,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8219,11 +8547,11 @@ func main() { } path := "path_example" // string | Location of the secret. - request := schema.NewKVv2DestroyVersionsRequestWithDefaults() - resp, err := client.Secrets.KVv2DestroyVersions( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + resp, err := client.Secrets.KvV2Delete( context.Background(), path, - request, + kvV2MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8241,6 +8569,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8248,7 +8577,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kVv2DestroyVersionsRequest** | [**KVv2DestroyVersionsRequest**](KVv2DestroyVersionsRequest.md) | | (empty response body) @@ -8258,9 +8586,9 @@ Name | Type | Description | Notes -## KVv2Read +## KvV2DeleteMetadata + -Write, Patch, Read, and Delete data in the Key-Value Store. ### Example @@ -8284,9 +8612,11 @@ func main() { } path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv2Read( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + resp, err := client.Secrets.KvV2DeleteMetadata( context.Background(), path, + kvV2MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8304,6 +8634,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8320,9 +8651,9 @@ Name | Type | Description | Notes -## KVv2ReadConfig +## KvV2DeleteVersions + -Read the backend level settings. ### Example @@ -8335,6 +8666,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8345,8 +8677,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.KVv2ReadConfig( + path := "path_example" // string | Location of the secret. + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + request := schema.NewKvV2DeleteVersionsRequestWithDefaults() + resp, err := client.Secrets.KvV2DeleteVersions( context.Background(), + path, + kvV2MountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -8363,6 +8701,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8371,6 +8711,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **kvV2DeleteVersionsRequest** | [**KvV2DeleteVersionsRequest**](KvV2DeleteVersionsRequest.md) | | + (empty response body) [[Back to top]](#) @@ -8378,9 +8720,9 @@ Name | Type | Description | Notes -## KVv2ReadMetadata +## KvV2DestroyVersions + -Configures settings for the KV store ### Example @@ -8393,6 +8735,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8404,9 +8747,13 @@ func main() { } path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv2ReadMetadata( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + request := schema.NewKvV2DestroyVersionsRequestWithDefaults() + resp, err := client.Secrets.KvV2DestroyVersions( context.Background(), path, + kvV2MountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -8424,6 +8771,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8432,7 +8780,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Return a list if `true` | + **kvV2DestroyVersionsRequest** | [**KvV2DestroyVersionsRequest**](KvV2DestroyVersionsRequest.md) | | (empty response body) @@ -8441,9 +8789,9 @@ Name | Type | Description | Notes -## KVv2ReadSubkeys +## KvV2Read + -Read the structure of a secret entry from the Key-Value store with the values removed. ### Example @@ -8467,9 +8815,11 @@ func main() { } path := "path_example" // string | Location of the secret. - resp, err := client.Secrets.KVv2ReadSubkeys( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + resp, err := client.Secrets.KvV2Read( context.Background(), path, + kvV2MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8487,6 +8837,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8496,16 +8847,16 @@ Name | Type | Description | Notes - (empty response body) +[**KvV2ReadResponse**](KvV2ReadResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## KVv2UndeleteVersions +## KvV2ReadConfiguration -Undeletes one or more versions from the KV store. +Read the backend level settings. ### Example @@ -8518,7 +8869,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8529,12 +8879,10 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Location of the secret. - request := schema.NewKVv2UndeleteVersionsRequestWithDefaults() - resp, err := client.Secrets.KVv2UndeleteVersions( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + resp, err := client.Secrets.KvV2ReadConfiguration( context.Background(), - path, - request, + kvV2MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8551,7 +8899,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8559,19 +8907,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kVv2UndeleteVersionsRequest** | [**KVv2UndeleteVersionsRequest**](KVv2UndeleteVersionsRequest.md) | | - - (empty response body) +[**KvV2ReadConfigurationResponse**](KvV2ReadConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## KVv2Write +## KvV2ReadMetadata + -Write, Patch, Read, and Delete data in the Key-Value Store. ### Example @@ -8584,7 +8930,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8596,11 +8941,11 @@ func main() { } path := "path_example" // string | Location of the secret. - request := schema.NewKVv2WriteRequestWithDefaults() - resp, err := client.Secrets.KVv2Write( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + resp, err := client.Secrets.KvV2ReadMetadata( context.Background(), path, - request, + kvV2MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8618,6 +8963,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8625,19 +8971,19 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kVv2WriteRequest** | [**KVv2WriteRequest**](KVv2WriteRequest.md) | | + **list** | **string** | Return a list if `true` | - (empty response body) +[**KvV2ReadMetadataResponse**](KvV2ReadMetadataResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## KVv2WriteConfig +## KvV2ReadSubkeys + -Configure backend level settings that are applied to every key in the key-value store. ### Example @@ -8650,7 +8996,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8661,10 +9006,12 @@ func main() { log.Fatal(err) } - request := schema.NewKVv2WriteConfigRequestWithDefaults() - resp, err := client.Secrets.KVv2WriteConfig( + path := "path_example" // string | Location of the secret. + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + resp, err := client.Secrets.KvV2ReadSubkeys( context.Background(), - request, + path, + kvV2MountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8681,25 +9028,27 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kVv2WriteConfigRequest** | [**KVv2WriteConfigRequest**](KVv2WriteConfigRequest.md) | | - (empty response body) + +[**KvV2ReadSubkeysResponse**](KvV2ReadSubkeysResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## KVv2WriteMetadata +## KvV2UndeleteVersions + -Configures settings for the KV store ### Example @@ -8724,10 +9073,12 @@ func main() { } path := "path_example" // string | Location of the secret. - request := schema.NewKVv2WriteMetadataRequestWithDefaults() - resp, err := client.Secrets.KVv2WriteMetadata( + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + request := schema.NewKvV2UndeleteVersionsRequestWithDefaults() + resp, err := client.Secrets.KvV2UndeleteVersions( context.Background(), path, + kvV2MountPath, request, vault.WithToken("my-token"), ) @@ -8746,6 +9097,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8753,8 +9105,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kVv2WriteMetadataRequest** | [**KVv2WriteMetadataRequest**](KVv2WriteMetadataRequest.md) | | + **kvV2UndeleteVersionsRequest** | [**KvV2UndeleteVersionsRequest**](KvV2UndeleteVersionsRequest.md) | | (empty response body) @@ -8763,7 +9115,7 @@ Name | Type | Description | Notes -## KubernetesDeleteConfig +## KvV2Write @@ -8778,6 +9130,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8788,8 +9141,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.KubernetesDeleteConfig( + path := "path_example" // string | Location of the secret. + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + request := schema.NewKvV2WriteRequestWithDefaults() + resp, err := client.Secrets.KvV2Write( context.Background(), + path, + kvV2MountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -8806,6 +9165,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8814,14 +9175,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + **kvV2WriteRequest** | [**KvV2WriteRequest**](KvV2WriteRequest.md) | | + +[**KvV2WriteResponse**](KvV2WriteResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## KubernetesDeleteRole +## KvV2WriteMetadata @@ -8836,6 +9199,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8846,10 +9210,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.KubernetesDeleteRole( + path := "path_example" // string | Location of the secret. + kvV2MountPath := "kvV2MountPath_example" // string | Path that the backend was mounted at (defaults to "kv-v2") + request := schema.NewKvV2WriteMetadataRequestWithDefaults() + resp, err := client.Secrets.KvV2WriteMetadata( context.Background(), - name, + path, + kvV2MountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -8866,7 +9234,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**path** | **string** | Location of the secret. | +**kvV2MountPath** | **string** | Path that the backend was mounted at | [default to "kv-v2"] ### Other Parameters @@ -8875,6 +9244,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **kvV2WriteMetadataRequest** | [**KvV2WriteMetadataRequest**](KvV2WriteMetadataRequest.md) | | (empty response body) @@ -8883,7 +9253,7 @@ Name | Type | Description | Notes -## KubernetesListRoles +## LdapConfigure @@ -8898,6 +9268,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8908,8 +9279,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.KubernetesListRoles( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapConfigureRequestWithDefaults() + resp, err := client.Secrets.LdapConfigure( context.Background(), + ldapMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -8926,14 +9301,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **ldapConfigureRequest** | [**LdapConfigureRequest**](LdapConfigureRequest.md) | | (empty response body) @@ -8942,7 +9318,7 @@ Name | Type | Description | Notes -## KubernetesReadConfig +## LdapDeleteConfiguration @@ -8967,8 +9343,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.KubernetesReadConfig( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapDeleteConfiguration( context.Background(), + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -8985,6 +9363,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9000,7 +9379,7 @@ Name | Type | Description | Notes -## KubernetesReadRole +## LdapDeleteDynamicRole @@ -9025,10 +9404,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.KubernetesReadRole( + name := "name_example" // string | Name of the role (lowercase) + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapDeleteDynamicRole( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9045,7 +9426,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**name** | **string** | Name of the role (lowercase) | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9062,7 +9444,7 @@ Name | Type | Description | Notes -## KubernetesWriteConfig +## LdapDeleteStaticRole @@ -9077,7 +9459,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9088,10 +9469,12 @@ func main() { log.Fatal(err) } - request := schema.NewKubernetesWriteConfigRequestWithDefaults() - resp, err := client.Secrets.KubernetesWriteConfig( + name := "name_example" // string | Name of the role + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapDeleteStaticRole( context.Background(), - request, + name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9108,13 +9491,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kubernetesWriteConfigRequest** | [**KubernetesWriteConfigRequest**](KubernetesWriteConfigRequest.md) | | + (empty response body) @@ -9124,9 +9509,9 @@ Name | Type | Description | Notes -## KubernetesWriteCredentials - +## LdapLibraryCheckIn +Check service accounts in to the library. ### Example @@ -9150,11 +9535,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the Vault role - request := schema.NewKubernetesWriteCredentialsRequestWithDefaults() - resp, err := client.Secrets.KubernetesWriteCredentials( + name := "name_example" // string | Name of the set. + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapLibraryCheckInRequestWithDefaults() + resp, err := client.Secrets.LdapLibraryCheckIn( context.Background(), name, + ldapMountPath, request, vault.WithToken("my-token"), ) @@ -9172,7 +9559,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the Vault role | +**name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9180,8 +9568,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kubernetesWriteCredentialsRequest** | [**KubernetesWriteCredentialsRequest**](KubernetesWriteCredentialsRequest.md) | | + **ldapLibraryCheckInRequest** | [**LdapLibraryCheckInRequest**](LdapLibraryCheckInRequest.md) | | (empty response body) @@ -9190,9 +9578,9 @@ Name | Type | Description | Notes -## KubernetesWriteRole - +## LdapLibraryCheckOut +Check a service account out from the library. ### Example @@ -9216,11 +9604,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - request := schema.NewKubernetesWriteRoleRequestWithDefaults() - resp, err := client.Secrets.KubernetesWriteRole( + name := "name_example" // string | Name of the set + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapLibraryCheckOutRequestWithDefaults() + resp, err := client.Secrets.LdapLibraryCheckOut( context.Background(), name, + ldapMountPath, request, vault.WithToken("my-token"), ) @@ -9238,7 +9628,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**name** | **string** | Name of the set | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9246,8 +9637,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **kubernetesWriteRoleRequest** | [**KubernetesWriteRoleRequest**](KubernetesWriteRoleRequest.md) | | + **ldapLibraryCheckOutRequest** | [**LdapLibraryCheckOutRequest**](LdapLibraryCheckOutRequest.md) | | (empty response body) @@ -9256,9 +9647,9 @@ Name | Type | Description | Notes -## LDAPCheckInLibrary +## LdapLibraryCheckStatus -Check service accounts in to the library. +Check the status of the service accounts in a library set. ### Example @@ -9271,7 +9662,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9283,11 +9673,11 @@ func main() { } name := "name_example" // string | Name of the set. - request := schema.NewLDAPCheckInLibraryRequestWithDefaults() - resp, err := client.Secrets.LDAPCheckInLibrary( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapLibraryCheckStatus( context.Background(), name, - request, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9305,6 +9695,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9312,7 +9703,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPCheckInLibraryRequest** | [**LDAPCheckInLibraryRequest**](LDAPCheckInLibraryRequest.md) | | (empty response body) @@ -9322,9 +9712,9 @@ Name | Type | Description | Notes -## LDAPCheckInManageLibrary +## LdapLibraryConfigure -Check service accounts in to the library. +Update a library set. ### Example @@ -9349,10 +9739,12 @@ func main() { } name := "name_example" // string | Name of the set. - request := schema.NewLDAPCheckInManageLibraryRequestWithDefaults() - resp, err := client.Secrets.LDAPCheckInManageLibrary( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapLibraryConfigureRequestWithDefaults() + resp, err := client.Secrets.LdapLibraryConfigure( context.Background(), name, + ldapMountPath, request, vault.WithToken("my-token"), ) @@ -9371,6 +9763,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9378,8 +9771,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPCheckInManageLibraryRequest** | [**LDAPCheckInManageLibraryRequest**](LDAPCheckInManageLibraryRequest.md) | | + **ldapLibraryConfigureRequest** | [**LdapLibraryConfigureRequest**](LdapLibraryConfigureRequest.md) | | (empty response body) @@ -9388,9 +9781,9 @@ Name | Type | Description | Notes -## LDAPCheckOutLibrary +## LdapLibraryDelete -Check a service account out from the library. +Delete a library set. ### Example @@ -9403,7 +9796,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9414,12 +9806,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set - request := schema.NewLDAPCheckOutLibraryRequestWithDefaults() - resp, err := client.Secrets.LDAPCheckOutLibrary( + name := "name_example" // string | Name of the set. + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapLibraryDelete( context.Background(), name, - request, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9436,7 +9828,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set | +**name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9444,7 +9837,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPCheckOutLibraryRequest** | [**LDAPCheckOutLibraryRequest**](LDAPCheckOutLibraryRequest.md) | | (empty response body) @@ -9454,9 +9846,9 @@ Name | Type | Description | Notes -## LDAPDeleteConfig - +## LdapLibraryForceCheckIn +Check service accounts in to the library. ### Example @@ -9469,6 +9861,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9479,8 +9872,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.LDAPDeleteConfig( + name := "name_example" // string | Name of the set. + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapLibraryForceCheckInRequestWithDefaults() + resp, err := client.Secrets.LdapLibraryForceCheckIn( context.Background(), + name, + ldapMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -9497,6 +9896,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9505,6 +9906,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **ldapLibraryForceCheckInRequest** | [**LdapLibraryForceCheckInRequest**](LdapLibraryForceCheckInRequest.md) | | + (empty response body) [[Back to top]](#) @@ -9512,9 +9915,9 @@ Name | Type | Description | Notes -## LDAPDeleteLibrary +## LdapLibraryList + -Delete a library set. ### Example @@ -9537,10 +9940,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.LDAPDeleteLibrary( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapLibraryList( context.Background(), - name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9557,7 +9960,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9565,7 +9968,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -9574,9 +9977,9 @@ Name | Type | Description | Notes -## LDAPDeleteRole - +## LdapLibraryRead +Read a library set. ### Example @@ -9599,10 +10002,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role (lowercase) - resp, err := client.Secrets.LDAPDeleteRole( + name := "name_example" // string | Name of the set. + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapLibraryRead( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9619,7 +10024,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role (lowercase) | +**name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9636,7 +10042,7 @@ Name | Type | Description | Notes -## LDAPDeleteStaticRole +## LdapListDynamicRoles @@ -9661,10 +10067,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.LDAPDeleteStaticRole( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapListDynamicRoles( context.Background(), - name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9681,7 +10087,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9689,7 +10095,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **list** | **string** | Must be set to `true` | (empty response body) @@ -9698,7 +10104,7 @@ Name | Type | Description | Notes -## LDAPListLibraries +## LdapListStaticRoles @@ -9723,8 +10129,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.LDAPListLibraries( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapListStaticRoles( context.Background(), + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9741,14 +10149,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **list** | **string** | Must be set to `true` | (empty response body) @@ -9757,7 +10166,7 @@ Name | Type | Description | Notes -## LDAPListRoles +## LdapReadConfiguration @@ -9782,8 +10191,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.LDAPListRoles( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapReadConfiguration( context.Background(), + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9800,13 +10211,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | (empty response body) @@ -9816,7 +10227,7 @@ Name | Type | Description | Notes -## LDAPListStaticRoles +## LdapReadDynamicRole @@ -9841,8 +10252,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.LDAPListStaticRoles( + name := "name_example" // string | Name of the role (lowercase) + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapReadDynamicRole( context.Background(), + name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9859,13 +10274,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role (lowercase) | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -9875,7 +10292,7 @@ Name | Type | Description | Notes -## LDAPReadConfig +## LdapReadStaticRole @@ -9900,8 +10317,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.LDAPReadConfig( + name := "name_example" // string | Name of the role + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapReadStaticRole( context.Background(), + name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9918,6 +10339,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9926,6 +10349,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -9933,7 +10357,7 @@ Name | Type | Description | Notes -## LDAPReadCredentials +## LdapRequestDynamicRoleCredentials @@ -9959,9 +10383,11 @@ func main() { } name := "name_example" // string | Name of the dynamic role. - resp, err := client.Secrets.LDAPReadCredentials( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapRequestDynamicRoleCredentials( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -9979,6 +10405,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the dynamic role. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -9995,9 +10422,9 @@ Name | Type | Description | Notes -## LDAPReadLibrary +## LdapRequestStaticRoleCredentials + -Read a library set. ### Example @@ -10020,10 +10447,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.LDAPReadLibrary( + name := "name_example" // string | Name of the static role. + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapRequestStaticRoleCredentials( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10040,7 +10469,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the static role. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -10057,9 +10487,9 @@ Name | Type | Description | Notes -## LDAPReadLibraryStatus +## LdapRotateRootCredentials + -Check the status of the service accounts in a library set. ### Example @@ -10082,10 +10512,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.LDAPReadLibraryStatus( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapRotateRootCredentials( context.Background(), - name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10102,7 +10532,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -10111,7 +10541,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -10119,7 +10548,7 @@ Name | Type | Description | Notes -## LDAPReadRole +## LdapRotateStaticRole @@ -10144,10 +10573,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role (lowercase) - resp, err := client.Secrets.LDAPReadRole( + name := "name_example" // string | Name of the static role + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + resp, err := client.Secrets.LdapRotateStaticRole( context.Background(), name, + ldapMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10164,7 +10595,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role (lowercase) | +**name** | **string** | Name of the static role | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -10181,7 +10613,7 @@ Name | Type | Description | Notes -## LDAPReadStaticCredentials +## LdapWriteDynamicRole @@ -10196,6 +10628,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10206,10 +10639,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the static role. - resp, err := client.Secrets.LDAPReadStaticCredentials( + name := "name_example" // string | Name of the role (lowercase) + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapWriteDynamicRoleRequestWithDefaults() + resp, err := client.Secrets.LdapWriteDynamicRole( context.Background(), name, + ldapMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10226,7 +10663,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the static role. | +**name** | **string** | Name of the role (lowercase) | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -10235,6 +10673,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **ldapWriteDynamicRoleRequest** | [**LdapWriteDynamicRoleRequest**](LdapWriteDynamicRoleRequest.md) | | (empty response body) @@ -10243,7 +10682,7 @@ Name | Type | Description | Notes -## LDAPReadStaticRole +## LdapWriteStaticRole @@ -10258,6 +10697,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10269,9 +10709,13 @@ func main() { } name := "name_example" // string | Name of the role - resp, err := client.Secrets.LDAPReadStaticRole( + ldapMountPath := "ldapMountPath_example" // string | Path that the backend was mounted at (defaults to "ldap") + request := schema.NewLdapWriteStaticRoleRequestWithDefaults() + resp, err := client.Secrets.LdapWriteStaticRole( context.Background(), name, + ldapMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10289,6 +10733,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role | +**ldapMountPath** | **string** | Path that the backend was mounted at | [default to "ldap"] ### Other Parameters @@ -10297,6 +10742,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **ldapWriteStaticRoleRequest** | [**LdapWriteStaticRoleRequest**](LdapWriteStaticRoleRequest.md) | | (empty response body) @@ -10305,7 +10751,7 @@ Name | Type | Description | Notes -## LDAPRotateRole +## MongoDbAtlasConfigure @@ -10320,6 +10766,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10330,10 +10777,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the static role - resp, err := client.Secrets.LDAPRotateRole( + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + request := schema.NewMongoDbAtlasConfigureRequestWithDefaults() + resp, err := client.Secrets.MongoDbAtlasConfigure( context.Background(), - name, + mongodbatlasMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10350,7 +10799,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the static role | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters @@ -10358,7 +10807,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **mongoDbAtlasConfigureRequest** | [**MongoDbAtlasConfigureRequest**](MongoDbAtlasConfigureRequest.md) | | (empty response body) @@ -10367,9 +10816,9 @@ Name | Type | Description | Notes -## LDAPRotateRoot - +## MongoDbAtlasDeleteRole +Manage the roles used to generate MongoDB Atlas Programmatic API Keys. ### Example @@ -10392,8 +10841,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.LDAPRotateRoot( + name := "name_example" // string | Name of the Roles + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + resp, err := client.Secrets.MongoDbAtlasDeleteRole( context.Background(), + name, + mongodbatlasMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10410,6 +10863,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the Roles | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters @@ -10418,6 +10873,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -10425,7 +10881,7 @@ Name | Type | Description | Notes -## LDAPWriteConfig +## MongoDbAtlasGenerateCredentials @@ -10440,7 +10896,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10451,10 +10906,12 @@ func main() { log.Fatal(err) } - request := schema.NewLDAPWriteConfigRequestWithDefaults() - resp, err := client.Secrets.LDAPWriteConfig( + name := "name_example" // string | Name of the role + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + resp, err := client.Secrets.MongoDbAtlasGenerateCredentials( context.Background(), - request, + name, + mongodbatlasMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10471,13 +10928,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPWriteConfigRequest** | [**LDAPWriteConfigRequest**](LDAPWriteConfigRequest.md) | | + (empty response body) @@ -10487,9 +10946,9 @@ Name | Type | Description | Notes -## LDAPWriteLibrary +## MongoDbAtlasGenerateCredentials2 + -Update a library set. ### Example @@ -10502,7 +10961,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10513,12 +10971,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - request := schema.NewLDAPWriteLibraryRequestWithDefaults() - resp, err := client.Secrets.LDAPWriteLibrary( + name := "name_example" // string | Name of the role + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + resp, err := client.Secrets.MongoDbAtlasGenerateCredentials2( context.Background(), name, - request, + mongodbatlasMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10535,7 +10993,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the role | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters @@ -10543,7 +11002,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPWriteLibraryRequest** | [**LDAPWriteLibraryRequest**](LDAPWriteLibraryRequest.md) | | (empty response body) @@ -10553,9 +11011,9 @@ Name | Type | Description | Notes -## LDAPWriteRole - +## MongoDbAtlasListRoles +List the existing roles in this backend ### Example @@ -10568,7 +11026,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10579,12 +11036,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role (lowercase) - request := schema.NewLDAPWriteRoleRequestWithDefaults() - resp, err := client.Secrets.LDAPWriteRole( + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + resp, err := client.Secrets.MongoDbAtlasListRoles( context.Background(), - name, - request, + mongodbatlasMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10601,7 +11056,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role (lowercase) | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters @@ -10609,8 +11064,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPWriteRoleRequest** | [**LDAPWriteRoleRequest**](LDAPWriteRoleRequest.md) | | - + **list** | **string** | Must be set to `true` | (empty response body) @@ -10619,7 +11073,7 @@ Name | Type | Description | Notes -## LDAPWriteStaticRole +## MongoDbAtlasReadConfiguration @@ -10634,7 +11088,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10645,12 +11098,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - request := schema.NewLDAPWriteStaticRoleRequestWithDefaults() - resp, err := client.Secrets.LDAPWriteStaticRole( + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + resp, err := client.Secrets.MongoDbAtlasReadConfiguration( context.Background(), - name, - request, + mongodbatlasMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10667,7 +11118,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters @@ -10675,8 +11126,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **lDAPWriteStaticRoleRequest** | [**LDAPWriteStaticRoleRequest**](LDAPWriteStaticRoleRequest.md) | | - (empty response body) @@ -10685,7 +11134,7 @@ Name | Type | Description | Notes -## MongoDBAtlasDeleteRole +## MongoDbAtlasReadRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. @@ -10711,9 +11160,11 @@ func main() { } name := "name_example" // string | Name of the Roles - resp, err := client.Secrets.MongoDBAtlasDeleteRole( + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + resp, err := client.Secrets.MongoDbAtlasReadRole( context.Background(), name, + mongodbatlasMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10731,6 +11182,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the Roles | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters @@ -10747,9 +11199,9 @@ Name | Type | Description | Notes -## MongoDBAtlasListRoles +## MongoDbAtlasWriteRole -List the existing roles in this backend +Manage the roles used to generate MongoDB Atlas Programmatic API Keys. ### Example @@ -10762,6 +11214,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10772,8 +11225,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.MongoDBAtlasListRoles( + name := "name_example" // string | Name of the Roles + mongodbatlasMountPath := "mongodbatlasMountPath_example" // string | Path that the backend was mounted at (defaults to "mongodbatlas") + request := schema.NewMongoDbAtlasWriteRoleRequestWithDefaults() + resp, err := client.Secrets.MongoDbAtlasWriteRole( context.Background(), + name, + mongodbatlasMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10790,15 +11249,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the Roles | +**mongodbatlasMountPath** | **string** | Path that the backend was mounted at | [default to "mongodbatlas"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **mongoDbAtlasWriteRoleRequest** | [**MongoDbAtlasWriteRoleRequest**](MongoDbAtlasWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -10806,9 +11268,9 @@ Name | Type | Description | Notes -## MongoDBAtlasReadConfig +## NomadConfigureAccess + -Configure the credentials that are used to manage Database Users. ### Example @@ -10821,6 +11283,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10831,8 +11294,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.MongoDBAtlasReadConfig( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + request := schema.NewNomadConfigureAccessRequestWithDefaults() + resp, err := client.Secrets.NomadConfigureAccess( context.Background(), + nomadMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10849,6 +11316,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -10856,6 +11324,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **nomadConfigureAccessRequest** | [**NomadConfigureAccessRequest**](NomadConfigureAccessRequest.md) | | (empty response body) @@ -10864,9 +11333,9 @@ Name | Type | Description | Notes -## MongoDBAtlasReadCredentials +## NomadConfigureLease + -Generate MongoDB Atlas Programmatic API from a specific Vault role. ### Example @@ -10879,6 +11348,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -10889,10 +11359,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.MongoDBAtlasReadCredentials( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + request := schema.NewNomadConfigureLeaseRequestWithDefaults() + resp, err := client.Secrets.NomadConfigureLease( context.Background(), - name, + nomadMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -10909,7 +11381,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -10917,7 +11389,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **nomadConfigureLeaseRequest** | [**NomadConfigureLeaseRequest**](NomadConfigureLeaseRequest.md) | | (empty response body) @@ -10926,9 +11398,9 @@ Name | Type | Description | Notes -## MongoDBAtlasReadRole +## NomadDeleteAccessConfiguration + -Manage the roles used to generate MongoDB Atlas Programmatic API Keys. ### Example @@ -10951,10 +11423,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the Roles - resp, err := client.Secrets.MongoDBAtlasReadRole( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadDeleteAccessConfiguration( context.Background(), - name, + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -10971,7 +11443,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the Roles | +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -10980,7 +11452,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -10988,9 +11459,9 @@ Name | Type | Description | Notes -## MongoDBAtlasWriteConfig +## NomadDeleteLeaseConfiguration + -Configure the credentials that are used to manage Database Users. ### Example @@ -11003,7 +11474,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -11014,10 +11484,10 @@ func main() { log.Fatal(err) } - request := schema.NewMongoDBAtlasWriteConfigRequestWithDefaults() - resp, err := client.Secrets.MongoDBAtlasWriteConfig( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadDeleteLeaseConfiguration( context.Background(), - request, + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11034,13 +11504,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mongoDBAtlasWriteConfigRequest** | [**MongoDBAtlasWriteConfigRequest**](MongoDBAtlasWriteConfigRequest.md) | | (empty response body) @@ -11050,9 +11520,9 @@ Name | Type | Description | Notes -## MongoDBAtlasWriteCredentials +## NomadDeleteRole + -Generate MongoDB Atlas Programmatic API from a specific Vault role. ### Example @@ -11076,9 +11546,11 @@ func main() { } name := "name_example" // string | Name of the role - resp, err := client.Secrets.MongoDBAtlasWriteCredentials( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadDeleteRole( context.Background(), name, + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11096,6 +11568,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the role | +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -11112,9 +11585,9 @@ Name | Type | Description | Notes -## MongoDBAtlasWriteRole +## NomadGenerateCredentials + -Manage the roles used to generate MongoDB Atlas Programmatic API Keys. ### Example @@ -11127,7 +11600,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -11138,12 +11610,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the Roles - request := schema.NewMongoDBAtlasWriteRoleRequestWithDefaults() - resp, err := client.Secrets.MongoDBAtlasWriteRole( + name := "name_example" // string | Name of the role + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadGenerateCredentials( context.Background(), name, - request, + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11160,7 +11632,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the Roles | +**name** | **string** | Name of the role | +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -11168,7 +11641,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **mongoDBAtlasWriteRoleRequest** | [**MongoDBAtlasWriteRoleRequest**](MongoDBAtlasWriteRoleRequest.md) | | (empty response body) @@ -11178,7 +11650,7 @@ Name | Type | Description | Notes -## NomadDeleteAccessConfig +## NomadListRoles @@ -11203,8 +11675,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.NomadDeleteAccessConfig( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadListRoles( context.Background(), + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11221,6 +11695,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -11228,6 +11703,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -11236,9 +11712,9 @@ Name | Type | Description | Notes -## NomadDeleteLeaseConfig +## NomadReadAccessConfiguration + -Configure the lease parameters for generated tokens ### Example @@ -11261,8 +11737,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.NomadDeleteLeaseConfig( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadReadAccessConfiguration( context.Background(), + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11279,6 +11757,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -11294,7 +11773,7 @@ Name | Type | Description | Notes -## NomadDeleteRole +## NomadReadLeaseConfiguration @@ -11319,10 +11798,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.NomadDeleteRole( + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadReadLeaseConfiguration( context.Background(), - name, + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11339,7 +11818,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -11348,7 +11827,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -11356,7 +11834,7 @@ Name | Type | Description | Notes -## NomadListRoles +## NomadReadRole @@ -11381,8 +11859,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.NomadListRoles( + name := "name_example" // string | Name of the role + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + resp, err := client.Secrets.NomadReadRole( context.Background(), + name, + nomadMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -11399,13 +11881,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + (empty response body) @@ -11415,7 +11899,7 @@ Name | Type | Description | Notes -## NomadReadAccessConfig +## NomadWriteRole @@ -11430,6 +11914,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -11440,8 +11925,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.NomadReadAccessConfig( + name := "name_example" // string | Name of the role + nomadMountPath := "nomadMountPath_example" // string | Path that the backend was mounted at (defaults to "nomad") + request := schema.NewNomadWriteRoleRequestWithDefaults() + resp, err := client.Secrets.NomadWriteRole( context.Background(), + name, + nomadMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -11458,6 +11949,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**nomadMountPath** | **string** | Path that the backend was mounted at | [default to "nomad"] ### Other Parameters @@ -11466,6 +11959,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **nomadWriteRoleRequest** | [**NomadWriteRoleRequest**](NomadWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -11473,7 +11968,7 @@ Name | Type | Description | Notes -## NomadReadCredentials +## PkiConfigureAutoTidy @@ -11488,6 +11983,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -11498,10 +11994,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.NomadReadCredentials( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiConfigureAutoTidyRequestWithDefaults() + resp, err := client.Secrets.PkiConfigureAutoTidy( context.Background(), - name, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -11518,7 +12016,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -11526,18 +12024,18 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiConfigureAutoTidyRequest** | [**PkiConfigureAutoTidyRequest**](PkiConfigureAutoTidyRequest.md) | | - - (empty response body) +[**PkiConfigureAutoTidyResponse**](PkiConfigureAutoTidyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## NomadReadLeaseConfig +## PkiConfigureCa + -Configure the lease parameters for generated tokens ### Example @@ -11550,6 +12048,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -11560,8 +12059,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.NomadReadLeaseConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiConfigureCaRequestWithDefaults() + resp, err := client.Secrets.PkiConfigureCa( context.Background(), + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -11578,6 +12081,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -11585,15 +12089,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiConfigureCaRequest** | [**PkiConfigureCaRequest**](PkiConfigureCaRequest.md) | | - (empty response body) +[**PkiConfigureCaResponse**](PkiConfigureCaResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## NomadReadRole +## PkiConfigureCluster @@ -11608,6 +12113,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -11618,10 +12124,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.NomadReadRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiConfigureClusterRequestWithDefaults() + resp, err := client.Secrets.PkiConfigureCluster( context.Background(), - name, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -11638,7 +12146,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -11646,16 +12154,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiConfigureClusterRequest** | [**PkiConfigureClusterRequest**](PkiConfigureClusterRequest.md) | | - - (empty response body) +[**PkiConfigureClusterResponse**](PkiConfigureClusterResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## NomadWriteAccessConfig +## PkiConfigureCrl @@ -11681,9 +12189,11 @@ func main() { log.Fatal(err) } - request := schema.NewNomadWriteAccessConfigRequestWithDefaults() - resp, err := client.Secrets.NomadWriteAccessConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiConfigureCrlRequestWithDefaults() + resp, err := client.Secrets.PkiConfigureCrl( context.Background(), + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -11701,25 +12211,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **nomadWriteAccessConfigRequest** | [**NomadWriteAccessConfigRequest**](NomadWriteAccessConfigRequest.md) | | + **pkiConfigureCrlRequest** | [**PkiConfigureCrlRequest**](PkiConfigureCrlRequest.md) | | - (empty response body) +[**PkiConfigureCrlResponse**](PkiConfigureCrlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## NomadWriteLeaseConfig +## PkiConfigureIssuers + -Configure the lease parameters for generated tokens ### Example @@ -11743,9 +12254,11 @@ func main() { log.Fatal(err) } - request := schema.NewNomadWriteLeaseConfigRequestWithDefaults() - resp, err := client.Secrets.NomadWriteLeaseConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiConfigureIssuersRequestWithDefaults() + resp, err := client.Secrets.PkiConfigureIssuers( context.Background(), + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -11763,23 +12276,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **nomadWriteLeaseConfigRequest** | [**NomadWriteLeaseConfigRequest**](NomadWriteLeaseConfigRequest.md) | | + **pkiConfigureIssuersRequest** | [**PkiConfigureIssuersRequest**](PkiConfigureIssuersRequest.md) | | - (empty response body) +[**PkiConfigureIssuersResponse**](PkiConfigureIssuersResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## NomadWriteRole +## PkiConfigureKeys @@ -11805,11 +12319,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - request := schema.NewNomadWriteRoleRequestWithDefaults() - resp, err := client.Secrets.NomadWriteRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiConfigureKeysRequestWithDefaults() + resp, err := client.Secrets.PkiConfigureKeys( context.Background(), - name, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -11827,7 +12341,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -11835,19 +12349,18 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **nomadWriteRoleRequest** | [**NomadWriteRoleRequest**](NomadWriteRoleRequest.md) | | - + **pkiConfigureKeysRequest** | [**PkiConfigureKeysRequest**](PkiConfigureKeysRequest.md) | | - (empty response body) +[**PkiConfigureKeysResponse**](PkiConfigureKeysResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPCheckInLibrary +## PkiConfigureUrls + -Check service accounts in to the library. ### Example @@ -11871,11 +12384,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - request := schema.NewOpenLDAPCheckInLibraryRequestWithDefaults() - resp, err := client.Secrets.OpenLDAPCheckInLibrary( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiConfigureUrlsRequestWithDefaults() + resp, err := client.Secrets.PkiConfigureUrls( context.Background(), - name, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -11893,7 +12406,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -11901,19 +12414,18 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **openLDAPCheckInLibraryRequest** | [**OpenLDAPCheckInLibraryRequest**](OpenLDAPCheckInLibraryRequest.md) | | + **pkiConfigureUrlsRequest** | [**PkiConfigureUrlsRequest**](PkiConfigureUrlsRequest.md) | | - - (empty response body) +[**PkiConfigureUrlsResponse**](PkiConfigureUrlsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPCheckInManageLibrary +## PkiCrossSignIntermediate + -Check service accounts in to the library. ### Example @@ -11937,11 +12449,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - request := schema.NewOpenLDAPCheckInManageLibraryRequestWithDefaults() - resp, err := client.Secrets.OpenLDAPCheckInManageLibrary( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiCrossSignIntermediateRequestWithDefaults() + resp, err := client.Secrets.PkiCrossSignIntermediate( context.Background(), - name, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -11959,7 +12471,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -11967,19 +12479,18 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **openLDAPCheckInManageLibraryRequest** | [**OpenLDAPCheckInManageLibraryRequest**](OpenLDAPCheckInManageLibraryRequest.md) | | - + **pkiCrossSignIntermediateRequest** | [**PkiCrossSignIntermediateRequest**](PkiCrossSignIntermediateRequest.md) | | - (empty response body) +[**PkiCrossSignIntermediateResponse**](PkiCrossSignIntermediateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPCheckOutLibrary +## PkiDeleteIssuer + -Check a service account out from the library. ### Example @@ -11992,7 +12503,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12003,12 +12513,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set - request := schema.NewOpenLDAPCheckOutLibraryRequestWithDefaults() - resp, err := client.Secrets.OpenLDAPCheckOutLibrary( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiDeleteIssuer( context.Background(), - name, - request, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12025,7 +12535,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12033,7 +12544,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **openLDAPCheckOutLibraryRequest** | [**OpenLDAPCheckOutLibraryRequest**](OpenLDAPCheckOutLibraryRequest.md) | | (empty response body) @@ -12043,7 +12553,7 @@ Name | Type | Description | Notes -## OpenLDAPDeleteConfig +## PkiDeleteKey @@ -12068,8 +12578,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.OpenLDAPDeleteConfig( + keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiDeleteKey( context.Background(), + keyRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12086,6 +12600,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**keyRef** | **string** | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12094,6 +12610,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -12101,9 +12618,9 @@ Name | Type | Description | Notes -## OpenLDAPDeleteLibrary +## PkiDeleteRole + -Delete a library set. ### Example @@ -12126,10 +12643,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.OpenLDAPDeleteLibrary( + name := "name_example" // string | Name of the role + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiDeleteRole( context.Background(), name, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12146,7 +12665,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12163,7 +12683,7 @@ Name | Type | Description | Notes -## OpenLDAPDeleteRole +## PkiDeleteRoot @@ -12188,10 +12708,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role (lowercase) - resp, err := client.Secrets.OpenLDAPDeleteRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiDeleteRoot( context.Background(), - name, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12208,7 +12728,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role (lowercase) | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12217,7 +12737,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -12225,7 +12744,7 @@ Name | Type | Description | Notes -## OpenLDAPDeleteStaticRole +## PkiGenerateExportedKey @@ -12240,6 +12759,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12250,10 +12770,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.OpenLDAPDeleteStaticRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiGenerateExportedKeyRequestWithDefaults() + resp, err := client.Secrets.PkiGenerateExportedKey( context.Background(), - name, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12270,7 +12792,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12278,16 +12800,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiGenerateExportedKeyRequest** | [**PkiGenerateExportedKeyRequest**](PkiGenerateExportedKeyRequest.md) | | - - (empty response body) +[**PkiGenerateExportedKeyResponse**](PkiGenerateExportedKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPListLibraries +## PkiGenerateIntermediate @@ -12302,6 +12824,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12312,8 +12835,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.OpenLDAPListLibraries( + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiGenerateIntermediateRequestWithDefaults() + resp, err := client.Secrets.PkiGenerateIntermediate( context.Background(), + exported, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12330,23 +12859,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + **pkiGenerateIntermediateRequest** | [**PkiGenerateIntermediateRequest**](PkiGenerateIntermediateRequest.md) | | + +[**PkiGenerateIntermediateResponse**](PkiGenerateIntermediateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPListRoles +## PkiGenerateInternalKey @@ -12361,6 +12893,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12371,8 +12904,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.OpenLDAPListRoles( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiGenerateInternalKeyRequestWithDefaults() + resp, err := client.Secrets.PkiGenerateInternalKey( context.Background(), + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12389,23 +12926,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **pkiGenerateInternalKeyRequest** | [**PkiGenerateInternalKeyRequest**](PkiGenerateInternalKeyRequest.md) | | - (empty response body) +[**PkiGenerateInternalKeyResponse**](PkiGenerateInternalKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPListStaticRoles +## PkiGenerateKmsKey @@ -12420,6 +12958,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12430,8 +12969,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.OpenLDAPListStaticRoles( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiGenerateKmsKeyRequestWithDefaults() + resp, err := client.Secrets.PkiGenerateKmsKey( context.Background(), + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12448,23 +12991,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **pkiGenerateKmsKeyRequest** | [**PkiGenerateKmsKeyRequest**](PkiGenerateKmsKeyRequest.md) | | - (empty response body) +[**PkiGenerateKmsKeyResponse**](PkiGenerateKmsKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPReadConfig +## PkiGenerateRoot @@ -12479,6 +13023,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12489,8 +13034,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.OpenLDAPReadConfig( + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiGenerateRootRequestWithDefaults() + resp, err := client.Secrets.PkiGenerateRoot( context.Background(), + exported, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12507,6 +13058,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12515,14 +13068,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + **pkiGenerateRootRequest** | [**PkiGenerateRootRequest**](PkiGenerateRootRequest.md) | | + +[**PkiGenerateRootResponse**](PkiGenerateRootResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPReadCredentials +## PkiImportKey @@ -12537,6 +13092,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12547,10 +13103,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the dynamic role. - resp, err := client.Secrets.OpenLDAPReadCredentials( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiImportKeyRequestWithDefaults() + resp, err := client.Secrets.PkiImportKey( context.Background(), - name, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12567,7 +13125,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the dynamic role. | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12575,18 +13133,18 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiImportKeyRequest** | [**PkiImportKeyRequest**](PkiImportKeyRequest.md) | | - - (empty response body) +[**PkiImportKeyResponse**](PkiImportKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPReadLibrary +## PkiIssueWithRole + -Read a library set. ### Example @@ -12599,6 +13157,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12609,10 +13168,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.OpenLDAPReadLibrary( + role := "role_example" // string | The desired role with configuration for this request + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssueWithRoleRequestWithDefaults() + resp, err := client.Secrets.PkiIssueWithRole( context.Background(), - name, + role, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12629,7 +13192,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12638,17 +13202,18 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiIssueWithRoleRequest** | [**PkiIssueWithRoleRequest**](PkiIssueWithRoleRequest.md) | | - (empty response body) +[**PkiIssueWithRoleResponse**](PkiIssueWithRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPReadLibraryStatus +## PkiIssuerIssueWithRole + -Check the status of the service accounts in a library set. ### Example @@ -12661,6 +13226,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -12671,10 +13237,16 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - resp, err := client.Secrets.OpenLDAPReadLibraryStatus( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + role := "role_example" // string | The desired role with configuration for this request + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerIssueWithRoleRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerIssueWithRole( context.Background(), - name, + issuerRef, + role, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -12691,7 +13263,9 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12701,14 +13275,16 @@ Name | Type | Description | Notes - (empty response body) + **pkiIssuerIssueWithRoleRequest** | [**PkiIssuerIssueWithRoleRequest**](PkiIssuerIssueWithRoleRequest.md) | | + +[**PkiIssuerIssueWithRoleResponse**](PkiIssuerIssueWithRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPReadRole +## PkiIssuerReadCrl @@ -12733,10 +13309,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role (lowercase) - resp, err := client.Secrets.OpenLDAPReadRole( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiIssuerReadCrl( context.Background(), - name, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12753,7 +13331,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role (lowercase) | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12763,14 +13342,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiIssuerReadCrlResponse**](PkiIssuerReadCrlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPReadStaticCredentials +## PkiIssuerReadCrlDelta @@ -12795,10 +13374,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the static role. - resp, err := client.Secrets.OpenLDAPReadStaticCredentials( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiIssuerReadCrlDelta( context.Background(), - name, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12815,7 +13396,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the static role. | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12825,14 +13407,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiIssuerReadCrlDeltaResponse**](PkiIssuerReadCrlDeltaResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPReadStaticRole +## PkiIssuerReadCrlDeltaDer @@ -12857,10 +13439,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.OpenLDAPReadStaticRole( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiIssuerReadCrlDeltaDer( context.Background(), - name, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12877,7 +13461,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12887,14 +13472,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiIssuerReadCrlDeltaDerResponse**](PkiIssuerReadCrlDeltaDerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPRotateRole +## PkiIssuerReadCrlDeltaPem @@ -12919,10 +13504,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the static role - resp, err := client.Secrets.OpenLDAPRotateRole( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiIssuerReadCrlDeltaPem( context.Background(), - name, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12939,7 +13526,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the static role | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -12949,14 +13537,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiIssuerReadCrlDeltaPemResponse**](PkiIssuerReadCrlDeltaPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPRotateRoot +## PkiIssuerReadCrlDer @@ -12981,8 +13569,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.OpenLDAPRotateRoot( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiIssuerReadCrlDer( context.Background(), + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -12999,6 +13591,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13007,14 +13601,15 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + +[**PkiIssuerReadCrlDerResponse**](PkiIssuerReadCrlDerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPWriteConfig +## PkiIssuerReadCrlPem @@ -13029,7 +13624,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13040,10 +13634,12 @@ func main() { log.Fatal(err) } - request := schema.NewOpenLDAPWriteConfigRequestWithDefaults() - resp, err := client.Secrets.OpenLDAPWriteConfig( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiIssuerReadCrlPem( context.Background(), - request, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13060,25 +13656,27 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **openLDAPWriteConfigRequest** | [**OpenLDAPWriteConfigRequest**](OpenLDAPWriteConfigRequest.md) | | - (empty response body) + +[**PkiIssuerReadCrlPemResponse**](PkiIssuerReadCrlPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPWriteLibrary +## PkiIssuerResignCrls + -Update a library set. ### Example @@ -13102,11 +13700,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the set. - request := schema.NewOpenLDAPWriteLibraryRequestWithDefaults() - resp, err := client.Secrets.OpenLDAPWriteLibrary( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerResignCrlsRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerResignCrls( context.Background(), - name, + issuerRef, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13124,7 +13724,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the set. | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13132,17 +13733,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **openLDAPWriteLibraryRequest** | [**OpenLDAPWriteLibraryRequest**](OpenLDAPWriteLibraryRequest.md) | | + **pkiIssuerResignCrlsRequest** | [**PkiIssuerResignCrlsRequest**](PkiIssuerResignCrlsRequest.md) | | - (empty response body) +[**PkiIssuerResignCrlsResponse**](PkiIssuerResignCrlsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPWriteRole +## PkiIssuerSignIntermediate @@ -13168,11 +13769,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role (lowercase) - request := schema.NewOpenLDAPWriteRoleRequestWithDefaults() - resp, err := client.Secrets.OpenLDAPWriteRole( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerSignIntermediateRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerSignIntermediate( context.Background(), - name, + issuerRef, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13190,7 +13793,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role (lowercase) | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13198,17 +13802,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **openLDAPWriteRoleRequest** | [**OpenLDAPWriteRoleRequest**](OpenLDAPWriteRoleRequest.md) | | + **pkiIssuerSignIntermediateRequest** | [**PkiIssuerSignIntermediateRequest**](PkiIssuerSignIntermediateRequest.md) | | - (empty response body) +[**PkiIssuerSignIntermediateResponse**](PkiIssuerSignIntermediateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## OpenLDAPWriteStaticRole +## PkiIssuerSignRevocationList @@ -13234,11 +13838,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - request := schema.NewOpenLDAPWriteStaticRoleRequestWithDefaults() - resp, err := client.Secrets.OpenLDAPWriteStaticRole( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerSignRevocationListRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerSignRevocationList( context.Background(), - name, + issuerRef, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13256,7 +13862,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13264,17 +13871,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **openLDAPWriteStaticRoleRequest** | [**OpenLDAPWriteStaticRoleRequest**](OpenLDAPWriteStaticRoleRequest.md) | | + **pkiIssuerSignRevocationListRequest** | [**PkiIssuerSignRevocationListRequest**](PkiIssuerSignRevocationListRequest.md) | | - (empty response body) +[**PkiIssuerSignRevocationListResponse**](PkiIssuerSignRevocationListResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIBundleWrite +## PkiIssuerSignSelfIssued @@ -13300,9 +13907,13 @@ func main() { log.Fatal(err) } - request := schema.NewPKIBundleWriteRequestWithDefaults() - resp, err := client.Secrets.PKIBundleWrite( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerSignSelfIssuedRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerSignSelfIssued( context.Background(), + issuerRef, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13320,23 +13931,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIBundleWriteRequest** | [**PKIBundleWriteRequest**](PKIBundleWriteRequest.md) | | - (empty response body) + **pkiIssuerSignSelfIssuedRequest** | [**PkiIssuerSignSelfIssuedRequest**](PkiIssuerSignSelfIssuedRequest.md) | | + +[**PkiIssuerSignSelfIssuedResponse**](PkiIssuerSignSelfIssuedResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIDeleteKey +## PkiIssuerSignVerbatim @@ -13351,6 +13965,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13361,10 +13976,14 @@ func main() { log.Fatal(err) } - keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") - resp, err := client.Secrets.PKIDeleteKey( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerSignVerbatimRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerSignVerbatim( context.Background(), - keyRef, + issuerRef, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -13381,7 +14000,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**keyRef** | **string** | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. | [default to "default"] +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13390,15 +14010,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiIssuerSignVerbatimRequest** | [**PkiIssuerSignVerbatimRequest**](PkiIssuerSignVerbatimRequest.md) | | - (empty response body) +[**PkiIssuerSignVerbatimResponse**](PkiIssuerSignVerbatimResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIDeleteRole +## PkiIssuerSignVerbatimWithRole @@ -13413,6 +14034,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13423,10 +14045,16 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.PKIDeleteRole( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + role := "role_example" // string | The desired role with configuration for this request + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerSignVerbatimWithRoleRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerSignVerbatimWithRole( context.Background(), - name, + issuerRef, + role, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -13443,7 +14071,9 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13453,14 +14083,16 @@ Name | Type | Description | Notes - (empty response body) + **pkiIssuerSignVerbatimWithRoleRequest** | [**PkiIssuerSignVerbatimWithRoleRequest**](PkiIssuerSignVerbatimWithRoleRequest.md) | | + +[**PkiIssuerSignVerbatimWithRoleResponse**](PkiIssuerSignVerbatimWithRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIDeleteRoot +## PkiIssuerSignWithRole @@ -13475,6 +14107,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13485,8 +14118,16 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIDeleteRoot( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + role := "role_example" // string | The desired role with configuration for this request + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuerSignWithRoleRequestWithDefaults() + resp, err := client.Secrets.PkiIssuerSignWithRole( context.Background(), + issuerRef, + role, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -13503,6 +14144,9 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13511,14 +14155,17 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + + **pkiIssuerSignWithRoleRequest** | [**PkiIssuerSignWithRoleRequest**](PkiIssuerSignWithRoleRequest.md) | | + +[**PkiIssuerSignWithRoleResponse**](PkiIssuerSignWithRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIGenerateRoot +## PkiIssuersGenerateIntermediate @@ -13545,10 +14192,12 @@ func main() { } exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! - request := schema.NewPKIGenerateRootRequestWithDefaults() - resp, err := client.Secrets.PKIGenerateRoot( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuersGenerateIntermediateRequestWithDefaults() + resp, err := client.Secrets.PkiIssuersGenerateIntermediate( context.Background(), exported, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13567,6 +14216,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13574,17 +14224,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIGenerateRootRequest** | [**PKIGenerateRootRequest**](PKIGenerateRootRequest.md) | | + **pkiIssuersGenerateIntermediateRequest** | [**PkiIssuersGenerateIntermediateRequest**](PkiIssuersGenerateIntermediateRequest.md) | | - (empty response body) +[**PkiIssuersGenerateIntermediateResponse**](PkiIssuersGenerateIntermediateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIImportKeys +## PkiIssuersGenerateRoot @@ -13610,9 +14260,13 @@ func main() { log.Fatal(err) } - request := schema.NewPKIImportKeysRequestWithDefaults() - resp, err := client.Secrets.PKIImportKeys( + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuersGenerateRootRequestWithDefaults() + resp, err := client.Secrets.PkiIssuersGenerateRoot( context.Background(), + exported, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13630,23 +14284,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIImportKeysRequest** | [**PKIImportKeysRequest**](PKIImportKeysRequest.md) | | - (empty response body) + **pkiIssuersGenerateRootRequest** | [**PkiIssuersGenerateRootRequest**](PkiIssuersGenerateRootRequest.md) | | + +[**PkiIssuersGenerateRootResponse**](PkiIssuersGenerateRootResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerIssueRole +## PkiIssuersImportBundle @@ -13672,13 +14329,11 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - role := "role_example" // string | The desired role with configuration for this request - request := schema.NewPKIIssuerIssueRoleRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerIssueRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuersImportBundleRequestWithDefaults() + resp, err := client.Secrets.PkiIssuersImportBundle( context.Background(), - issuerRef, - role, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13696,8 +14351,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] -**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13705,18 +14359,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiIssuersImportBundleRequest** | [**PkiIssuersImportBundleRequest**](PkiIssuersImportBundleRequest.md) | | - **pKIIssuerIssueRoleRequest** | [**PKIIssuerIssueRoleRequest**](PKIIssuerIssueRoleRequest.md) | | - - - (empty response body) +[**PkiIssuersImportBundleResponse**](PkiIssuersImportBundleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerResignCRLs +## PkiIssuersImportCert @@ -13742,11 +14394,11 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - request := schema.NewPKIIssuerResignCRLsRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerResignCRLs( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuersImportCertRequestWithDefaults() + resp, err := client.Secrets.PkiIssuersImportCert( context.Background(), - issuerRef, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -13764,7 +14416,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13772,17 +14424,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuerResignCRLsRequest** | [**PKIIssuerResignCRLsRequest**](PKIIssuerResignCRLsRequest.md) | | - + **pkiIssuersImportCertRequest** | [**PkiIssuersImportCertRequest**](PkiIssuersImportCertRequest.md) | | - (empty response body) +[**PkiIssuersImportCertResponse**](PkiIssuersImportCertResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerRevoke +## PkiIssuersRotateRoot @@ -13797,6 +14448,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13807,10 +14459,14 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - resp, err := client.Secrets.PKIIssuerRevoke( + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiIssuersRotateRootRequestWithDefaults() + resp, err := client.Secrets.PkiIssuersRotateRoot( context.Background(), - issuerRef, + exported, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -13827,7 +14483,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13836,15 +14493,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiIssuersRotateRootRequest** | [**PkiIssuersRotateRootRequest**](PkiIssuersRotateRootRequest.md) | | - (empty response body) +[**PkiIssuersRotateRootResponse**](PkiIssuersRotateRootResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerSignIntermediate +## PkiListCerts @@ -13859,7 +14517,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13870,12 +14527,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - request := schema.NewPKIIssuerSignIntermediateRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerSignIntermediate( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiListCerts( context.Background(), - issuerRef, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13892,7 +14547,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13900,17 +14555,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuerSignIntermediateRequest** | [**PKIIssuerSignIntermediateRequest**](PKIIssuerSignIntermediateRequest.md) | | - + **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiListCertsResponse**](PkiListCertsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerSignRevocationList +## PkiListIssuers @@ -13925,7 +14579,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -13936,12 +14589,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - request := schema.NewPKIIssuerSignRevocationListRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerSignRevocationList( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiListIssuers( context.Background(), - issuerRef, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -13958,7 +14609,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -13966,17 +14617,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuerSignRevocationListRequest** | [**PKIIssuerSignRevocationListRequest**](PKIIssuerSignRevocationListRequest.md) | | - + **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiListIssuersResponse**](PkiListIssuersResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerSignRole +## PkiListKeys @@ -13991,7 +14641,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14002,14 +14651,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - role := "role_example" // string | The desired role with configuration for this request - request := schema.NewPKIIssuerSignRoleRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerSignRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiListKeys( context.Background(), - issuerRef, - role, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14026,8 +14671,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] -**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14035,18 +14679,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - **pKIIssuerSignRoleRequest** | [**PKIIssuerSignRoleRequest**](PKIIssuerSignRoleRequest.md) | | - - - (empty response body) +[**PkiListKeysResponse**](PkiListKeysResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerSignSelfIssued +## PkiListRevokedCerts @@ -14061,7 +14703,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14072,12 +14713,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - request := schema.NewPKIIssuerSignSelfIssuedRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerSignSelfIssued( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiListRevokedCerts( context.Background(), - issuerRef, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14094,7 +14733,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14102,17 +14741,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuerSignSelfIssuedRequest** | [**PKIIssuerSignSelfIssuedRequest**](PKIIssuerSignSelfIssuedRequest.md) | | - + **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiListRevokedCertsResponse**](PkiListRevokedCertsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerSignVerbatim +## PkiListRoles @@ -14127,7 +14765,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14138,12 +14775,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - request := schema.NewPKIIssuerSignVerbatimRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerSignVerbatim( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiListRoles( context.Background(), - issuerRef, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14160,7 +14795,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14168,17 +14803,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuerSignVerbatimRequest** | [**PKIIssuerSignVerbatimRequest**](PKIIssuerSignVerbatimRequest.md) | | - + **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiListRolesResponse**](PkiListRolesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuerSignVerbatimRole +## PkiQueryOcsp @@ -14193,7 +14827,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14204,14 +14837,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - role := "role_example" // string | The desired role with configuration for this request - request := schema.NewPKIIssuerSignVerbatimRoleRequestWithDefaults() - resp, err := client.Secrets.PKIIssuerSignVerbatimRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiQueryOcsp( context.Background(), - issuerRef, - role, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14228,8 +14857,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] -**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14238,9 +14866,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuerSignVerbatimRoleRequest** | [**PKIIssuerSignVerbatimRoleRequest**](PKIIssuerSignVerbatimRoleRequest.md) | | - - (empty response body) [[Back to top]](#) @@ -14248,7 +14873,7 @@ Name | Type | Description | Notes -## PKIIssuersGenerateIntermediate +## PkiQueryOcspWithGetReq @@ -14263,7 +14888,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14274,12 +14898,12 @@ func main() { log.Fatal(err) } - exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! - request := schema.NewPKIIssuersGenerateIntermediateRequestWithDefaults() - resp, err := client.Secrets.PKIIssuersGenerateIntermediate( + req := "req_example" // string | base-64 encoded ocsp request + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiQueryOcspWithGetReq( context.Background(), - exported, - request, + req, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14296,7 +14920,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**req** | **string** | base-64 encoded ocsp request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14304,7 +14929,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuersGenerateIntermediateRequest** | [**PKIIssuersGenerateIntermediateRequest**](PKIIssuersGenerateIntermediateRequest.md) | | (empty response body) @@ -14314,7 +14938,7 @@ Name | Type | Description | Notes -## PKIIssuersGenerateRoot +## PkiReadAutoTidyConfiguration @@ -14329,7 +14953,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -14340,12 +14963,10 @@ func main() { log.Fatal(err) } - exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! - request := schema.NewPKIIssuersGenerateRootRequestWithDefaults() - resp, err := client.Secrets.PKIIssuersGenerateRoot( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadAutoTidyConfiguration( context.Background(), - exported, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14362,7 +14983,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14370,17 +14991,15 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIIssuersGenerateRootRequest** | [**PKIIssuersGenerateRootRequest**](PKIIssuersGenerateRootRequest.md) | | - - (empty response body) +[**PkiReadAutoTidyConfigurationResponse**](PkiReadAutoTidyConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIIssuersList +## PkiReadCaChainPem @@ -14405,8 +15024,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIIssuersList( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCaChainPem( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14423,23 +15044,23 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiReadCaChainPemResponse**](PkiReadCaChainPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIListCerts +## PkiReadCaDer @@ -14464,8 +15085,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIListCerts( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCaDer( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14482,23 +15105,23 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiReadCaDerResponse**](PkiReadCaDerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIListCertsRevoked +## PkiReadCaPem @@ -14523,8 +15146,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIListCertsRevoked( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCaPem( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14541,23 +15166,23 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiReadCaPemResponse**](PkiReadCaPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIListKeys +## PkiReadCert @@ -14582,8 +15207,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIListKeys( + serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCert( context.Background(), + serial, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14600,23 +15229,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**serial** | **string** | Certificate serial number, in colon- or hyphen-separated octal | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + +[**PkiReadCertResponse**](PkiReadCertResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIListRoles +## PkiReadCertCaChain @@ -14641,8 +15272,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIListRoles( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCertCaChain( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14659,23 +15292,23 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) +[**PkiReadCertCaChainResponse**](PkiReadCertCaChainResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadAutoTidyConfig +## PkiReadCertCrl @@ -14700,8 +15333,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadAutoTidyConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCertCrl( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14718,6 +15353,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14726,14 +15362,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadCertCrlResponse**](PkiReadCertCrlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCA +## PkiReadCertDeltaCrl @@ -14758,8 +15394,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCA( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCertDeltaCrl( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14776,6 +15414,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14784,14 +15423,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadCertDeltaCrlResponse**](PkiReadCertDeltaCrlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCAChain +## PkiReadCertRawDer @@ -14816,8 +15455,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCAChain( + serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCertRawDer( context.Background(), + serial, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14834,6 +15477,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**serial** | **string** | Certificate serial number, in colon- or hyphen-separated octal | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14842,14 +15487,15 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + +[**PkiReadCertRawDerResponse**](PkiReadCertRawDerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCAPem +## PkiReadCertRawPem @@ -14874,8 +15520,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCAPem( + serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCertRawPem( context.Background(), + serial, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14892,6 +15542,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**serial** | **string** | Certificate serial number, in colon- or hyphen-separated octal | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14900,14 +15552,15 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + +[**PkiReadCertRawPemResponse**](PkiReadCertRawPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCRL +## PkiReadClusterConfiguration @@ -14932,8 +15585,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCRL( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadClusterConfiguration( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -14950,6 +15605,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -14958,14 +15614,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadClusterConfigurationResponse**](PkiReadClusterConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCRLConfig +## PkiReadCrlConfiguration @@ -14990,8 +15646,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCRLConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCrlConfiguration( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15008,6 +15666,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15016,14 +15675,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadCrlConfigurationResponse**](PkiReadCrlConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCRLRotate +## PkiReadCrlDelta @@ -15048,8 +15707,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCRLRotate( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCrlDelta( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15066,6 +15727,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15074,14 +15736,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadCrlDeltaResponse**](PkiReadCrlDeltaResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCRLRotateDelta +## PkiReadCrlDeltaPem @@ -15106,8 +15768,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCRLRotateDelta( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCrlDeltaPem( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15124,6 +15788,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15132,14 +15797,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadCrlDeltaPemResponse**](PkiReadCrlDeltaPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCert +## PkiReadCrlDer @@ -15164,10 +15829,10 @@ func main() { log.Fatal(err) } - serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal - resp, err := client.Secrets.PKIReadCert( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCrlDer( context.Background(), - serial, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15184,7 +15849,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**serial** | **string** | Certificate serial number, in colon- or hyphen-separated octal | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15193,15 +15858,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - (empty response body) +[**PkiReadCrlDerResponse**](PkiReadCrlDerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCertCAChain +## PkiReadCrlPem @@ -15226,8 +15890,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadCertCAChain( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadCrlPem( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15244,6 +15910,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15252,14 +15919,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadCrlPemResponse**](PkiReadCrlPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCertRaw +## PkiReadIssuer @@ -15284,10 +15951,12 @@ func main() { log.Fatal(err) } - serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal - resp, err := client.Secrets.PKIReadCertRaw( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadIssuer( context.Background(), - serial, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15304,7 +15973,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**serial** | **string** | Certificate serial number, in colon- or hyphen-separated octal | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15314,14 +15984,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiReadIssuerResponse**](PkiReadIssuerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadCertRawPem +## PkiReadIssuerDer @@ -15346,10 +16016,12 @@ func main() { log.Fatal(err) } - serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal - resp, err := client.Secrets.PKIReadCertRawPem( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadIssuerDer( context.Background(), - serial, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15366,7 +16038,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**serial** | **string** | Certificate serial number, in colon- or hyphen-separated octal | +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15376,14 +16049,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiReadIssuerDerResponse**](PkiReadIssuerDerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadClusterConfig +## PkiReadIssuerJson @@ -15408,8 +16081,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadClusterConfig( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadIssuerJson( context.Background(), + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15426,6 +16103,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15434,14 +16113,15 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + +[**PkiReadIssuerJsonResponse**](PkiReadIssuerJsonResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadDeltaCRL +## PkiReadIssuerPem @@ -15466,8 +16146,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadDeltaCRL( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadIssuerPem( context.Background(), + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15484,6 +16168,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15492,14 +16178,15 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + +[**PkiReadIssuerPemResponse**](PkiReadIssuerPemResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadIssuersConfig +## PkiReadIssuersConfiguration @@ -15524,8 +16211,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadIssuersConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadIssuersConfiguration( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15542,6 +16231,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15550,14 +16240,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadIssuersConfigurationResponse**](PkiReadIssuersConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadKey +## PkiReadKey @@ -15583,9 +16273,11 @@ func main() { } keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") - resp, err := client.Secrets.PKIReadKey( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadKey( context.Background(), keyRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15603,6 +16295,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **keyRef** | **string** | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15612,14 +16305,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiReadKeyResponse**](PkiReadKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadKeysConfig +## PkiReadKeysConfiguration @@ -15644,8 +16337,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadKeysConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadKeysConfiguration( context.Background(), + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15662,6 +16357,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15670,14 +16366,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PkiReadKeysConfigurationResponse**](PkiReadKeysConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadOCSPReq +## PkiReadRole @@ -15702,10 +16398,12 @@ func main() { log.Fatal(err) } - req := "req_example" // string | base-64 encoded ocsp request - resp, err := client.Secrets.PKIReadOCSPReq( + name := "name_example" // string | Name of the role + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadRole( context.Background(), - req, + name, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15722,7 +16420,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**req** | **string** | base-64 encoded ocsp request | +**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15732,14 +16431,14 @@ Name | Type | Description | Notes - (empty response body) +[**PkiReadRoleResponse**](PkiReadRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadRole +## PkiReadUrlsConfiguration @@ -15764,10 +16463,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.PKIReadRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiReadUrlsConfiguration( context.Background(), - name, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15784,7 +16483,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15793,15 +16492,14 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - (empty response body) +[**PkiReadUrlsConfigurationResponse**](PkiReadUrlsConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReadURLConfig +## PkiReplaceRoot @@ -15816,6 +16514,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15826,8 +16525,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIReadURLConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiReplaceRootRequestWithDefaults() + resp, err := client.Secrets.PkiReplaceRoot( context.Background(), + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -15844,6 +16547,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -15851,15 +16555,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiReplaceRootRequest** | [**PkiReplaceRootRequest**](PkiReplaceRootRequest.md) | | - (empty response body) +[**PkiReplaceRootResponse**](PkiReplaceRootResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIReplaceRoot +## PkiRevoke @@ -15885,9 +16590,11 @@ func main() { log.Fatal(err) } - request := schema.NewPKIReplaceRootRequestWithDefaults() - resp, err := client.Secrets.PKIReplaceRoot( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiRevokeRequestWithDefaults() + resp, err := client.Secrets.PkiRevoke( context.Background(), + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -15905,23 +16612,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIReplaceRootRequest** | [**PKIReplaceRootRequest**](PKIReplaceRootRequest.md) | | + **pkiRevokeRequest** | [**PkiRevokeRequest**](PkiRevokeRequest.md) | | - (empty response body) +[**PkiRevokeResponse**](PkiRevokeResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIRevoke +## PkiRevokeIssuer @@ -15936,7 +16644,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -15947,10 +16654,12 @@ func main() { log.Fatal(err) } - request := schema.NewPKIRevokeRequestWithDefaults() - resp, err := client.Secrets.PKIRevoke( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiRevokeIssuer( context.Background(), - request, + issuerRef, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -15967,23 +16676,25 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIRevokeRequest** | [**PKIRevokeRequest**](PKIRevokeRequest.md) | | - (empty response body) + +[**PkiRevokeIssuerResponse**](PkiRevokeIssuerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIRevokeWithKey +## PkiRevokeWithKey @@ -16009,9 +16720,11 @@ func main() { log.Fatal(err) } - request := schema.NewPKIRevokeWithKeyRequestWithDefaults() - resp, err := client.Secrets.PKIRevokeWithKey( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiRevokeWithKeyRequestWithDefaults() + resp, err := client.Secrets.PkiRevokeWithKey( context.Background(), + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16029,23 +16742,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIRevokeWithKeyRequest** | [**PKIRevokeWithKeyRequest**](PKIRevokeWithKeyRequest.md) | | + **pkiRevokeWithKeyRequest** | [**PkiRevokeWithKeyRequest**](PkiRevokeWithKeyRequest.md) | | - (empty response body) +[**PkiRevokeWithKeyResponse**](PkiRevokeWithKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIRootSignIntermediate +## PkiRootSignIntermediate @@ -16071,9 +16785,11 @@ func main() { log.Fatal(err) } - request := schema.NewPKIRootSignIntermediateRequestWithDefaults() - resp, err := client.Secrets.PKIRootSignIntermediate( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiRootSignIntermediateRequestWithDefaults() + resp, err := client.Secrets.PkiRootSignIntermediate( context.Background(), + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16091,23 +16807,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIRootSignIntermediateRequest** | [**PKIRootSignIntermediateRequest**](PKIRootSignIntermediateRequest.md) | | + **pkiRootSignIntermediateRequest** | [**PkiRootSignIntermediateRequest**](PkiRootSignIntermediateRequest.md) | | - (empty response body) +[**PkiRootSignIntermediateResponse**](PkiRootSignIntermediateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIRootSignSelfIssued +## PkiRootSignSelfIssued @@ -16133,9 +16850,11 @@ func main() { log.Fatal(err) } - request := schema.NewPKIRootSignSelfIssuedRequestWithDefaults() - resp, err := client.Secrets.PKIRootSignSelfIssued( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiRootSignSelfIssuedRequestWithDefaults() + resp, err := client.Secrets.PkiRootSignSelfIssued( context.Background(), + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16153,23 +16872,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIRootSignSelfIssuedRequest** | [**PKIRootSignSelfIssuedRequest**](PKIRootSignSelfIssuedRequest.md) | | + **pkiRootSignSelfIssuedRequest** | [**PkiRootSignSelfIssuedRequest**](PkiRootSignSelfIssuedRequest.md) | | - (empty response body) +[**PkiRootSignSelfIssuedResponse**](PkiRootSignSelfIssuedResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIRotateRoot +## PkiRotateCrl @@ -16184,7 +16904,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -16195,12 +16914,10 @@ func main() { log.Fatal(err) } - exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! - request := schema.NewPKIRotateRootRequestWithDefaults() - resp, err := client.Secrets.PKIRotateRoot( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiRotateCrl( context.Background(), - exported, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -16217,7 +16934,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -16225,17 +16942,15 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIRotateRootRequest** | [**PKIRotateRootRequest**](PKIRotateRootRequest.md) | | - - (empty response body) +[**PkiRotateCrlResponse**](PkiRotateCrlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKISignRole +## PkiRotateDeltaCrl @@ -16250,7 +16965,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -16261,12 +16975,10 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The desired role with configuration for this request - request := schema.NewPKISignRoleRequestWithDefaults() - resp, err := client.Secrets.PKISignRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiRotateDeltaCrl( context.Background(), - role, - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -16283,7 +16995,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -16291,17 +17003,15 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKISignRoleRequest** | [**PKISignRoleRequest**](PKISignRoleRequest.md) | | - - (empty response body) +[**PkiRotateDeltaCrlResponse**](PkiRotateDeltaCrlResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKISignVerbatim +## PkiSetSignedIntermediate @@ -16327,9 +17037,11 @@ func main() { log.Fatal(err) } - request := schema.NewPKISignVerbatimRequestWithDefaults() - resp, err := client.Secrets.PKISignVerbatim( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiSetSignedIntermediateRequestWithDefaults() + resp, err := client.Secrets.PkiSetSignedIntermediate( context.Background(), + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16347,23 +17059,24 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKISignVerbatimRequest** | [**PKISignVerbatimRequest**](PKISignVerbatimRequest.md) | | + **pkiSetSignedIntermediateRequest** | [**PkiSetSignedIntermediateRequest**](PkiSetSignedIntermediateRequest.md) | | - (empty response body) +[**PkiSetSignedIntermediateResponse**](PkiSetSignedIntermediateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKISignVerbatimRole +## PkiSignVerbatim @@ -16389,11 +17102,11 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The desired role with configuration for this request - request := schema.NewPKISignVerbatimRoleRequestWithDefaults() - resp, err := client.Secrets.PKISignVerbatimRole( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiSignVerbatimRequestWithDefaults() + resp, err := client.Secrets.PkiSignVerbatim( context.Background(), - role, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16411,7 +17124,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -16419,17 +17132,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKISignVerbatimRoleRequest** | [**PKISignVerbatimRoleRequest**](PKISignVerbatimRoleRequest.md) | | + **pkiSignVerbatimRequest** | [**PkiSignVerbatimRequest**](PkiSignVerbatimRequest.md) | | - - (empty response body) +[**PkiSignVerbatimResponse**](PkiSignVerbatimResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKITidy +## PkiSignVerbatimWithRole @@ -16455,9 +17167,13 @@ func main() { log.Fatal(err) } - request := schema.NewPKITidyRequestWithDefaults() - resp, err := client.Secrets.PKITidy( + role := "role_example" // string | The desired role with configuration for this request + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiSignVerbatimWithRoleRequestWithDefaults() + resp, err := client.Secrets.PkiSignVerbatimWithRole( context.Background(), + role, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16475,23 +17191,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKITidyRequest** | [**PKITidyRequest**](PKITidyRequest.md) | | - (empty response body) + **pkiSignVerbatimWithRoleRequest** | [**PkiSignVerbatimWithRoleRequest**](PkiSignVerbatimWithRoleRequest.md) | | + +[**PkiSignVerbatimWithRoleResponse**](PkiSignVerbatimWithRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKITidyCancel +## PkiSignWithRole @@ -16506,6 +17225,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -16516,8 +17236,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKITidyCancel( + role := "role_example" // string | The desired role with configuration for this request + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiSignWithRoleRequestWithDefaults() + resp, err := client.Secrets.PkiSignWithRole( context.Background(), + role, + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -16534,6 +17260,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | The desired role with configuration for this request | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -16542,14 +17270,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + **pkiSignWithRoleRequest** | [**PkiSignWithRoleRequest**](PkiSignWithRoleRequest.md) | | + +[**PkiSignWithRoleResponse**](PkiSignWithRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKITidyStatus +## PkiTidy @@ -16564,6 +17294,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -16574,8 +17305,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKITidyStatus( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiTidyRequestWithDefaults() + resp, err := client.Secrets.PkiTidy( context.Background(), + pkiMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -16592,6 +17327,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters @@ -16599,6 +17335,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pkiTidyRequest** | [**PkiTidyRequest**](PkiTidyRequest.md) | | (empty response body) @@ -16607,7 +17344,7 @@ Name | Type | Description | Notes -## PKIWriteAutoTidyConfig +## PkiTidyCancel @@ -16622,7 +17359,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -16633,10 +17369,10 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteAutoTidyConfigRequestWithDefaults() - resp, err := client.Secrets.PKIWriteAutoTidyConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiTidyCancel( context.Background(), - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -16653,23 +17389,23 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteAutoTidyConfigRequest** | [**PKIWriteAutoTidyConfigRequest**](PKIWriteAutoTidyConfigRequest.md) | | - (empty response body) +[**PkiTidyCancelResponse**](PkiTidyCancelResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIWriteCAConfig +## PkiTidyStatus @@ -16684,7 +17420,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -16695,10 +17430,10 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteCAConfigRequestWithDefaults() - resp, err := client.Secrets.PKIWriteCAConfig( + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + resp, err := client.Secrets.PkiTidyStatus( context.Background(), - request, + pkiMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -16715,23 +17450,23 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteCAConfigRequest** | [**PKIWriteCAConfigRequest**](PKIWriteCAConfigRequest.md) | | - (empty response body) +[**PkiTidyStatusResponse**](PkiTidyStatusResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIWriteCRLConfig +## PkiWriteIssuer @@ -16757,9 +17492,13 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteCRLConfigRequestWithDefaults() - resp, err := client.Secrets.PKIWriteCRLConfig( + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiWriteIssuerRequestWithDefaults() + resp, err := client.Secrets.PkiWriteIssuer( context.Background(), + issuerRef, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16777,23 +17516,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteCRLConfigRequest** | [**PKIWriteCRLConfigRequest**](PKIWriteCRLConfigRequest.md) | | - (empty response body) + **pkiWriteIssuerRequest** | [**PkiWriteIssuerRequest**](PkiWriteIssuerRequest.md) | | + +[**PkiWriteIssuerResponse**](PkiWriteIssuerResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIWriteCerts +## PkiWriteKey @@ -16819,9 +17561,13 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteCertsRequestWithDefaults() - resp, err := client.Secrets.PKIWriteCerts( + keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiWriteKeyRequestWithDefaults() + resp, err := client.Secrets.PkiWriteKey( context.Background(), + keyRef, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16839,23 +17585,26 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**keyRef** | **string** | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. | [default to "default"] +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteCertsRequest** | [**PKIWriteCertsRequest**](PKIWriteCertsRequest.md) | | - (empty response body) + **pkiWriteKeyRequest** | [**PkiWriteKeyRequest**](PkiWriteKeyRequest.md) | | + +[**PkiWriteKeyResponse**](PkiWriteKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIWriteClusterConfig +## PkiWriteRole @@ -16881,9 +17630,13 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteClusterConfigRequestWithDefaults() - resp, err := client.Secrets.PKIWriteClusterConfig( + name := "name_example" // string | Name of the role + pkiMountPath := "pkiMountPath_example" // string | Path that the backend was mounted at (defaults to "pki") + request := schema.NewPkiWriteRoleRequestWithDefaults() + resp, err := client.Secrets.PkiWriteRole( context.Background(), + name, + pkiMountPath, request, vault.WithToken("my-token"), ) @@ -16901,25 +17654,28 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**pkiMountPath** | **string** | Path that the backend was mounted at | [default to "pki"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteClusterConfigRequest** | [**PKIWriteClusterConfigRequest**](PKIWriteClusterConfigRequest.md) | | - (empty response body) + **pkiWriteRoleRequest** | [**PkiWriteRoleRequest**](PkiWriteRoleRequest.md) | | + +[**PkiWriteRoleResponse**](PkiWriteRoleResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PKIWriteIntermediateCrossSign - +## RabbitMqConfigureConnection +Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API. ### Example @@ -16943,9 +17699,11 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteIntermediateCrossSignRequestWithDefaults() - resp, err := client.Secrets.PKIWriteIntermediateCrossSign( + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + request := schema.NewRabbitMqConfigureConnectionRequestWithDefaults() + resp, err := client.Secrets.RabbitMqConfigureConnection( context.Background(), + rabbitmqMountPath, request, vault.WithToken("my-token"), ) @@ -16963,14 +17721,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteIntermediateCrossSignRequest** | [**PKIWriteIntermediateCrossSignRequest**](PKIWriteIntermediateCrossSignRequest.md) | | + **rabbitMqConfigureConnectionRequest** | [**RabbitMqConfigureConnectionRequest**](RabbitMqConfigureConnectionRequest.md) | | (empty response body) @@ -16979,7 +17738,7 @@ Name | Type | Description | Notes -## PKIWriteIntermediateGenerate +## RabbitMqConfigureLease @@ -17005,11 +17764,11 @@ func main() { log.Fatal(err) } - exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! - request := schema.NewPKIWriteIntermediateGenerateRequestWithDefaults() - resp, err := client.Secrets.PKIWriteIntermediateGenerate( + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + request := schema.NewRabbitMqConfigureLeaseRequestWithDefaults() + resp, err := client.Secrets.RabbitMqConfigureLease( context.Background(), - exported, + rabbitmqMountPath, request, vault.WithToken("my-token"), ) @@ -17027,7 +17786,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**exported** | **string** | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! | +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters @@ -17035,8 +17794,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteIntermediateGenerateRequest** | [**PKIWriteIntermediateGenerateRequest**](PKIWriteIntermediateGenerateRequest.md) | | - + **rabbitMqConfigureLeaseRequest** | [**RabbitMqConfigureLeaseRequest**](RabbitMqConfigureLeaseRequest.md) | | (empty response body) @@ -17045,9 +17803,9 @@ Name | Type | Description | Notes -## PKIWriteIntermediateSetSigned - +## RabbitMqDeleteRole +Manage the roles that can be created with this backend. ### Example @@ -17060,7 +17818,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17071,10 +17828,12 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteIntermediateSetSignedRequestWithDefaults() - resp, err := client.Secrets.PKIWriteIntermediateSetSigned( + name := "name_example" // string | Name of the role. + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + resp, err := client.Secrets.RabbitMqDeleteRole( context.Background(), - request, + name, + rabbitmqMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17091,13 +17850,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteIntermediateSetSignedRequest** | [**PKIWriteIntermediateSetSignedRequest**](PKIWriteIntermediateSetSignedRequest.md) | | + (empty response body) @@ -17107,9 +17868,9 @@ Name | Type | Description | Notes -## PKIWriteInternalExported - +## RabbitMqListRoles +Manage the roles that can be created with this backend. ### Example @@ -17122,7 +17883,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17133,10 +17893,10 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteInternalExportedRequestWithDefaults() - resp, err := client.Secrets.PKIWriteInternalExported( + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + resp, err := client.Secrets.RabbitMqListRoles( context.Background(), - request, + rabbitmqMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17153,14 +17913,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteInternalExportedRequest** | [**PKIWriteInternalExportedRequest**](PKIWriteInternalExportedRequest.md) | | + **list** | **string** | Must be set to `true` | (empty response body) @@ -17169,7 +17930,7 @@ Name | Type | Description | Notes -## PKIWriteIssueRole +## RabbitMqReadLeaseConfiguration @@ -17184,7 +17945,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17195,12 +17955,10 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The desired role with configuration for this request - request := schema.NewPKIWriteIssueRoleRequestWithDefaults() - resp, err := client.Secrets.PKIWriteIssueRole( + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + resp, err := client.Secrets.RabbitMqReadLeaseConfiguration( context.Background(), - role, - request, + rabbitmqMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17217,7 +17975,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The desired role with configuration for this request | +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters @@ -17225,8 +17983,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteIssueRoleRequest** | [**PKIWriteIssueRoleRequest**](PKIWriteIssueRoleRequest.md) | | - (empty response body) @@ -17235,9 +17991,9 @@ Name | Type | Description | Notes -## PKIWriteIssuersConfig - +## RabbitMqReadRole +Manage the roles that can be created with this backend. ### Example @@ -17250,7 +18006,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17261,10 +18016,12 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteIssuersConfigRequestWithDefaults() - resp, err := client.Secrets.PKIWriteIssuersConfig( + name := "name_example" // string | Name of the role. + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + resp, err := client.Secrets.RabbitMqReadRole( context.Background(), - request, + name, + rabbitmqMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17281,13 +18038,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteIssuersConfigRequest** | [**PKIWriteIssuersConfigRequest**](PKIWriteIssuersConfigRequest.md) | | + (empty response body) @@ -17297,9 +18056,9 @@ Name | Type | Description | Notes -## PKIWriteKMS - +## RabbitMqRequestCredentials +Request RabbitMQ credentials for a certain role. ### Example @@ -17312,7 +18071,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17323,10 +18081,12 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteKMSRequestWithDefaults() - resp, err := client.Secrets.PKIWriteKMS( + name := "name_example" // string | Name of the role. + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + resp, err := client.Secrets.RabbitMqRequestCredentials( context.Background(), - request, + name, + rabbitmqMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17343,13 +18103,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role. | +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteKMSRequest** | [**PKIWriteKMSRequest**](PKIWriteKMSRequest.md) | | + (empty response body) @@ -17359,9 +18121,9 @@ Name | Type | Description | Notes -## PKIWriteKey - +## RabbitMqWriteRole +Manage the roles that can be created with this backend. ### Example @@ -17385,11 +18147,13 @@ func main() { log.Fatal(err) } - keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") - request := schema.NewPKIWriteKeyRequestWithDefaults() - resp, err := client.Secrets.PKIWriteKey( + name := "name_example" // string | Name of the role. + rabbitmqMountPath := "rabbitmqMountPath_example" // string | Path that the backend was mounted at (defaults to "rabbitmq") + request := schema.NewRabbitMqWriteRoleRequestWithDefaults() + resp, err := client.Secrets.RabbitMqWriteRole( context.Background(), - keyRef, + name, + rabbitmqMountPath, request, vault.WithToken("my-token"), ) @@ -17407,7 +18171,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**keyRef** | **string** | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. | [default to "default"] +**name** | **string** | Name of the role. | +**rabbitmqMountPath** | **string** | Path that the backend was mounted at | [default to "rabbitmq"] ### Other Parameters @@ -17415,8 +18180,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteKeyRequest** | [**PKIWriteKeyRequest**](PKIWriteKeyRequest.md) | | + **rabbitMqWriteRoleRequest** | [**RabbitMqWriteRoleRequest**](RabbitMqWriteRoleRequest.md) | | (empty response body) @@ -17425,7 +18190,7 @@ Name | Type | Description | Notes -## PKIWriteKeysConfig +## SshConfigureCa @@ -17451,9 +18216,11 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteKeysConfigRequestWithDefaults() - resp, err := client.Secrets.PKIWriteKeysConfig( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshConfigureCaRequestWithDefaults() + resp, err := client.Secrets.SshConfigureCa( context.Background(), + sshMountPath, request, vault.WithToken("my-token"), ) @@ -17471,14 +18238,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteKeysConfigRequest** | [**PKIWriteKeysConfigRequest**](PKIWriteKeysConfigRequest.md) | | + **sshConfigureCaRequest** | [**SshConfigureCaRequest**](SshConfigureCaRequest.md) | | (empty response body) @@ -17487,7 +18255,7 @@ Name | Type | Description | Notes -## PKIWriteOCSP +## SshConfigureZeroAddress @@ -17502,6 +18270,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17512,8 +18281,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PKIWriteOCSP( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshConfigureZeroAddressRequestWithDefaults() + resp, err := client.Secrets.SshConfigureZeroAddress( context.Background(), + sshMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -17530,6 +18303,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -17537,6 +18311,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **sshConfigureZeroAddressRequest** | [**SshConfigureZeroAddressRequest**](SshConfigureZeroAddressRequest.md) | | (empty response body) @@ -17545,7 +18320,7 @@ Name | Type | Description | Notes -## PKIWriteRole +## SshDeleteCaConfiguration @@ -17560,7 +18335,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17571,12 +18345,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - request := schema.NewPKIWriteRoleRequestWithDefaults() - resp, err := client.Secrets.PKIWriteRole( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshDeleteCaConfiguration( context.Background(), - name, - request, + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17593,7 +18365,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -17601,8 +18373,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteRoleRequest** | [**PKIWriteRoleRequest**](PKIWriteRoleRequest.md) | | - (empty response body) @@ -17611,9 +18381,9 @@ Name | Type | Description | Notes -## PKIWriteURLConfig - +## SshDeleteRole +Manage the 'roles' that can be created with this backend. ### Example @@ -17626,7 +18396,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17637,10 +18406,12 @@ func main() { log.Fatal(err) } - request := schema.NewPKIWriteURLConfigRequestWithDefaults() - resp, err := client.Secrets.PKIWriteURLConfig( + role := "role_example" // string | [Required for all types] Name of the role being created. + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshDeleteRole( context.Background(), - request, + role, + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17657,13 +18428,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | [Required for all types] Name of the role being created. | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pKIWriteURLConfigRequest** | [**PKIWriteURLConfigRequest**](PKIWriteURLConfigRequest.md) | | + (empty response body) @@ -17673,7 +18446,7 @@ Name | Type | Description | Notes -## PkiDeleteIssuerRefDerPem +## SshDeleteZeroAddressConfiguration @@ -17698,10 +18471,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - resp, err := client.Secrets.PkiDeleteIssuerRefDerPem( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshDeleteZeroAddressConfiguration( context.Background(), - issuerRef, + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17718,7 +18491,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -17727,7 +18500,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -17735,9 +18507,9 @@ Name | Type | Description | Notes -## PkiDeleteJson - +## SshGenerateCredentials +Creates a credential for establishing SSH connection with the remote host. ### Example @@ -17750,6 +18522,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17760,8 +18533,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PkiDeleteJson( + role := "role_example" // string | [Required] Name of the role + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshGenerateCredentialsRequestWithDefaults() + resp, err := client.Secrets.SshGenerateCredentials( context.Background(), + role, + sshMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -17778,6 +18557,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | [Required] Name of the role | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -17786,6 +18567,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **sshGenerateCredentialsRequest** | [**SshGenerateCredentialsRequest**](SshGenerateCredentialsRequest.md) | | + (empty response body) [[Back to top]](#) @@ -17793,7 +18576,7 @@ Name | Type | Description | Notes -## PkiReadDelta +## SshIssueCertificate @@ -17808,6 +18591,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17818,8 +18602,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PkiReadDelta( + role := "role_example" // string | The desired role with configuration for this request. + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshIssueCertificateRequestWithDefaults() + resp, err := client.Secrets.SshIssueCertificate( context.Background(), + role, + sshMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -17836,6 +18626,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | The desired role with configuration for this request. | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -17844,6 +18636,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **sshIssueCertificateRequest** | [**SshIssueCertificateRequest**](SshIssueCertificateRequest.md) | | + (empty response body) [[Back to top]](#) @@ -17851,9 +18645,9 @@ Name | Type | Description | Notes -## PkiReadDeltaPem - +## SshListRoles +Manage the 'roles' that can be created with this backend. ### Example @@ -17876,8 +18670,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PkiReadDeltaPem( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshListRoles( context.Background(), + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -17894,6 +18690,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -17901,6 +18698,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -17909,9 +18707,9 @@ Name | Type | Description | Notes -## PkiReadDer - +## SshListRolesByIp +List all the roles associated with the given IP address. ### Example @@ -17924,6 +18722,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -17934,8 +18733,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PkiReadDer( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshListRolesByIpRequestWithDefaults() + resp, err := client.Secrets.SshListRolesByIp( context.Background(), + sshMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -17952,6 +18755,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -17959,6 +18763,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **sshListRolesByIpRequest** | [**SshListRolesByIpRequest**](SshListRolesByIpRequest.md) | | (empty response body) @@ -17967,7 +18772,7 @@ Name | Type | Description | Notes -## PkiReadIssuerRefCrlPemDerDeltaPem +## SshReadCaConfiguration @@ -17992,10 +18797,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - resp, err := client.Secrets.PkiReadIssuerRefCrlPemDerDeltaPem( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshReadCaConfiguration( context.Background(), - issuerRef, + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18012,7 +18817,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -18021,7 +18826,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -18029,9 +18833,9 @@ Name | Type | Description | Notes -## PkiReadIssuerRefDerPem - +## SshReadPublicKey +Retrieve the public key. ### Example @@ -18054,10 +18858,10 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - resp, err := client.Secrets.PkiReadIssuerRefDerPem( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshReadPublicKey( context.Background(), - issuerRef, + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18074,7 +18878,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -18083,7 +18887,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -18091,9 +18894,9 @@ Name | Type | Description | Notes -## PkiReadJson - +## SshReadRole +Manage the 'roles' that can be created with this backend. ### Example @@ -18116,8 +18919,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PkiReadJson( + role := "role_example" // string | [Required for all types] Name of the role being created. + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshReadRole( context.Background(), + role, + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18134,6 +18941,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | [Required for all types] Name of the role being created. | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -18142,6 +18951,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -18149,7 +18959,7 @@ Name | Type | Description | Notes -## PkiReadPem +## SshReadZeroAddressConfiguration @@ -18174,8 +18984,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.PkiReadPem( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshReadZeroAddressConfiguration( context.Background(), + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18192,6 +19004,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -18207,9 +19020,9 @@ Name | Type | Description | Notes -## PkiWriteIssuerRefDerPem - +## SshSignCertificate +Request signing an SSH key using a certain role with the provided details. ### Example @@ -18233,11 +19046,13 @@ func main() { log.Fatal(err) } - issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") - request := schema.NewPkiWriteIssuerRefDerPemRequestWithDefaults() - resp, err := client.Secrets.PkiWriteIssuerRefDerPem( + role := "role_example" // string | The desired role with configuration for this request. + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshSignCertificateRequestWithDefaults() + resp, err := client.Secrets.SshSignCertificate( context.Background(), - issuerRef, + role, + sshMountPath, request, vault.WithToken("my-token"), ) @@ -18255,7 +19070,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**issuerRef** | **string** | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. | [default to "default"] +**role** | **string** | The desired role with configuration for this request. | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -18263,8 +19079,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pkiWriteIssuerRefDerPemRequest** | [**PkiWriteIssuerRefDerPemRequest**](PkiWriteIssuerRefDerPemRequest.md) | | + **sshSignCertificateRequest** | [**SshSignCertificateRequest**](SshSignCertificateRequest.md) | | (empty response body) @@ -18273,9 +19089,9 @@ Name | Type | Description | Notes -## PkiWriteJson - +## SshTidyDynamicHostKeys +This endpoint removes the stored host keys used for the removed Dynamic Key feature, if present. ### Example @@ -18288,7 +19104,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -18299,10 +19114,10 @@ func main() { log.Fatal(err) } - request := schema.NewPkiWriteJsonRequestWithDefaults() - resp, err := client.Secrets.PkiWriteJson( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + resp, err := client.Secrets.SshTidyDynamicHostKeys( context.Background(), - request, + sshMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18319,13 +19134,13 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **pkiWriteJsonRequest** | [**PkiWriteJsonRequest**](PkiWriteJsonRequest.md) | | (empty response body) @@ -18335,9 +19150,9 @@ Name | Type | Description | Notes -## RabbitMQDeleteRole +## SshVerifyOtp -Manage the roles that can be created with this backend. +Validate the OTP provided by Vault SSH Agent. ### Example @@ -18350,6 +19165,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -18360,10 +19176,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.RabbitMQDeleteRole( + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshVerifyOtpRequestWithDefaults() + resp, err := client.Secrets.SshVerifyOtp( context.Background(), - name, + sshMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -18380,7 +19198,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters @@ -18388,7 +19206,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **sshVerifyOtpRequest** | [**SshVerifyOtpRequest**](SshVerifyOtpRequest.md) | | (empty response body) @@ -18397,9 +19215,9 @@ Name | Type | Description | Notes -## RabbitMQListRoles +## SshWriteRole -Manage the roles that can be created with this backend. +Manage the 'roles' that can be created with this backend. ### Example @@ -18412,6 +19230,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -18422,8 +19241,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.RabbitMQListRoles( + role := "role_example" // string | [Required for all types] Name of the role being created. + sshMountPath := "sshMountPath_example" // string | Path that the backend was mounted at (defaults to "ssh") + request := schema.NewSshWriteRoleRequestWithDefaults() + resp, err := client.Secrets.SshWriteRole( context.Background(), + role, + sshMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -18440,15 +19265,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**role** | **string** | [Required for all types] Name of the role being created. | +**sshMountPath** | **string** | Path that the backend was mounted at | [default to "ssh"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **sshWriteRoleRequest** | [**SshWriteRoleRequest**](SshWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -18456,9 +19284,9 @@ Name | Type | Description | Notes -## RabbitMQReadCredentials +## TerraformCloudConfigure + -Request RabbitMQ credentials for a certain role. ### Example @@ -18471,6 +19299,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -18481,10 +19310,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.RabbitMQReadCredentials( + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + request := schema.NewTerraformCloudConfigureRequestWithDefaults() + resp, err := client.Secrets.TerraformCloudConfigure( context.Background(), - name, + terraformMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -18501,7 +19332,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -18509,7 +19340,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **terraformCloudConfigureRequest** | [**TerraformCloudConfigureRequest**](TerraformCloudConfigureRequest.md) | | (empty response body) @@ -18518,9 +19349,9 @@ Name | Type | Description | Notes -## RabbitMQReadLeaseConfig +## TerraformCloudDeleteConfiguration + -Configure the lease parameters for generated credentials ### Example @@ -18543,8 +19374,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.RabbitMQReadLeaseConfig( + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudDeleteConfiguration( context.Background(), + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18561,6 +19394,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -18576,9 +19410,9 @@ Name | Type | Description | Notes -## RabbitMQReadRole +## TerraformCloudDeleteRole + -Manage the roles that can be created with this backend. ### Example @@ -18601,10 +19435,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - resp, err := client.Secrets.RabbitMQReadRole( + name := "name_example" // string | Name of the role + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudDeleteRole( context.Background(), name, + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18621,7 +19457,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**name** | **string** | Name of the role | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -18638,9 +19475,9 @@ Name | Type | Description | Notes -## RabbitMQWriteConnectionConfig +## TerraformCloudGenerateCredentials + -Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API. ### Example @@ -18653,7 +19490,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -18664,10 +19500,12 @@ func main() { log.Fatal(err) } - request := schema.NewRabbitMQWriteConnectionConfigRequestWithDefaults() - resp, err := client.Secrets.RabbitMQWriteConnectionConfig( + name := "name_example" // string | Name of the role + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudGenerateCredentials( context.Background(), - request, + name, + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18684,13 +19522,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **rabbitMQWriteConnectionConfigRequest** | [**RabbitMQWriteConnectionConfigRequest**](RabbitMQWriteConnectionConfigRequest.md) | | + (empty response body) @@ -18700,9 +19540,9 @@ Name | Type | Description | Notes -## RabbitMQWriteLeaseConfig +## TerraformCloudGenerateCredentials2 + -Configure the lease parameters for generated credentials ### Example @@ -18715,7 +19555,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -18726,10 +19565,12 @@ func main() { log.Fatal(err) } - request := schema.NewRabbitMQWriteLeaseConfigRequestWithDefaults() - resp, err := client.Secrets.RabbitMQWriteLeaseConfig( + name := "name_example" // string | Name of the role + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudGenerateCredentials2( context.Background(), - request, + name, + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18746,13 +19587,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **rabbitMQWriteLeaseConfigRequest** | [**RabbitMQWriteLeaseConfigRequest**](RabbitMQWriteLeaseConfigRequest.md) | | + (empty response body) @@ -18762,9 +19605,9 @@ Name | Type | Description | Notes -## RabbitMQWriteRole +## TerraformCloudListRoles + -Manage the roles that can be created with this backend. ### Example @@ -18777,7 +19620,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -18788,12 +19630,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role. - request := schema.NewRabbitMQWriteRoleRequestWithDefaults() - resp, err := client.Secrets.RabbitMQWriteRole( + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudListRoles( context.Background(), - name, - request, + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18810,7 +19650,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role. | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -18818,8 +19658,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **rabbitMQWriteRoleRequest** | [**RabbitMQWriteRoleRequest**](RabbitMQWriteRoleRequest.md) | | - + **list** | **string** | Must be set to `true` | (empty response body) @@ -18828,9 +19667,9 @@ Name | Type | Description | Notes -## SSHDeleteCAConfig +## TerraformCloudReadConfiguration + -Set the SSH private key used for signing certificates. ### Example @@ -18853,8 +19692,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.SSHDeleteCAConfig( + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudReadConfiguration( context.Background(), + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18871,6 +19712,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -18886,9 +19728,9 @@ Name | Type | Description | Notes -## SSHDeleteKeys +## TerraformCloudReadRole + -Register a shared private key with Vault. ### Example @@ -18911,10 +19753,12 @@ func main() { log.Fatal(err) } - keyName := "keyName_example" // string | [Required] Name of the key - resp, err := client.Secrets.SSHDeleteKeys( + name := "name_example" // string | Name of the role + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudReadRole( context.Background(), - keyName, + name, + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18931,7 +19775,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**keyName** | **string** | [Required] Name of the key | +**name** | **string** | Name of the role | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -18948,9 +19793,9 @@ Name | Type | Description | Notes -## SSHDeleteRole +## TerraformCloudRotateRole + -Manage the 'roles' that can be created with this backend. ### Example @@ -18973,10 +19818,12 @@ func main() { log.Fatal(err) } - role := "role_example" // string | [Required for all types] Name of the role being created. - resp, err := client.Secrets.SSHDeleteRole( + name := "name_example" // string | Name of the team or organization role + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + resp, err := client.Secrets.TerraformCloudRotateRole( context.Background(), - role, + name, + terraformMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -18993,7 +19840,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | [Required for all types] Name of the role being created. | +**name** | **string** | Name of the team or organization role | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -19010,9 +19858,9 @@ Name | Type | Description | Notes -## SSHDeleteZeroAddressConfig +## TerraformCloudWriteRole + -Assign zero address as default CIDR block for select roles. ### Example @@ -19025,6 +19873,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -19035,8 +19884,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.SSHDeleteZeroAddressConfig( + name := "name_example" // string | Name of the role + terraformMountPath := "terraformMountPath_example" // string | Path that the backend was mounted at (defaults to "terraform") + request := schema.NewTerraformCloudWriteRoleRequestWithDefaults() + resp, err := client.Secrets.TerraformCloudWriteRole( context.Background(), + name, + terraformMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -19053,6 +19908,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the role | +**terraformMountPath** | **string** | Path that the backend was mounted at | [default to "terraform"] ### Other Parameters @@ -19061,6 +19918,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **terraformCloudWriteRoleRequest** | [**TerraformCloudWriteRoleRequest**](TerraformCloudWriteRoleRequest.md) | | + (empty response body) [[Back to top]](#) @@ -19068,9 +19927,9 @@ Name | Type | Description | Notes -## SSHListRoles +## TotpCreateKey + -Manage the 'roles' that can be created with this backend. ### Example @@ -19083,6 +19942,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -19093,8 +19953,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.SSHListRoles( + name := "name_example" // string | Name of the key. + totpMountPath := "totpMountPath_example" // string | Path that the backend was mounted at (defaults to "totp") + request := schema.NewTotpCreateKeyRequestWithDefaults() + resp, err := client.Secrets.TotpCreateKey( context.Background(), + name, + totpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -19111,15 +19977,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key. | +**totpMountPath** | **string** | Path that the backend was mounted at | [default to "totp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **totpCreateKeyRequest** | [**TotpCreateKeyRequest**](TotpCreateKeyRequest.md) | | + (empty response body) [[Back to top]](#) @@ -19127,9 +19996,9 @@ Name | Type | Description | Notes -## SSHLookup +## TotpDeleteKey + -List all the roles associated with the given IP address. ### Example @@ -19142,7 +20011,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -19153,10 +20021,12 @@ func main() { log.Fatal(err) } - request := schema.NewSSHLookupRequestWithDefaults() - resp, err := client.Secrets.SSHLookup( + name := "name_example" // string | Name of the key. + totpMountPath := "totpMountPath_example" // string | Path that the backend was mounted at (defaults to "totp") + resp, err := client.Secrets.TotpDeleteKey( context.Background(), - request, + name, + totpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -19173,13 +20043,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key. | +**totpMountPath** | **string** | Path that the backend was mounted at | [default to "totp"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHLookupRequest** | [**SSHLookupRequest**](SSHLookupRequest.md) | | + (empty response body) @@ -19189,9 +20061,9 @@ Name | Type | Description | Notes -## SSHReadCAConfig +## TotpGenerateCode + -Set the SSH private key used for signing certificates. ### Example @@ -19214,8 +20086,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.SSHReadCAConfig( + name := "name_example" // string | Name of the key. + totpMountPath := "totpMountPath_example" // string | Path that the backend was mounted at (defaults to "totp") + resp, err := client.Secrets.TotpGenerateCode( context.Background(), + name, + totpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -19232,6 +20108,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key. | +**totpMountPath** | **string** | Path that the backend was mounted at | [default to "totp"] ### Other Parameters @@ -19240,6 +20118,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -19247,9 +20126,9 @@ Name | Type | Description | Notes -## SSHReadPublicKey +## TotpListKeys -Retrieve the public key. +Manage the keys that can be created with this backend. ### Example @@ -19272,8 +20151,10 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.SSHReadPublicKey( + totpMountPath := "totpMountPath_example" // string | Path that the backend was mounted at (defaults to "totp") + resp, err := client.Secrets.TotpListKeys( context.Background(), + totpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -19290,6 +20171,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**totpMountPath** | **string** | Path that the backend was mounted at | [default to "totp"] ### Other Parameters @@ -19297,6 +20179,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | (empty response body) @@ -19305,9 +20188,9 @@ Name | Type | Description | Notes -## SSHReadRole +## TotpReadKey + -Manage the 'roles' that can be created with this backend. ### Example @@ -19330,10 +20213,12 @@ func main() { log.Fatal(err) } - role := "role_example" // string | [Required for all types] Name of the role being created. - resp, err := client.Secrets.SSHReadRole( + name := "name_example" // string | Name of the key. + totpMountPath := "totpMountPath_example" // string | Path that the backend was mounted at (defaults to "totp") + resp, err := client.Secrets.TotpReadKey( context.Background(), - role, + name, + totpMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -19350,7 +20235,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | [Required for all types] Name of the role being created. | +**name** | **string** | Name of the key. | +**totpMountPath** | **string** | Path that the backend was mounted at | [default to "totp"] ### Other Parameters @@ -19367,9 +20253,9 @@ Name | Type | Description | Notes -## SSHReadZeroAddressConfig +## TotpValidateCode + -Assign zero address as default CIDR block for select roles. ### Example @@ -19382,6 +20268,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -19392,8 +20279,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.SSHReadZeroAddressConfig( + name := "name_example" // string | Name of the key. + totpMountPath := "totpMountPath_example" // string | Path that the backend was mounted at (defaults to "totp") + request := schema.NewTotpValidateCodeRequestWithDefaults() + resp, err := client.Secrets.TotpValidateCode( context.Background(), + name, + totpMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -19410,6 +20303,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key. | +**totpMountPath** | **string** | Path that the backend was mounted at | [default to "totp"] ### Other Parameters @@ -19418,6 +20313,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **totpValidateCodeRequest** | [**TotpValidateCodeRequest**](TotpValidateCodeRequest.md) | | + (empty response body) [[Back to top]](#) @@ -19425,9 +20322,9 @@ Name | Type | Description | Notes -## SSHSign +## TransitBackUpKey -Request signing an SSH key using a certain role with the provided details. +Backup the named key ### Example @@ -19440,7 +20337,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -19451,12 +20347,12 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The desired role with configuration for this request. - request := schema.NewSSHSignRequestWithDefaults() - resp, err := client.Secrets.SSHSign( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitBackUpKey( context.Background(), - role, - request, + name, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -19473,7 +20369,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The desired role with configuration for this request. | +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -19481,7 +20378,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHSignRequest** | [**SSHSignRequest**](SSHSignRequest.md) | | (empty response body) @@ -19491,9 +20387,9 @@ Name | Type | Description | Notes -## SSHVerify +## TransitConfigureCache -Validate the OTP provided by Vault SSH Agent. +Configures a new cache of the specified size ### Example @@ -19517,9 +20413,11 @@ func main() { log.Fatal(err) } - request := schema.NewSSHVerifyRequestWithDefaults() - resp, err := client.Secrets.SSHVerify( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitConfigureCacheRequestWithDefaults() + resp, err := client.Secrets.TransitConfigureCache( context.Background(), + transitMountPath, request, vault.WithToken("my-token"), ) @@ -19537,14 +20435,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHVerifyRequest** | [**SSHVerifyRequest**](SSHVerifyRequest.md) | | + **transitConfigureCacheRequest** | [**TransitConfigureCacheRequest**](TransitConfigureCacheRequest.md) | | (empty response body) @@ -19553,9 +20452,9 @@ Name | Type | Description | Notes -## SSHWriteCAConfig +## TransitConfigureKey -Set the SSH private key used for signing certificates. +Configure a named encryption key ### Example @@ -19579,9 +20478,13 @@ func main() { log.Fatal(err) } - request := schema.NewSSHWriteCAConfigRequestWithDefaults() - resp, err := client.Secrets.SSHWriteCAConfig( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitConfigureKeyRequestWithDefaults() + resp, err := client.Secrets.TransitConfigureKey( context.Background(), + name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -19599,15 +20502,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHWriteCAConfigRequest** | [**SSHWriteCAConfigRequest**](SSHWriteCAConfigRequest.md) | | + **transitConfigureKeyRequest** | [**TransitConfigureKeyRequest**](TransitConfigureKeyRequest.md) | | + (empty response body) [[Back to top]](#) @@ -19615,9 +20521,9 @@ Name | Type | Description | Notes -## SSHWriteCredentials +## TransitConfigureKeys + -Creates a credential for establishing SSH connection with the remote host. ### Example @@ -19641,11 +20547,11 @@ func main() { log.Fatal(err) } - role := "role_example" // string | [Required] Name of the role - request := schema.NewSSHWriteCredentialsRequestWithDefaults() - resp, err := client.Secrets.SSHWriteCredentials( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitConfigureKeysRequestWithDefaults() + resp, err := client.Secrets.TransitConfigureKeys( context.Background(), - role, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -19663,7 +20569,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | [Required] Name of the role | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -19671,8 +20577,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHWriteCredentialsRequest** | [**SSHWriteCredentialsRequest**](SSHWriteCredentialsRequest.md) | | - + **transitConfigureKeysRequest** | [**TransitConfigureKeysRequest**](TransitConfigureKeysRequest.md) | | (empty response body) @@ -19681,7 +20586,7 @@ Name | Type | Description | Notes -## SSHWriteIssue +## TransitCreateKey @@ -19707,11 +20612,13 @@ func main() { log.Fatal(err) } - role := "role_example" // string | The desired role with configuration for this request. - request := schema.NewSSHWriteIssueRequestWithDefaults() - resp, err := client.Secrets.SSHWriteIssue( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitCreateKeyRequestWithDefaults() + resp, err := client.Secrets.TransitCreateKey( context.Background(), - role, + name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -19729,7 +20636,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | The desired role with configuration for this request. | +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -19737,8 +20645,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHWriteIssueRequest** | [**SSHWriteIssueRequest**](SSHWriteIssueRequest.md) | | + **transitCreateKeyRequest** | [**TransitCreateKeyRequest**](TransitCreateKeyRequest.md) | | (empty response body) @@ -19747,9 +20655,9 @@ Name | Type | Description | Notes -## SSHWriteKeys +## TransitDecrypt -Register a shared private key with Vault. +Decrypt a ciphertext value using a named key ### Example @@ -19773,11 +20681,13 @@ func main() { log.Fatal(err) } - keyName := "keyName_example" // string | [Required] Name of the key - request := schema.NewSSHWriteKeysRequestWithDefaults() - resp, err := client.Secrets.SSHWriteKeys( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitDecryptRequestWithDefaults() + resp, err := client.Secrets.TransitDecrypt( context.Background(), - keyName, + name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -19795,7 +20705,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**keyName** | **string** | [Required] Name of the key | +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -19803,8 +20714,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHWriteKeysRequest** | [**SSHWriteKeysRequest**](SSHWriteKeysRequest.md) | | + **transitDecryptRequest** | [**TransitDecryptRequest**](TransitDecryptRequest.md) | | (empty response body) @@ -19813,9 +20724,9 @@ Name | Type | Description | Notes -## SSHWriteRole +## TransitDeleteKey + -Manage the 'roles' that can be created with this backend. ### Example @@ -19828,7 +20739,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -19839,12 +20749,12 @@ func main() { log.Fatal(err) } - role := "role_example" // string | [Required for all types] Name of the role being created. - request := schema.NewSSHWriteRoleRequestWithDefaults() - resp, err := client.Secrets.SSHWriteRole( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitDeleteKey( context.Background(), - role, - request, + name, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -19861,7 +20771,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**role** | **string** | [Required for all types] Name of the role being created. | +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -19869,7 +20780,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHWriteRoleRequest** | [**SSHWriteRoleRequest**](SSHWriteRoleRequest.md) | | (empty response body) @@ -19879,9 +20789,9 @@ Name | Type | Description | Notes -## SSHWriteZeroAddressConfig +## TransitEncrypt -Assign zero address as default CIDR block for select roles. +Encrypt a plaintext value or a batch of plaintext blocks using a named key ### Example @@ -19905,9 +20815,13 @@ func main() { log.Fatal(err) } - request := schema.NewSSHWriteZeroAddressConfigRequestWithDefaults() - resp, err := client.Secrets.SSHWriteZeroAddressConfig( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitEncryptRequestWithDefaults() + resp, err := client.Secrets.TransitEncrypt( context.Background(), + name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -19925,15 +20839,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **sSHWriteZeroAddressConfigRequest** | [**SSHWriteZeroAddressConfigRequest**](SSHWriteZeroAddressConfigRequest.md) | | + **transitEncryptRequest** | [**TransitEncryptRequest**](TransitEncryptRequest.md) | | + (empty response body) [[Back to top]](#) @@ -19941,9 +20858,9 @@ Name | Type | Description | Notes -## TOTPDeleteKey +## TransitExportKey -Manage the keys that can be created with this backend. +Export named encryption or signing key ### Example @@ -19966,10 +20883,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key. - resp, err := client.Secrets.TOTPDeleteKey( + name := "name_example" // string | Name of the key + type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key) + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitExportKey( context.Background(), name, + type_, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -19986,7 +20907,9 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key. | +**name** | **string** | Name of the key | +**type_** | **string** | Type of key to export (encryption-key, signing-key, hmac-key) | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -19996,6 +20919,7 @@ Name | Type | Description | Notes + (empty response body) [[Back to top]](#) @@ -20003,9 +20927,9 @@ Name | Type | Description | Notes -## TOTPListKeys +## TransitExportKeyVersion -Manage the keys that can be created with this backend. +Export named encryption or signing key ### Example @@ -20028,8 +20952,16 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.TOTPListKeys( + name := "name_example" // string | Name of the key + type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key) + version := "version_example" // string | Version of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitExportKeyVersion( context.Background(), + name, + type_, + version, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -20046,13 +20978,19 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key | +**type_** | **string** | Type of key to export (encryption-key, signing-key, hmac-key) | +**version** | **string** | Version of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + + + (empty response body) @@ -20062,9 +21000,9 @@ Name | Type | Description | Notes -## TOTPReadCode +## TransitGenerateDataKey -Request time-based one-time use password or validate a password for a certain key . +Generate a data key ### Example @@ -20077,6 +21015,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20087,10 +21026,16 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key. - resp, err := client.Secrets.TOTPReadCode( + name := "name_example" // string | The backend key used for encrypting the data key + plaintext := "plaintext_example" // string | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitGenerateDataKeyRequestWithDefaults() + resp, err := client.Secrets.TransitGenerateDataKey( context.Background(), name, + plaintext, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20107,7 +21052,9 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key. | +**name** | **string** | The backend key used for encrypting the data key | +**plaintext** | **string** | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20117,6 +21064,8 @@ Name | Type | Description | Notes + **transitGenerateDataKeyRequest** | [**TransitGenerateDataKeyRequest**](TransitGenerateDataKeyRequest.md) | | + (empty response body) [[Back to top]](#) @@ -20124,9 +21073,9 @@ Name | Type | Description | Notes -## TOTPReadKey +## TransitGenerateHmac -Manage the keys that can be created with this backend. +Generate an HMAC for input data using the named key ### Example @@ -20139,6 +21088,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20149,10 +21099,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key. - resp, err := client.Secrets.TOTPReadKey( + name := "name_example" // string | The key to use for the HMAC function + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitGenerateHmacRequestWithDefaults() + resp, err := client.Secrets.TransitGenerateHmac( context.Background(), name, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20169,7 +21123,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key. | +**name** | **string** | The key to use for the HMAC function | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20178,6 +21133,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitGenerateHmacRequest** | [**TransitGenerateHmacRequest**](TransitGenerateHmacRequest.md) | | (empty response body) @@ -20186,9 +21142,9 @@ Name | Type | Description | Notes -## TOTPWriteCode +## TransitGenerateHmacWithAlgorithm -Request time-based one-time use password or validate a password for a certain key . +Generate an HMAC for input data using the named key ### Example @@ -20212,11 +21168,15 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key. - request := schema.NewTOTPWriteCodeRequestWithDefaults() - resp, err := client.Secrets.TOTPWriteCode( + name := "name_example" // string | The key to use for the HMAC function + urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitGenerateHmacWithAlgorithmRequestWithDefaults() + resp, err := client.Secrets.TransitGenerateHmacWithAlgorithm( context.Background(), name, + urlalgorithm, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -20234,7 +21194,9 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key. | +**name** | **string** | The key to use for the HMAC function | +**urlalgorithm** | **string** | Algorithm to use (POST URL parameter) | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20242,9 +21204,10 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tOTPWriteCodeRequest** | [**TOTPWriteCodeRequest**](TOTPWriteCodeRequest.md) | | + **transitGenerateHmacWithAlgorithmRequest** | [**TransitGenerateHmacWithAlgorithmRequest**](TransitGenerateHmacWithAlgorithmRequest.md) | | + (empty response body) [[Back to top]](#) @@ -20252,9 +21215,9 @@ Name | Type | Description | Notes -## TOTPWriteKey +## TransitGenerateRandom -Manage the keys that can be created with this backend. +Generate random bytes ### Example @@ -20278,11 +21241,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key. - request := schema.NewTOTPWriteKeyRequestWithDefaults() - resp, err := client.Secrets.TOTPWriteKey( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitGenerateRandomRequestWithDefaults() + resp, err := client.Secrets.TransitGenerateRandom( context.Background(), - name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -20300,7 +21263,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key. | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20308,8 +21271,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tOTPWriteKeyRequest** | [**TOTPWriteKeyRequest**](TOTPWriteKeyRequest.md) | | - + **transitGenerateRandomRequest** | [**TransitGenerateRandomRequest**](TransitGenerateRandomRequest.md) | | (empty response body) @@ -20318,9 +21280,9 @@ Name | Type | Description | Notes -## TerraformDeleteConfig - +## TransitGenerateRandomWithBytes +Generate random bytes ### Example @@ -20333,6 +21295,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20343,8 +21306,14 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.TerraformDeleteConfig( + urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitGenerateRandomWithBytesRequestWithDefaults() + resp, err := client.Secrets.TransitGenerateRandomWithBytes( context.Background(), + urlbytes, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20361,6 +21330,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20369,6 +21340,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitGenerateRandomWithBytesRequest** | [**TransitGenerateRandomWithBytesRequest**](TransitGenerateRandomWithBytesRequest.md) | | + (empty response body) [[Back to top]](#) @@ -20376,9 +21349,9 @@ Name | Type | Description | Notes -## TerraformDeleteRole - +## TransitGenerateRandomWithSource +Generate random bytes ### Example @@ -20391,6 +21364,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20401,10 +21375,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.TerraformDeleteRole( + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitGenerateRandomWithSourceRequestWithDefaults() + resp, err := client.Secrets.TransitGenerateRandomWithSource( context.Background(), - name, + source, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20421,7 +21399,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20430,6 +21409,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitGenerateRandomWithSourceRequest** | [**TransitGenerateRandomWithSourceRequest**](TransitGenerateRandomWithSourceRequest.md) | | (empty response body) @@ -20438,9 +21418,9 @@ Name | Type | Description | Notes -## TerraformListRoles - +## TransitGenerateRandomWithSourceAndBytes +Generate random bytes ### Example @@ -20453,6 +21433,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20463,8 +21444,16 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.TerraformListRoles( + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") + urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitGenerateRandomWithSourceAndBytesRequestWithDefaults() + resp, err := client.Secrets.TransitGenerateRandomWithSourceAndBytes( context.Background(), + source, + urlbytes, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20481,15 +21470,20 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] +**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + + **transitGenerateRandomWithSourceAndBytesRequest** | [**TransitGenerateRandomWithSourceAndBytesRequest**](TransitGenerateRandomWithSourceAndBytesRequest.md) | | + (empty response body) [[Back to top]](#) @@ -20497,9 +21491,9 @@ Name | Type | Description | Notes -## TerraformReadConfig - +## TransitHash +Generate a hash sum for input data ### Example @@ -20512,6 +21506,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20522,8 +21517,12 @@ func main() { log.Fatal(err) } - resp, err := client.Secrets.TerraformReadConfig( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitHashRequestWithDefaults() + resp, err := client.Secrets.TransitHash( context.Background(), + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20540,6 +21539,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20547,6 +21547,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitHashRequest** | [**TransitHashRequest**](TransitHashRequest.md) | | (empty response body) @@ -20555,9 +21556,9 @@ Name | Type | Description | Notes -## TerraformReadCredentials +## TransitHashWithAlgorithm -Generate a Terraform Cloud or Enterprise API token from a specific Vault role. +Generate a hash sum for input data ### Example @@ -20570,6 +21571,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20580,10 +21582,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.TerraformReadCredentials( + urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitHashWithAlgorithmRequestWithDefaults() + resp, err := client.Secrets.TransitHashWithAlgorithm( context.Background(), - name, + urlalgorithm, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20600,7 +21606,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**urlalgorithm** | **string** | Algorithm to use (POST URL parameter) | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20609,6 +21616,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitHashWithAlgorithmRequest** | [**TransitHashWithAlgorithmRequest**](TransitHashWithAlgorithmRequest.md) | | (empty response body) @@ -20617,9 +21625,9 @@ Name | Type | Description | Notes -## TerraformReadRole - +## TransitImportKey +Imports an externally-generated key into a new transit key ### Example @@ -20632,6 +21640,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20642,10 +21651,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.TerraformReadRole( + name := "name_example" // string | The name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitImportKeyRequestWithDefaults() + resp, err := client.Secrets.TransitImportKey( context.Background(), name, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20662,7 +21675,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**name** | **string** | The name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20671,6 +21685,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitImportKeyRequest** | [**TransitImportKeyRequest**](TransitImportKeyRequest.md) | | (empty response body) @@ -20679,9 +21694,9 @@ Name | Type | Description | Notes -## TerraformRotateRole - +## TransitImportKeyVersion +Imports an externally-generated key into an existing imported key ### Example @@ -20694,6 +21709,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20704,10 +21720,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the team or organization role - resp, err := client.Secrets.TerraformRotateRole( + name := "name_example" // string | The name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitImportKeyVersionRequestWithDefaults() + resp, err := client.Secrets.TransitImportKeyVersion( context.Background(), name, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -20724,7 +21744,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the team or organization role | +**name** | **string** | The name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20733,6 +21754,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitImportKeyVersionRequest** | [**TransitImportKeyVersionRequest**](TransitImportKeyVersionRequest.md) | | (empty response body) @@ -20741,9 +21763,9 @@ Name | Type | Description | Notes -## TerraformWriteConfig - +## TransitListKeys +Managed named encryption keys ### Example @@ -20756,7 +21778,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20767,10 +21788,10 @@ func main() { log.Fatal(err) } - request := schema.NewTerraformWriteConfigRequestWithDefaults() - resp, err := client.Secrets.TerraformWriteConfig( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitListKeys( context.Background(), - request, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -20787,14 +21808,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **terraformWriteConfigRequest** | [**TerraformWriteConfigRequest**](TerraformWriteConfigRequest.md) | | + **list** | **string** | Must be set to `true` | (empty response body) @@ -20803,9 +21825,9 @@ Name | Type | Description | Notes -## TerraformWriteCredentials +## TransitReadCacheConfiguration -Generate a Terraform Cloud or Enterprise API token from a specific Vault role. +Returns the size of the active cache ### Example @@ -20828,10 +21850,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - resp, err := client.Secrets.TerraformWriteCredentials( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitReadCacheConfiguration( context.Background(), - name, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -20848,7 +21870,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -20857,7 +21879,6 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) [[Back to top]](#) @@ -20865,7 +21886,7 @@ Name | Type | Description | Notes -## TerraformWriteRole +## TransitReadKey @@ -20880,7 +21901,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -20891,1427 +21911,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the role - request := schema.NewTerraformWriteRoleRequestWithDefaults() - resp, err := client.Secrets.TerraformWriteRole( - context.Background(), - name, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the role | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **terraformWriteRoleRequest** | [**TerraformWriteRoleRequest**](TerraformWriteRoleRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitBackup - -Backup the named key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the key - resp, err := client.Secrets.TransitBackup( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitDecrypt - -Decrypt a ciphertext value using a named key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the key - request := schema.NewTransitDecryptRequestWithDefaults() - resp, err := client.Secrets.TransitDecrypt( - context.Background(), - name, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **transitDecryptRequest** | [**TransitDecryptRequest**](TransitDecryptRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitDeleteKey - -Managed named encryption keys - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the key - resp, err := client.Secrets.TransitDeleteKey( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitEncrypt - -Encrypt a plaintext value or a batch of plaintext blocks using a named key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the key - request := schema.NewTransitEncryptRequestWithDefaults() - resp, err := client.Secrets.TransitEncrypt( - context.Background(), - name, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **transitEncryptRequest** | [**TransitEncryptRequest**](TransitEncryptRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitExport - -Export named encryption or signing key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the key - type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key) - resp, err := client.Secrets.TransitExport( - context.Background(), - name, - type_, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | -**type_** | **string** | Type of key to export (encryption-key, signing-key, hmac-key) | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitExportVersion - -Export named encryption or signing key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the key - type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key) - version := "version_example" // string | Version of the key - resp, err := client.Secrets.TransitExportVersion( - context.Background(), - name, - type_, - version, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | -**type_** | **string** | Type of key to export (encryption-key, signing-key, hmac-key) | -**version** | **string** | Version of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitGenerateDataKey - -Generate a data key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | The backend key used for encrypting the data key - plaintext := "plaintext_example" // string | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. - request := schema.NewTransitGenerateDataKeyRequestWithDefaults() - resp, err := client.Secrets.TransitGenerateDataKey( - context.Background(), - name, - plaintext, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The backend key used for encrypting the data key | -**plaintext** | **string** | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - **transitGenerateDataKeyRequest** | [**TransitGenerateDataKeyRequest**](TransitGenerateDataKeyRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitGenerateHMAC - -Generate an HMAC for input data using the named key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | The key to use for the HMAC function - request := schema.NewTransitGenerateHMACRequestWithDefaults() - resp, err := client.Secrets.TransitGenerateHMAC( - context.Background(), - name, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The key to use for the HMAC function | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **transitGenerateHMACRequest** | [**TransitGenerateHMACRequest**](TransitGenerateHMACRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitGenerateHMACWithAlgorithm - -Generate an HMAC for input data using the named key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | The key to use for the HMAC function - urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) - request := schema.NewTransitGenerateHMACWithAlgorithmRequestWithDefaults() - resp, err := client.Secrets.TransitGenerateHMACWithAlgorithm( - context.Background(), - name, - urlalgorithm, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The key to use for the HMAC function | -**urlalgorithm** | **string** | Algorithm to use (POST URL parameter) | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - **transitGenerateHMACWithAlgorithmRequest** | [**TransitGenerateHMACWithAlgorithmRequest**](TransitGenerateHMACWithAlgorithmRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitGenerateRandom - -Generate random bytes - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - request := schema.NewTransitGenerateRandomRequestWithDefaults() - resp, err := client.Secrets.TransitGenerateRandom( - context.Background(), - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **transitGenerateRandomRequest** | [**TransitGenerateRandomRequest**](TransitGenerateRandomRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitGenerateRandomSource - -Generate random bytes - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") - request := schema.NewTransitGenerateRandomSourceRequestWithDefaults() - resp, err := client.Secrets.TransitGenerateRandomSource( - context.Background(), - source, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **transitGenerateRandomSourceRequest** | [**TransitGenerateRandomSourceRequest**](TransitGenerateRandomSourceRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitGenerateRandomSourceBytes - -Generate random bytes - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") - urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) - request := schema.NewTransitGenerateRandomSourceBytesRequestWithDefaults() - resp, err := client.Secrets.TransitGenerateRandomSourceBytes( - context.Background(), - source, - urlbytes, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] -**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - **transitGenerateRandomSourceBytesRequest** | [**TransitGenerateRandomSourceBytesRequest**](TransitGenerateRandomSourceBytesRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitHash - -Generate a hash sum for input data - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - request := schema.NewTransitHashRequestWithDefaults() - resp, err := client.Secrets.TransitHash( - context.Background(), - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **transitHashRequest** | [**TransitHashRequest**](TransitHashRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitHashWithAlgorithm - -Generate a hash sum for input data - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) - request := schema.NewTransitHashWithAlgorithmRequestWithDefaults() - resp, err := client.Secrets.TransitHashWithAlgorithm( - context.Background(), - urlalgorithm, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**urlalgorithm** | **string** | Algorithm to use (POST URL parameter) | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **transitHashWithAlgorithmRequest** | [**TransitHashWithAlgorithmRequest**](TransitHashWithAlgorithmRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitImportKey - -Imports an externally-generated key into a new transit key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | The name of the key - request := schema.NewTransitImportKeyRequestWithDefaults() - resp, err := client.Secrets.TransitImportKey( - context.Background(), - name, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **transitImportKeyRequest** | [**TransitImportKeyRequest**](TransitImportKeyRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitImportKeyVersion - -Imports an externally-generated key into an existing imported key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | The name of the key - request := schema.NewTransitImportKeyVersionRequestWithDefaults() - resp, err := client.Secrets.TransitImportKeyVersion( - context.Background(), - name, - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **transitImportKeyVersionRequest** | [**TransitImportKeyVersionRequest**](TransitImportKeyVersionRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitListKeys - -Managed named encryption keys - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Secrets.TransitListKeys( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitReadCacheConfig - -Returns the size of the active cache - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Secrets.TransitReadCacheConfig( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitReadConfigKeys - -Configuration common across all keys - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Secrets.TransitReadConfigKeys( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitReadKey - -Managed named encryption keys - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | Name of the key - resp, err := client.Secrets.TransitReadKey( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitReadWrappingKey - -Returns the public key to use for wrapping imported keys - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.Secrets.TransitReadWrappingKey( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitRestore - -Restore the named key - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - request := schema.NewTransitRestoreRequestWithDefaults() - resp, err := client.Secrets.TransitRestore( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitReadKey( context.Background(), - request, + name, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -22328,13 +21933,15 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitRestoreRequest** | [**TransitRestoreRequest**](TransitRestoreRequest.md) | | + (empty response body) @@ -22344,9 +21951,9 @@ Name | Type | Description | Notes -## TransitRestoreKey +## TransitReadKeysConfiguration + -Restore the named key ### Example @@ -22359,7 +21966,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -22370,12 +21976,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | If set, this will be the name of the restored key. - request := schema.NewTransitRestoreKeyRequestWithDefaults() - resp, err := client.Secrets.TransitRestoreKey( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitReadKeysConfiguration( context.Background(), - name, - request, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -22392,7 +21996,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | If set, this will be the name of the restored key. | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22400,8 +22004,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitRestoreKeyRequest** | [**TransitRestoreKeyRequest**](TransitRestoreKeyRequest.md) | | - (empty response body) @@ -22410,9 +22012,9 @@ Name | Type | Description | Notes -## TransitRewrap +## TransitReadWrappingKey -Rewrap ciphertext +Returns the public key to use for wrapping imported keys ### Example @@ -22425,7 +22027,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -22436,12 +22037,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key - request := schema.NewTransitRewrapRequestWithDefaults() - resp, err := client.Secrets.TransitRewrap( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + resp, err := client.Secrets.TransitReadWrappingKey( context.Background(), - name, - request, + transitMountPath, vault.WithToken("my-token"), ) if err != nil { @@ -22458,7 +22057,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22466,8 +22065,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitRewrapRequest** | [**TransitRewrapRequest**](TransitRewrapRequest.md) | | - (empty response body) @@ -22476,9 +22073,9 @@ Name | Type | Description | Notes -## TransitRotateKey +## TransitRestoreAndRenameKey -Rotate named encryption key +Restore the named key ### Example @@ -22491,6 +22088,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -22501,10 +22099,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key - resp, err := client.Secrets.TransitRotateKey( + name := "name_example" // string | If set, this will be the name of the restored key. + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitRestoreAndRenameKeyRequestWithDefaults() + resp, err := client.Secrets.TransitRestoreAndRenameKey( context.Background(), name, + transitMountPath, + request, vault.WithToken("my-token"), ) if err != nil { @@ -22521,7 +22123,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | +**name** | **string** | If set, this will be the name of the restored key. | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22530,6 +22133,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **transitRestoreAndRenameKeyRequest** | [**TransitRestoreAndRenameKeyRequest**](TransitRestoreAndRenameKeyRequest.md) | | (empty response body) @@ -22538,9 +22142,9 @@ Name | Type | Description | Notes -## TransitSign +## TransitRestoreKey -Generate a signature for input data using the named key +Restore the named key ### Example @@ -22564,11 +22168,11 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The key to use - request := schema.NewTransitSignRequestWithDefaults() - resp, err := client.Secrets.TransitSign( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitRestoreKeyRequestWithDefaults() + resp, err := client.Secrets.TransitRestoreKey( context.Background(), - name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -22586,7 +22190,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The key to use | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22594,8 +22198,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitSignRequest** | [**TransitSignRequest**](TransitSignRequest.md) | | - + **transitRestoreKeyRequest** | [**TransitRestoreKeyRequest**](TransitRestoreKeyRequest.md) | | (empty response body) @@ -22604,9 +22207,9 @@ Name | Type | Description | Notes -## TransitSignWithAlgorithm +## TransitRewrap -Generate a signature for input data using the named key +Rewrap ciphertext ### Example @@ -22630,13 +22233,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The key to use - urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) - request := schema.NewTransitSignWithAlgorithmRequestWithDefaults() - resp, err := client.Secrets.TransitSignWithAlgorithm( + name := "name_example" // string | Name of the key + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitRewrapRequestWithDefaults() + resp, err := client.Secrets.TransitRewrap( context.Background(), name, - urlalgorithm, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -22654,8 +22257,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The key to use | -**urlalgorithm** | **string** | Hash algorithm to use (POST URL parameter) | +**name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22664,8 +22267,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitSignWithAlgorithmRequest** | [**TransitSignWithAlgorithmRequest**](TransitSignWithAlgorithmRequest.md) | | - + **transitRewrapRequest** | [**TransitRewrapRequest**](TransitRewrapRequest.md) | | (empty response body) @@ -22674,9 +22276,9 @@ Name | Type | Description | Notes -## TransitTrimKey +## TransitRotateKey -Trim key versions of a named key +Rotate named encryption key ### Example @@ -22701,10 +22303,12 @@ func main() { } name := "name_example" // string | Name of the key - request := schema.NewTransitTrimKeyRequestWithDefaults() - resp, err := client.Secrets.TransitTrimKey( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitRotateKeyRequestWithDefaults() + resp, err := client.Secrets.TransitRotateKey( context.Background(), name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -22723,6 +22327,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22730,8 +22335,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitTrimKeyRequest** | [**TransitTrimKeyRequest**](TransitTrimKeyRequest.md) | | + **transitRotateKeyRequest** | [**TransitRotateKeyRequest**](TransitRotateKeyRequest.md) | | (empty response body) @@ -22740,9 +22345,9 @@ Name | Type | Description | Notes -## TransitVerify +## TransitSign -Verify a signature or HMAC for input data created using the named key +Generate a signature for input data using the named key ### Example @@ -22767,10 +22372,12 @@ func main() { } name := "name_example" // string | The key to use - request := schema.NewTransitVerifyRequestWithDefaults() - resp, err := client.Secrets.TransitVerify( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitSignRequestWithDefaults() + resp, err := client.Secrets.TransitSign( context.Background(), name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -22789,6 +22396,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | The key to use | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22796,8 +22404,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitVerifyRequest** | [**TransitVerifyRequest**](TransitVerifyRequest.md) | | + **transitSignRequest** | [**TransitSignRequest**](TransitSignRequest.md) | | (empty response body) @@ -22806,9 +22414,9 @@ Name | Type | Description | Notes -## TransitVerifyWithAlgorithm +## TransitSignWithAlgorithm -Verify a signature or HMAC for input data created using the named key +Generate a signature for input data using the named key ### Example @@ -22834,11 +22442,13 @@ func main() { name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) - request := schema.NewTransitVerifyWithAlgorithmRequestWithDefaults() - resp, err := client.Secrets.TransitVerifyWithAlgorithm( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitSignWithAlgorithmRequestWithDefaults() + resp, err := client.Secrets.TransitSignWithAlgorithm( context.Background(), name, urlalgorithm, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -22858,6 +22468,7 @@ Name | Type | Description | Notes **ctx** | **context.Context** | context for request cancellation **name** | **string** | The key to use | **urlalgorithm** | **string** | Hash algorithm to use (POST URL parameter) | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -22866,132 +22477,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitVerifyWithAlgorithmRequest** | [**TransitVerifyWithAlgorithmRequest**](TransitVerifyWithAlgorithmRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitWriteCacheConfig - -Configures a new cache of the specified size - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - request := schema.NewTransitWriteCacheConfigRequestWithDefaults() - resp, err := client.Secrets.TransitWriteCacheConfig( - context.Background(), - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **transitWriteCacheConfigRequest** | [**TransitWriteCacheConfigRequest**](TransitWriteCacheConfigRequest.md) | | - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## TransitWriteConfigKeys - -Configuration common across all keys - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - request := schema.NewTransitWriteConfigKeysRequestWithDefaults() - resp, err := client.Secrets.TransitWriteConfigKeys( - context.Background(), - request, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **transitWriteConfigKeysRequest** | [**TransitWriteConfigKeysRequest**](TransitWriteConfigKeysRequest.md) | | + **transitSignWithAlgorithmRequest** | [**TransitSignWithAlgorithmRequest**](TransitSignWithAlgorithmRequest.md) | | (empty response body) @@ -23000,9 +22487,9 @@ Name | Type | Description | Notes -## TransitWriteKey +## TransitTrimKey -Managed named encryption keys +Trim key versions of a named key ### Example @@ -23027,10 +22514,12 @@ func main() { } name := "name_example" // string | Name of the key - request := schema.NewTransitWriteKeyRequestWithDefaults() - resp, err := client.Secrets.TransitWriteKey( + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitTrimKeyRequestWithDefaults() + resp, err := client.Secrets.TransitTrimKey( context.Background(), name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -23049,6 +22538,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation **name** | **string** | Name of the key | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -23056,8 +22546,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitWriteKeyRequest** | [**TransitWriteKeyRequest**](TransitWriteKeyRequest.md) | | + **transitTrimKeyRequest** | [**TransitTrimKeyRequest**](TransitTrimKeyRequest.md) | | (empty response body) @@ -23066,9 +22556,9 @@ Name | Type | Description | Notes -## TransitWriteKeyConfig +## TransitVerify -Configure a named encryption key +Verify a signature or HMAC for input data created using the named key ### Example @@ -23092,11 +22582,13 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the key - request := schema.NewTransitWriteKeyConfigRequestWithDefaults() - resp, err := client.Secrets.TransitWriteKeyConfig( + name := "name_example" // string | The key to use + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitVerifyRequestWithDefaults() + resp, err := client.Secrets.TransitVerify( context.Background(), name, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -23114,7 +22606,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the key | +**name** | **string** | The key to use | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -23122,8 +22615,8 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitWriteKeyConfigRequest** | [**TransitWriteKeyConfigRequest**](TransitWriteKeyConfigRequest.md) | | + **transitVerifyRequest** | [**TransitVerifyRequest**](TransitVerifyRequest.md) | | (empty response body) @@ -23132,9 +22625,9 @@ Name | Type | Description | Notes -## TransitWriteRandomUrlbytes +## TransitVerifyWithAlgorithm -Generate random bytes +Verify a signature or HMAC for input data created using the named key ### Example @@ -23158,11 +22651,15 @@ func main() { log.Fatal(err) } - urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) - request := schema.NewTransitWriteRandomUrlbytesRequestWithDefaults() - resp, err := client.Secrets.TransitWriteRandomUrlbytes( + name := "name_example" // string | The key to use + urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) + transitMountPath := "transitMountPath_example" // string | Path that the backend was mounted at (defaults to "transit") + request := schema.NewTransitVerifyWithAlgorithmRequestWithDefaults() + resp, err := client.Secrets.TransitVerifyWithAlgorithm( context.Background(), - urlbytes, + name, + urlalgorithm, + transitMountPath, request, vault.WithToken("my-token"), ) @@ -23180,7 +22677,9 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | +**name** | **string** | The key to use | +**urlalgorithm** | **string** | Hash algorithm to use (POST URL parameter) | +**transitMountPath** | **string** | Path that the backend was mounted at | [default to "transit"] ### Other Parameters @@ -23188,9 +22687,10 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **transitWriteRandomUrlbytesRequest** | [**TransitWriteRandomUrlbytesRequest**](TransitWriteRandomUrlbytesRequest.md) | | + **transitVerifyWithAlgorithmRequest** | [**TransitVerifyWithAlgorithmRequest**](TransitVerifyWithAlgorithmRequest.md) | | + (empty response body) [[Back to top]](#) diff --git a/docs/SSHWriteCAConfigRequest.md b/docs/SshConfigureCaRequest.md similarity index 69% rename from docs/SSHWriteCAConfigRequest.md rename to docs/SshConfigureCaRequest.md index b99619c0..164d0842 100644 --- a/docs/SSHWriteCAConfigRequest.md +++ b/docs/SshConfigureCaRequest.md @@ -1,4 +1,4 @@ -# SSHWriteCAConfigRequest +# SshConfigureCaRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewSSHWriteCAConfigRequest +### NewSshConfigureCaRequest -`func NewSSHWriteCAConfigRequest() *SSHWriteCAConfigRequest` +`func NewSshConfigureCaRequest() *SshConfigureCaRequest` -NewSSHWriteCAConfigRequest instantiates a new SSHWriteCAConfigRequest object +NewSshConfigureCaRequest instantiates a new SshConfigureCaRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHWriteCAConfigRequestWithDefaults +### NewSshConfigureCaRequestWithDefaults -`func NewSSHWriteCAConfigRequestWithDefaults() *SSHWriteCAConfigRequest` +`func NewSshConfigureCaRequestWithDefaults() *SshConfigureCaRequest` -NewSSHWriteCAConfigRequestWithDefaults instantiates a new SSHWriteCAConfigRequest object +NewSshConfigureCaRequestWithDefaults instantiates a new SshConfigureCaRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetGenerateSigningKey -`func (o *SSHWriteCAConfigRequest) GetGenerateSigningKey() bool` +`func (o *SshConfigureCaRequest) GetGenerateSigningKey() bool` GetGenerateSigningKey returns the GenerateSigningKey field if non-nil, zero value otherwise. ### GetGenerateSigningKeyOk -`func (o *SSHWriteCAConfigRequest) GetGenerateSigningKeyOk() (*bool, bool)` +`func (o *SshConfigureCaRequest) GetGenerateSigningKeyOk() (*bool, bool)` GetGenerateSigningKeyOk returns a tuple with the GenerateSigningKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGenerateSigningKey -`func (o *SSHWriteCAConfigRequest) SetGenerateSigningKey(v bool)` +`func (o *SshConfigureCaRequest) SetGenerateSigningKey(v bool)` SetGenerateSigningKey sets GenerateSigningKey field to given value. ### HasGenerateSigningKey -`func (o *SSHWriteCAConfigRequest) HasGenerateSigningKey() bool` +`func (o *SshConfigureCaRequest) HasGenerateSigningKey() bool` HasGenerateSigningKey returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasGenerateSigningKey returns a boolean if a field has been set. ### GetKeyBits -`func (o *SSHWriteCAConfigRequest) GetKeyBits() int32` +`func (o *SshConfigureCaRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *SSHWriteCAConfigRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *SshConfigureCaRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *SSHWriteCAConfigRequest) SetKeyBits(v int32)` +`func (o *SshConfigureCaRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *SSHWriteCAConfigRequest) HasKeyBits() bool` +`func (o *SshConfigureCaRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyType -`func (o *SSHWriteCAConfigRequest) GetKeyType() string` +`func (o *SshConfigureCaRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *SSHWriteCAConfigRequest) GetKeyTypeOk() (*string, bool)` +`func (o *SshConfigureCaRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *SSHWriteCAConfigRequest) SetKeyType(v string)` +`func (o *SshConfigureCaRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *SSHWriteCAConfigRequest) HasKeyType() bool` +`func (o *SshConfigureCaRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasKeyType returns a boolean if a field has been set. ### GetPrivateKey -`func (o *SSHWriteCAConfigRequest) GetPrivateKey() string` +`func (o *SshConfigureCaRequest) GetPrivateKey() string` GetPrivateKey returns the PrivateKey field if non-nil, zero value otherwise. ### GetPrivateKeyOk -`func (o *SSHWriteCAConfigRequest) GetPrivateKeyOk() (*string, bool)` +`func (o *SshConfigureCaRequest) GetPrivateKeyOk() (*string, bool)` GetPrivateKeyOk returns a tuple with the PrivateKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPrivateKey -`func (o *SSHWriteCAConfigRequest) SetPrivateKey(v string)` +`func (o *SshConfigureCaRequest) SetPrivateKey(v string)` SetPrivateKey sets PrivateKey field to given value. ### HasPrivateKey -`func (o *SSHWriteCAConfigRequest) HasPrivateKey() bool` +`func (o *SshConfigureCaRequest) HasPrivateKey() bool` HasPrivateKey returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasPrivateKey returns a boolean if a field has been set. ### GetPublicKey -`func (o *SSHWriteCAConfigRequest) GetPublicKey() string` +`func (o *SshConfigureCaRequest) GetPublicKey() string` GetPublicKey returns the PublicKey field if non-nil, zero value otherwise. ### GetPublicKeyOk -`func (o *SSHWriteCAConfigRequest) GetPublicKeyOk() (*string, bool)` +`func (o *SshConfigureCaRequest) GetPublicKeyOk() (*string, bool)` GetPublicKeyOk returns a tuple with the PublicKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPublicKey -`func (o *SSHWriteCAConfigRequest) SetPublicKey(v string)` +`func (o *SshConfigureCaRequest) SetPublicKey(v string)` SetPublicKey sets PublicKey field to given value. ### HasPublicKey -`func (o *SSHWriteCAConfigRequest) HasPublicKey() bool` +`func (o *SshConfigureCaRequest) HasPublicKey() bool` HasPublicKey returns a boolean if a field has been set. diff --git a/docs/SSHWriteZeroAddressConfigRequest.md b/docs/SshConfigureZeroAddressRequest.md similarity index 62% rename from docs/SSHWriteZeroAddressConfigRequest.md rename to docs/SshConfigureZeroAddressRequest.md index 4670dbab..2b43ba95 100644 --- a/docs/SSHWriteZeroAddressConfigRequest.md +++ b/docs/SshConfigureZeroAddressRequest.md @@ -1,4 +1,4 @@ -# SSHWriteZeroAddressConfigRequest +# SshConfigureZeroAddressRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewSSHWriteZeroAddressConfigRequest +### NewSshConfigureZeroAddressRequest -`func NewSSHWriteZeroAddressConfigRequest() *SSHWriteZeroAddressConfigRequest` +`func NewSshConfigureZeroAddressRequest() *SshConfigureZeroAddressRequest` -NewSSHWriteZeroAddressConfigRequest instantiates a new SSHWriteZeroAddressConfigRequest object +NewSshConfigureZeroAddressRequest instantiates a new SshConfigureZeroAddressRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHWriteZeroAddressConfigRequestWithDefaults +### NewSshConfigureZeroAddressRequestWithDefaults -`func NewSSHWriteZeroAddressConfigRequestWithDefaults() *SSHWriteZeroAddressConfigRequest` +`func NewSshConfigureZeroAddressRequestWithDefaults() *SshConfigureZeroAddressRequest` -NewSSHWriteZeroAddressConfigRequestWithDefaults instantiates a new SSHWriteZeroAddressConfigRequest object +NewSshConfigureZeroAddressRequestWithDefaults instantiates a new SshConfigureZeroAddressRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetRoles -`func (o *SSHWriteZeroAddressConfigRequest) GetRoles() []string` +`func (o *SshConfigureZeroAddressRequest) GetRoles() []string` GetRoles returns the Roles field if non-nil, zero value otherwise. ### GetRolesOk -`func (o *SSHWriteZeroAddressConfigRequest) GetRolesOk() (*[]string, bool)` +`func (o *SshConfigureZeroAddressRequest) GetRolesOk() (*[]string, bool)` GetRolesOk returns a tuple with the Roles field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoles -`func (o *SSHWriteZeroAddressConfigRequest) SetRoles(v []string)` +`func (o *SshConfigureZeroAddressRequest) SetRoles(v []string)` SetRoles sets Roles field to given value. ### HasRoles -`func (o *SSHWriteZeroAddressConfigRequest) HasRoles() bool` +`func (o *SshConfigureZeroAddressRequest) HasRoles() bool` HasRoles returns a boolean if a field has been set. diff --git a/docs/SSHWriteCredentialsRequest.md b/docs/SshGenerateCredentialsRequest.md similarity index 61% rename from docs/SSHWriteCredentialsRequest.md rename to docs/SshGenerateCredentialsRequest.md index c3d321e0..7f058bf5 100644 --- a/docs/SSHWriteCredentialsRequest.md +++ b/docs/SshGenerateCredentialsRequest.md @@ -1,4 +1,4 @@ -# SSHWriteCredentialsRequest +# SshGenerateCredentialsRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewSSHWriteCredentialsRequest +### NewSshGenerateCredentialsRequest -`func NewSSHWriteCredentialsRequest() *SSHWriteCredentialsRequest` +`func NewSshGenerateCredentialsRequest() *SshGenerateCredentialsRequest` -NewSSHWriteCredentialsRequest instantiates a new SSHWriteCredentialsRequest object +NewSshGenerateCredentialsRequest instantiates a new SshGenerateCredentialsRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHWriteCredentialsRequestWithDefaults +### NewSshGenerateCredentialsRequestWithDefaults -`func NewSSHWriteCredentialsRequestWithDefaults() *SSHWriteCredentialsRequest` +`func NewSshGenerateCredentialsRequestWithDefaults() *SshGenerateCredentialsRequest` -NewSSHWriteCredentialsRequestWithDefaults instantiates a new SSHWriteCredentialsRequest object +NewSshGenerateCredentialsRequestWithDefaults instantiates a new SshGenerateCredentialsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIp -`func (o *SSHWriteCredentialsRequest) GetIp() string` +`func (o *SshGenerateCredentialsRequest) GetIp() string` GetIp returns the Ip field if non-nil, zero value otherwise. ### GetIpOk -`func (o *SSHWriteCredentialsRequest) GetIpOk() (*string, bool)` +`func (o *SshGenerateCredentialsRequest) GetIpOk() (*string, bool)` GetIpOk returns a tuple with the Ip field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIp -`func (o *SSHWriteCredentialsRequest) SetIp(v string)` +`func (o *SshGenerateCredentialsRequest) SetIp(v string)` SetIp sets Ip field to given value. ### HasIp -`func (o *SSHWriteCredentialsRequest) HasIp() bool` +`func (o *SshGenerateCredentialsRequest) HasIp() bool` HasIp returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasIp returns a boolean if a field has been set. ### GetUsername -`func (o *SSHWriteCredentialsRequest) GetUsername() string` +`func (o *SshGenerateCredentialsRequest) GetUsername() string` GetUsername returns the Username field if non-nil, zero value otherwise. ### GetUsernameOk -`func (o *SSHWriteCredentialsRequest) GetUsernameOk() (*string, bool)` +`func (o *SshGenerateCredentialsRequest) GetUsernameOk() (*string, bool)` GetUsernameOk returns a tuple with the Username field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUsername -`func (o *SSHWriteCredentialsRequest) SetUsername(v string)` +`func (o *SshGenerateCredentialsRequest) SetUsername(v string)` SetUsername sets Username field to given value. ### HasUsername -`func (o *SSHWriteCredentialsRequest) HasUsername() bool` +`func (o *SshGenerateCredentialsRequest) HasUsername() bool` HasUsername returns a boolean if a field has been set. diff --git a/docs/SSHWriteIssueRequest.md b/docs/SshIssueCertificateRequest.md similarity index 67% rename from docs/SSHWriteIssueRequest.md rename to docs/SshIssueCertificateRequest.md index 0de8380d..ada3a129 100644 --- a/docs/SSHWriteIssueRequest.md +++ b/docs/SshIssueCertificateRequest.md @@ -1,4 +1,4 @@ -# SSHWriteIssueRequest +# SshIssueCertificateRequest ## Properties @@ -19,47 +19,47 @@ Name | Type | Description | Notes ## Methods -### NewSSHWriteIssueRequest +### NewSshIssueCertificateRequest -`func NewSSHWriteIssueRequest() *SSHWriteIssueRequest` +`func NewSshIssueCertificateRequest() *SshIssueCertificateRequest` -NewSSHWriteIssueRequest instantiates a new SSHWriteIssueRequest object +NewSshIssueCertificateRequest instantiates a new SshIssueCertificateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHWriteIssueRequestWithDefaults +### NewSshIssueCertificateRequestWithDefaults -`func NewSSHWriteIssueRequestWithDefaults() *SSHWriteIssueRequest` +`func NewSshIssueCertificateRequestWithDefaults() *SshIssueCertificateRequest` -NewSSHWriteIssueRequestWithDefaults instantiates a new SSHWriteIssueRequest object +NewSshIssueCertificateRequestWithDefaults instantiates a new SshIssueCertificateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCertType -`func (o *SSHWriteIssueRequest) GetCertType() string` +`func (o *SshIssueCertificateRequest) GetCertType() string` GetCertType returns the CertType field if non-nil, zero value otherwise. ### GetCertTypeOk -`func (o *SSHWriteIssueRequest) GetCertTypeOk() (*string, bool)` +`func (o *SshIssueCertificateRequest) GetCertTypeOk() (*string, bool)` GetCertTypeOk returns a tuple with the CertType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertType -`func (o *SSHWriteIssueRequest) SetCertType(v string)` +`func (o *SshIssueCertificateRequest) SetCertType(v string)` SetCertType sets CertType field to given value. ### HasCertType -`func (o *SSHWriteIssueRequest) HasCertType() bool` +`func (o *SshIssueCertificateRequest) HasCertType() bool` HasCertType returns a boolean if a field has been set. @@ -68,27 +68,27 @@ HasCertType returns a boolean if a field has been set. ### GetCriticalOptions -`func (o *SSHWriteIssueRequest) GetCriticalOptions() map[string]interface{}` +`func (o *SshIssueCertificateRequest) GetCriticalOptions() map[string]interface{}` GetCriticalOptions returns the CriticalOptions field if non-nil, zero value otherwise. ### GetCriticalOptionsOk -`func (o *SSHWriteIssueRequest) GetCriticalOptionsOk() (*map[string]interface{}, bool)` +`func (o *SshIssueCertificateRequest) GetCriticalOptionsOk() (*map[string]interface{}, bool)` GetCriticalOptionsOk returns a tuple with the CriticalOptions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCriticalOptions -`func (o *SSHWriteIssueRequest) SetCriticalOptions(v map[string]interface{})` +`func (o *SshIssueCertificateRequest) SetCriticalOptions(v map[string]interface{})` SetCriticalOptions sets CriticalOptions field to given value. ### HasCriticalOptions -`func (o *SSHWriteIssueRequest) HasCriticalOptions() bool` +`func (o *SshIssueCertificateRequest) HasCriticalOptions() bool` HasCriticalOptions returns a boolean if a field has been set. @@ -97,27 +97,27 @@ HasCriticalOptions returns a boolean if a field has been set. ### GetExtensions -`func (o *SSHWriteIssueRequest) GetExtensions() map[string]interface{}` +`func (o *SshIssueCertificateRequest) GetExtensions() map[string]interface{}` GetExtensions returns the Extensions field if non-nil, zero value otherwise. ### GetExtensionsOk -`func (o *SSHWriteIssueRequest) GetExtensionsOk() (*map[string]interface{}, bool)` +`func (o *SshIssueCertificateRequest) GetExtensionsOk() (*map[string]interface{}, bool)` GetExtensionsOk returns a tuple with the Extensions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtensions -`func (o *SSHWriteIssueRequest) SetExtensions(v map[string]interface{})` +`func (o *SshIssueCertificateRequest) SetExtensions(v map[string]interface{})` SetExtensions sets Extensions field to given value. ### HasExtensions -`func (o *SSHWriteIssueRequest) HasExtensions() bool` +`func (o *SshIssueCertificateRequest) HasExtensions() bool` HasExtensions returns a boolean if a field has been set. @@ -126,27 +126,27 @@ HasExtensions returns a boolean if a field has been set. ### GetKeyBits -`func (o *SSHWriteIssueRequest) GetKeyBits() int32` +`func (o *SshIssueCertificateRequest) GetKeyBits() int32` GetKeyBits returns the KeyBits field if non-nil, zero value otherwise. ### GetKeyBitsOk -`func (o *SSHWriteIssueRequest) GetKeyBitsOk() (*int32, bool)` +`func (o *SshIssueCertificateRequest) GetKeyBitsOk() (*int32, bool)` GetKeyBitsOk returns a tuple with the KeyBits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyBits -`func (o *SSHWriteIssueRequest) SetKeyBits(v int32)` +`func (o *SshIssueCertificateRequest) SetKeyBits(v int32)` SetKeyBits sets KeyBits field to given value. ### HasKeyBits -`func (o *SSHWriteIssueRequest) HasKeyBits() bool` +`func (o *SshIssueCertificateRequest) HasKeyBits() bool` HasKeyBits returns a boolean if a field has been set. @@ -155,27 +155,27 @@ HasKeyBits returns a boolean if a field has been set. ### GetKeyId -`func (o *SSHWriteIssueRequest) GetKeyId() string` +`func (o *SshIssueCertificateRequest) GetKeyId() string` GetKeyId returns the KeyId field if non-nil, zero value otherwise. ### GetKeyIdOk -`func (o *SSHWriteIssueRequest) GetKeyIdOk() (*string, bool)` +`func (o *SshIssueCertificateRequest) GetKeyIdOk() (*string, bool)` GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyId -`func (o *SSHWriteIssueRequest) SetKeyId(v string)` +`func (o *SshIssueCertificateRequest) SetKeyId(v string)` SetKeyId sets KeyId field to given value. ### HasKeyId -`func (o *SSHWriteIssueRequest) HasKeyId() bool` +`func (o *SshIssueCertificateRequest) HasKeyId() bool` HasKeyId returns a boolean if a field has been set. @@ -184,27 +184,27 @@ HasKeyId returns a boolean if a field has been set. ### GetKeyType -`func (o *SSHWriteIssueRequest) GetKeyType() string` +`func (o *SshIssueCertificateRequest) GetKeyType() string` GetKeyType returns the KeyType field if non-nil, zero value otherwise. ### GetKeyTypeOk -`func (o *SSHWriteIssueRequest) GetKeyTypeOk() (*string, bool)` +`func (o *SshIssueCertificateRequest) GetKeyTypeOk() (*string, bool)` GetKeyTypeOk returns a tuple with the KeyType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyType -`func (o *SSHWriteIssueRequest) SetKeyType(v string)` +`func (o *SshIssueCertificateRequest) SetKeyType(v string)` SetKeyType sets KeyType field to given value. ### HasKeyType -`func (o *SSHWriteIssueRequest) HasKeyType() bool` +`func (o *SshIssueCertificateRequest) HasKeyType() bool` HasKeyType returns a boolean if a field has been set. @@ -213,27 +213,27 @@ HasKeyType returns a boolean if a field has been set. ### GetTtl -`func (o *SSHWriteIssueRequest) GetTtl() int32` +`func (o *SshIssueCertificateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *SSHWriteIssueRequest) GetTtlOk() (*int32, bool)` +`func (o *SshIssueCertificateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *SSHWriteIssueRequest) SetTtl(v int32)` +`func (o *SshIssueCertificateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *SSHWriteIssueRequest) HasTtl() bool` +`func (o *SshIssueCertificateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -242,27 +242,27 @@ HasTtl returns a boolean if a field has been set. ### GetValidPrincipals -`func (o *SSHWriteIssueRequest) GetValidPrincipals() string` +`func (o *SshIssueCertificateRequest) GetValidPrincipals() string` GetValidPrincipals returns the ValidPrincipals field if non-nil, zero value otherwise. ### GetValidPrincipalsOk -`func (o *SSHWriteIssueRequest) GetValidPrincipalsOk() (*string, bool)` +`func (o *SshIssueCertificateRequest) GetValidPrincipalsOk() (*string, bool)` GetValidPrincipalsOk returns a tuple with the ValidPrincipals field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetValidPrincipals -`func (o *SSHWriteIssueRequest) SetValidPrincipals(v string)` +`func (o *SshIssueCertificateRequest) SetValidPrincipals(v string)` SetValidPrincipals sets ValidPrincipals field to given value. ### HasValidPrincipals -`func (o *SSHWriteIssueRequest) HasValidPrincipals() bool` +`func (o *SshIssueCertificateRequest) HasValidPrincipals() bool` HasValidPrincipals returns a boolean if a field has been set. diff --git a/docs/SshLookupRequest.md b/docs/SshListRolesByIpRequest.md similarity index 63% rename from docs/SshLookupRequest.md rename to docs/SshListRolesByIpRequest.md index 65626f90..780dab6b 100644 --- a/docs/SshLookupRequest.md +++ b/docs/SshListRolesByIpRequest.md @@ -1,4 +1,4 @@ -# SSHLookupRequest +# SshListRolesByIpRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewSSHLookupRequest +### NewSshListRolesByIpRequest -`func NewSSHLookupRequest() *SSHLookupRequest` +`func NewSshListRolesByIpRequest() *SshListRolesByIpRequest` -NewSSHLookupRequest instantiates a new SSHLookupRequest object +NewSshListRolesByIpRequest instantiates a new SshListRolesByIpRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHLookupRequestWithDefaults +### NewSshListRolesByIpRequestWithDefaults -`func NewSSHLookupRequestWithDefaults() *SSHLookupRequest` +`func NewSshListRolesByIpRequestWithDefaults() *SshListRolesByIpRequest` -NewSSHLookupRequestWithDefaults instantiates a new SSHLookupRequest object +NewSshListRolesByIpRequestWithDefaults instantiates a new SshListRolesByIpRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetIp -`func (o *SSHLookupRequest) GetIp() string` +`func (o *SshListRolesByIpRequest) GetIp() string` GetIp returns the Ip field if non-nil, zero value otherwise. ### GetIpOk -`func (o *SSHLookupRequest) GetIpOk() (*string, bool)` +`func (o *SshListRolesByIpRequest) GetIpOk() (*string, bool)` GetIpOk returns a tuple with the Ip field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIp -`func (o *SSHLookupRequest) SetIp(v string)` +`func (o *SshListRolesByIpRequest) SetIp(v string)` SetIp sets Ip field to given value. ### HasIp -`func (o *SSHLookupRequest) HasIp() bool` +`func (o *SshListRolesByIpRequest) HasIp() bool` HasIp returns a boolean if a field has been set. diff --git a/docs/SshSignRequest.md b/docs/SshSignCertificateRequest.md similarity index 67% rename from docs/SshSignRequest.md rename to docs/SshSignCertificateRequest.md index 04515d71..373f49d2 100644 --- a/docs/SshSignRequest.md +++ b/docs/SshSignCertificateRequest.md @@ -1,4 +1,4 @@ -# SSHSignRequest +# SshSignCertificateRequest ## Properties @@ -18,47 +18,47 @@ Name | Type | Description | Notes ## Methods -### NewSSHSignRequest +### NewSshSignCertificateRequest -`func NewSSHSignRequest() *SSHSignRequest` +`func NewSshSignCertificateRequest() *SshSignCertificateRequest` -NewSSHSignRequest instantiates a new SSHSignRequest object +NewSshSignCertificateRequest instantiates a new SshSignCertificateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHSignRequestWithDefaults +### NewSshSignCertificateRequestWithDefaults -`func NewSSHSignRequestWithDefaults() *SSHSignRequest` +`func NewSshSignCertificateRequestWithDefaults() *SshSignCertificateRequest` -NewSSHSignRequestWithDefaults instantiates a new SSHSignRequest object +NewSshSignCertificateRequestWithDefaults instantiates a new SshSignCertificateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCertType -`func (o *SSHSignRequest) GetCertType() string` +`func (o *SshSignCertificateRequest) GetCertType() string` GetCertType returns the CertType field if non-nil, zero value otherwise. ### GetCertTypeOk -`func (o *SSHSignRequest) GetCertTypeOk() (*string, bool)` +`func (o *SshSignCertificateRequest) GetCertTypeOk() (*string, bool)` GetCertTypeOk returns a tuple with the CertType field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCertType -`func (o *SSHSignRequest) SetCertType(v string)` +`func (o *SshSignCertificateRequest) SetCertType(v string)` SetCertType sets CertType field to given value. ### HasCertType -`func (o *SSHSignRequest) HasCertType() bool` +`func (o *SshSignCertificateRequest) HasCertType() bool` HasCertType returns a boolean if a field has been set. @@ -67,27 +67,27 @@ HasCertType returns a boolean if a field has been set. ### GetCriticalOptions -`func (o *SSHSignRequest) GetCriticalOptions() map[string]interface{}` +`func (o *SshSignCertificateRequest) GetCriticalOptions() map[string]interface{}` GetCriticalOptions returns the CriticalOptions field if non-nil, zero value otherwise. ### GetCriticalOptionsOk -`func (o *SSHSignRequest) GetCriticalOptionsOk() (*map[string]interface{}, bool)` +`func (o *SshSignCertificateRequest) GetCriticalOptionsOk() (*map[string]interface{}, bool)` GetCriticalOptionsOk returns a tuple with the CriticalOptions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCriticalOptions -`func (o *SSHSignRequest) SetCriticalOptions(v map[string]interface{})` +`func (o *SshSignCertificateRequest) SetCriticalOptions(v map[string]interface{})` SetCriticalOptions sets CriticalOptions field to given value. ### HasCriticalOptions -`func (o *SSHSignRequest) HasCriticalOptions() bool` +`func (o *SshSignCertificateRequest) HasCriticalOptions() bool` HasCriticalOptions returns a boolean if a field has been set. @@ -96,27 +96,27 @@ HasCriticalOptions returns a boolean if a field has been set. ### GetExtensions -`func (o *SSHSignRequest) GetExtensions() map[string]interface{}` +`func (o *SshSignCertificateRequest) GetExtensions() map[string]interface{}` GetExtensions returns the Extensions field if non-nil, zero value otherwise. ### GetExtensionsOk -`func (o *SSHSignRequest) GetExtensionsOk() (*map[string]interface{}, bool)` +`func (o *SshSignCertificateRequest) GetExtensionsOk() (*map[string]interface{}, bool)` GetExtensionsOk returns a tuple with the Extensions field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExtensions -`func (o *SSHSignRequest) SetExtensions(v map[string]interface{})` +`func (o *SshSignCertificateRequest) SetExtensions(v map[string]interface{})` SetExtensions sets Extensions field to given value. ### HasExtensions -`func (o *SSHSignRequest) HasExtensions() bool` +`func (o *SshSignCertificateRequest) HasExtensions() bool` HasExtensions returns a boolean if a field has been set. @@ -125,27 +125,27 @@ HasExtensions returns a boolean if a field has been set. ### GetKeyId -`func (o *SSHSignRequest) GetKeyId() string` +`func (o *SshSignCertificateRequest) GetKeyId() string` GetKeyId returns the KeyId field if non-nil, zero value otherwise. ### GetKeyIdOk -`func (o *SSHSignRequest) GetKeyIdOk() (*string, bool)` +`func (o *SshSignCertificateRequest) GetKeyIdOk() (*string, bool)` GetKeyIdOk returns a tuple with the KeyId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyId -`func (o *SSHSignRequest) SetKeyId(v string)` +`func (o *SshSignCertificateRequest) SetKeyId(v string)` SetKeyId sets KeyId field to given value. ### HasKeyId -`func (o *SSHSignRequest) HasKeyId() bool` +`func (o *SshSignCertificateRequest) HasKeyId() bool` HasKeyId returns a boolean if a field has been set. @@ -154,27 +154,27 @@ HasKeyId returns a boolean if a field has been set. ### GetPublicKey -`func (o *SSHSignRequest) GetPublicKey() string` +`func (o *SshSignCertificateRequest) GetPublicKey() string` GetPublicKey returns the PublicKey field if non-nil, zero value otherwise. ### GetPublicKeyOk -`func (o *SSHSignRequest) GetPublicKeyOk() (*string, bool)` +`func (o *SshSignCertificateRequest) GetPublicKeyOk() (*string, bool)` GetPublicKeyOk returns a tuple with the PublicKey field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPublicKey -`func (o *SSHSignRequest) SetPublicKey(v string)` +`func (o *SshSignCertificateRequest) SetPublicKey(v string)` SetPublicKey sets PublicKey field to given value. ### HasPublicKey -`func (o *SSHSignRequest) HasPublicKey() bool` +`func (o *SshSignCertificateRequest) HasPublicKey() bool` HasPublicKey returns a boolean if a field has been set. @@ -183,27 +183,27 @@ HasPublicKey returns a boolean if a field has been set. ### GetTtl -`func (o *SSHSignRequest) GetTtl() int32` +`func (o *SshSignCertificateRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *SSHSignRequest) GetTtlOk() (*int32, bool)` +`func (o *SshSignCertificateRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *SSHSignRequest) SetTtl(v int32)` +`func (o *SshSignCertificateRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *SSHSignRequest) HasTtl() bool` +`func (o *SshSignCertificateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -212,27 +212,27 @@ HasTtl returns a boolean if a field has been set. ### GetValidPrincipals -`func (o *SSHSignRequest) GetValidPrincipals() string` +`func (o *SshSignCertificateRequest) GetValidPrincipals() string` GetValidPrincipals returns the ValidPrincipals field if non-nil, zero value otherwise. ### GetValidPrincipalsOk -`func (o *SSHSignRequest) GetValidPrincipalsOk() (*string, bool)` +`func (o *SshSignCertificateRequest) GetValidPrincipalsOk() (*string, bool)` GetValidPrincipalsOk returns a tuple with the ValidPrincipals field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetValidPrincipals -`func (o *SSHSignRequest) SetValidPrincipals(v string)` +`func (o *SshSignCertificateRequest) SetValidPrincipals(v string)` SetValidPrincipals sets ValidPrincipals field to given value. ### HasValidPrincipals -`func (o *SSHSignRequest) HasValidPrincipals() bool` +`func (o *SshSignCertificateRequest) HasValidPrincipals() bool` HasValidPrincipals returns a boolean if a field has been set. diff --git a/docs/SshVerifyRequest.md b/docs/SshVerifyOtpRequest.md similarity index 66% rename from docs/SshVerifyRequest.md rename to docs/SshVerifyOtpRequest.md index c083e5cd..5869c7d6 100644 --- a/docs/SshVerifyRequest.md +++ b/docs/SshVerifyOtpRequest.md @@ -1,4 +1,4 @@ -# SSHVerifyRequest +# SshVerifyOtpRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewSSHVerifyRequest +### NewSshVerifyOtpRequest -`func NewSSHVerifyRequest() *SSHVerifyRequest` +`func NewSshVerifyOtpRequest() *SshVerifyOtpRequest` -NewSSHVerifyRequest instantiates a new SSHVerifyRequest object +NewSshVerifyOtpRequest instantiates a new SshVerifyOtpRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewSSHVerifyRequestWithDefaults +### NewSshVerifyOtpRequestWithDefaults -`func NewSSHVerifyRequestWithDefaults() *SSHVerifyRequest` +`func NewSshVerifyOtpRequestWithDefaults() *SshVerifyOtpRequest` -NewSSHVerifyRequestWithDefaults instantiates a new SSHVerifyRequest object +NewSshVerifyOtpRequestWithDefaults instantiates a new SshVerifyOtpRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetOtp -`func (o *SSHVerifyRequest) GetOtp() string` +`func (o *SshVerifyOtpRequest) GetOtp() string` GetOtp returns the Otp field if non-nil, zero value otherwise. ### GetOtpOk -`func (o *SSHVerifyRequest) GetOtpOk() (*string, bool)` +`func (o *SshVerifyOtpRequest) GetOtpOk() (*string, bool)` GetOtpOk returns a tuple with the Otp field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOtp -`func (o *SSHVerifyRequest) SetOtp(v string)` +`func (o *SshVerifyOtpRequest) SetOtp(v string)` SetOtp sets Otp field to given value. ### HasOtp -`func (o *SSHVerifyRequest) HasOtp() bool` +`func (o *SshVerifyOtpRequest) HasOtp() bool` HasOtp returns a boolean if a field has been set. diff --git a/docs/SystemApi.md b/docs/SystemApi.md index 2dcac786..faa3a2fd 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -2,182 +2,179 @@ Method | HTTP request | Description ------------- | ------------- | ------------- -[**CalculateAuditHash**](SystemApi.md#CalculateAuditHash) | **Post** /sys/audit-hash/{path} | The hash of the given string via the given audit backend -[**DeleteAuditDevice**](SystemApi.md#DeleteAuditDevice) | **Delete** /sys/audit/{path} | Disable the audit device at the given path. -[**DeleteAuthMethod**](SystemApi.md#DeleteAuthMethod) | **Delete** /sys/auth/{path} | Disable the auth method at the given auth path -[**DeleteConfigAuditingRequestHeader**](SystemApi.md#DeleteConfigAuditingRequestHeader) | **Delete** /sys/config/auditing/request-headers/{header} | Disable auditing of the given request header. -[**DeleteConfigCORS**](SystemApi.md#DeleteConfigCORS) | **Delete** /sys/config/cors | Remove any CORS settings. -[**DeleteConfigUIHeader**](SystemApi.md#DeleteConfigUIHeader) | **Delete** /sys/config/ui/headers/{header} | Remove a UI header. -[**DeleteGenerateRoot**](SystemApi.md#DeleteGenerateRoot) | **Delete** /sys/generate-root | Cancels any in-progress root generation attempt. -[**DeleteGenerateRootAttempt**](SystemApi.md#DeleteGenerateRootAttempt) | **Delete** /sys/generate-root/attempt | Cancels any in-progress root generation attempt. -[**DeleteLogger**](SystemApi.md#DeleteLogger) | **Delete** /sys/loggers/{name} | Revert a single logger to use log level provided in config. -[**DeleteLoggers**](SystemApi.md#DeleteLoggers) | **Delete** /sys/loggers | Revert the all loggers to use log level provided in config. -[**DeleteMount**](SystemApi.md#DeleteMount) | **Delete** /sys/mounts/{path} | Disable the mount point specified at the given path. -[**DeletePluginsCatalogByTypeByName**](SystemApi.md#DeletePluginsCatalogByTypeByName) | **Delete** /sys/plugins/catalog/{type}/{name} | Remove the plugin with the given name. -[**DeletePoliciesACL**](SystemApi.md#DeletePoliciesACL) | **Delete** /sys/policies/acl/{name} | Delete the ACL policy with the given name. -[**DeletePoliciesPassword**](SystemApi.md#DeletePoliciesPassword) | **Delete** /sys/policies/password/{name} | Delete a password policy. -[**DeletePolicy**](SystemApi.md#DeletePolicy) | **Delete** /sys/policy/{name} | Delete the policy with the given name. -[**DeleteQuotasRateLimit**](SystemApi.md#DeleteQuotasRateLimit) | **Delete** /sys/quotas/rate-limit/{name} | -[**DeleteRaw**](SystemApi.md#DeleteRaw) | **Delete** /sys/raw | Delete the key with given path. -[**DeleteRawPath**](SystemApi.md#DeleteRawPath) | **Delete** /sys/raw/{path} | Delete the key with given path. -[**DeleteRekeyBackup**](SystemApi.md#DeleteRekeyBackup) | **Delete** /sys/rekey/backup | Delete the backup copy of PGP-encrypted unseal keys. -[**DeleteRekeyInit**](SystemApi.md#DeleteRekeyInit) | **Delete** /sys/rekey/init | Cancels any in-progress rekey. -[**DeleteRekeyRecoveryKeyBackup**](SystemApi.md#DeleteRekeyRecoveryKeyBackup) | **Delete** /sys/rekey/recovery-key-backup | Allows fetching or deleting the backup of the rotated unseal keys. -[**DeleteRekeyVerify**](SystemApi.md#DeleteRekeyVerify) | **Delete** /sys/rekey/verify | Cancel any in-progress rekey verification operation. -[**ListConfigUIHeaders**](SystemApi.md#ListConfigUIHeaders) | **Get** /sys/config/ui/headers/ | Return a list of configured UI headers. -[**ListLeasesLookupPrefix**](SystemApi.md#ListLeasesLookupPrefix) | **Get** /sys/leases/lookup/{prefix} | Returns a list of lease ids. -[**ListPluginsCatalogByType**](SystemApi.md#ListPluginsCatalogByType) | **Get** /sys/plugins/catalog/{type} | List the plugins in the catalog. -[**ListPoliciesACL**](SystemApi.md#ListPoliciesACL) | **Get** /sys/policies/acl | List the configured access control policies. -[**ListPoliciesPassword**](SystemApi.md#ListPoliciesPassword) | **Get** /sys/policies/password | List the existing password policies. -[**ListQuotasRateLimits**](SystemApi.md#ListQuotasRateLimits) | **Get** /sys/quotas/rate-limit | -[**ListVersionHistory**](SystemApi.md#ListVersionHistory) | **Get** /sys/version-history/ | Returns map of historical version change entries -[**MFAValidate**](SystemApi.md#MFAValidate) | **Post** /sys/mfa/validate | Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token +[**AuditingCalculateHash**](SystemApi.md#AuditingCalculateHash) | **Post** /sys/audit-hash/{path} | +[**AuditingDisableDevice**](SystemApi.md#AuditingDisableDevice) | **Delete** /sys/audit/{path} | Disable the audit device at the given path. +[**AuditingDisableRequestHeader**](SystemApi.md#AuditingDisableRequestHeader) | **Delete** /sys/config/auditing/request-headers/{header} | Disable auditing of the given request header. +[**AuditingEnableDevice**](SystemApi.md#AuditingEnableDevice) | **Post** /sys/audit/{path} | Enable a new audit device at the supplied path. +[**AuditingEnableRequestHeader**](SystemApi.md#AuditingEnableRequestHeader) | **Post** /sys/config/auditing/request-headers/{header} | Enable auditing of a header. +[**AuditingListEnabledDevices**](SystemApi.md#AuditingListEnabledDevices) | **Get** /sys/audit | List the enabled audit devices. +[**AuditingListRequestHeaders**](SystemApi.md#AuditingListRequestHeaders) | **Get** /sys/config/auditing/request-headers | List the request headers that are configured to be audited. +[**AuditingReadRequestHeaderInformation**](SystemApi.md#AuditingReadRequestHeaderInformation) | **Get** /sys/config/auditing/request-headers/{header} | List the information for the given request header. +[**AuthDisableMethod**](SystemApi.md#AuthDisableMethod) | **Delete** /sys/auth/{path} | Disable the auth method at the given auth path +[**AuthEnableMethod**](SystemApi.md#AuthEnableMethod) | **Post** /sys/auth/{path} | Enables a new auth method. +[**AuthListEnabledMethods**](SystemApi.md#AuthListEnabledMethods) | **Get** /sys/auth | +[**AuthReadConfiguration**](SystemApi.md#AuthReadConfiguration) | **Get** /sys/auth/{path} | Read the configuration of the auth engine at the given path. +[**AuthReadTuningInformation**](SystemApi.md#AuthReadTuningInformation) | **Get** /sys/auth/{path}/tune | Reads the given auth path's configuration. +[**AuthTuneConfigurationParameters**](SystemApi.md#AuthTuneConfigurationParameters) | **Post** /sys/auth/{path}/tune | Tune configuration parameters for a given auth path. +[**CollectHostInformation**](SystemApi.md#CollectHostInformation) | **Get** /sys/host-info | Information about the host instance that this Vault server is running on. +[**CollectInFlightRequestInformation**](SystemApi.md#CollectInFlightRequestInformation) | **Get** /sys/in-flight-req | reports in-flight requests +[**CorsConfigure**](SystemApi.md#CorsConfigure) | **Post** /sys/config/cors | Configure the CORS settings. +[**CorsDeleteConfiguration**](SystemApi.md#CorsDeleteConfiguration) | **Delete** /sys/config/cors | Remove any CORS settings. +[**CorsReadConfiguration**](SystemApi.md#CorsReadConfiguration) | **Get** /sys/config/cors | Return the current CORS settings. +[**EncryptionKeyConfigureRotation**](SystemApi.md#EncryptionKeyConfigureRotation) | **Post** /sys/rotate/config | +[**EncryptionKeyReadRotationConfiguration**](SystemApi.md#EncryptionKeyReadRotationConfiguration) | **Get** /sys/rotate/config | +[**EncryptionKeyRotate**](SystemApi.md#EncryptionKeyRotate) | **Post** /sys/rotate | +[**EncryptionKeyStatus**](SystemApi.md#EncryptionKeyStatus) | **Get** /sys/key-status | Provides information about the backend encryption key. +[**GenerateHash**](SystemApi.md#GenerateHash) | **Post** /sys/tools/hash | +[**GenerateHashWithAlgorithm**](SystemApi.md#GenerateHashWithAlgorithm) | **Post** /sys/tools/hash/{urlalgorithm} | +[**GenerateRandom**](SystemApi.md#GenerateRandom) | **Post** /sys/tools/random | +[**GenerateRandomWithBytes**](SystemApi.md#GenerateRandomWithBytes) | **Post** /sys/tools/random/{urlbytes} | +[**GenerateRandomWithSource**](SystemApi.md#GenerateRandomWithSource) | **Post** /sys/tools/random/{source} | +[**GenerateRandomWithSourceAndBytes**](SystemApi.md#GenerateRandomWithSourceAndBytes) | **Post** /sys/tools/random/{source}/{urlbytes} | +[**HaStatus**](SystemApi.md#HaStatus) | **Get** /sys/ha-status | Check the HA status of a Vault cluster +[**Initialize**](SystemApi.md#Initialize) | **Post** /sys/init | Initialize a new Vault. +[**InternalClientActivityConfigure**](SystemApi.md#InternalClientActivityConfigure) | **Post** /sys/internal/counters/config | Enable or disable collection of client count, set retention period, or set default reporting period. +[**InternalClientActivityExport**](SystemApi.md#InternalClientActivityExport) | **Get** /sys/internal/counters/activity/export | Report the client count metrics, for this namespace and all child namespaces. +[**InternalClientActivityReadConfiguration**](SystemApi.md#InternalClientActivityReadConfiguration) | **Get** /sys/internal/counters/config | Read the client count tracking configuration. +[**InternalClientActivityReportCounts**](SystemApi.md#InternalClientActivityReportCounts) | **Get** /sys/internal/counters/activity | Report the client count metrics, for this namespace and all child namespaces. +[**InternalClientActivityReportCountsThisMonth**](SystemApi.md#InternalClientActivityReportCountsThisMonth) | **Get** /sys/internal/counters/activity/monthly | Report the number of clients for this month, for this namespace and all child namespaces. +[**InternalCountEntities**](SystemApi.md#InternalCountEntities) | **Get** /sys/internal/counters/entities | Backwards compatibility is not guaranteed for this API +[**InternalCountRequests**](SystemApi.md#InternalCountRequests) | **Get** /sys/internal/counters/requests | Backwards compatibility is not guaranteed for this API +[**InternalCountTokens**](SystemApi.md#InternalCountTokens) | **Get** /sys/internal/counters/tokens | Backwards compatibility is not guaranteed for this API +[**InternalGenerateOpenApiDocument**](SystemApi.md#InternalGenerateOpenApiDocument) | **Get** /sys/internal/specs/openapi | +[**InternalGenerateOpenApiDocument2**](SystemApi.md#InternalGenerateOpenApiDocument2) | **Post** /sys/internal/specs/openapi | +[**InternalInspectRouter**](SystemApi.md#InternalInspectRouter) | **Get** /sys/internal/inspect/router/{tag} | Expose the route entry and mount entry tables present in the router +[**InternalUiListEnabledFeatureFlags**](SystemApi.md#InternalUiListEnabledFeatureFlags) | **Get** /sys/internal/ui/feature-flags | Lists enabled feature flags. +[**InternalUiListEnabledVisibleMounts**](SystemApi.md#InternalUiListEnabledVisibleMounts) | **Get** /sys/internal/ui/mounts | Lists all enabled and visible auth and secrets mounts. +[**InternalUiListNamespaces**](SystemApi.md#InternalUiListNamespaces) | **Get** /sys/internal/ui/namespaces | Backwards compatibility is not guaranteed for this API +[**InternalUiReadMountInformation**](SystemApi.md#InternalUiReadMountInformation) | **Get** /sys/internal/ui/mounts/{path} | Return information about the given mount. +[**InternalUiReadResultantAcl**](SystemApi.md#InternalUiReadResultantAcl) | **Get** /sys/internal/ui/resultant-acl | Backwards compatibility is not guaranteed for this API +[**LeaderStatus**](SystemApi.md#LeaderStatus) | **Get** /sys/leader | Returns the high availability status and current leader instance of Vault. +[**LeasesCount**](SystemApi.md#LeasesCount) | **Get** /sys/leases/count | +[**LeasesForceRevokeLeaseWithPrefix**](SystemApi.md#LeasesForceRevokeLeaseWithPrefix) | **Post** /sys/leases/revoke-force/{prefix} | Revokes all secrets or tokens generated under a given prefix immediately +[**LeasesForceRevokeLeaseWithPrefix2**](SystemApi.md#LeasesForceRevokeLeaseWithPrefix2) | **Post** /sys/revoke-force/{prefix} | Revokes all secrets or tokens generated under a given prefix immediately +[**LeasesList**](SystemApi.md#LeasesList) | **Get** /sys/leases | +[**LeasesLookUp**](SystemApi.md#LeasesLookUp) | **Get** /sys/leases/lookup/ | +[**LeasesLookUpWithPrefix**](SystemApi.md#LeasesLookUpWithPrefix) | **Get** /sys/leases/lookup/{prefix} | +[**LeasesReadLease**](SystemApi.md#LeasesReadLease) | **Post** /sys/leases/lookup | +[**LeasesRenewLease**](SystemApi.md#LeasesRenewLease) | **Post** /sys/leases/renew | Renews a lease, requesting to extend the lease. +[**LeasesRenewLease2**](SystemApi.md#LeasesRenewLease2) | **Post** /sys/renew | Renews a lease, requesting to extend the lease. +[**LeasesRenewLeaseWithId**](SystemApi.md#LeasesRenewLeaseWithId) | **Post** /sys/leases/renew/{url_lease_id} | Renews a lease, requesting to extend the lease. +[**LeasesRenewLeaseWithId2**](SystemApi.md#LeasesRenewLeaseWithId2) | **Post** /sys/renew/{url_lease_id} | Renews a lease, requesting to extend the lease. +[**LeasesRevokeLease**](SystemApi.md#LeasesRevokeLease) | **Post** /sys/leases/revoke | Revokes a lease immediately. +[**LeasesRevokeLease2**](SystemApi.md#LeasesRevokeLease2) | **Post** /sys/revoke | Revokes a lease immediately. +[**LeasesRevokeLeaseWithId**](SystemApi.md#LeasesRevokeLeaseWithId) | **Post** /sys/leases/revoke/{url_lease_id} | Revokes a lease immediately. +[**LeasesRevokeLeaseWithId2**](SystemApi.md#LeasesRevokeLeaseWithId2) | **Post** /sys/revoke/{url_lease_id} | Revokes a lease immediately. +[**LeasesRevokeLeaseWithPrefix**](SystemApi.md#LeasesRevokeLeaseWithPrefix) | **Post** /sys/leases/revoke-prefix/{prefix} | Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. +[**LeasesRevokeLeaseWithPrefix2**](SystemApi.md#LeasesRevokeLeaseWithPrefix2) | **Post** /sys/revoke-prefix/{prefix} | Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. +[**LeasesTidy**](SystemApi.md#LeasesTidy) | **Post** /sys/leases/tidy | +[**ListExperimentalFeatures**](SystemApi.md#ListExperimentalFeatures) | **Get** /sys/experiments | Returns the available and enabled experiments +[**LockedUsersList**](SystemApi.md#LockedUsersList) | **Get** /sys/locked-users | Report the locked user count metrics, for this namespace and all child namespaces. +[**LockedUsersUnlock**](SystemApi.md#LockedUsersUnlock) | **Post** /sys/locked-users/{mount_accessor}/unlock/{alias_identifier} | Unlocks the user with given mount_accessor and alias_identifier +[**LoggersReadVerbosityLevel**](SystemApi.md#LoggersReadVerbosityLevel) | **Get** /sys/loggers | Read the log level for all existing loggers. +[**LoggersReadVerbosityLevelFor**](SystemApi.md#LoggersReadVerbosityLevelFor) | **Get** /sys/loggers/{name} | Read the log level for a single logger. +[**LoggersRevertVerbosityLevel**](SystemApi.md#LoggersRevertVerbosityLevel) | **Delete** /sys/loggers | Revert the all loggers to use log level provided in config. +[**LoggersRevertVerbosityLevelFor**](SystemApi.md#LoggersRevertVerbosityLevelFor) | **Delete** /sys/loggers/{name} | Revert a single logger to use log level provided in config. +[**LoggersUpdateVerbosityLevel**](SystemApi.md#LoggersUpdateVerbosityLevel) | **Post** /sys/loggers | Modify the log level for all existing loggers. +[**LoggersUpdateVerbosityLevelFor**](SystemApi.md#LoggersUpdateVerbosityLevelFor) | **Post** /sys/loggers/{name} | Modify the log level of a single logger. +[**Metrics**](SystemApi.md#Metrics) | **Get** /sys/metrics | +[**MfaValidate**](SystemApi.md#MfaValidate) | **Post** /sys/mfa/validate | Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token [**Monitor**](SystemApi.md#Monitor) | **Get** /sys/monitor | -[**PprofRead**](SystemApi.md#PprofRead) | **Get** /sys/pprof/ | Returns an HTML page listing the available profiles. -[**PprofReadAllocs**](SystemApi.md#PprofReadAllocs) | **Get** /sys/pprof/allocs | Returns a sampling of all past memory allocations. -[**PprofReadBlock**](SystemApi.md#PprofReadBlock) | **Get** /sys/pprof/block | Returns stack traces that led to blocking on synchronization primitives -[**PprofReadCmdline**](SystemApi.md#PprofReadCmdline) | **Get** /sys/pprof/cmdline | Returns the running program's command line. -[**PprofReadGoroutine**](SystemApi.md#PprofReadGoroutine) | **Get** /sys/pprof/goroutine | Returns stack traces of all current goroutines. -[**PprofReadHeap**](SystemApi.md#PprofReadHeap) | **Get** /sys/pprof/heap | Returns a sampling of memory allocations of live object. -[**PprofReadMutex**](SystemApi.md#PprofReadMutex) | **Get** /sys/pprof/mutex | Returns stack traces of holders of contended mutexes -[**PprofReadProfile**](SystemApi.md#PprofReadProfile) | **Get** /sys/pprof/profile | Returns a pprof-formatted cpu profile payload. -[**PprofReadSymbol**](SystemApi.md#PprofReadSymbol) | **Get** /sys/pprof/symbol | Returns the program counters listed in the request. -[**PprofReadThreadcreate**](SystemApi.md#PprofReadThreadcreate) | **Get** /sys/pprof/threadcreate | Returns stack traces that led to the creation of new OS threads -[**PprofReadTrace**](SystemApi.md#PprofReadTrace) | **Get** /sys/pprof/trace | Returns the execution trace in binary form. -[**ReadAuditDevices**](SystemApi.md#ReadAuditDevices) | **Get** /sys/audit | List the enabled audit devices. -[**ReadAuthMethod**](SystemApi.md#ReadAuthMethod) | **Get** /sys/auth/{path} | Read the configuration of the auth engine at the given path. -[**ReadAuthMethodTune**](SystemApi.md#ReadAuthMethodTune) | **Get** /sys/auth/{path}/tune | Reads the given auth path's configuration. -[**ReadAuthMethods**](SystemApi.md#ReadAuthMethods) | **Get** /sys/auth | List the currently enabled credential backends. -[**ReadConfigAuditingRequestHeader**](SystemApi.md#ReadConfigAuditingRequestHeader) | **Get** /sys/config/auditing/request-headers/{header} | List the information for the given request header. -[**ReadConfigAuditingRequestHeaders**](SystemApi.md#ReadConfigAuditingRequestHeaders) | **Get** /sys/config/auditing/request-headers | List the request headers that are configured to be audited. -[**ReadConfigCORS**](SystemApi.md#ReadConfigCORS) | **Get** /sys/config/cors | Return the current CORS settings. -[**ReadConfigStateSanitized**](SystemApi.md#ReadConfigStateSanitized) | **Get** /sys/config/state/sanitized | Return a sanitized version of the Vault server configuration. -[**ReadConfigUIHeader**](SystemApi.md#ReadConfigUIHeader) | **Get** /sys/config/ui/headers/{header} | Return the given UI header's configuration -[**ReadGenerateRoot**](SystemApi.md#ReadGenerateRoot) | **Get** /sys/generate-root | Read the configuration and progress of the current root generation attempt. -[**ReadGenerateRootAttempt**](SystemApi.md#ReadGenerateRootAttempt) | **Get** /sys/generate-root/attempt | Read the configuration and progress of the current root generation attempt. -[**ReadHAStatus**](SystemApi.md#ReadHAStatus) | **Get** /sys/ha-status | Check the HA status of a Vault cluster -[**ReadHealth**](SystemApi.md#ReadHealth) | **Get** /sys/health | Returns the health status of Vault. -[**ReadHostInfo**](SystemApi.md#ReadHostInfo) | **Get** /sys/host-info | Information about the host instance that this Vault server is running on. -[**ReadInFlightRequests**](SystemApi.md#ReadInFlightRequests) | **Get** /sys/in-flight-req | reports in-flight requests -[**ReadInit**](SystemApi.md#ReadInit) | **Get** /sys/init | Returns the initialization status of Vault. -[**ReadInternalCountersActivity**](SystemApi.md#ReadInternalCountersActivity) | **Get** /sys/internal/counters/activity | Report the client count metrics, for this namespace and all child namespaces. -[**ReadInternalCountersActivityExport**](SystemApi.md#ReadInternalCountersActivityExport) | **Get** /sys/internal/counters/activity/export | Report the client count metrics, for this namespace and all child namespaces. -[**ReadInternalCountersActivityMonthly**](SystemApi.md#ReadInternalCountersActivityMonthly) | **Get** /sys/internal/counters/activity/monthly | Report the number of clients for this month, for this namespace and all child namespaces. -[**ReadInternalCountersConfig**](SystemApi.md#ReadInternalCountersConfig) | **Get** /sys/internal/counters/config | Read the client count tracking configuration. -[**ReadInternalCountersEntities**](SystemApi.md#ReadInternalCountersEntities) | **Get** /sys/internal/counters/entities | Backwards compatibility is not guaranteed for this API -[**ReadInternalCountersRequests**](SystemApi.md#ReadInternalCountersRequests) | **Get** /sys/internal/counters/requests | Backwards compatibility is not guaranteed for this API -[**ReadInternalCountersTokens**](SystemApi.md#ReadInternalCountersTokens) | **Get** /sys/internal/counters/tokens | Backwards compatibility is not guaranteed for this API -[**ReadInternalInspectRouter**](SystemApi.md#ReadInternalInspectRouter) | **Get** /sys/internal/inspect/router/{tag} | Expose the route entry and mount entry tables present in the router -[**ReadInternalSpecsOpenAPI**](SystemApi.md#ReadInternalSpecsOpenAPI) | **Get** /sys/internal/specs/openapi | Generate an OpenAPI 3 document of all mounted paths. -[**ReadInternalUIFeatureFlags**](SystemApi.md#ReadInternalUIFeatureFlags) | **Get** /sys/internal/ui/feature-flags | Lists enabled feature flags. -[**ReadInternalUIMount**](SystemApi.md#ReadInternalUIMount) | **Get** /sys/internal/ui/mounts/{path} | Return information about the given mount. -[**ReadInternalUIMounts**](SystemApi.md#ReadInternalUIMounts) | **Get** /sys/internal/ui/mounts | Lists all enabled and visible auth and secrets mounts. -[**ReadInternalUINamespaces**](SystemApi.md#ReadInternalUINamespaces) | **Get** /sys/internal/ui/namespaces | Backwards compatibility is not guaranteed for this API -[**ReadInternalUIResultantACL**](SystemApi.md#ReadInternalUIResultantACL) | **Get** /sys/internal/ui/resultant-acl | Backwards compatibility is not guaranteed for this API -[**ReadKeyStatus**](SystemApi.md#ReadKeyStatus) | **Get** /sys/key-status | Provides information about the backend encryption key. -[**ReadLeader**](SystemApi.md#ReadLeader) | **Get** /sys/leader | Returns the high availability status and current leader instance of Vault. -[**ReadLeases**](SystemApi.md#ReadLeases) | **Get** /sys/leases | List leases associated with this Vault cluster -[**ReadLeasesCount**](SystemApi.md#ReadLeasesCount) | **Get** /sys/leases/count | Count of leases associated with this Vault cluster -[**ReadLogger**](SystemApi.md#ReadLogger) | **Get** /sys/loggers/{name} | Read the log level for a single logger. -[**ReadLoggers**](SystemApi.md#ReadLoggers) | **Get** /sys/loggers | Read the log level for all existing loggers. -[**ReadMetrics**](SystemApi.md#ReadMetrics) | **Get** /sys/metrics | Export the metrics aggregated for telemetry purpose. -[**ReadMount**](SystemApi.md#ReadMount) | **Get** /sys/mounts/{path} | Read the configuration of the secret engine at the given path. -[**ReadMounts**](SystemApi.md#ReadMounts) | **Get** /sys/mounts | List the currently mounted backends. -[**ReadMountsConfig**](SystemApi.md#ReadMountsConfig) | **Get** /sys/mounts/{path}/tune | Tune backend configuration parameters for this mount. -[**ReadPluginsCatalog**](SystemApi.md#ReadPluginsCatalog) | **Get** /sys/plugins/catalog | Lists all the plugins known to Vault -[**ReadPluginsCatalogByTypeByName**](SystemApi.md#ReadPluginsCatalogByTypeByName) | **Get** /sys/plugins/catalog/{type}/{name} | Return the configuration data for the plugin with the given name. -[**ReadPolicies**](SystemApi.md#ReadPolicies) | **Get** /sys/policy | List the configured access control policies. -[**ReadPoliciesACL**](SystemApi.md#ReadPoliciesACL) | **Get** /sys/policies/acl/{name} | Retrieve information about the named ACL policy. -[**ReadPoliciesPassword**](SystemApi.md#ReadPoliciesPassword) | **Get** /sys/policies/password/{name} | Retrieve an existing password policy. -[**ReadPoliciesPasswordGenerate**](SystemApi.md#ReadPoliciesPasswordGenerate) | **Get** /sys/policies/password/{name}/generate | Generate a password from an existing password policy. -[**ReadPolicy**](SystemApi.md#ReadPolicy) | **Get** /sys/policy/{name} | Retrieve the policy body for the named policy. -[**ReadQuotasConfig**](SystemApi.md#ReadQuotasConfig) | **Get** /sys/quotas/config | -[**ReadQuotasRateLimit**](SystemApi.md#ReadQuotasRateLimit) | **Get** /sys/quotas/rate-limit/{name} | -[**ReadRaw**](SystemApi.md#ReadRaw) | **Get** /sys/raw | Read the value of the key at the given path. -[**ReadRawPath**](SystemApi.md#ReadRawPath) | **Get** /sys/raw/{path} | Read the value of the key at the given path. -[**ReadRekeyBackup**](SystemApi.md#ReadRekeyBackup) | **Get** /sys/rekey/backup | Return the backup copy of PGP-encrypted unseal keys. -[**ReadRekeyInit**](SystemApi.md#ReadRekeyInit) | **Get** /sys/rekey/init | Reads the configuration and progress of the current rekey attempt. -[**ReadRekeyRecoveryKeyBackup**](SystemApi.md#ReadRekeyRecoveryKeyBackup) | **Get** /sys/rekey/recovery-key-backup | Allows fetching or deleting the backup of the rotated unseal keys. -[**ReadRekeyVerify**](SystemApi.md#ReadRekeyVerify) | **Get** /sys/rekey/verify | Read the configuration and progress of the current rekey verification attempt. -[**ReadRemountStatus**](SystemApi.md#ReadRemountStatus) | **Get** /sys/remount/status/{migration_id} | Check status of a mount migration -[**ReadReplicationStatus**](SystemApi.md#ReadReplicationStatus) | **Get** /sys/replication/status | -[**ReadRotateConfig**](SystemApi.md#ReadRotateConfig) | **Get** /sys/rotate/config | -[**ReadSealStatus**](SystemApi.md#ReadSealStatus) | **Get** /sys/seal-status | Check the seal status of a Vault. +[**MountsDisableSecretsEngine**](SystemApi.md#MountsDisableSecretsEngine) | **Delete** /sys/mounts/{path} | Disable the mount point specified at the given path. +[**MountsEnableSecretsEngine**](SystemApi.md#MountsEnableSecretsEngine) | **Post** /sys/mounts/{path} | Enable a new secrets engine at the given path. +[**MountsListSecretsEngines**](SystemApi.md#MountsListSecretsEngines) | **Get** /sys/mounts | +[**MountsReadConfiguration**](SystemApi.md#MountsReadConfiguration) | **Get** /sys/mounts/{path} | Read the configuration of the secret engine at the given path. +[**MountsReadTuningInformation**](SystemApi.md#MountsReadTuningInformation) | **Get** /sys/mounts/{path}/tune | +[**MountsTuneConfigurationParameters**](SystemApi.md#MountsTuneConfigurationParameters) | **Post** /sys/mounts/{path}/tune | +[**PluginsCatalogListPlugins**](SystemApi.md#PluginsCatalogListPlugins) | **Get** /sys/plugins/catalog | +[**PluginsCatalogListPluginsWithType**](SystemApi.md#PluginsCatalogListPluginsWithType) | **Get** /sys/plugins/catalog/{type} | List the plugins in the catalog. +[**PluginsCatalogReadPluginConfiguration**](SystemApi.md#PluginsCatalogReadPluginConfiguration) | **Get** /sys/plugins/catalog/{name} | Return the configuration data for the plugin with the given name. +[**PluginsCatalogReadPluginConfigurationWithType**](SystemApi.md#PluginsCatalogReadPluginConfigurationWithType) | **Get** /sys/plugins/catalog/{type}/{name} | Return the configuration data for the plugin with the given name. +[**PluginsCatalogRegisterPlugin**](SystemApi.md#PluginsCatalogRegisterPlugin) | **Post** /sys/plugins/catalog/{name} | Register a new plugin, or updates an existing one with the supplied name. +[**PluginsCatalogRegisterPluginWithType**](SystemApi.md#PluginsCatalogRegisterPluginWithType) | **Post** /sys/plugins/catalog/{type}/{name} | Register a new plugin, or updates an existing one with the supplied name. +[**PluginsCatalogRemovePlugin**](SystemApi.md#PluginsCatalogRemovePlugin) | **Delete** /sys/plugins/catalog/{name} | Remove the plugin with the given name. +[**PluginsCatalogRemovePluginWithType**](SystemApi.md#PluginsCatalogRemovePluginWithType) | **Delete** /sys/plugins/catalog/{type}/{name} | Remove the plugin with the given name. +[**PluginsReloadBackends**](SystemApi.md#PluginsReloadBackends) | **Post** /sys/plugins/reload/backend | Reload mounted plugin backends. +[**PoliciesDeleteAclPolicy**](SystemApi.md#PoliciesDeleteAclPolicy) | **Delete** /sys/policies/acl/{name} | Delete the ACL policy with the given name. +[**PoliciesDeleteAclPolicy2**](SystemApi.md#PoliciesDeleteAclPolicy2) | **Delete** /sys/policy/{name} | Delete the policy with the given name. +[**PoliciesDeletePasswordPolicy**](SystemApi.md#PoliciesDeletePasswordPolicy) | **Delete** /sys/policies/password/{name} | Delete a password policy. +[**PoliciesGeneratePasswordFromPasswordPolicy**](SystemApi.md#PoliciesGeneratePasswordFromPasswordPolicy) | **Get** /sys/policies/password/{name}/generate | Generate a password from an existing password policy. +[**PoliciesList**](SystemApi.md#PoliciesList) | **Get** /sys/policy | +[**PoliciesListAclPolicies**](SystemApi.md#PoliciesListAclPolicies) | **Get** /sys/policies/acl | +[**PoliciesListPasswordPolicies**](SystemApi.md#PoliciesListPasswordPolicies) | **Get** /sys/policies/password | List the existing password policies. +[**PoliciesReadAclPolicy**](SystemApi.md#PoliciesReadAclPolicy) | **Get** /sys/policies/acl/{name} | Retrieve information about the named ACL policy. +[**PoliciesReadAclPolicy2**](SystemApi.md#PoliciesReadAclPolicy2) | **Get** /sys/policy/{name} | Retrieve the policy body for the named policy. +[**PoliciesReadPasswordPolicy**](SystemApi.md#PoliciesReadPasswordPolicy) | **Get** /sys/policies/password/{name} | Retrieve an existing password policy. +[**PoliciesWriteAclPolicy**](SystemApi.md#PoliciesWriteAclPolicy) | **Post** /sys/policies/acl/{name} | Add a new or update an existing ACL policy. +[**PoliciesWriteAclPolicy2**](SystemApi.md#PoliciesWriteAclPolicy2) | **Post** /sys/policy/{name} | Add a new or update an existing policy. +[**PoliciesWritePasswordPolicy**](SystemApi.md#PoliciesWritePasswordPolicy) | **Post** /sys/policies/password/{name} | Add a new or update an existing password policy. +[**PprofBlocking**](SystemApi.md#PprofBlocking) | **Get** /sys/pprof/block | Returns stack traces that led to blocking on synchronization primitives +[**PprofCommandLine**](SystemApi.md#PprofCommandLine) | **Get** /sys/pprof/cmdline | Returns the running program's command line. +[**PprofCpuProfile**](SystemApi.md#PprofCpuProfile) | **Get** /sys/pprof/profile | Returns a pprof-formatted cpu profile payload. +[**PprofExecutionTrace**](SystemApi.md#PprofExecutionTrace) | **Get** /sys/pprof/trace | Returns the execution trace in binary form. +[**PprofGoroutines**](SystemApi.md#PprofGoroutines) | **Get** /sys/pprof/goroutine | Returns stack traces of all current goroutines. +[**PprofIndex**](SystemApi.md#PprofIndex) | **Get** /sys/pprof/ | Returns an HTML page listing the available profiles. +[**PprofMemoryAllocations**](SystemApi.md#PprofMemoryAllocations) | **Get** /sys/pprof/allocs | Returns a sampling of all past memory allocations. +[**PprofMemoryAllocationsLive**](SystemApi.md#PprofMemoryAllocationsLive) | **Get** /sys/pprof/heap | Returns a sampling of memory allocations of live object. +[**PprofMutexes**](SystemApi.md#PprofMutexes) | **Get** /sys/pprof/mutex | Returns stack traces of holders of contended mutexes +[**PprofSymbols**](SystemApi.md#PprofSymbols) | **Get** /sys/pprof/symbol | Returns the program counters listed in the request. +[**PprofThreadCreations**](SystemApi.md#PprofThreadCreations) | **Get** /sys/pprof/threadcreate | Returns stack traces that led to the creation of new OS threads +[**QueryTokenAccessorCapabilities**](SystemApi.md#QueryTokenAccessorCapabilities) | **Post** /sys/capabilities-accessor | +[**QueryTokenCapabilities**](SystemApi.md#QueryTokenCapabilities) | **Post** /sys/capabilities | +[**QueryTokenSelfCapabilities**](SystemApi.md#QueryTokenSelfCapabilities) | **Post** /sys/capabilities-self | +[**RateLimitQuotasConfigure**](SystemApi.md#RateLimitQuotasConfigure) | **Post** /sys/quotas/config | +[**RateLimitQuotasDelete**](SystemApi.md#RateLimitQuotasDelete) | **Delete** /sys/quotas/rate-limit/{name} | +[**RateLimitQuotasList**](SystemApi.md#RateLimitQuotasList) | **Get** /sys/quotas/rate-limit | +[**RateLimitQuotasRead**](SystemApi.md#RateLimitQuotasRead) | **Get** /sys/quotas/rate-limit/{name} | +[**RateLimitQuotasReadConfiguration**](SystemApi.md#RateLimitQuotasReadConfiguration) | **Get** /sys/quotas/config | +[**RateLimitQuotasWrite**](SystemApi.md#RateLimitQuotasWrite) | **Post** /sys/quotas/rate-limit/{name} | +[**ReadHealthStatus**](SystemApi.md#ReadHealthStatus) | **Get** /sys/health | Returns the health status of Vault. +[**ReadInitializationStatus**](SystemApi.md#ReadInitializationStatus) | **Get** /sys/init | Returns the initialization status of Vault. +[**ReadSanitizedConfigurationState**](SystemApi.md#ReadSanitizedConfigurationState) | **Get** /sys/config/state/sanitized | Return a sanitized version of the Vault server configuration. +[**ReadWrappingProperties**](SystemApi.md#ReadWrappingProperties) | **Post** /sys/wrapping/lookup | Look up wrapping properties for the given token. +[**ReadWrappingProperties2**](SystemApi.md#ReadWrappingProperties2) | **Get** /sys/wrapping/lookup | Look up wrapping properties for the requester's token. +[**RekeyAttemptCancel**](SystemApi.md#RekeyAttemptCancel) | **Delete** /sys/rekey/init | Cancels any in-progress rekey. +[**RekeyAttemptInitialize**](SystemApi.md#RekeyAttemptInitialize) | **Post** /sys/rekey/init | Initializes a new rekey attempt. +[**RekeyAttemptReadProgress**](SystemApi.md#RekeyAttemptReadProgress) | **Get** /sys/rekey/init | Reads the configuration and progress of the current rekey attempt. +[**RekeyAttemptUpdate**](SystemApi.md#RekeyAttemptUpdate) | **Post** /sys/rekey/update | Enter a single unseal key share to progress the rekey of the Vault. +[**RekeyDeleteBackupKey**](SystemApi.md#RekeyDeleteBackupKey) | **Delete** /sys/rekey/backup | Delete the backup copy of PGP-encrypted unseal keys. +[**RekeyDeleteBackupRecoveryKey**](SystemApi.md#RekeyDeleteBackupRecoveryKey) | **Delete** /sys/rekey/recovery-key-backup | +[**RekeyReadBackupKey**](SystemApi.md#RekeyReadBackupKey) | **Get** /sys/rekey/backup | Return the backup copy of PGP-encrypted unseal keys. +[**RekeyReadBackupRecoveryKey**](SystemApi.md#RekeyReadBackupRecoveryKey) | **Get** /sys/rekey/recovery-key-backup | +[**RekeyVerificationCancel**](SystemApi.md#RekeyVerificationCancel) | **Delete** /sys/rekey/verify | Cancel any in-progress rekey verification operation. +[**RekeyVerificationReadProgress**](SystemApi.md#RekeyVerificationReadProgress) | **Get** /sys/rekey/verify | Read the configuration and progress of the current rekey verification attempt. +[**RekeyVerificationUpdate**](SystemApi.md#RekeyVerificationUpdate) | **Post** /sys/rekey/verify | Enter a single new key share to progress the rekey verification operation. +[**ReloadSubsystem**](SystemApi.md#ReloadSubsystem) | **Post** /sys/config/reload/{subsystem} | Reload the given subsystem [**Remount**](SystemApi.md#Remount) | **Post** /sys/remount | Initiate a mount migration -[**Renew**](SystemApi.md#Renew) | **Post** /sys/renew | Renews a lease, requesting to extend the lease. -[**RenewFor**](SystemApi.md#RenewFor) | **Post** /sys/renew/{url_lease_id} | Renews a lease, requesting to extend the lease. -[**Revoke**](SystemApi.md#Revoke) | **Post** /sys/revoke | Revokes a lease immediately. -[**RevokeForce**](SystemApi.md#RevokeForce) | **Post** /sys/revoke-force/{prefix} | Revokes all secrets or tokens generated under a given prefix immediately -[**RevokeLease**](SystemApi.md#RevokeLease) | **Post** /sys/revoke/{url_lease_id} | Revokes a lease immediately. -[**RevokePrefix**](SystemApi.md#RevokePrefix) | **Post** /sys/revoke-prefix/{prefix} | Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. -[**Rotate**](SystemApi.md#Rotate) | **Post** /sys/rotate | Rotates the backend encryption key used to persist data. +[**RemountStatus**](SystemApi.md#RemountStatus) | **Get** /sys/remount/status/{migration_id} | Check status of a mount migration +[**ReplicationStatus**](SystemApi.md#ReplicationStatus) | **Get** /sys/replication/status | +[**Rewrap**](SystemApi.md#Rewrap) | **Post** /sys/wrapping/rewrap | +[**RootTokenGenerationCancel**](SystemApi.md#RootTokenGenerationCancel) | **Delete** /sys/generate-root/attempt | Cancels any in-progress root generation attempt. +[**RootTokenGenerationCancel2**](SystemApi.md#RootTokenGenerationCancel2) | **Delete** /sys/generate-root | Cancels any in-progress root generation attempt. +[**RootTokenGenerationInitialize**](SystemApi.md#RootTokenGenerationInitialize) | **Post** /sys/generate-root/attempt | Initializes a new root generation attempt. +[**RootTokenGenerationInitialize2**](SystemApi.md#RootTokenGenerationInitialize2) | **Post** /sys/generate-root | Initializes a new root generation attempt. +[**RootTokenGenerationReadProgress**](SystemApi.md#RootTokenGenerationReadProgress) | **Get** /sys/generate-root/attempt | Read the configuration and progress of the current root generation attempt. +[**RootTokenGenerationReadProgress2**](SystemApi.md#RootTokenGenerationReadProgress2) | **Get** /sys/generate-root | Read the configuration and progress of the current root generation attempt. +[**RootTokenGenerationUpdate**](SystemApi.md#RootTokenGenerationUpdate) | **Post** /sys/generate-root/update | Enter a single unseal key share to progress the root generation attempt. [**Seal**](SystemApi.md#Seal) | **Post** /sys/seal | Seal the Vault. +[**SealStatus**](SystemApi.md#SealStatus) | **Get** /sys/seal-status | Check the seal status of a Vault. [**StepDownLeader**](SystemApi.md#StepDownLeader) | **Post** /sys/step-down | Cause the node to give up active status. -[**SysDeletePluginsCatalogName**](SystemApi.md#SysDeletePluginsCatalogName) | **Delete** /sys/plugins/catalog/{name} | Remove the plugin with the given name. -[**SysListLeasesLookup**](SystemApi.md#SysListLeasesLookup) | **Get** /sys/leases/lookup/ | Returns a list of lease ids. -[**SysReadPluginsCatalogName**](SystemApi.md#SysReadPluginsCatalogName) | **Get** /sys/plugins/catalog/{name} | Return the configuration data for the plugin with the given name. -[**SysWriteLockedusersMountAccessorUnlockAliasIdentifier**](SystemApi.md#SysWriteLockedusersMountAccessorUnlockAliasIdentifier) | **Post** /sys/lockedusers/{mount_accessor}/unlock/{alias_identifier} | Unlocks the user with given mount_accessor and alias_identifier -[**SysWritePluginsCatalogName**](SystemApi.md#SysWritePluginsCatalogName) | **Post** /sys/plugins/catalog/{name} | Register a new plugin, or updates an existing one with the supplied name. -[**SysWriteToolsRandomUrlbytes**](SystemApi.md#SysWriteToolsRandomUrlbytes) | **Post** /sys/tools/random/{urlbytes} | Generate random bytes -[**ToolsGenerateRandom**](SystemApi.md#ToolsGenerateRandom) | **Post** /sys/tools/random | Generate random bytes -[**ToolsGenerateRandomSource**](SystemApi.md#ToolsGenerateRandomSource) | **Post** /sys/tools/random/{source} | Generate random bytes -[**ToolsGenerateRandomSourceBytes**](SystemApi.md#ToolsGenerateRandomSourceBytes) | **Post** /sys/tools/random/{source}/{urlbytes} | Generate random bytes -[**ToolsHash**](SystemApi.md#ToolsHash) | **Post** /sys/tools/hash | Generate a hash sum for input data -[**ToolsHashWith**](SystemApi.md#ToolsHashWith) | **Post** /sys/tools/hash/{urlalgorithm} | Generate a hash sum for input data +[**UiHeadersConfigure**](SystemApi.md#UiHeadersConfigure) | **Post** /sys/config/ui/headers/{header} | Configure the values to be returned for the UI header. +[**UiHeadersDeleteConfiguration**](SystemApi.md#UiHeadersDeleteConfiguration) | **Delete** /sys/config/ui/headers/{header} | Remove a UI header. +[**UiHeadersList**](SystemApi.md#UiHeadersList) | **Get** /sys/config/ui/headers/ | Return a list of configured UI headers. +[**UiHeadersReadConfiguration**](SystemApi.md#UiHeadersReadConfiguration) | **Get** /sys/config/ui/headers/{header} | Return the given UI header's configuration [**Unseal**](SystemApi.md#Unseal) | **Post** /sys/unseal | Unseal the Vault. -[**WrappingReadLookup**](SystemApi.md#WrappingReadLookup) | **Get** /sys/wrapping/lookup | Look up wrapping properties for the requester's token. -[**WrappingRewrap**](SystemApi.md#WrappingRewrap) | **Post** /sys/wrapping/rewrap | Rotates a response-wrapped token. -[**WrappingUnwrap**](SystemApi.md#WrappingUnwrap) | **Post** /sys/wrapping/unwrap | Unwraps a response-wrapped token. -[**WrappingWrap**](SystemApi.md#WrappingWrap) | **Post** /sys/wrapping/wrap | Response-wraps an arbitrary JSON object. -[**WrappingWriteLookup**](SystemApi.md#WrappingWriteLookup) | **Post** /sys/wrapping/lookup | Look up wrapping properties for the given token. -[**WriteAuditDevice**](SystemApi.md#WriteAuditDevice) | **Post** /sys/audit/{path} | Enable a new audit device at the supplied path. -[**WriteAuthMethod**](SystemApi.md#WriteAuthMethod) | **Post** /sys/auth/{path} | Enables a new auth method. -[**WriteAuthMethodTune**](SystemApi.md#WriteAuthMethodTune) | **Post** /sys/auth/{path}/tune | Tune configuration parameters for a given auth path. -[**WriteCapabilities**](SystemApi.md#WriteCapabilities) | **Post** /sys/capabilities | Fetches the capabilities of the given token on the given path. -[**WriteCapabilitiesAccessor**](SystemApi.md#WriteCapabilitiesAccessor) | **Post** /sys/capabilities-accessor | Fetches the capabilities of the token associated with the given token, on the given path. -[**WriteCapabilitiesSelf**](SystemApi.md#WriteCapabilitiesSelf) | **Post** /sys/capabilities-self | Fetches the capabilities of the given token on the given path. -[**WriteConfigAuditingRequestHeader**](SystemApi.md#WriteConfigAuditingRequestHeader) | **Post** /sys/config/auditing/request-headers/{header} | Enable auditing of a header. -[**WriteConfigCORS**](SystemApi.md#WriteConfigCORS) | **Post** /sys/config/cors | Configure the CORS settings. -[**WriteConfigReloadSubsystem**](SystemApi.md#WriteConfigReloadSubsystem) | **Post** /sys/config/reload/{subsystem} | Reload the given subsystem -[**WriteConfigUIHeader**](SystemApi.md#WriteConfigUIHeader) | **Post** /sys/config/ui/headers/{header} | Configure the values to be returned for the UI header. -[**WriteGenerateRoot**](SystemApi.md#WriteGenerateRoot) | **Post** /sys/generate-root | Initializes a new root generation attempt. -[**WriteGenerateRootAttempt**](SystemApi.md#WriteGenerateRootAttempt) | **Post** /sys/generate-root/attempt | Initializes a new root generation attempt. -[**WriteGenerateRootUpdate**](SystemApi.md#WriteGenerateRootUpdate) | **Post** /sys/generate-root/update | Enter a single unseal key share to progress the root generation attempt. -[**WriteInit**](SystemApi.md#WriteInit) | **Post** /sys/init | Initialize a new Vault. -[**WriteInternalCountersConfig**](SystemApi.md#WriteInternalCountersConfig) | **Post** /sys/internal/counters/config | Enable or disable collection of client count, set retention period, or set default reporting period. -[**WriteLeasesLookup**](SystemApi.md#WriteLeasesLookup) | **Post** /sys/leases/lookup | Retrieve lease metadata. -[**WriteLeasesRenew**](SystemApi.md#WriteLeasesRenew) | **Post** /sys/leases/renew | Renews a lease, requesting to extend the lease. -[**WriteLeasesRenew2**](SystemApi.md#WriteLeasesRenew2) | **Post** /sys/leases/renew/{url_lease_id} | Renews a lease, requesting to extend the lease. -[**WriteLeasesRevoke**](SystemApi.md#WriteLeasesRevoke) | **Post** /sys/leases/revoke | Revokes a lease immediately. -[**WriteLeasesRevoke2**](SystemApi.md#WriteLeasesRevoke2) | **Post** /sys/leases/revoke/{url_lease_id} | Revokes a lease immediately. -[**WriteLeasesRevokeForce**](SystemApi.md#WriteLeasesRevokeForce) | **Post** /sys/leases/revoke-force/{prefix} | Revokes all secrets or tokens generated under a given prefix immediately -[**WriteLeasesRevokePrefix**](SystemApi.md#WriteLeasesRevokePrefix) | **Post** /sys/leases/revoke-prefix/{prefix} | Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. -[**WriteLeasesTidy**](SystemApi.md#WriteLeasesTidy) | **Post** /sys/leases/tidy | This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. -[**WriteLogger**](SystemApi.md#WriteLogger) | **Post** /sys/loggers/{name} | Modify the log level of a single logger. -[**WriteLoggers**](SystemApi.md#WriteLoggers) | **Post** /sys/loggers | Modify the log level for all existing loggers. -[**WriteMount**](SystemApi.md#WriteMount) | **Post** /sys/mounts/{path} | Enable a new secrets engine at the given path. -[**WriteMountsConfig**](SystemApi.md#WriteMountsConfig) | **Post** /sys/mounts/{path}/tune | Tune backend configuration parameters for this mount. -[**WritePluginsCatalogByTypeByName**](SystemApi.md#WritePluginsCatalogByTypeByName) | **Post** /sys/plugins/catalog/{type}/{name} | Register a new plugin, or updates an existing one with the supplied name. -[**WritePluginsReloadBackend**](SystemApi.md#WritePluginsReloadBackend) | **Post** /sys/plugins/reload/backend | Reload mounted plugin backends. -[**WritePoliciesACL**](SystemApi.md#WritePoliciesACL) | **Post** /sys/policies/acl/{name} | Add a new or update an existing ACL policy. -[**WritePoliciesPassword**](SystemApi.md#WritePoliciesPassword) | **Post** /sys/policies/password/{name} | Add a new or update an existing password policy. -[**WritePolicy**](SystemApi.md#WritePolicy) | **Post** /sys/policy/{name} | Add a new or update an existing policy. -[**WriteQuotasConfig**](SystemApi.md#WriteQuotasConfig) | **Post** /sys/quotas/config | -[**WriteQuotasRateLimit**](SystemApi.md#WriteQuotasRateLimit) | **Post** /sys/quotas/rate-limit/{name} | -[**WriteRaw**](SystemApi.md#WriteRaw) | **Post** /sys/raw | Update the value of the key at the given path. -[**WriteRawPath**](SystemApi.md#WriteRawPath) | **Post** /sys/raw/{path} | Update the value of the key at the given path. -[**WriteRekeyInit**](SystemApi.md#WriteRekeyInit) | **Post** /sys/rekey/init | Initializes a new rekey attempt. -[**WriteRekeyUpdate**](SystemApi.md#WriteRekeyUpdate) | **Post** /sys/rekey/update | Enter a single unseal key share to progress the rekey of the Vault. -[**WriteRekeyVerify**](SystemApi.md#WriteRekeyVerify) | **Post** /sys/rekey/verify | Enter a single new key share to progress the rekey verification operation. -[**WriteRotateConfig**](SystemApi.md#WriteRotateConfig) | **Post** /sys/rotate/config | +[**Unwrap**](SystemApi.md#Unwrap) | **Post** /sys/wrapping/unwrap | +[**VersionHistory**](SystemApi.md#VersionHistory) | **Get** /sys/version-history/ | Returns map of historical version change entries +[**Wrap**](SystemApi.md#Wrap) | **Post** /sys/wrapping/wrap | -## CalculateAuditHash +## AuditingCalculateHash + -The hash of the given string via the given audit backend ### Example @@ -202,8 +199,8 @@ func main() { } path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" - request := schema.NewCalculateAuditHashRequestWithDefaults() - resp, err := client.System.CalculateAuditHash( + request := schema.NewAuditingCalculateHashRequestWithDefaults() + resp, err := client.System.AuditingCalculateHash( context.Background(), path, request, @@ -231,16 +228,16 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **calculateAuditHashRequest** | [**CalculateAuditHashRequest**](CalculateAuditHashRequest.md) | | + **auditingCalculateHashRequest** | [**AuditingCalculateHashRequest**](AuditingCalculateHashRequest.md) | | - (empty response body) +[**AuditingCalculateHashResponse**](AuditingCalculateHashResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## DeleteAuditDevice +## AuditingDisableDevice Disable the audit device at the given path. @@ -266,7 +263,7 @@ func main() { } path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" - resp, err := client.System.DeleteAuditDevice( + resp, err := client.System.AuditingDisableDevice( context.Background(), path, vault.WithToken("my-token"), @@ -301,9 +298,9 @@ Name | Type | Description | Notes -## DeleteAuthMethod +## AuditingDisableRequestHeader -Disable the auth method at the given auth path +Disable auditing of the given request header. ### Example @@ -326,10 +323,10 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" - resp, err := client.System.DeleteAuthMethod( + header := "header_example" // string | + resp, err := client.System.AuditingDisableRequestHeader( context.Background(), - path, + header, vault.WithToken("my-token"), ) if err != nil { @@ -346,7 +343,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | The path to mount to. Cannot be delimited. Example: \"user\" | +**header** | **string** | | ### Other Parameters @@ -362,9 +359,9 @@ Name | Type | Description | Notes -## DeleteConfigAuditingRequestHeader +## AuditingEnableDevice -Disable auditing of the given request header. +Enable a new audit device at the supplied path. ### Example @@ -377,6 +374,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -387,10 +385,12 @@ func main() { log.Fatal(err) } - header := "header_example" // string | - resp, err := client.System.DeleteConfigAuditingRequestHeader( + path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" + request := schema.NewAuditingEnableDeviceRequestWithDefaults() + resp, err := client.System.AuditingEnableDevice( context.Background(), - header, + path, + request, vault.WithToken("my-token"), ) if err != nil { @@ -407,7 +407,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**header** | **string** | | +**path** | **string** | The name of the backend. Cannot be delimited. Example: \"mysql\" | ### Other Parameters @@ -415,6 +415,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **auditingEnableDeviceRequest** | [**AuditingEnableDeviceRequest**](AuditingEnableDeviceRequest.md) | | (empty response body) @@ -423,9 +424,9 @@ Name | Type | Description | Notes -## DeleteConfigCORS +## AuditingEnableRequestHeader -Remove any CORS settings. +Enable auditing of a header. ### Example @@ -438,6 +439,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -448,8 +450,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteConfigCORS( + header := "header_example" // string | + request := schema.NewAuditingEnableRequestHeaderRequestWithDefaults() + resp, err := client.System.AuditingEnableRequestHeader( context.Background(), + header, + request, vault.WithToken("my-token"), ) if err != nil { @@ -462,11 +468,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**header** | **string** | | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **auditingEnableRequestHeaderRequest** | [**AuditingEnableRequestHeaderRequest**](AuditingEnableRequestHeaderRequest.md) | | (empty response body) @@ -475,9 +489,9 @@ This endpoint does not require any parameters. -## DeleteConfigUIHeader +## AuditingListEnabledDevices -Remove a UI header. +List the enabled audit devices. ### Example @@ -500,10 +514,8 @@ func main() { log.Fatal(err) } - header := "header_example" // string | The name of the header. - resp, err := client.System.DeleteConfigUIHeader( + resp, err := client.System.AuditingListEnabledDevices( context.Background(), - header, vault.WithToken("my-token"), ) if err != nil { @@ -516,18 +528,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**header** | **string** | The name of the header. | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -536,9 +541,9 @@ Name | Type | Description | Notes -## DeleteGenerateRoot +## AuditingListRequestHeaders -Cancels any in-progress root generation attempt. +List the request headers that are configured to be audited. ### Example @@ -561,7 +566,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteGenerateRoot( + resp, err := client.System.AuditingListRequestHeaders( context.Background(), vault.WithToken("my-token"), ) @@ -581,16 +586,16 @@ This endpoint does not require any parameters. - (empty response body) +[**AuditingListRequestHeadersResponse**](AuditingListRequestHeadersResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## DeleteGenerateRootAttempt +## AuditingReadRequestHeaderInformation -Cancels any in-progress root generation attempt. +List the information for the given request header. ### Example @@ -613,8 +618,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteGenerateRootAttempt( + header := "header_example" // string | + resp, err := client.System.AuditingReadRequestHeaderInformation( context.Background(), + header, vault.WithToken("my-token"), ) if err != nil { @@ -627,11 +634,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**header** | **string** | | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -640,9 +654,9 @@ This endpoint does not require any parameters. -## DeleteLogger +## AuthDisableMethod -Revert a single logger to use log level provided in config. +Disable the auth method at the given auth path ### Example @@ -665,10 +679,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the logger to be modified. - resp, err := client.System.DeleteLogger( + path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" + resp, err := client.System.AuthDisableMethod( context.Background(), - name, + path, vault.WithToken("my-token"), ) if err != nil { @@ -685,7 +699,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the logger to be modified. | +**path** | **string** | The path to mount to. Cannot be delimited. Example: \"user\" | ### Other Parameters @@ -701,9 +715,11 @@ Name | Type | Description | Notes -## DeleteLoggers +## AuthEnableMethod + +Enables a new auth method. + -Revert the all loggers to use log level provided in config. ### Example @@ -716,6 +732,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -726,8 +743,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteLoggers( + path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" + request := schema.NewAuthEnableMethodRequestWithDefaults() + resp, err := client.System.AuthEnableMethod( context.Background(), + path, + request, vault.WithToken("my-token"), ) if err != nil { @@ -740,11 +761,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**path** | **string** | The path to mount to. Cannot be delimited. Example: \"user\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **authEnableMethodRequest** | [**AuthEnableMethodRequest**](AuthEnableMethodRequest.md) | | (empty response body) @@ -753,9 +782,9 @@ This endpoint does not require any parameters. -## DeleteMount +## AuthListEnabledMethods + -Disable the mount point specified at the given path. ### Example @@ -778,10 +807,8 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The path to mount to. Example: \"aws/east\" - resp, err := client.System.DeleteMount( + resp, err := client.System.AuthListEnabledMethods( context.Background(), - path, vault.WithToken("my-token"), ) if err != nil { @@ -794,18 +821,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | The path to mount to. Example: \"aws/east\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -814,9 +834,9 @@ Name | Type | Description | Notes -## DeletePluginsCatalogByTypeByName +## AuthReadConfiguration -Remove the plugin with the given name. +Read the configuration of the auth engine at the given path. ### Example @@ -839,12 +859,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the plugin - type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database - resp, err := client.System.DeletePluginsCatalogByTypeByName( + path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" + resp, err := client.System.AuthReadConfiguration( context.Background(), - name, - type_, + path, vault.WithToken("my-token"), ) if err != nil { @@ -861,8 +879,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the plugin | -**type_** | **string** | The type of the plugin, may be auth, secret, or database | +**path** | **string** | The path to mount to. Cannot be delimited. Example: \"user\" | ### Other Parameters @@ -871,17 +888,18 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - (empty response body) +[**AuthReadConfigurationResponse**](AuthReadConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## DeletePoliciesACL +## AuthReadTuningInformation + +Reads the given auth path's configuration. + -Delete the ACL policy with the given name. ### Example @@ -904,10 +922,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the policy. Example: \"ops\" - resp, err := client.System.DeletePoliciesACL( + path := "path_example" // string | Tune the configuration parameters for an auth path. + resp, err := client.System.AuthReadTuningInformation( context.Background(), - name, + path, vault.WithToken("my-token"), ) if err != nil { @@ -924,7 +942,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the policy. Example: \"ops\" | +**path** | **string** | Tune the configuration parameters for an auth path. | ### Other Parameters @@ -933,16 +951,18 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**AuthReadTuningInformationResponse**](AuthReadTuningInformationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## DeletePoliciesPassword +## AuthTuneConfigurationParameters + +Tune configuration parameters for a given auth path. + -Delete a password policy. ### Example @@ -955,6 +975,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -965,10 +986,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the password policy. - resp, err := client.System.DeletePoliciesPassword( + path := "path_example" // string | Tune the configuration parameters for an auth path. + request := schema.NewAuthTuneConfigurationParametersRequestWithDefaults() + resp, err := client.System.AuthTuneConfigurationParameters( context.Background(), - name, + path, + request, vault.WithToken("my-token"), ) if err != nil { @@ -985,7 +1008,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the password policy. | +**path** | **string** | Tune the configuration parameters for an auth path. | ### Other Parameters @@ -993,6 +1016,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **authTuneConfigurationParametersRequest** | [**AuthTuneConfigurationParametersRequest**](AuthTuneConfigurationParametersRequest.md) | | (empty response body) @@ -1001,9 +1025,11 @@ Name | Type | Description | Notes -## DeletePolicy +## CollectHostInformation + +Information about the host instance that this Vault server is running on. + -Delete the policy with the given name. ### Example @@ -1026,10 +1052,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the policy. Example: \"ops\" - resp, err := client.System.DeletePolicy( + resp, err := client.System.CollectHostInformation( context.Background(), - name, vault.WithToken("my-token"), ) if err != nil { @@ -1042,27 +1066,22 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the policy. Example: \"ops\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - (empty response body) +[**CollectHostInformationResponse**](CollectHostInformationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## DeleteQuotasRateLimit +## CollectInFlightRequestInformation + +reports in-flight requests @@ -1087,10 +1106,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the quota rule. - resp, err := client.System.DeleteQuotasRateLimit( + resp, err := client.System.CollectInFlightRequestInformation( context.Background(), - name, vault.WithToken("my-token"), ) if err != nil { @@ -1103,18 +1120,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the quota rule. | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -1123,9 +1133,9 @@ Name | Type | Description | Notes -## DeleteRaw +## CorsConfigure -Delete the key with given path. +Configure the CORS settings. ### Example @@ -1138,6 +1148,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1148,8 +1159,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteRaw( + request := schema.NewCorsConfigureRequestWithDefaults() + resp, err := client.System.CorsConfigure( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -1162,11 +1175,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **corsConfigureRequest** | [**CorsConfigureRequest**](CorsConfigureRequest.md) | | (empty response body) @@ -1175,9 +1191,9 @@ This endpoint does not require any parameters. -## DeleteRawPath +## CorsDeleteConfiguration -Delete the key with given path. +Remove any CORS settings. ### Example @@ -1200,10 +1216,8 @@ func main() { log.Fatal(err) } - path := "path_example" // string | - resp, err := client.System.DeleteRawPath( + resp, err := client.System.CorsDeleteConfiguration( context.Background(), - path, vault.WithToken("my-token"), ) if err != nil { @@ -1216,18 +1230,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -1236,9 +1243,9 @@ Name | Type | Description | Notes -## DeleteRekeyBackup +## CorsReadConfiguration -Delete the backup copy of PGP-encrypted unseal keys. +Return the current CORS settings. ### Example @@ -1261,7 +1268,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteRekeyBackup( + resp, err := client.System.CorsReadConfiguration( context.Background(), vault.WithToken("my-token"), ) @@ -1281,16 +1288,14 @@ This endpoint does not require any parameters. - (empty response body) +[**CorsReadConfigurationResponse**](CorsReadConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## DeleteRekeyInit - -Cancels any in-progress rekey. +## EncryptionKeyConfigureRotation @@ -1305,6 +1310,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1315,8 +1321,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteRekeyInit( + request := schema.NewEncryptionKeyConfigureRotationRequestWithDefaults() + resp, err := client.System.EncryptionKeyConfigureRotation( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -1329,11 +1337,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **encryptionKeyConfigureRotationRequest** | [**EncryptionKeyConfigureRotationRequest**](EncryptionKeyConfigureRotationRequest.md) | | (empty response body) @@ -1342,9 +1353,9 @@ This endpoint does not require any parameters. -## DeleteRekeyRecoveryKeyBackup +## EncryptionKeyReadRotationConfiguration + -Allows fetching or deleting the backup of the rotated unseal keys. ### Example @@ -1367,7 +1378,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteRekeyRecoveryKeyBackup( + resp, err := client.System.EncryptionKeyReadRotationConfiguration( context.Background(), vault.WithToken("my-token"), ) @@ -1387,16 +1398,14 @@ This endpoint does not require any parameters. - (empty response body) +[**EncryptionKeyReadRotationConfigurationResponse**](EncryptionKeyReadRotationConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## DeleteRekeyVerify - -Cancel any in-progress rekey verification operation. +## EncryptionKeyRotate @@ -1421,7 +1430,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.DeleteRekeyVerify( + resp, err := client.System.EncryptionKeyRotate( context.Background(), vault.WithToken("my-token"), ) @@ -1448,9 +1457,9 @@ This endpoint does not require any parameters. -## ListConfigUIHeaders +## EncryptionKeyStatus -Return a list of configured UI headers. +Provides information about the backend encryption key. ### Example @@ -1473,7 +1482,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ListConfigUIHeaders( + resp, err := client.System.EncryptionKeyStatus( context.Background(), vault.WithToken("my-token"), ) @@ -1487,14 +1496,11 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | (empty response body) @@ -1503,9 +1509,9 @@ Name | Type | Description | Notes -## ListLeasesLookupPrefix +## GenerateHash + -Returns a list of lease ids. ### Example @@ -1518,6 +1524,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1528,10 +1535,10 @@ func main() { log.Fatal(err) } - prefix := "prefix_example" // string | The path to list leases under. Example: \"aws/creds/deploy\" - resp, err := client.System.ListLeasesLookupPrefix( + request := schema.NewGenerateHashRequestWithDefaults() + resp, err := client.System.GenerateHash( context.Background(), - prefix, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1545,29 +1552,24 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**prefix** | **string** | The path to list leases under. Example: \"aws/creds/deploy\" | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **generateHashRequest** | [**GenerateHashRequest**](GenerateHashRequest.md) | | - **list** | **string** | Must be set to `true` | - - (empty response body) +[**GenerateHashResponse**](GenerateHashResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ListPluginsCatalogByType +## GenerateHashWithAlgorithm + -List the plugins in the catalog. ### Example @@ -1580,6 +1582,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1590,10 +1593,12 @@ func main() { log.Fatal(err) } - type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database - resp, err := client.System.ListPluginsCatalogByType( + urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) + request := schema.NewGenerateHashWithAlgorithmRequestWithDefaults() + resp, err := client.System.GenerateHashWithAlgorithm( context.Background(), - type_, + urlalgorithm, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1610,7 +1615,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**type_** | **string** | The type of the plugin, may be auth, secret, or database | +**urlalgorithm** | **string** | Algorithm to use (POST URL parameter) | ### Other Parameters @@ -1618,18 +1623,18 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **generateHashWithAlgorithmRequest** | [**GenerateHashWithAlgorithmRequest**](GenerateHashWithAlgorithmRequest.md) | | - (empty response body) +[**GenerateHashWithAlgorithmResponse**](GenerateHashWithAlgorithmResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ListPoliciesACL +## GenerateRandom + -List the configured access control policies. ### Example @@ -1642,6 +1647,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1652,8 +1658,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ListPoliciesACL( + request := schema.NewGenerateRandomRequestWithDefaults() + resp, err := client.System.GenerateRandom( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -1673,18 +1681,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | + **generateRandomRequest** | [**GenerateRandomRequest**](GenerateRandomRequest.md) | | - (empty response body) +[**GenerateRandomResponse**](GenerateRandomResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ListPoliciesPassword +## GenerateRandomWithBytes + -List the existing password policies. ### Example @@ -1697,6 +1705,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1707,8 +1716,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ListPoliciesPassword( + urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) + request := schema.NewGenerateRandomWithBytesRequestWithDefaults() + resp, err := client.System.GenerateRandomWithBytes( context.Background(), + urlbytes, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1722,22 +1735,27 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + **generateRandomWithBytesRequest** | [**GenerateRandomWithBytesRequest**](GenerateRandomWithBytesRequest.md) | | + +[**GenerateRandomWithBytesResponse**](GenerateRandomWithBytesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ListQuotasRateLimits +## GenerateRandomWithSource @@ -1752,6 +1770,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1762,8 +1781,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ListQuotasRateLimits( + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") + request := schema.NewGenerateRandomWithSourceRequestWithDefaults() + resp, err := client.System.GenerateRandomWithSource( context.Background(), + source, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1777,24 +1800,29 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + **generateRandomWithSourceRequest** | [**GenerateRandomWithSourceRequest**](GenerateRandomWithSourceRequest.md) | | + +[**GenerateRandomWithSourceResponse**](GenerateRandomWithSourceResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ListVersionHistory +## GenerateRandomWithSourceAndBytes + -Returns map of historical version change entries ### Example @@ -1807,6 +1835,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1817,8 +1846,14 @@ func main() { log.Fatal(err) } - resp, err := client.System.ListVersionHistory( + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") + urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) + request := schema.NewGenerateRandomWithSourceAndBytesRequestWithDefaults() + resp, err := client.System.GenerateRandomWithSourceAndBytes( context.Background(), + source, + urlbytes, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1832,24 +1867,31 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] +**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | - (empty response body) + + **generateRandomWithSourceAndBytesRequest** | [**GenerateRandomWithSourceAndBytesRequest**](GenerateRandomWithSourceAndBytesRequest.md) | | + +[**GenerateRandomWithSourceAndBytesResponse**](GenerateRandomWithSourceAndBytesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## MFAValidate +## HaStatus -Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token +Check the HA status of a Vault cluster ### Example @@ -1862,7 +1904,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1873,10 +1914,8 @@ func main() { log.Fatal(err) } - request := schema.NewMFAValidateRequestWithDefaults() - resp, err := client.System.MFAValidate( + resp, err := client.System.HaStatus( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -1889,23 +1928,22 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **mFAValidateRequest** | [**MFAValidateRequest**](MFAValidateRequest.md) | | - (empty response body) +[**HaStatusResponse**](HaStatusResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## Monitor +## Initialize + +Initialize a new Vault. @@ -1920,6 +1958,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1930,12 +1969,10 @@ func main() { log.Fatal(err) } - logFormat := "logFormat_example" // string | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". (defaults to "standard") - logLevel := "logLevel_example" // string | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". - resp, err := client.System.Monitor( + request := schema.NewInitializeRequestWithDefaults() + resp, err := client.System.Initialize( context.Background(), - logFormat, - logLevel, + request, vault.WithToken("my-token"), ) if err != nil { @@ -1955,8 +1992,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **logFormat** | **string** | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". | [default to "standard"] - **logLevel** | **string** | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". | + **initializeRequest** | [**InitializeRequest**](InitializeRequest.md) | | (empty response body) @@ -1965,11 +2001,9 @@ Name | Type | Description | Notes -## PprofRead - -Returns an HTML page listing the available profiles. - +## InternalClientActivityConfigure +Enable or disable collection of client count, set retention period, or set default reporting period. ### Example @@ -1982,6 +2016,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -1992,8 +2027,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofRead( + request := schema.NewInternalClientActivityConfigureRequestWithDefaults() + resp, err := client.System.InternalClientActivityConfigure( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -2006,11 +2043,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **internalClientActivityConfigureRequest** | [**InternalClientActivityConfigureRequest**](InternalClientActivityConfigureRequest.md) | | (empty response body) @@ -2019,11 +2059,9 @@ This endpoint does not require any parameters. -## PprofReadAllocs - -Returns a sampling of all past memory allocations. - +## InternalClientActivityExport +Report the client count metrics, for this namespace and all child namespaces. ### Example @@ -2046,7 +2084,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadAllocs( + resp, err := client.System.InternalClientActivityExport( context.Background(), vault.WithToken("my-token"), ) @@ -2073,11 +2111,9 @@ This endpoint does not require any parameters. -## PprofReadBlock - -Returns stack traces that led to blocking on synchronization primitives - +## InternalClientActivityReadConfiguration +Read the client count tracking configuration. ### Example @@ -2100,7 +2136,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadBlock( + resp, err := client.System.InternalClientActivityReadConfiguration( context.Background(), vault.WithToken("my-token"), ) @@ -2127,11 +2163,9 @@ This endpoint does not require any parameters. -## PprofReadCmdline - -Returns the running program's command line. - +## InternalClientActivityReportCounts +Report the client count metrics, for this namespace and all child namespaces. ### Example @@ -2154,7 +2188,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadCmdline( + resp, err := client.System.InternalClientActivityReportCounts( context.Background(), vault.WithToken("my-token"), ) @@ -2181,11 +2215,9 @@ This endpoint does not require any parameters. -## PprofReadGoroutine - -Returns stack traces of all current goroutines. - +## InternalClientActivityReportCountsThisMonth +Report the number of clients for this month, for this namespace and all child namespaces. ### Example @@ -2208,7 +2240,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadGoroutine( + resp, err := client.System.InternalClientActivityReportCountsThisMonth( context.Background(), vault.WithToken("my-token"), ) @@ -2235,11 +2267,9 @@ This endpoint does not require any parameters. -## PprofReadHeap - -Returns a sampling of memory allocations of live object. - +## InternalCountEntities +Backwards compatibility is not guaranteed for this API ### Example @@ -2262,7 +2292,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadHeap( + resp, err := client.System.InternalCountEntities( context.Background(), vault.WithToken("my-token"), ) @@ -2282,18 +2312,16 @@ This endpoint does not require any parameters. - (empty response body) +[**InternalCountEntitiesResponse**](InternalCountEntitiesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PprofReadMutex - -Returns stack traces of holders of contended mutexes - +## InternalCountRequests +Backwards compatibility is not guaranteed for this API ### Example @@ -2316,7 +2344,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadMutex( + resp, err := client.System.InternalCountRequests( context.Background(), vault.WithToken("my-token"), ) @@ -2343,11 +2371,9 @@ This endpoint does not require any parameters. -## PprofReadProfile - -Returns a pprof-formatted cpu profile payload. - +## InternalCountTokens +Backwards compatibility is not guaranteed for this API ### Example @@ -2370,7 +2396,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadProfile( + resp, err := client.System.InternalCountTokens( context.Background(), vault.WithToken("my-token"), ) @@ -2390,16 +2416,14 @@ This endpoint does not require any parameters. - (empty response body) +[**InternalCountTokensResponse**](InternalCountTokensResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## PprofReadSymbol - -Returns the program counters listed in the request. +## InternalGenerateOpenApiDocument @@ -2424,8 +2448,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadSymbol( + genericMountPaths := true // bool | Use generic mount paths (defaults to false) + resp, err := client.System.InternalGenerateOpenApiDocument( context.Background(), + genericMountPaths, vault.WithToken("my-token"), ) if err != nil { @@ -2438,11 +2464,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **genericMountPaths** | **bool** | Use generic mount paths | [default to false] (empty response body) @@ -2451,9 +2480,7 @@ This endpoint does not require any parameters. -## PprofReadThreadcreate - -Returns stack traces that led to the creation of new OS threads +## InternalGenerateOpenApiDocument2 @@ -2468,6 +2495,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -2478,8 +2506,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadThreadcreate( + request := schema.NewInternalGenerateOpenApiDocument2RequestWithDefaults() + genericMountPaths := true // bool | Use generic mount paths (defaults to false) + resp, err := client.System.InternalGenerateOpenApiDocument2( context.Background(), + request, + genericMountPaths, vault.WithToken("my-token"), ) if err != nil { @@ -2492,11 +2524,15 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **internalGenerateOpenApiDocument2Request** | [**InternalGenerateOpenApiDocument2Request**](InternalGenerateOpenApiDocument2Request.md) | | + **genericMountPaths** | **bool** | Use generic mount paths | [default to false] (empty response body) @@ -2505,11 +2541,9 @@ This endpoint does not require any parameters. -## PprofReadTrace - -Returns the execution trace in binary form. - +## InternalInspectRouter +Expose the route entry and mount entry tables present in the router ### Example @@ -2532,8 +2566,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.PprofReadTrace( + tag := "tag_example" // string | Name of subtree being observed + resp, err := client.System.InternalInspectRouter( context.Background(), + tag, vault.WithToken("my-token"), ) if err != nil { @@ -2546,11 +2582,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**tag** | **string** | Name of subtree being observed | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -2559,9 +2602,9 @@ This endpoint does not require any parameters. -## ReadAuditDevices +## InternalUiListEnabledFeatureFlags -List the enabled audit devices. +Lists enabled feature flags. ### Example @@ -2584,7 +2627,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadAuditDevices( + resp, err := client.System.InternalUiListEnabledFeatureFlags( context.Background(), vault.WithToken("my-token"), ) @@ -2604,16 +2647,16 @@ This endpoint does not require any parameters. - (empty response body) +[**InternalUiListEnabledFeatureFlagsResponse**](InternalUiListEnabledFeatureFlagsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadAuthMethod +## InternalUiListEnabledVisibleMounts -Read the configuration of the auth engine at the given path. +Lists all enabled and visible auth and secrets mounts. ### Example @@ -2636,10 +2679,8 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" - resp, err := client.System.ReadAuthMethod( + resp, err := client.System.InternalUiListEnabledVisibleMounts( context.Background(), - path, vault.WithToken("my-token"), ) if err != nil { @@ -2652,31 +2693,22 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | The path to mount to. Cannot be delimited. Example: \"user\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - (empty response body) +[**InternalUiListEnabledVisibleMountsResponse**](InternalUiListEnabledVisibleMountsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadAuthMethodTune - -Reads the given auth path's configuration. - +## InternalUiListNamespaces +Backwards compatibility is not guaranteed for this API ### Example @@ -2699,10 +2731,8 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Tune the configuration parameters for an auth path. - resp, err := client.System.ReadAuthMethodTune( + resp, err := client.System.InternalUiListNamespaces( context.Background(), - path, vault.WithToken("my-token"), ) if err != nil { @@ -2715,29 +2745,22 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | Tune the configuration parameters for an auth path. | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - (empty response body) +[**InternalUiListNamespacesResponse**](InternalUiListNamespacesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadAuthMethods +## InternalUiReadMountInformation -List the currently enabled credential backends. +Return information about the given mount. ### Example @@ -2760,8 +2783,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadAuthMethods( + path := "path_example" // string | The path of the mount. + resp, err := client.System.InternalUiReadMountInformation( context.Background(), + path, vault.WithToken("my-token"), ) if err != nil { @@ -2774,22 +2799,29 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**path** | **string** | The path of the mount. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- - (empty response body) + +[**InternalUiReadMountInformationResponse**](InternalUiReadMountInformationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadConfigAuditingRequestHeader +## InternalUiReadResultantAcl -List the information for the given request header. +Backwards compatibility is not guaranteed for this API ### Example @@ -2812,10 +2844,8 @@ func main() { log.Fatal(err) } - header := "header_example" // string | - resp, err := client.System.ReadConfigAuditingRequestHeader( + resp, err := client.System.InternalUiReadResultantAcl( context.Background(), - header, vault.WithToken("my-token"), ) if err != nil { @@ -2828,29 +2858,22 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**header** | **string** | | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - (empty response body) +[**InternalUiReadResultantAclResponse**](InternalUiReadResultantAclResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadConfigAuditingRequestHeaders +## LeaderStatus -List the request headers that are configured to be audited. +Returns the high availability status and current leader instance of Vault. ### Example @@ -2873,7 +2896,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadConfigAuditingRequestHeaders( + resp, err := client.System.LeaderStatus( context.Background(), vault.WithToken("my-token"), ) @@ -2893,16 +2916,16 @@ This endpoint does not require any parameters. - (empty response body) +[**LeaderStatusResponse**](LeaderStatusResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadConfigCORS +## LeasesCount + -Return the current CORS settings. ### Example @@ -2925,7 +2948,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadConfigCORS( + resp, err := client.System.LeasesCount( context.Background(), vault.WithToken("my-token"), ) @@ -2945,16 +2968,16 @@ This endpoint does not require any parameters. - (empty response body) +[**LeasesCountResponse**](LeasesCountResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadConfigStateSanitized +## LeasesForceRevokeLeaseWithPrefix -Return a sanitized version of the Vault server configuration. +Revokes all secrets or tokens generated under a given prefix immediately @@ -2979,8 +3002,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadConfigStateSanitized( + prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" + resp, err := client.System.LeasesForceRevokeLeaseWithPrefix( context.Background(), + prefix, vault.WithToken("my-token"), ) if err != nil { @@ -2993,11 +3018,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -3006,9 +3038,11 @@ This endpoint does not require any parameters. -## ReadConfigUIHeader +## LeasesForceRevokeLeaseWithPrefix2 + +Revokes all secrets or tokens generated under a given prefix immediately + -Return the given UI header's configuration ### Example @@ -3031,10 +3065,10 @@ func main() { log.Fatal(err) } - header := "header_example" // string | The name of the header. - resp, err := client.System.ReadConfigUIHeader( + prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" + resp, err := client.System.LeasesForceRevokeLeaseWithPrefix2( context.Background(), - header, + prefix, vault.WithToken("my-token"), ) if err != nil { @@ -3051,7 +3085,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**header** | **string** | The name of the header. | +**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | ### Other Parameters @@ -3067,9 +3101,9 @@ Name | Type | Description | Notes -## ReadGenerateRoot +## LeasesList + -Read the configuration and progress of the current root generation attempt. ### Example @@ -3092,7 +3126,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadGenerateRoot( + resp, err := client.System.LeasesList( context.Background(), vault.WithToken("my-token"), ) @@ -3112,16 +3146,16 @@ This endpoint does not require any parameters. - (empty response body) +[**LeasesListResponse**](LeasesListResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadGenerateRootAttempt +## LeasesLookUp + -Read the configuration and progress of the current root generation attempt. ### Example @@ -3144,7 +3178,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadGenerateRootAttempt( + resp, err := client.System.LeasesLookUp( context.Background(), vault.WithToken("my-token"), ) @@ -3158,22 +3192,25 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - (empty response body) +[**LeasesLookUpResponse**](LeasesLookUpResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadHAStatus +## LeasesLookUpWithPrefix + -Check the HA status of a Vault cluster ### Example @@ -3196,8 +3233,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadHAStatus( + prefix := "prefix_example" // string | The path to list leases under. Example: \"aws/creds/deploy\" + resp, err := client.System.LeasesLookUpWithPrefix( context.Background(), + prefix, vault.WithToken("my-token"), ) if err != nil { @@ -3210,22 +3249,30 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**prefix** | **string** | The path to list leases under. Example: \"aws/creds/deploy\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- - (empty response body) + **list** | **string** | Must be set to `true` | + +[**LeasesLookUpWithPrefixResponse**](LeasesLookUpWithPrefixResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadHealth +## LeasesReadLease + -Returns the health status of Vault. ### Example @@ -3238,6 +3285,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3248,8 +3296,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadHealth( + request := schema.NewLeasesReadLeaseRequestWithDefaults() + resp, err := client.System.LeasesReadLease( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -3262,24 +3312,25 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **leasesReadLeaseRequest** | [**LeasesReadLeaseRequest**](LeasesReadLeaseRequest.md) | | - (empty response body) +[**LeasesReadLeaseResponse**](LeasesReadLeaseResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadHostInfo - -Information about the host instance that this Vault server is running on. - +## LeasesRenewLease +Renews a lease, requesting to extend the lease. ### Example @@ -3292,6 +3343,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3302,8 +3354,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadHostInfo( + request := schema.NewLeasesRenewLeaseRequestWithDefaults() + resp, err := client.System.LeasesRenewLease( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -3316,11 +3370,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **leasesRenewLeaseRequest** | [**LeasesRenewLeaseRequest**](LeasesRenewLeaseRequest.md) | | (empty response body) @@ -3329,11 +3386,9 @@ This endpoint does not require any parameters. -## ReadInFlightRequests - -reports in-flight requests - +## LeasesRenewLease2 +Renews a lease, requesting to extend the lease. ### Example @@ -3346,6 +3401,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3356,8 +3412,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInFlightRequests( + request := schema.NewLeasesRenewLease2RequestWithDefaults() + resp, err := client.System.LeasesRenewLease2( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -3370,11 +3428,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **leasesRenewLease2Request** | [**LeasesRenewLease2Request**](LeasesRenewLease2Request.md) | | (empty response body) @@ -3383,9 +3444,9 @@ This endpoint does not require any parameters. -## ReadInit +## LeasesRenewLeaseWithId -Returns the initialization status of Vault. +Renews a lease, requesting to extend the lease. ### Example @@ -3398,6 +3459,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3408,8 +3470,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInit( + urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. + request := schema.NewLeasesRenewLeaseWithIdRequestWithDefaults() + resp, err := client.System.LeasesRenewLeaseWithId( context.Background(), + urlLeaseId, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3422,11 +3488,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **leasesRenewLeaseWithIdRequest** | [**LeasesRenewLeaseWithIdRequest**](LeasesRenewLeaseWithIdRequest.md) | | (empty response body) @@ -3435,9 +3509,9 @@ This endpoint does not require any parameters. -## ReadInternalCountersActivity +## LeasesRenewLeaseWithId2 -Report the client count metrics, for this namespace and all child namespaces. +Renews a lease, requesting to extend the lease. ### Example @@ -3450,6 +3524,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3460,8 +3535,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalCountersActivity( + urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. + request := schema.NewLeasesRenewLeaseWithId2RequestWithDefaults() + resp, err := client.System.LeasesRenewLeaseWithId2( context.Background(), + urlLeaseId, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3474,11 +3553,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **leasesRenewLeaseWithId2Request** | [**LeasesRenewLeaseWithId2Request**](LeasesRenewLeaseWithId2Request.md) | | (empty response body) @@ -3487,9 +3574,9 @@ This endpoint does not require any parameters. -## ReadInternalCountersActivityExport +## LeasesRevokeLease -Report the client count metrics, for this namespace and all child namespaces. +Revokes a lease immediately. ### Example @@ -3502,6 +3589,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3512,8 +3600,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalCountersActivityExport( + request := schema.NewLeasesRevokeLeaseRequestWithDefaults() + resp, err := client.System.LeasesRevokeLease( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -3526,11 +3616,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **leasesRevokeLeaseRequest** | [**LeasesRevokeLeaseRequest**](LeasesRevokeLeaseRequest.md) | | (empty response body) @@ -3539,9 +3632,9 @@ This endpoint does not require any parameters. -## ReadInternalCountersActivityMonthly +## LeasesRevokeLease2 -Report the number of clients for this month, for this namespace and all child namespaces. +Revokes a lease immediately. ### Example @@ -3554,6 +3647,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3564,8 +3658,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalCountersActivityMonthly( + request := schema.NewLeasesRevokeLease2RequestWithDefaults() + resp, err := client.System.LeasesRevokeLease2( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -3578,11 +3674,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **leasesRevokeLease2Request** | [**LeasesRevokeLease2Request**](LeasesRevokeLease2Request.md) | | (empty response body) @@ -3591,9 +3690,9 @@ This endpoint does not require any parameters. -## ReadInternalCountersConfig +## LeasesRevokeLeaseWithId -Read the client count tracking configuration. +Revokes a lease immediately. ### Example @@ -3606,6 +3705,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3616,8 +3716,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalCountersConfig( + urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. + request := schema.NewLeasesRevokeLeaseWithIdRequestWithDefaults() + resp, err := client.System.LeasesRevokeLeaseWithId( context.Background(), + urlLeaseId, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3630,11 +3734,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **leasesRevokeLeaseWithIdRequest** | [**LeasesRevokeLeaseWithIdRequest**](LeasesRevokeLeaseWithIdRequest.md) | | (empty response body) @@ -3643,9 +3755,9 @@ This endpoint does not require any parameters. -## ReadInternalCountersEntities +## LeasesRevokeLeaseWithId2 -Backwards compatibility is not guaranteed for this API +Revokes a lease immediately. ### Example @@ -3658,6 +3770,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3668,8 +3781,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalCountersEntities( + urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. + request := schema.NewLeasesRevokeLeaseWithId2RequestWithDefaults() + resp, err := client.System.LeasesRevokeLeaseWithId2( context.Background(), + urlLeaseId, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3682,11 +3799,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **leasesRevokeLeaseWithId2Request** | [**LeasesRevokeLeaseWithId2Request**](LeasesRevokeLeaseWithId2Request.md) | | (empty response body) @@ -3695,9 +3820,9 @@ This endpoint does not require any parameters. -## ReadInternalCountersRequests +## LeasesRevokeLeaseWithPrefix -Backwards compatibility is not guaranteed for this API +Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. ### Example @@ -3710,6 +3835,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3720,8 +3846,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalCountersRequests( + prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" + request := schema.NewLeasesRevokeLeaseWithPrefixRequestWithDefaults() + resp, err := client.System.LeasesRevokeLeaseWithPrefix( context.Background(), + prefix, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3734,11 +3864,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **leasesRevokeLeaseWithPrefixRequest** | [**LeasesRevokeLeaseWithPrefixRequest**](LeasesRevokeLeaseWithPrefixRequest.md) | | (empty response body) @@ -3747,9 +3885,9 @@ This endpoint does not require any parameters. -## ReadInternalCountersTokens +## LeasesRevokeLeaseWithPrefix2 -Backwards compatibility is not guaranteed for this API +Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. ### Example @@ -3762,6 +3900,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -3772,8 +3911,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalCountersTokens( + prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" + request := schema.NewLeasesRevokeLeaseWithPrefix2RequestWithDefaults() + resp, err := client.System.LeasesRevokeLeaseWithPrefix2( context.Background(), + prefix, + request, vault.WithToken("my-token"), ) if err != nil { @@ -3786,11 +3929,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **leasesRevokeLeaseWithPrefix2Request** | [**LeasesRevokeLeaseWithPrefix2Request**](LeasesRevokeLeaseWithPrefix2Request.md) | | (empty response body) @@ -3799,9 +3950,9 @@ This endpoint does not require any parameters. -## ReadInternalInspectRouter +## LeasesTidy + -Expose the route entry and mount entry tables present in the router ### Example @@ -3824,10 +3975,8 @@ func main() { log.Fatal(err) } - tag := "tag_example" // string | Name of subtree being observed - resp, err := client.System.ReadInternalInspectRouter( + resp, err := client.System.LeasesTidy( context.Background(), - tag, vault.WithToken("my-token"), ) if err != nil { @@ -3840,18 +3989,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**tag** | **string** | Name of subtree being observed | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -3860,9 +4002,9 @@ Name | Type | Description | Notes -## ReadInternalSpecsOpenAPI +## ListExperimentalFeatures -Generate an OpenAPI 3 document of all mounted paths. +Returns the available and enabled experiments ### Example @@ -3885,7 +4027,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalSpecsOpenAPI( + resp, err := client.System.ListExperimentalFeatures( context.Background(), vault.WithToken("my-token"), ) @@ -3912,9 +4054,9 @@ This endpoint does not require any parameters. -## ReadInternalUIFeatureFlags +## LockedUsersList -Lists enabled feature flags. +Report the locked user count metrics, for this namespace and all child namespaces. ### Example @@ -3937,7 +4079,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalUIFeatureFlags( + resp, err := client.System.LockedUsersList( context.Background(), vault.WithToken("my-token"), ) @@ -3964,9 +4106,9 @@ This endpoint does not require any parameters. -## ReadInternalUIMount +## LockedUsersUnlock -Return information about the given mount. +Unlocks the user with given mount_accessor and alias_identifier ### Example @@ -3989,10 +4131,12 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The path of the mount. - resp, err := client.System.ReadInternalUIMount( + aliasIdentifier := "aliasIdentifier_example" // string | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID + mountAccessor := "mountAccessor_example" // string | MountAccessor is the identifier of the mount entry to which the user belongs + resp, err := client.System.LockedUsersUnlock( context.Background(), - path, + aliasIdentifier, + mountAccessor, vault.WithToken("my-token"), ) if err != nil { @@ -4009,7 +4153,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | The path of the mount. | +**aliasIdentifier** | **string** | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID | +**mountAccessor** | **string** | MountAccessor is the identifier of the mount entry to which the user belongs | ### Other Parameters @@ -4018,6 +4163,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + (empty response body) [[Back to top]](#) @@ -4025,9 +4171,9 @@ Name | Type | Description | Notes -## ReadInternalUIMounts +## LoggersReadVerbosityLevel -Lists all enabled and visible auth and secrets mounts. +Read the log level for all existing loggers. ### Example @@ -4050,7 +4196,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalUIMounts( + resp, err := client.System.LoggersReadVerbosityLevel( context.Background(), vault.WithToken("my-token"), ) @@ -4077,9 +4223,9 @@ This endpoint does not require any parameters. -## ReadInternalUINamespaces +## LoggersReadVerbosityLevelFor -Backwards compatibility is not guaranteed for this API +Read the log level for a single logger. ### Example @@ -4102,8 +4248,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalUINamespaces( + name := "name_example" // string | The name of the logger to be modified. + resp, err := client.System.LoggersReadVerbosityLevelFor( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -4116,11 +4264,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the logger to be modified. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -4129,9 +4284,9 @@ This endpoint does not require any parameters. -## ReadInternalUIResultantACL +## LoggersRevertVerbosityLevel -Backwards compatibility is not guaranteed for this API +Revert the all loggers to use log level provided in config. ### Example @@ -4154,7 +4309,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadInternalUIResultantACL( + resp, err := client.System.LoggersRevertVerbosityLevel( context.Background(), vault.WithToken("my-token"), ) @@ -4181,9 +4336,9 @@ This endpoint does not require any parameters. -## ReadKeyStatus +## LoggersRevertVerbosityLevelFor -Provides information about the backend encryption key. +Revert a single logger to use log level provided in config. ### Example @@ -4206,8 +4361,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadKeyStatus( + name := "name_example" // string | The name of the logger to be modified. + resp, err := client.System.LoggersRevertVerbosityLevelFor( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -4220,11 +4377,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the logger to be modified. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -4233,9 +4397,9 @@ This endpoint does not require any parameters. -## ReadLeader +## LoggersUpdateVerbosityLevel -Returns the high availability status and current leader instance of Vault. +Modify the log level for all existing loggers. ### Example @@ -4248,6 +4412,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4258,8 +4423,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadLeader( + request := schema.NewLoggersUpdateVerbosityLevelRequestWithDefaults() + resp, err := client.System.LoggersUpdateVerbosityLevel( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -4272,11 +4439,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **loggersUpdateVerbosityLevelRequest** | [**LoggersUpdateVerbosityLevelRequest**](LoggersUpdateVerbosityLevelRequest.md) | | (empty response body) @@ -4285,9 +4455,9 @@ This endpoint does not require any parameters. -## ReadLeases +## LoggersUpdateVerbosityLevelFor -List leases associated with this Vault cluster +Modify the log level of a single logger. ### Example @@ -4300,6 +4470,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4310,8 +4481,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadLeases( + name := "name_example" // string | The name of the logger to be modified. + request := schema.NewLoggersUpdateVerbosityLevelForRequestWithDefaults() + resp, err := client.System.LoggersUpdateVerbosityLevelFor( context.Background(), + name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4324,11 +4499,19 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the logger to be modified. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **loggersUpdateVerbosityLevelForRequest** | [**LoggersUpdateVerbosityLevelForRequest**](LoggersUpdateVerbosityLevelForRequest.md) | | (empty response body) @@ -4337,9 +4520,9 @@ This endpoint does not require any parameters. -## ReadLeasesCount +## Metrics + -Count of leases associated with this Vault cluster ### Example @@ -4362,8 +4545,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadLeasesCount( + format := "format_example" // string | Format to export metrics into. Currently accepts only \"prometheus\". + resp, err := client.System.Metrics( context.Background(), + format, vault.WithToken("my-token"), ) if err != nil { @@ -4376,11 +4561,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **format** | **string** | Format to export metrics into. Currently accepts only \"prometheus\". | (empty response body) @@ -4389,9 +4577,9 @@ This endpoint does not require any parameters. -## ReadLogger +## MfaValidate -Read the log level for a single logger. +Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token ### Example @@ -4404,6 +4592,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4414,10 +4603,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the logger to be modified. - resp, err := client.System.ReadLogger( + request := schema.NewMfaValidateRequestWithDefaults() + resp, err := client.System.MfaValidate( context.Background(), - name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4431,17 +4620,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the logger to be modified. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **mfaValidateRequest** | [**MfaValidateRequest**](MfaValidateRequest.md) | | (empty response body) @@ -4450,9 +4635,9 @@ Name | Type | Description | Notes -## ReadLoggers +## Monitor + -Read the log level for all existing loggers. ### Example @@ -4475,8 +4660,12 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadLoggers( + logFormat := "logFormat_example" // string | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". (defaults to "standard") + logLevel := "logLevel_example" // string | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". + resp, err := client.System.Monitor( context.Background(), + logFormat, + logLevel, vault.WithToken("my-token"), ) if err != nil { @@ -4489,11 +4678,15 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **logFormat** | **string** | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". | [default to "standard"] + **logLevel** | **string** | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". | (empty response body) @@ -4502,9 +4695,9 @@ This endpoint does not require any parameters. -## ReadMetrics +## MountsDisableSecretsEngine -Export the metrics aggregated for telemetry purpose. +Disable the mount point specified at the given path. ### Example @@ -4527,10 +4720,10 @@ func main() { log.Fatal(err) } - format := "format_example" // string | Format to export metrics into. Currently accepts only \"prometheus\". - resp, err := client.System.ReadMetrics( + path := "path_example" // string | The path to mount to. Example: \"aws/east\" + resp, err := client.System.MountsDisableSecretsEngine( context.Background(), - format, + path, vault.WithToken("my-token"), ) if err != nil { @@ -4544,13 +4737,17 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**path** | **string** | The path to mount to. Example: \"aws/east\" | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **format** | **string** | Format to export metrics into. Currently accepts only \"prometheus\". | + (empty response body) @@ -4559,9 +4756,9 @@ Name | Type | Description | Notes -## ReadMount +## MountsEnableSecretsEngine -Read the configuration of the secret engine at the given path. +Enable a new secrets engine at the given path. ### Example @@ -4574,6 +4771,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4585,9 +4783,11 @@ func main() { } path := "path_example" // string | The path to mount to. Example: \"aws/east\" - resp, err := client.System.ReadMount( + request := schema.NewMountsEnableSecretsEngineRequestWithDefaults() + resp, err := client.System.MountsEnableSecretsEngine( context.Background(), path, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4612,6 +4812,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **mountsEnableSecretsEngineRequest** | [**MountsEnableSecretsEngineRequest**](MountsEnableSecretsEngineRequest.md) | | (empty response body) @@ -4620,9 +4821,9 @@ Name | Type | Description | Notes -## ReadMounts +## MountsListSecretsEngines + -List the currently mounted backends. ### Example @@ -4645,7 +4846,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadMounts( + resp, err := client.System.MountsListSecretsEngines( context.Background(), vault.WithToken("my-token"), ) @@ -4672,9 +4873,9 @@ This endpoint does not require any parameters. -## ReadMountsConfig +## MountsReadConfiguration -Tune backend configuration parameters for this mount. +Read the configuration of the secret engine at the given path. ### Example @@ -4698,7 +4899,7 @@ func main() { } path := "path_example" // string | The path to mount to. Example: \"aws/east\" - resp, err := client.System.ReadMountsConfig( + resp, err := client.System.MountsReadConfiguration( context.Background(), path, vault.WithToken("my-token"), @@ -4726,16 +4927,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**MountsReadConfigurationResponse**](MountsReadConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadPluginsCatalog +## MountsReadTuningInformation + -Lists all the plugins known to Vault ### Example @@ -4758,8 +4959,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadPluginsCatalog( + path := "path_example" // string | The path to mount to. Example: \"aws/east\" + resp, err := client.System.MountsReadTuningInformation( context.Background(), + path, vault.WithToken("my-token"), ) if err != nil { @@ -4772,22 +4975,29 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**path** | **string** | The path to mount to. Example: \"aws/east\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + - (empty response body) +[**MountsReadTuningInformationResponse**](MountsReadTuningInformationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadPluginsCatalogByTypeByName +## MountsTuneConfigurationParameters + -Return the configuration data for the plugin with the given name. ### Example @@ -4800,6 +5010,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -4810,12 +5021,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the plugin - type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database - resp, err := client.System.ReadPluginsCatalogByTypeByName( + path := "path_example" // string | The path to mount to. Example: \"aws/east\" + request := schema.NewMountsTuneConfigurationParametersRequestWithDefaults() + resp, err := client.System.MountsTuneConfigurationParameters( context.Background(), - name, - type_, + path, + request, vault.WithToken("my-token"), ) if err != nil { @@ -4832,8 +5043,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the plugin | -**type_** | **string** | The type of the plugin, may be auth, secret, or database | +**path** | **string** | The path to mount to. Example: \"aws/east\" | ### Other Parameters @@ -4841,7 +5051,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - + **mountsTuneConfigurationParametersRequest** | [**MountsTuneConfigurationParametersRequest**](MountsTuneConfigurationParametersRequest.md) | | (empty response body) @@ -4850,9 +5060,9 @@ Name | Type | Description | Notes -## ReadPolicies +## PluginsCatalogListPlugins + -List the configured access control policies. ### Example @@ -4875,7 +5085,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadPolicies( + resp, err := client.System.PluginsCatalogListPlugins( context.Background(), vault.WithToken("my-token"), ) @@ -4889,25 +5099,22 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **list** | **string** | Return a list if `true` | - (empty response body) +[**PluginsCatalogListPluginsResponse**](PluginsCatalogListPluginsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadPoliciesACL +## PluginsCatalogListPluginsWithType -Retrieve information about the named ACL policy. +List the plugins in the catalog. ### Example @@ -4930,10 +5137,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the policy. Example: \"ops\" - resp, err := client.System.ReadPoliciesACL( + type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database + resp, err := client.System.PluginsCatalogListPluginsWithType( context.Background(), - name, + type_, vault.WithToken("my-token"), ) if err != nil { @@ -4950,7 +5157,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the policy. Example: \"ops\" | +**type_** | **string** | The type of the plugin, may be auth, secret, or database | ### Other Parameters @@ -4958,17 +5165,18 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - (empty response body) +[**PluginsCatalogListPluginsWithTypeResponse**](PluginsCatalogListPluginsWithTypeResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadPoliciesPassword +## PluginsCatalogReadPluginConfiguration -Retrieve an existing password policy. +Return the configuration data for the plugin with the given name. ### Example @@ -4991,8 +5199,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the password policy. - resp, err := client.System.ReadPoliciesPassword( + name := "name_example" // string | The name of the plugin + resp, err := client.System.PluginsCatalogReadPluginConfiguration( context.Background(), name, vault.WithToken("my-token"), @@ -5011,7 +5219,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the password policy. | +**name** | **string** | The name of the plugin | ### Other Parameters @@ -5020,16 +5228,16 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) +[**PluginsCatalogReadPluginConfigurationResponse**](PluginsCatalogReadPluginConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadPoliciesPasswordGenerate +## PluginsCatalogReadPluginConfigurationWithType -Generate a password from an existing password policy. +Return the configuration data for the plugin with the given name. ### Example @@ -5052,10 +5260,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the password policy. - resp, err := client.System.ReadPoliciesPasswordGenerate( + name := "name_example" // string | The name of the plugin + type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database + resp, err := client.System.PluginsCatalogReadPluginConfigurationWithType( context.Background(), name, + type_, vault.WithToken("my-token"), ) if err != nil { @@ -5072,7 +5282,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the password policy. | +**name** | **string** | The name of the plugin | +**type_** | **string** | The type of the plugin, may be auth, secret, or database | ### Other Parameters @@ -5081,16 +5292,17 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - (empty response body) + +[**PluginsCatalogReadPluginConfigurationWithTypeResponse**](PluginsCatalogReadPluginConfigurationWithTypeResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadPolicy +## PluginsCatalogRegisterPlugin -Retrieve the policy body for the named policy. +Register a new plugin, or updates an existing one with the supplied name. ### Example @@ -5103,6 +5315,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5113,10 +5326,12 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the policy. Example: \"ops\" - resp, err := client.System.ReadPolicy( + name := "name_example" // string | The name of the plugin + request := schema.NewPluginsCatalogRegisterPluginRequestWithDefaults() + resp, err := client.System.PluginsCatalogRegisterPlugin( context.Background(), name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -5133,7 +5348,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the policy. Example: \"ops\" | +**name** | **string** | The name of the plugin | ### Other Parameters @@ -5141,6 +5356,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pluginsCatalogRegisterPluginRequest** | [**PluginsCatalogRegisterPluginRequest**](PluginsCatalogRegisterPluginRequest.md) | | (empty response body) @@ -5149,61 +5365,9 @@ Name | Type | Description | Notes -## ReadQuotasConfig - - - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.System.ReadQuotasConfig( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - -This endpoint does not require any parameters. - -### Other Parameters - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - - - -## ReadQuotasRateLimit - +## PluginsCatalogRegisterPluginWithType +Register a new plugin, or updates an existing one with the supplied name. ### Example @@ -5216,6 +5380,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5226,10 +5391,14 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the quota rule. - resp, err := client.System.ReadQuotasRateLimit( + name := "name_example" // string | The name of the plugin + type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database + request := schema.NewPluginsCatalogRegisterPluginWithTypeRequestWithDefaults() + resp, err := client.System.PluginsCatalogRegisterPluginWithType( context.Background(), name, + type_, + request, vault.WithToken("my-token"), ) if err != nil { @@ -5246,7 +5415,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the quota rule. | +**name** | **string** | The name of the plugin | +**type_** | **string** | The type of the plugin, may be auth, secret, or database | ### Other Parameters @@ -5255,6 +5425,8 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **pluginsCatalogRegisterPluginWithTypeRequest** | [**PluginsCatalogRegisterPluginWithTypeRequest**](PluginsCatalogRegisterPluginWithTypeRequest.md) | | + (empty response body) [[Back to top]](#) @@ -5262,9 +5434,9 @@ Name | Type | Description | Notes -## ReadRaw +## PluginsCatalogRemovePlugin -Read the value of the key at the given path. +Remove the plugin with the given name. ### Example @@ -5287,8 +5459,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadRaw( + name := "name_example" // string | The name of the plugin + resp, err := client.System.PluginsCatalogRemovePlugin( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -5302,13 +5476,17 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the plugin | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Return a list if `true` | + (empty response body) @@ -5317,9 +5495,9 @@ Name | Type | Description | Notes -## ReadRawPath +## PluginsCatalogRemovePluginWithType -Read the value of the key at the given path. +Remove the plugin with the given name. ### Example @@ -5342,10 +5520,12 @@ func main() { log.Fatal(err) } - path := "path_example" // string | - resp, err := client.System.ReadRawPath( + name := "name_example" // string | The name of the plugin + type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database + resp, err := client.System.PluginsCatalogRemovePluginWithType( context.Background(), - path, + name, + type_, vault.WithToken("my-token"), ) if err != nil { @@ -5362,7 +5542,8 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | | +**name** | **string** | The name of the plugin | +**type_** | **string** | The type of the plugin, may be auth, secret, or database | ### Other Parameters @@ -5370,7 +5551,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **list** | **string** | Return a list if `true` | + (empty response body) @@ -5379,61 +5560,11 @@ Name | Type | Description | Notes -## ReadRekeyBackup - -Return the backup copy of PGP-encrypted unseal keys. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - resp, err := client.System.ReadRekeyBackup( - context.Background(), - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - -This endpoint does not require any parameters. - -### Other Parameters - - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - +## PluginsReloadBackends +Reload mounted plugin backends. -## ReadRekeyInit -Reads the configuration and progress of the current rekey attempt. ### Example @@ -5446,6 +5577,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5456,8 +5588,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadRekeyInit( + request := schema.NewPluginsReloadBackendsRequestWithDefaults() + resp, err := client.System.PluginsReloadBackends( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -5470,22 +5604,25 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **pluginsReloadBackendsRequest** | [**PluginsReloadBackendsRequest**](PluginsReloadBackendsRequest.md) | | - (empty response body) +[**PluginsReloadBackendsResponse**](PluginsReloadBackendsResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadRekeyRecoveryKeyBackup +## PoliciesDeleteAclPolicy -Allows fetching or deleting the backup of the rotated unseal keys. +Delete the ACL policy with the given name. ### Example @@ -5508,8 +5645,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadRekeyRecoveryKeyBackup( + name := "name_example" // string | The name of the policy. Example: \"ops\" + resp, err := client.System.PoliciesDeleteAclPolicy( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -5522,11 +5661,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the policy. Example: \"ops\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -5535,9 +5681,9 @@ This endpoint does not require any parameters. -## ReadRekeyVerify +## PoliciesDeleteAclPolicy2 -Read the configuration and progress of the current rekey verification attempt. +Delete the policy with the given name. ### Example @@ -5560,8 +5706,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadRekeyVerify( + name := "name_example" // string | The name of the policy. Example: \"ops\" + resp, err := client.System.PoliciesDeleteAclPolicy2( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -5574,11 +5722,18 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the policy. Example: \"ops\" | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + (empty response body) @@ -5587,9 +5742,9 @@ This endpoint does not require any parameters. -## ReadRemountStatus +## PoliciesDeletePasswordPolicy -Check status of a mount migration +Delete a password policy. ### Example @@ -5612,10 +5767,10 @@ func main() { log.Fatal(err) } - migrationId := "migrationId_example" // string | The ID of the migration operation - resp, err := client.System.ReadRemountStatus( + name := "name_example" // string | The name of the password policy. + resp, err := client.System.PoliciesDeletePasswordPolicy( context.Background(), - migrationId, + name, vault.WithToken("my-token"), ) if err != nil { @@ -5632,7 +5787,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**migrationId** | **string** | The ID of the migration operation | +**name** | **string** | The name of the password policy. | ### Other Parameters @@ -5648,9 +5803,9 @@ Name | Type | Description | Notes -## ReadReplicationStatus - +## PoliciesGeneratePasswordFromPasswordPolicy +Generate a password from an existing password policy. ### Example @@ -5673,8 +5828,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadReplicationStatus( + name := "name_example" // string | The name of the password policy. + resp, err := client.System.PoliciesGeneratePasswordFromPasswordPolicy( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -5687,20 +5844,27 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the password policy. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + - (empty response body) +[**PoliciesGeneratePasswordFromPasswordPolicyResponse**](PoliciesGeneratePasswordFromPasswordPolicyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadRotateConfig +## PoliciesList @@ -5725,7 +5889,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadRotateConfig( + resp, err := client.System.PoliciesList( context.Background(), vault.WithToken("my-token"), ) @@ -5739,22 +5903,25 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **list** | **string** | Return a list if `true` | - (empty response body) +[**PoliciesListResponse**](PoliciesListResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## ReadSealStatus +## PoliciesListAclPolicies + -Check the seal status of a Vault. ### Example @@ -5777,7 +5944,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.ReadSealStatus( + resp, err := client.System.PoliciesListAclPolicies( context.Background(), vault.WithToken("my-token"), ) @@ -5791,22 +5958,25 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **list** | **string** | Must be set to `true` | - (empty response body) +[**PoliciesListAclPoliciesResponse**](PoliciesListAclPoliciesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## Remount +## PoliciesListPasswordPolicies -Initiate a mount migration +List the existing password policies. ### Example @@ -5819,7 +5989,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5830,10 +5999,8 @@ func main() { log.Fatal(err) } - request := schema.NewRemountRequestWithDefaults() - resp, err := client.System.Remount( + resp, err := client.System.PoliciesListPasswordPolicies( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -5853,18 +6020,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **remountRequest** | [**RemountRequest**](RemountRequest.md) | | + **list** | **string** | Must be set to `true` | - (empty response body) +[**PoliciesListPasswordPoliciesResponse**](PoliciesListPasswordPoliciesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## Renew +## PoliciesReadAclPolicy -Renews a lease, requesting to extend the lease. +Retrieve information about the named ACL policy. ### Example @@ -5877,7 +6044,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5888,10 +6054,10 @@ func main() { log.Fatal(err) } - request := schema.NewRenewRequestWithDefaults() - resp, err := client.System.Renew( + name := "name_example" // string | The name of the policy. Example: \"ops\" + resp, err := client.System.PoliciesReadAclPolicy( context.Background(), - request, + name, vault.WithToken("my-token"), ) if err != nil { @@ -5905,24 +6071,28 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the policy. Example: \"ops\" | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **renewRequest** | [**RenewRequest**](RenewRequest.md) | | - (empty response body) + +[**PoliciesReadAclPolicyResponse**](PoliciesReadAclPolicyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## RenewFor +## PoliciesReadAclPolicy2 -Renews a lease, requesting to extend the lease. +Retrieve the policy body for the named policy. ### Example @@ -5935,7 +6105,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -5946,12 +6115,10 @@ func main() { log.Fatal(err) } - urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. - request := schema.NewRenewForRequestWithDefaults() - resp, err := client.System.RenewFor( + name := "name_example" // string | The name of the policy. Example: \"ops\" + resp, err := client.System.PoliciesReadAclPolicy2( context.Background(), - urlLeaseId, - request, + name, vault.WithToken("my-token"), ) if err != nil { @@ -5968,7 +6135,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | +**name** | **string** | The name of the policy. Example: \"ops\" | ### Other Parameters @@ -5976,18 +6143,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **renewForRequest** | [**RenewForRequest**](RenewForRequest.md) | | - (empty response body) +[**PoliciesReadAclPolicy2Response**](PoliciesReadAclPolicy2Response.md) [[Back to top]](#) [[Back to README]](../README.md) -## Revoke +## PoliciesReadPasswordPolicy -Revokes a lease immediately. +Retrieve an existing password policy. ### Example @@ -6000,7 +6166,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6011,10 +6176,10 @@ func main() { log.Fatal(err) } - request := schema.NewRevokeRequestWithDefaults() - resp, err := client.System.Revoke( + name := "name_example" // string | The name of the password policy. + resp, err := client.System.PoliciesReadPasswordPolicy( context.Background(), - request, + name, vault.WithToken("my-token"), ) if err != nil { @@ -6028,26 +6193,28 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | The name of the password policy. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **revokeRequest** | [**RevokeRequest**](RevokeRequest.md) | | - (empty response body) + +[**PoliciesReadPasswordPolicyResponse**](PoliciesReadPasswordPolicyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## RevokeForce - -Revokes all secrets or tokens generated under a given prefix immediately - +## PoliciesWriteAclPolicy +Add a new or update an existing ACL policy. ### Example @@ -6060,6 +6227,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6070,10 +6238,12 @@ func main() { log.Fatal(err) } - prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" - resp, err := client.System.RevokeForce( + name := "name_example" // string | The name of the policy. Example: \"ops\" + request := schema.NewPoliciesWriteAclPolicyRequestWithDefaults() + resp, err := client.System.PoliciesWriteAclPolicy( context.Background(), - prefix, + name, + request, vault.WithToken("my-token"), ) if err != nil { @@ -6090,7 +6260,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | +**name** | **string** | The name of the policy. Example: \"ops\" | ### Other Parameters @@ -6098,6 +6268,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **policiesWriteAclPolicyRequest** | [**PoliciesWriteAclPolicyRequest**](PoliciesWriteAclPolicyRequest.md) | | (empty response body) @@ -6106,9 +6277,9 @@ Name | Type | Description | Notes -## RevokeLease +## PoliciesWriteAclPolicy2 -Revokes a lease immediately. +Add a new or update an existing policy. ### Example @@ -6132,11 +6303,11 @@ func main() { log.Fatal(err) } - urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. - request := schema.NewRevokeLeaseRequestWithDefaults() - resp, err := client.System.RevokeLease( + name := "name_example" // string | The name of the policy. Example: \"ops\" + request := schema.NewPoliciesWriteAclPolicy2RequestWithDefaults() + resp, err := client.System.PoliciesWriteAclPolicy2( context.Background(), - urlLeaseId, + name, request, vault.WithToken("my-token"), ) @@ -6154,7 +6325,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | +**name** | **string** | The name of the policy. Example: \"ops\" | ### Other Parameters @@ -6162,7 +6333,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **revokeLeaseRequest** | [**RevokeLeaseRequest**](RevokeLeaseRequest.md) | | + **policiesWriteAclPolicy2Request** | [**PoliciesWriteAclPolicy2Request**](PoliciesWriteAclPolicy2Request.md) | | (empty response body) @@ -6171,9 +6342,9 @@ Name | Type | Description | Notes -## RevokePrefix +## PoliciesWritePasswordPolicy -Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. +Add a new or update an existing password policy. ### Example @@ -6197,11 +6368,11 @@ func main() { log.Fatal(err) } - prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" - request := schema.NewRevokePrefixRequestWithDefaults() - resp, err := client.System.RevokePrefix( + name := "name_example" // string | The name of the password policy. + request := schema.NewPoliciesWritePasswordPolicyRequestWithDefaults() + resp, err := client.System.PoliciesWritePasswordPolicy( context.Background(), - prefix, + name, request, vault.WithToken("my-token"), ) @@ -6219,7 +6390,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | +**name** | **string** | The name of the password policy. | ### Other Parameters @@ -6227,7 +6398,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **revokePrefixRequest** | [**RevokePrefixRequest**](RevokePrefixRequest.md) | | + **policiesWritePasswordPolicyRequest** | [**PoliciesWritePasswordPolicyRequest**](PoliciesWritePasswordPolicyRequest.md) | | (empty response body) @@ -6236,9 +6407,11 @@ Name | Type | Description | Notes -## Rotate +## PprofBlocking + +Returns stack traces that led to blocking on synchronization primitives + -Rotates the backend encryption key used to persist data. ### Example @@ -6261,7 +6434,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.Rotate( + resp, err := client.System.PprofBlocking( context.Background(), vault.WithToken("my-token"), ) @@ -6288,9 +6461,11 @@ This endpoint does not require any parameters. -## Seal +## PprofCommandLine + +Returns the running program's command line. + -Seal the Vault. ### Example @@ -6313,7 +6488,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.Seal( + resp, err := client.System.PprofCommandLine( context.Background(), vault.WithToken("my-token"), ) @@ -6340,9 +6515,9 @@ This endpoint does not require any parameters. -## StepDownLeader +## PprofCpuProfile -Cause the node to give up active status. +Returns a pprof-formatted cpu profile payload. @@ -6367,7 +6542,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.StepDownLeader( + resp, err := client.System.PprofCpuProfile( context.Background(), vault.WithToken("my-token"), ) @@ -6394,70 +6569,11 @@ This endpoint does not require any parameters. -## SysDeletePluginsCatalogName - -Remove the plugin with the given name. - -### Example - -```go -package main - -import ( - "context" - "log" - "os" - - "github.com/hashicorp/vault-client-go" -) - -func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } - - name := "name_example" // string | The name of the plugin - resp, err := client.System.SysDeletePluginsCatalogName( - context.Background(), - name, - vault.WithToken("my-token"), - ) - if err != nil { - log.Fatal(err) - } - - log.Println(resp.Data) -} -``` - -### Path Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the plugin | - -### Other Parameters - - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - (empty response body) - -[[Back to top]](#) -[[Back to README]](../README.md) - +## PprofExecutionTrace +Returns the execution trace in binary form. -## SysListLeasesLookup -Returns a list of lease ids. ### Example @@ -6480,7 +6596,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.SysListLeasesLookup( + resp, err := client.System.PprofExecutionTrace( context.Background(), vault.WithToken("my-token"), ) @@ -6494,14 +6610,11 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **list** | **string** | Must be set to `true` | (empty response body) @@ -6510,9 +6623,11 @@ Name | Type | Description | Notes -## SysReadPluginsCatalogName +## PprofGoroutines + +Returns stack traces of all current goroutines. + -Return the configuration data for the plugin with the given name. ### Example @@ -6535,10 +6650,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the plugin - resp, err := client.System.SysReadPluginsCatalogName( + resp, err := client.System.PprofGoroutines( context.Background(), - name, vault.WithToken("my-token"), ) if err != nil { @@ -6551,18 +6664,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the plugin | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -6571,9 +6677,11 @@ Name | Type | Description | Notes -## SysWriteLockedusersMountAccessorUnlockAliasIdentifier +## PprofIndex + +Returns an HTML page listing the available profiles. + -Unlocks the user with given mount_accessor and alias_identifier ### Example @@ -6596,12 +6704,8 @@ func main() { log.Fatal(err) } - aliasIdentifier := "aliasIdentifier_example" // string | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID - mountAccessor := "mountAccessor_example" // string | MountAccessor is the identifier of the mount entry to which the user belongs - resp, err := client.System.SysWriteLockedusersMountAccessorUnlockAliasIdentifier( + resp, err := client.System.PprofIndex( context.Background(), - aliasIdentifier, - mountAccessor, vault.WithToken("my-token"), ) if err != nil { @@ -6614,20 +6718,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**aliasIdentifier** | **string** | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID | -**mountAccessor** | **string** | MountAccessor is the identifier of the mount entry to which the user belongs | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - (empty response body) @@ -6636,9 +6731,11 @@ Name | Type | Description | Notes -## SysWritePluginsCatalogName +## PprofMemoryAllocations + +Returns a sampling of all past memory allocations. + -Register a new plugin, or updates an existing one with the supplied name. ### Example @@ -6651,7 +6748,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6662,12 +6758,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the plugin - request := schema.NewSysWritePluginsCatalogNameRequestWithDefaults() - resp, err := client.System.SysWritePluginsCatalogName( + resp, err := client.System.PprofMemoryAllocations( context.Background(), - name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -6680,19 +6772,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the plugin | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **sysWritePluginsCatalogNameRequest** | [**SysWritePluginsCatalogNameRequest**](SysWritePluginsCatalogNameRequest.md) | | (empty response body) @@ -6701,9 +6785,11 @@ Name | Type | Description | Notes -## SysWriteToolsRandomUrlbytes +## PprofMemoryAllocationsLive + +Returns a sampling of memory allocations of live object. + -Generate random bytes ### Example @@ -6716,7 +6802,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6727,12 +6812,8 @@ func main() { log.Fatal(err) } - urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) - request := schema.NewSysWriteToolsRandomUrlbytesRequestWithDefaults() - resp, err := client.System.SysWriteToolsRandomUrlbytes( + resp, err := client.System.PprofMemoryAllocationsLive( context.Background(), - urlbytes, - request, vault.WithToken("my-token"), ) if err != nil { @@ -6745,19 +6826,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **sysWriteToolsRandomUrlbytesRequest** | [**SysWriteToolsRandomUrlbytesRequest**](SysWriteToolsRandomUrlbytesRequest.md) | | (empty response body) @@ -6766,9 +6839,11 @@ Name | Type | Description | Notes -## ToolsGenerateRandom +## PprofMutexes + +Returns stack traces of holders of contended mutexes + -Generate random bytes ### Example @@ -6781,7 +6856,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6792,10 +6866,8 @@ func main() { log.Fatal(err) } - request := schema.NewToolsGenerateRandomRequestWithDefaults() - resp, err := client.System.ToolsGenerateRandom( + resp, err := client.System.PprofMutexes( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -6808,14 +6880,11 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **toolsGenerateRandomRequest** | [**ToolsGenerateRandomRequest**](ToolsGenerateRandomRequest.md) | | (empty response body) @@ -6824,9 +6893,11 @@ Name | Type | Description | Notes -## ToolsGenerateRandomSource +## PprofSymbols + +Returns the program counters listed in the request. + -Generate random bytes ### Example @@ -6839,7 +6910,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6850,12 +6920,8 @@ func main() { log.Fatal(err) } - source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") - request := schema.NewToolsGenerateRandomSourceRequestWithDefaults() - resp, err := client.System.ToolsGenerateRandomSource( + resp, err := client.System.PprofSymbols( context.Background(), - source, - request, vault.WithToken("my-token"), ) if err != nil { @@ -6868,19 +6934,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **toolsGenerateRandomSourceRequest** | [**ToolsGenerateRandomSourceRequest**](ToolsGenerateRandomSourceRequest.md) | | (empty response body) @@ -6889,9 +6947,11 @@ Name | Type | Description | Notes -## ToolsGenerateRandomSourceBytes +## PprofThreadCreations + +Returns stack traces that led to the creation of new OS threads + -Generate random bytes ### Example @@ -6904,7 +6964,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -6915,14 +6974,8 @@ func main() { log.Fatal(err) } - source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") - urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) - request := schema.NewToolsGenerateRandomSourceBytesRequestWithDefaults() - resp, err := client.System.ToolsGenerateRandomSourceBytes( + resp, err := client.System.PprofThreadCreations( context.Background(), - source, - urlbytes, - request, vault.WithToken("my-token"), ) if err != nil { @@ -6935,21 +6988,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**source** | **string** | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". | [default to "platform"] -**urlbytes** | **string** | The number of bytes to generate (POST URL parameter) | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - **toolsGenerateRandomSourceBytesRequest** | [**ToolsGenerateRandomSourceBytesRequest**](ToolsGenerateRandomSourceBytesRequest.md) | | (empty response body) @@ -6958,9 +7001,9 @@ Name | Type | Description | Notes -## ToolsHash +## QueryTokenAccessorCapabilities + -Generate a hash sum for input data ### Example @@ -6984,8 +7027,8 @@ func main() { log.Fatal(err) } - request := schema.NewToolsHashRequestWithDefaults() - resp, err := client.System.ToolsHash( + request := schema.NewQueryTokenAccessorCapabilitiesRequestWithDefaults() + resp, err := client.System.QueryTokenAccessorCapabilities( context.Background(), request, vault.WithToken("my-token"), @@ -7007,7 +7050,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **toolsHashRequest** | [**ToolsHashRequest**](ToolsHashRequest.md) | | + **queryTokenAccessorCapabilitiesRequest** | [**QueryTokenAccessorCapabilitiesRequest**](QueryTokenAccessorCapabilitiesRequest.md) | | (empty response body) @@ -7016,9 +7059,9 @@ Name | Type | Description | Notes -## ToolsHashWith +## QueryTokenCapabilities + -Generate a hash sum for input data ### Example @@ -7042,11 +7085,9 @@ func main() { log.Fatal(err) } - urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) - request := schema.NewToolsHashWithRequestWithDefaults() - resp, err := client.System.ToolsHashWith( + request := schema.NewQueryTokenCapabilitiesRequestWithDefaults() + resp, err := client.System.QueryTokenCapabilities( context.Background(), - urlalgorithm, request, vault.WithToken("my-token"), ) @@ -7061,18 +7102,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**urlalgorithm** | **string** | Algorithm to use (POST URL parameter) | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **toolsHashWithRequest** | [**ToolsHashWithRequest**](ToolsHashWithRequest.md) | | + **queryTokenCapabilitiesRequest** | [**QueryTokenCapabilitiesRequest**](QueryTokenCapabilitiesRequest.md) | | (empty response body) @@ -7081,9 +7117,9 @@ Name | Type | Description | Notes -## Unseal +## QueryTokenSelfCapabilities + -Unseal the Vault. ### Example @@ -7107,8 +7143,8 @@ func main() { log.Fatal(err) } - request := schema.NewUnsealRequestWithDefaults() - resp, err := client.System.Unseal( + request := schema.NewQueryTokenSelfCapabilitiesRequestWithDefaults() + resp, err := client.System.QueryTokenSelfCapabilities( context.Background(), request, vault.WithToken("my-token"), @@ -7130,7 +7166,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **unsealRequest** | [**UnsealRequest**](UnsealRequest.md) | | + **queryTokenSelfCapabilitiesRequest** | [**QueryTokenSelfCapabilitiesRequest**](QueryTokenSelfCapabilitiesRequest.md) | | (empty response body) @@ -7139,9 +7175,9 @@ Name | Type | Description | Notes -## WrappingReadLookup +## RateLimitQuotasConfigure + -Look up wrapping properties for the requester's token. ### Example @@ -7154,6 +7190,7 @@ import ( "os" "github.com/hashicorp/vault-client-go" + "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7164,8 +7201,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.WrappingReadLookup( + request := schema.NewRateLimitQuotasConfigureRequestWithDefaults() + resp, err := client.System.RateLimitQuotasConfigure( context.Background(), + request, vault.WithToken("my-token"), ) if err != nil { @@ -7178,11 +7217,14 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **rateLimitQuotasConfigureRequest** | [**RateLimitQuotasConfigureRequest**](RateLimitQuotasConfigureRequest.md) | | (empty response body) @@ -7191,9 +7233,9 @@ This endpoint does not require any parameters. -## WrappingRewrap +## RateLimitQuotasDelete + -Rotates a response-wrapped token. ### Example @@ -7206,7 +7248,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7217,10 +7258,10 @@ func main() { log.Fatal(err) } - request := schema.NewWrappingRewrapRequestWithDefaults() - resp, err := client.System.WrappingRewrap( + name := "name_example" // string | Name of the quota rule. + resp, err := client.System.RateLimitQuotasDelete( context.Background(), - request, + name, vault.WithToken("my-token"), ) if err != nil { @@ -7234,13 +7275,17 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the quota rule. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **wrappingRewrapRequest** | [**WrappingRewrapRequest**](WrappingRewrapRequest.md) | | + (empty response body) @@ -7249,9 +7294,9 @@ Name | Type | Description | Notes -## WrappingUnwrap +## RateLimitQuotasList + -Unwraps a response-wrapped token. ### Example @@ -7264,7 +7309,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7275,10 +7319,8 @@ func main() { log.Fatal(err) } - request := schema.NewWrappingUnwrapRequestWithDefaults() - resp, err := client.System.WrappingUnwrap( + resp, err := client.System.RateLimitQuotasList( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -7298,18 +7340,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **wrappingUnwrapRequest** | [**WrappingUnwrapRequest**](WrappingUnwrapRequest.md) | | + **list** | **string** | Must be set to `true` | - (empty response body) +[**RateLimitQuotasListResponse**](RateLimitQuotasListResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WrappingWrap +## RateLimitQuotasRead + -Response-wraps an arbitrary JSON object. ### Example @@ -7332,8 +7374,10 @@ func main() { log.Fatal(err) } - resp, err := client.System.WrappingWrap( + name := "name_example" // string | Name of the quota rule. + resp, err := client.System.RateLimitQuotasRead( context.Background(), + name, vault.WithToken("my-token"), ) if err != nil { @@ -7346,22 +7390,29 @@ func main() { ### Path Parameters -This endpoint does not require any parameters. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**name** | **string** | Name of the quota rule. | ### Other Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- - (empty response body) + +[**RateLimitQuotasReadResponse**](RateLimitQuotasReadResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WrappingWriteLookup +## RateLimitQuotasReadConfiguration + -Look up wrapping properties for the given token. ### Example @@ -7374,7 +7425,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7385,10 +7435,8 @@ func main() { log.Fatal(err) } - request := schema.NewWrappingWriteLookupRequestWithDefaults() - resp, err := client.System.WrappingWriteLookup( + resp, err := client.System.RateLimitQuotasReadConfiguration( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -7401,25 +7449,22 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **wrappingWriteLookupRequest** | [**WrappingWriteLookupRequest**](WrappingWriteLookupRequest.md) | | - (empty response body) +[**RateLimitQuotasReadConfigurationResponse**](RateLimitQuotasReadConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteAuditDevice +## RateLimitQuotasWrite + -Enable a new audit device at the supplied path. ### Example @@ -7443,11 +7488,11 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" - request := schema.NewWriteAuditDeviceRequestWithDefaults() - resp, err := client.System.WriteAuditDevice( + name := "name_example" // string | Name of the quota rule. + request := schema.NewRateLimitQuotasWriteRequestWithDefaults() + resp, err := client.System.RateLimitQuotasWrite( context.Background(), - path, + name, request, vault.WithToken("my-token"), ) @@ -7465,7 +7510,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | The name of the backend. Cannot be delimited. Example: \"mysql\" | +**name** | **string** | Name of the quota rule. | ### Other Parameters @@ -7473,7 +7518,7 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeAuditDeviceRequest** | [**WriteAuditDeviceRequest**](WriteAuditDeviceRequest.md) | | + **rateLimitQuotasWriteRequest** | [**RateLimitQuotasWriteRequest**](RateLimitQuotasWriteRequest.md) | | (empty response body) @@ -7482,11 +7527,9 @@ Name | Type | Description | Notes -## WriteAuthMethod - -Enables a new auth method. - +## ReadHealthStatus +Returns the health status of Vault. ### Example @@ -7499,7 +7542,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7510,12 +7552,8 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" - request := schema.NewWriteAuthMethodRequestWithDefaults() - resp, err := client.System.WriteAuthMethod( + resp, err := client.System.ReadHealthStatus( context.Background(), - path, - request, vault.WithToken("my-token"), ) if err != nil { @@ -7528,19 +7566,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | The path to mount to. Cannot be delimited. Example: \"user\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writeAuthMethodRequest** | [**WriteAuthMethodRequest**](WriteAuthMethodRequest.md) | | (empty response body) @@ -7549,11 +7579,9 @@ Name | Type | Description | Notes -## WriteAuthMethodTune - -Tune configuration parameters for a given auth path. - +## ReadInitializationStatus +Returns the initialization status of Vault. ### Example @@ -7566,7 +7594,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7577,12 +7604,8 @@ func main() { log.Fatal(err) } - path := "path_example" // string | Tune the configuration parameters for an auth path. - request := schema.NewWriteAuthMethodTuneRequestWithDefaults() - resp, err := client.System.WriteAuthMethodTune( + resp, err := client.System.ReadInitializationStatus( context.Background(), - path, - request, vault.WithToken("my-token"), ) if err != nil { @@ -7595,19 +7618,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | Tune the configuration parameters for an auth path. | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writeAuthMethodTuneRequest** | [**WriteAuthMethodTuneRequest**](WriteAuthMethodTuneRequest.md) | | (empty response body) @@ -7616,9 +7631,11 @@ Name | Type | Description | Notes -## WriteCapabilities +## ReadSanitizedConfigurationState + +Return a sanitized version of the Vault server configuration. + -Fetches the capabilities of the given token on the given path. ### Example @@ -7631,7 +7648,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7642,10 +7658,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteCapabilitiesRequestWithDefaults() - resp, err := client.System.WriteCapabilities( + resp, err := client.System.ReadSanitizedConfigurationState( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -7658,14 +7672,11 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeCapabilitiesRequest** | [**WriteCapabilitiesRequest**](WriteCapabilitiesRequest.md) | | (empty response body) @@ -7674,9 +7685,9 @@ Name | Type | Description | Notes -## WriteCapabilitiesAccessor +## ReadWrappingProperties -Fetches the capabilities of the token associated with the given token, on the given path. +Look up wrapping properties for the given token. ### Example @@ -7700,8 +7711,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteCapabilitiesAccessorRequestWithDefaults() - resp, err := client.System.WriteCapabilitiesAccessor( + request := schema.NewReadWrappingPropertiesRequestWithDefaults() + resp, err := client.System.ReadWrappingProperties( context.Background(), request, vault.WithToken("my-token"), @@ -7723,18 +7734,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeCapabilitiesAccessorRequest** | [**WriteCapabilitiesAccessorRequest**](WriteCapabilitiesAccessorRequest.md) | | + **readWrappingPropertiesRequest** | [**ReadWrappingPropertiesRequest**](ReadWrappingPropertiesRequest.md) | | - (empty response body) +[**ReadWrappingPropertiesResponse**](ReadWrappingPropertiesResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteCapabilitiesSelf +## ReadWrappingProperties2 -Fetches the capabilities of the given token on the given path. +Look up wrapping properties for the requester's token. ### Example @@ -7747,7 +7758,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7758,10 +7768,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteCapabilitiesSelfRequestWithDefaults() - resp, err := client.System.WriteCapabilitiesSelf( + resp, err := client.System.ReadWrappingProperties2( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -7774,25 +7782,24 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeCapabilitiesSelfRequest** | [**WriteCapabilitiesSelfRequest**](WriteCapabilitiesSelfRequest.md) | | - (empty response body) +[**ReadWrappingProperties2Response**](ReadWrappingProperties2Response.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteConfigAuditingRequestHeader +## RekeyAttemptCancel + +Cancels any in-progress rekey. + -Enable auditing of a header. ### Example @@ -7805,7 +7812,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -7816,12 +7822,8 @@ func main() { log.Fatal(err) } - header := "header_example" // string | - request := schema.NewWriteConfigAuditingRequestHeaderRequestWithDefaults() - resp, err := client.System.WriteConfigAuditingRequestHeader( + resp, err := client.System.RekeyAttemptCancel( context.Background(), - header, - request, vault.WithToken("my-token"), ) if err != nil { @@ -7834,19 +7836,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**header** | **string** | | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writeConfigAuditingRequestHeaderRequest** | [**WriteConfigAuditingRequestHeaderRequest**](WriteConfigAuditingRequestHeaderRequest.md) | | (empty response body) @@ -7855,9 +7849,11 @@ Name | Type | Description | Notes -## WriteConfigCORS +## RekeyAttemptInitialize + +Initializes a new rekey attempt. + -Configure the CORS settings. ### Example @@ -7881,8 +7877,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteConfigCORSRequestWithDefaults() - resp, err := client.System.WriteConfigCORS( + request := schema.NewRekeyAttemptInitializeRequestWithDefaults() + resp, err := client.System.RekeyAttemptInitialize( context.Background(), request, vault.WithToken("my-token"), @@ -7904,18 +7900,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeConfigCORSRequest** | [**WriteConfigCORSRequest**](WriteConfigCORSRequest.md) | | + **rekeyAttemptInitializeRequest** | [**RekeyAttemptInitializeRequest**](RekeyAttemptInitializeRequest.md) | | - (empty response body) +[**RekeyAttemptInitializeResponse**](RekeyAttemptInitializeResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteConfigReloadSubsystem +## RekeyAttemptReadProgress -Reload the given subsystem +Reads the configuration and progress of the current rekey attempt. ### Example @@ -7938,10 +7934,8 @@ func main() { log.Fatal(err) } - subsystem := "subsystem_example" // string | - resp, err := client.System.WriteConfigReloadSubsystem( + resp, err := client.System.RekeyAttemptReadProgress( context.Background(), - subsystem, vault.WithToken("my-token"), ) if err != nil { @@ -7954,29 +7948,22 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**subsystem** | **string** | | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - (empty response body) +[**RekeyAttemptReadProgressResponse**](RekeyAttemptReadProgressResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteConfigUIHeader +## RekeyAttemptUpdate -Configure the values to be returned for the UI header. +Enter a single unseal key share to progress the rekey of the Vault. ### Example @@ -8000,11 +7987,9 @@ func main() { log.Fatal(err) } - header := "header_example" // string | The name of the header. - request := schema.NewWriteConfigUIHeaderRequestWithDefaults() - resp, err := client.System.WriteConfigUIHeader( + request := schema.NewRekeyAttemptUpdateRequestWithDefaults() + resp, err := client.System.RekeyAttemptUpdate( context.Background(), - header, request, vault.WithToken("my-token"), ) @@ -8019,31 +8004,24 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**header** | **string** | The name of the header. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **rekeyAttemptUpdateRequest** | [**RekeyAttemptUpdateRequest**](RekeyAttemptUpdateRequest.md) | | - **writeConfigUIHeaderRequest** | [**WriteConfigUIHeaderRequest**](WriteConfigUIHeaderRequest.md) | | - - (empty response body) +[**RekeyAttemptUpdateResponse**](RekeyAttemptUpdateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteGenerateRoot - -Initializes a new root generation attempt. - +## RekeyDeleteBackupKey +Delete the backup copy of PGP-encrypted unseal keys. ### Example @@ -8056,7 +8034,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8067,10 +8044,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteGenerateRootRequestWithDefaults() - resp, err := client.System.WriteGenerateRoot( + resp, err := client.System.RekeyDeleteBackupKey( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -8083,14 +8058,11 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeGenerateRootRequest** | [**WriteGenerateRootRequest**](WriteGenerateRootRequest.md) | | (empty response body) @@ -8099,9 +8071,7 @@ Name | Type | Description | Notes -## WriteGenerateRootAttempt - -Initializes a new root generation attempt. +## RekeyDeleteBackupRecoveryKey @@ -8116,7 +8086,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8127,10 +8096,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteGenerateRootAttemptRequestWithDefaults() - resp, err := client.System.WriteGenerateRootAttempt( + resp, err := client.System.RekeyDeleteBackupRecoveryKey( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -8143,14 +8110,11 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeGenerateRootAttemptRequest** | [**WriteGenerateRootAttemptRequest**](WriteGenerateRootAttemptRequest.md) | | (empty response body) @@ -8159,11 +8123,9 @@ Name | Type | Description | Notes -## WriteGenerateRootUpdate - -Enter a single unseal key share to progress the root generation attempt. - +## RekeyReadBackupKey +Return the backup copy of PGP-encrypted unseal keys. ### Example @@ -8176,7 +8138,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8187,10 +8148,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteGenerateRootUpdateRequestWithDefaults() - resp, err := client.System.WriteGenerateRootUpdate( + resp, err := client.System.RekeyReadBackupKey( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -8203,25 +8162,20 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeGenerateRootUpdateRequest** | [**WriteGenerateRootUpdateRequest**](WriteGenerateRootUpdateRequest.md) | | - (empty response body) +[**RekeyReadBackupKeyResponse**](RekeyReadBackupKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteInit - -Initialize a new Vault. +## RekeyReadBackupRecoveryKey @@ -8236,7 +8190,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8247,10 +8200,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteInitRequestWithDefaults() - resp, err := client.System.WriteInit( + resp, err := client.System.RekeyReadBackupRecoveryKey( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -8263,25 +8214,24 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeInitRequest** | [**WriteInitRequest**](WriteInitRequest.md) | | - (empty response body) +[**RekeyReadBackupRecoveryKeyResponse**](RekeyReadBackupRecoveryKeyResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteInternalCountersConfig +## RekeyVerificationCancel + +Cancel any in-progress rekey verification operation. + -Enable or disable collection of client count, set retention period, or set default reporting period. ### Example @@ -8294,7 +8244,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8305,10 +8254,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteInternalCountersConfigRequestWithDefaults() - resp, err := client.System.WriteInternalCountersConfig( + resp, err := client.System.RekeyVerificationCancel( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -8321,25 +8268,22 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeInternalCountersConfigRequest** | [**WriteInternalCountersConfigRequest**](WriteInternalCountersConfigRequest.md) | | - (empty response body) +[**RekeyVerificationCancelResponse**](RekeyVerificationCancelResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteLeasesLookup +## RekeyVerificationReadProgress -Retrieve lease metadata. +Read the configuration and progress of the current rekey verification attempt. ### Example @@ -8352,7 +8296,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8363,10 +8306,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteLeasesLookupRequestWithDefaults() - resp, err := client.System.WriteLeasesLookup( + resp, err := client.System.RekeyVerificationReadProgress( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -8379,25 +8320,22 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeLeasesLookupRequest** | [**WriteLeasesLookupRequest**](WriteLeasesLookupRequest.md) | | - (empty response body) +[**RekeyVerificationReadProgressResponse**](RekeyVerificationReadProgressResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteLeasesRenew +## RekeyVerificationUpdate -Renews a lease, requesting to extend the lease. +Enter a single new key share to progress the rekey verification operation. ### Example @@ -8421,8 +8359,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteLeasesRenewRequestWithDefaults() - resp, err := client.System.WriteLeasesRenew( + request := schema.NewRekeyVerificationUpdateRequestWithDefaults() + resp, err := client.System.RekeyVerificationUpdate( context.Background(), request, vault.WithToken("my-token"), @@ -8444,18 +8382,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeLeasesRenewRequest** | [**WriteLeasesRenewRequest**](WriteLeasesRenewRequest.md) | | + **rekeyVerificationUpdateRequest** | [**RekeyVerificationUpdateRequest**](RekeyVerificationUpdateRequest.md) | | - (empty response body) +[**RekeyVerificationUpdateResponse**](RekeyVerificationUpdateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteLeasesRenew2 +## ReloadSubsystem -Renews a lease, requesting to extend the lease. +Reload the given subsystem ### Example @@ -8468,7 +8406,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8479,12 +8416,10 @@ func main() { log.Fatal(err) } - urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. - request := schema.NewWriteLeasesRenew2RequestWithDefaults() - resp, err := client.System.WriteLeasesRenew2( + subsystem := "subsystem_example" // string | + resp, err := client.System.ReloadSubsystem( context.Background(), - urlLeaseId, - request, + subsystem, vault.WithToken("my-token"), ) if err != nil { @@ -8501,7 +8436,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | +**subsystem** | **string** | | ### Other Parameters @@ -8509,7 +8444,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeLeasesRenew2Request** | [**WriteLeasesRenew2Request**](WriteLeasesRenew2Request.md) | | (empty response body) @@ -8518,9 +8452,9 @@ Name | Type | Description | Notes -## WriteLeasesRevoke +## Remount -Revokes a lease immediately. +Initiate a mount migration ### Example @@ -8544,8 +8478,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteLeasesRevokeRequestWithDefaults() - resp, err := client.System.WriteLeasesRevoke( + request := schema.NewRemountRequestWithDefaults() + resp, err := client.System.Remount( context.Background(), request, vault.WithToken("my-token"), @@ -8567,18 +8501,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeLeasesRevokeRequest** | [**WriteLeasesRevokeRequest**](WriteLeasesRevokeRequest.md) | | + **remountRequest** | [**RemountRequest**](RemountRequest.md) | | - (empty response body) +[**RemountResponse**](RemountResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteLeasesRevoke2 +## RemountStatus -Revokes a lease immediately. +Check status of a mount migration ### Example @@ -8591,7 +8525,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8602,12 +8535,10 @@ func main() { log.Fatal(err) } - urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. - request := schema.NewWriteLeasesRevoke2RequestWithDefaults() - resp, err := client.System.WriteLeasesRevoke2( + migrationId := "migrationId_example" // string | The ID of the migration operation + resp, err := client.System.RemountStatus( context.Background(), - urlLeaseId, - request, + migrationId, vault.WithToken("my-token"), ) if err != nil { @@ -8624,7 +8555,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**urlLeaseId** | **string** | The lease identifier to renew. This is included with a lease. | +**migrationId** | **string** | The ID of the migration operation | ### Other Parameters @@ -8632,18 +8563,15 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeLeasesRevoke2Request** | [**WriteLeasesRevoke2Request**](WriteLeasesRevoke2Request.md) | | - (empty response body) +[**RemountStatusResponse**](RemountStatusResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteLeasesRevokeForce - -Revokes all secrets or tokens generated under a given prefix immediately +## ReplicationStatus @@ -8668,10 +8596,8 @@ func main() { log.Fatal(err) } - prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" - resp, err := client.System.WriteLeasesRevokeForce( + resp, err := client.System.ReplicationStatus( context.Background(), - prefix, vault.WithToken("my-token"), ) if err != nil { @@ -8684,18 +8610,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - (empty response body) @@ -8704,9 +8623,9 @@ Name | Type | Description | Notes -## WriteLeasesRevokePrefix +## Rewrap + -Revokes all secrets (via a lease ID prefix) or tokens (via the tokens' path property) generated under a given prefix immediately. ### Example @@ -8730,11 +8649,9 @@ func main() { log.Fatal(err) } - prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" - request := schema.NewWriteLeasesRevokePrefixRequestWithDefaults() - resp, err := client.System.WriteLeasesRevokePrefix( + request := schema.NewRewrapRequestWithDefaults() + resp, err := client.System.Rewrap( context.Background(), - prefix, request, vault.WithToken("my-token"), ) @@ -8749,18 +8666,13 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**prefix** | **string** | The path to revoke keys under. Example: \"prod/aws/ops\" | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - - **writeLeasesRevokePrefixRequest** | [**WriteLeasesRevokePrefixRequest**](WriteLeasesRevokePrefixRequest.md) | | + **rewrapRequest** | [**RewrapRequest**](RewrapRequest.md) | | (empty response body) @@ -8769,9 +8681,9 @@ Name | Type | Description | Notes -## WriteLeasesTidy +## RootTokenGenerationCancel -This endpoint performs cleanup tasks that can be run if certain error conditions have occurred. +Cancels any in-progress root generation attempt. ### Example @@ -8794,7 +8706,7 @@ func main() { log.Fatal(err) } - resp, err := client.System.WriteLeasesTidy( + resp, err := client.System.RootTokenGenerationCancel( context.Background(), vault.WithToken("my-token"), ) @@ -8821,9 +8733,9 @@ This endpoint does not require any parameters. -## WriteLogger +## RootTokenGenerationCancel2 -Modify the log level of a single logger. +Cancels any in-progress root generation attempt. ### Example @@ -8836,7 +8748,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -8847,12 +8758,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the logger to be modified. - request := schema.NewWriteLoggerRequestWithDefaults() - resp, err := client.System.WriteLogger( + resp, err := client.System.RootTokenGenerationCancel2( context.Background(), - name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -8865,19 +8772,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the logger to be modified. | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writeLoggerRequest** | [**WriteLoggerRequest**](WriteLoggerRequest.md) | | (empty response body) @@ -8886,9 +8785,11 @@ Name | Type | Description | Notes -## WriteLoggers +## RootTokenGenerationInitialize + +Initializes a new root generation attempt. + -Modify the log level for all existing loggers. ### Example @@ -8912,8 +8813,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteLoggersRequestWithDefaults() - resp, err := client.System.WriteLoggers( + request := schema.NewRootTokenGenerationInitializeRequestWithDefaults() + resp, err := client.System.RootTokenGenerationInitialize( context.Background(), request, vault.WithToken("my-token"), @@ -8935,18 +8836,20 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeLoggersRequest** | [**WriteLoggersRequest**](WriteLoggersRequest.md) | | + **rootTokenGenerationInitializeRequest** | [**RootTokenGenerationInitializeRequest**](RootTokenGenerationInitializeRequest.md) | | - (empty response body) +[**RootTokenGenerationInitializeResponse**](RootTokenGenerationInitializeResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteMount +## RootTokenGenerationInitialize2 + +Initializes a new root generation attempt. + -Enable a new secrets engine at the given path. ### Example @@ -8970,11 +8873,9 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The path to mount to. Example: \"aws/east\" - request := schema.NewWriteMountRequestWithDefaults() - resp, err := client.System.WriteMount( + request := schema.NewRootTokenGenerationInitialize2RequestWithDefaults() + resp, err := client.System.RootTokenGenerationInitialize2( context.Background(), - path, request, vault.WithToken("my-token"), ) @@ -8989,29 +8890,24 @@ func main() { ### Path Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | The path to mount to. Example: \"aws/east\" | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **rootTokenGenerationInitialize2Request** | [**RootTokenGenerationInitialize2Request**](RootTokenGenerationInitialize2Request.md) | | - **writeMountRequest** | [**WriteMountRequest**](WriteMountRequest.md) | | - - (empty response body) +[**RootTokenGenerationInitialize2Response**](RootTokenGenerationInitialize2Response.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteMountsConfig +## RootTokenGenerationReadProgress -Tune backend configuration parameters for this mount. +Read the configuration and progress of the current root generation attempt. ### Example @@ -9024,7 +8920,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9035,12 +8930,8 @@ func main() { log.Fatal(err) } - path := "path_example" // string | The path to mount to. Example: \"aws/east\" - request := schema.NewWriteMountsConfigRequestWithDefaults() - resp, err := client.System.WriteMountsConfig( + resp, err := client.System.RootTokenGenerationReadProgress( context.Background(), - path, - request, vault.WithToken("my-token"), ) if err != nil { @@ -9053,30 +8944,22 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**path** | **string** | The path to mount to. Example: \"aws/east\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writeMountsConfigRequest** | [**WriteMountsConfigRequest**](WriteMountsConfigRequest.md) | | - (empty response body) +[**RootTokenGenerationReadProgressResponse**](RootTokenGenerationReadProgressResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WritePluginsCatalogByTypeByName +## RootTokenGenerationReadProgress2 -Register a new plugin, or updates an existing one with the supplied name. +Read the configuration and progress of the current root generation attempt. ### Example @@ -9089,7 +8972,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9100,14 +8982,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the plugin - type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database - request := schema.NewWritePluginsCatalogByTypeByNameRequestWithDefaults() - resp, err := client.System.WritePluginsCatalogByTypeByName( + resp, err := client.System.RootTokenGenerationReadProgress2( context.Background(), - name, - type_, - request, vault.WithToken("my-token"), ) if err != nil { @@ -9120,32 +8996,22 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the plugin | -**type_** | **string** | The type of the plugin, may be auth, secret, or database | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - - **writePluginsCatalogByTypeByNameRequest** | [**WritePluginsCatalogByTypeByNameRequest**](WritePluginsCatalogByTypeByNameRequest.md) | | - (empty response body) +[**RootTokenGenerationReadProgress2Response**](RootTokenGenerationReadProgress2Response.md) [[Back to top]](#) [[Back to README]](../README.md) -## WritePluginsReloadBackend +## RootTokenGenerationUpdate -Reload mounted plugin backends. +Enter a single unseal key share to progress the root generation attempt. @@ -9171,8 +9037,8 @@ func main() { log.Fatal(err) } - request := schema.NewWritePluginsReloadBackendRequestWithDefaults() - resp, err := client.System.WritePluginsReloadBackend( + request := schema.NewRootTokenGenerationUpdateRequestWithDefaults() + resp, err := client.System.RootTokenGenerationUpdate( context.Background(), request, vault.WithToken("my-token"), @@ -9194,18 +9060,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writePluginsReloadBackendRequest** | [**WritePluginsReloadBackendRequest**](WritePluginsReloadBackendRequest.md) | | + **rootTokenGenerationUpdateRequest** | [**RootTokenGenerationUpdateRequest**](RootTokenGenerationUpdateRequest.md) | | - (empty response body) +[**RootTokenGenerationUpdateResponse**](RootTokenGenerationUpdateResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WritePoliciesACL +## Seal -Add a new or update an existing ACL policy. +Seal the Vault. ### Example @@ -9218,7 +9084,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9229,12 +9094,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the policy. Example: \"ops\" - request := schema.NewWritePoliciesACLRequestWithDefaults() - resp, err := client.System.WritePoliciesACL( + resp, err := client.System.Seal( context.Background(), - name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -9247,19 +9108,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the policy. Example: \"ops\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writePoliciesACLRequest** | [**WritePoliciesACLRequest**](WritePoliciesACLRequest.md) | | (empty response body) @@ -9268,9 +9121,9 @@ Name | Type | Description | Notes -## WritePoliciesPassword +## SealStatus -Add a new or update an existing password policy. +Check the seal status of a Vault. ### Example @@ -9283,7 +9136,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9294,12 +9146,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the password policy. - request := schema.NewWritePoliciesPasswordRequestWithDefaults() - resp, err := client.System.WritePoliciesPassword( + resp, err := client.System.SealStatus( context.Background(), - name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -9312,30 +9160,24 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the password policy. | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writePoliciesPasswordRequest** | [**WritePoliciesPasswordRequest**](WritePoliciesPasswordRequest.md) | | - (empty response body) +[**SealStatusResponse**](SealStatusResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WritePolicy +## StepDownLeader + +Cause the node to give up active status. + -Add a new or update an existing policy. ### Example @@ -9348,7 +9190,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9359,12 +9200,8 @@ func main() { log.Fatal(err) } - name := "name_example" // string | The name of the policy. Example: \"ops\" - request := schema.NewWritePolicyRequestWithDefaults() - resp, err := client.System.WritePolicy( + resp, err := client.System.StepDownLeader( context.Background(), - name, - request, vault.WithToken("my-token"), ) if err != nil { @@ -9377,19 +9214,11 @@ func main() { ### Path Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- -**ctx** | **context.Context** | context for request cancellation -**name** | **string** | The name of the policy. Example: \"ops\" | +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - - **writePolicyRequest** | [**WritePolicyRequest**](WritePolicyRequest.md) | | (empty response body) @@ -9398,9 +9227,9 @@ Name | Type | Description | Notes -## WriteQuotasConfig - +## UiHeadersConfigure +Configure the values to be returned for the UI header. ### Example @@ -9424,9 +9253,11 @@ func main() { log.Fatal(err) } - request := schema.NewWriteQuotasConfigRequestWithDefaults() - resp, err := client.System.WriteQuotasConfig( + header := "header_example" // string | The name of the header. + request := schema.NewUiHeadersConfigureRequestWithDefaults() + resp, err := client.System.UiHeadersConfigure( context.Background(), + header, request, vault.WithToken("my-token"), ) @@ -9441,13 +9272,18 @@ func main() { ### Path Parameters +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- +**ctx** | **context.Context** | context for request cancellation +**header** | **string** | The name of the header. | ### Other Parameters Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeQuotasConfigRequest** | [**WriteQuotasConfigRequest**](WriteQuotasConfigRequest.md) | | + + **uiHeadersConfigureRequest** | [**UiHeadersConfigureRequest**](UiHeadersConfigureRequest.md) | | (empty response body) @@ -9456,9 +9292,9 @@ Name | Type | Description | Notes -## WriteQuotasRateLimit - +## UiHeadersDeleteConfiguration +Remove a UI header. ### Example @@ -9471,7 +9307,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9482,12 +9317,10 @@ func main() { log.Fatal(err) } - name := "name_example" // string | Name of the quota rule. - request := schema.NewWriteQuotasRateLimitRequestWithDefaults() - resp, err := client.System.WriteQuotasRateLimit( + header := "header_example" // string | The name of the header. + resp, err := client.System.UiHeadersDeleteConfiguration( context.Background(), - name, - request, + header, vault.WithToken("my-token"), ) if err != nil { @@ -9504,7 +9337,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**name** | **string** | Name of the quota rule. | +**header** | **string** | The name of the header. | ### Other Parameters @@ -9512,7 +9345,6 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeQuotasRateLimitRequest** | [**WriteQuotasRateLimitRequest**](WriteQuotasRateLimitRequest.md) | | (empty response body) @@ -9521,9 +9353,9 @@ Name | Type | Description | Notes -## WriteRaw +## UiHeadersList -Update the value of the key at the given path. +Return a list of configured UI headers. ### Example @@ -9536,7 +9368,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9547,10 +9378,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteRawRequestWithDefaults() - resp, err := client.System.WriteRaw( + resp, err := client.System.UiHeadersList( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -9570,18 +9399,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeRawRequest** | [**WriteRawRequest**](WriteRawRequest.md) | | + **list** | **string** | Must be set to `true` | - (empty response body) +[**UiHeadersListResponse**](UiHeadersListResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteRawPath +## UiHeadersReadConfiguration -Update the value of the key at the given path. +Return the given UI header's configuration ### Example @@ -9594,7 +9423,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9605,12 +9433,10 @@ func main() { log.Fatal(err) } - path := "path_example" // string | - request := schema.NewWriteRawPathRequestWithDefaults() - resp, err := client.System.WriteRawPath( + header := "header_example" // string | The name of the header. + resp, err := client.System.UiHeadersReadConfiguration( context.Background(), - path, - request, + header, vault.WithToken("my-token"), ) if err != nil { @@ -9627,7 +9453,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **ctx** | **context.Context** | context for request cancellation -**path** | **string** | | +**header** | **string** | The name of the header. | ### Other Parameters @@ -9635,20 +9461,17 @@ Name | Type | Description | Notes Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeRawPathRequest** | [**WriteRawPathRequest**](WriteRawPathRequest.md) | | - (empty response body) +[**UiHeadersReadConfigurationResponse**](UiHeadersReadConfigurationResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteRekeyInit - -Initializes a new rekey attempt. - +## Unseal +Unseal the Vault. ### Example @@ -9672,8 +9495,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteRekeyInitRequestWithDefaults() - resp, err := client.System.WriteRekeyInit( + request := schema.NewUnsealRequestWithDefaults() + resp, err := client.System.Unseal( context.Background(), request, vault.WithToken("my-token"), @@ -9695,18 +9518,18 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeRekeyInitRequest** | [**WriteRekeyInitRequest**](WriteRekeyInitRequest.md) | | + **unsealRequest** | [**UnsealRequest**](UnsealRequest.md) | | - (empty response body) +[**UnsealResponse**](UnsealResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteRekeyUpdate +## Unwrap + -Enter a single unseal key share to progress the rekey of the Vault. ### Example @@ -9730,8 +9553,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteRekeyUpdateRequestWithDefaults() - resp, err := client.System.WriteRekeyUpdate( + request := schema.NewUnwrapRequestWithDefaults() + resp, err := client.System.Unwrap( context.Background(), request, vault.WithToken("my-token"), @@ -9753,7 +9576,7 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeRekeyUpdateRequest** | [**WriteRekeyUpdateRequest**](WriteRekeyUpdateRequest.md) | | + **unwrapRequest** | [**UnwrapRequest**](UnwrapRequest.md) | | (empty response body) @@ -9762,9 +9585,9 @@ Name | Type | Description | Notes -## WriteRekeyVerify +## VersionHistory -Enter a single new key share to progress the rekey verification operation. +Returns map of historical version change entries ### Example @@ -9777,7 +9600,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9788,10 +9610,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteRekeyVerifyRequestWithDefaults() - resp, err := client.System.WriteRekeyVerify( + resp, err := client.System.VersionHistory( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -9811,16 +9631,16 @@ func main() { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **writeRekeyVerifyRequest** | [**WriteRekeyVerifyRequest**](WriteRekeyVerifyRequest.md) | | + **list** | **string** | Must be set to `true` | - (empty response body) +[**VersionHistoryResponse**](VersionHistoryResponse.md) [[Back to top]](#) [[Back to README]](../README.md) -## WriteRotateConfig +## Wrap @@ -9835,7 +9655,6 @@ import ( "os" "github.com/hashicorp/vault-client-go" - "github.com/hashicorp/vault-client-go/schema" ) func main() { @@ -9846,10 +9665,8 @@ func main() { log.Fatal(err) } - request := schema.NewWriteRotateConfigRequestWithDefaults() - resp, err := client.System.WriteRotateConfig( + resp, err := client.System.Wrap( context.Background(), - request, vault.WithToken("my-token"), ) if err != nil { @@ -9862,14 +9679,11 @@ func main() { ### Path Parameters - +This endpoint does not require any parameters. ### Other Parameters -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **writeRotateConfigRequest** | [**WriteRotateConfigRequest**](WriteRotateConfigRequest.md) | | (empty response body) diff --git a/docs/TerraformWriteConfigRequest.md b/docs/TerraformCloudConfigureRequest.md similarity index 64% rename from docs/TerraformWriteConfigRequest.md rename to docs/TerraformCloudConfigureRequest.md index 7be6105c..d62449d3 100644 --- a/docs/TerraformWriteConfigRequest.md +++ b/docs/TerraformCloudConfigureRequest.md @@ -1,4 +1,4 @@ -# TerraformWriteConfigRequest +# TerraformCloudConfigureRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewTerraformWriteConfigRequest +### NewTerraformCloudConfigureRequest -`func NewTerraformWriteConfigRequest(token string, ) *TerraformWriteConfigRequest` +`func NewTerraformCloudConfigureRequest(token string, ) *TerraformCloudConfigureRequest` -NewTerraformWriteConfigRequest instantiates a new TerraformWriteConfigRequest object +NewTerraformCloudConfigureRequest instantiates a new TerraformCloudConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTerraformWriteConfigRequestWithDefaults +### NewTerraformCloudConfigureRequestWithDefaults -`func NewTerraformWriteConfigRequestWithDefaults() *TerraformWriteConfigRequest` +`func NewTerraformCloudConfigureRequestWithDefaults() *TerraformCloudConfigureRequest` -NewTerraformWriteConfigRequestWithDefaults instantiates a new TerraformWriteConfigRequest object +NewTerraformCloudConfigureRequestWithDefaults instantiates a new TerraformCloudConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAddress -`func (o *TerraformWriteConfigRequest) GetAddress() string` +`func (o *TerraformCloudConfigureRequest) GetAddress() string` GetAddress returns the Address field if non-nil, zero value otherwise. ### GetAddressOk -`func (o *TerraformWriteConfigRequest) GetAddressOk() (*string, bool)` +`func (o *TerraformCloudConfigureRequest) GetAddressOk() (*string, bool)` GetAddressOk returns a tuple with the Address field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAddress -`func (o *TerraformWriteConfigRequest) SetAddress(v string)` +`func (o *TerraformCloudConfigureRequest) SetAddress(v string)` SetAddress sets Address field to given value. ### HasAddress -`func (o *TerraformWriteConfigRequest) HasAddress() bool` +`func (o *TerraformCloudConfigureRequest) HasAddress() bool` HasAddress returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasAddress returns a boolean if a field has been set. ### GetBasePath -`func (o *TerraformWriteConfigRequest) GetBasePath() string` +`func (o *TerraformCloudConfigureRequest) GetBasePath() string` GetBasePath returns the BasePath field if non-nil, zero value otherwise. ### GetBasePathOk -`func (o *TerraformWriteConfigRequest) GetBasePathOk() (*string, bool)` +`func (o *TerraformCloudConfigureRequest) GetBasePathOk() (*string, bool)` GetBasePathOk returns a tuple with the BasePath field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBasePath -`func (o *TerraformWriteConfigRequest) SetBasePath(v string)` +`func (o *TerraformCloudConfigureRequest) SetBasePath(v string)` SetBasePath sets BasePath field to given value. ### HasBasePath -`func (o *TerraformWriteConfigRequest) HasBasePath() bool` +`func (o *TerraformCloudConfigureRequest) HasBasePath() bool` HasBasePath returns a boolean if a field has been set. @@ -92,20 +92,20 @@ HasBasePath returns a boolean if a field has been set. ### GetToken -`func (o *TerraformWriteConfigRequest) GetToken() string` +`func (o *TerraformCloudConfigureRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *TerraformWriteConfigRequest) GetTokenOk() (*string, bool)` +`func (o *TerraformCloudConfigureRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *TerraformWriteConfigRequest) SetToken(v string)` +`func (o *TerraformCloudConfigureRequest) SetToken(v string)` SetToken sets Token field to given value. diff --git a/docs/TerraformWriteRoleRequest.md b/docs/TerraformCloudWriteRoleRequest.md similarity index 64% rename from docs/TerraformWriteRoleRequest.md rename to docs/TerraformCloudWriteRoleRequest.md index d13da3ce..72d1dcc1 100644 --- a/docs/TerraformWriteRoleRequest.md +++ b/docs/TerraformCloudWriteRoleRequest.md @@ -1,4 +1,4 @@ -# TerraformWriteRoleRequest +# TerraformCloudWriteRoleRequest ## Properties @@ -16,47 +16,47 @@ Name | Type | Description | Notes ## Methods -### NewTerraformWriteRoleRequest +### NewTerraformCloudWriteRoleRequest -`func NewTerraformWriteRoleRequest() *TerraformWriteRoleRequest` +`func NewTerraformCloudWriteRoleRequest() *TerraformCloudWriteRoleRequest` -NewTerraformWriteRoleRequest instantiates a new TerraformWriteRoleRequest object +NewTerraformCloudWriteRoleRequest instantiates a new TerraformCloudWriteRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTerraformWriteRoleRequestWithDefaults +### NewTerraformCloudWriteRoleRequestWithDefaults -`func NewTerraformWriteRoleRequestWithDefaults() *TerraformWriteRoleRequest` +`func NewTerraformCloudWriteRoleRequestWithDefaults() *TerraformCloudWriteRoleRequest` -NewTerraformWriteRoleRequestWithDefaults instantiates a new TerraformWriteRoleRequest object +NewTerraformCloudWriteRoleRequestWithDefaults instantiates a new TerraformCloudWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMaxTtl -`func (o *TerraformWriteRoleRequest) GetMaxTtl() int32` +`func (o *TerraformCloudWriteRoleRequest) GetMaxTtl() int32` GetMaxTtl returns the MaxTtl field if non-nil, zero value otherwise. ### GetMaxTtlOk -`func (o *TerraformWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` +`func (o *TerraformCloudWriteRoleRequest) GetMaxTtlOk() (*int32, bool)` GetMaxTtlOk returns a tuple with the MaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMaxTtl -`func (o *TerraformWriteRoleRequest) SetMaxTtl(v int32)` +`func (o *TerraformCloudWriteRoleRequest) SetMaxTtl(v int32)` SetMaxTtl sets MaxTtl field to given value. ### HasMaxTtl -`func (o *TerraformWriteRoleRequest) HasMaxTtl() bool` +`func (o *TerraformCloudWriteRoleRequest) HasMaxTtl() bool` HasMaxTtl returns a boolean if a field has been set. @@ -65,27 +65,27 @@ HasMaxTtl returns a boolean if a field has been set. ### GetOrganization -`func (o *TerraformWriteRoleRequest) GetOrganization() string` +`func (o *TerraformCloudWriteRoleRequest) GetOrganization() string` GetOrganization returns the Organization field if non-nil, zero value otherwise. ### GetOrganizationOk -`func (o *TerraformWriteRoleRequest) GetOrganizationOk() (*string, bool)` +`func (o *TerraformCloudWriteRoleRequest) GetOrganizationOk() (*string, bool)` GetOrganizationOk returns a tuple with the Organization field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetOrganization -`func (o *TerraformWriteRoleRequest) SetOrganization(v string)` +`func (o *TerraformCloudWriteRoleRequest) SetOrganization(v string)` SetOrganization sets Organization field to given value. ### HasOrganization -`func (o *TerraformWriteRoleRequest) HasOrganization() bool` +`func (o *TerraformCloudWriteRoleRequest) HasOrganization() bool` HasOrganization returns a boolean if a field has been set. @@ -94,27 +94,27 @@ HasOrganization returns a boolean if a field has been set. ### GetTeamId -`func (o *TerraformWriteRoleRequest) GetTeamId() string` +`func (o *TerraformCloudWriteRoleRequest) GetTeamId() string` GetTeamId returns the TeamId field if non-nil, zero value otherwise. ### GetTeamIdOk -`func (o *TerraformWriteRoleRequest) GetTeamIdOk() (*string, bool)` +`func (o *TerraformCloudWriteRoleRequest) GetTeamIdOk() (*string, bool)` GetTeamIdOk returns a tuple with the TeamId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTeamId -`func (o *TerraformWriteRoleRequest) SetTeamId(v string)` +`func (o *TerraformCloudWriteRoleRequest) SetTeamId(v string)` SetTeamId sets TeamId field to given value. ### HasTeamId -`func (o *TerraformWriteRoleRequest) HasTeamId() bool` +`func (o *TerraformCloudWriteRoleRequest) HasTeamId() bool` HasTeamId returns a boolean if a field has been set. @@ -123,27 +123,27 @@ HasTeamId returns a boolean if a field has been set. ### GetTtl -`func (o *TerraformWriteRoleRequest) GetTtl() int32` +`func (o *TerraformCloudWriteRoleRequest) GetTtl() int32` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *TerraformWriteRoleRequest) GetTtlOk() (*int32, bool)` +`func (o *TerraformCloudWriteRoleRequest) GetTtlOk() (*int32, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *TerraformWriteRoleRequest) SetTtl(v int32)` +`func (o *TerraformCloudWriteRoleRequest) SetTtl(v int32)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *TerraformWriteRoleRequest) HasTtl() bool` +`func (o *TerraformCloudWriteRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -152,27 +152,27 @@ HasTtl returns a boolean if a field has been set. ### GetUserId -`func (o *TerraformWriteRoleRequest) GetUserId() string` +`func (o *TerraformCloudWriteRoleRequest) GetUserId() string` GetUserId returns the UserId field if non-nil, zero value otherwise. ### GetUserIdOk -`func (o *TerraformWriteRoleRequest) GetUserIdOk() (*string, bool)` +`func (o *TerraformCloudWriteRoleRequest) GetUserIdOk() (*string, bool)` GetUserIdOk returns a tuple with the UserId field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUserId -`func (o *TerraformWriteRoleRequest) SetUserId(v string)` +`func (o *TerraformCloudWriteRoleRequest) SetUserId(v string)` SetUserId sets UserId field to given value. ### HasUserId -`func (o *TerraformWriteRoleRequest) HasUserId() bool` +`func (o *TerraformCloudWriteRoleRequest) HasUserId() bool` HasUserId returns a boolean if a field has been set. diff --git a/docs/TokenWriteCreateWithRoleRequest.md b/docs/TokenCreateAgainstRoleRequest.md similarity index 63% rename from docs/TokenWriteCreateWithRoleRequest.md rename to docs/TokenCreateAgainstRoleRequest.md index ce2bff8c..538610db 100644 --- a/docs/TokenWriteCreateWithRoleRequest.md +++ b/docs/TokenCreateAgainstRoleRequest.md @@ -1,4 +1,4 @@ -# TokenWriteCreateWithRoleRequest +# TokenCreateAgainstRoleRequest ## Properties @@ -24,47 +24,47 @@ Name | Type | Description | Notes ## Methods -### NewTokenWriteCreateWithRoleRequest +### NewTokenCreateAgainstRoleRequest -`func NewTokenWriteCreateWithRoleRequest() *TokenWriteCreateWithRoleRequest` +`func NewTokenCreateAgainstRoleRequest() *TokenCreateAgainstRoleRequest` -NewTokenWriteCreateWithRoleRequest instantiates a new TokenWriteCreateWithRoleRequest object +NewTokenCreateAgainstRoleRequest instantiates a new TokenCreateAgainstRoleRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTokenWriteCreateWithRoleRequestWithDefaults +### NewTokenCreateAgainstRoleRequestWithDefaults -`func NewTokenWriteCreateWithRoleRequestWithDefaults() *TokenWriteCreateWithRoleRequest` +`func NewTokenCreateAgainstRoleRequestWithDefaults() *TokenCreateAgainstRoleRequest` -NewTokenWriteCreateWithRoleRequestWithDefaults instantiates a new TokenWriteCreateWithRoleRequest object +NewTokenCreateAgainstRoleRequestWithDefaults instantiates a new TokenCreateAgainstRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisplayName -`func (o *TokenWriteCreateWithRoleRequest) GetDisplayName() string` +`func (o *TokenCreateAgainstRoleRequest) GetDisplayName() string` GetDisplayName returns the DisplayName field if non-nil, zero value otherwise. ### GetDisplayNameOk -`func (o *TokenWriteCreateWithRoleRequest) GetDisplayNameOk() (*string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetDisplayNameOk() (*string, bool)` GetDisplayNameOk returns a tuple with the DisplayName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisplayName -`func (o *TokenWriteCreateWithRoleRequest) SetDisplayName(v string)` +`func (o *TokenCreateAgainstRoleRequest) SetDisplayName(v string)` SetDisplayName sets DisplayName field to given value. ### HasDisplayName -`func (o *TokenWriteCreateWithRoleRequest) HasDisplayName() bool` +`func (o *TokenCreateAgainstRoleRequest) HasDisplayName() bool` HasDisplayName returns a boolean if a field has been set. @@ -73,27 +73,27 @@ HasDisplayName returns a boolean if a field has been set. ### GetEntityAlias -`func (o *TokenWriteCreateWithRoleRequest) GetEntityAlias() string` +`func (o *TokenCreateAgainstRoleRequest) GetEntityAlias() string` GetEntityAlias returns the EntityAlias field if non-nil, zero value otherwise. ### GetEntityAliasOk -`func (o *TokenWriteCreateWithRoleRequest) GetEntityAliasOk() (*string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetEntityAliasOk() (*string, bool)` GetEntityAliasOk returns a tuple with the EntityAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityAlias -`func (o *TokenWriteCreateWithRoleRequest) SetEntityAlias(v string)` +`func (o *TokenCreateAgainstRoleRequest) SetEntityAlias(v string)` SetEntityAlias sets EntityAlias field to given value. ### HasEntityAlias -`func (o *TokenWriteCreateWithRoleRequest) HasEntityAlias() bool` +`func (o *TokenCreateAgainstRoleRequest) HasEntityAlias() bool` HasEntityAlias returns a boolean if a field has been set. @@ -102,27 +102,27 @@ HasEntityAlias returns a boolean if a field has been set. ### GetExplicitMaxTtl -`func (o *TokenWriteCreateWithRoleRequest) GetExplicitMaxTtl() string` +`func (o *TokenCreateAgainstRoleRequest) GetExplicitMaxTtl() string` GetExplicitMaxTtl returns the ExplicitMaxTtl field if non-nil, zero value otherwise. ### GetExplicitMaxTtlOk -`func (o *TokenWriteCreateWithRoleRequest) GetExplicitMaxTtlOk() (*string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetExplicitMaxTtlOk() (*string, bool)` GetExplicitMaxTtlOk returns a tuple with the ExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExplicitMaxTtl -`func (o *TokenWriteCreateWithRoleRequest) SetExplicitMaxTtl(v string)` +`func (o *TokenCreateAgainstRoleRequest) SetExplicitMaxTtl(v string)` SetExplicitMaxTtl sets ExplicitMaxTtl field to given value. ### HasExplicitMaxTtl -`func (o *TokenWriteCreateWithRoleRequest) HasExplicitMaxTtl() bool` +`func (o *TokenCreateAgainstRoleRequest) HasExplicitMaxTtl() bool` HasExplicitMaxTtl returns a boolean if a field has been set. @@ -131,27 +131,27 @@ HasExplicitMaxTtl returns a boolean if a field has been set. ### GetId -`func (o *TokenWriteCreateWithRoleRequest) GetId() string` +`func (o *TokenCreateAgainstRoleRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *TokenWriteCreateWithRoleRequest) GetIdOk() (*string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *TokenWriteCreateWithRoleRequest) SetId(v string)` +`func (o *TokenCreateAgainstRoleRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *TokenWriteCreateWithRoleRequest) HasId() bool` +`func (o *TokenCreateAgainstRoleRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -160,27 +160,27 @@ HasId returns a boolean if a field has been set. ### GetMetadata -`func (o *TokenWriteCreateWithRoleRequest) GetMetadata() map[string]interface{}` +`func (o *TokenCreateAgainstRoleRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *TokenWriteCreateWithRoleRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *TokenWriteCreateWithRoleRequest) SetMetadata(v map[string]interface{})` +`func (o *TokenCreateAgainstRoleRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *TokenWriteCreateWithRoleRequest) HasMetadata() bool` +`func (o *TokenCreateAgainstRoleRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -189,27 +189,27 @@ HasMetadata returns a boolean if a field has been set. ### GetNoDefaultPolicy -`func (o *TokenWriteCreateWithRoleRequest) GetNoDefaultPolicy() bool` +`func (o *TokenCreateAgainstRoleRequest) GetNoDefaultPolicy() bool` GetNoDefaultPolicy returns the NoDefaultPolicy field if non-nil, zero value otherwise. ### GetNoDefaultPolicyOk -`func (o *TokenWriteCreateWithRoleRequest) GetNoDefaultPolicyOk() (*bool, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetNoDefaultPolicyOk() (*bool, bool)` GetNoDefaultPolicyOk returns a tuple with the NoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNoDefaultPolicy -`func (o *TokenWriteCreateWithRoleRequest) SetNoDefaultPolicy(v bool)` +`func (o *TokenCreateAgainstRoleRequest) SetNoDefaultPolicy(v bool)` SetNoDefaultPolicy sets NoDefaultPolicy field to given value. ### HasNoDefaultPolicy -`func (o *TokenWriteCreateWithRoleRequest) HasNoDefaultPolicy() bool` +`func (o *TokenCreateAgainstRoleRequest) HasNoDefaultPolicy() bool` HasNoDefaultPolicy returns a boolean if a field has been set. @@ -218,27 +218,27 @@ HasNoDefaultPolicy returns a boolean if a field has been set. ### GetNoParent -`func (o *TokenWriteCreateWithRoleRequest) GetNoParent() bool` +`func (o *TokenCreateAgainstRoleRequest) GetNoParent() bool` GetNoParent returns the NoParent field if non-nil, zero value otherwise. ### GetNoParentOk -`func (o *TokenWriteCreateWithRoleRequest) GetNoParentOk() (*bool, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetNoParentOk() (*bool, bool)` GetNoParentOk returns a tuple with the NoParent field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNoParent -`func (o *TokenWriteCreateWithRoleRequest) SetNoParent(v bool)` +`func (o *TokenCreateAgainstRoleRequest) SetNoParent(v bool)` SetNoParent sets NoParent field to given value. ### HasNoParent -`func (o *TokenWriteCreateWithRoleRequest) HasNoParent() bool` +`func (o *TokenCreateAgainstRoleRequest) HasNoParent() bool` HasNoParent returns a boolean if a field has been set. @@ -247,27 +247,27 @@ HasNoParent returns a boolean if a field has been set. ### GetNumUses -`func (o *TokenWriteCreateWithRoleRequest) GetNumUses() int32` +`func (o *TokenCreateAgainstRoleRequest) GetNumUses() int32` GetNumUses returns the NumUses field if non-nil, zero value otherwise. ### GetNumUsesOk -`func (o *TokenWriteCreateWithRoleRequest) GetNumUsesOk() (*int32, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetNumUsesOk() (*int32, bool)` GetNumUsesOk returns a tuple with the NumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNumUses -`func (o *TokenWriteCreateWithRoleRequest) SetNumUses(v int32)` +`func (o *TokenCreateAgainstRoleRequest) SetNumUses(v int32)` SetNumUses sets NumUses field to given value. ### HasNumUses -`func (o *TokenWriteCreateWithRoleRequest) HasNumUses() bool` +`func (o *TokenCreateAgainstRoleRequest) HasNumUses() bool` HasNumUses returns a boolean if a field has been set. @@ -276,27 +276,27 @@ HasNumUses returns a boolean if a field has been set. ### GetPeriod -`func (o *TokenWriteCreateWithRoleRequest) GetPeriod() string` +`func (o *TokenCreateAgainstRoleRequest) GetPeriod() string` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *TokenWriteCreateWithRoleRequest) GetPeriodOk() (*string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetPeriodOk() (*string, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *TokenWriteCreateWithRoleRequest) SetPeriod(v string)` +`func (o *TokenCreateAgainstRoleRequest) SetPeriod(v string)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *TokenWriteCreateWithRoleRequest) HasPeriod() bool` +`func (o *TokenCreateAgainstRoleRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -305,27 +305,27 @@ HasPeriod returns a boolean if a field has been set. ### GetPolicies -`func (o *TokenWriteCreateWithRoleRequest) GetPolicies() []string` +`func (o *TokenCreateAgainstRoleRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *TokenWriteCreateWithRoleRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *TokenWriteCreateWithRoleRequest) SetPolicies(v []string)` +`func (o *TokenCreateAgainstRoleRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *TokenWriteCreateWithRoleRequest) HasPolicies() bool` +`func (o *TokenCreateAgainstRoleRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -334,27 +334,27 @@ HasPolicies returns a boolean if a field has been set. ### GetRenewable -`func (o *TokenWriteCreateWithRoleRequest) GetRenewable() bool` +`func (o *TokenCreateAgainstRoleRequest) GetRenewable() bool` GetRenewable returns the Renewable field if non-nil, zero value otherwise. ### GetRenewableOk -`func (o *TokenWriteCreateWithRoleRequest) GetRenewableOk() (*bool, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetRenewableOk() (*bool, bool)` GetRenewableOk returns a tuple with the Renewable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRenewable -`func (o *TokenWriteCreateWithRoleRequest) SetRenewable(v bool)` +`func (o *TokenCreateAgainstRoleRequest) SetRenewable(v bool)` SetRenewable sets Renewable field to given value. ### HasRenewable -`func (o *TokenWriteCreateWithRoleRequest) HasRenewable() bool` +`func (o *TokenCreateAgainstRoleRequest) HasRenewable() bool` HasRenewable returns a boolean if a field has been set. @@ -363,27 +363,27 @@ HasRenewable returns a boolean if a field has been set. ### GetTtl -`func (o *TokenWriteCreateWithRoleRequest) GetTtl() string` +`func (o *TokenCreateAgainstRoleRequest) GetTtl() string` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *TokenWriteCreateWithRoleRequest) GetTtlOk() (*string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetTtlOk() (*string, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *TokenWriteCreateWithRoleRequest) SetTtl(v string)` +`func (o *TokenCreateAgainstRoleRequest) SetTtl(v string)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *TokenWriteCreateWithRoleRequest) HasTtl() bool` +`func (o *TokenCreateAgainstRoleRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -392,27 +392,27 @@ HasTtl returns a boolean if a field has been set. ### GetType -`func (o *TokenWriteCreateWithRoleRequest) GetType() string` +`func (o *TokenCreateAgainstRoleRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *TokenWriteCreateWithRoleRequest) GetTypeOk() (*string, bool)` +`func (o *TokenCreateAgainstRoleRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *TokenWriteCreateWithRoleRequest) SetType(v string)` +`func (o *TokenCreateAgainstRoleRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *TokenWriteCreateWithRoleRequest) HasType() bool` +`func (o *TokenCreateAgainstRoleRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/TokenWriteCreateOrphanRequest.md b/docs/TokenCreateOrphanRequest.md similarity index 64% rename from docs/TokenWriteCreateOrphanRequest.md rename to docs/TokenCreateOrphanRequest.md index 159e0ffb..06742b03 100644 --- a/docs/TokenWriteCreateOrphanRequest.md +++ b/docs/TokenCreateOrphanRequest.md @@ -1,4 +1,4 @@ -# TokenWriteCreateOrphanRequest +# TokenCreateOrphanRequest ## Properties @@ -25,47 +25,47 @@ Name | Type | Description | Notes ## Methods -### NewTokenWriteCreateOrphanRequest +### NewTokenCreateOrphanRequest -`func NewTokenWriteCreateOrphanRequest() *TokenWriteCreateOrphanRequest` +`func NewTokenCreateOrphanRequest() *TokenCreateOrphanRequest` -NewTokenWriteCreateOrphanRequest instantiates a new TokenWriteCreateOrphanRequest object +NewTokenCreateOrphanRequest instantiates a new TokenCreateOrphanRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTokenWriteCreateOrphanRequestWithDefaults +### NewTokenCreateOrphanRequestWithDefaults -`func NewTokenWriteCreateOrphanRequestWithDefaults() *TokenWriteCreateOrphanRequest` +`func NewTokenCreateOrphanRequestWithDefaults() *TokenCreateOrphanRequest` -NewTokenWriteCreateOrphanRequestWithDefaults instantiates a new TokenWriteCreateOrphanRequest object +NewTokenCreateOrphanRequestWithDefaults instantiates a new TokenCreateOrphanRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisplayName -`func (o *TokenWriteCreateOrphanRequest) GetDisplayName() string` +`func (o *TokenCreateOrphanRequest) GetDisplayName() string` GetDisplayName returns the DisplayName field if non-nil, zero value otherwise. ### GetDisplayNameOk -`func (o *TokenWriteCreateOrphanRequest) GetDisplayNameOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetDisplayNameOk() (*string, bool)` GetDisplayNameOk returns a tuple with the DisplayName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisplayName -`func (o *TokenWriteCreateOrphanRequest) SetDisplayName(v string)` +`func (o *TokenCreateOrphanRequest) SetDisplayName(v string)` SetDisplayName sets DisplayName field to given value. ### HasDisplayName -`func (o *TokenWriteCreateOrphanRequest) HasDisplayName() bool` +`func (o *TokenCreateOrphanRequest) HasDisplayName() bool` HasDisplayName returns a boolean if a field has been set. @@ -74,27 +74,27 @@ HasDisplayName returns a boolean if a field has been set. ### GetEntityAlias -`func (o *TokenWriteCreateOrphanRequest) GetEntityAlias() string` +`func (o *TokenCreateOrphanRequest) GetEntityAlias() string` GetEntityAlias returns the EntityAlias field if non-nil, zero value otherwise. ### GetEntityAliasOk -`func (o *TokenWriteCreateOrphanRequest) GetEntityAliasOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetEntityAliasOk() (*string, bool)` GetEntityAliasOk returns a tuple with the EntityAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityAlias -`func (o *TokenWriteCreateOrphanRequest) SetEntityAlias(v string)` +`func (o *TokenCreateOrphanRequest) SetEntityAlias(v string)` SetEntityAlias sets EntityAlias field to given value. ### HasEntityAlias -`func (o *TokenWriteCreateOrphanRequest) HasEntityAlias() bool` +`func (o *TokenCreateOrphanRequest) HasEntityAlias() bool` HasEntityAlias returns a boolean if a field has been set. @@ -103,27 +103,27 @@ HasEntityAlias returns a boolean if a field has been set. ### GetExplicitMaxTtl -`func (o *TokenWriteCreateOrphanRequest) GetExplicitMaxTtl() string` +`func (o *TokenCreateOrphanRequest) GetExplicitMaxTtl() string` GetExplicitMaxTtl returns the ExplicitMaxTtl field if non-nil, zero value otherwise. ### GetExplicitMaxTtlOk -`func (o *TokenWriteCreateOrphanRequest) GetExplicitMaxTtlOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetExplicitMaxTtlOk() (*string, bool)` GetExplicitMaxTtlOk returns a tuple with the ExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExplicitMaxTtl -`func (o *TokenWriteCreateOrphanRequest) SetExplicitMaxTtl(v string)` +`func (o *TokenCreateOrphanRequest) SetExplicitMaxTtl(v string)` SetExplicitMaxTtl sets ExplicitMaxTtl field to given value. ### HasExplicitMaxTtl -`func (o *TokenWriteCreateOrphanRequest) HasExplicitMaxTtl() bool` +`func (o *TokenCreateOrphanRequest) HasExplicitMaxTtl() bool` HasExplicitMaxTtl returns a boolean if a field has been set. @@ -132,27 +132,27 @@ HasExplicitMaxTtl returns a boolean if a field has been set. ### GetId -`func (o *TokenWriteCreateOrphanRequest) GetId() string` +`func (o *TokenCreateOrphanRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *TokenWriteCreateOrphanRequest) GetIdOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *TokenWriteCreateOrphanRequest) SetId(v string)` +`func (o *TokenCreateOrphanRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *TokenWriteCreateOrphanRequest) HasId() bool` +`func (o *TokenCreateOrphanRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -161,27 +161,27 @@ HasId returns a boolean if a field has been set. ### GetMetadata -`func (o *TokenWriteCreateOrphanRequest) GetMetadata() map[string]interface{}` +`func (o *TokenCreateOrphanRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *TokenWriteCreateOrphanRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *TokenCreateOrphanRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *TokenWriteCreateOrphanRequest) SetMetadata(v map[string]interface{})` +`func (o *TokenCreateOrphanRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *TokenWriteCreateOrphanRequest) HasMetadata() bool` +`func (o *TokenCreateOrphanRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -190,27 +190,27 @@ HasMetadata returns a boolean if a field has been set. ### GetNoDefaultPolicy -`func (o *TokenWriteCreateOrphanRequest) GetNoDefaultPolicy() bool` +`func (o *TokenCreateOrphanRequest) GetNoDefaultPolicy() bool` GetNoDefaultPolicy returns the NoDefaultPolicy field if non-nil, zero value otherwise. ### GetNoDefaultPolicyOk -`func (o *TokenWriteCreateOrphanRequest) GetNoDefaultPolicyOk() (*bool, bool)` +`func (o *TokenCreateOrphanRequest) GetNoDefaultPolicyOk() (*bool, bool)` GetNoDefaultPolicyOk returns a tuple with the NoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNoDefaultPolicy -`func (o *TokenWriteCreateOrphanRequest) SetNoDefaultPolicy(v bool)` +`func (o *TokenCreateOrphanRequest) SetNoDefaultPolicy(v bool)` SetNoDefaultPolicy sets NoDefaultPolicy field to given value. ### HasNoDefaultPolicy -`func (o *TokenWriteCreateOrphanRequest) HasNoDefaultPolicy() bool` +`func (o *TokenCreateOrphanRequest) HasNoDefaultPolicy() bool` HasNoDefaultPolicy returns a boolean if a field has been set. @@ -219,27 +219,27 @@ HasNoDefaultPolicy returns a boolean if a field has been set. ### GetNoParent -`func (o *TokenWriteCreateOrphanRequest) GetNoParent() bool` +`func (o *TokenCreateOrphanRequest) GetNoParent() bool` GetNoParent returns the NoParent field if non-nil, zero value otherwise. ### GetNoParentOk -`func (o *TokenWriteCreateOrphanRequest) GetNoParentOk() (*bool, bool)` +`func (o *TokenCreateOrphanRequest) GetNoParentOk() (*bool, bool)` GetNoParentOk returns a tuple with the NoParent field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNoParent -`func (o *TokenWriteCreateOrphanRequest) SetNoParent(v bool)` +`func (o *TokenCreateOrphanRequest) SetNoParent(v bool)` SetNoParent sets NoParent field to given value. ### HasNoParent -`func (o *TokenWriteCreateOrphanRequest) HasNoParent() bool` +`func (o *TokenCreateOrphanRequest) HasNoParent() bool` HasNoParent returns a boolean if a field has been set. @@ -248,27 +248,27 @@ HasNoParent returns a boolean if a field has been set. ### GetNumUses -`func (o *TokenWriteCreateOrphanRequest) GetNumUses() int32` +`func (o *TokenCreateOrphanRequest) GetNumUses() int32` GetNumUses returns the NumUses field if non-nil, zero value otherwise. ### GetNumUsesOk -`func (o *TokenWriteCreateOrphanRequest) GetNumUsesOk() (*int32, bool)` +`func (o *TokenCreateOrphanRequest) GetNumUsesOk() (*int32, bool)` GetNumUsesOk returns a tuple with the NumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNumUses -`func (o *TokenWriteCreateOrphanRequest) SetNumUses(v int32)` +`func (o *TokenCreateOrphanRequest) SetNumUses(v int32)` SetNumUses sets NumUses field to given value. ### HasNumUses -`func (o *TokenWriteCreateOrphanRequest) HasNumUses() bool` +`func (o *TokenCreateOrphanRequest) HasNumUses() bool` HasNumUses returns a boolean if a field has been set. @@ -277,27 +277,27 @@ HasNumUses returns a boolean if a field has been set. ### GetPeriod -`func (o *TokenWriteCreateOrphanRequest) GetPeriod() string` +`func (o *TokenCreateOrphanRequest) GetPeriod() string` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *TokenWriteCreateOrphanRequest) GetPeriodOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetPeriodOk() (*string, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *TokenWriteCreateOrphanRequest) SetPeriod(v string)` +`func (o *TokenCreateOrphanRequest) SetPeriod(v string)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *TokenWriteCreateOrphanRequest) HasPeriod() bool` +`func (o *TokenCreateOrphanRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -306,27 +306,27 @@ HasPeriod returns a boolean if a field has been set. ### GetPolicies -`func (o *TokenWriteCreateOrphanRequest) GetPolicies() []string` +`func (o *TokenCreateOrphanRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *TokenWriteCreateOrphanRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *TokenCreateOrphanRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *TokenWriteCreateOrphanRequest) SetPolicies(v []string)` +`func (o *TokenCreateOrphanRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *TokenWriteCreateOrphanRequest) HasPolicies() bool` +`func (o *TokenCreateOrphanRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -335,27 +335,27 @@ HasPolicies returns a boolean if a field has been set. ### GetRenewable -`func (o *TokenWriteCreateOrphanRequest) GetRenewable() bool` +`func (o *TokenCreateOrphanRequest) GetRenewable() bool` GetRenewable returns the Renewable field if non-nil, zero value otherwise. ### GetRenewableOk -`func (o *TokenWriteCreateOrphanRequest) GetRenewableOk() (*bool, bool)` +`func (o *TokenCreateOrphanRequest) GetRenewableOk() (*bool, bool)` GetRenewableOk returns a tuple with the Renewable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRenewable -`func (o *TokenWriteCreateOrphanRequest) SetRenewable(v bool)` +`func (o *TokenCreateOrphanRequest) SetRenewable(v bool)` SetRenewable sets Renewable field to given value. ### HasRenewable -`func (o *TokenWriteCreateOrphanRequest) HasRenewable() bool` +`func (o *TokenCreateOrphanRequest) HasRenewable() bool` HasRenewable returns a boolean if a field has been set. @@ -364,27 +364,27 @@ HasRenewable returns a boolean if a field has been set. ### GetRoleName -`func (o *TokenWriteCreateOrphanRequest) GetRoleName() string` +`func (o *TokenCreateOrphanRequest) GetRoleName() string` GetRoleName returns the RoleName field if non-nil, zero value otherwise. ### GetRoleNameOk -`func (o *TokenWriteCreateOrphanRequest) GetRoleNameOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetRoleNameOk() (*string, bool)` GetRoleNameOk returns a tuple with the RoleName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRoleName -`func (o *TokenWriteCreateOrphanRequest) SetRoleName(v string)` +`func (o *TokenCreateOrphanRequest) SetRoleName(v string)` SetRoleName sets RoleName field to given value. ### HasRoleName -`func (o *TokenWriteCreateOrphanRequest) HasRoleName() bool` +`func (o *TokenCreateOrphanRequest) HasRoleName() bool` HasRoleName returns a boolean if a field has been set. @@ -393,27 +393,27 @@ HasRoleName returns a boolean if a field has been set. ### GetTtl -`func (o *TokenWriteCreateOrphanRequest) GetTtl() string` +`func (o *TokenCreateOrphanRequest) GetTtl() string` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *TokenWriteCreateOrphanRequest) GetTtlOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetTtlOk() (*string, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *TokenWriteCreateOrphanRequest) SetTtl(v string)` +`func (o *TokenCreateOrphanRequest) SetTtl(v string)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *TokenWriteCreateOrphanRequest) HasTtl() bool` +`func (o *TokenCreateOrphanRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -422,27 +422,27 @@ HasTtl returns a boolean if a field has been set. ### GetType -`func (o *TokenWriteCreateOrphanRequest) GetType() string` +`func (o *TokenCreateOrphanRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *TokenWriteCreateOrphanRequest) GetTypeOk() (*string, bool)` +`func (o *TokenCreateOrphanRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *TokenWriteCreateOrphanRequest) SetType(v string)` +`func (o *TokenCreateOrphanRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *TokenWriteCreateOrphanRequest) HasType() bool` +`func (o *TokenCreateOrphanRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/TokenWriteCreateRequest.md b/docs/TokenCreateRequest.md similarity index 66% rename from docs/TokenWriteCreateRequest.md rename to docs/TokenCreateRequest.md index f20f5c76..84f7f340 100644 --- a/docs/TokenWriteCreateRequest.md +++ b/docs/TokenCreateRequest.md @@ -1,4 +1,4 @@ -# TokenWriteCreateRequest +# TokenCreateRequest ## Properties @@ -24,47 +24,47 @@ Name | Type | Description | Notes ## Methods -### NewTokenWriteCreateRequest +### NewTokenCreateRequest -`func NewTokenWriteCreateRequest() *TokenWriteCreateRequest` +`func NewTokenCreateRequest() *TokenCreateRequest` -NewTokenWriteCreateRequest instantiates a new TokenWriteCreateRequest object +NewTokenCreateRequest instantiates a new TokenCreateRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTokenWriteCreateRequestWithDefaults +### NewTokenCreateRequestWithDefaults -`func NewTokenWriteCreateRequestWithDefaults() *TokenWriteCreateRequest` +`func NewTokenCreateRequestWithDefaults() *TokenCreateRequest` -NewTokenWriteCreateRequestWithDefaults instantiates a new TokenWriteCreateRequest object +NewTokenCreateRequestWithDefaults instantiates a new TokenCreateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisplayName -`func (o *TokenWriteCreateRequest) GetDisplayName() string` +`func (o *TokenCreateRequest) GetDisplayName() string` GetDisplayName returns the DisplayName field if non-nil, zero value otherwise. ### GetDisplayNameOk -`func (o *TokenWriteCreateRequest) GetDisplayNameOk() (*string, bool)` +`func (o *TokenCreateRequest) GetDisplayNameOk() (*string, bool)` GetDisplayNameOk returns a tuple with the DisplayName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisplayName -`func (o *TokenWriteCreateRequest) SetDisplayName(v string)` +`func (o *TokenCreateRequest) SetDisplayName(v string)` SetDisplayName sets DisplayName field to given value. ### HasDisplayName -`func (o *TokenWriteCreateRequest) HasDisplayName() bool` +`func (o *TokenCreateRequest) HasDisplayName() bool` HasDisplayName returns a boolean if a field has been set. @@ -73,27 +73,27 @@ HasDisplayName returns a boolean if a field has been set. ### GetEntityAlias -`func (o *TokenWriteCreateRequest) GetEntityAlias() string` +`func (o *TokenCreateRequest) GetEntityAlias() string` GetEntityAlias returns the EntityAlias field if non-nil, zero value otherwise. ### GetEntityAliasOk -`func (o *TokenWriteCreateRequest) GetEntityAliasOk() (*string, bool)` +`func (o *TokenCreateRequest) GetEntityAliasOk() (*string, bool)` GetEntityAliasOk returns a tuple with the EntityAlias field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetEntityAlias -`func (o *TokenWriteCreateRequest) SetEntityAlias(v string)` +`func (o *TokenCreateRequest) SetEntityAlias(v string)` SetEntityAlias sets EntityAlias field to given value. ### HasEntityAlias -`func (o *TokenWriteCreateRequest) HasEntityAlias() bool` +`func (o *TokenCreateRequest) HasEntityAlias() bool` HasEntityAlias returns a boolean if a field has been set. @@ -102,27 +102,27 @@ HasEntityAlias returns a boolean if a field has been set. ### GetExplicitMaxTtl -`func (o *TokenWriteCreateRequest) GetExplicitMaxTtl() string` +`func (o *TokenCreateRequest) GetExplicitMaxTtl() string` GetExplicitMaxTtl returns the ExplicitMaxTtl field if non-nil, zero value otherwise. ### GetExplicitMaxTtlOk -`func (o *TokenWriteCreateRequest) GetExplicitMaxTtlOk() (*string, bool)` +`func (o *TokenCreateRequest) GetExplicitMaxTtlOk() (*string, bool)` GetExplicitMaxTtlOk returns a tuple with the ExplicitMaxTtl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExplicitMaxTtl -`func (o *TokenWriteCreateRequest) SetExplicitMaxTtl(v string)` +`func (o *TokenCreateRequest) SetExplicitMaxTtl(v string)` SetExplicitMaxTtl sets ExplicitMaxTtl field to given value. ### HasExplicitMaxTtl -`func (o *TokenWriteCreateRequest) HasExplicitMaxTtl() bool` +`func (o *TokenCreateRequest) HasExplicitMaxTtl() bool` HasExplicitMaxTtl returns a boolean if a field has been set. @@ -131,27 +131,27 @@ HasExplicitMaxTtl returns a boolean if a field has been set. ### GetId -`func (o *TokenWriteCreateRequest) GetId() string` +`func (o *TokenCreateRequest) GetId() string` GetId returns the Id field if non-nil, zero value otherwise. ### GetIdOk -`func (o *TokenWriteCreateRequest) GetIdOk() (*string, bool)` +`func (o *TokenCreateRequest) GetIdOk() (*string, bool)` GetIdOk returns a tuple with the Id field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetId -`func (o *TokenWriteCreateRequest) SetId(v string)` +`func (o *TokenCreateRequest) SetId(v string)` SetId sets Id field to given value. ### HasId -`func (o *TokenWriteCreateRequest) HasId() bool` +`func (o *TokenCreateRequest) HasId() bool` HasId returns a boolean if a field has been set. @@ -160,27 +160,27 @@ HasId returns a boolean if a field has been set. ### GetMetadata -`func (o *TokenWriteCreateRequest) GetMetadata() map[string]interface{}` +`func (o *TokenCreateRequest) GetMetadata() map[string]interface{}` GetMetadata returns the Metadata field if non-nil, zero value otherwise. ### GetMetadataOk -`func (o *TokenWriteCreateRequest) GetMetadataOk() (*map[string]interface{}, bool)` +`func (o *TokenCreateRequest) GetMetadataOk() (*map[string]interface{}, bool)` GetMetadataOk returns a tuple with the Metadata field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMetadata -`func (o *TokenWriteCreateRequest) SetMetadata(v map[string]interface{})` +`func (o *TokenCreateRequest) SetMetadata(v map[string]interface{})` SetMetadata sets Metadata field to given value. ### HasMetadata -`func (o *TokenWriteCreateRequest) HasMetadata() bool` +`func (o *TokenCreateRequest) HasMetadata() bool` HasMetadata returns a boolean if a field has been set. @@ -189,27 +189,27 @@ HasMetadata returns a boolean if a field has been set. ### GetNoDefaultPolicy -`func (o *TokenWriteCreateRequest) GetNoDefaultPolicy() bool` +`func (o *TokenCreateRequest) GetNoDefaultPolicy() bool` GetNoDefaultPolicy returns the NoDefaultPolicy field if non-nil, zero value otherwise. ### GetNoDefaultPolicyOk -`func (o *TokenWriteCreateRequest) GetNoDefaultPolicyOk() (*bool, bool)` +`func (o *TokenCreateRequest) GetNoDefaultPolicyOk() (*bool, bool)` GetNoDefaultPolicyOk returns a tuple with the NoDefaultPolicy field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNoDefaultPolicy -`func (o *TokenWriteCreateRequest) SetNoDefaultPolicy(v bool)` +`func (o *TokenCreateRequest) SetNoDefaultPolicy(v bool)` SetNoDefaultPolicy sets NoDefaultPolicy field to given value. ### HasNoDefaultPolicy -`func (o *TokenWriteCreateRequest) HasNoDefaultPolicy() bool` +`func (o *TokenCreateRequest) HasNoDefaultPolicy() bool` HasNoDefaultPolicy returns a boolean if a field has been set. @@ -218,27 +218,27 @@ HasNoDefaultPolicy returns a boolean if a field has been set. ### GetNoParent -`func (o *TokenWriteCreateRequest) GetNoParent() bool` +`func (o *TokenCreateRequest) GetNoParent() bool` GetNoParent returns the NoParent field if non-nil, zero value otherwise. ### GetNoParentOk -`func (o *TokenWriteCreateRequest) GetNoParentOk() (*bool, bool)` +`func (o *TokenCreateRequest) GetNoParentOk() (*bool, bool)` GetNoParentOk returns a tuple with the NoParent field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNoParent -`func (o *TokenWriteCreateRequest) SetNoParent(v bool)` +`func (o *TokenCreateRequest) SetNoParent(v bool)` SetNoParent sets NoParent field to given value. ### HasNoParent -`func (o *TokenWriteCreateRequest) HasNoParent() bool` +`func (o *TokenCreateRequest) HasNoParent() bool` HasNoParent returns a boolean if a field has been set. @@ -247,27 +247,27 @@ HasNoParent returns a boolean if a field has been set. ### GetNumUses -`func (o *TokenWriteCreateRequest) GetNumUses() int32` +`func (o *TokenCreateRequest) GetNumUses() int32` GetNumUses returns the NumUses field if non-nil, zero value otherwise. ### GetNumUsesOk -`func (o *TokenWriteCreateRequest) GetNumUsesOk() (*int32, bool)` +`func (o *TokenCreateRequest) GetNumUsesOk() (*int32, bool)` GetNumUsesOk returns a tuple with the NumUses field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetNumUses -`func (o *TokenWriteCreateRequest) SetNumUses(v int32)` +`func (o *TokenCreateRequest) SetNumUses(v int32)` SetNumUses sets NumUses field to given value. ### HasNumUses -`func (o *TokenWriteCreateRequest) HasNumUses() bool` +`func (o *TokenCreateRequest) HasNumUses() bool` HasNumUses returns a boolean if a field has been set. @@ -276,27 +276,27 @@ HasNumUses returns a boolean if a field has been set. ### GetPeriod -`func (o *TokenWriteCreateRequest) GetPeriod() string` +`func (o *TokenCreateRequest) GetPeriod() string` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *TokenWriteCreateRequest) GetPeriodOk() (*string, bool)` +`func (o *TokenCreateRequest) GetPeriodOk() (*string, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *TokenWriteCreateRequest) SetPeriod(v string)` +`func (o *TokenCreateRequest) SetPeriod(v string)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *TokenWriteCreateRequest) HasPeriod() bool` +`func (o *TokenCreateRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -305,27 +305,27 @@ HasPeriod returns a boolean if a field has been set. ### GetPolicies -`func (o *TokenWriteCreateRequest) GetPolicies() []string` +`func (o *TokenCreateRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *TokenWriteCreateRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *TokenCreateRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *TokenWriteCreateRequest) SetPolicies(v []string)` +`func (o *TokenCreateRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *TokenWriteCreateRequest) HasPolicies() bool` +`func (o *TokenCreateRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -334,27 +334,27 @@ HasPolicies returns a boolean if a field has been set. ### GetRenewable -`func (o *TokenWriteCreateRequest) GetRenewable() bool` +`func (o *TokenCreateRequest) GetRenewable() bool` GetRenewable returns the Renewable field if non-nil, zero value otherwise. ### GetRenewableOk -`func (o *TokenWriteCreateRequest) GetRenewableOk() (*bool, bool)` +`func (o *TokenCreateRequest) GetRenewableOk() (*bool, bool)` GetRenewableOk returns a tuple with the Renewable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetRenewable -`func (o *TokenWriteCreateRequest) SetRenewable(v bool)` +`func (o *TokenCreateRequest) SetRenewable(v bool)` SetRenewable sets Renewable field to given value. ### HasRenewable -`func (o *TokenWriteCreateRequest) HasRenewable() bool` +`func (o *TokenCreateRequest) HasRenewable() bool` HasRenewable returns a boolean if a field has been set. @@ -363,27 +363,27 @@ HasRenewable returns a boolean if a field has been set. ### GetTtl -`func (o *TokenWriteCreateRequest) GetTtl() string` +`func (o *TokenCreateRequest) GetTtl() string` GetTtl returns the Ttl field if non-nil, zero value otherwise. ### GetTtlOk -`func (o *TokenWriteCreateRequest) GetTtlOk() (*string, bool)` +`func (o *TokenCreateRequest) GetTtlOk() (*string, bool)` GetTtlOk returns a tuple with the Ttl field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTtl -`func (o *TokenWriteCreateRequest) SetTtl(v string)` +`func (o *TokenCreateRequest) SetTtl(v string)` SetTtl sets Ttl field to given value. ### HasTtl -`func (o *TokenWriteCreateRequest) HasTtl() bool` +`func (o *TokenCreateRequest) HasTtl() bool` HasTtl returns a boolean if a field has been set. @@ -392,27 +392,27 @@ HasTtl returns a boolean if a field has been set. ### GetType -`func (o *TokenWriteCreateRequest) GetType() string` +`func (o *TokenCreateRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *TokenWriteCreateRequest) GetTypeOk() (*string, bool)` +`func (o *TokenCreateRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *TokenWriteCreateRequest) SetType(v string)` +`func (o *TokenCreateRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *TokenWriteCreateRequest) HasType() bool` +`func (o *TokenCreateRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/TokenWriteLookupAccessorRequest.md b/docs/TokenLookUpAccessorRequest.md similarity index 60% rename from docs/TokenWriteLookupAccessorRequest.md rename to docs/TokenLookUpAccessorRequest.md index 73fa0a81..17bec81b 100644 --- a/docs/TokenWriteLookupAccessorRequest.md +++ b/docs/TokenLookUpAccessorRequest.md @@ -1,4 +1,4 @@ -# TokenWriteLookupAccessorRequest +# TokenLookUpAccessorRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewTokenWriteLookupAccessorRequest +### NewTokenLookUpAccessorRequest -`func NewTokenWriteLookupAccessorRequest() *TokenWriteLookupAccessorRequest` +`func NewTokenLookUpAccessorRequest() *TokenLookUpAccessorRequest` -NewTokenWriteLookupAccessorRequest instantiates a new TokenWriteLookupAccessorRequest object +NewTokenLookUpAccessorRequest instantiates a new TokenLookUpAccessorRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTokenWriteLookupAccessorRequestWithDefaults +### NewTokenLookUpAccessorRequestWithDefaults -`func NewTokenWriteLookupAccessorRequestWithDefaults() *TokenWriteLookupAccessorRequest` +`func NewTokenLookUpAccessorRequestWithDefaults() *TokenLookUpAccessorRequest` -NewTokenWriteLookupAccessorRequestWithDefaults instantiates a new TokenWriteLookupAccessorRequest object +NewTokenLookUpAccessorRequestWithDefaults instantiates a new TokenLookUpAccessorRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAccessor -`func (o *TokenWriteLookupAccessorRequest) GetAccessor() string` +`func (o *TokenLookUpAccessorRequest) GetAccessor() string` GetAccessor returns the Accessor field if non-nil, zero value otherwise. ### GetAccessorOk -`func (o *TokenWriteLookupAccessorRequest) GetAccessorOk() (*string, bool)` +`func (o *TokenLookUpAccessorRequest) GetAccessorOk() (*string, bool)` GetAccessorOk returns a tuple with the Accessor field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAccessor -`func (o *TokenWriteLookupAccessorRequest) SetAccessor(v string)` +`func (o *TokenLookUpAccessorRequest) SetAccessor(v string)` SetAccessor sets Accessor field to given value. ### HasAccessor -`func (o *TokenWriteLookupAccessorRequest) HasAccessor() bool` +`func (o *TokenLookUpAccessorRequest) HasAccessor() bool` HasAccessor returns a boolean if a field has been set. diff --git a/docs/TokenWriteLookupRequest.md b/docs/TokenLookUpRequest.md similarity index 64% rename from docs/TokenWriteLookupRequest.md rename to docs/TokenLookUpRequest.md index b4a6aaaa..170c8ebc 100644 --- a/docs/TokenWriteLookupRequest.md +++ b/docs/TokenLookUpRequest.md @@ -1,4 +1,4 @@ -# TokenWriteLookupRequest +# TokenLookUpRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewTokenWriteLookupRequest +### NewTokenLookUpRequest -`func NewTokenWriteLookupRequest() *TokenWriteLookupRequest` +`func NewTokenLookUpRequest() *TokenLookUpRequest` -NewTokenWriteLookupRequest instantiates a new TokenWriteLookupRequest object +NewTokenLookUpRequest instantiates a new TokenLookUpRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTokenWriteLookupRequestWithDefaults +### NewTokenLookUpRequestWithDefaults -`func NewTokenWriteLookupRequestWithDefaults() *TokenWriteLookupRequest` +`func NewTokenLookUpRequestWithDefaults() *TokenLookUpRequest` -NewTokenWriteLookupRequestWithDefaults instantiates a new TokenWriteLookupRequest object +NewTokenLookUpRequestWithDefaults instantiates a new TokenLookUpRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetToken -`func (o *TokenWriteLookupRequest) GetToken() string` +`func (o *TokenLookUpRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *TokenWriteLookupRequest) GetTokenOk() (*string, bool)` +`func (o *TokenLookUpRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *TokenWriteLookupRequest) SetToken(v string)` +`func (o *TokenLookUpRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *TokenWriteLookupRequest) HasToken() bool` +`func (o *TokenLookUpRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/TokenWriteLookupSelfRequest.md b/docs/TokenLookUpSelf2Request.md similarity index 62% rename from docs/TokenWriteLookupSelfRequest.md rename to docs/TokenLookUpSelf2Request.md index 91e84ae8..f27999b1 100644 --- a/docs/TokenWriteLookupSelfRequest.md +++ b/docs/TokenLookUpSelf2Request.md @@ -1,4 +1,4 @@ -# TokenWriteLookupSelfRequest +# TokenLookUpSelf2Request ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewTokenWriteLookupSelfRequest +### NewTokenLookUpSelf2Request -`func NewTokenWriteLookupSelfRequest() *TokenWriteLookupSelfRequest` +`func NewTokenLookUpSelf2Request() *TokenLookUpSelf2Request` -NewTokenWriteLookupSelfRequest instantiates a new TokenWriteLookupSelfRequest object +NewTokenLookUpSelf2Request instantiates a new TokenLookUpSelf2Request object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTokenWriteLookupSelfRequestWithDefaults +### NewTokenLookUpSelf2RequestWithDefaults -`func NewTokenWriteLookupSelfRequestWithDefaults() *TokenWriteLookupSelfRequest` +`func NewTokenLookUpSelf2RequestWithDefaults() *TokenLookUpSelf2Request` -NewTokenWriteLookupSelfRequestWithDefaults instantiates a new TokenWriteLookupSelfRequest object +NewTokenLookUpSelf2RequestWithDefaults instantiates a new TokenLookUpSelf2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetToken -`func (o *TokenWriteLookupSelfRequest) GetToken() string` +`func (o *TokenLookUpSelf2Request) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *TokenWriteLookupSelfRequest) GetTokenOk() (*string, bool)` +`func (o *TokenLookUpSelf2Request) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *TokenWriteLookupSelfRequest) SetToken(v string)` +`func (o *TokenLookUpSelf2Request) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *TokenWriteLookupSelfRequest) HasToken() bool` +`func (o *TokenLookUpSelf2Request) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/TOTPWriteKeyRequest.md b/docs/TotpCreateKeyRequest.md similarity index 70% rename from docs/TOTPWriteKeyRequest.md rename to docs/TotpCreateKeyRequest.md index c26c4e3c..667ac4e1 100644 --- a/docs/TOTPWriteKeyRequest.md +++ b/docs/TotpCreateKeyRequest.md @@ -1,4 +1,4 @@ -# TOTPWriteKeyRequest +# TotpCreateKeyRequest ## Properties @@ -23,47 +23,47 @@ Name | Type | Description | Notes ## Methods -### NewTOTPWriteKeyRequest +### NewTotpCreateKeyRequest -`func NewTOTPWriteKeyRequest() *TOTPWriteKeyRequest` +`func NewTotpCreateKeyRequest() *TotpCreateKeyRequest` -NewTOTPWriteKeyRequest instantiates a new TOTPWriteKeyRequest object +NewTotpCreateKeyRequest instantiates a new TotpCreateKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTOTPWriteKeyRequestWithDefaults +### NewTotpCreateKeyRequestWithDefaults -`func NewTOTPWriteKeyRequestWithDefaults() *TOTPWriteKeyRequest` +`func NewTotpCreateKeyRequestWithDefaults() *TotpCreateKeyRequest` -NewTOTPWriteKeyRequestWithDefaults instantiates a new TOTPWriteKeyRequest object +NewTotpCreateKeyRequestWithDefaults instantiates a new TotpCreateKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAccountName -`func (o *TOTPWriteKeyRequest) GetAccountName() string` +`func (o *TotpCreateKeyRequest) GetAccountName() string` GetAccountName returns the AccountName field if non-nil, zero value otherwise. ### GetAccountNameOk -`func (o *TOTPWriteKeyRequest) GetAccountNameOk() (*string, bool)` +`func (o *TotpCreateKeyRequest) GetAccountNameOk() (*string, bool)` GetAccountNameOk returns a tuple with the AccountName field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAccountName -`func (o *TOTPWriteKeyRequest) SetAccountName(v string)` +`func (o *TotpCreateKeyRequest) SetAccountName(v string)` SetAccountName sets AccountName field to given value. ### HasAccountName -`func (o *TOTPWriteKeyRequest) HasAccountName() bool` +`func (o *TotpCreateKeyRequest) HasAccountName() bool` HasAccountName returns a boolean if a field has been set. @@ -72,27 +72,27 @@ HasAccountName returns a boolean if a field has been set. ### GetAlgorithm -`func (o *TOTPWriteKeyRequest) GetAlgorithm() string` +`func (o *TotpCreateKeyRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *TOTPWriteKeyRequest) GetAlgorithmOk() (*string, bool)` +`func (o *TotpCreateKeyRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *TOTPWriteKeyRequest) SetAlgorithm(v string)` +`func (o *TotpCreateKeyRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *TOTPWriteKeyRequest) HasAlgorithm() bool` +`func (o *TotpCreateKeyRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. @@ -101,27 +101,27 @@ HasAlgorithm returns a boolean if a field has been set. ### GetDigits -`func (o *TOTPWriteKeyRequest) GetDigits() int32` +`func (o *TotpCreateKeyRequest) GetDigits() int32` GetDigits returns the Digits field if non-nil, zero value otherwise. ### GetDigitsOk -`func (o *TOTPWriteKeyRequest) GetDigitsOk() (*int32, bool)` +`func (o *TotpCreateKeyRequest) GetDigitsOk() (*int32, bool)` GetDigitsOk returns a tuple with the Digits field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDigits -`func (o *TOTPWriteKeyRequest) SetDigits(v int32)` +`func (o *TotpCreateKeyRequest) SetDigits(v int32)` SetDigits sets Digits field to given value. ### HasDigits -`func (o *TOTPWriteKeyRequest) HasDigits() bool` +`func (o *TotpCreateKeyRequest) HasDigits() bool` HasDigits returns a boolean if a field has been set. @@ -130,27 +130,27 @@ HasDigits returns a boolean if a field has been set. ### GetExported -`func (o *TOTPWriteKeyRequest) GetExported() bool` +`func (o *TotpCreateKeyRequest) GetExported() bool` GetExported returns the Exported field if non-nil, zero value otherwise. ### GetExportedOk -`func (o *TOTPWriteKeyRequest) GetExportedOk() (*bool, bool)` +`func (o *TotpCreateKeyRequest) GetExportedOk() (*bool, bool)` GetExportedOk returns a tuple with the Exported field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExported -`func (o *TOTPWriteKeyRequest) SetExported(v bool)` +`func (o *TotpCreateKeyRequest) SetExported(v bool)` SetExported sets Exported field to given value. ### HasExported -`func (o *TOTPWriteKeyRequest) HasExported() bool` +`func (o *TotpCreateKeyRequest) HasExported() bool` HasExported returns a boolean if a field has been set. @@ -159,27 +159,27 @@ HasExported returns a boolean if a field has been set. ### GetGenerate -`func (o *TOTPWriteKeyRequest) GetGenerate() bool` +`func (o *TotpCreateKeyRequest) GetGenerate() bool` GetGenerate returns the Generate field if non-nil, zero value otherwise. ### GetGenerateOk -`func (o *TOTPWriteKeyRequest) GetGenerateOk() (*bool, bool)` +`func (o *TotpCreateKeyRequest) GetGenerateOk() (*bool, bool)` GetGenerateOk returns a tuple with the Generate field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetGenerate -`func (o *TOTPWriteKeyRequest) SetGenerate(v bool)` +`func (o *TotpCreateKeyRequest) SetGenerate(v bool)` SetGenerate sets Generate field to given value. ### HasGenerate -`func (o *TOTPWriteKeyRequest) HasGenerate() bool` +`func (o *TotpCreateKeyRequest) HasGenerate() bool` HasGenerate returns a boolean if a field has been set. @@ -188,27 +188,27 @@ HasGenerate returns a boolean if a field has been set. ### GetIssuer -`func (o *TOTPWriteKeyRequest) GetIssuer() string` +`func (o *TotpCreateKeyRequest) GetIssuer() string` GetIssuer returns the Issuer field if non-nil, zero value otherwise. ### GetIssuerOk -`func (o *TOTPWriteKeyRequest) GetIssuerOk() (*string, bool)` +`func (o *TotpCreateKeyRequest) GetIssuerOk() (*string, bool)` GetIssuerOk returns a tuple with the Issuer field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetIssuer -`func (o *TOTPWriteKeyRequest) SetIssuer(v string)` +`func (o *TotpCreateKeyRequest) SetIssuer(v string)` SetIssuer sets Issuer field to given value. ### HasIssuer -`func (o *TOTPWriteKeyRequest) HasIssuer() bool` +`func (o *TotpCreateKeyRequest) HasIssuer() bool` HasIssuer returns a boolean if a field has been set. @@ -217,27 +217,27 @@ HasIssuer returns a boolean if a field has been set. ### GetKey -`func (o *TOTPWriteKeyRequest) GetKey() string` +`func (o *TotpCreateKeyRequest) GetKey() string` GetKey returns the Key field if non-nil, zero value otherwise. ### GetKeyOk -`func (o *TOTPWriteKeyRequest) GetKeyOk() (*string, bool)` +`func (o *TotpCreateKeyRequest) GetKeyOk() (*string, bool)` GetKeyOk returns a tuple with the Key field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKey -`func (o *TOTPWriteKeyRequest) SetKey(v string)` +`func (o *TotpCreateKeyRequest) SetKey(v string)` SetKey sets Key field to given value. ### HasKey -`func (o *TOTPWriteKeyRequest) HasKey() bool` +`func (o *TotpCreateKeyRequest) HasKey() bool` HasKey returns a boolean if a field has been set. @@ -246,27 +246,27 @@ HasKey returns a boolean if a field has been set. ### GetKeySize -`func (o *TOTPWriteKeyRequest) GetKeySize() int32` +`func (o *TotpCreateKeyRequest) GetKeySize() int32` GetKeySize returns the KeySize field if non-nil, zero value otherwise. ### GetKeySizeOk -`func (o *TOTPWriteKeyRequest) GetKeySizeOk() (*int32, bool)` +`func (o *TotpCreateKeyRequest) GetKeySizeOk() (*int32, bool)` GetKeySizeOk returns a tuple with the KeySize field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeySize -`func (o *TOTPWriteKeyRequest) SetKeySize(v int32)` +`func (o *TotpCreateKeyRequest) SetKeySize(v int32)` SetKeySize sets KeySize field to given value. ### HasKeySize -`func (o *TOTPWriteKeyRequest) HasKeySize() bool` +`func (o *TotpCreateKeyRequest) HasKeySize() bool` HasKeySize returns a boolean if a field has been set. @@ -275,27 +275,27 @@ HasKeySize returns a boolean if a field has been set. ### GetPeriod -`func (o *TOTPWriteKeyRequest) GetPeriod() int32` +`func (o *TotpCreateKeyRequest) GetPeriod() int32` GetPeriod returns the Period field if non-nil, zero value otherwise. ### GetPeriodOk -`func (o *TOTPWriteKeyRequest) GetPeriodOk() (*int32, bool)` +`func (o *TotpCreateKeyRequest) GetPeriodOk() (*int32, bool)` GetPeriodOk returns a tuple with the Period field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPeriod -`func (o *TOTPWriteKeyRequest) SetPeriod(v int32)` +`func (o *TotpCreateKeyRequest) SetPeriod(v int32)` SetPeriod sets Period field to given value. ### HasPeriod -`func (o *TOTPWriteKeyRequest) HasPeriod() bool` +`func (o *TotpCreateKeyRequest) HasPeriod() bool` HasPeriod returns a boolean if a field has been set. @@ -304,27 +304,27 @@ HasPeriod returns a boolean if a field has been set. ### GetQrSize -`func (o *TOTPWriteKeyRequest) GetQrSize() int32` +`func (o *TotpCreateKeyRequest) GetQrSize() int32` GetQrSize returns the QrSize field if non-nil, zero value otherwise. ### GetQrSizeOk -`func (o *TOTPWriteKeyRequest) GetQrSizeOk() (*int32, bool)` +`func (o *TotpCreateKeyRequest) GetQrSizeOk() (*int32, bool)` GetQrSizeOk returns a tuple with the QrSize field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetQrSize -`func (o *TOTPWriteKeyRequest) SetQrSize(v int32)` +`func (o *TotpCreateKeyRequest) SetQrSize(v int32)` SetQrSize sets QrSize field to given value. ### HasQrSize -`func (o *TOTPWriteKeyRequest) HasQrSize() bool` +`func (o *TotpCreateKeyRequest) HasQrSize() bool` HasQrSize returns a boolean if a field has been set. @@ -333,27 +333,27 @@ HasQrSize returns a boolean if a field has been set. ### GetSkew -`func (o *TOTPWriteKeyRequest) GetSkew() int32` +`func (o *TotpCreateKeyRequest) GetSkew() int32` GetSkew returns the Skew field if non-nil, zero value otherwise. ### GetSkewOk -`func (o *TOTPWriteKeyRequest) GetSkewOk() (*int32, bool)` +`func (o *TotpCreateKeyRequest) GetSkewOk() (*int32, bool)` GetSkewOk returns a tuple with the Skew field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSkew -`func (o *TOTPWriteKeyRequest) SetSkew(v int32)` +`func (o *TotpCreateKeyRequest) SetSkew(v int32)` SetSkew sets Skew field to given value. ### HasSkew -`func (o *TOTPWriteKeyRequest) HasSkew() bool` +`func (o *TotpCreateKeyRequest) HasSkew() bool` HasSkew returns a boolean if a field has been set. @@ -362,27 +362,27 @@ HasSkew returns a boolean if a field has been set. ### GetUrl -`func (o *TOTPWriteKeyRequest) GetUrl() string` +`func (o *TotpCreateKeyRequest) GetUrl() string` GetUrl returns the Url field if non-nil, zero value otherwise. ### GetUrlOk -`func (o *TOTPWriteKeyRequest) GetUrlOk() (*string, bool)` +`func (o *TotpCreateKeyRequest) GetUrlOk() (*string, bool)` GetUrlOk returns a tuple with the Url field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrl -`func (o *TOTPWriteKeyRequest) SetUrl(v string)` +`func (o *TotpCreateKeyRequest) SetUrl(v string)` SetUrl sets Url field to given value. ### HasUrl -`func (o *TOTPWriteKeyRequest) HasUrl() bool` +`func (o *TotpCreateKeyRequest) HasUrl() bool` HasUrl returns a boolean if a field has been set. diff --git a/docs/TOTPWriteCodeRequest.md b/docs/TotpValidateCodeRequest.md similarity index 63% rename from docs/TOTPWriteCodeRequest.md rename to docs/TotpValidateCodeRequest.md index 3bdbe4e4..d0fea027 100644 --- a/docs/TOTPWriteCodeRequest.md +++ b/docs/TotpValidateCodeRequest.md @@ -1,4 +1,4 @@ -# TOTPWriteCodeRequest +# TotpValidateCodeRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewTOTPWriteCodeRequest +### NewTotpValidateCodeRequest -`func NewTOTPWriteCodeRequest() *TOTPWriteCodeRequest` +`func NewTotpValidateCodeRequest() *TotpValidateCodeRequest` -NewTOTPWriteCodeRequest instantiates a new TOTPWriteCodeRequest object +NewTotpValidateCodeRequest instantiates a new TotpValidateCodeRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTOTPWriteCodeRequestWithDefaults +### NewTotpValidateCodeRequestWithDefaults -`func NewTOTPWriteCodeRequestWithDefaults() *TOTPWriteCodeRequest` +`func NewTotpValidateCodeRequestWithDefaults() *TotpValidateCodeRequest` -NewTOTPWriteCodeRequestWithDefaults instantiates a new TOTPWriteCodeRequest object +NewTotpValidateCodeRequestWithDefaults instantiates a new TotpValidateCodeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetCode -`func (o *TOTPWriteCodeRequest) GetCode() string` +`func (o *TotpValidateCodeRequest) GetCode() string` GetCode returns the Code field if non-nil, zero value otherwise. ### GetCodeOk -`func (o *TOTPWriteCodeRequest) GetCodeOk() (*string, bool)` +`func (o *TotpValidateCodeRequest) GetCodeOk() (*string, bool)` GetCodeOk returns a tuple with the Code field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetCode -`func (o *TOTPWriteCodeRequest) SetCode(v string)` +`func (o *TotpValidateCodeRequest) SetCode(v string)` SetCode sets Code field to given value. ### HasCode -`func (o *TOTPWriteCodeRequest) HasCode() bool` +`func (o *TotpValidateCodeRequest) HasCode() bool` HasCode returns a boolean if a field has been set. diff --git a/docs/TransitWriteCacheConfigRequest.md b/docs/TransitConfigureCacheRequest.md similarity index 61% rename from docs/TransitWriteCacheConfigRequest.md rename to docs/TransitConfigureCacheRequest.md index 96a2644f..9e2cceff 100644 --- a/docs/TransitWriteCacheConfigRequest.md +++ b/docs/TransitConfigureCacheRequest.md @@ -1,4 +1,4 @@ -# TransitWriteCacheConfigRequest +# TransitConfigureCacheRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewTransitWriteCacheConfigRequest +### NewTransitConfigureCacheRequest -`func NewTransitWriteCacheConfigRequest() *TransitWriteCacheConfigRequest` +`func NewTransitConfigureCacheRequest() *TransitConfigureCacheRequest` -NewTransitWriteCacheConfigRequest instantiates a new TransitWriteCacheConfigRequest object +NewTransitConfigureCacheRequest instantiates a new TransitConfigureCacheRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitWriteCacheConfigRequestWithDefaults +### NewTransitConfigureCacheRequestWithDefaults -`func NewTransitWriteCacheConfigRequestWithDefaults() *TransitWriteCacheConfigRequest` +`func NewTransitConfigureCacheRequestWithDefaults() *TransitConfigureCacheRequest` -NewTransitWriteCacheConfigRequestWithDefaults instantiates a new TransitWriteCacheConfigRequest object +NewTransitConfigureCacheRequestWithDefaults instantiates a new TransitConfigureCacheRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetSize -`func (o *TransitWriteCacheConfigRequest) GetSize() int32` +`func (o *TransitConfigureCacheRequest) GetSize() int32` GetSize returns the Size field if non-nil, zero value otherwise. ### GetSizeOk -`func (o *TransitWriteCacheConfigRequest) GetSizeOk() (*int32, bool)` +`func (o *TransitConfigureCacheRequest) GetSizeOk() (*int32, bool)` GetSizeOk returns a tuple with the Size field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSize -`func (o *TransitWriteCacheConfigRequest) SetSize(v int32)` +`func (o *TransitConfigureCacheRequest) SetSize(v int32)` SetSize sets Size field to given value. ### HasSize -`func (o *TransitWriteCacheConfigRequest) HasSize() bool` +`func (o *TransitConfigureCacheRequest) HasSize() bool` HasSize returns a boolean if a field has been set. diff --git a/docs/TransitWriteKeyConfigRequest.md b/docs/TransitConfigureKeyRequest.md similarity index 68% rename from docs/TransitWriteKeyConfigRequest.md rename to docs/TransitConfigureKeyRequest.md index e362220c..d1f013d9 100644 --- a/docs/TransitWriteKeyConfigRequest.md +++ b/docs/TransitConfigureKeyRequest.md @@ -1,4 +1,4 @@ -# TransitWriteKeyConfigRequest +# TransitConfigureKeyRequest ## Properties @@ -17,47 +17,47 @@ Name | Type | Description | Notes ## Methods -### NewTransitWriteKeyConfigRequest +### NewTransitConfigureKeyRequest -`func NewTransitWriteKeyConfigRequest() *TransitWriteKeyConfigRequest` +`func NewTransitConfigureKeyRequest() *TransitConfigureKeyRequest` -NewTransitWriteKeyConfigRequest instantiates a new TransitWriteKeyConfigRequest object +NewTransitConfigureKeyRequest instantiates a new TransitConfigureKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitWriteKeyConfigRequestWithDefaults +### NewTransitConfigureKeyRequestWithDefaults -`func NewTransitWriteKeyConfigRequestWithDefaults() *TransitWriteKeyConfigRequest` +`func NewTransitConfigureKeyRequestWithDefaults() *TransitConfigureKeyRequest` -NewTransitWriteKeyConfigRequestWithDefaults instantiates a new TransitWriteKeyConfigRequest object +NewTransitConfigureKeyRequestWithDefaults instantiates a new TransitConfigureKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowPlaintextBackup -`func (o *TransitWriteKeyConfigRequest) GetAllowPlaintextBackup() bool` +`func (o *TransitConfigureKeyRequest) GetAllowPlaintextBackup() bool` GetAllowPlaintextBackup returns the AllowPlaintextBackup field if non-nil, zero value otherwise. ### GetAllowPlaintextBackupOk -`func (o *TransitWriteKeyConfigRequest) GetAllowPlaintextBackupOk() (*bool, bool)` +`func (o *TransitConfigureKeyRequest) GetAllowPlaintextBackupOk() (*bool, bool)` GetAllowPlaintextBackupOk returns a tuple with the AllowPlaintextBackup field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowPlaintextBackup -`func (o *TransitWriteKeyConfigRequest) SetAllowPlaintextBackup(v bool)` +`func (o *TransitConfigureKeyRequest) SetAllowPlaintextBackup(v bool)` SetAllowPlaintextBackup sets AllowPlaintextBackup field to given value. ### HasAllowPlaintextBackup -`func (o *TransitWriteKeyConfigRequest) HasAllowPlaintextBackup() bool` +`func (o *TransitConfigureKeyRequest) HasAllowPlaintextBackup() bool` HasAllowPlaintextBackup returns a boolean if a field has been set. @@ -66,27 +66,27 @@ HasAllowPlaintextBackup returns a boolean if a field has been set. ### GetAutoRotatePeriod -`func (o *TransitWriteKeyConfigRequest) GetAutoRotatePeriod() int32` +`func (o *TransitConfigureKeyRequest) GetAutoRotatePeriod() int32` GetAutoRotatePeriod returns the AutoRotatePeriod field if non-nil, zero value otherwise. ### GetAutoRotatePeriodOk -`func (o *TransitWriteKeyConfigRequest) GetAutoRotatePeriodOk() (*int32, bool)` +`func (o *TransitConfigureKeyRequest) GetAutoRotatePeriodOk() (*int32, bool)` GetAutoRotatePeriodOk returns a tuple with the AutoRotatePeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAutoRotatePeriod -`func (o *TransitWriteKeyConfigRequest) SetAutoRotatePeriod(v int32)` +`func (o *TransitConfigureKeyRequest) SetAutoRotatePeriod(v int32)` SetAutoRotatePeriod sets AutoRotatePeriod field to given value. ### HasAutoRotatePeriod -`func (o *TransitWriteKeyConfigRequest) HasAutoRotatePeriod() bool` +`func (o *TransitConfigureKeyRequest) HasAutoRotatePeriod() bool` HasAutoRotatePeriod returns a boolean if a field has been set. @@ -95,27 +95,27 @@ HasAutoRotatePeriod returns a boolean if a field has been set. ### GetDeletionAllowed -`func (o *TransitWriteKeyConfigRequest) GetDeletionAllowed() bool` +`func (o *TransitConfigureKeyRequest) GetDeletionAllowed() bool` GetDeletionAllowed returns the DeletionAllowed field if non-nil, zero value otherwise. ### GetDeletionAllowedOk -`func (o *TransitWriteKeyConfigRequest) GetDeletionAllowedOk() (*bool, bool)` +`func (o *TransitConfigureKeyRequest) GetDeletionAllowedOk() (*bool, bool)` GetDeletionAllowedOk returns a tuple with the DeletionAllowed field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDeletionAllowed -`func (o *TransitWriteKeyConfigRequest) SetDeletionAllowed(v bool)` +`func (o *TransitConfigureKeyRequest) SetDeletionAllowed(v bool)` SetDeletionAllowed sets DeletionAllowed field to given value. ### HasDeletionAllowed -`func (o *TransitWriteKeyConfigRequest) HasDeletionAllowed() bool` +`func (o *TransitConfigureKeyRequest) HasDeletionAllowed() bool` HasDeletionAllowed returns a boolean if a field has been set. @@ -124,27 +124,27 @@ HasDeletionAllowed returns a boolean if a field has been set. ### GetExportable -`func (o *TransitWriteKeyConfigRequest) GetExportable() bool` +`func (o *TransitConfigureKeyRequest) GetExportable() bool` GetExportable returns the Exportable field if non-nil, zero value otherwise. ### GetExportableOk -`func (o *TransitWriteKeyConfigRequest) GetExportableOk() (*bool, bool)` +`func (o *TransitConfigureKeyRequest) GetExportableOk() (*bool, bool)` GetExportableOk returns a tuple with the Exportable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExportable -`func (o *TransitWriteKeyConfigRequest) SetExportable(v bool)` +`func (o *TransitConfigureKeyRequest) SetExportable(v bool)` SetExportable sets Exportable field to given value. ### HasExportable -`func (o *TransitWriteKeyConfigRequest) HasExportable() bool` +`func (o *TransitConfigureKeyRequest) HasExportable() bool` HasExportable returns a boolean if a field has been set. @@ -153,27 +153,27 @@ HasExportable returns a boolean if a field has been set. ### GetMinDecryptionVersion -`func (o *TransitWriteKeyConfigRequest) GetMinDecryptionVersion() int32` +`func (o *TransitConfigureKeyRequest) GetMinDecryptionVersion() int32` GetMinDecryptionVersion returns the MinDecryptionVersion field if non-nil, zero value otherwise. ### GetMinDecryptionVersionOk -`func (o *TransitWriteKeyConfigRequest) GetMinDecryptionVersionOk() (*int32, bool)` +`func (o *TransitConfigureKeyRequest) GetMinDecryptionVersionOk() (*int32, bool)` GetMinDecryptionVersionOk returns a tuple with the MinDecryptionVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMinDecryptionVersion -`func (o *TransitWriteKeyConfigRequest) SetMinDecryptionVersion(v int32)` +`func (o *TransitConfigureKeyRequest) SetMinDecryptionVersion(v int32)` SetMinDecryptionVersion sets MinDecryptionVersion field to given value. ### HasMinDecryptionVersion -`func (o *TransitWriteKeyConfigRequest) HasMinDecryptionVersion() bool` +`func (o *TransitConfigureKeyRequest) HasMinDecryptionVersion() bool` HasMinDecryptionVersion returns a boolean if a field has been set. @@ -182,27 +182,27 @@ HasMinDecryptionVersion returns a boolean if a field has been set. ### GetMinEncryptionVersion -`func (o *TransitWriteKeyConfigRequest) GetMinEncryptionVersion() int32` +`func (o *TransitConfigureKeyRequest) GetMinEncryptionVersion() int32` GetMinEncryptionVersion returns the MinEncryptionVersion field if non-nil, zero value otherwise. ### GetMinEncryptionVersionOk -`func (o *TransitWriteKeyConfigRequest) GetMinEncryptionVersionOk() (*int32, bool)` +`func (o *TransitConfigureKeyRequest) GetMinEncryptionVersionOk() (*int32, bool)` GetMinEncryptionVersionOk returns a tuple with the MinEncryptionVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMinEncryptionVersion -`func (o *TransitWriteKeyConfigRequest) SetMinEncryptionVersion(v int32)` +`func (o *TransitConfigureKeyRequest) SetMinEncryptionVersion(v int32)` SetMinEncryptionVersion sets MinEncryptionVersion field to given value. ### HasMinEncryptionVersion -`func (o *TransitWriteKeyConfigRequest) HasMinEncryptionVersion() bool` +`func (o *TransitConfigureKeyRequest) HasMinEncryptionVersion() bool` HasMinEncryptionVersion returns a boolean if a field has been set. diff --git a/docs/TransitWriteConfigKeysRequest.md b/docs/TransitConfigureKeysRequest.md similarity index 62% rename from docs/TransitWriteConfigKeysRequest.md rename to docs/TransitConfigureKeysRequest.md index 6aea3f03..40cf1244 100644 --- a/docs/TransitWriteConfigKeysRequest.md +++ b/docs/TransitConfigureKeysRequest.md @@ -1,4 +1,4 @@ -# TransitWriteConfigKeysRequest +# TransitConfigureKeysRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewTransitWriteConfigKeysRequest +### NewTransitConfigureKeysRequest -`func NewTransitWriteConfigKeysRequest() *TransitWriteConfigKeysRequest` +`func NewTransitConfigureKeysRequest() *TransitConfigureKeysRequest` -NewTransitWriteConfigKeysRequest instantiates a new TransitWriteConfigKeysRequest object +NewTransitConfigureKeysRequest instantiates a new TransitConfigureKeysRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitWriteConfigKeysRequestWithDefaults +### NewTransitConfigureKeysRequestWithDefaults -`func NewTransitWriteConfigKeysRequestWithDefaults() *TransitWriteConfigKeysRequest` +`func NewTransitConfigureKeysRequestWithDefaults() *TransitConfigureKeysRequest` -NewTransitWriteConfigKeysRequestWithDefaults instantiates a new TransitWriteConfigKeysRequest object +NewTransitConfigureKeysRequestWithDefaults instantiates a new TransitConfigureKeysRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetDisableUpsert -`func (o *TransitWriteConfigKeysRequest) GetDisableUpsert() bool` +`func (o *TransitConfigureKeysRequest) GetDisableUpsert() bool` GetDisableUpsert returns the DisableUpsert field if non-nil, zero value otherwise. ### GetDisableUpsertOk -`func (o *TransitWriteConfigKeysRequest) GetDisableUpsertOk() (*bool, bool)` +`func (o *TransitConfigureKeysRequest) GetDisableUpsertOk() (*bool, bool)` GetDisableUpsertOk returns a tuple with the DisableUpsert field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDisableUpsert -`func (o *TransitWriteConfigKeysRequest) SetDisableUpsert(v bool)` +`func (o *TransitConfigureKeysRequest) SetDisableUpsert(v bool)` SetDisableUpsert sets DisableUpsert field to given value. ### HasDisableUpsert -`func (o *TransitWriteConfigKeysRequest) HasDisableUpsert() bool` +`func (o *TransitConfigureKeysRequest) HasDisableUpsert() bool` HasDisableUpsert returns a boolean if a field has been set. diff --git a/docs/TransitWriteKeyRequest.md b/docs/TransitCreateKeyRequest.md similarity index 61% rename from docs/TransitWriteKeyRequest.md rename to docs/TransitCreateKeyRequest.md index f779e88f..c8441986 100644 --- a/docs/TransitWriteKeyRequest.md +++ b/docs/TransitCreateKeyRequest.md @@ -1,4 +1,4 @@ -# TransitWriteKeyRequest +# TransitCreateKeyRequest ## Properties @@ -12,6 +12,8 @@ Name | Type | Description | Notes **Derived** | Pointer to **bool** | Enables key derivation mode. This allows for per-transaction unique keys for encryption operations. | [optional] **Exportable** | Pointer to **bool** | Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. | [optional] **KeySize** | Pointer to **int32** | The key size in bytes for the algorithm. Only applies to HMAC and must be no fewer than 32 bytes and no more than 512 | [optional] [default to 0] +**ManagedKeyId** | Pointer to **string** | The UUID of the managed key to use for this transit key | [optional] +**ManagedKeyName** | Pointer to **string** | The name of the managed key to use for this transit key | [optional] **Type** | Pointer to **string** | The type of key to create. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\". | [optional] [default to "aes256-gcm96"] @@ -19,47 +21,47 @@ Name | Type | Description | Notes ## Methods -### NewTransitWriteKeyRequest +### NewTransitCreateKeyRequest -`func NewTransitWriteKeyRequest() *TransitWriteKeyRequest` +`func NewTransitCreateKeyRequest() *TransitCreateKeyRequest` -NewTransitWriteKeyRequest instantiates a new TransitWriteKeyRequest object +NewTransitCreateKeyRequest instantiates a new TransitCreateKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitWriteKeyRequestWithDefaults +### NewTransitCreateKeyRequestWithDefaults -`func NewTransitWriteKeyRequestWithDefaults() *TransitWriteKeyRequest` +`func NewTransitCreateKeyRequestWithDefaults() *TransitCreateKeyRequest` -NewTransitWriteKeyRequestWithDefaults instantiates a new TransitWriteKeyRequest object +NewTransitCreateKeyRequestWithDefaults instantiates a new TransitCreateKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAllowPlaintextBackup -`func (o *TransitWriteKeyRequest) GetAllowPlaintextBackup() bool` +`func (o *TransitCreateKeyRequest) GetAllowPlaintextBackup() bool` GetAllowPlaintextBackup returns the AllowPlaintextBackup field if non-nil, zero value otherwise. ### GetAllowPlaintextBackupOk -`func (o *TransitWriteKeyRequest) GetAllowPlaintextBackupOk() (*bool, bool)` +`func (o *TransitCreateKeyRequest) GetAllowPlaintextBackupOk() (*bool, bool)` GetAllowPlaintextBackupOk returns a tuple with the AllowPlaintextBackup field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAllowPlaintextBackup -`func (o *TransitWriteKeyRequest) SetAllowPlaintextBackup(v bool)` +`func (o *TransitCreateKeyRequest) SetAllowPlaintextBackup(v bool)` SetAllowPlaintextBackup sets AllowPlaintextBackup field to given value. ### HasAllowPlaintextBackup -`func (o *TransitWriteKeyRequest) HasAllowPlaintextBackup() bool` +`func (o *TransitCreateKeyRequest) HasAllowPlaintextBackup() bool` HasAllowPlaintextBackup returns a boolean if a field has been set. @@ -68,27 +70,27 @@ HasAllowPlaintextBackup returns a boolean if a field has been set. ### GetAutoRotatePeriod -`func (o *TransitWriteKeyRequest) GetAutoRotatePeriod() int32` +`func (o *TransitCreateKeyRequest) GetAutoRotatePeriod() int32` GetAutoRotatePeriod returns the AutoRotatePeriod field if non-nil, zero value otherwise. ### GetAutoRotatePeriodOk -`func (o *TransitWriteKeyRequest) GetAutoRotatePeriodOk() (*int32, bool)` +`func (o *TransitCreateKeyRequest) GetAutoRotatePeriodOk() (*int32, bool)` GetAutoRotatePeriodOk returns a tuple with the AutoRotatePeriod field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAutoRotatePeriod -`func (o *TransitWriteKeyRequest) SetAutoRotatePeriod(v int32)` +`func (o *TransitCreateKeyRequest) SetAutoRotatePeriod(v int32)` SetAutoRotatePeriod sets AutoRotatePeriod field to given value. ### HasAutoRotatePeriod -`func (o *TransitWriteKeyRequest) HasAutoRotatePeriod() bool` +`func (o *TransitCreateKeyRequest) HasAutoRotatePeriod() bool` HasAutoRotatePeriod returns a boolean if a field has been set. @@ -97,27 +99,27 @@ HasAutoRotatePeriod returns a boolean if a field has been set. ### GetContext -`func (o *TransitWriteKeyRequest) GetContext() string` +`func (o *TransitCreateKeyRequest) GetContext() string` GetContext returns the Context field if non-nil, zero value otherwise. ### GetContextOk -`func (o *TransitWriteKeyRequest) GetContextOk() (*string, bool)` +`func (o *TransitCreateKeyRequest) GetContextOk() (*string, bool)` GetContextOk returns a tuple with the Context field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetContext -`func (o *TransitWriteKeyRequest) SetContext(v string)` +`func (o *TransitCreateKeyRequest) SetContext(v string)` SetContext sets Context field to given value. ### HasContext -`func (o *TransitWriteKeyRequest) HasContext() bool` +`func (o *TransitCreateKeyRequest) HasContext() bool` HasContext returns a boolean if a field has been set. @@ -126,27 +128,27 @@ HasContext returns a boolean if a field has been set. ### GetConvergentEncryption -`func (o *TransitWriteKeyRequest) GetConvergentEncryption() bool` +`func (o *TransitCreateKeyRequest) GetConvergentEncryption() bool` GetConvergentEncryption returns the ConvergentEncryption field if non-nil, zero value otherwise. ### GetConvergentEncryptionOk -`func (o *TransitWriteKeyRequest) GetConvergentEncryptionOk() (*bool, bool)` +`func (o *TransitCreateKeyRequest) GetConvergentEncryptionOk() (*bool, bool)` GetConvergentEncryptionOk returns a tuple with the ConvergentEncryption field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetConvergentEncryption -`func (o *TransitWriteKeyRequest) SetConvergentEncryption(v bool)` +`func (o *TransitCreateKeyRequest) SetConvergentEncryption(v bool)` SetConvergentEncryption sets ConvergentEncryption field to given value. ### HasConvergentEncryption -`func (o *TransitWriteKeyRequest) HasConvergentEncryption() bool` +`func (o *TransitCreateKeyRequest) HasConvergentEncryption() bool` HasConvergentEncryption returns a boolean if a field has been set. @@ -155,27 +157,27 @@ HasConvergentEncryption returns a boolean if a field has been set. ### GetDerived -`func (o *TransitWriteKeyRequest) GetDerived() bool` +`func (o *TransitCreateKeyRequest) GetDerived() bool` GetDerived returns the Derived field if non-nil, zero value otherwise. ### GetDerivedOk -`func (o *TransitWriteKeyRequest) GetDerivedOk() (*bool, bool)` +`func (o *TransitCreateKeyRequest) GetDerivedOk() (*bool, bool)` GetDerivedOk returns a tuple with the Derived field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetDerived -`func (o *TransitWriteKeyRequest) SetDerived(v bool)` +`func (o *TransitCreateKeyRequest) SetDerived(v bool)` SetDerived sets Derived field to given value. ### HasDerived -`func (o *TransitWriteKeyRequest) HasDerived() bool` +`func (o *TransitCreateKeyRequest) HasDerived() bool` HasDerived returns a boolean if a field has been set. @@ -184,27 +186,27 @@ HasDerived returns a boolean if a field has been set. ### GetExportable -`func (o *TransitWriteKeyRequest) GetExportable() bool` +`func (o *TransitCreateKeyRequest) GetExportable() bool` GetExportable returns the Exportable field if non-nil, zero value otherwise. ### GetExportableOk -`func (o *TransitWriteKeyRequest) GetExportableOk() (*bool, bool)` +`func (o *TransitCreateKeyRequest) GetExportableOk() (*bool, bool)` GetExportableOk returns a tuple with the Exportable field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetExportable -`func (o *TransitWriteKeyRequest) SetExportable(v bool)` +`func (o *TransitCreateKeyRequest) SetExportable(v bool)` SetExportable sets Exportable field to given value. ### HasExportable -`func (o *TransitWriteKeyRequest) HasExportable() bool` +`func (o *TransitCreateKeyRequest) HasExportable() bool` HasExportable returns a boolean if a field has been set. @@ -213,56 +215,114 @@ HasExportable returns a boolean if a field has been set. ### GetKeySize -`func (o *TransitWriteKeyRequest) GetKeySize() int32` +`func (o *TransitCreateKeyRequest) GetKeySize() int32` GetKeySize returns the KeySize field if non-nil, zero value otherwise. ### GetKeySizeOk -`func (o *TransitWriteKeyRequest) GetKeySizeOk() (*int32, bool)` +`func (o *TransitCreateKeyRequest) GetKeySizeOk() (*int32, bool)` GetKeySizeOk returns a tuple with the KeySize field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeySize -`func (o *TransitWriteKeyRequest) SetKeySize(v int32)` +`func (o *TransitCreateKeyRequest) SetKeySize(v int32)` SetKeySize sets KeySize field to given value. ### HasKeySize -`func (o *TransitWriteKeyRequest) HasKeySize() bool` +`func (o *TransitCreateKeyRequest) HasKeySize() bool` HasKeySize returns a boolean if a field has been set. +### GetManagedKeyId + +`func (o *TransitCreateKeyRequest) GetManagedKeyId() string` + +GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. + +### GetManagedKeyIdOk + +`func (o *TransitCreateKeyRequest) GetManagedKeyIdOk() (*string, bool)` + +GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyId + +`func (o *TransitCreateKeyRequest) SetManagedKeyId(v string)` + +SetManagedKeyId sets ManagedKeyId field to given value. + + +### HasManagedKeyId + +`func (o *TransitCreateKeyRequest) HasManagedKeyId() bool` + +HasManagedKeyId returns a boolean if a field has been set. + + + + +### GetManagedKeyName + +`func (o *TransitCreateKeyRequest) GetManagedKeyName() string` + +GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. + +### GetManagedKeyNameOk + +`func (o *TransitCreateKeyRequest) GetManagedKeyNameOk() (*string, bool)` + +GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyName + +`func (o *TransitCreateKeyRequest) SetManagedKeyName(v string)` + +SetManagedKeyName sets ManagedKeyName field to given value. + + +### HasManagedKeyName + +`func (o *TransitCreateKeyRequest) HasManagedKeyName() bool` + +HasManagedKeyName returns a boolean if a field has been set. + + + + ### GetType -`func (o *TransitWriteKeyRequest) GetType() string` +`func (o *TransitCreateKeyRequest) GetType() string` GetType returns the Type field if non-nil, zero value otherwise. ### GetTypeOk -`func (o *TransitWriteKeyRequest) GetTypeOk() (*string, bool)` +`func (o *TransitCreateKeyRequest) GetTypeOk() (*string, bool)` GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetType -`func (o *TransitWriteKeyRequest) SetType(v string)` +`func (o *TransitCreateKeyRequest) SetType(v string)` SetType sets Type field to given value. ### HasType -`func (o *TransitWriteKeyRequest) HasType() bool` +`func (o *TransitCreateKeyRequest) HasType() bool` HasType returns a boolean if a field has been set. diff --git a/docs/TransitDecryptRequest.md b/docs/TransitDecryptRequest.md index 8d6b8af0..36446495 100644 --- a/docs/TransitDecryptRequest.md +++ b/docs/TransitDecryptRequest.md @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **AssociatedData** | Pointer to **string** | When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with. | [optional] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items to be decrypted in a single batch. When this parameter is set, if the parameters 'ciphertext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input. | [optional] **Ciphertext** | Pointer to **string** | The ciphertext to decrypt, provided as returned by encrypt. | [optional] **Context** | Pointer to **string** | Base64 encoded context for key derivation. Required if key derivation is enabled. | [optional] **Nonce** | Pointer to **string** | Base64 encoded nonce value used during encryption. Must be provided if convergent encryption is enabled for this key and the key was generated with Vault 0.6.1. Not required for keys created in 0.6.2+. | [optional] @@ -63,6 +64,35 @@ HasAssociatedData returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitDecryptRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitDecryptRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitDecryptRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitDecryptRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetCiphertext `func (o *TransitDecryptRequest) GetCiphertext() string` diff --git a/docs/TransitEncryptRequest.md b/docs/TransitEncryptRequest.md index 48a73206..2acc1294 100644 --- a/docs/TransitEncryptRequest.md +++ b/docs/TransitEncryptRequest.md @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **AssociatedData** | Pointer to **string** | When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with. | [optional] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items to be encrypted in a single batch. When this parameter is set, if the parameters 'plaintext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input. | [optional] **Context** | Pointer to **string** | Base64 encoded context for key derivation. Required if key derivation is enabled | [optional] **ConvergentEncryption** | Pointer to **bool** | This parameter will only be used when a key is expected to be created. Whether to support convergent encryption. This is only supported when using a key with key derivation enabled and will require all requests to carry both a context and 96-bit (12-byte) nonce. The given nonce will be used in place of a randomly generated nonce. As a result, when the same context and nonce are supplied, the same ciphertext is generated. It is *very important* when using this mode that you ensure that all nonces are unique for a given context. Failing to do so will severely impact the ciphertext's security. | [optional] **KeyVersion** | Pointer to **int32** | The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. | [optional] @@ -66,6 +67,35 @@ HasAssociatedData returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitEncryptRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitEncryptRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitEncryptRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitEncryptRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetContext `func (o *TransitEncryptRequest) GetContext() string` diff --git a/docs/TransitGenerateHMACRequest.md b/docs/TransitGenerateHMACRequest.md index 99b3e405..8fc162e5 100644 --- a/docs/TransitGenerateHMACRequest.md +++ b/docs/TransitGenerateHMACRequest.md @@ -1,4 +1,4 @@ -# TransitGenerateHMACRequest +# TransitGenerateHmacRequest ## Properties @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Algorithm** | Pointer to **string** | Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". | [optional] [default to "sha2-256"] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items to be processed in a single batch. When this parameter is set, if the parameter 'input' is also set, it will be ignored. Any batch output will preserve the order of the batch input. | [optional] **Input** | Pointer to **string** | The base64-encoded input data | [optional] **KeyVersion** | Pointer to **int32** | The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. | [optional] **Urlalgorithm** | Pointer to **string** | Algorithm to use (POST URL parameter) | [optional] @@ -15,76 +16,105 @@ Name | Type | Description | Notes ## Methods -### NewTransitGenerateHMACRequest +### NewTransitGenerateHmacRequest -`func NewTransitGenerateHMACRequest() *TransitGenerateHMACRequest` +`func NewTransitGenerateHmacRequest() *TransitGenerateHmacRequest` -NewTransitGenerateHMACRequest instantiates a new TransitGenerateHMACRequest object +NewTransitGenerateHmacRequest instantiates a new TransitGenerateHmacRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitGenerateHMACRequestWithDefaults +### NewTransitGenerateHmacRequestWithDefaults -`func NewTransitGenerateHMACRequestWithDefaults() *TransitGenerateHMACRequest` +`func NewTransitGenerateHmacRequestWithDefaults() *TransitGenerateHmacRequest` -NewTransitGenerateHMACRequestWithDefaults instantiates a new TransitGenerateHMACRequest object +NewTransitGenerateHmacRequestWithDefaults instantiates a new TransitGenerateHmacRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAlgorithm -`func (o *TransitGenerateHMACRequest) GetAlgorithm() string` +`func (o *TransitGenerateHmacRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *TransitGenerateHMACRequest) GetAlgorithmOk() (*string, bool)` +`func (o *TransitGenerateHmacRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *TransitGenerateHMACRequest) SetAlgorithm(v string)` +`func (o *TransitGenerateHmacRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *TransitGenerateHMACRequest) HasAlgorithm() bool` +`func (o *TransitGenerateHmacRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitGenerateHmacRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitGenerateHmacRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitGenerateHmacRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitGenerateHmacRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetInput -`func (o *TransitGenerateHMACRequest) GetInput() string` +`func (o *TransitGenerateHmacRequest) GetInput() string` GetInput returns the Input field if non-nil, zero value otherwise. ### GetInputOk -`func (o *TransitGenerateHMACRequest) GetInputOk() (*string, bool)` +`func (o *TransitGenerateHmacRequest) GetInputOk() (*string, bool)` GetInputOk returns a tuple with the Input field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInput -`func (o *TransitGenerateHMACRequest) SetInput(v string)` +`func (o *TransitGenerateHmacRequest) SetInput(v string)` SetInput sets Input field to given value. ### HasInput -`func (o *TransitGenerateHMACRequest) HasInput() bool` +`func (o *TransitGenerateHmacRequest) HasInput() bool` HasInput returns a boolean if a field has been set. @@ -93,27 +123,27 @@ HasInput returns a boolean if a field has been set. ### GetKeyVersion -`func (o *TransitGenerateHMACRequest) GetKeyVersion() int32` +`func (o *TransitGenerateHmacRequest) GetKeyVersion() int32` GetKeyVersion returns the KeyVersion field if non-nil, zero value otherwise. ### GetKeyVersionOk -`func (o *TransitGenerateHMACRequest) GetKeyVersionOk() (*int32, bool)` +`func (o *TransitGenerateHmacRequest) GetKeyVersionOk() (*int32, bool)` GetKeyVersionOk returns a tuple with the KeyVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyVersion -`func (o *TransitGenerateHMACRequest) SetKeyVersion(v int32)` +`func (o *TransitGenerateHmacRequest) SetKeyVersion(v int32)` SetKeyVersion sets KeyVersion field to given value. ### HasKeyVersion -`func (o *TransitGenerateHMACRequest) HasKeyVersion() bool` +`func (o *TransitGenerateHmacRequest) HasKeyVersion() bool` HasKeyVersion returns a boolean if a field has been set. @@ -122,27 +152,27 @@ HasKeyVersion returns a boolean if a field has been set. ### GetUrlalgorithm -`func (o *TransitGenerateHMACRequest) GetUrlalgorithm() string` +`func (o *TransitGenerateHmacRequest) GetUrlalgorithm() string` GetUrlalgorithm returns the Urlalgorithm field if non-nil, zero value otherwise. ### GetUrlalgorithmOk -`func (o *TransitGenerateHMACRequest) GetUrlalgorithmOk() (*string, bool)` +`func (o *TransitGenerateHmacRequest) GetUrlalgorithmOk() (*string, bool)` GetUrlalgorithmOk returns a tuple with the Urlalgorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlalgorithm -`func (o *TransitGenerateHMACRequest) SetUrlalgorithm(v string)` +`func (o *TransitGenerateHmacRequest) SetUrlalgorithm(v string)` SetUrlalgorithm sets Urlalgorithm field to given value. ### HasUrlalgorithm -`func (o *TransitGenerateHMACRequest) HasUrlalgorithm() bool` +`func (o *TransitGenerateHmacRequest) HasUrlalgorithm() bool` HasUrlalgorithm returns a boolean if a field has been set. diff --git a/docs/TransitGenerateHMACWithAlgorithmRequest.md b/docs/TransitGenerateHMACWithAlgorithmRequest.md index 554ec862..93dad2e6 100644 --- a/docs/TransitGenerateHMACWithAlgorithmRequest.md +++ b/docs/TransitGenerateHMACWithAlgorithmRequest.md @@ -1,4 +1,4 @@ -# TransitGenerateHMACWithAlgorithmRequest +# TransitGenerateHmacWithAlgorithmRequest ## Properties @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Algorithm** | Pointer to **string** | Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". | [optional] [default to "sha2-256"] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items to be processed in a single batch. When this parameter is set, if the parameter 'input' is also set, it will be ignored. Any batch output will preserve the order of the batch input. | [optional] **Input** | Pointer to **string** | The base64-encoded input data | [optional] **KeyVersion** | Pointer to **int32** | The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. | [optional] @@ -14,76 +15,105 @@ Name | Type | Description | Notes ## Methods -### NewTransitGenerateHMACWithAlgorithmRequest +### NewTransitGenerateHmacWithAlgorithmRequest -`func NewTransitGenerateHMACWithAlgorithmRequest() *TransitGenerateHMACWithAlgorithmRequest` +`func NewTransitGenerateHmacWithAlgorithmRequest() *TransitGenerateHmacWithAlgorithmRequest` -NewTransitGenerateHMACWithAlgorithmRequest instantiates a new TransitGenerateHMACWithAlgorithmRequest object +NewTransitGenerateHmacWithAlgorithmRequest instantiates a new TransitGenerateHmacWithAlgorithmRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitGenerateHMACWithAlgorithmRequestWithDefaults +### NewTransitGenerateHmacWithAlgorithmRequestWithDefaults -`func NewTransitGenerateHMACWithAlgorithmRequestWithDefaults() *TransitGenerateHMACWithAlgorithmRequest` +`func NewTransitGenerateHmacWithAlgorithmRequestWithDefaults() *TransitGenerateHmacWithAlgorithmRequest` -NewTransitGenerateHMACWithAlgorithmRequestWithDefaults instantiates a new TransitGenerateHMACWithAlgorithmRequest object +NewTransitGenerateHmacWithAlgorithmRequestWithDefaults instantiates a new TransitGenerateHmacWithAlgorithmRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetAlgorithm -`func (o *TransitGenerateHMACWithAlgorithmRequest) GetAlgorithm() string` +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetAlgorithm() string` GetAlgorithm returns the Algorithm field if non-nil, zero value otherwise. ### GetAlgorithmOk -`func (o *TransitGenerateHMACWithAlgorithmRequest) GetAlgorithmOk() (*string, bool)` +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetAlgorithmOk() (*string, bool)` GetAlgorithmOk returns a tuple with the Algorithm field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetAlgorithm -`func (o *TransitGenerateHMACWithAlgorithmRequest) SetAlgorithm(v string)` +`func (o *TransitGenerateHmacWithAlgorithmRequest) SetAlgorithm(v string)` SetAlgorithm sets Algorithm field to given value. ### HasAlgorithm -`func (o *TransitGenerateHMACWithAlgorithmRequest) HasAlgorithm() bool` +`func (o *TransitGenerateHmacWithAlgorithmRequest) HasAlgorithm() bool` HasAlgorithm returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitGenerateHmacWithAlgorithmRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitGenerateHmacWithAlgorithmRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetInput -`func (o *TransitGenerateHMACWithAlgorithmRequest) GetInput() string` +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetInput() string` GetInput returns the Input field if non-nil, zero value otherwise. ### GetInputOk -`func (o *TransitGenerateHMACWithAlgorithmRequest) GetInputOk() (*string, bool)` +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetInputOk() (*string, bool)` GetInputOk returns a tuple with the Input field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetInput -`func (o *TransitGenerateHMACWithAlgorithmRequest) SetInput(v string)` +`func (o *TransitGenerateHmacWithAlgorithmRequest) SetInput(v string)` SetInput sets Input field to given value. ### HasInput -`func (o *TransitGenerateHMACWithAlgorithmRequest) HasInput() bool` +`func (o *TransitGenerateHmacWithAlgorithmRequest) HasInput() bool` HasInput returns a boolean if a field has been set. @@ -92,27 +122,27 @@ HasInput returns a boolean if a field has been set. ### GetKeyVersion -`func (o *TransitGenerateHMACWithAlgorithmRequest) GetKeyVersion() int32` +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetKeyVersion() int32` GetKeyVersion returns the KeyVersion field if non-nil, zero value otherwise. ### GetKeyVersionOk -`func (o *TransitGenerateHMACWithAlgorithmRequest) GetKeyVersionOk() (*int32, bool)` +`func (o *TransitGenerateHmacWithAlgorithmRequest) GetKeyVersionOk() (*int32, bool)` GetKeyVersionOk returns a tuple with the KeyVersion field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetKeyVersion -`func (o *TransitGenerateHMACWithAlgorithmRequest) SetKeyVersion(v int32)` +`func (o *TransitGenerateHmacWithAlgorithmRequest) SetKeyVersion(v int32)` SetKeyVersion sets KeyVersion field to given value. ### HasKeyVersion -`func (o *TransitGenerateHMACWithAlgorithmRequest) HasKeyVersion() bool` +`func (o *TransitGenerateHmacWithAlgorithmRequest) HasKeyVersion() bool` HasKeyVersion returns a boolean if a field has been set. diff --git a/docs/TransitWriteRandomUrlbytesRequest.md b/docs/TransitGenerateRandomWithBytesRequest.md similarity index 62% rename from docs/TransitWriteRandomUrlbytesRequest.md rename to docs/TransitGenerateRandomWithBytesRequest.md index 7ebd64cf..19d0bb13 100644 --- a/docs/TransitWriteRandomUrlbytesRequest.md +++ b/docs/TransitGenerateRandomWithBytesRequest.md @@ -1,4 +1,4 @@ -# TransitWriteRandomUrlbytesRequest +# TransitGenerateRandomWithBytesRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewTransitWriteRandomUrlbytesRequest +### NewTransitGenerateRandomWithBytesRequest -`func NewTransitWriteRandomUrlbytesRequest() *TransitWriteRandomUrlbytesRequest` +`func NewTransitGenerateRandomWithBytesRequest() *TransitGenerateRandomWithBytesRequest` -NewTransitWriteRandomUrlbytesRequest instantiates a new TransitWriteRandomUrlbytesRequest object +NewTransitGenerateRandomWithBytesRequest instantiates a new TransitGenerateRandomWithBytesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitWriteRandomUrlbytesRequestWithDefaults +### NewTransitGenerateRandomWithBytesRequestWithDefaults -`func NewTransitWriteRandomUrlbytesRequestWithDefaults() *TransitWriteRandomUrlbytesRequest` +`func NewTransitGenerateRandomWithBytesRequestWithDefaults() *TransitGenerateRandomWithBytesRequest` -NewTransitWriteRandomUrlbytesRequestWithDefaults instantiates a new TransitWriteRandomUrlbytesRequest object +NewTransitGenerateRandomWithBytesRequestWithDefaults instantiates a new TransitGenerateRandomWithBytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBytes -`func (o *TransitWriteRandomUrlbytesRequest) GetBytes() int32` +`func (o *TransitGenerateRandomWithBytesRequest) GetBytes() int32` GetBytes returns the Bytes field if non-nil, zero value otherwise. ### GetBytesOk -`func (o *TransitWriteRandomUrlbytesRequest) GetBytesOk() (*int32, bool)` +`func (o *TransitGenerateRandomWithBytesRequest) GetBytesOk() (*int32, bool)` GetBytesOk returns a tuple with the Bytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBytes -`func (o *TransitWriteRandomUrlbytesRequest) SetBytes(v int32)` +`func (o *TransitGenerateRandomWithBytesRequest) SetBytes(v int32)` SetBytes sets Bytes field to given value. ### HasBytes -`func (o *TransitWriteRandomUrlbytesRequest) HasBytes() bool` +`func (o *TransitGenerateRandomWithBytesRequest) HasBytes() bool` HasBytes returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasBytes returns a boolean if a field has been set. ### GetFormat -`func (o *TransitWriteRandomUrlbytesRequest) GetFormat() string` +`func (o *TransitGenerateRandomWithBytesRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *TransitWriteRandomUrlbytesRequest) GetFormatOk() (*string, bool)` +`func (o *TransitGenerateRandomWithBytesRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *TransitWriteRandomUrlbytesRequest) SetFormat(v string)` +`func (o *TransitGenerateRandomWithBytesRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *TransitWriteRandomUrlbytesRequest) HasFormat() bool` +`func (o *TransitGenerateRandomWithBytesRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasFormat returns a boolean if a field has been set. ### GetSource -`func (o *TransitWriteRandomUrlbytesRequest) GetSource() string` +`func (o *TransitGenerateRandomWithBytesRequest) GetSource() string` GetSource returns the Source field if non-nil, zero value otherwise. ### GetSourceOk -`func (o *TransitWriteRandomUrlbytesRequest) GetSourceOk() (*string, bool)` +`func (o *TransitGenerateRandomWithBytesRequest) GetSourceOk() (*string, bool)` GetSourceOk returns a tuple with the Source field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetSource -`func (o *TransitWriteRandomUrlbytesRequest) SetSource(v string)` +`func (o *TransitGenerateRandomWithBytesRequest) SetSource(v string)` SetSource sets Source field to given value. ### HasSource -`func (o *TransitWriteRandomUrlbytesRequest) HasSource() bool` +`func (o *TransitGenerateRandomWithBytesRequest) HasSource() bool` HasSource returns a boolean if a field has been set. diff --git a/docs/ToolsGenerateRandomSourceBytesRequest.md b/docs/TransitGenerateRandomWithSourceAndBytesRequest.md similarity index 57% rename from docs/ToolsGenerateRandomSourceBytesRequest.md rename to docs/TransitGenerateRandomWithSourceAndBytesRequest.md index fffba84d..c11bbd84 100644 --- a/docs/ToolsGenerateRandomSourceBytesRequest.md +++ b/docs/TransitGenerateRandomWithSourceAndBytesRequest.md @@ -1,4 +1,4 @@ -# ToolsGenerateRandomSourceBytesRequest +# TransitGenerateRandomWithSourceAndBytesRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewToolsGenerateRandomSourceBytesRequest +### NewTransitGenerateRandomWithSourceAndBytesRequest -`func NewToolsGenerateRandomSourceBytesRequest() *ToolsGenerateRandomSourceBytesRequest` +`func NewTransitGenerateRandomWithSourceAndBytesRequest() *TransitGenerateRandomWithSourceAndBytesRequest` -NewToolsGenerateRandomSourceBytesRequest instantiates a new ToolsGenerateRandomSourceBytesRequest object +NewTransitGenerateRandomWithSourceAndBytesRequest instantiates a new TransitGenerateRandomWithSourceAndBytesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewToolsGenerateRandomSourceBytesRequestWithDefaults +### NewTransitGenerateRandomWithSourceAndBytesRequestWithDefaults -`func NewToolsGenerateRandomSourceBytesRequestWithDefaults() *ToolsGenerateRandomSourceBytesRequest` +`func NewTransitGenerateRandomWithSourceAndBytesRequestWithDefaults() *TransitGenerateRandomWithSourceAndBytesRequest` -NewToolsGenerateRandomSourceBytesRequestWithDefaults instantiates a new ToolsGenerateRandomSourceBytesRequest object +NewTransitGenerateRandomWithSourceAndBytesRequestWithDefaults instantiates a new TransitGenerateRandomWithSourceAndBytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBytes -`func (o *ToolsGenerateRandomSourceBytesRequest) GetBytes() int32` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) GetBytes() int32` GetBytes returns the Bytes field if non-nil, zero value otherwise. ### GetBytesOk -`func (o *ToolsGenerateRandomSourceBytesRequest) GetBytesOk() (*int32, bool)` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) GetBytesOk() (*int32, bool)` GetBytesOk returns a tuple with the Bytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBytes -`func (o *ToolsGenerateRandomSourceBytesRequest) SetBytes(v int32)` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) SetBytes(v int32)` SetBytes sets Bytes field to given value. ### HasBytes -`func (o *ToolsGenerateRandomSourceBytesRequest) HasBytes() bool` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) HasBytes() bool` HasBytes returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasBytes returns a boolean if a field has been set. ### GetFormat -`func (o *ToolsGenerateRandomSourceBytesRequest) GetFormat() string` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *ToolsGenerateRandomSourceBytesRequest) GetFormatOk() (*string, bool)` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *ToolsGenerateRandomSourceBytesRequest) SetFormat(v string)` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *ToolsGenerateRandomSourceBytesRequest) HasFormat() bool` +`func (o *TransitGenerateRandomWithSourceAndBytesRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. diff --git a/docs/TransitGenerateRandomSourceRequest.md b/docs/TransitGenerateRandomWithSourceRequest.md similarity index 60% rename from docs/TransitGenerateRandomSourceRequest.md rename to docs/TransitGenerateRandomWithSourceRequest.md index 04bc6a3a..449fedde 100644 --- a/docs/TransitGenerateRandomSourceRequest.md +++ b/docs/TransitGenerateRandomWithSourceRequest.md @@ -1,4 +1,4 @@ -# TransitGenerateRandomSourceRequest +# TransitGenerateRandomWithSourceRequest ## Properties @@ -14,47 +14,47 @@ Name | Type | Description | Notes ## Methods -### NewTransitGenerateRandomSourceRequest +### NewTransitGenerateRandomWithSourceRequest -`func NewTransitGenerateRandomSourceRequest() *TransitGenerateRandomSourceRequest` +`func NewTransitGenerateRandomWithSourceRequest() *TransitGenerateRandomWithSourceRequest` -NewTransitGenerateRandomSourceRequest instantiates a new TransitGenerateRandomSourceRequest object +NewTransitGenerateRandomWithSourceRequest instantiates a new TransitGenerateRandomWithSourceRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitGenerateRandomSourceRequestWithDefaults +### NewTransitGenerateRandomWithSourceRequestWithDefaults -`func NewTransitGenerateRandomSourceRequestWithDefaults() *TransitGenerateRandomSourceRequest` +`func NewTransitGenerateRandomWithSourceRequestWithDefaults() *TransitGenerateRandomWithSourceRequest` -NewTransitGenerateRandomSourceRequestWithDefaults instantiates a new TransitGenerateRandomSourceRequest object +NewTransitGenerateRandomWithSourceRequestWithDefaults instantiates a new TransitGenerateRandomWithSourceRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBytes -`func (o *TransitGenerateRandomSourceRequest) GetBytes() int32` +`func (o *TransitGenerateRandomWithSourceRequest) GetBytes() int32` GetBytes returns the Bytes field if non-nil, zero value otherwise. ### GetBytesOk -`func (o *TransitGenerateRandomSourceRequest) GetBytesOk() (*int32, bool)` +`func (o *TransitGenerateRandomWithSourceRequest) GetBytesOk() (*int32, bool)` GetBytesOk returns a tuple with the Bytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBytes -`func (o *TransitGenerateRandomSourceRequest) SetBytes(v int32)` +`func (o *TransitGenerateRandomWithSourceRequest) SetBytes(v int32)` SetBytes sets Bytes field to given value. ### HasBytes -`func (o *TransitGenerateRandomSourceRequest) HasBytes() bool` +`func (o *TransitGenerateRandomWithSourceRequest) HasBytes() bool` HasBytes returns a boolean if a field has been set. @@ -63,27 +63,27 @@ HasBytes returns a boolean if a field has been set. ### GetFormat -`func (o *TransitGenerateRandomSourceRequest) GetFormat() string` +`func (o *TransitGenerateRandomWithSourceRequest) GetFormat() string` GetFormat returns the Format field if non-nil, zero value otherwise. ### GetFormatOk -`func (o *TransitGenerateRandomSourceRequest) GetFormatOk() (*string, bool)` +`func (o *TransitGenerateRandomWithSourceRequest) GetFormatOk() (*string, bool)` GetFormatOk returns a tuple with the Format field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetFormat -`func (o *TransitGenerateRandomSourceRequest) SetFormat(v string)` +`func (o *TransitGenerateRandomWithSourceRequest) SetFormat(v string)` SetFormat sets Format field to given value. ### HasFormat -`func (o *TransitGenerateRandomSourceRequest) HasFormat() bool` +`func (o *TransitGenerateRandomWithSourceRequest) HasFormat() bool` HasFormat returns a boolean if a field has been set. @@ -92,27 +92,27 @@ HasFormat returns a boolean if a field has been set. ### GetUrlbytes -`func (o *TransitGenerateRandomSourceRequest) GetUrlbytes() string` +`func (o *TransitGenerateRandomWithSourceRequest) GetUrlbytes() string` GetUrlbytes returns the Urlbytes field if non-nil, zero value otherwise. ### GetUrlbytesOk -`func (o *TransitGenerateRandomSourceRequest) GetUrlbytesOk() (*string, bool)` +`func (o *TransitGenerateRandomWithSourceRequest) GetUrlbytesOk() (*string, bool)` GetUrlbytesOk returns a tuple with the Urlbytes field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetUrlbytes -`func (o *TransitGenerateRandomSourceRequest) SetUrlbytes(v string)` +`func (o *TransitGenerateRandomWithSourceRequest) SetUrlbytes(v string)` SetUrlbytes sets Urlbytes field to given value. ### HasUrlbytes -`func (o *TransitGenerateRandomSourceRequest) HasUrlbytes() bool` +`func (o *TransitGenerateRandomWithSourceRequest) HasUrlbytes() bool` HasUrlbytes returns a boolean if a field has been set. diff --git a/docs/TransitRestoreRequest.md b/docs/TransitRestoreAndRenameKeyRequest.md similarity index 53% rename from docs/TransitRestoreRequest.md rename to docs/TransitRestoreAndRenameKeyRequest.md index 43ed623f..e2bb44dd 100644 --- a/docs/TransitRestoreRequest.md +++ b/docs/TransitRestoreAndRenameKeyRequest.md @@ -1,4 +1,4 @@ -# TransitRestoreRequest +# TransitRestoreAndRenameKeyRequest ## Properties @@ -7,54 +7,53 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Backup** | Pointer to **string** | Backed up key data to be restored. This should be the output from the 'backup/' endpoint. | [optional] **Force** | Pointer to **bool** | If set and a key by the given name exists, force the restore operation and override the key. | [optional] [default to false] -**Name** | Pointer to **string** | If set, this will be the name of the restored key. | [optional] ## Methods -### NewTransitRestoreRequest +### NewTransitRestoreAndRenameKeyRequest -`func NewTransitRestoreRequest() *TransitRestoreRequest` +`func NewTransitRestoreAndRenameKeyRequest() *TransitRestoreAndRenameKeyRequest` -NewTransitRestoreRequest instantiates a new TransitRestoreRequest object +NewTransitRestoreAndRenameKeyRequest instantiates a new TransitRestoreAndRenameKeyRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewTransitRestoreRequestWithDefaults +### NewTransitRestoreAndRenameKeyRequestWithDefaults -`func NewTransitRestoreRequestWithDefaults() *TransitRestoreRequest` +`func NewTransitRestoreAndRenameKeyRequestWithDefaults() *TransitRestoreAndRenameKeyRequest` -NewTransitRestoreRequestWithDefaults instantiates a new TransitRestoreRequest object +NewTransitRestoreAndRenameKeyRequestWithDefaults instantiates a new TransitRestoreAndRenameKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetBackup -`func (o *TransitRestoreRequest) GetBackup() string` +`func (o *TransitRestoreAndRenameKeyRequest) GetBackup() string` GetBackup returns the Backup field if non-nil, zero value otherwise. ### GetBackupOk -`func (o *TransitRestoreRequest) GetBackupOk() (*string, bool)` +`func (o *TransitRestoreAndRenameKeyRequest) GetBackupOk() (*string, bool)` GetBackupOk returns a tuple with the Backup field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetBackup -`func (o *TransitRestoreRequest) SetBackup(v string)` +`func (o *TransitRestoreAndRenameKeyRequest) SetBackup(v string)` SetBackup sets Backup field to given value. ### HasBackup -`func (o *TransitRestoreRequest) HasBackup() bool` +`func (o *TransitRestoreAndRenameKeyRequest) HasBackup() bool` HasBackup returns a boolean if a field has been set. @@ -63,62 +62,33 @@ HasBackup returns a boolean if a field has been set. ### GetForce -`func (o *TransitRestoreRequest) GetForce() bool` +`func (o *TransitRestoreAndRenameKeyRequest) GetForce() bool` GetForce returns the Force field if non-nil, zero value otherwise. ### GetForceOk -`func (o *TransitRestoreRequest) GetForceOk() (*bool, bool)` +`func (o *TransitRestoreAndRenameKeyRequest) GetForceOk() (*bool, bool)` GetForceOk returns a tuple with the Force field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetForce -`func (o *TransitRestoreRequest) SetForce(v bool)` +`func (o *TransitRestoreAndRenameKeyRequest) SetForce(v bool)` SetForce sets Force field to given value. ### HasForce -`func (o *TransitRestoreRequest) HasForce() bool` +`func (o *TransitRestoreAndRenameKeyRequest) HasForce() bool` HasForce returns a boolean if a field has been set. -### GetName - -`func (o *TransitRestoreRequest) GetName() string` - -GetName returns the Name field if non-nil, zero value otherwise. - -### GetNameOk - -`func (o *TransitRestoreRequest) GetNameOk() (*string, bool)` - -GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetName - -`func (o *TransitRestoreRequest) SetName(v string)` - -SetName sets Name field to given value. - - -### HasName - -`func (o *TransitRestoreRequest) HasName() bool` - -HasName returns a boolean if a field has been set. - - - - diff --git a/docs/TransitRestoreKeyRequest.md b/docs/TransitRestoreKeyRequest.md index 7f11f187..a1d247fb 100644 --- a/docs/TransitRestoreKeyRequest.md +++ b/docs/TransitRestoreKeyRequest.md @@ -7,6 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Backup** | Pointer to **string** | Backed up key data to be restored. This should be the output from the 'backup/' endpoint. | [optional] **Force** | Pointer to **bool** | If set and a key by the given name exists, force the restore operation and override the key. | [optional] [default to false] +**Name** | Pointer to **string** | If set, this will be the name of the restored key. | [optional] @@ -89,6 +90,35 @@ HasForce returns a boolean if a field has been set. +### GetName + +`func (o *TransitRestoreKeyRequest) GetName() string` + +GetName returns the Name field if non-nil, zero value otherwise. + +### GetNameOk + +`func (o *TransitRestoreKeyRequest) GetNameOk() (*string, bool)` + +GetNameOk returns a tuple with the Name field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetName + +`func (o *TransitRestoreKeyRequest) SetName(v string)` + +SetName sets Name field to given value. + + +### HasName + +`func (o *TransitRestoreKeyRequest) HasName() bool` + +HasName returns a boolean if a field has been set. + + + + diff --git a/docs/TransitRewrapRequest.md b/docs/TransitRewrapRequest.md index be51d61d..63a0afbe 100644 --- a/docs/TransitRewrapRequest.md +++ b/docs/TransitRewrapRequest.md @@ -5,6 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items to be re-encrypted in a single batch. When this parameter is set, if the parameters 'ciphertext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input. | [optional] **Ciphertext** | Pointer to **string** | Ciphertext value to rewrap | [optional] **Context** | Pointer to **string** | Base64 encoded context for key derivation. Required for derived keys. | [optional] **KeyVersion** | Pointer to **int32** | The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. | [optional] @@ -33,6 +34,35 @@ This constructor will only assign default values to properties that have it defi but it doesn't guarantee that properties required by API are set +### GetBatchInput + +`func (o *TransitRewrapRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitRewrapRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitRewrapRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitRewrapRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetCiphertext `func (o *TransitRewrapRequest) GetCiphertext() string` diff --git a/docs/TransitRotateKeyRequest.md b/docs/TransitRotateKeyRequest.md new file mode 100644 index 00000000..adaa5dc8 --- /dev/null +++ b/docs/TransitRotateKeyRequest.md @@ -0,0 +1,99 @@ +# TransitRotateKeyRequest + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ManagedKeyId** | Pointer to **string** | The UUID of the managed key to use for the new version of this transit key | [optional] +**ManagedKeyName** | Pointer to **string** | The name of the managed key to use for the new version of this transit key | [optional] + + + +## Methods + + +### NewTransitRotateKeyRequest + +`func NewTransitRotateKeyRequest() *TransitRotateKeyRequest` + +NewTransitRotateKeyRequest instantiates a new TransitRotateKeyRequest object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewTransitRotateKeyRequestWithDefaults + +`func NewTransitRotateKeyRequestWithDefaults() *TransitRotateKeyRequest` + +NewTransitRotateKeyRequestWithDefaults instantiates a new TransitRotateKeyRequest object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetManagedKeyId + +`func (o *TransitRotateKeyRequest) GetManagedKeyId() string` + +GetManagedKeyId returns the ManagedKeyId field if non-nil, zero value otherwise. + +### GetManagedKeyIdOk + +`func (o *TransitRotateKeyRequest) GetManagedKeyIdOk() (*string, bool)` + +GetManagedKeyIdOk returns a tuple with the ManagedKeyId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyId + +`func (o *TransitRotateKeyRequest) SetManagedKeyId(v string)` + +SetManagedKeyId sets ManagedKeyId field to given value. + + +### HasManagedKeyId + +`func (o *TransitRotateKeyRequest) HasManagedKeyId() bool` + +HasManagedKeyId returns a boolean if a field has been set. + + + + +### GetManagedKeyName + +`func (o *TransitRotateKeyRequest) GetManagedKeyName() string` + +GetManagedKeyName returns the ManagedKeyName field if non-nil, zero value otherwise. + +### GetManagedKeyNameOk + +`func (o *TransitRotateKeyRequest) GetManagedKeyNameOk() (*string, bool)` + +GetManagedKeyNameOk returns a tuple with the ManagedKeyName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetManagedKeyName + +`func (o *TransitRotateKeyRequest) SetManagedKeyName(v string)` + +SetManagedKeyName sets ManagedKeyName field to given value. + + +### HasManagedKeyName + +`func (o *TransitRotateKeyRequest) HasManagedKeyName() bool` + +HasManagedKeyName returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/TransitSignRequest.md b/docs/TransitSignRequest.md index dac703b1..b171bd91 100644 --- a/docs/TransitSignRequest.md +++ b/docs/TransitSignRequest.md @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Algorithm** | Pointer to **string** | Deprecated: use \"hash_algorithm\" instead. | [optional] [default to "sha2-256"] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items for processing. When this parameter is set, any supplied 'input' or 'context' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input | [optional] **Context** | Pointer to **string** | Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. | [optional] **HashAlgorithm** | Pointer to **string** | Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature. | [optional] [default to "sha2-256"] **Input** | Pointer to **string** | The base64-encoded input data | [optional] @@ -68,6 +69,35 @@ HasAlgorithm returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitSignRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitSignRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitSignRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitSignRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetContext `func (o *TransitSignRequest) GetContext() string` diff --git a/docs/TransitSignWithAlgorithmRequest.md b/docs/TransitSignWithAlgorithmRequest.md index 00728a50..8c6bde61 100644 --- a/docs/TransitSignWithAlgorithmRequest.md +++ b/docs/TransitSignWithAlgorithmRequest.md @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Algorithm** | Pointer to **string** | Deprecated: use \"hash_algorithm\" instead. | [optional] [default to "sha2-256"] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items for processing. When this parameter is set, any supplied 'input' or 'context' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input | [optional] **Context** | Pointer to **string** | Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. | [optional] **HashAlgorithm** | Pointer to **string** | Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature. | [optional] [default to "sha2-256"] **Input** | Pointer to **string** | The base64-encoded input data | [optional] @@ -67,6 +68,35 @@ HasAlgorithm returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitSignWithAlgorithmRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitSignWithAlgorithmRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitSignWithAlgorithmRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitSignWithAlgorithmRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetContext `func (o *TransitSignWithAlgorithmRequest) GetContext() string` diff --git a/docs/TransitVerifyRequest.md b/docs/TransitVerifyRequest.md index f9d7399e..4ffb5f6b 100644 --- a/docs/TransitVerifyRequest.md +++ b/docs/TransitVerifyRequest.md @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Algorithm** | Pointer to **string** | Deprecated: use \"hash_algorithm\" instead. | [optional] [default to "sha2-256"] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items for processing. When this parameter is set, any supplied 'input', 'hmac' or 'signature' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input | [optional] **Context** | Pointer to **string** | Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. | [optional] **HashAlgorithm** | Pointer to **string** | Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path. | [optional] [default to "sha2-256"] **Hmac** | Pointer to **string** | The HMAC, including vault header/key version | [optional] @@ -69,6 +70,35 @@ HasAlgorithm returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitVerifyRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitVerifyRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitVerifyRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitVerifyRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetContext `func (o *TransitVerifyRequest) GetContext() string` diff --git a/docs/TransitVerifyWithAlgorithmRequest.md b/docs/TransitVerifyWithAlgorithmRequest.md index f0c2555b..33ab430f 100644 --- a/docs/TransitVerifyWithAlgorithmRequest.md +++ b/docs/TransitVerifyWithAlgorithmRequest.md @@ -6,6 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **Algorithm** | Pointer to **string** | Deprecated: use \"hash_algorithm\" instead. | [optional] [default to "sha2-256"] +**BatchInput** | Pointer to **[]map[string]interface{}** | Specifies a list of items for processing. When this parameter is set, any supplied 'input', 'hmac' or 'signature' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input | [optional] **Context** | Pointer to **string** | Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. | [optional] **HashAlgorithm** | Pointer to **string** | Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path. | [optional] [default to "sha2-256"] **Hmac** | Pointer to **string** | The HMAC, including vault header/key version | [optional] @@ -68,6 +69,35 @@ HasAlgorithm returns a boolean if a field has been set. +### GetBatchInput + +`func (o *TransitVerifyWithAlgorithmRequest) GetBatchInput() []map[string]interface{}` + +GetBatchInput returns the BatchInput field if non-nil, zero value otherwise. + +### GetBatchInputOk + +`func (o *TransitVerifyWithAlgorithmRequest) GetBatchInputOk() (*[]map[string]interface{}, bool)` + +GetBatchInputOk returns a tuple with the BatchInput field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBatchInput + +`func (o *TransitVerifyWithAlgorithmRequest) SetBatchInput(v []map[string]interface{})` + +SetBatchInput sets BatchInput field to given value. + + +### HasBatchInput + +`func (o *TransitVerifyWithAlgorithmRequest) HasBatchInput() bool` + +HasBatchInput returns a boolean if a field has been set. + + + + ### GetContext `func (o *TransitVerifyWithAlgorithmRequest) GetContext() string` diff --git a/docs/WriteConfigUIHeaderRequest.md b/docs/UiHeadersConfigureRequest.md similarity index 63% rename from docs/WriteConfigUIHeaderRequest.md rename to docs/UiHeadersConfigureRequest.md index c9a468e9..68b2bfc9 100644 --- a/docs/WriteConfigUIHeaderRequest.md +++ b/docs/UiHeadersConfigureRequest.md @@ -1,4 +1,4 @@ -# WriteConfigUIHeaderRequest +# UiHeadersConfigureRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewWriteConfigUIHeaderRequest +### NewUiHeadersConfigureRequest -`func NewWriteConfigUIHeaderRequest() *WriteConfigUIHeaderRequest` +`func NewUiHeadersConfigureRequest() *UiHeadersConfigureRequest` -NewWriteConfigUIHeaderRequest instantiates a new WriteConfigUIHeaderRequest object +NewUiHeadersConfigureRequest instantiates a new UiHeadersConfigureRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWriteConfigUIHeaderRequestWithDefaults +### NewUiHeadersConfigureRequestWithDefaults -`func NewWriteConfigUIHeaderRequestWithDefaults() *WriteConfigUIHeaderRequest` +`func NewUiHeadersConfigureRequestWithDefaults() *UiHeadersConfigureRequest` -NewWriteConfigUIHeaderRequestWithDefaults instantiates a new WriteConfigUIHeaderRequest object +NewUiHeadersConfigureRequestWithDefaults instantiates a new UiHeadersConfigureRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetMultivalue -`func (o *WriteConfigUIHeaderRequest) GetMultivalue() bool` +`func (o *UiHeadersConfigureRequest) GetMultivalue() bool` GetMultivalue returns the Multivalue field if non-nil, zero value otherwise. ### GetMultivalueOk -`func (o *WriteConfigUIHeaderRequest) GetMultivalueOk() (*bool, bool)` +`func (o *UiHeadersConfigureRequest) GetMultivalueOk() (*bool, bool)` GetMultivalueOk returns a tuple with the Multivalue field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetMultivalue -`func (o *WriteConfigUIHeaderRequest) SetMultivalue(v bool)` +`func (o *UiHeadersConfigureRequest) SetMultivalue(v bool)` SetMultivalue sets Multivalue field to given value. ### HasMultivalue -`func (o *WriteConfigUIHeaderRequest) HasMultivalue() bool` +`func (o *UiHeadersConfigureRequest) HasMultivalue() bool` HasMultivalue returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasMultivalue returns a boolean if a field has been set. ### GetValues -`func (o *WriteConfigUIHeaderRequest) GetValues() []string` +`func (o *UiHeadersConfigureRequest) GetValues() []string` GetValues returns the Values field if non-nil, zero value otherwise. ### GetValuesOk -`func (o *WriteConfigUIHeaderRequest) GetValuesOk() (*[]string, bool)` +`func (o *UiHeadersConfigureRequest) GetValuesOk() (*[]string, bool)` GetValuesOk returns a tuple with the Values field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetValues -`func (o *WriteConfigUIHeaderRequest) SetValues(v []string)` +`func (o *UiHeadersConfigureRequest) SetValues(v []string)` SetValues sets Values field to given value. ### HasValues -`func (o *WriteConfigUIHeaderRequest) HasValues() bool` +`func (o *UiHeadersConfigureRequest) HasValues() bool` HasValues returns a boolean if a field has been set. diff --git a/docs/UiHeadersListResponse.md b/docs/UiHeadersListResponse.md new file mode 100644 index 00000000..4d51f394 --- /dev/null +++ b/docs/UiHeadersListResponse.md @@ -0,0 +1,69 @@ +# UiHeadersListResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Keys** | Pointer to **[]string** | Lists of configured UI headers. Omitted if list is empty | [optional] + + + +## Methods + + +### NewUiHeadersListResponse + +`func NewUiHeadersListResponse() *UiHeadersListResponse` + +NewUiHeadersListResponse instantiates a new UiHeadersListResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewUiHeadersListResponseWithDefaults + +`func NewUiHeadersListResponseWithDefaults() *UiHeadersListResponse` + +NewUiHeadersListResponseWithDefaults instantiates a new UiHeadersListResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeys + +`func (o *UiHeadersListResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *UiHeadersListResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *UiHeadersListResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *UiHeadersListResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/UiHeadersReadConfigurationResponse.md b/docs/UiHeadersReadConfigurationResponse.md new file mode 100644 index 00000000..c9108470 --- /dev/null +++ b/docs/UiHeadersReadConfigurationResponse.md @@ -0,0 +1,99 @@ +# UiHeadersReadConfigurationResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Value** | Pointer to **string** | returns the first header value when `multivalue` request parameter is false | [optional] +**Values** | Pointer to **[]string** | returns all header values when `multivalue` request parameter is true | [optional] + + + +## Methods + + +### NewUiHeadersReadConfigurationResponse + +`func NewUiHeadersReadConfigurationResponse() *UiHeadersReadConfigurationResponse` + +NewUiHeadersReadConfigurationResponse instantiates a new UiHeadersReadConfigurationResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewUiHeadersReadConfigurationResponseWithDefaults + +`func NewUiHeadersReadConfigurationResponseWithDefaults() *UiHeadersReadConfigurationResponse` + +NewUiHeadersReadConfigurationResponseWithDefaults instantiates a new UiHeadersReadConfigurationResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetValue + +`func (o *UiHeadersReadConfigurationResponse) GetValue() string` + +GetValue returns the Value field if non-nil, zero value otherwise. + +### GetValueOk + +`func (o *UiHeadersReadConfigurationResponse) GetValueOk() (*string, bool)` + +GetValueOk returns a tuple with the Value field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetValue + +`func (o *UiHeadersReadConfigurationResponse) SetValue(v string)` + +SetValue sets Value field to given value. + + +### HasValue + +`func (o *UiHeadersReadConfigurationResponse) HasValue() bool` + +HasValue returns a boolean if a field has been set. + + + + +### GetValues + +`func (o *UiHeadersReadConfigurationResponse) GetValues() []string` + +GetValues returns the Values field if non-nil, zero value otherwise. + +### GetValuesOk + +`func (o *UiHeadersReadConfigurationResponse) GetValuesOk() (*[]string, bool)` + +GetValuesOk returns a tuple with the Values field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetValues + +`func (o *UiHeadersReadConfigurationResponse) SetValues(v []string)` + +SetValues sets Values field to given value. + + +### HasValues + +`func (o *UiHeadersReadConfigurationResponse) HasValues() bool` + +HasValues returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/UnsealResponse.md b/docs/UnsealResponse.md new file mode 100644 index 00000000..6cae4bdd --- /dev/null +++ b/docs/UnsealResponse.md @@ -0,0 +1,519 @@ +# UnsealResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**BuildDate** | Pointer to **string** | | [optional] +**ClusterId** | Pointer to **string** | | [optional] +**ClusterName** | Pointer to **string** | | [optional] +**HcpLinkResourceID** | Pointer to **string** | | [optional] +**HcpLinkStatus** | Pointer to **string** | | [optional] +**Initialized** | Pointer to **bool** | | [optional] +**Migration** | Pointer to **bool** | | [optional] +**N** | Pointer to **int32** | | [optional] +**Nonce** | Pointer to **string** | | [optional] +**Progress** | Pointer to **int32** | | [optional] +**RecoverySeal** | Pointer to **bool** | | [optional] +**Sealed** | Pointer to **bool** | | [optional] +**StorageType** | Pointer to **string** | | [optional] +**T** | Pointer to **int32** | | [optional] +**Type** | Pointer to **string** | | [optional] +**Version** | Pointer to **string** | | [optional] + + + +## Methods + + +### NewUnsealResponse + +`func NewUnsealResponse() *UnsealResponse` + +NewUnsealResponse instantiates a new UnsealResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewUnsealResponseWithDefaults + +`func NewUnsealResponseWithDefaults() *UnsealResponse` + +NewUnsealResponseWithDefaults instantiates a new UnsealResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetBuildDate + +`func (o *UnsealResponse) GetBuildDate() string` + +GetBuildDate returns the BuildDate field if non-nil, zero value otherwise. + +### GetBuildDateOk + +`func (o *UnsealResponse) GetBuildDateOk() (*string, bool)` + +GetBuildDateOk returns a tuple with the BuildDate field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetBuildDate + +`func (o *UnsealResponse) SetBuildDate(v string)` + +SetBuildDate sets BuildDate field to given value. + + +### HasBuildDate + +`func (o *UnsealResponse) HasBuildDate() bool` + +HasBuildDate returns a boolean if a field has been set. + + + + +### GetClusterId + +`func (o *UnsealResponse) GetClusterId() string` + +GetClusterId returns the ClusterId field if non-nil, zero value otherwise. + +### GetClusterIdOk + +`func (o *UnsealResponse) GetClusterIdOk() (*string, bool)` + +GetClusterIdOk returns a tuple with the ClusterId field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetClusterId + +`func (o *UnsealResponse) SetClusterId(v string)` + +SetClusterId sets ClusterId field to given value. + + +### HasClusterId + +`func (o *UnsealResponse) HasClusterId() bool` + +HasClusterId returns a boolean if a field has been set. + + + + +### GetClusterName + +`func (o *UnsealResponse) GetClusterName() string` + +GetClusterName returns the ClusterName field if non-nil, zero value otherwise. + +### GetClusterNameOk + +`func (o *UnsealResponse) GetClusterNameOk() (*string, bool)` + +GetClusterNameOk returns a tuple with the ClusterName field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetClusterName + +`func (o *UnsealResponse) SetClusterName(v string)` + +SetClusterName sets ClusterName field to given value. + + +### HasClusterName + +`func (o *UnsealResponse) HasClusterName() bool` + +HasClusterName returns a boolean if a field has been set. + + + + +### GetHcpLinkResourceID + +`func (o *UnsealResponse) GetHcpLinkResourceID() string` + +GetHcpLinkResourceID returns the HcpLinkResourceID field if non-nil, zero value otherwise. + +### GetHcpLinkResourceIDOk + +`func (o *UnsealResponse) GetHcpLinkResourceIDOk() (*string, bool)` + +GetHcpLinkResourceIDOk returns a tuple with the HcpLinkResourceID field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHcpLinkResourceID + +`func (o *UnsealResponse) SetHcpLinkResourceID(v string)` + +SetHcpLinkResourceID sets HcpLinkResourceID field to given value. + + +### HasHcpLinkResourceID + +`func (o *UnsealResponse) HasHcpLinkResourceID() bool` + +HasHcpLinkResourceID returns a boolean if a field has been set. + + + + +### GetHcpLinkStatus + +`func (o *UnsealResponse) GetHcpLinkStatus() string` + +GetHcpLinkStatus returns the HcpLinkStatus field if non-nil, zero value otherwise. + +### GetHcpLinkStatusOk + +`func (o *UnsealResponse) GetHcpLinkStatusOk() (*string, bool)` + +GetHcpLinkStatusOk returns a tuple with the HcpLinkStatus field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetHcpLinkStatus + +`func (o *UnsealResponse) SetHcpLinkStatus(v string)` + +SetHcpLinkStatus sets HcpLinkStatus field to given value. + + +### HasHcpLinkStatus + +`func (o *UnsealResponse) HasHcpLinkStatus() bool` + +HasHcpLinkStatus returns a boolean if a field has been set. + + + + +### GetInitialized + +`func (o *UnsealResponse) GetInitialized() bool` + +GetInitialized returns the Initialized field if non-nil, zero value otherwise. + +### GetInitializedOk + +`func (o *UnsealResponse) GetInitializedOk() (*bool, bool)` + +GetInitializedOk returns a tuple with the Initialized field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetInitialized + +`func (o *UnsealResponse) SetInitialized(v bool)` + +SetInitialized sets Initialized field to given value. + + +### HasInitialized + +`func (o *UnsealResponse) HasInitialized() bool` + +HasInitialized returns a boolean if a field has been set. + + + + +### GetMigration + +`func (o *UnsealResponse) GetMigration() bool` + +GetMigration returns the Migration field if non-nil, zero value otherwise. + +### GetMigrationOk + +`func (o *UnsealResponse) GetMigrationOk() (*bool, bool)` + +GetMigrationOk returns a tuple with the Migration field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetMigration + +`func (o *UnsealResponse) SetMigration(v bool)` + +SetMigration sets Migration field to given value. + + +### HasMigration + +`func (o *UnsealResponse) HasMigration() bool` + +HasMigration returns a boolean if a field has been set. + + + + +### GetN + +`func (o *UnsealResponse) GetN() int32` + +GetN returns the N field if non-nil, zero value otherwise. + +### GetNOk + +`func (o *UnsealResponse) GetNOk() (*int32, bool)` + +GetNOk returns a tuple with the N field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetN + +`func (o *UnsealResponse) SetN(v int32)` + +SetN sets N field to given value. + + +### HasN + +`func (o *UnsealResponse) HasN() bool` + +HasN returns a boolean if a field has been set. + + + + +### GetNonce + +`func (o *UnsealResponse) GetNonce() string` + +GetNonce returns the Nonce field if non-nil, zero value otherwise. + +### GetNonceOk + +`func (o *UnsealResponse) GetNonceOk() (*string, bool)` + +GetNonceOk returns a tuple with the Nonce field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetNonce + +`func (o *UnsealResponse) SetNonce(v string)` + +SetNonce sets Nonce field to given value. + + +### HasNonce + +`func (o *UnsealResponse) HasNonce() bool` + +HasNonce returns a boolean if a field has been set. + + + + +### GetProgress + +`func (o *UnsealResponse) GetProgress() int32` + +GetProgress returns the Progress field if non-nil, zero value otherwise. + +### GetProgressOk + +`func (o *UnsealResponse) GetProgressOk() (*int32, bool)` + +GetProgressOk returns a tuple with the Progress field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetProgress + +`func (o *UnsealResponse) SetProgress(v int32)` + +SetProgress sets Progress field to given value. + + +### HasProgress + +`func (o *UnsealResponse) HasProgress() bool` + +HasProgress returns a boolean if a field has been set. + + + + +### GetRecoverySeal + +`func (o *UnsealResponse) GetRecoverySeal() bool` + +GetRecoverySeal returns the RecoverySeal field if non-nil, zero value otherwise. + +### GetRecoverySealOk + +`func (o *UnsealResponse) GetRecoverySealOk() (*bool, bool)` + +GetRecoverySealOk returns a tuple with the RecoverySeal field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetRecoverySeal + +`func (o *UnsealResponse) SetRecoverySeal(v bool)` + +SetRecoverySeal sets RecoverySeal field to given value. + + +### HasRecoverySeal + +`func (o *UnsealResponse) HasRecoverySeal() bool` + +HasRecoverySeal returns a boolean if a field has been set. + + + + +### GetSealed + +`func (o *UnsealResponse) GetSealed() bool` + +GetSealed returns the Sealed field if non-nil, zero value otherwise. + +### GetSealedOk + +`func (o *UnsealResponse) GetSealedOk() (*bool, bool)` + +GetSealedOk returns a tuple with the Sealed field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetSealed + +`func (o *UnsealResponse) SetSealed(v bool)` + +SetSealed sets Sealed field to given value. + + +### HasSealed + +`func (o *UnsealResponse) HasSealed() bool` + +HasSealed returns a boolean if a field has been set. + + + + +### GetStorageType + +`func (o *UnsealResponse) GetStorageType() string` + +GetStorageType returns the StorageType field if non-nil, zero value otherwise. + +### GetStorageTypeOk + +`func (o *UnsealResponse) GetStorageTypeOk() (*string, bool)` + +GetStorageTypeOk returns a tuple with the StorageType field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetStorageType + +`func (o *UnsealResponse) SetStorageType(v string)` + +SetStorageType sets StorageType field to given value. + + +### HasStorageType + +`func (o *UnsealResponse) HasStorageType() bool` + +HasStorageType returns a boolean if a field has been set. + + + + +### GetT + +`func (o *UnsealResponse) GetT() int32` + +GetT returns the T field if non-nil, zero value otherwise. + +### GetTOk + +`func (o *UnsealResponse) GetTOk() (*int32, bool)` + +GetTOk returns a tuple with the T field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetT + +`func (o *UnsealResponse) SetT(v int32)` + +SetT sets T field to given value. + + +### HasT + +`func (o *UnsealResponse) HasT() bool` + +HasT returns a boolean if a field has been set. + + + + +### GetType + +`func (o *UnsealResponse) GetType() string` + +GetType returns the Type field if non-nil, zero value otherwise. + +### GetTypeOk + +`func (o *UnsealResponse) GetTypeOk() (*string, bool)` + +GetTypeOk returns a tuple with the Type field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetType + +`func (o *UnsealResponse) SetType(v string)` + +SetType sets Type field to given value. + + +### HasType + +`func (o *UnsealResponse) HasType() bool` + +HasType returns a boolean if a field has been set. + + + + +### GetVersion + +`func (o *UnsealResponse) GetVersion() string` + +GetVersion returns the Version field if non-nil, zero value otherwise. + +### GetVersionOk + +`func (o *UnsealResponse) GetVersionOk() (*string, bool)` + +GetVersionOk returns a tuple with the Version field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetVersion + +`func (o *UnsealResponse) SetVersion(v string)` + +SetVersion sets Version field to given value. + + +### HasVersion + +`func (o *UnsealResponse) HasVersion() bool` + +HasVersion returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WrappingUnwrapRequest.md b/docs/UnwrapRequest.md similarity index 64% rename from docs/WrappingUnwrapRequest.md rename to docs/UnwrapRequest.md index 9394c123..75d6c0eb 100644 --- a/docs/WrappingUnwrapRequest.md +++ b/docs/UnwrapRequest.md @@ -1,4 +1,4 @@ -# WrappingUnwrapRequest +# UnwrapRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewWrappingUnwrapRequest +### NewUnwrapRequest -`func NewWrappingUnwrapRequest() *WrappingUnwrapRequest` +`func NewUnwrapRequest() *UnwrapRequest` -NewWrappingUnwrapRequest instantiates a new WrappingUnwrapRequest object +NewUnwrapRequest instantiates a new UnwrapRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewWrappingUnwrapRequestWithDefaults +### NewUnwrapRequestWithDefaults -`func NewWrappingUnwrapRequestWithDefaults() *WrappingUnwrapRequest` +`func NewUnwrapRequestWithDefaults() *UnwrapRequest` -NewWrappingUnwrapRequestWithDefaults instantiates a new WrappingUnwrapRequest object +NewUnwrapRequestWithDefaults instantiates a new UnwrapRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetToken -`func (o *WrappingUnwrapRequest) GetToken() string` +`func (o *UnwrapRequest) GetToken() string` GetToken returns the Token field if non-nil, zero value otherwise. ### GetTokenOk -`func (o *WrappingUnwrapRequest) GetTokenOk() (*string, bool)` +`func (o *UnwrapRequest) GetTokenOk() (*string, bool)` GetTokenOk returns a tuple with the Token field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetToken -`func (o *WrappingUnwrapRequest) SetToken(v string)` +`func (o *UnwrapRequest) SetToken(v string)` SetToken sets Token field to given value. ### HasToken -`func (o *WrappingUnwrapRequest) HasToken() bool` +`func (o *UnwrapRequest) HasToken() bool` HasToken returns a boolean if a field has been set. diff --git a/docs/UserpassWriteUserPasswordRequest.md b/docs/UserpassResetPasswordRequest.md similarity index 59% rename from docs/UserpassWriteUserPasswordRequest.md rename to docs/UserpassResetPasswordRequest.md index bf43d68d..da3ed869 100644 --- a/docs/UserpassWriteUserPasswordRequest.md +++ b/docs/UserpassResetPasswordRequest.md @@ -1,4 +1,4 @@ -# UserpassWriteUserPasswordRequest +# UserpassResetPasswordRequest ## Properties @@ -12,47 +12,47 @@ Name | Type | Description | Notes ## Methods -### NewUserpassWriteUserPasswordRequest +### NewUserpassResetPasswordRequest -`func NewUserpassWriteUserPasswordRequest() *UserpassWriteUserPasswordRequest` +`func NewUserpassResetPasswordRequest() *UserpassResetPasswordRequest` -NewUserpassWriteUserPasswordRequest instantiates a new UserpassWriteUserPasswordRequest object +NewUserpassResetPasswordRequest instantiates a new UserpassResetPasswordRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewUserpassWriteUserPasswordRequestWithDefaults +### NewUserpassResetPasswordRequestWithDefaults -`func NewUserpassWriteUserPasswordRequestWithDefaults() *UserpassWriteUserPasswordRequest` +`func NewUserpassResetPasswordRequestWithDefaults() *UserpassResetPasswordRequest` -NewUserpassWriteUserPasswordRequestWithDefaults instantiates a new UserpassWriteUserPasswordRequest object +NewUserpassResetPasswordRequestWithDefaults instantiates a new UserpassResetPasswordRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPassword -`func (o *UserpassWriteUserPasswordRequest) GetPassword() string` +`func (o *UserpassResetPasswordRequest) GetPassword() string` GetPassword returns the Password field if non-nil, zero value otherwise. ### GetPasswordOk -`func (o *UserpassWriteUserPasswordRequest) GetPasswordOk() (*string, bool)` +`func (o *UserpassResetPasswordRequest) GetPasswordOk() (*string, bool)` GetPasswordOk returns a tuple with the Password field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPassword -`func (o *UserpassWriteUserPasswordRequest) SetPassword(v string)` +`func (o *UserpassResetPasswordRequest) SetPassword(v string)` SetPassword sets Password field to given value. ### HasPassword -`func (o *UserpassWriteUserPasswordRequest) HasPassword() bool` +`func (o *UserpassResetPasswordRequest) HasPassword() bool` HasPassword returns a boolean if a field has been set. diff --git a/docs/UserpassWriteUserPoliciesRequest.md b/docs/UserpassUpdatePoliciesRequest.md similarity index 62% rename from docs/UserpassWriteUserPoliciesRequest.md rename to docs/UserpassUpdatePoliciesRequest.md index 10d7e174..a0b004c1 100644 --- a/docs/UserpassWriteUserPoliciesRequest.md +++ b/docs/UserpassUpdatePoliciesRequest.md @@ -1,4 +1,4 @@ -# UserpassWriteUserPoliciesRequest +# UserpassUpdatePoliciesRequest ## Properties @@ -13,47 +13,47 @@ Name | Type | Description | Notes ## Methods -### NewUserpassWriteUserPoliciesRequest +### NewUserpassUpdatePoliciesRequest -`func NewUserpassWriteUserPoliciesRequest() *UserpassWriteUserPoliciesRequest` +`func NewUserpassUpdatePoliciesRequest() *UserpassUpdatePoliciesRequest` -NewUserpassWriteUserPoliciesRequest instantiates a new UserpassWriteUserPoliciesRequest object +NewUserpassUpdatePoliciesRequest instantiates a new UserpassUpdatePoliciesRequest object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed -### NewUserpassWriteUserPoliciesRequestWithDefaults +### NewUserpassUpdatePoliciesRequestWithDefaults -`func NewUserpassWriteUserPoliciesRequestWithDefaults() *UserpassWriteUserPoliciesRequest` +`func NewUserpassUpdatePoliciesRequestWithDefaults() *UserpassUpdatePoliciesRequest` -NewUserpassWriteUserPoliciesRequestWithDefaults instantiates a new UserpassWriteUserPoliciesRequest object +NewUserpassUpdatePoliciesRequestWithDefaults instantiates a new UserpassUpdatePoliciesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set ### GetPolicies -`func (o *UserpassWriteUserPoliciesRequest) GetPolicies() []string` +`func (o *UserpassUpdatePoliciesRequest) GetPolicies() []string` GetPolicies returns the Policies field if non-nil, zero value otherwise. ### GetPoliciesOk -`func (o *UserpassWriteUserPoliciesRequest) GetPoliciesOk() (*[]string, bool)` +`func (o *UserpassUpdatePoliciesRequest) GetPoliciesOk() (*[]string, bool)` GetPoliciesOk returns a tuple with the Policies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetPolicies -`func (o *UserpassWriteUserPoliciesRequest) SetPolicies(v []string)` +`func (o *UserpassUpdatePoliciesRequest) SetPolicies(v []string)` SetPolicies sets Policies field to given value. ### HasPolicies -`func (o *UserpassWriteUserPoliciesRequest) HasPolicies() bool` +`func (o *UserpassUpdatePoliciesRequest) HasPolicies() bool` HasPolicies returns a boolean if a field has been set. @@ -62,27 +62,27 @@ HasPolicies returns a boolean if a field has been set. ### GetTokenPolicies -`func (o *UserpassWriteUserPoliciesRequest) GetTokenPolicies() []string` +`func (o *UserpassUpdatePoliciesRequest) GetTokenPolicies() []string` GetTokenPolicies returns the TokenPolicies field if non-nil, zero value otherwise. ### GetTokenPoliciesOk -`func (o *UserpassWriteUserPoliciesRequest) GetTokenPoliciesOk() (*[]string, bool)` +`func (o *UserpassUpdatePoliciesRequest) GetTokenPoliciesOk() (*[]string, bool)` GetTokenPoliciesOk returns a tuple with the TokenPolicies field if it's non-nil, zero value otherwise and a boolean to check if the value has been set. ### SetTokenPolicies -`func (o *UserpassWriteUserPoliciesRequest) SetTokenPolicies(v []string)` +`func (o *UserpassUpdatePoliciesRequest) SetTokenPolicies(v []string)` SetTokenPolicies sets TokenPolicies field to given value. ### HasTokenPolicies -`func (o *UserpassWriteUserPoliciesRequest) HasTokenPolicies() bool` +`func (o *UserpassUpdatePoliciesRequest) HasTokenPolicies() bool` HasTokenPolicies returns a boolean if a field has been set. diff --git a/docs/VersionHistoryResponse.md b/docs/VersionHistoryResponse.md new file mode 100644 index 00000000..a2203863 --- /dev/null +++ b/docs/VersionHistoryResponse.md @@ -0,0 +1,99 @@ +# VersionHistoryResponse + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**KeyInfo** | Pointer to **map[string]interface{}** | | [optional] +**Keys** | Pointer to **[]string** | | [optional] + + + +## Methods + + +### NewVersionHistoryResponse + +`func NewVersionHistoryResponse() *VersionHistoryResponse` + +NewVersionHistoryResponse instantiates a new VersionHistoryResponse object +This constructor will assign default values to properties that have it defined, +and makes sure properties required by API are set, but the set of arguments +will change when the set of required properties is changed + +### NewVersionHistoryResponseWithDefaults + +`func NewVersionHistoryResponseWithDefaults() *VersionHistoryResponse` + +NewVersionHistoryResponseWithDefaults instantiates a new VersionHistoryResponse object +This constructor will only assign default values to properties that have it defined, +but it doesn't guarantee that properties required by API are set + + +### GetKeyInfo + +`func (o *VersionHistoryResponse) GetKeyInfo() map[string]interface{}` + +GetKeyInfo returns the KeyInfo field if non-nil, zero value otherwise. + +### GetKeyInfoOk + +`func (o *VersionHistoryResponse) GetKeyInfoOk() (*map[string]interface{}, bool)` + +GetKeyInfoOk returns a tuple with the KeyInfo field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeyInfo + +`func (o *VersionHistoryResponse) SetKeyInfo(v map[string]interface{})` + +SetKeyInfo sets KeyInfo field to given value. + + +### HasKeyInfo + +`func (o *VersionHistoryResponse) HasKeyInfo() bool` + +HasKeyInfo returns a boolean if a field has been set. + + + + +### GetKeys + +`func (o *VersionHistoryResponse) GetKeys() []string` + +GetKeys returns the Keys field if non-nil, zero value otherwise. + +### GetKeysOk + +`func (o *VersionHistoryResponse) GetKeysOk() (*[]string, bool)` + +GetKeysOk returns a tuple with the Keys field if it's non-nil, zero value otherwise +and a boolean to check if the value has been set. + +### SetKeys + +`func (o *VersionHistoryResponse) SetKeys(v []string)` + +SetKeys sets Keys field to given value. + + +### HasKeys + +`func (o *VersionHistoryResponse) HasKeys() bool` + +HasKeys returns a boolean if a field has been set. + + + + + + + + + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/WriteRawPathRequest.md b/docs/WriteRawPathRequest.md deleted file mode 100644 index 342dc51a..00000000 --- a/docs/WriteRawPathRequest.md +++ /dev/null @@ -1,159 +0,0 @@ -# WriteRawPathRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Compressed** | Pointer to **bool** | | [optional] -**CompressionType** | Pointer to **string** | | [optional] -**Encoding** | Pointer to **string** | | [optional] -**Value** | Pointer to **string** | | [optional] - - - -## Methods - - -### NewWriteRawPathRequest - -`func NewWriteRawPathRequest() *WriteRawPathRequest` - -NewWriteRawPathRequest instantiates a new WriteRawPathRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewWriteRawPathRequestWithDefaults - -`func NewWriteRawPathRequestWithDefaults() *WriteRawPathRequest` - -NewWriteRawPathRequestWithDefaults instantiates a new WriteRawPathRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetCompressed - -`func (o *WriteRawPathRequest) GetCompressed() bool` - -GetCompressed returns the Compressed field if non-nil, zero value otherwise. - -### GetCompressedOk - -`func (o *WriteRawPathRequest) GetCompressedOk() (*bool, bool)` - -GetCompressedOk returns a tuple with the Compressed field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCompressed - -`func (o *WriteRawPathRequest) SetCompressed(v bool)` - -SetCompressed sets Compressed field to given value. - - -### HasCompressed - -`func (o *WriteRawPathRequest) HasCompressed() bool` - -HasCompressed returns a boolean if a field has been set. - - - - -### GetCompressionType - -`func (o *WriteRawPathRequest) GetCompressionType() string` - -GetCompressionType returns the CompressionType field if non-nil, zero value otherwise. - -### GetCompressionTypeOk - -`func (o *WriteRawPathRequest) GetCompressionTypeOk() (*string, bool)` - -GetCompressionTypeOk returns a tuple with the CompressionType field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCompressionType - -`func (o *WriteRawPathRequest) SetCompressionType(v string)` - -SetCompressionType sets CompressionType field to given value. - - -### HasCompressionType - -`func (o *WriteRawPathRequest) HasCompressionType() bool` - -HasCompressionType returns a boolean if a field has been set. - - - - -### GetEncoding - -`func (o *WriteRawPathRequest) GetEncoding() string` - -GetEncoding returns the Encoding field if non-nil, zero value otherwise. - -### GetEncodingOk - -`func (o *WriteRawPathRequest) GetEncodingOk() (*string, bool)` - -GetEncodingOk returns a tuple with the Encoding field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetEncoding - -`func (o *WriteRawPathRequest) SetEncoding(v string)` - -SetEncoding sets Encoding field to given value. - - -### HasEncoding - -`func (o *WriteRawPathRequest) HasEncoding() bool` - -HasEncoding returns a boolean if a field has been set. - - - - -### GetValue - -`func (o *WriteRawPathRequest) GetValue() string` - -GetValue returns the Value field if non-nil, zero value otherwise. - -### GetValueOk - -`func (o *WriteRawPathRequest) GetValueOk() (*string, bool)` - -GetValueOk returns a tuple with the Value field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetValue - -`func (o *WriteRawPathRequest) SetValue(v string)` - -SetValue sets Value field to given value. - - -### HasValue - -`func (o *WriteRawPathRequest) HasValue() bool` - -HasValue returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/WriteRawRequest.md b/docs/WriteRawRequest.md deleted file mode 100644 index 0e7a5989..00000000 --- a/docs/WriteRawRequest.md +++ /dev/null @@ -1,189 +0,0 @@ -# WriteRawRequest - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**Compressed** | Pointer to **bool** | | [optional] -**CompressionType** | Pointer to **string** | | [optional] -**Encoding** | Pointer to **string** | | [optional] -**Path** | Pointer to **string** | | [optional] -**Value** | Pointer to **string** | | [optional] - - - -## Methods - - -### NewWriteRawRequest - -`func NewWriteRawRequest() *WriteRawRequest` - -NewWriteRawRequest instantiates a new WriteRawRequest object -This constructor will assign default values to properties that have it defined, -and makes sure properties required by API are set, but the set of arguments -will change when the set of required properties is changed - -### NewWriteRawRequestWithDefaults - -`func NewWriteRawRequestWithDefaults() *WriteRawRequest` - -NewWriteRawRequestWithDefaults instantiates a new WriteRawRequest object -This constructor will only assign default values to properties that have it defined, -but it doesn't guarantee that properties required by API are set - - -### GetCompressed - -`func (o *WriteRawRequest) GetCompressed() bool` - -GetCompressed returns the Compressed field if non-nil, zero value otherwise. - -### GetCompressedOk - -`func (o *WriteRawRequest) GetCompressedOk() (*bool, bool)` - -GetCompressedOk returns a tuple with the Compressed field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCompressed - -`func (o *WriteRawRequest) SetCompressed(v bool)` - -SetCompressed sets Compressed field to given value. - - -### HasCompressed - -`func (o *WriteRawRequest) HasCompressed() bool` - -HasCompressed returns a boolean if a field has been set. - - - - -### GetCompressionType - -`func (o *WriteRawRequest) GetCompressionType() string` - -GetCompressionType returns the CompressionType field if non-nil, zero value otherwise. - -### GetCompressionTypeOk - -`func (o *WriteRawRequest) GetCompressionTypeOk() (*string, bool)` - -GetCompressionTypeOk returns a tuple with the CompressionType field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetCompressionType - -`func (o *WriteRawRequest) SetCompressionType(v string)` - -SetCompressionType sets CompressionType field to given value. - - -### HasCompressionType - -`func (o *WriteRawRequest) HasCompressionType() bool` - -HasCompressionType returns a boolean if a field has been set. - - - - -### GetEncoding - -`func (o *WriteRawRequest) GetEncoding() string` - -GetEncoding returns the Encoding field if non-nil, zero value otherwise. - -### GetEncodingOk - -`func (o *WriteRawRequest) GetEncodingOk() (*string, bool)` - -GetEncodingOk returns a tuple with the Encoding field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetEncoding - -`func (o *WriteRawRequest) SetEncoding(v string)` - -SetEncoding sets Encoding field to given value. - - -### HasEncoding - -`func (o *WriteRawRequest) HasEncoding() bool` - -HasEncoding returns a boolean if a field has been set. - - - - -### GetPath - -`func (o *WriteRawRequest) GetPath() string` - -GetPath returns the Path field if non-nil, zero value otherwise. - -### GetPathOk - -`func (o *WriteRawRequest) GetPathOk() (*string, bool)` - -GetPathOk returns a tuple with the Path field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetPath - -`func (o *WriteRawRequest) SetPath(v string)` - -SetPath sets Path field to given value. - - -### HasPath - -`func (o *WriteRawRequest) HasPath() bool` - -HasPath returns a boolean if a field has been set. - - - - -### GetValue - -`func (o *WriteRawRequest) GetValue() string` - -GetValue returns the Value field if non-nil, zero value otherwise. - -### GetValueOk - -`func (o *WriteRawRequest) GetValueOk() (*string, bool)` - -GetValueOk returns a tuple with the Value field if it's non-nil, zero value otherwise -and a boolean to check if the value has been set. - -### SetValue - -`func (o *WriteRawRequest) SetValue(v string)` - -SetValue sets Value field to given value. - - -### HasValue - -`func (o *WriteRawRequest) HasValue() bool` - -HasValue returns a boolean if a field has been set. - - - - - - - - - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/openapi.json b/openapi.json index 1ae98cf7..90d93f11 100644 --- a/openapi.json +++ b/openapi.json @@ -532,7 +532,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Authenticates an RAM entity with Vault.", - "operationId": "ali-cloud-log-in", + "operationId": "ali-cloud-login", "tags": [ "auth" ], @@ -540,7 +540,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AliCloudLoginRequest" + } } } }, @@ -638,7 +640,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AliCloudWriteAuthRoleRequest" + } } } }, @@ -718,7 +722,7 @@ ], "x-vault-unauthenticated": true, "post": { - "operationId": "app-role-log-in", + "operationId": "app-role-login", "tags": [ "auth" ], @@ -727,7 +731,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AppRoleLogInRequest" + "$ref": "#/components/schemas/AppRoleLoginRequest" } } } @@ -2385,7 +2389,7 @@ } ], "post": { - "operationId": "aws-rotate-auth-root-credentials", + "operationId": "aws-rotate-root-credentials", "tags": [ "auth" ], @@ -2928,7 +2932,7 @@ ], "x-vault-unauthenticated": true, "post": { - "operationId": "aws-log-in", + "operationId": "aws-login", "tags": [ "auth" ], @@ -2937,7 +2941,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/AwsLogInRequest" + "$ref": "#/components/schemas/AwsLoginRequest" } } } @@ -3515,7 +3519,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AzureConfigureAuthRequest" + } } } }, @@ -3553,7 +3559,7 @@ ], "x-vault-unauthenticated": true, "post": { - "operationId": "azure-log-in", + "operationId": "azure-login", "tags": [ "auth" ], @@ -3561,7 +3567,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AzureLoginRequest" + } } } }, @@ -3656,7 +3664,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AzureWriteAuthRoleRequest" + } } } }, @@ -3739,7 +3749,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/CentrifyConfigureRequest" + } } } }, @@ -3767,7 +3779,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "centrify-log-in", + "operationId": "centrify-login", "tags": [ "auth" ], @@ -3775,7 +3787,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/CentrifyLoginRequest" + } } } }, @@ -4076,7 +4090,7 @@ ], "x-vault-unauthenticated": true, "post": { - "operationId": "cert-log-in", + "operationId": "cert-login", "tags": [ "auth" ], @@ -4085,7 +4099,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/CertLogInRequest" + "$ref": "#/components/schemas/CertLoginRequest" } } } @@ -4131,7 +4145,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/CloudFoundryConfigureRequest" + } } } }, @@ -4169,7 +4185,7 @@ ], "x-vault-unauthenticated": true, "post": { - "operationId": "cloud-foundry-log-in", + "operationId": "cloud-foundry-login", "tags": [ "auth" ], @@ -4177,7 +4193,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/CloudFoundryLoginRequest" + } } } }, @@ -4272,7 +4290,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/CloudFoundryWriteRoleRequest" + } } } }, @@ -4328,7 +4348,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudConfigureAuthRequest" + } } } }, @@ -4355,7 +4377,7 @@ ], "x-vault-unauthenticated": true, "post": { - "operationId": "google-cloud-log-in", + "operationId": "google-cloud-login", "tags": [ "auth" ], @@ -4363,7 +4385,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudLoginRequest" + } } } }, @@ -4461,7 +4485,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudWriteRoleRequest" + } } } }, @@ -4517,7 +4543,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudEditLabelsForRoleRequest" + } } } }, @@ -4561,7 +4589,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudEditServiceAccountsForRoleRequest" + } } } }, @@ -4674,7 +4704,7 @@ ], "x-vault-unauthenticated": true, "post": { - "operationId": "github-log-in", + "operationId": "github-login", "tags": [ "auth" ], @@ -4683,7 +4713,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/GithubLogInRequest" + "$ref": "#/components/schemas/GithubLoginRequest" } } } @@ -4948,7 +4978,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/JwtConfigureRequest" + } } } }, @@ -4976,7 +5008,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Authenticates to Vault using a JWT (or OIDC) token.", - "operationId": "jwt-log-in", + "operationId": "jwt-login", "tags": [ "auth" ], @@ -4984,7 +5016,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/JwtLoginRequest" + } } } }, @@ -5019,7 +5053,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/JwtOidcRequestAuthorizationUrlRequest" + } } } }, @@ -5066,7 +5102,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/JwtOidcCallbackWithParametersRequest" + } } } }, @@ -5166,7 +5204,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/JwtWriteRoleRequest" + } } } }, @@ -5223,7 +5263,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KerberosConfigureRequest" + } } } }, @@ -5268,7 +5310,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KerberosConfigureLdapRequest" + } } } }, @@ -5362,7 +5406,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KerberosWriteGroupRequest" + } } } }, @@ -5399,7 +5445,7 @@ ], "x-vault-unauthenticated": true, "get": { - "operationId": "kerberos-log-in2", + "operationId": "kerberos-login2", "tags": [ "auth" ], @@ -5410,7 +5456,7 @@ } }, "post": { - "operationId": "kerberos-log-in", + "operationId": "kerberos-login", "tags": [ "auth" ], @@ -5418,7 +5464,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KerberosLoginRequest" + } } } }, @@ -5463,7 +5511,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KubernetesConfigureAuthRequest" + } } } }, @@ -5491,7 +5541,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Authenticates Kubernetes service accounts with Vault.", - "operationId": "kubernetes-log-in", + "operationId": "kubernetes-login", "tags": [ "auth" ], @@ -5499,7 +5549,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KubernetesLoginRequest" + } } } }, @@ -5605,7 +5657,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KubernetesWriteAuthRoleRequest" + } } } }, @@ -5823,7 +5877,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "ldap-log-in", + "operationId": "ldap-login", "tags": [ "auth" ], @@ -5832,7 +5886,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/LdapLogInRequest" + "$ref": "#/components/schemas/LdapLoginRequest" } } } @@ -5998,7 +6052,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/OciConfigureRequest" + } } } }, @@ -6061,7 +6117,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Authenticates to Vault using OCI credentials", - "operationId": "oci-log-in", + "operationId": "oci-login", "tags": [ "auth" ], @@ -6069,7 +6125,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/OciLoginRequest" + } } } }, @@ -6167,7 +6225,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/OciWriteRoleRequest" + } } } }, @@ -6386,7 +6446,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "okta-log-in", + "operationId": "okta-login", "tags": [ "auth" ], @@ -6395,7 +6455,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/OktaLogInRequest" + "$ref": "#/components/schemas/OktaLoginRequest" } } } @@ -6629,7 +6689,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "radius-log-in", + "operationId": "radius-login", "tags": [ "auth" ], @@ -6638,7 +6698,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RadiusLogInRequest" + "$ref": "#/components/schemas/RadiusLoginRequest" } } } @@ -6676,7 +6736,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "radius-log-in-with-username", + "operationId": "radius-login-with-username", "tags": [ "auth" ], @@ -6685,7 +6745,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/RadiusLogInWithUsernameRequest" + "$ref": "#/components/schemas/RadiusLoginWithUsernameRequest" } } } @@ -6843,7 +6903,7 @@ "x-vault-unauthenticated": true, "post": { "summary": "Log in with a username and password.", - "operationId": "userpass-log-in", + "operationId": "userpass-login", "tags": [ "auth" ], @@ -6852,7 +6912,7 @@ "content": { "application/json": { "schema": { - "$ref": "#/components/schemas/UserpassLogInRequest" + "$ref": "#/components/schemas/UserpassLoginRequest" } } } @@ -13480,7 +13540,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AliCloudConfigureRequest" + } } } }, @@ -13625,7 +13687,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AliCloudWriteRoleRequest" + } } } }, @@ -14029,7 +14093,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AzureConfigureRequest" + } } } }, @@ -14173,7 +14239,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/AzureWriteRoleRequest" + } } } }, @@ -14952,7 +15020,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudConfigureRequest" + } } } }, @@ -15073,7 +15143,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudWriteImpersonatedAccountRequest" + } } } }, @@ -15130,7 +15202,7 @@ } }, "post": { - "operationId": "google-cloud-generate-impersonated-account-access-token", + "operationId": "google-cloud-generate-impersonated-account-access-token2", "tags": [ "secrets" ], @@ -15156,7 +15228,7 @@ } ], "get": { - "operationId": "google-cloud-list-impersonated-accounts", + "operationId": "google-cloud-list-impersonated-accounts2", "tags": [ "secrets" ], @@ -15224,7 +15296,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudGenerateRolesetKeyWithParameters2Request" + } } } }, @@ -15319,7 +15393,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudWriteRolesetRequest" + } } } }, @@ -15454,7 +15530,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudGenerateRolesetKeyWithParametersRequest" + } } } }, @@ -15526,7 +15604,7 @@ } ], "get": { - "operationId": "google-cloud-list-rolesets", + "operationId": "google-cloud-list-rolesets2", "tags": [ "secrets" ], @@ -15635,7 +15713,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudWriteStaticAccountRequest" + } } } }, @@ -15700,7 +15780,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudGenerateStaticAccountKeyWithParametersRequest" + } } } }, @@ -15807,7 +15889,7 @@ } ], "get": { - "operationId": "google-cloud-list-static-accounts", + "operationId": "google-cloud-list-static-accounts2", "tags": [ "secrets" ], @@ -15913,7 +15995,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsConfigureRequest" + } } } }, @@ -15968,7 +16052,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsDecryptRequest" + } } } }, @@ -16012,7 +16098,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsEncryptRequest" + } } } }, @@ -16108,7 +16196,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsConfigureKeyRequest" + } } } }, @@ -16198,7 +16288,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsRegisterKeyRequest" + } } } }, @@ -16338,7 +16430,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsWriteKeyRequest" + } } } }, @@ -16430,7 +16524,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsReencryptRequest" + } } } }, @@ -16474,7 +16570,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsSignRequest" + } } } }, @@ -16518,7 +16616,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/GoogleCloudKmsVerifyRequest" + } } } }, @@ -16589,7 +16689,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KubernetesConfigureRequest" + } } } }, @@ -16643,7 +16745,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KubernetesGenerateCredentialsRequest" + } } } }, @@ -16738,7 +16842,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/KubernetesWriteRoleRequest" + } } } }, @@ -17277,7 +17383,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/LdapConfigureRequest" + } } } }, @@ -17407,7 +17515,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/LdapLibraryForceCheckInRequest" + } } } }, @@ -17464,7 +17574,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/LdapLibraryConfigureRequest" + } } } }, @@ -17520,7 +17632,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/LdapLibraryCheckInRequest" + } } } }, @@ -17564,7 +17678,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/LdapLibraryCheckOutRequest" + } } } }, @@ -17695,7 +17811,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/LdapWriteDynamicRoleRequest" + } } } }, @@ -17767,7 +17885,7 @@ } ], "post": { - "operationId": "ldap-rotate-root", + "operationId": "ldap-rotate-root-credentials", "tags": [ "secrets" ], @@ -17897,7 +18015,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/LdapWriteStaticRoleRequest" + } } } }, @@ -17953,7 +18073,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/MongoDbAtlasConfigureRequest" + } } } }, @@ -18096,7 +18218,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/MongoDbAtlasWriteRoleRequest" + } } } }, @@ -22694,7 +22818,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/TerraformCloudConfigureRequest" + } } } }, @@ -22845,7 +22971,9 @@ "required": true, "content": { "application/json": { - "schema": {} + "schema": { + "$ref": "#/components/schemas/TerraformCloudWriteRoleRequest" + } } } }, @@ -24528,7 +24656,7 @@ } } }, - "AliCloudLogInRequest": { + "AliCloudLoginRequest": { "type": "object", "properties": { "identity_request_headers": { @@ -24591,6 +24719,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -24645,6 +24774,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -24790,7 +24920,7 @@ } } }, - "AppRoleLogInRequest": { + "AppRoleLoginRequest": { "type": "object", "properties": { "role_id": { @@ -24804,7 +24934,7 @@ } } }, - "AppRoleLogInResponse": { + "AppRoleLoginResponse": { "type": "object", "properties": { "role": { @@ -25351,6 +25481,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -25405,6 +25536,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -26105,7 +26237,7 @@ } } }, - "AwsLogInRequest": { + "AwsLoginRequest": { "type": "object", "properties": { "iam_http_request_method": { @@ -26221,6 +26353,9 @@ "description": "If set, defines a constraint on the EC2 instances to have one of the given instance IDs. Can be a list or comma-separated string of EC2 instance IDs. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "If set, defines a constraint on the EC2 instances to have one of the given instance IDs. A list of EC2 instance IDs. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance." } }, "bound_iam_instance_profile_arn": { @@ -26316,6 +26451,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -26370,6 +26506,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -26607,7 +26744,7 @@ } } }, - "AzureLogInRequest": { + "AzureLoginRequest": { "type": "object", "properties": { "jwt": { @@ -26718,6 +26855,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -26772,6 +26910,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -26879,6 +27018,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -26906,6 +27046,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -26929,7 +27070,7 @@ } } }, - "CentrifyLogInRequest": { + "CentrifyLoginRequest": { "type": "object", "properties": { "mode": { @@ -26967,7 +27108,7 @@ } } }, - "CertLogInRequest": { + "CertLoginRequest": { "type": "object", "properties": { "name": { @@ -26986,6 +27127,7 @@ "type": "string" }, "x-vault-displayAttrs": { + "description": "A list of names. At least one must exist in the Common Name. Supports globbing.", "group": "Constraints" } }, @@ -26997,6 +27139,7 @@ }, "x-vault-displayAttrs": { "name": "Allowed DNS SANs", + "description": "A list of DNS names. At least one must exist in the SANs. Supports globbing.", "group": "Constraints" } }, @@ -27008,6 +27151,7 @@ }, "x-vault-displayAttrs": { "name": "Allowed Email SANs", + "description": "A list of Email Addresses. At least one must exist in the SANs. Supports globbing.", "group": "Constraints" } }, @@ -27016,6 +27160,9 @@ "description": "A comma-separated string or array of oid extensions. Upon successful authentication, these extensions will be added as metadata if they are present in the certificate. The metadata key will be the string consisting of the oid numbers separated by a dash (-) instead of a dot (.) to allow usage in ACL templates.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of OID extensions. Upon successful authentication, these extensions will be added as metadata if they are present in the certificate. The metadata key will be the string consisting of the OID numbers separated by a dash (-) instead of a dot (.) to allow usage in ACL templates." } }, "allowed_names": { @@ -27025,6 +27172,7 @@ "type": "string" }, "x-vault-displayAttrs": { + "description": "A list of names. At least one must exist in either the Common Name or SANs. Supports globbing. This parameter is deprecated, please use allowed_common_names, allowed_dns_sans, allowed_email_sans, allowed_uri_sans.", "group": "Constraints" } }, @@ -27035,6 +27183,7 @@ "type": "string" }, "x-vault-displayAttrs": { + "description": "A list of Organizational Units names. At least one must exist in the OU field.", "group": "Constraints" } }, @@ -27046,6 +27195,7 @@ }, "x-vault-displayAttrs": { "name": "Allowed URI SANs", + "description": "A list of URIs. At least one must exist in the SANs. Supports globbing.", "group": "Constraints" } }, @@ -27105,6 +27255,9 @@ "description": "A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected." } }, "period": { @@ -27126,6 +27279,9 @@ "description": "A comma-separated string or array of extensions formatted as \"oid:value\". Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on \"value\".", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of extensions formatted as 'oid:value'. Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on 'value'." } }, "token_bound_cidrs": { @@ -27136,6 +27292,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -27190,6 +27347,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -27373,7 +27531,7 @@ } } }, - "CloudFoundryLogInRequest": { + "CloudFoundryLoginRequest": { "type": "object", "properties": { "cf_instance_cert": { @@ -27408,10 +27566,10 @@ } }, "required": [ + "role", "cf_instance_cert", "signing_time", - "signature", - "role" + "signature" ] }, "CloudFoundryWriteRoleRequest": { @@ -27506,6 +27664,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -27560,6 +27719,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -28341,6 +28501,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -28395,6 +28556,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -28427,7 +28589,7 @@ "organization" ] }, - "GithubLogInRequest": { + "GithubLoginRequest": { "type": "object", "properties": { "token": { @@ -28790,7 +28952,7 @@ } } }, - "GoogleCloudLogInRequest": { + "GoogleCloudLoginRequest": { "type": "object", "properties": { "jwt": { @@ -28936,6 +29098,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -28990,6 +29153,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -29540,7 +29704,7 @@ } } }, - "JwtLogInRequest": { + "JwtLoginRequest": { "type": "object", "properties": { "jwt": { @@ -29704,6 +29868,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -29758,6 +29923,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -29852,6 +30018,12 @@ "editType": "file" } }, + "connection_timeout": { + "type": "integer", + "description": "Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration.", + "format": "seconds", + "default": "30s" + }, "deny_null_bind": { "type": "boolean", "description": "Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true", @@ -29906,6 +30078,11 @@ "name": "Insecure TLS" } }, + "max_page_size": { + "type": "integer", + "description": "The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged.", + "default": 2147483647 + }, "request_timeout": { "type": "integer", "description": "Timeout, in seconds, for the connection when making requests against the server before returning back an error.", @@ -29955,6 +30132,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -30009,6 +30187,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -30109,7 +30288,7 @@ } } }, - "KerberosLogInRequest": { + "KerberosLoginRequest": { "type": "object", "properties": { "authorization": { @@ -30250,7 +30429,7 @@ "kubernetes_namespace" ] }, - "KubernetesLogInRequest": { + "KubernetesLoginRequest": { "type": "object", "properties": { "jwt": { @@ -30330,6 +30509,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -30384,6 +30564,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -30819,6 +31000,11 @@ "name": "Insecure TLS" } }, + "max_page_size": { + "type": "integer", + "description": "The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged.", + "default": 2147483647 + }, "request_timeout": { "type": "integer", "description": "Timeout, in seconds, for the connection when making requests against the server before returning back an error.", @@ -30868,6 +31054,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -30922,6 +31109,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -31051,6 +31239,12 @@ "editType": "file" } }, + "connection_timeout": { + "type": "integer", + "description": "Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration.", + "format": "seconds", + "default": "30s" + }, "deny_null_bind": { "type": "boolean", "description": "Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true", @@ -31110,6 +31304,11 @@ "description": "The desired length of passwords that Vault generates.", "deprecated": true }, + "max_page_size": { + "type": "integer", + "description": "The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged.", + "default": 2147483647 + }, "max_ttl": { "type": "integer", "description": "The maximum password time-to-live.", @@ -31288,7 +31487,7 @@ } } }, - "LdapLogInRequest": { + "LdapLoginRequest": { "type": "object", "properties": { "password": { @@ -31340,6 +31539,9 @@ "description": "Comma-separated list of policies associated to the group.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of policies associated to the group." } } } @@ -31370,6 +31572,9 @@ "description": "Comma-separated list of additional groups associated with the user.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of additional groups associated with the user." } }, "policies": { @@ -31377,6 +31582,9 @@ "description": "Comma-separated list of policies associated with the user.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of policies associated with the user." } } } @@ -32323,7 +32531,7 @@ } } }, - "OciLogInRequest": { + "OciLoginRequest": { "type": "object", "properties": { "request_headers": { @@ -32350,6 +32558,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -32404,6 +32613,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -32491,10 +32701,10 @@ } }, "required": [ - "scope", - "response_type", "client_id", - "redirect_uri" + "response_type", + "redirect_uri", + "scope" ] }, "OidcProviderTokenRequest": { @@ -32752,6 +32962,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -32806,6 +33017,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -32835,7 +33047,7 @@ } } }, - "OktaLogInRequest": { + "OktaLoginRequest": { "type": "object", "properties": { "nonce": { @@ -32864,6 +33076,9 @@ "description": "Comma-separated list of policies associated to the group.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of policies associated to the group." } } } @@ -40387,6 +40602,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -40441,6 +40657,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, @@ -40464,15 +40681,16 @@ }, "unregistered_user_policies": { "type": "string", - "description": "Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: empty)", + "description": "Comma-separated list of policies to grant upon successful RADIUS authentication of an unregistered user (default: empty)", "default": "", "x-vault-displayAttrs": { - "name": "Policies for unregistered users" + "name": "Policies for unregistered users", + "description": "List of policies to grant upon successful RADIUS authentication of an unregistered user (default: empty)" } } } }, - "RadiusLogInRequest": { + "RadiusLoginRequest": { "type": "object", "properties": { "password": { @@ -40489,7 +40707,7 @@ } } }, - "RadiusLogInWithUsernameRequest": { + "RadiusLoginWithUsernameRequest": { "type": "object", "properties": { "password": { @@ -40510,6 +40728,9 @@ "description": "Comma-separated list of policies associated to the user.", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of policies associated to the user." } } } @@ -41963,6 +42184,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -42936,7 +43158,7 @@ } } }, - "UserpassLogInRequest": { + "UserpassLoginRequest": { "type": "object", "properties": { "password": { @@ -42970,6 +43192,9 @@ "description": "Comma-separated list of policies", "items": { "type": "string" + }, + "x-vault-displayAttrs": { + "description": "A list of policies that will apply to the generated token for this user." } } } @@ -43014,6 +43239,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Bound CIDRs", + "description": "A list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token.", "group": "Tokens" } }, @@ -43068,6 +43294,7 @@ }, "x-vault-displayAttrs": { "name": "Generated Token's Policies", + "description": "A list of policies that will apply to the generated token for this user.", "group": "Tokens" } }, diff --git a/schema/model_active_directory_check_in_library_request.go b/schema/model_active_directory_check_in_library_request.go deleted file mode 100644 index 616756d2..00000000 --- a/schema/model_active_directory_check_in_library_request.go +++ /dev/null @@ -1,33 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// ActiveDirectoryCheckInLibraryRequest struct for ActiveDirectoryCheckInLibraryRequest -type ActiveDirectoryCheckInLibraryRequest struct { - // The username/logon name for the service accounts to check in. - ServiceAccountNames []string `json:"service_account_names"` -} - -// NewActiveDirectoryCheckInLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckInLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewActiveDirectoryCheckInLibraryRequestWithDefaults() *ActiveDirectoryCheckInLibraryRequest { - var this ActiveDirectoryCheckInLibraryRequest - - return &this -} - -func (o ActiveDirectoryCheckInLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["service_account_names"] = o.ServiceAccountNames - - return json.Marshal(toSerialize) -} diff --git a/schema/model_active_directory_check_in_manage_library_request.go b/schema/model_active_directory_check_in_manage_library_request.go deleted file mode 100644 index eadc0ad1..00000000 --- a/schema/model_active_directory_check_in_manage_library_request.go +++ /dev/null @@ -1,33 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// ActiveDirectoryCheckInManageLibraryRequest struct for ActiveDirectoryCheckInManageLibraryRequest -type ActiveDirectoryCheckInManageLibraryRequest struct { - // The username/logon name for the service accounts to check in. - ServiceAccountNames []string `json:"service_account_names"` -} - -// NewActiveDirectoryCheckInManageLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckInManageLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewActiveDirectoryCheckInManageLibraryRequestWithDefaults() *ActiveDirectoryCheckInManageLibraryRequest { - var this ActiveDirectoryCheckInManageLibraryRequest - - return &this -} - -func (o ActiveDirectoryCheckInManageLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["service_account_names"] = o.ServiceAccountNames - - return json.Marshal(toSerialize) -} diff --git a/schema/model_active_directory_check_out_library_request.go b/schema/model_active_directory_check_out_library_request.go deleted file mode 100644 index 243833ab..00000000 --- a/schema/model_active_directory_check_out_library_request.go +++ /dev/null @@ -1,33 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// ActiveDirectoryCheckOutLibraryRequest struct for ActiveDirectoryCheckOutLibraryRequest -type ActiveDirectoryCheckOutLibraryRequest struct { - // The length of time before the check-out will expire, in seconds. - Ttl int32 `json:"ttl"` -} - -// NewActiveDirectoryCheckOutLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckOutLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewActiveDirectoryCheckOutLibraryRequestWithDefaults() *ActiveDirectoryCheckOutLibraryRequest { - var this ActiveDirectoryCheckOutLibraryRequest - - return &this -} - -func (o ActiveDirectoryCheckOutLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["ttl"] = o.Ttl - - return json.Marshal(toSerialize) -} diff --git a/schema/model_active_directory_write_config_request.go b/schema/model_active_directory_write_config_request.go deleted file mode 100644 index 18604d15..00000000 --- a/schema/model_active_directory_write_config_request.go +++ /dev/null @@ -1,169 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// ActiveDirectoryWriteConfigRequest struct for ActiveDirectoryWriteConfigRequest -type ActiveDirectoryWriteConfigRequest struct { - // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). - AnonymousGroupSearch bool `json:"anonymous_group_search"` - - // LDAP DN for searching for the user DN (optional) - Binddn string `json:"binddn"` - - // LDAP password for searching for the user DN (optional) - Bindpass string `json:"bindpass"` - - // If true, case sensitivity will be used when comparing usernames and groups for matching policies. - CaseSensitiveNames bool `json:"case_sensitive_names"` - - // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) - Certificate string `json:"certificate"` - - // Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) - ClientTlsCert string `json:"client_tls_cert"` - - // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) - ClientTlsKey string `json:"client_tls_key"` - - // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true - DenyNullBind bool `json:"deny_null_bind"` - - // Use anonymous bind to discover the bind DN of a user (optional) - Discoverdn bool `json:"discoverdn"` - - // Text to insert the password into, ex. \"customPrefix{{PASSWORD}}customSuffix\". - // Deprecated - Formatter string `json:"formatter"` - - // LDAP attribute to follow on objects returned by in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn - Groupattr string `json:"groupattr"` - - // LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) - Groupdn string `json:"groupdn"` - - // Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) - Groupfilter string `json:"groupfilter"` - - // Skip LDAP server SSL Certificate verification - VERY insecure (optional) - InsecureTls bool `json:"insecure_tls"` - - // The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. - LastRotationTolerance int32 `json:"last_rotation_tolerance"` - - // The desired length of passwords that Vault generates. - // Deprecated - Length int32 `json:"length"` - - // In seconds, the maximum password time-to-live. - MaxTtl int32 `json:"max_ttl"` - - // Name of the password policy to use to generate passwords. - PasswordPolicy string `json:"password_policy"` - - // Timeout, in seconds, for the connection when making requests against the server before returning back an error. - RequestTimeout int32 `json:"request_timeout"` - - // Issue a StartTLS command after establishing unencrypted connection (optional) - Starttls bool `json:"starttls"` - - // Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' - TlsMaxVersion string `json:"tls_max_version"` - - // Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' - TlsMinVersion string `json:"tls_min_version"` - - // In seconds, the default password time-to-live. - Ttl int32 `json:"ttl"` - - // Enables userPrincipalDomain login with [username]@UPNDomain (optional) - Upndomain string `json:"upndomain"` - - // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. - Url string `json:"url"` - - // In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. - UsePre111GroupCnBehavior bool `json:"use_pre111_group_cn_behavior"` - - // If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. - UseTokenGroups bool `json:"use_token_groups"` - - // Attribute used for users (default: cn) - Userattr string `json:"userattr"` - - // LDAP domain to use for users (eg: ou=People,dc=example,dc=org) - Userdn string `json:"userdn"` - - // Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) - Userfilter string `json:"userfilter"` - - // If true, sets the alias name to the username - UsernameAsAlias bool `json:"username_as_alias"` -} - -// NewActiveDirectoryWriteConfigRequestWithDefaults instantiates a new ActiveDirectoryWriteConfigRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewActiveDirectoryWriteConfigRequestWithDefaults() *ActiveDirectoryWriteConfigRequest { - var this ActiveDirectoryWriteConfigRequest - - this.AnonymousGroupSearch = false - this.DenyNullBind = true - this.Groupattr = "cn" - this.Groupfilter = "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))" - this.LastRotationTolerance = 5 - this.Length = 64 - this.TlsMaxVersion = "tls12" - this.TlsMinVersion = "tls12" - this.Url = "ldap://127.0.0.1" - this.UseTokenGroups = false - this.Userattr = "cn" - this.Userfilter = "({{.UserAttr}}={{.Username}})" - this.UsernameAsAlias = false - - return &this -} - -func (o ActiveDirectoryWriteConfigRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["anonymous_group_search"] = o.AnonymousGroupSearch - toSerialize["binddn"] = o.Binddn - toSerialize["bindpass"] = o.Bindpass - toSerialize["case_sensitive_names"] = o.CaseSensitiveNames - toSerialize["certificate"] = o.Certificate - toSerialize["client_tls_cert"] = o.ClientTlsCert - toSerialize["client_tls_key"] = o.ClientTlsKey - toSerialize["deny_null_bind"] = o.DenyNullBind - toSerialize["discoverdn"] = o.Discoverdn - toSerialize["formatter"] = o.Formatter - toSerialize["groupattr"] = o.Groupattr - toSerialize["groupdn"] = o.Groupdn - toSerialize["groupfilter"] = o.Groupfilter - toSerialize["insecure_tls"] = o.InsecureTls - toSerialize["last_rotation_tolerance"] = o.LastRotationTolerance - toSerialize["length"] = o.Length - toSerialize["max_ttl"] = o.MaxTtl - toSerialize["password_policy"] = o.PasswordPolicy - toSerialize["request_timeout"] = o.RequestTimeout - toSerialize["starttls"] = o.Starttls - toSerialize["tls_max_version"] = o.TlsMaxVersion - toSerialize["tls_min_version"] = o.TlsMinVersion - toSerialize["ttl"] = o.Ttl - toSerialize["upndomain"] = o.Upndomain - toSerialize["url"] = o.Url - toSerialize["use_pre111_group_cn_behavior"] = o.UsePre111GroupCnBehavior - toSerialize["use_token_groups"] = o.UseTokenGroups - toSerialize["userattr"] = o.Userattr - toSerialize["userdn"] = o.Userdn - toSerialize["userfilter"] = o.Userfilter - toSerialize["username_as_alias"] = o.UsernameAsAlias - - return json.Marshal(toSerialize) -} diff --git a/schema/model_active_directory_write_library_request.go b/schema/model_active_directory_write_library_request.go deleted file mode 100644 index a4130899..00000000 --- a/schema/model_active_directory_write_library_request.go +++ /dev/null @@ -1,49 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// ActiveDirectoryWriteLibraryRequest struct for ActiveDirectoryWriteLibraryRequest -type ActiveDirectoryWriteLibraryRequest struct { - // Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. - DisableCheckInEnforcement bool `json:"disable_check_in_enforcement"` - - // In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours. - MaxTtl int32 `json:"max_ttl"` - - // The username/logon name for the service accounts with which this set will be associated. - ServiceAccountNames []string `json:"service_account_names"` - - // In seconds, the amount of time a check-out should last. Defaults to 24 hours. - Ttl int32 `json:"ttl"` -} - -// NewActiveDirectoryWriteLibraryRequestWithDefaults instantiates a new ActiveDirectoryWriteLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewActiveDirectoryWriteLibraryRequestWithDefaults() *ActiveDirectoryWriteLibraryRequest { - var this ActiveDirectoryWriteLibraryRequest - - this.DisableCheckInEnforcement = false - this.MaxTtl = 86400 - this.Ttl = 86400 - - return &this -} - -func (o ActiveDirectoryWriteLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["disable_check_in_enforcement"] = o.DisableCheckInEnforcement - toSerialize["max_ttl"] = o.MaxTtl - toSerialize["service_account_names"] = o.ServiceAccountNames - toSerialize["ttl"] = o.Ttl - - return json.Marshal(toSerialize) -} diff --git a/schema/model_active_directory_write_role_request.go b/schema/model_active_directory_write_role_request.go deleted file mode 100644 index e8d50871..00000000 --- a/schema/model_active_directory_write_role_request.go +++ /dev/null @@ -1,37 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// ActiveDirectoryWriteRoleRequest struct for ActiveDirectoryWriteRoleRequest -type ActiveDirectoryWriteRoleRequest struct { - // The username/logon name for the service account with which this role will be associated. - ServiceAccountName string `json:"service_account_name"` - - // In seconds, the default password time-to-live. - Ttl int32 `json:"ttl"` -} - -// NewActiveDirectoryWriteRoleRequestWithDefaults instantiates a new ActiveDirectoryWriteRoleRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewActiveDirectoryWriteRoleRequestWithDefaults() *ActiveDirectoryWriteRoleRequest { - var this ActiveDirectoryWriteRoleRequest - - return &this -} - -func (o ActiveDirectoryWriteRoleRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["service_account_name"] = o.ServiceAccountName - toSerialize["ttl"] = o.Ttl - - return json.Marshal(toSerialize) -} diff --git a/schema/model_ali_cloud_write_config_request.go b/schema/model_ali_cloud_configure_request.go similarity index 64% rename from schema/model_ali_cloud_write_config_request.go rename to schema/model_ali_cloud_configure_request.go index 6f3fc1a9..d7a5ff56 100644 --- a/schema/model_ali_cloud_write_config_request.go +++ b/schema/model_ali_cloud_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AliCloudWriteConfigRequest struct for AliCloudWriteConfigRequest -type AliCloudWriteConfigRequest struct { +// AliCloudConfigureRequest struct for AliCloudConfigureRequest +type AliCloudConfigureRequest struct { // Access key with appropriate permissions. AccessKey string `json:"access_key"` @@ -18,16 +18,16 @@ type AliCloudWriteConfigRequest struct { SecretKey string `json:"secret_key"` } -// NewAliCloudWriteConfigRequestWithDefaults instantiates a new AliCloudWriteConfigRequest object +// NewAliCloudConfigureRequestWithDefaults instantiates a new AliCloudConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAliCloudWriteConfigRequestWithDefaults() *AliCloudWriteConfigRequest { - var this AliCloudWriteConfigRequest +func NewAliCloudConfigureRequestWithDefaults() *AliCloudConfigureRequest { + var this AliCloudConfigureRequest return &this } -func (o AliCloudWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o AliCloudConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["access_key"] = o.AccessKey diff --git a/schema/model_alias_write_request.go b/schema/model_alias_create_request.go similarity index 77% rename from schema/model_alias_write_request.go rename to schema/model_alias_create_request.go index 645c9250..f745bfce 100644 --- a/schema/model_alias_write_request.go +++ b/schema/model_alias_create_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AliasWriteRequest struct for AliasWriteRequest -type AliasWriteRequest struct { +// AliasCreateRequest struct for AliasCreateRequest +type AliasCreateRequest struct { // Entity ID to which this alias belongs to CanonicalId string `json:"canonical_id"` @@ -27,16 +27,16 @@ type AliasWriteRequest struct { Name string `json:"name"` } -// NewAliasWriteRequestWithDefaults instantiates a new AliasWriteRequest object +// NewAliasCreateRequestWithDefaults instantiates a new AliasCreateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAliasWriteRequestWithDefaults() *AliasWriteRequest { - var this AliasWriteRequest +func NewAliasCreateRequestWithDefaults() *AliasCreateRequest { + var this AliasCreateRequest return &this } -func (o AliasWriteRequest) MarshalJSON() ([]byte, error) { +func (o AliasCreateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["canonical_id"] = o.CanonicalId diff --git a/schema/model_alias_write_by_id_request.go b/schema/model_alias_update_by_id_request.go similarity index 74% rename from schema/model_alias_write_by_id_request.go rename to schema/model_alias_update_by_id_request.go index 0eadecca..24278cd4 100644 --- a/schema/model_alias_write_by_id_request.go +++ b/schema/model_alias_update_by_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AliasWriteByIDRequest struct for AliasWriteByIDRequest -type AliasWriteByIDRequest struct { +// AliasUpdateByIdRequest struct for AliasUpdateByIdRequest +type AliasUpdateByIdRequest struct { // Entity ID to which this alias should be tied to CanonicalId string `json:"canonical_id"` @@ -24,16 +24,16 @@ type AliasWriteByIDRequest struct { Name string `json:"name"` } -// NewAliasWriteByIDRequestWithDefaults instantiates a new AliasWriteByIDRequest object +// NewAliasUpdateByIdRequestWithDefaults instantiates a new AliasUpdateByIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAliasWriteByIDRequestWithDefaults() *AliasWriteByIDRequest { - var this AliasWriteByIDRequest +func NewAliasUpdateByIdRequestWithDefaults() *AliasUpdateByIdRequest { + var this AliasUpdateByIdRequest return &this } -func (o AliasWriteByIDRequest) MarshalJSON() ([]byte, error) { +func (o AliasUpdateByIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["canonical_id"] = o.CanonicalId diff --git a/schema/model_app_role_write_secret_id_accessor_lookup_request.go b/schema/model_app_role_destroy_secret_id_by_accessor_request.go similarity index 53% rename from schema/model_app_role_write_secret_id_accessor_lookup_request.go rename to schema/model_app_role_destroy_secret_id_by_accessor_request.go index b02f16c1..9da5e398 100644 --- a/schema/model_app_role_write_secret_id_accessor_lookup_request.go +++ b/schema/model_app_role_destroy_secret_id_by_accessor_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDAccessorLookupRequest struct for AppRoleWriteSecretIDAccessorLookupRequest -type AppRoleWriteSecretIDAccessorLookupRequest struct { +// AppRoleDestroySecretIdByAccessorRequest struct for AppRoleDestroySecretIdByAccessorRequest +type AppRoleDestroySecretIdByAccessorRequest struct { // Accessor of the SecretID SecretIdAccessor string `json:"secret_id_accessor"` } -// NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults instantiates a new AppRoleWriteSecretIDAccessorLookupRequest object +// NewAppRoleDestroySecretIdByAccessorRequestWithDefaults instantiates a new AppRoleDestroySecretIdByAccessorRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults() *AppRoleWriteSecretIDAccessorLookupRequest { - var this AppRoleWriteSecretIDAccessorLookupRequest +func NewAppRoleDestroySecretIdByAccessorRequestWithDefaults() *AppRoleDestroySecretIdByAccessorRequest { + var this AppRoleDestroySecretIdByAccessorRequest return &this } -func (o AppRoleWriteSecretIDAccessorLookupRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleDestroySecretIdByAccessorRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_accessor"] = o.SecretIdAccessor diff --git a/schema/model_app_role_write_secret_id_lookup_request.go b/schema/model_app_role_destroy_secret_id_request.go similarity index 55% rename from schema/model_app_role_write_secret_id_lookup_request.go rename to schema/model_app_role_destroy_secret_id_request.go index 6363511d..e04e7a73 100644 --- a/schema/model_app_role_write_secret_id_lookup_request.go +++ b/schema/model_app_role_destroy_secret_id_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDLookupRequest struct for AppRoleWriteSecretIDLookupRequest -type AppRoleWriteSecretIDLookupRequest struct { +// AppRoleDestroySecretIdRequest struct for AppRoleDestroySecretIdRequest +type AppRoleDestroySecretIdRequest struct { // SecretID attached to the role. SecretId string `json:"secret_id"` } -// NewAppRoleWriteSecretIDLookupRequestWithDefaults instantiates a new AppRoleWriteSecretIDLookupRequest object +// NewAppRoleDestroySecretIdRequestWithDefaults instantiates a new AppRoleDestroySecretIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDLookupRequestWithDefaults() *AppRoleWriteSecretIDLookupRequest { - var this AppRoleWriteSecretIDLookupRequest +func NewAppRoleDestroySecretIdRequestWithDefaults() *AppRoleDestroySecretIdRequest { + var this AppRoleDestroySecretIdRequest return &this } -func (o AppRoleWriteSecretIDLookupRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleDestroySecretIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id"] = o.SecretId diff --git a/schema/model_app_role_list_secret_ids_response.go b/schema/model_app_role_list_secret_ids_response.go new file mode 100644 index 00000000..c0f5ee77 --- /dev/null +++ b/schema/model_app_role_list_secret_ids_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// AppRoleListSecretIdsResponse struct for AppRoleListSecretIdsResponse +type AppRoleListSecretIdsResponse struct { + Keys []string `json:"keys"` +} + +// NewAppRoleListSecretIdsResponseWithDefaults instantiates a new AppRoleListSecretIdsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewAppRoleListSecretIdsResponseWithDefaults() *AppRoleListSecretIdsResponse { + var this AppRoleListSecretIdsResponse + + return &this +} + +func (o AppRoleListSecretIdsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_oidc_login_request.go b/schema/model_app_role_login_response.go similarity index 55% rename from schema/model_oidc_login_request.go rename to schema/model_app_role_login_response.go index 96cd7f18..4eca989d 100644 --- a/schema/model_oidc_login_request.go +++ b/schema/model_app_role_login_response.go @@ -9,28 +9,23 @@ import ( "encoding/json" ) -// OIDCLoginRequest struct for OIDCLoginRequest -type OIDCLoginRequest struct { - // The signed JWT to validate. - Jwt string `json:"jwt"` - - // The role to log in against. +// AppRoleLoginResponse struct for AppRoleLoginResponse +type AppRoleLoginResponse struct { Role string `json:"role"` } -// NewOIDCLoginRequestWithDefaults instantiates a new OIDCLoginRequest object +// NewAppRoleLoginResponseWithDefaults instantiates a new AppRoleLoginResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCLoginRequestWithDefaults() *OIDCLoginRequest { - var this OIDCLoginRequest +func NewAppRoleLoginResponseWithDefaults() *AppRoleLoginResponse { + var this AppRoleLoginResponse return &this } -func (o OIDCLoginRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleLoginResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) - toSerialize["jwt"] = o.Jwt toSerialize["role"] = o.Role return json.Marshal(toSerialize) diff --git a/schema/model_app_role_write_secret_id_accessor_destroy_request.go b/schema/model_app_role_look_up_secret_id_by_accessor_request.go similarity index 53% rename from schema/model_app_role_write_secret_id_accessor_destroy_request.go rename to schema/model_app_role_look_up_secret_id_by_accessor_request.go index 6648b3a0..449d15d2 100644 --- a/schema/model_app_role_write_secret_id_accessor_destroy_request.go +++ b/schema/model_app_role_look_up_secret_id_by_accessor_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDAccessorDestroyRequest struct for AppRoleWriteSecretIDAccessorDestroyRequest -type AppRoleWriteSecretIDAccessorDestroyRequest struct { +// AppRoleLookUpSecretIdByAccessorRequest struct for AppRoleLookUpSecretIdByAccessorRequest +type AppRoleLookUpSecretIdByAccessorRequest struct { // Accessor of the SecretID SecretIdAccessor string `json:"secret_id_accessor"` } -// NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults instantiates a new AppRoleWriteSecretIDAccessorDestroyRequest object +// NewAppRoleLookUpSecretIdByAccessorRequestWithDefaults instantiates a new AppRoleLookUpSecretIdByAccessorRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults() *AppRoleWriteSecretIDAccessorDestroyRequest { - var this AppRoleWriteSecretIDAccessorDestroyRequest +func NewAppRoleLookUpSecretIdByAccessorRequestWithDefaults() *AppRoleLookUpSecretIdByAccessorRequest { + var this AppRoleLookUpSecretIdByAccessorRequest return &this } -func (o AppRoleWriteSecretIDAccessorDestroyRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleLookUpSecretIdByAccessorRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_accessor"] = o.SecretIdAccessor diff --git a/schema/model_app_role_write_secret_id_accessor_lookup_response.go b/schema/model_app_role_look_up_secret_id_by_accessor_response.go similarity index 78% rename from schema/model_app_role_write_secret_id_accessor_lookup_response.go rename to schema/model_app_role_look_up_secret_id_by_accessor_response.go index e73250ad..dbb35225 100644 --- a/schema/model_app_role_write_secret_id_accessor_lookup_response.go +++ b/schema/model_app_role_look_up_secret_id_by_accessor_response.go @@ -10,8 +10,8 @@ import ( "time" ) -// AppRoleWriteSecretIDAccessorLookupResponse struct for AppRoleWriteSecretIDAccessorLookupResponse -type AppRoleWriteSecretIDAccessorLookupResponse struct { +// AppRoleLookUpSecretIdByAccessorResponse struct for AppRoleLookUpSecretIdByAccessorResponse +type AppRoleLookUpSecretIdByAccessorResponse struct { // List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` @@ -36,16 +36,16 @@ type AppRoleWriteSecretIDAccessorLookupResponse struct { TokenBoundCidrs []string `json:"token_bound_cidrs"` } -// NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults instantiates a new AppRoleWriteSecretIDAccessorLookupResponse object +// NewAppRoleLookUpSecretIdByAccessorResponseWithDefaults instantiates a new AppRoleLookUpSecretIdByAccessorResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults() *AppRoleWriteSecretIDAccessorLookupResponse { - var this AppRoleWriteSecretIDAccessorLookupResponse +func NewAppRoleLookUpSecretIdByAccessorResponseWithDefaults() *AppRoleLookUpSecretIdByAccessorResponse { + var this AppRoleLookUpSecretIdByAccessorResponse return &this } -func (o AppRoleWriteSecretIDAccessorLookupResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleLookUpSecretIdByAccessorResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cidr_list"] = o.CidrList diff --git a/schema/model_app_role_write_secret_id_destroy_request.go b/schema/model_app_role_look_up_secret_id_request.go similarity index 55% rename from schema/model_app_role_write_secret_id_destroy_request.go rename to schema/model_app_role_look_up_secret_id_request.go index c1b2ee7f..e94fc204 100644 --- a/schema/model_app_role_write_secret_id_destroy_request.go +++ b/schema/model_app_role_look_up_secret_id_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDDestroyRequest struct for AppRoleWriteSecretIDDestroyRequest -type AppRoleWriteSecretIDDestroyRequest struct { +// AppRoleLookUpSecretIdRequest struct for AppRoleLookUpSecretIdRequest +type AppRoleLookUpSecretIdRequest struct { // SecretID attached to the role. SecretId string `json:"secret_id"` } -// NewAppRoleWriteSecretIDDestroyRequestWithDefaults instantiates a new AppRoleWriteSecretIDDestroyRequest object +// NewAppRoleLookUpSecretIdRequestWithDefaults instantiates a new AppRoleLookUpSecretIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDDestroyRequestWithDefaults() *AppRoleWriteSecretIDDestroyRequest { - var this AppRoleWriteSecretIDDestroyRequest +func NewAppRoleLookUpSecretIdRequestWithDefaults() *AppRoleLookUpSecretIdRequest { + var this AppRoleLookUpSecretIdRequest return &this } -func (o AppRoleWriteSecretIDDestroyRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleLookUpSecretIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id"] = o.SecretId diff --git a/schema/model_app_role_write_secret_id_lookup_response.go b/schema/model_app_role_look_up_secret_id_response.go similarity index 80% rename from schema/model_app_role_write_secret_id_lookup_response.go rename to schema/model_app_role_look_up_secret_id_response.go index c14de15a..5a2fe375 100644 --- a/schema/model_app_role_write_secret_id_lookup_response.go +++ b/schema/model_app_role_look_up_secret_id_response.go @@ -10,8 +10,8 @@ import ( "time" ) -// AppRoleWriteSecretIDLookupResponse struct for AppRoleWriteSecretIDLookupResponse -type AppRoleWriteSecretIDLookupResponse struct { +// AppRoleLookUpSecretIdResponse struct for AppRoleLookUpSecretIdResponse +type AppRoleLookUpSecretIdResponse struct { // List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` @@ -36,16 +36,16 @@ type AppRoleWriteSecretIDLookupResponse struct { TokenBoundCidrs []string `json:"token_bound_cidrs"` } -// NewAppRoleWriteSecretIDLookupResponseWithDefaults instantiates a new AppRoleWriteSecretIDLookupResponse object +// NewAppRoleLookUpSecretIdResponseWithDefaults instantiates a new AppRoleLookUpSecretIdResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDLookupResponseWithDefaults() *AppRoleWriteSecretIDLookupResponse { - var this AppRoleWriteSecretIDLookupResponse +func NewAppRoleLookUpSecretIdResponseWithDefaults() *AppRoleLookUpSecretIdResponse { + var this AppRoleLookUpSecretIdResponse return &this } -func (o AppRoleWriteSecretIDLookupResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleLookUpSecretIdResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cidr_list"] = o.CidrList diff --git a/schema/model_app_role_read_bind_secret_id_response.go b/schema/model_app_role_read_bind_secret_id_response.go index 90e4b0ee..e828b989 100644 --- a/schema/model_app_role_read_bind_secret_id_response.go +++ b/schema/model_app_role_read_bind_secret_id_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadBindSecretIDResponse struct for AppRoleReadBindSecretIDResponse -type AppRoleReadBindSecretIDResponse struct { +// AppRoleReadBindSecretIdResponse struct for AppRoleReadBindSecretIdResponse +type AppRoleReadBindSecretIdResponse struct { // Impose secret_id to be presented when logging in using this role. Defaults to 'true'. BindSecretId bool `json:"bind_secret_id"` } -// NewAppRoleReadBindSecretIDResponseWithDefaults instantiates a new AppRoleReadBindSecretIDResponse object +// NewAppRoleReadBindSecretIdResponseWithDefaults instantiates a new AppRoleReadBindSecretIdResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadBindSecretIDResponseWithDefaults() *AppRoleReadBindSecretIDResponse { - var this AppRoleReadBindSecretIDResponse +func NewAppRoleReadBindSecretIdResponseWithDefaults() *AppRoleReadBindSecretIdResponse { + var this AppRoleReadBindSecretIdResponse return &this } -func (o AppRoleReadBindSecretIDResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadBindSecretIdResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bind_secret_id"] = o.BindSecretId diff --git a/schema/model_app_role_read_bound_cidr_list_response.go b/schema/model_app_role_read_bound_cidr_list_response.go index f8594155..0a089122 100644 --- a/schema/model_app_role_read_bound_cidr_list_response.go +++ b/schema/model_app_role_read_bound_cidr_list_response.go @@ -9,23 +9,23 @@ import ( "encoding/json" ) -// AppRoleReadBoundCIDRListResponse struct for AppRoleReadBoundCIDRListResponse -type AppRoleReadBoundCIDRListResponse struct { +// AppRoleReadBoundCidrListResponse struct for AppRoleReadBoundCidrListResponse +type AppRoleReadBoundCidrListResponse struct { // Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. // Deprecated BoundCidrList []string `json:"bound_cidr_list"` } -// NewAppRoleReadBoundCIDRListResponseWithDefaults instantiates a new AppRoleReadBoundCIDRListResponse object +// NewAppRoleReadBoundCidrListResponseWithDefaults instantiates a new AppRoleReadBoundCidrListResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadBoundCIDRListResponseWithDefaults() *AppRoleReadBoundCIDRListResponse { - var this AppRoleReadBoundCIDRListResponse +func NewAppRoleReadBoundCidrListResponseWithDefaults() *AppRoleReadBoundCidrListResponse { + var this AppRoleReadBoundCidrListResponse return &this } -func (o AppRoleReadBoundCIDRListResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadBoundCidrListResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bound_cidr_list"] = o.BoundCidrList diff --git a/schema/model_app_role_read_local_secret_ids_response.go b/schema/model_app_role_read_local_secret_ids_response.go index ec3626c9..cdb41ed6 100644 --- a/schema/model_app_role_read_local_secret_ids_response.go +++ b/schema/model_app_role_read_local_secret_ids_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadLocalSecretIDsResponse struct for AppRoleReadLocalSecretIDsResponse -type AppRoleReadLocalSecretIDsResponse struct { +// AppRoleReadLocalSecretIdsResponse struct for AppRoleReadLocalSecretIdsResponse +type AppRoleReadLocalSecretIdsResponse struct { // If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later LocalSecretIds bool `json:"local_secret_ids"` } -// NewAppRoleReadLocalSecretIDsResponseWithDefaults instantiates a new AppRoleReadLocalSecretIDsResponse object +// NewAppRoleReadLocalSecretIdsResponseWithDefaults instantiates a new AppRoleReadLocalSecretIdsResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadLocalSecretIDsResponseWithDefaults() *AppRoleReadLocalSecretIDsResponse { - var this AppRoleReadLocalSecretIDsResponse +func NewAppRoleReadLocalSecretIdsResponseWithDefaults() *AppRoleReadLocalSecretIdsResponse { + var this AppRoleReadLocalSecretIdsResponse return &this } -func (o AppRoleReadLocalSecretIDsResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadLocalSecretIdsResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["local_secret_ids"] = o.LocalSecretIds diff --git a/schema/model_app_role_read_role_id_response.go b/schema/model_app_role_read_role_id_response.go index 2791a69c..f78a9d88 100644 --- a/schema/model_app_role_read_role_id_response.go +++ b/schema/model_app_role_read_role_id_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadRoleIDResponse struct for AppRoleReadRoleIDResponse -type AppRoleReadRoleIDResponse struct { +// AppRoleReadRoleIdResponse struct for AppRoleReadRoleIdResponse +type AppRoleReadRoleIdResponse struct { // Identifier of the role. Defaults to a UUID. RoleId string `json:"role_id"` } -// NewAppRoleReadRoleIDResponseWithDefaults instantiates a new AppRoleReadRoleIDResponse object +// NewAppRoleReadRoleIdResponseWithDefaults instantiates a new AppRoleReadRoleIdResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadRoleIDResponseWithDefaults() *AppRoleReadRoleIDResponse { - var this AppRoleReadRoleIDResponse +func NewAppRoleReadRoleIdResponseWithDefaults() *AppRoleReadRoleIdResponse { + var this AppRoleReadRoleIdResponse return &this } -func (o AppRoleReadRoleIDResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadRoleIdResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["role_id"] = o.RoleId diff --git a/schema/model_app_role_read_secret_id_bound_cidrs_response.go b/schema/model_app_role_read_secret_id_bound_cidrs_response.go index 231cf2e5..34bc056b 100644 --- a/schema/model_app_role_read_secret_id_bound_cidrs_response.go +++ b/schema/model_app_role_read_secret_id_bound_cidrs_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadSecretIDBoundCIDRsResponse struct for AppRoleReadSecretIDBoundCIDRsResponse -type AppRoleReadSecretIDBoundCIDRsResponse struct { +// AppRoleReadSecretIdBoundCidrsResponse struct for AppRoleReadSecretIdBoundCidrsResponse +type AppRoleReadSecretIdBoundCidrsResponse struct { // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. SecretIdBoundCidrs []string `json:"secret_id_bound_cidrs"` } -// NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults instantiates a new AppRoleReadSecretIDBoundCIDRsResponse object +// NewAppRoleReadSecretIdBoundCidrsResponseWithDefaults instantiates a new AppRoleReadSecretIdBoundCidrsResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults() *AppRoleReadSecretIDBoundCIDRsResponse { - var this AppRoleReadSecretIDBoundCIDRsResponse +func NewAppRoleReadSecretIdBoundCidrsResponseWithDefaults() *AppRoleReadSecretIdBoundCidrsResponse { + var this AppRoleReadSecretIdBoundCidrsResponse return &this } -func (o AppRoleReadSecretIDBoundCIDRsResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadSecretIdBoundCidrsResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_bound_cidrs"] = o.SecretIdBoundCidrs diff --git a/schema/model_app_role_read_secret_id_num_uses_response.go b/schema/model_app_role_read_secret_id_num_uses_response.go index 83bfe91e..569d6a7d 100644 --- a/schema/model_app_role_read_secret_id_num_uses_response.go +++ b/schema/model_app_role_read_secret_id_num_uses_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadSecretIDNumUsesResponse struct for AppRoleReadSecretIDNumUsesResponse -type AppRoleReadSecretIDNumUsesResponse struct { +// AppRoleReadSecretIdNumUsesResponse struct for AppRoleReadSecretIdNumUsesResponse +type AppRoleReadSecretIdNumUsesResponse struct { // Number of times a secret ID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the secret ID is of unlimited use. SecretIdNumUses int32 `json:"secret_id_num_uses"` } -// NewAppRoleReadSecretIDNumUsesResponseWithDefaults instantiates a new AppRoleReadSecretIDNumUsesResponse object +// NewAppRoleReadSecretIdNumUsesResponseWithDefaults instantiates a new AppRoleReadSecretIdNumUsesResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadSecretIDNumUsesResponseWithDefaults() *AppRoleReadSecretIDNumUsesResponse { - var this AppRoleReadSecretIDNumUsesResponse +func NewAppRoleReadSecretIdNumUsesResponseWithDefaults() *AppRoleReadSecretIdNumUsesResponse { + var this AppRoleReadSecretIdNumUsesResponse return &this } -func (o AppRoleReadSecretIDNumUsesResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadSecretIdNumUsesResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_num_uses"] = o.SecretIdNumUses diff --git a/schema/model_app_role_read_secret_idttl_response.go b/schema/model_app_role_read_secret_id_ttl_response.go similarity index 61% rename from schema/model_app_role_read_secret_idttl_response.go rename to schema/model_app_role_read_secret_id_ttl_response.go index 39b87be7..19201ec0 100644 --- a/schema/model_app_role_read_secret_idttl_response.go +++ b/schema/model_app_role_read_secret_id_ttl_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadSecretIDTTLResponse struct for AppRoleReadSecretIDTTLResponse -type AppRoleReadSecretIDTTLResponse struct { +// AppRoleReadSecretIdTtlResponse struct for AppRoleReadSecretIdTtlResponse +type AppRoleReadSecretIdTtlResponse struct { // Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. SecretIdTtl int32 `json:"secret_id_ttl"` } -// NewAppRoleReadSecretIDTTLResponseWithDefaults instantiates a new AppRoleReadSecretIDTTLResponse object +// NewAppRoleReadSecretIdTtlResponseWithDefaults instantiates a new AppRoleReadSecretIdTtlResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadSecretIDTTLResponseWithDefaults() *AppRoleReadSecretIDTTLResponse { - var this AppRoleReadSecretIDTTLResponse +func NewAppRoleReadSecretIdTtlResponseWithDefaults() *AppRoleReadSecretIdTtlResponse { + var this AppRoleReadSecretIdTtlResponse return &this } -func (o AppRoleReadSecretIDTTLResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadSecretIdTtlResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_ttl"] = o.SecretIdTtl diff --git a/schema/model_app_role_read_token_bound_cidrs_response.go b/schema/model_app_role_read_token_bound_cidrs_response.go index ecd2fa5d..b0ddcccf 100644 --- a/schema/model_app_role_read_token_bound_cidrs_response.go +++ b/schema/model_app_role_read_token_bound_cidrs_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadTokenBoundCIDRsResponse struct for AppRoleReadTokenBoundCIDRsResponse -type AppRoleReadTokenBoundCIDRsResponse struct { +// AppRoleReadTokenBoundCidrsResponse struct for AppRoleReadTokenBoundCidrsResponse +type AppRoleReadTokenBoundCidrsResponse struct { // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs"` } -// NewAppRoleReadTokenBoundCIDRsResponseWithDefaults instantiates a new AppRoleReadTokenBoundCIDRsResponse object +// NewAppRoleReadTokenBoundCidrsResponseWithDefaults instantiates a new AppRoleReadTokenBoundCidrsResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadTokenBoundCIDRsResponseWithDefaults() *AppRoleReadTokenBoundCIDRsResponse { - var this AppRoleReadTokenBoundCIDRsResponse +func NewAppRoleReadTokenBoundCidrsResponseWithDefaults() *AppRoleReadTokenBoundCidrsResponse { + var this AppRoleReadTokenBoundCidrsResponse return &this } -func (o AppRoleReadTokenBoundCIDRsResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadTokenBoundCidrsResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token_bound_cidrs"] = o.TokenBoundCidrs diff --git a/schema/model_app_role_read_token_max_ttl_response.go b/schema/model_app_role_read_token_max_ttl_response.go index 91bc4bf4..cbb680f7 100644 --- a/schema/model_app_role_read_token_max_ttl_response.go +++ b/schema/model_app_role_read_token_max_ttl_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadTokenMaxTTLResponse struct for AppRoleReadTokenMaxTTLResponse -type AppRoleReadTokenMaxTTLResponse struct { +// AppRoleReadTokenMaxTtlResponse struct for AppRoleReadTokenMaxTtlResponse +type AppRoleReadTokenMaxTtlResponse struct { // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` } -// NewAppRoleReadTokenMaxTTLResponseWithDefaults instantiates a new AppRoleReadTokenMaxTTLResponse object +// NewAppRoleReadTokenMaxTtlResponseWithDefaults instantiates a new AppRoleReadTokenMaxTtlResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadTokenMaxTTLResponseWithDefaults() *AppRoleReadTokenMaxTTLResponse { - var this AppRoleReadTokenMaxTTLResponse +func NewAppRoleReadTokenMaxTtlResponseWithDefaults() *AppRoleReadTokenMaxTtlResponse { + var this AppRoleReadTokenMaxTtlResponse return &this } -func (o AppRoleReadTokenMaxTTLResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadTokenMaxTtlResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token_max_ttl"] = o.TokenMaxTtl diff --git a/schema/model_app_role_read_token_ttl_response.go b/schema/model_app_role_read_token_ttl_response.go index dbf303a5..9db4a300 100644 --- a/schema/model_app_role_read_token_ttl_response.go +++ b/schema/model_app_role_read_token_ttl_response.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleReadTokenTTLResponse struct for AppRoleReadTokenTTLResponse -type AppRoleReadTokenTTLResponse struct { +// AppRoleReadTokenTtlResponse struct for AppRoleReadTokenTtlResponse +type AppRoleReadTokenTtlResponse struct { // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` } -// NewAppRoleReadTokenTTLResponseWithDefaults instantiates a new AppRoleReadTokenTTLResponse object +// NewAppRoleReadTokenTtlResponseWithDefaults instantiates a new AppRoleReadTokenTtlResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleReadTokenTTLResponseWithDefaults() *AppRoleReadTokenTTLResponse { - var this AppRoleReadTokenTTLResponse +func NewAppRoleReadTokenTtlResponseWithDefaults() *AppRoleReadTokenTtlResponse { + var this AppRoleReadTokenTtlResponse return &this } -func (o AppRoleReadTokenTTLResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleReadTokenTtlResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token_ttl"] = o.TokenTtl diff --git a/schema/model_app_role_write_bind_secret_id_request.go b/schema/model_app_role_write_bind_secret_id_request.go index 8e82a689..be87c53d 100644 --- a/schema/model_app_role_write_bind_secret_id_request.go +++ b/schema/model_app_role_write_bind_secret_id_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// AppRoleWriteBindSecretIDRequest struct for AppRoleWriteBindSecretIDRequest -type AppRoleWriteBindSecretIDRequest struct { +// AppRoleWriteBindSecretIdRequest struct for AppRoleWriteBindSecretIdRequest +type AppRoleWriteBindSecretIdRequest struct { // Impose secret_id to be presented when logging in using this role. BindSecretId bool `json:"bind_secret_id"` } -// NewAppRoleWriteBindSecretIDRequestWithDefaults instantiates a new AppRoleWriteBindSecretIDRequest object +// NewAppRoleWriteBindSecretIdRequestWithDefaults instantiates a new AppRoleWriteBindSecretIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteBindSecretIDRequestWithDefaults() *AppRoleWriteBindSecretIDRequest { - var this AppRoleWriteBindSecretIDRequest +func NewAppRoleWriteBindSecretIdRequestWithDefaults() *AppRoleWriteBindSecretIdRequest { + var this AppRoleWriteBindSecretIdRequest this.BindSecretId = true return &this } -func (o AppRoleWriteBindSecretIDRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteBindSecretIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bind_secret_id"] = o.BindSecretId diff --git a/schema/model_app_role_write_bound_cidr_list_request.go b/schema/model_app_role_write_bound_cidr_list_request.go index aad93410..129ef6fd 100644 --- a/schema/model_app_role_write_bound_cidr_list_request.go +++ b/schema/model_app_role_write_bound_cidr_list_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteBoundCIDRListRequest struct for AppRoleWriteBoundCIDRListRequest -type AppRoleWriteBoundCIDRListRequest struct { +// AppRoleWriteBoundCidrListRequest struct for AppRoleWriteBoundCidrListRequest +type AppRoleWriteBoundCidrListRequest struct { // Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. BoundCidrList []string `json:"bound_cidr_list"` } -// NewAppRoleWriteBoundCIDRListRequestWithDefaults instantiates a new AppRoleWriteBoundCIDRListRequest object +// NewAppRoleWriteBoundCidrListRequestWithDefaults instantiates a new AppRoleWriteBoundCidrListRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteBoundCIDRListRequestWithDefaults() *AppRoleWriteBoundCIDRListRequest { - var this AppRoleWriteBoundCIDRListRequest +func NewAppRoleWriteBoundCidrListRequestWithDefaults() *AppRoleWriteBoundCidrListRequest { + var this AppRoleWriteBoundCidrListRequest return &this } -func (o AppRoleWriteBoundCIDRListRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteBoundCidrListRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bound_cidr_list"] = o.BoundCidrList diff --git a/schema/model_app_role_write_custom_secret_id_request.go b/schema/model_app_role_write_custom_secret_id_request.go index 839ed16c..660ff8b6 100644 --- a/schema/model_app_role_write_custom_secret_id_request.go +++ b/schema/model_app_role_write_custom_secret_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AppRoleWriteCustomSecretIDRequest struct for AppRoleWriteCustomSecretIDRequest -type AppRoleWriteCustomSecretIDRequest struct { +// AppRoleWriteCustomSecretIdRequest struct for AppRoleWriteCustomSecretIdRequest +type AppRoleWriteCustomSecretIdRequest struct { // Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` @@ -30,16 +30,16 @@ type AppRoleWriteCustomSecretIDRequest struct { Ttl int32 `json:"ttl"` } -// NewAppRoleWriteCustomSecretIDRequestWithDefaults instantiates a new AppRoleWriteCustomSecretIDRequest object +// NewAppRoleWriteCustomSecretIdRequestWithDefaults instantiates a new AppRoleWriteCustomSecretIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteCustomSecretIDRequestWithDefaults() *AppRoleWriteCustomSecretIDRequest { - var this AppRoleWriteCustomSecretIDRequest +func NewAppRoleWriteCustomSecretIdRequestWithDefaults() *AppRoleWriteCustomSecretIdRequest { + var this AppRoleWriteCustomSecretIdRequest return &this } -func (o AppRoleWriteCustomSecretIDRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteCustomSecretIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cidr_list"] = o.CidrList diff --git a/schema/model_app_role_write_custom_secret_id_response.go b/schema/model_app_role_write_custom_secret_id_response.go index 396b5887..87f1ee5d 100644 --- a/schema/model_app_role_write_custom_secret_id_response.go +++ b/schema/model_app_role_write_custom_secret_id_response.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AppRoleWriteCustomSecretIDResponse struct for AppRoleWriteCustomSecretIDResponse -type AppRoleWriteCustomSecretIDResponse struct { +// AppRoleWriteCustomSecretIdResponse struct for AppRoleWriteCustomSecretIdResponse +type AppRoleWriteCustomSecretIdResponse struct { // Secret ID attached to the role. SecretId string `json:"secret_id"` @@ -24,16 +24,16 @@ type AppRoleWriteCustomSecretIDResponse struct { SecretIdTtl int32 `json:"secret_id_ttl"` } -// NewAppRoleWriteCustomSecretIDResponseWithDefaults instantiates a new AppRoleWriteCustomSecretIDResponse object +// NewAppRoleWriteCustomSecretIdResponseWithDefaults instantiates a new AppRoleWriteCustomSecretIdResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteCustomSecretIDResponseWithDefaults() *AppRoleWriteCustomSecretIDResponse { - var this AppRoleWriteCustomSecretIDResponse +func NewAppRoleWriteCustomSecretIdResponseWithDefaults() *AppRoleWriteCustomSecretIdResponse { + var this AppRoleWriteCustomSecretIdResponse return &this } -func (o AppRoleWriteCustomSecretIDResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteCustomSecretIdResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id"] = o.SecretId diff --git a/schema/model_app_role_write_role_id_request.go b/schema/model_app_role_write_role_id_request.go index 00520427..f8d51fe5 100644 --- a/schema/model_app_role_write_role_id_request.go +++ b/schema/model_app_role_write_role_id_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteRoleIDRequest struct for AppRoleWriteRoleIDRequest -type AppRoleWriteRoleIDRequest struct { +// AppRoleWriteRoleIdRequest struct for AppRoleWriteRoleIdRequest +type AppRoleWriteRoleIdRequest struct { // Identifier of the role. Defaults to a UUID. RoleId string `json:"role_id"` } -// NewAppRoleWriteRoleIDRequestWithDefaults instantiates a new AppRoleWriteRoleIDRequest object +// NewAppRoleWriteRoleIdRequestWithDefaults instantiates a new AppRoleWriteRoleIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteRoleIDRequestWithDefaults() *AppRoleWriteRoleIDRequest { - var this AppRoleWriteRoleIDRequest +func NewAppRoleWriteRoleIdRequestWithDefaults() *AppRoleWriteRoleIdRequest { + var this AppRoleWriteRoleIdRequest return &this } -func (o AppRoleWriteRoleIDRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteRoleIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["role_id"] = o.RoleId diff --git a/schema/model_app_role_write_secret_id_bound_cidrs_request.go b/schema/model_app_role_write_secret_id_bound_cidrs_request.go index b63d1e4d..414d7d1f 100644 --- a/schema/model_app_role_write_secret_id_bound_cidrs_request.go +++ b/schema/model_app_role_write_secret_id_bound_cidrs_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDBoundCIDRsRequest struct for AppRoleWriteSecretIDBoundCIDRsRequest -type AppRoleWriteSecretIDBoundCIDRsRequest struct { +// AppRoleWriteSecretIdBoundCidrsRequest struct for AppRoleWriteSecretIdBoundCidrsRequest +type AppRoleWriteSecretIdBoundCidrsRequest struct { // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. SecretIdBoundCidrs []string `json:"secret_id_bound_cidrs"` } -// NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults instantiates a new AppRoleWriteSecretIDBoundCIDRsRequest object +// NewAppRoleWriteSecretIdBoundCidrsRequestWithDefaults instantiates a new AppRoleWriteSecretIdBoundCidrsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults() *AppRoleWriteSecretIDBoundCIDRsRequest { - var this AppRoleWriteSecretIDBoundCIDRsRequest +func NewAppRoleWriteSecretIdBoundCidrsRequestWithDefaults() *AppRoleWriteSecretIdBoundCidrsRequest { + var this AppRoleWriteSecretIdBoundCidrsRequest return &this } -func (o AppRoleWriteSecretIDBoundCIDRsRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteSecretIdBoundCidrsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_bound_cidrs"] = o.SecretIdBoundCidrs diff --git a/schema/model_app_role_write_secret_id_num_uses_request.go b/schema/model_app_role_write_secret_id_num_uses_request.go index a922aa4c..004b8900 100644 --- a/schema/model_app_role_write_secret_id_num_uses_request.go +++ b/schema/model_app_role_write_secret_id_num_uses_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDNumUsesRequest struct for AppRoleWriteSecretIDNumUsesRequest -type AppRoleWriteSecretIDNumUsesRequest struct { +// AppRoleWriteSecretIdNumUsesRequest struct for AppRoleWriteSecretIdNumUsesRequest +type AppRoleWriteSecretIdNumUsesRequest struct { // Number of times a SecretID can access the role, after which the SecretID will expire. SecretIdNumUses int32 `json:"secret_id_num_uses"` } -// NewAppRoleWriteSecretIDNumUsesRequestWithDefaults instantiates a new AppRoleWriteSecretIDNumUsesRequest object +// NewAppRoleWriteSecretIdNumUsesRequestWithDefaults instantiates a new AppRoleWriteSecretIdNumUsesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDNumUsesRequestWithDefaults() *AppRoleWriteSecretIDNumUsesRequest { - var this AppRoleWriteSecretIDNumUsesRequest +func NewAppRoleWriteSecretIdNumUsesRequestWithDefaults() *AppRoleWriteSecretIdNumUsesRequest { + var this AppRoleWriteSecretIdNumUsesRequest return &this } -func (o AppRoleWriteSecretIDNumUsesRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteSecretIdNumUsesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_num_uses"] = o.SecretIdNumUses diff --git a/schema/model_app_role_write_secret_id_request.go b/schema/model_app_role_write_secret_id_request.go index 9e0e8581..2f125830 100644 --- a/schema/model_app_role_write_secret_id_request.go +++ b/schema/model_app_role_write_secret_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDRequest struct for AppRoleWriteSecretIDRequest -type AppRoleWriteSecretIDRequest struct { +// AppRoleWriteSecretIdRequest struct for AppRoleWriteSecretIdRequest +type AppRoleWriteSecretIdRequest struct { // Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` @@ -27,16 +27,16 @@ type AppRoleWriteSecretIDRequest struct { Ttl int32 `json:"ttl"` } -// NewAppRoleWriteSecretIDRequestWithDefaults instantiates a new AppRoleWriteSecretIDRequest object +// NewAppRoleWriteSecretIdRequestWithDefaults instantiates a new AppRoleWriteSecretIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDRequestWithDefaults() *AppRoleWriteSecretIDRequest { - var this AppRoleWriteSecretIDRequest +func NewAppRoleWriteSecretIdRequestWithDefaults() *AppRoleWriteSecretIdRequest { + var this AppRoleWriteSecretIdRequest return &this } -func (o AppRoleWriteSecretIDRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteSecretIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cidr_list"] = o.CidrList diff --git a/schema/model_app_role_write_secret_id_response.go b/schema/model_app_role_write_secret_id_response.go index 20e75720..2b2e0225 100644 --- a/schema/model_app_role_write_secret_id_response.go +++ b/schema/model_app_role_write_secret_id_response.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDResponse struct for AppRoleWriteSecretIDResponse -type AppRoleWriteSecretIDResponse struct { +// AppRoleWriteSecretIdResponse struct for AppRoleWriteSecretIdResponse +type AppRoleWriteSecretIdResponse struct { // Secret ID attached to the role. SecretId string `json:"secret_id"` @@ -24,16 +24,16 @@ type AppRoleWriteSecretIDResponse struct { SecretIdTtl int32 `json:"secret_id_ttl"` } -// NewAppRoleWriteSecretIDResponseWithDefaults instantiates a new AppRoleWriteSecretIDResponse object +// NewAppRoleWriteSecretIdResponseWithDefaults instantiates a new AppRoleWriteSecretIdResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDResponseWithDefaults() *AppRoleWriteSecretIDResponse { - var this AppRoleWriteSecretIDResponse +func NewAppRoleWriteSecretIdResponseWithDefaults() *AppRoleWriteSecretIdResponse { + var this AppRoleWriteSecretIdResponse return &this } -func (o AppRoleWriteSecretIDResponse) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteSecretIdResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id"] = o.SecretId diff --git a/schema/model_app_role_write_secret_idttl_request.go b/schema/model_app_role_write_secret_id_ttl_request.go similarity index 61% rename from schema/model_app_role_write_secret_idttl_request.go rename to schema/model_app_role_write_secret_id_ttl_request.go index b013101d..3ee20766 100644 --- a/schema/model_app_role_write_secret_idttl_request.go +++ b/schema/model_app_role_write_secret_id_ttl_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteSecretIDTTLRequest struct for AppRoleWriteSecretIDTTLRequest -type AppRoleWriteSecretIDTTLRequest struct { +// AppRoleWriteSecretIdTtlRequest struct for AppRoleWriteSecretIdTtlRequest +type AppRoleWriteSecretIdTtlRequest struct { // Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration. SecretIdTtl int32 `json:"secret_id_ttl"` } -// NewAppRoleWriteSecretIDTTLRequestWithDefaults instantiates a new AppRoleWriteSecretIDTTLRequest object +// NewAppRoleWriteSecretIdTtlRequestWithDefaults instantiates a new AppRoleWriteSecretIdTtlRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteSecretIDTTLRequestWithDefaults() *AppRoleWriteSecretIDTTLRequest { - var this AppRoleWriteSecretIDTTLRequest +func NewAppRoleWriteSecretIdTtlRequestWithDefaults() *AppRoleWriteSecretIdTtlRequest { + var this AppRoleWriteSecretIdTtlRequest return &this } -func (o AppRoleWriteSecretIDTTLRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteSecretIdTtlRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["secret_id_ttl"] = o.SecretIdTtl diff --git a/schema/model_app_role_write_token_bound_cidrs_request.go b/schema/model_app_role_write_token_bound_cidrs_request.go index f1673eaf..130a3d57 100644 --- a/schema/model_app_role_write_token_bound_cidrs_request.go +++ b/schema/model_app_role_write_token_bound_cidrs_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteTokenBoundCIDRsRequest struct for AppRoleWriteTokenBoundCIDRsRequest -type AppRoleWriteTokenBoundCIDRsRequest struct { +// AppRoleWriteTokenBoundCidrsRequest struct for AppRoleWriteTokenBoundCidrsRequest +type AppRoleWriteTokenBoundCidrsRequest struct { // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` } -// NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults instantiates a new AppRoleWriteTokenBoundCIDRsRequest object +// NewAppRoleWriteTokenBoundCidrsRequestWithDefaults instantiates a new AppRoleWriteTokenBoundCidrsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults() *AppRoleWriteTokenBoundCIDRsRequest { - var this AppRoleWriteTokenBoundCIDRsRequest +func NewAppRoleWriteTokenBoundCidrsRequestWithDefaults() *AppRoleWriteTokenBoundCidrsRequest { + var this AppRoleWriteTokenBoundCidrsRequest return &this } -func (o AppRoleWriteTokenBoundCIDRsRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteTokenBoundCidrsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token_bound_cidrs"] = o.TokenBoundCidrs diff --git a/schema/model_app_role_write_token_max_ttl_request.go b/schema/model_app_role_write_token_max_ttl_request.go index 81ece6b4..c14657d4 100644 --- a/schema/model_app_role_write_token_max_ttl_request.go +++ b/schema/model_app_role_write_token_max_ttl_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteTokenMaxTTLRequest struct for AppRoleWriteTokenMaxTTLRequest -type AppRoleWriteTokenMaxTTLRequest struct { +// AppRoleWriteTokenMaxTtlRequest struct for AppRoleWriteTokenMaxTtlRequest +type AppRoleWriteTokenMaxTtlRequest struct { // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` } -// NewAppRoleWriteTokenMaxTTLRequestWithDefaults instantiates a new AppRoleWriteTokenMaxTTLRequest object +// NewAppRoleWriteTokenMaxTtlRequestWithDefaults instantiates a new AppRoleWriteTokenMaxTtlRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteTokenMaxTTLRequestWithDefaults() *AppRoleWriteTokenMaxTTLRequest { - var this AppRoleWriteTokenMaxTTLRequest +func NewAppRoleWriteTokenMaxTtlRequestWithDefaults() *AppRoleWriteTokenMaxTtlRequest { + var this AppRoleWriteTokenMaxTtlRequest return &this } -func (o AppRoleWriteTokenMaxTTLRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteTokenMaxTtlRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token_max_ttl"] = o.TokenMaxTtl diff --git a/schema/model_app_role_write_token_ttl_request.go b/schema/model_app_role_write_token_ttl_request.go index 0c3f2a2b..0c442e0a 100644 --- a/schema/model_app_role_write_token_ttl_request.go +++ b/schema/model_app_role_write_token_ttl_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AppRoleWriteTokenTTLRequest struct for AppRoleWriteTokenTTLRequest -type AppRoleWriteTokenTTLRequest struct { +// AppRoleWriteTokenTtlRequest struct for AppRoleWriteTokenTtlRequest +type AppRoleWriteTokenTtlRequest struct { // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` } -// NewAppRoleWriteTokenTTLRequestWithDefaults instantiates a new AppRoleWriteTokenTTLRequest object +// NewAppRoleWriteTokenTtlRequestWithDefaults instantiates a new AppRoleWriteTokenTtlRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleWriteTokenTTLRequestWithDefaults() *AppRoleWriteTokenTTLRequest { - var this AppRoleWriteTokenTTLRequest +func NewAppRoleWriteTokenTtlRequestWithDefaults() *AppRoleWriteTokenTtlRequest { + var this AppRoleWriteTokenTtlRequest return &this } -func (o AppRoleWriteTokenTTLRequest) MarshalJSON() ([]byte, error) { +func (o AppRoleWriteTokenTtlRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token_ttl"] = o.TokenTtl diff --git a/schema/model_calculate_audit_hash_request.go b/schema/model_auditing_calculate_hash_request.go similarity index 56% rename from schema/model_calculate_audit_hash_request.go rename to schema/model_auditing_calculate_hash_request.go index 6f3ef188..4fd9b663 100644 --- a/schema/model_calculate_audit_hash_request.go +++ b/schema/model_auditing_calculate_hash_request.go @@ -9,21 +9,21 @@ import ( "encoding/json" ) -// CalculateAuditHashRequest struct for CalculateAuditHashRequest -type CalculateAuditHashRequest struct { +// AuditingCalculateHashRequest struct for AuditingCalculateHashRequest +type AuditingCalculateHashRequest struct { Input string `json:"input"` } -// NewCalculateAuditHashRequestWithDefaults instantiates a new CalculateAuditHashRequest object +// NewAuditingCalculateHashRequestWithDefaults instantiates a new AuditingCalculateHashRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewCalculateAuditHashRequestWithDefaults() *CalculateAuditHashRequest { - var this CalculateAuditHashRequest +func NewAuditingCalculateHashRequestWithDefaults() *AuditingCalculateHashRequest { + var this AuditingCalculateHashRequest return &this } -func (o CalculateAuditHashRequest) MarshalJSON() ([]byte, error) { +func (o AuditingCalculateHashRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["input"] = o.Input diff --git a/schema/model_auditing_calculate_hash_response.go b/schema/model_auditing_calculate_hash_response.go new file mode 100644 index 00000000..39146dc9 --- /dev/null +++ b/schema/model_auditing_calculate_hash_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// AuditingCalculateHashResponse struct for AuditingCalculateHashResponse +type AuditingCalculateHashResponse struct { + Hash string `json:"hash"` +} + +// NewAuditingCalculateHashResponseWithDefaults instantiates a new AuditingCalculateHashResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewAuditingCalculateHashResponseWithDefaults() *AuditingCalculateHashResponse { + var this AuditingCalculateHashResponse + + return &this +} + +func (o AuditingCalculateHashResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["hash"] = o.Hash + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_audit_device_request.go b/schema/model_auditing_enable_device_request.go similarity index 71% rename from schema/model_write_audit_device_request.go rename to schema/model_auditing_enable_device_request.go index 35119bd2..675abd9f 100644 --- a/schema/model_write_audit_device_request.go +++ b/schema/model_auditing_enable_device_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteAuditDeviceRequest struct for WriteAuditDeviceRequest -type WriteAuditDeviceRequest struct { +// AuditingEnableDeviceRequest struct for AuditingEnableDeviceRequest +type AuditingEnableDeviceRequest struct { // User-friendly description for this audit backend. Description string `json:"description"` @@ -24,18 +24,18 @@ type WriteAuditDeviceRequest struct { Type string `json:"type"` } -// NewWriteAuditDeviceRequestWithDefaults instantiates a new WriteAuditDeviceRequest object +// NewAuditingEnableDeviceRequestWithDefaults instantiates a new AuditingEnableDeviceRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteAuditDeviceRequestWithDefaults() *WriteAuditDeviceRequest { - var this WriteAuditDeviceRequest +func NewAuditingEnableDeviceRequestWithDefaults() *AuditingEnableDeviceRequest { + var this AuditingEnableDeviceRequest this.Local = false return &this } -func (o WriteAuditDeviceRequest) MarshalJSON() ([]byte, error) { +func (o AuditingEnableDeviceRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["description"] = o.Description diff --git a/schema/model_write_config_auditing_request_header_request.go b/schema/model_auditing_enable_request_header_request.go similarity index 50% rename from schema/model_write_config_auditing_request_header_request.go rename to schema/model_auditing_enable_request_header_request.go index b7ba646b..e992112f 100644 --- a/schema/model_write_config_auditing_request_header_request.go +++ b/schema/model_auditing_enable_request_header_request.go @@ -9,21 +9,21 @@ import ( "encoding/json" ) -// WriteConfigAuditingRequestHeaderRequest struct for WriteConfigAuditingRequestHeaderRequest -type WriteConfigAuditingRequestHeaderRequest struct { +// AuditingEnableRequestHeaderRequest struct for AuditingEnableRequestHeaderRequest +type AuditingEnableRequestHeaderRequest struct { Hmac bool `json:"hmac"` } -// NewWriteConfigAuditingRequestHeaderRequestWithDefaults instantiates a new WriteConfigAuditingRequestHeaderRequest object +// NewAuditingEnableRequestHeaderRequestWithDefaults instantiates a new AuditingEnableRequestHeaderRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteConfigAuditingRequestHeaderRequestWithDefaults() *WriteConfigAuditingRequestHeaderRequest { - var this WriteConfigAuditingRequestHeaderRequest +func NewAuditingEnableRequestHeaderRequestWithDefaults() *AuditingEnableRequestHeaderRequest { + var this AuditingEnableRequestHeaderRequest return &this } -func (o WriteConfigAuditingRequestHeaderRequest) MarshalJSON() ([]byte, error) { +func (o AuditingEnableRequestHeaderRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["hmac"] = o.Hmac diff --git a/schema/model_auditing_list_request_headers_response.go b/schema/model_auditing_list_request_headers_response.go new file mode 100644 index 00000000..15121bdb --- /dev/null +++ b/schema/model_auditing_list_request_headers_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// AuditingListRequestHeadersResponse struct for AuditingListRequestHeadersResponse +type AuditingListRequestHeadersResponse struct { + Headers map[string]interface{} `json:"headers"` +} + +// NewAuditingListRequestHeadersResponseWithDefaults instantiates a new AuditingListRequestHeadersResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewAuditingListRequestHeadersResponseWithDefaults() *AuditingListRequestHeadersResponse { + var this AuditingListRequestHeadersResponse + + return &this +} + +func (o AuditingListRequestHeadersResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["headers"] = o.Headers + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_auth_method_request.go b/schema/model_auth_enable_method_request.go similarity index 83% rename from schema/model_write_auth_method_request.go rename to schema/model_auth_enable_method_request.go index d10e1354..3f92db1b 100644 --- a/schema/model_write_auth_method_request.go +++ b/schema/model_auth_enable_method_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteAuthMethodRequest struct for WriteAuthMethodRequest -type WriteAuthMethodRequest struct { +// AuthEnableMethodRequest struct for AuthEnableMethodRequest +type AuthEnableMethodRequest struct { // Configuration for this mount, such as plugin_name. Config map[string]interface{} `json:"config"` @@ -39,11 +39,11 @@ type WriteAuthMethodRequest struct { Type string `json:"type"` } -// NewWriteAuthMethodRequestWithDefaults instantiates a new WriteAuthMethodRequest object +// NewAuthEnableMethodRequestWithDefaults instantiates a new AuthEnableMethodRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteAuthMethodRequestWithDefaults() *WriteAuthMethodRequest { - var this WriteAuthMethodRequest +func NewAuthEnableMethodRequestWithDefaults() *AuthEnableMethodRequest { + var this AuthEnableMethodRequest this.ExternalEntropyAccess = false this.Local = false @@ -52,7 +52,7 @@ func NewWriteAuthMethodRequestWithDefaults() *WriteAuthMethodRequest { return &this } -func (o WriteAuthMethodRequest) MarshalJSON() ([]byte, error) { +func (o AuthEnableMethodRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["config"] = o.Config diff --git a/schema/model_auth_read_configuration_response.go b/schema/model_auth_read_configuration_response.go new file mode 100644 index 00000000..6a6efa60 --- /dev/null +++ b/schema/model_auth_read_configuration_response.go @@ -0,0 +1,68 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// AuthReadConfigurationResponse struct for AuthReadConfigurationResponse +type AuthReadConfigurationResponse struct { + Accessor string `json:"accessor"` + + Config map[string]interface{} `json:"config"` + + DeprecationStatus string `json:"deprecation_status"` + + Description string `json:"description"` + + ExternalEntropyAccess bool `json:"external_entropy_access"` + + Local bool `json:"local"` + + Options map[string]interface{} `json:"options"` + + PluginVersion string `json:"plugin_version"` + + RunningPluginVersion string `json:"running_plugin_version"` + + RunningSha256 string `json:"running_sha256"` + + SealWrap bool `json:"seal_wrap"` + + Type string `json:"type"` + + Uuid string `json:"uuid"` +} + +// NewAuthReadConfigurationResponseWithDefaults instantiates a new AuthReadConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewAuthReadConfigurationResponseWithDefaults() *AuthReadConfigurationResponse { + var this AuthReadConfigurationResponse + + return &this +} + +func (o AuthReadConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["accessor"] = o.Accessor + toSerialize["config"] = o.Config + toSerialize["deprecation_status"] = o.DeprecationStatus + toSerialize["description"] = o.Description + toSerialize["external_entropy_access"] = o.ExternalEntropyAccess + toSerialize["local"] = o.Local + toSerialize["options"] = o.Options + toSerialize["plugin_version"] = o.PluginVersion + toSerialize["running_plugin_version"] = o.RunningPluginVersion + toSerialize["running_sha256"] = o.RunningSha256 + toSerialize["seal_wrap"] = o.SealWrap + toSerialize["type"] = o.Type + toSerialize["uuid"] = o.Uuid + + return json.Marshal(toSerialize) +} diff --git a/schema/model_auth_read_tuning_information_response.go b/schema/model_auth_read_tuning_information_response.go new file mode 100644 index 00000000..0198c042 --- /dev/null +++ b/schema/model_auth_read_tuning_information_response.go @@ -0,0 +1,83 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// AuthReadTuningInformationResponse struct for AuthReadTuningInformationResponse +type AuthReadTuningInformationResponse struct { + AllowedManagedKeys []string `json:"allowed_managed_keys"` + + AllowedResponseHeaders []string `json:"allowed_response_headers"` + + AuditNonHmacRequestKeys []string `json:"audit_non_hmac_request_keys"` + + AuditNonHmacResponseKeys []string `json:"audit_non_hmac_response_keys"` + + DefaultLeaseTtl int32 `json:"default_lease_ttl"` + + Description string `json:"description"` + + ExternalEntropyAccess bool `json:"external_entropy_access"` + + ForceNoCache bool `json:"force_no_cache"` + + ListingVisibility string `json:"listing_visibility"` + + MaxLeaseTtl int32 `json:"max_lease_ttl"` + + Options map[string]interface{} `json:"options"` + + PassthroughRequestHeaders []string `json:"passthrough_request_headers"` + + PluginVersion string `json:"plugin_version"` + + TokenType string `json:"token_type"` + + UserLockoutCounterResetDuration int64 `json:"user_lockout_counter_reset_duration"` + + UserLockoutDisable bool `json:"user_lockout_disable"` + + UserLockoutDuration int64 `json:"user_lockout_duration"` + + UserLockoutThreshold int64 `json:"user_lockout_threshold"` +} + +// NewAuthReadTuningInformationResponseWithDefaults instantiates a new AuthReadTuningInformationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewAuthReadTuningInformationResponseWithDefaults() *AuthReadTuningInformationResponse { + var this AuthReadTuningInformationResponse + + return &this +} + +func (o AuthReadTuningInformationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["allowed_managed_keys"] = o.AllowedManagedKeys + toSerialize["allowed_response_headers"] = o.AllowedResponseHeaders + toSerialize["audit_non_hmac_request_keys"] = o.AuditNonHmacRequestKeys + toSerialize["audit_non_hmac_response_keys"] = o.AuditNonHmacResponseKeys + toSerialize["default_lease_ttl"] = o.DefaultLeaseTtl + toSerialize["description"] = o.Description + toSerialize["external_entropy_access"] = o.ExternalEntropyAccess + toSerialize["force_no_cache"] = o.ForceNoCache + toSerialize["listing_visibility"] = o.ListingVisibility + toSerialize["max_lease_ttl"] = o.MaxLeaseTtl + toSerialize["options"] = o.Options + toSerialize["passthrough_request_headers"] = o.PassthroughRequestHeaders + toSerialize["plugin_version"] = o.PluginVersion + toSerialize["token_type"] = o.TokenType + toSerialize["user_lockout_counter_reset_duration"] = o.UserLockoutCounterResetDuration + toSerialize["user_lockout_disable"] = o.UserLockoutDisable + toSerialize["user_lockout_duration"] = o.UserLockoutDuration + toSerialize["user_lockout_threshold"] = o.UserLockoutThreshold + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_auth_method_tune_request.go b/schema/model_auth_tune_configuration_parameters_request.go similarity index 84% rename from schema/model_write_auth_method_tune_request.go rename to schema/model_auth_tune_configuration_parameters_request.go index e9a052ae..aca72c9b 100644 --- a/schema/model_write_auth_method_tune_request.go +++ b/schema/model_auth_tune_configuration_parameters_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteAuthMethodTuneRequest struct for WriteAuthMethodTuneRequest -type WriteAuthMethodTuneRequest struct { +// AuthTuneConfigurationParametersRequest struct for AuthTuneConfigurationParametersRequest +type AuthTuneConfigurationParametersRequest struct { // A list of headers to whitelist and allow a plugin to set on responses. AllowedResponseHeaders []string `json:"allowed_response_headers"` @@ -48,16 +48,16 @@ type WriteAuthMethodTuneRequest struct { UserLockoutConfig map[string]interface{} `json:"user_lockout_config"` } -// NewWriteAuthMethodTuneRequestWithDefaults instantiates a new WriteAuthMethodTuneRequest object +// NewAuthTuneConfigurationParametersRequestWithDefaults instantiates a new AuthTuneConfigurationParametersRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteAuthMethodTuneRequestWithDefaults() *WriteAuthMethodTuneRequest { - var this WriteAuthMethodTuneRequest +func NewAuthTuneConfigurationParametersRequestWithDefaults() *AuthTuneConfigurationParametersRequest { + var this AuthTuneConfigurationParametersRequest return &this } -func (o WriteAuthMethodTuneRequest) MarshalJSON() ([]byte, error) { +func (o AuthTuneConfigurationParametersRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allowed_response_headers"] = o.AllowedResponseHeaders diff --git a/schema/model_aws_config_write_certificate_request.go b/schema/model_aws_configure_certificate_request.go similarity index 71% rename from schema/model_aws_config_write_certificate_request.go rename to schema/model_aws_configure_certificate_request.go index 54180960..cb53790a 100644 --- a/schema/model_aws_config_write_certificate_request.go +++ b/schema/model_aws_configure_certificate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteCertificateRequest struct for AWSConfigWriteCertificateRequest -type AWSConfigWriteCertificateRequest struct { +// AwsConfigureCertificateRequest struct for AwsConfigureCertificateRequest +type AwsConfigureCertificateRequest struct { // Base64 encoded AWS Public cert required to verify PKCS7 signature of the EC2 instance metadata. AwsPublicCert string `json:"aws_public_cert"` @@ -18,18 +18,18 @@ type AWSConfigWriteCertificateRequest struct { Type string `json:"type"` } -// NewAWSConfigWriteCertificateRequestWithDefaults instantiates a new AWSConfigWriteCertificateRequest object +// NewAwsConfigureCertificateRequestWithDefaults instantiates a new AwsConfigureCertificateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteCertificateRequestWithDefaults() *AWSConfigWriteCertificateRequest { - var this AWSConfigWriteCertificateRequest +func NewAwsConfigureCertificateRequestWithDefaults() *AwsConfigureCertificateRequest { + var this AwsConfigureCertificateRequest this.Type = "pkcs7" return &this } -func (o AWSConfigWriteCertificateRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureCertificateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["aws_public_cert"] = o.AwsPublicCert diff --git a/schema/model_aws_config_write_client_request.go b/schema/model_aws_configure_client_request.go similarity index 84% rename from schema/model_aws_config_write_client_request.go rename to schema/model_aws_configure_client_request.go index 4e4a1428..abe9d3c0 100644 --- a/schema/model_aws_config_write_client_request.go +++ b/schema/model_aws_configure_client_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteClientRequest struct for AWSConfigWriteClientRequest -type AWSConfigWriteClientRequest struct { +// AwsConfigureClientRequest struct for AwsConfigureClientRequest +type AwsConfigureClientRequest struct { // AWS Access Key ID for the account used to make AWS API requests. AccessKey string `json:"access_key"` @@ -39,11 +39,11 @@ type AWSConfigWriteClientRequest struct { StsRegion string `json:"sts_region"` } -// NewAWSConfigWriteClientRequestWithDefaults instantiates a new AWSConfigWriteClientRequest object +// NewAwsConfigureClientRequestWithDefaults instantiates a new AwsConfigureClientRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteClientRequestWithDefaults() *AWSConfigWriteClientRequest { - var this AWSConfigWriteClientRequest +func NewAwsConfigureClientRequestWithDefaults() *AwsConfigureClientRequest { + var this AwsConfigureClientRequest this.AccessKey = "" this.Endpoint = "" @@ -57,7 +57,7 @@ func NewAWSConfigWriteClientRequestWithDefaults() *AWSConfigWriteClientRequest { return &this } -func (o AWSConfigWriteClientRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureClientRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["access_key"] = o.AccessKey diff --git a/schema/model_aws_config_write_identity_access_list_request.go b/schema/model_aws_configure_identity_access_list_tidy_operation_request.go similarity index 61% rename from schema/model_aws_config_write_identity_access_list_request.go rename to schema/model_aws_configure_identity_access_list_tidy_operation_request.go index 78e0920a..1e36c77d 100644 --- a/schema/model_aws_config_write_identity_access_list_request.go +++ b/schema/model_aws_configure_identity_access_list_tidy_operation_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteIdentityAccessListRequest struct for AWSConfigWriteIdentityAccessListRequest -type AWSConfigWriteIdentityAccessListRequest struct { +// AwsConfigureIdentityAccessListTidyOperationRequest struct for AwsConfigureIdentityAccessListTidyOperationRequest +type AwsConfigureIdentityAccessListTidyOperationRequest struct { // If set to 'true', disables the periodic tidying of the 'identity-accesslist/' entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` @@ -18,11 +18,11 @@ type AWSConfigWriteIdentityAccessListRequest struct { SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSConfigWriteIdentityAccessListRequestWithDefaults instantiates a new AWSConfigWriteIdentityAccessListRequest object +// NewAwsConfigureIdentityAccessListTidyOperationRequestWithDefaults instantiates a new AwsConfigureIdentityAccessListTidyOperationRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteIdentityAccessListRequestWithDefaults() *AWSConfigWriteIdentityAccessListRequest { - var this AWSConfigWriteIdentityAccessListRequest +func NewAwsConfigureIdentityAccessListTidyOperationRequestWithDefaults() *AwsConfigureIdentityAccessListTidyOperationRequest { + var this AwsConfigureIdentityAccessListTidyOperationRequest this.DisablePeriodicTidy = false this.SafetyBuffer = 259200 @@ -30,7 +30,7 @@ func NewAWSConfigWriteIdentityAccessListRequestWithDefaults() *AWSConfigWriteIde return &this } -func (o AWSConfigWriteIdentityAccessListRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureIdentityAccessListTidyOperationRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_periodic_tidy"] = o.DisablePeriodicTidy diff --git a/schema/model_aws_config_write_identity_request.go b/schema/model_aws_configure_identity_integration_request.go similarity index 81% rename from schema/model_aws_config_write_identity_request.go rename to schema/model_aws_configure_identity_integration_request.go index b1c41eac..f47f8270 100644 --- a/schema/model_aws_config_write_identity_request.go +++ b/schema/model_aws_configure_identity_integration_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteIdentityRequest struct for AWSConfigWriteIdentityRequest -type AWSConfigWriteIdentityRequest struct { +// AwsConfigureIdentityIntegrationRequest struct for AwsConfigureIdentityIntegrationRequest +type AwsConfigureIdentityIntegrationRequest struct { // Configure how the AWS auth method generates entity alias when using EC2 auth. Valid values are \"role_id\", \"instance_id\", and \"image_id\". Defaults to \"role_id\". Ec2Alias string `json:"ec2_alias"` @@ -24,11 +24,11 @@ type AWSConfigWriteIdentityRequest struct { IamMetadata []string `json:"iam_metadata"` } -// NewAWSConfigWriteIdentityRequestWithDefaults instantiates a new AWSConfigWriteIdentityRequest object +// NewAwsConfigureIdentityIntegrationRequestWithDefaults instantiates a new AwsConfigureIdentityIntegrationRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteIdentityRequestWithDefaults() *AWSConfigWriteIdentityRequest { - var this AWSConfigWriteIdentityRequest +func NewAwsConfigureIdentityIntegrationRequestWithDefaults() *AwsConfigureIdentityIntegrationRequest { + var this AwsConfigureIdentityIntegrationRequest this.Ec2Alias = "instance_id" this.IamAlias = "unique_id" @@ -36,7 +36,7 @@ func NewAWSConfigWriteIdentityRequestWithDefaults() *AWSConfigWriteIdentityReque return &this } -func (o AWSConfigWriteIdentityRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureIdentityIntegrationRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["ec2_alias"] = o.Ec2Alias diff --git a/schema/model_aws_config_write_identity_white_list_request.go b/schema/model_aws_configure_identity_whitelist_tidy_operation_request.go similarity index 61% rename from schema/model_aws_config_write_identity_white_list_request.go rename to schema/model_aws_configure_identity_whitelist_tidy_operation_request.go index 6ac29527..d994e05c 100644 --- a/schema/model_aws_config_write_identity_white_list_request.go +++ b/schema/model_aws_configure_identity_whitelist_tidy_operation_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteIdentityWhiteListRequest struct for AWSConfigWriteIdentityWhiteListRequest -type AWSConfigWriteIdentityWhiteListRequest struct { +// AwsConfigureIdentityWhitelistTidyOperationRequest struct for AwsConfigureIdentityWhitelistTidyOperationRequest +type AwsConfigureIdentityWhitelistTidyOperationRequest struct { // If set to 'true', disables the periodic tidying of the 'identity-accesslist/' entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` @@ -18,11 +18,11 @@ type AWSConfigWriteIdentityWhiteListRequest struct { SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSConfigWriteIdentityWhiteListRequestWithDefaults instantiates a new AWSConfigWriteIdentityWhiteListRequest object +// NewAwsConfigureIdentityWhitelistTidyOperationRequestWithDefaults instantiates a new AwsConfigureIdentityWhitelistTidyOperationRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteIdentityWhiteListRequestWithDefaults() *AWSConfigWriteIdentityWhiteListRequest { - var this AWSConfigWriteIdentityWhiteListRequest +func NewAwsConfigureIdentityWhitelistTidyOperationRequestWithDefaults() *AwsConfigureIdentityWhitelistTidyOperationRequest { + var this AwsConfigureIdentityWhitelistTidyOperationRequest this.DisablePeriodicTidy = false this.SafetyBuffer = 259200 @@ -30,7 +30,7 @@ func NewAWSConfigWriteIdentityWhiteListRequestWithDefaults() *AWSConfigWriteIden return &this } -func (o AWSConfigWriteIdentityWhiteListRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureIdentityWhitelistTidyOperationRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_periodic_tidy"] = o.DisablePeriodicTidy diff --git a/schema/model_aws_config_write_lease_request.go b/schema/model_aws_configure_lease_request.go similarity index 63% rename from schema/model_aws_config_write_lease_request.go rename to schema/model_aws_configure_lease_request.go index 27b78d9b..a1b7d135 100644 --- a/schema/model_aws_config_write_lease_request.go +++ b/schema/model_aws_configure_lease_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteLeaseRequest struct for AWSConfigWriteLeaseRequest -type AWSConfigWriteLeaseRequest struct { +// AwsConfigureLeaseRequest struct for AwsConfigureLeaseRequest +type AwsConfigureLeaseRequest struct { // Default lease for roles. Lease string `json:"lease"` @@ -18,16 +18,16 @@ type AWSConfigWriteLeaseRequest struct { LeaseMax string `json:"lease_max"` } -// NewAWSConfigWriteLeaseRequestWithDefaults instantiates a new AWSConfigWriteLeaseRequest object +// NewAwsConfigureLeaseRequestWithDefaults instantiates a new AwsConfigureLeaseRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteLeaseRequestWithDefaults() *AWSConfigWriteLeaseRequest { - var this AWSConfigWriteLeaseRequest +func NewAwsConfigureLeaseRequestWithDefaults() *AwsConfigureLeaseRequest { + var this AwsConfigureLeaseRequest return &this } -func (o AWSConfigWriteLeaseRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureLeaseRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["lease"] = o.Lease diff --git a/schema/model_aws_config_write_role_tag_deny_list_request.go b/schema/model_aws_configure_role_tag_blacklist_tidy_operation_request.go similarity index 62% rename from schema/model_aws_config_write_role_tag_deny_list_request.go rename to schema/model_aws_configure_role_tag_blacklist_tidy_operation_request.go index 9e6b0ce8..31880620 100644 --- a/schema/model_aws_config_write_role_tag_deny_list_request.go +++ b/schema/model_aws_configure_role_tag_blacklist_tidy_operation_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteRoleTagDenyListRequest struct for AWSConfigWriteRoleTagDenyListRequest -type AWSConfigWriteRoleTagDenyListRequest struct { +// AwsConfigureRoleTagBlacklistTidyOperationRequest struct for AwsConfigureRoleTagBlacklistTidyOperationRequest +type AwsConfigureRoleTagBlacklistTidyOperationRequest struct { // If set to 'true', disables the periodic tidying of deny listed entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` @@ -18,11 +18,11 @@ type AWSConfigWriteRoleTagDenyListRequest struct { SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSConfigWriteRoleTagDenyListRequestWithDefaults instantiates a new AWSConfigWriteRoleTagDenyListRequest object +// NewAwsConfigureRoleTagBlacklistTidyOperationRequestWithDefaults instantiates a new AwsConfigureRoleTagBlacklistTidyOperationRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteRoleTagDenyListRequestWithDefaults() *AWSConfigWriteRoleTagDenyListRequest { - var this AWSConfigWriteRoleTagDenyListRequest +func NewAwsConfigureRoleTagBlacklistTidyOperationRequestWithDefaults() *AwsConfigureRoleTagBlacklistTidyOperationRequest { + var this AwsConfigureRoleTagBlacklistTidyOperationRequest this.DisablePeriodicTidy = false this.SafetyBuffer = 15552000 @@ -30,7 +30,7 @@ func NewAWSConfigWriteRoleTagDenyListRequestWithDefaults() *AWSConfigWriteRoleTa return &this } -func (o AWSConfigWriteRoleTagDenyListRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureRoleTagBlacklistTidyOperationRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_periodic_tidy"] = o.DisablePeriodicTidy diff --git a/schema/model_aws_config_write_role_tag_black_list_request.go b/schema/model_aws_configure_role_tag_deny_list_tidy_operation_request.go similarity index 62% rename from schema/model_aws_config_write_role_tag_black_list_request.go rename to schema/model_aws_configure_role_tag_deny_list_tidy_operation_request.go index 8594ae22..2e67e7ea 100644 --- a/schema/model_aws_config_write_role_tag_black_list_request.go +++ b/schema/model_aws_configure_role_tag_deny_list_tidy_operation_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteRoleTagBlackListRequest struct for AWSConfigWriteRoleTagBlackListRequest -type AWSConfigWriteRoleTagBlackListRequest struct { +// AwsConfigureRoleTagDenyListTidyOperationRequest struct for AwsConfigureRoleTagDenyListTidyOperationRequest +type AwsConfigureRoleTagDenyListTidyOperationRequest struct { // If set to 'true', disables the periodic tidying of deny listed entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` @@ -18,11 +18,11 @@ type AWSConfigWriteRoleTagBlackListRequest struct { SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSConfigWriteRoleTagBlackListRequestWithDefaults instantiates a new AWSConfigWriteRoleTagBlackListRequest object +// NewAwsConfigureRoleTagDenyListTidyOperationRequestWithDefaults instantiates a new AwsConfigureRoleTagDenyListTidyOperationRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteRoleTagBlackListRequestWithDefaults() *AWSConfigWriteRoleTagBlackListRequest { - var this AWSConfigWriteRoleTagBlackListRequest +func NewAwsConfigureRoleTagDenyListTidyOperationRequestWithDefaults() *AwsConfigureRoleTagDenyListTidyOperationRequest { + var this AwsConfigureRoleTagDenyListTidyOperationRequest this.DisablePeriodicTidy = false this.SafetyBuffer = 15552000 @@ -30,7 +30,7 @@ func NewAWSConfigWriteRoleTagBlackListRequestWithDefaults() *AWSConfigWriteRoleT return &this } -func (o AWSConfigWriteRoleTagBlackListRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureRoleTagDenyListTidyOperationRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_periodic_tidy"] = o.DisablePeriodicTidy diff --git a/schema/model_aws_config_write_root_iam_credentials_request.go b/schema/model_aws_configure_root_iam_credentials_request.go similarity index 73% rename from schema/model_aws_config_write_root_iam_credentials_request.go rename to schema/model_aws_configure_root_iam_credentials_request.go index 04d3432e..e59a11e2 100644 --- a/schema/model_aws_config_write_root_iam_credentials_request.go +++ b/schema/model_aws_configure_root_iam_credentials_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSConfigWriteRootIAMCredentialsRequest struct for AWSConfigWriteRootIAMCredentialsRequest -type AWSConfigWriteRootIAMCredentialsRequest struct { +// AwsConfigureRootIamCredentialsRequest struct for AwsConfigureRootIamCredentialsRequest +type AwsConfigureRootIamCredentialsRequest struct { // Access key with permission to create new keys. AccessKey string `json:"access_key"` @@ -33,18 +33,18 @@ type AWSConfigWriteRootIAMCredentialsRequest struct { UsernameTemplate string `json:"username_template"` } -// NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults instantiates a new AWSConfigWriteRootIAMCredentialsRequest object +// NewAwsConfigureRootIamCredentialsRequestWithDefaults instantiates a new AwsConfigureRootIamCredentialsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults() *AWSConfigWriteRootIAMCredentialsRequest { - var this AWSConfigWriteRootIAMCredentialsRequest +func NewAwsConfigureRootIamCredentialsRequestWithDefaults() *AwsConfigureRootIamCredentialsRequest { + var this AwsConfigureRootIamCredentialsRequest this.MaxRetries = -1 return &this } -func (o AWSConfigWriteRootIAMCredentialsRequest) MarshalJSON() ([]byte, error) { +func (o AwsConfigureRootIamCredentialsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["access_key"] = o.AccessKey diff --git a/schema/model_aws_write_credentials_request.go b/schema/model_aws_generate_credentials2_request.go similarity index 65% rename from schema/model_aws_write_credentials_request.go rename to schema/model_aws_generate_credentials2_request.go index d096b713..d9f7d730 100644 --- a/schema/model_aws_write_credentials_request.go +++ b/schema/model_aws_generate_credentials2_request.go @@ -9,11 +9,8 @@ import ( "encoding/json" ) -// AWSWriteCredentialsRequest struct for AWSWriteCredentialsRequest -type AWSWriteCredentialsRequest struct { - // Name of the role - Name string `json:"name"` - +// AwsGenerateCredentials2Request struct for AwsGenerateCredentials2Request +type AwsGenerateCredentials2Request struct { // ARN of role to assume when credential_type is assumed_role RoleArn string `json:"role_arn"` @@ -24,21 +21,20 @@ type AWSWriteCredentialsRequest struct { Ttl int32 `json:"ttl"` } -// NewAWSWriteCredentialsRequestWithDefaults instantiates a new AWSWriteCredentialsRequest object +// NewAwsGenerateCredentials2RequestWithDefaults instantiates a new AwsGenerateCredentials2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteCredentialsRequestWithDefaults() *AWSWriteCredentialsRequest { - var this AWSWriteCredentialsRequest +func NewAwsGenerateCredentials2RequestWithDefaults() *AwsGenerateCredentials2Request { + var this AwsGenerateCredentials2Request this.Ttl = 3600 return &this } -func (o AWSWriteCredentialsRequest) MarshalJSON() ([]byte, error) { +func (o AwsGenerateCredentials2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) - toSerialize["name"] = o.Name toSerialize["role_arn"] = o.RoleArn toSerialize["role_session_name"] = o.RoleSessionName toSerialize["ttl"] = o.Ttl diff --git a/schema/model_aws_write_security_token_service_request.go b/schema/model_aws_generate_sts_credentials2_request.go similarity index 65% rename from schema/model_aws_write_security_token_service_request.go rename to schema/model_aws_generate_sts_credentials2_request.go index 45babbd8..3e6e8f42 100644 --- a/schema/model_aws_write_security_token_service_request.go +++ b/schema/model_aws_generate_sts_credentials2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSWriteSecurityTokenServiceRequest struct for AWSWriteSecurityTokenServiceRequest -type AWSWriteSecurityTokenServiceRequest struct { +// AwsGenerateStsCredentials2Request struct for AwsGenerateStsCredentials2Request +type AwsGenerateStsCredentials2Request struct { // ARN of role to assume when credential_type is assumed_role RoleArn string `json:"role_arn"` @@ -21,18 +21,18 @@ type AWSWriteSecurityTokenServiceRequest struct { Ttl int32 `json:"ttl"` } -// NewAWSWriteSecurityTokenServiceRequestWithDefaults instantiates a new AWSWriteSecurityTokenServiceRequest object +// NewAwsGenerateStsCredentials2RequestWithDefaults instantiates a new AwsGenerateStsCredentials2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteSecurityTokenServiceRequestWithDefaults() *AWSWriteSecurityTokenServiceRequest { - var this AWSWriteSecurityTokenServiceRequest +func NewAwsGenerateStsCredentials2RequestWithDefaults() *AwsGenerateStsCredentials2Request { + var this AwsGenerateStsCredentials2Request this.Ttl = 3600 return &this } -func (o AWSWriteSecurityTokenServiceRequest) MarshalJSON() ([]byte, error) { +func (o AwsGenerateStsCredentials2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["role_arn"] = o.RoleArn diff --git a/schema/model_aws_login_request.go b/schema/model_aws_login_request.go index cab928eb..f45df3c0 100644 --- a/schema/model_aws_login_request.go +++ b/schema/model_aws_login_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSLoginRequest struct for AWSLoginRequest -type AWSLoginRequest struct { +// AwsLoginRequest struct for AwsLoginRequest +type AwsLoginRequest struct { // HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value IamHttpRequestMethod string `json:"iam_http_request_method"` @@ -39,16 +39,16 @@ type AWSLoginRequest struct { Signature string `json:"signature"` } -// NewAWSLoginRequestWithDefaults instantiates a new AWSLoginRequest object +// NewAwsLoginRequestWithDefaults instantiates a new AwsLoginRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSLoginRequestWithDefaults() *AWSLoginRequest { - var this AWSLoginRequest +func NewAwsLoginRequestWithDefaults() *AwsLoginRequest { + var this AwsLoginRequest return &this } -func (o AWSLoginRequest) MarshalJSON() ([]byte, error) { +func (o AwsLoginRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["iam_http_request_method"] = o.IamHttpRequestMethod diff --git a/schema/model_aws_write_identity_white_list_tidy_settings_request.go b/schema/model_aws_tidy_identity_access_list_request.go similarity index 56% rename from schema/model_aws_write_identity_white_list_tidy_settings_request.go rename to schema/model_aws_tidy_identity_access_list_request.go index 1e186bdc..7fa67e1b 100644 --- a/schema/model_aws_write_identity_white_list_tidy_settings_request.go +++ b/schema/model_aws_tidy_identity_access_list_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// AWSWriteIdentityWhiteListTidySettingsRequest struct for AWSWriteIdentityWhiteListTidySettingsRequest -type AWSWriteIdentityWhiteListTidySettingsRequest struct { +// AwsTidyIdentityAccessListRequest struct for AwsTidyIdentityAccessListRequest +type AwsTidyIdentityAccessListRequest struct { // The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults instantiates a new AWSWriteIdentityWhiteListTidySettingsRequest object +// NewAwsTidyIdentityAccessListRequestWithDefaults instantiates a new AwsTidyIdentityAccessListRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults() *AWSWriteIdentityWhiteListTidySettingsRequest { - var this AWSWriteIdentityWhiteListTidySettingsRequest +func NewAwsTidyIdentityAccessListRequestWithDefaults() *AwsTidyIdentityAccessListRequest { + var this AwsTidyIdentityAccessListRequest this.SafetyBuffer = 259200 return &this } -func (o AWSWriteIdentityWhiteListTidySettingsRequest) MarshalJSON() ([]byte, error) { +func (o AwsTidyIdentityAccessListRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["safety_buffer"] = o.SafetyBuffer diff --git a/schema/model_aws_write_identity_access_list_tidy_settings_request.go b/schema/model_aws_tidy_identity_whitelist_request.go similarity index 56% rename from schema/model_aws_write_identity_access_list_tidy_settings_request.go rename to schema/model_aws_tidy_identity_whitelist_request.go index 948088a9..dc8cbff7 100644 --- a/schema/model_aws_write_identity_access_list_tidy_settings_request.go +++ b/schema/model_aws_tidy_identity_whitelist_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// AWSWriteIdentityAccessListTidySettingsRequest struct for AWSWriteIdentityAccessListTidySettingsRequest -type AWSWriteIdentityAccessListTidySettingsRequest struct { +// AwsTidyIdentityWhitelistRequest struct for AwsTidyIdentityWhitelistRequest +type AwsTidyIdentityWhitelistRequest struct { // The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults instantiates a new AWSWriteIdentityAccessListTidySettingsRequest object +// NewAwsTidyIdentityWhitelistRequestWithDefaults instantiates a new AwsTidyIdentityWhitelistRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults() *AWSWriteIdentityAccessListTidySettingsRequest { - var this AWSWriteIdentityAccessListTidySettingsRequest +func NewAwsTidyIdentityWhitelistRequestWithDefaults() *AwsTidyIdentityWhitelistRequest { + var this AwsTidyIdentityWhitelistRequest this.SafetyBuffer = 259200 return &this } -func (o AWSWriteIdentityAccessListTidySettingsRequest) MarshalJSON() ([]byte, error) { +func (o AwsTidyIdentityWhitelistRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["safety_buffer"] = o.SafetyBuffer diff --git a/schema/model_aws_write_role_tag_deny_list_tidy_settings_request.go b/schema/model_aws_tidy_role_tag_blacklist_request.go similarity index 57% rename from schema/model_aws_write_role_tag_deny_list_tidy_settings_request.go rename to schema/model_aws_tidy_role_tag_blacklist_request.go index 9c401dc5..01e0dcf9 100644 --- a/schema/model_aws_write_role_tag_deny_list_tidy_settings_request.go +++ b/schema/model_aws_tidy_role_tag_blacklist_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// AWSWriteRoleTagDenyListTidySettingsRequest struct for AWSWriteRoleTagDenyListTidySettingsRequest -type AWSWriteRoleTagDenyListTidySettingsRequest struct { +// AwsTidyRoleTagBlacklistRequest struct for AwsTidyRoleTagBlacklistRequest +type AwsTidyRoleTagBlacklistRequest struct { // The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults instantiates a new AWSWriteRoleTagDenyListTidySettingsRequest object +// NewAwsTidyRoleTagBlacklistRequestWithDefaults instantiates a new AwsTidyRoleTagBlacklistRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults() *AWSWriteRoleTagDenyListTidySettingsRequest { - var this AWSWriteRoleTagDenyListTidySettingsRequest +func NewAwsTidyRoleTagBlacklistRequestWithDefaults() *AwsTidyRoleTagBlacklistRequest { + var this AwsTidyRoleTagBlacklistRequest this.SafetyBuffer = 259200 return &this } -func (o AWSWriteRoleTagDenyListTidySettingsRequest) MarshalJSON() ([]byte, error) { +func (o AwsTidyRoleTagBlacklistRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["safety_buffer"] = o.SafetyBuffer diff --git a/schema/model_aws_write_role_tag_black_list_tidy_settings_request.go b/schema/model_aws_tidy_role_tag_deny_list_request.go similarity index 56% rename from schema/model_aws_write_role_tag_black_list_tidy_settings_request.go rename to schema/model_aws_tidy_role_tag_deny_list_request.go index d68697e5..c0139a6b 100644 --- a/schema/model_aws_write_role_tag_black_list_tidy_settings_request.go +++ b/schema/model_aws_tidy_role_tag_deny_list_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// AWSWriteRoleTagBlackListTidySettingsRequest struct for AWSWriteRoleTagBlackListTidySettingsRequest -type AWSWriteRoleTagBlackListTidySettingsRequest struct { +// AwsTidyRoleTagDenyListRequest struct for AwsTidyRoleTagDenyListRequest +type AwsTidyRoleTagDenyListRequest struct { // The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` } -// NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults instantiates a new AWSWriteRoleTagBlackListTidySettingsRequest object +// NewAwsTidyRoleTagDenyListRequestWithDefaults instantiates a new AwsTidyRoleTagDenyListRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults() *AWSWriteRoleTagBlackListTidySettingsRequest { - var this AWSWriteRoleTagBlackListTidySettingsRequest +func NewAwsTidyRoleTagDenyListRequestWithDefaults() *AwsTidyRoleTagDenyListRequest { + var this AwsTidyRoleTagDenyListRequest this.SafetyBuffer = 259200 return &this } -func (o AWSWriteRoleTagBlackListTidySettingsRequest) MarshalJSON() ([]byte, error) { +func (o AwsTidyRoleTagDenyListRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["safety_buffer"] = o.SafetyBuffer diff --git a/schema/model_aws_write_auth_role_request.go b/schema/model_aws_write_auth_role_request.go index 4a9b2243..f42065c5 100644 --- a/schema/model_aws_write_auth_role_request.go +++ b/schema/model_aws_write_auth_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSWriteAuthRoleRequest struct for AWSWriteAuthRoleRequest -type AWSWriteAuthRoleRequest struct { +// AwsWriteAuthRoleRequest struct for AwsWriteAuthRoleRequest +type AwsWriteAuthRoleRequest struct { // If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution. This is only checked when auth_type is ec2. AllowInstanceMigration bool `json:"allow_instance_migration"` @@ -103,11 +103,11 @@ type AWSWriteAuthRoleRequest struct { Ttl int32 `json:"ttl"` } -// NewAWSWriteAuthRoleRequestWithDefaults instantiates a new AWSWriteAuthRoleRequest object +// NewAwsWriteAuthRoleRequestWithDefaults instantiates a new AwsWriteAuthRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteAuthRoleRequestWithDefaults() *AWSWriteAuthRoleRequest { - var this AWSWriteAuthRoleRequest +func NewAwsWriteAuthRoleRequestWithDefaults() *AwsWriteAuthRoleRequest { + var this AwsWriteAuthRoleRequest this.AllowInstanceMigration = false this.DisallowReauthentication = false @@ -118,7 +118,7 @@ func NewAWSWriteAuthRoleRequestWithDefaults() *AWSWriteAuthRoleRequest { return &this } -func (o AWSWriteAuthRoleRequest) MarshalJSON() ([]byte, error) { +func (o AwsWriteAuthRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allow_instance_migration"] = o.AllowInstanceMigration diff --git a/schema/model_aws_write_role_request.go b/schema/model_aws_write_role_request.go index b8ea62ae..60e3dfcf 100644 --- a/schema/model_aws_write_role_request.go +++ b/schema/model_aws_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSWriteRoleRequest struct for AWSWriteRoleRequest -type AWSWriteRoleRequest struct { +// AwsWriteRoleRequest struct for AwsWriteRoleRequest +type AwsWriteRoleRequest struct { // Use role_arns or policy_arns instead. // Deprecated Arn string `json:"arn"` @@ -50,18 +50,18 @@ type AWSWriteRoleRequest struct { UserPath string `json:"user_path"` } -// NewAWSWriteRoleRequestWithDefaults instantiates a new AWSWriteRoleRequest object +// NewAwsWriteRoleRequestWithDefaults instantiates a new AwsWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteRoleRequestWithDefaults() *AWSWriteRoleRequest { - var this AWSWriteRoleRequest +func NewAwsWriteRoleRequestWithDefaults() *AwsWriteRoleRequest { + var this AwsWriteRoleRequest this.UserPath = "/" return &this } -func (o AWSWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o AwsWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["arn"] = o.Arn diff --git a/schema/model_aws_write_auth_role_tag_request.go b/schema/model_aws_write_role_tag_request.go similarity index 83% rename from schema/model_aws_write_auth_role_tag_request.go rename to schema/model_aws_write_role_tag_request.go index ec6db8be..98fc5822 100644 --- a/schema/model_aws_write_auth_role_tag_request.go +++ b/schema/model_aws_write_role_tag_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AWSWriteAuthRoleTagRequest struct for AWSWriteAuthRoleTagRequest -type AWSWriteAuthRoleTagRequest struct { +// AwsWriteRoleTagRequest struct for AwsWriteRoleTagRequest +type AwsWriteRoleTagRequest struct { // If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution. AllowInstanceMigration bool `json:"allow_instance_migration"` @@ -27,11 +27,11 @@ type AWSWriteAuthRoleTagRequest struct { Policies []string `json:"policies"` } -// NewAWSWriteAuthRoleTagRequestWithDefaults instantiates a new AWSWriteAuthRoleTagRequest object +// NewAwsWriteRoleTagRequestWithDefaults instantiates a new AwsWriteRoleTagRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSWriteAuthRoleTagRequestWithDefaults() *AWSWriteAuthRoleTagRequest { - var this AWSWriteAuthRoleTagRequest +func NewAwsWriteRoleTagRequestWithDefaults() *AwsWriteRoleTagRequest { + var this AwsWriteRoleTagRequest this.AllowInstanceMigration = false this.DisallowReauthentication = false @@ -40,7 +40,7 @@ func NewAWSWriteAuthRoleTagRequestWithDefaults() *AWSWriteAuthRoleTagRequest { return &this } -func (o AWSWriteAuthRoleTagRequest) MarshalJSON() ([]byte, error) { +func (o AwsWriteRoleTagRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allow_instance_migration"] = o.AllowInstanceMigration diff --git a/schema/model_aws_config_write_security_token_service_account_request.go b/schema/model_aws_write_sts_role_request.go similarity index 53% rename from schema/model_aws_config_write_security_token_service_account_request.go rename to schema/model_aws_write_sts_role_request.go index 25b91ac6..300d55c9 100644 --- a/schema/model_aws_config_write_security_token_service_account_request.go +++ b/schema/model_aws_write_sts_role_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// AWSConfigWriteSecurityTokenServiceAccountRequest struct for AWSConfigWriteSecurityTokenServiceAccountRequest -type AWSConfigWriteSecurityTokenServiceAccountRequest struct { +// AwsWriteStsRoleRequest struct for AwsWriteStsRoleRequest +type AwsWriteStsRoleRequest struct { // AWS ARN for STS role to be assumed when interacting with the account specified. The Vault server must have permissions to assume this role. StsRole string `json:"sts_role"` } -// NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults instantiates a new AWSConfigWriteSecurityTokenServiceAccountRequest object +// NewAwsWriteStsRoleRequestWithDefaults instantiates a new AwsWriteStsRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults() *AWSConfigWriteSecurityTokenServiceAccountRequest { - var this AWSConfigWriteSecurityTokenServiceAccountRequest +func NewAwsWriteStsRoleRequestWithDefaults() *AwsWriteStsRoleRequest { + var this AwsWriteStsRoleRequest return &this } -func (o AWSConfigWriteSecurityTokenServiceAccountRequest) MarshalJSON() ([]byte, error) { +func (o AwsWriteStsRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["sts_role"] = o.StsRole diff --git a/schema/model_azure_write_auth_config_request.go b/schema/model_azure_configure_auth_request.go similarity index 72% rename from schema/model_azure_write_auth_config_request.go rename to schema/model_azure_configure_auth_request.go index 58b78a75..afcdcc48 100644 --- a/schema/model_azure_write_auth_config_request.go +++ b/schema/model_azure_configure_auth_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AzureWriteAuthConfigRequest struct for AzureWriteAuthConfigRequest -type AzureWriteAuthConfigRequest struct { +// AzureConfigureAuthRequest struct for AzureConfigureAuthRequest +type AzureConfigureAuthRequest struct { // The OAuth2 client id to connection to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable. ClientId string `json:"client_id"` @@ -23,26 +23,30 @@ type AzureWriteAuthConfigRequest struct { // The resource URL for the vault application in Azure Active Directory. This value can also be provided with the AZURE_AD_RESOURCE environment variable. Resource string `json:"resource"` + // The TTL of the root password in Azure. This can be either a number of seconds or a time formatted duration (ex: 24h, 48ds) + RootPasswordTtl int32 `json:"root_password_ttl"` + // The tenant id for the Azure Active Directory. This is sometimes referred to as Directory ID in AD. This value can also be provided with the AZURE_TENANT_ID environment variable. TenantId string `json:"tenant_id"` } -// NewAzureWriteAuthConfigRequestWithDefaults instantiates a new AzureWriteAuthConfigRequest object +// NewAzureConfigureAuthRequestWithDefaults instantiates a new AzureConfigureAuthRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAzureWriteAuthConfigRequestWithDefaults() *AzureWriteAuthConfigRequest { - var this AzureWriteAuthConfigRequest +func NewAzureConfigureAuthRequestWithDefaults() *AzureConfigureAuthRequest { + var this AzureConfigureAuthRequest return &this } -func (o AzureWriteAuthConfigRequest) MarshalJSON() ([]byte, error) { +func (o AzureConfigureAuthRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_id"] = o.ClientId toSerialize["client_secret"] = o.ClientSecret toSerialize["environment"] = o.Environment toSerialize["resource"] = o.Resource + toSerialize["root_password_ttl"] = o.RootPasswordTtl toSerialize["tenant_id"] = o.TenantId return json.Marshal(toSerialize) diff --git a/schema/model_azure_write_config_request.go b/schema/model_azure_configure_request.go similarity index 84% rename from schema/model_azure_write_config_request.go rename to schema/model_azure_configure_request.go index ceafcd24..71e6efe5 100644 --- a/schema/model_azure_write_config_request.go +++ b/schema/model_azure_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// AzureWriteConfigRequest struct for AzureWriteConfigRequest -type AzureWriteConfigRequest struct { +// AzureConfigureRequest struct for AzureConfigureRequest +type AzureConfigureRequest struct { // The OAuth2 client id to connect to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable. ClientId string `json:"client_id"` @@ -33,16 +33,16 @@ type AzureWriteConfigRequest struct { TenantId string `json:"tenant_id"` } -// NewAzureWriteConfigRequestWithDefaults instantiates a new AzureWriteConfigRequest object +// NewAzureConfigureRequestWithDefaults instantiates a new AzureConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAzureWriteConfigRequestWithDefaults() *AzureWriteConfigRequest { - var this AzureWriteConfigRequest +func NewAzureConfigureRequestWithDefaults() *AzureConfigureRequest { + var this AzureConfigureRequest return &this } -func (o AzureWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o AzureConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_id"] = o.ClientId diff --git a/schema/model_azure_login_request.go b/schema/model_azure_login_request.go index f23abb7e..6bb08f05 100644 --- a/schema/model_azure_login_request.go +++ b/schema/model_azure_login_request.go @@ -17,6 +17,9 @@ type AzureLoginRequest struct { // The resource group from the instance. ResourceGroupName string `json:"resource_group_name"` + // The fully qualified ID of the resource, includingthe resource name and resource type. Use the format, /subscriptions/{guid}/resourceGroups/{resource-group-name}/{resource-provider-namespace}/{resource-type}/{resource-name}. This value is ignored if vm_name or vmss_name is specified. + ResourceId string `json:"resource_id"` + // The token role. Role string `json:"role"` @@ -44,6 +47,7 @@ func (o AzureLoginRequest) MarshalJSON() ([]byte, error) { toSerialize["jwt"] = o.Jwt toSerialize["resource_group_name"] = o.ResourceGroupName + toSerialize["resource_id"] = o.ResourceId toSerialize["role"] = o.Role toSerialize["subscription_id"] = o.SubscriptionId toSerialize["vm_name"] = o.VmName diff --git a/schema/model_azure_write_role_request.go b/schema/model_azure_write_role_request.go index edbb829e..ba4efc29 100644 --- a/schema/model_azure_write_role_request.go +++ b/schema/model_azure_write_role_request.go @@ -26,6 +26,9 @@ type AzureWriteRoleRequest struct { // Indicates whether new application objects should be permanently deleted. If not set, objects will not be permanently deleted. PermanentlyDelete bool `json:"permanently_delete"` + // Persist the app between generated credentials. Useful if the app needs to maintain owner ship of resources it creates + PersistApp bool `json:"persist_app"` + // Default lease for generated credentials. If not set or set to 0, will use system default. Ttl int32 `json:"ttl"` } @@ -37,6 +40,7 @@ func NewAzureWriteRoleRequestWithDefaults() *AzureWriteRoleRequest { var this AzureWriteRoleRequest this.PermanentlyDelete = false + this.PersistApp = false return &this } @@ -49,6 +53,7 @@ func (o AzureWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["azure_roles"] = o.AzureRoles toSerialize["max_ttl"] = o.MaxTtl toSerialize["permanently_delete"] = o.PermanentlyDelete + toSerialize["persist_app"] = o.PersistApp toSerialize["ttl"] = o.Ttl return json.Marshal(toSerialize) diff --git a/schema/model_centrify_write_config_request.go b/schema/model_centrify_configure_request.go similarity index 85% rename from schema/model_centrify_write_config_request.go rename to schema/model_centrify_configure_request.go index ca93d2ad..07136d06 100644 --- a/schema/model_centrify_write_config_request.go +++ b/schema/model_centrify_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// CentrifyWriteConfigRequest struct for CentrifyWriteConfigRequest -type CentrifyWriteConfigRequest struct { +// CentrifyConfigureRequest struct for CentrifyConfigureRequest +type CentrifyConfigureRequest struct { // OAuth2 App ID AppId string `json:"app_id"` @@ -49,11 +49,11 @@ type CentrifyWriteConfigRequest struct { TokenType string `json:"token_type"` } -// NewCentrifyWriteConfigRequestWithDefaults instantiates a new CentrifyWriteConfigRequest object +// NewCentrifyConfigureRequestWithDefaults instantiates a new CentrifyConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewCentrifyWriteConfigRequestWithDefaults() *CentrifyWriteConfigRequest { - var this CentrifyWriteConfigRequest +func NewCentrifyConfigureRequestWithDefaults() *CentrifyConfigureRequest { + var this CentrifyConfigureRequest this.AppId = "vault_io_integration" this.Scope = "vault_io_integration" @@ -62,7 +62,7 @@ func NewCentrifyWriteConfigRequestWithDefaults() *CentrifyWriteConfigRequest { return &this } -func (o CentrifyWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o CentrifyConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["app_id"] = o.AppId diff --git a/schema/model_certificates_write_config_request.go b/schema/model_cert_configure_request.go similarity index 75% rename from schema/model_certificates_write_config_request.go rename to schema/model_cert_configure_request.go index 5720aa6d..bf1dff18 100644 --- a/schema/model_certificates_write_config_request.go +++ b/schema/model_cert_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// CertificatesWriteConfigRequest struct for CertificatesWriteConfigRequest -type CertificatesWriteConfigRequest struct { +// CertConfigureRequest struct for CertConfigureRequest +type CertConfigureRequest struct { // If set, during renewal, skips the matching of presented client identity with the client identity used during login. Defaults to false. DisableBinding bool `json:"disable_binding"` @@ -21,11 +21,11 @@ type CertificatesWriteConfigRequest struct { OcspCacheSize int32 `json:"ocsp_cache_size"` } -// NewCertificatesWriteConfigRequestWithDefaults instantiates a new CertificatesWriteConfigRequest object +// NewCertConfigureRequestWithDefaults instantiates a new CertConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewCertificatesWriteConfigRequestWithDefaults() *CertificatesWriteConfigRequest { - var this CertificatesWriteConfigRequest +func NewCertConfigureRequestWithDefaults() *CertConfigureRequest { + var this CertConfigureRequest this.DisableBinding = false this.EnableIdentityAliasMetadata = false @@ -34,7 +34,7 @@ func NewCertificatesWriteConfigRequestWithDefaults() *CertificatesWriteConfigReq return &this } -func (o CertificatesWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o CertConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_binding"] = o.DisableBinding diff --git a/schema/model_certificates_login_request.go b/schema/model_cert_login_request.go similarity index 61% rename from schema/model_certificates_login_request.go rename to schema/model_cert_login_request.go index 2bc350ee..2e81d4fb 100644 --- a/schema/model_certificates_login_request.go +++ b/schema/model_cert_login_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// CertificatesLoginRequest struct for CertificatesLoginRequest -type CertificatesLoginRequest struct { +// CertLoginRequest struct for CertLoginRequest +type CertLoginRequest struct { // The name of the certificate role to authenticate against. Name string `json:"name"` } -// NewCertificatesLoginRequestWithDefaults instantiates a new CertificatesLoginRequest object +// NewCertLoginRequestWithDefaults instantiates a new CertLoginRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewCertificatesLoginRequestWithDefaults() *CertificatesLoginRequest { - var this CertificatesLoginRequest +func NewCertLoginRequestWithDefaults() *CertLoginRequest { + var this CertLoginRequest return &this } -func (o CertificatesLoginRequest) MarshalJSON() ([]byte, error) { +func (o CertLoginRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["name"] = o.Name diff --git a/schema/model_certificates_write_request.go b/schema/model_cert_write_certificate_request.go similarity index 94% rename from schema/model_certificates_write_request.go rename to schema/model_cert_write_certificate_request.go index be2fbbd2..8fc22f60 100644 --- a/schema/model_certificates_write_request.go +++ b/schema/model_cert_write_certificate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// CertificatesWriteRequest struct for CertificatesWriteRequest -type CertificatesWriteRequest struct { +// CertWriteCertificateRequest struct for CertWriteCertificateRequest +type CertWriteCertificateRequest struct { // A comma-separated list of names. At least one must exist in the Common Name. Supports globbing. AllowedCommonNames []string `json:"allowed_common_names"` @@ -108,11 +108,11 @@ type CertificatesWriteRequest struct { Ttl int32 `json:"ttl"` } -// NewCertificatesWriteRequestWithDefaults instantiates a new CertificatesWriteRequest object +// NewCertWriteCertificateRequestWithDefaults instantiates a new CertWriteCertificateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewCertificatesWriteRequestWithDefaults() *CertificatesWriteRequest { - var this CertificatesWriteRequest +func NewCertWriteCertificateRequestWithDefaults() *CertWriteCertificateRequest { + var this CertWriteCertificateRequest this.OcspFailOpen = false this.OcspQueryAllServers = false @@ -121,7 +121,7 @@ func NewCertificatesWriteRequestWithDefaults() *CertificatesWriteRequest { return &this } -func (o CertificatesWriteRequest) MarshalJSON() ([]byte, error) { +func (o CertWriteCertificateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allowed_common_names"] = o.AllowedCommonNames diff --git a/schema/model_certificates_write_crl_request.go b/schema/model_cert_write_crl_request.go similarity index 69% rename from schema/model_certificates_write_crl_request.go rename to schema/model_cert_write_crl_request.go index dd5d8b26..9e5b23e0 100644 --- a/schema/model_certificates_write_crl_request.go +++ b/schema/model_cert_write_crl_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// CertificatesWriteCRLRequest struct for CertificatesWriteCRLRequest -type CertificatesWriteCRLRequest struct { +// CertWriteCrlRequest struct for CertWriteCrlRequest +type CertWriteCrlRequest struct { // The public CRL that should be trusted to attest to certificates' validity statuses. May be DER or PEM encoded. Note: the expiration time is ignored; if the CRL is no longer valid, delete it using the same name as specified here. Crl string `json:"crl"` @@ -18,16 +18,16 @@ type CertificatesWriteCRLRequest struct { Url string `json:"url"` } -// NewCertificatesWriteCRLRequestWithDefaults instantiates a new CertificatesWriteCRLRequest object +// NewCertWriteCrlRequestWithDefaults instantiates a new CertWriteCrlRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewCertificatesWriteCRLRequestWithDefaults() *CertificatesWriteCRLRequest { - var this CertificatesWriteCRLRequest +func NewCertWriteCrlRequestWithDefaults() *CertWriteCrlRequest { + var this CertWriteCrlRequest return &this } -func (o CertificatesWriteCRLRequest) MarshalJSON() ([]byte, error) { +func (o CertWriteCrlRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["crl"] = o.Crl diff --git a/schema/model_cloud_foundry_write_config_request.go b/schema/model_cloud_foundry_configure_request.go similarity index 88% rename from schema/model_cloud_foundry_write_config_request.go rename to schema/model_cloud_foundry_configure_request.go index dcdd76c8..6d81821b 100644 --- a/schema/model_cloud_foundry_write_config_request.go +++ b/schema/model_cloud_foundry_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// CloudFoundryWriteConfigRequest struct for CloudFoundryWriteConfigRequest -type CloudFoundryWriteConfigRequest struct { +// CloudFoundryConfigureRequest struct for CloudFoundryConfigureRequest +type CloudFoundryConfigureRequest struct { // CF’s API address. CfApiAddr string `json:"cf_api_addr"` @@ -61,11 +61,11 @@ type CloudFoundryWriteConfigRequest struct { PcfUsername string `json:"pcf_username"` } -// NewCloudFoundryWriteConfigRequestWithDefaults instantiates a new CloudFoundryWriteConfigRequest object +// NewCloudFoundryConfigureRequestWithDefaults instantiates a new CloudFoundryConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewCloudFoundryWriteConfigRequestWithDefaults() *CloudFoundryWriteConfigRequest { - var this CloudFoundryWriteConfigRequest +func NewCloudFoundryConfigureRequestWithDefaults() *CloudFoundryConfigureRequest { + var this CloudFoundryConfigureRequest this.LoginMaxSecondsNotAfter = 60 this.LoginMaxSecondsNotBefore = 300 @@ -73,7 +73,7 @@ func NewCloudFoundryWriteConfigRequestWithDefaults() *CloudFoundryWriteConfigReq return &this } -func (o CloudFoundryWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o CloudFoundryConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cf_api_addr"] = o.CfApiAddr diff --git a/schema/model_collect_host_information_response.go b/schema/model_collect_host_information_response.go new file mode 100644 index 00000000..42f82d27 --- /dev/null +++ b/schema/model_collect_host_information_response.go @@ -0,0 +1,48 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// CollectHostInformationResponse struct for CollectHostInformationResponse +type CollectHostInformationResponse struct { + Cpu []map[string]interface{} `json:"cpu"` + + CpuTimes []map[string]interface{} `json:"cpu_times"` + + Disk []map[string]interface{} `json:"disk"` + + Host map[string]interface{} `json:"host"` + + Memory map[string]interface{} `json:"memory"` + + Timestamp time.Time `json:"timestamp"` +} + +// NewCollectHostInformationResponseWithDefaults instantiates a new CollectHostInformationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewCollectHostInformationResponseWithDefaults() *CollectHostInformationResponse { + var this CollectHostInformationResponse + + return &this +} + +func (o CollectHostInformationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["cpu"] = o.Cpu + toSerialize["cpu_times"] = o.CpuTimes + toSerialize["disk"] = o.Disk + toSerialize["host"] = o.Host + toSerialize["memory"] = o.Memory + toSerialize["timestamp"] = o.Timestamp + + return json.Marshal(toSerialize) +} diff --git a/schema/model_consul_write_access_config_request.go b/schema/model_consul_configure_access_request.go similarity index 76% rename from schema/model_consul_write_access_config_request.go rename to schema/model_consul_configure_access_request.go index a6c56ef1..9b4581e9 100644 --- a/schema/model_consul_write_access_config_request.go +++ b/schema/model_consul_configure_access_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// ConsulWriteAccessConfigRequest struct for ConsulWriteAccessConfigRequest -type ConsulWriteAccessConfigRequest struct { +// ConsulConfigureAccessRequest struct for ConsulConfigureAccessRequest +type ConsulConfigureAccessRequest struct { // Consul server address Address string `json:"address"` @@ -30,18 +30,18 @@ type ConsulWriteAccessConfigRequest struct { Token string `json:"token"` } -// NewConsulWriteAccessConfigRequestWithDefaults instantiates a new ConsulWriteAccessConfigRequest object +// NewConsulConfigureAccessRequestWithDefaults instantiates a new ConsulConfigureAccessRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewConsulWriteAccessConfigRequestWithDefaults() *ConsulWriteAccessConfigRequest { - var this ConsulWriteAccessConfigRequest +func NewConsulConfigureAccessRequestWithDefaults() *ConsulConfigureAccessRequest { + var this ConsulConfigureAccessRequest this.Scheme = "http" return &this } -func (o ConsulWriteAccessConfigRequest) MarshalJSON() ([]byte, error) { +func (o ConsulConfigureAccessRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["address"] = o.Address diff --git a/schema/model_write_config_cors_request.go b/schema/model_cors_configure_request.go similarity index 73% rename from schema/model_write_config_cors_request.go rename to schema/model_cors_configure_request.go index 9e5764e8..71e66050 100644 --- a/schema/model_write_config_cors_request.go +++ b/schema/model_cors_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteConfigCORSRequest struct for WriteConfigCORSRequest -type WriteConfigCORSRequest struct { +// CorsConfigureRequest struct for CorsConfigureRequest +type CorsConfigureRequest struct { // A comma-separated string or array of strings indicating headers that are allowed on cross-origin requests. AllowedHeaders []string `json:"allowed_headers"` @@ -21,16 +21,16 @@ type WriteConfigCORSRequest struct { Enable bool `json:"enable"` } -// NewWriteConfigCORSRequestWithDefaults instantiates a new WriteConfigCORSRequest object +// NewCorsConfigureRequestWithDefaults instantiates a new CorsConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteConfigCORSRequestWithDefaults() *WriteConfigCORSRequest { - var this WriteConfigCORSRequest +func NewCorsConfigureRequestWithDefaults() *CorsConfigureRequest { + var this CorsConfigureRequest return &this } -func (o WriteConfigCORSRequest) MarshalJSON() ([]byte, error) { +func (o CorsConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allowed_headers"] = o.AllowedHeaders diff --git a/schema/model_cors_read_configuration_response.go b/schema/model_cors_read_configuration_response.go new file mode 100644 index 00000000..792fcd29 --- /dev/null +++ b/schema/model_cors_read_configuration_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// CorsReadConfigurationResponse struct for CorsReadConfigurationResponse +type CorsReadConfigurationResponse struct { + AllowedHeaders []string `json:"allowed_headers"` + + AllowedOrigins []string `json:"allowed_origins"` + + Enabled bool `json:"enabled"` +} + +// NewCorsReadConfigurationResponseWithDefaults instantiates a new CorsReadConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewCorsReadConfigurationResponseWithDefaults() *CorsReadConfigurationResponse { + var this CorsReadConfigurationResponse + + return &this +} + +func (o CorsReadConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["allowed_headers"] = o.AllowedHeaders + toSerialize["allowed_origins"] = o.AllowedOrigins + toSerialize["enabled"] = o.Enabled + + return json.Marshal(toSerialize) +} diff --git a/schema/model_database_write_config_request.go b/schema/model_database_configure_connection_request.go similarity index 79% rename from schema/model_database_write_config_request.go rename to schema/model_database_configure_connection_request.go index 96ca06e5..e979fd42 100644 --- a/schema/model_database_write_config_request.go +++ b/schema/model_database_configure_connection_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// DatabaseWriteConfigRequest struct for DatabaseWriteConfigRequest -type DatabaseWriteConfigRequest struct { +// DatabaseConfigureConnectionRequest struct for DatabaseConfigureConnectionRequest +type DatabaseConfigureConnectionRequest struct { // Comma separated string or array of the role names allowed to get creds from this database connection. If empty no roles are allowed. If \"*\" all roles are allowed. AllowedRoles []string `json:"allowed_roles"` @@ -30,18 +30,18 @@ type DatabaseWriteConfigRequest struct { VerifyConnection bool `json:"verify_connection"` } -// NewDatabaseWriteConfigRequestWithDefaults instantiates a new DatabaseWriteConfigRequest object +// NewDatabaseConfigureConnectionRequestWithDefaults instantiates a new DatabaseConfigureConnectionRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewDatabaseWriteConfigRequestWithDefaults() *DatabaseWriteConfigRequest { - var this DatabaseWriteConfigRequest +func NewDatabaseConfigureConnectionRequestWithDefaults() *DatabaseConfigureConnectionRequest { + var this DatabaseConfigureConnectionRequest this.VerifyConnection = true return &this } -func (o DatabaseWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o DatabaseConfigureConnectionRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allowed_roles"] = o.AllowedRoles diff --git a/schema/model_write_rotate_config_request.go b/schema/model_encryption_key_configure_rotation_request.go similarity index 65% rename from schema/model_write_rotate_config_request.go rename to schema/model_encryption_key_configure_rotation_request.go index 9c84ac24..04f30fa3 100644 --- a/schema/model_write_rotate_config_request.go +++ b/schema/model_encryption_key_configure_rotation_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteRotateConfigRequest struct for WriteRotateConfigRequest -type WriteRotateConfigRequest struct { +// EncryptionKeyConfigureRotationRequest struct for EncryptionKeyConfigureRotationRequest +type EncryptionKeyConfigureRotationRequest struct { // Whether automatic rotation is enabled. Enabled bool `json:"enabled"` @@ -21,16 +21,16 @@ type WriteRotateConfigRequest struct { MaxOperations int64 `json:"max_operations"` } -// NewWriteRotateConfigRequestWithDefaults instantiates a new WriteRotateConfigRequest object +// NewEncryptionKeyConfigureRotationRequestWithDefaults instantiates a new EncryptionKeyConfigureRotationRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteRotateConfigRequestWithDefaults() *WriteRotateConfigRequest { - var this WriteRotateConfigRequest +func NewEncryptionKeyConfigureRotationRequestWithDefaults() *EncryptionKeyConfigureRotationRequest { + var this EncryptionKeyConfigureRotationRequest return &this } -func (o WriteRotateConfigRequest) MarshalJSON() ([]byte, error) { +func (o EncryptionKeyConfigureRotationRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["enabled"] = o.Enabled diff --git a/schema/model_encryption_key_read_rotation_configuration_response.go b/schema/model_encryption_key_read_rotation_configuration_response.go new file mode 100644 index 00000000..58d6a037 --- /dev/null +++ b/schema/model_encryption_key_read_rotation_configuration_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// EncryptionKeyReadRotationConfigurationResponse struct for EncryptionKeyReadRotationConfigurationResponse +type EncryptionKeyReadRotationConfigurationResponse struct { + Enabled bool `json:"enabled"` + + Interval int32 `json:"interval"` + + MaxOperations int64 `json:"max_operations"` +} + +// NewEncryptionKeyReadRotationConfigurationResponseWithDefaults instantiates a new EncryptionKeyReadRotationConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewEncryptionKeyReadRotationConfigurationResponseWithDefaults() *EncryptionKeyReadRotationConfigurationResponse { + var this EncryptionKeyReadRotationConfigurationResponse + + return &this +} + +func (o EncryptionKeyReadRotationConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["enabled"] = o.Enabled + toSerialize["interval"] = o.Interval + toSerialize["max_operations"] = o.MaxOperations + + return json.Marshal(toSerialize) +} diff --git a/schema/model_entity_write_alias_request.go b/schema/model_entity_create_alias_request.go similarity index 77% rename from schema/model_entity_write_alias_request.go rename to schema/model_entity_create_alias_request.go index 6d133e00..6b07dc80 100644 --- a/schema/model_entity_write_alias_request.go +++ b/schema/model_entity_create_alias_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// EntityWriteAliasRequest struct for EntityWriteAliasRequest -type EntityWriteAliasRequest struct { +// EntityCreateAliasRequest struct for EntityCreateAliasRequest +type EntityCreateAliasRequest struct { // Entity ID to which this alias belongs CanonicalId string `json:"canonical_id"` @@ -30,16 +30,16 @@ type EntityWriteAliasRequest struct { Name string `json:"name"` } -// NewEntityWriteAliasRequestWithDefaults instantiates a new EntityWriteAliasRequest object +// NewEntityCreateAliasRequestWithDefaults instantiates a new EntityCreateAliasRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewEntityWriteAliasRequestWithDefaults() *EntityWriteAliasRequest { - var this EntityWriteAliasRequest +func NewEntityCreateAliasRequestWithDefaults() *EntityCreateAliasRequest { + var this EntityCreateAliasRequest return &this } -func (o EntityWriteAliasRequest) MarshalJSON() ([]byte, error) { +func (o EntityCreateAliasRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["canonical_id"] = o.CanonicalId diff --git a/schema/model_entity_write_request.go b/schema/model_entity_create_request.go similarity index 79% rename from schema/model_entity_write_request.go rename to schema/model_entity_create_request.go index 1850af8f..dc693042 100644 --- a/schema/model_entity_write_request.go +++ b/schema/model_entity_create_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// EntityWriteRequest struct for EntityWriteRequest -type EntityWriteRequest struct { +// EntityCreateRequest struct for EntityCreateRequest +type EntityCreateRequest struct { // If set true, tokens tied to this identity will not be able to be used (but will not be revoked). Disabled bool `json:"disabled"` @@ -27,16 +27,16 @@ type EntityWriteRequest struct { Policies []string `json:"policies"` } -// NewEntityWriteRequestWithDefaults instantiates a new EntityWriteRequest object +// NewEntityCreateRequestWithDefaults instantiates a new EntityCreateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewEntityWriteRequestWithDefaults() *EntityWriteRequest { - var this EntityWriteRequest +func NewEntityCreateRequestWithDefaults() *EntityCreateRequest { + var this EntityCreateRequest return &this } -func (o EntityWriteRequest) MarshalJSON() ([]byte, error) { +func (o EntityCreateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disabled"] = o.Disabled diff --git a/schema/model_entity_lookup_request.go b/schema/model_entity_look_up_request.go similarity index 77% rename from schema/model_entity_lookup_request.go rename to schema/model_entity_look_up_request.go index 256ad2fc..b92de698 100644 --- a/schema/model_entity_lookup_request.go +++ b/schema/model_entity_look_up_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// EntityLookupRequest struct for EntityLookupRequest -type EntityLookupRequest struct { +// EntityLookUpRequest struct for EntityLookUpRequest +type EntityLookUpRequest struct { // ID of the alias. AliasId string `json:"alias_id"` @@ -27,16 +27,16 @@ type EntityLookupRequest struct { Name string `json:"name"` } -// NewEntityLookupRequestWithDefaults instantiates a new EntityLookupRequest object +// NewEntityLookUpRequestWithDefaults instantiates a new EntityLookUpRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewEntityLookupRequestWithDefaults() *EntityLookupRequest { - var this EntityLookupRequest +func NewEntityLookUpRequestWithDefaults() *EntityLookUpRequest { + var this EntityLookUpRequest return &this } -func (o EntityLookupRequest) MarshalJSON() ([]byte, error) { +func (o EntityLookUpRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alias_id"] = o.AliasId diff --git a/schema/model_entity_write_alias_by_id_request.go b/schema/model_entity_update_alias_by_id_request.go similarity index 72% rename from schema/model_entity_write_alias_by_id_request.go rename to schema/model_entity_update_alias_by_id_request.go index b55a9568..6cf3f348 100644 --- a/schema/model_entity_write_alias_by_id_request.go +++ b/schema/model_entity_update_alias_by_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// EntityWriteAliasByIDRequest struct for EntityWriteAliasByIDRequest -type EntityWriteAliasByIDRequest struct { +// EntityUpdateAliasByIdRequest struct for EntityUpdateAliasByIdRequest +type EntityUpdateAliasByIdRequest struct { // Entity ID to which this alias should be tied to CanonicalId string `json:"canonical_id"` @@ -27,16 +27,16 @@ type EntityWriteAliasByIDRequest struct { Name string `json:"name"` } -// NewEntityWriteAliasByIDRequestWithDefaults instantiates a new EntityWriteAliasByIDRequest object +// NewEntityUpdateAliasByIdRequestWithDefaults instantiates a new EntityUpdateAliasByIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewEntityWriteAliasByIDRequestWithDefaults() *EntityWriteAliasByIDRequest { - var this EntityWriteAliasByIDRequest +func NewEntityUpdateAliasByIdRequestWithDefaults() *EntityUpdateAliasByIdRequest { + var this EntityUpdateAliasByIdRequest return &this } -func (o EntityWriteAliasByIDRequest) MarshalJSON() ([]byte, error) { +func (o EntityUpdateAliasByIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["canonical_id"] = o.CanonicalId diff --git a/schema/model_entity_write_by_id_request.go b/schema/model_entity_update_by_id_request.go similarity index 75% rename from schema/model_entity_write_by_id_request.go rename to schema/model_entity_update_by_id_request.go index f39de021..b409d068 100644 --- a/schema/model_entity_write_by_id_request.go +++ b/schema/model_entity_update_by_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// EntityWriteByIDRequest struct for EntityWriteByIDRequest -type EntityWriteByIDRequest struct { +// EntityUpdateByIdRequest struct for EntityUpdateByIdRequest +type EntityUpdateByIdRequest struct { // If set true, tokens tied to this identity will not be able to be used (but will not be revoked). Disabled bool `json:"disabled"` @@ -24,16 +24,16 @@ type EntityWriteByIDRequest struct { Policies []string `json:"policies"` } -// NewEntityWriteByIDRequestWithDefaults instantiates a new EntityWriteByIDRequest object +// NewEntityUpdateByIdRequestWithDefaults instantiates a new EntityUpdateByIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewEntityWriteByIDRequestWithDefaults() *EntityWriteByIDRequest { - var this EntityWriteByIDRequest +func NewEntityUpdateByIdRequestWithDefaults() *EntityUpdateByIdRequest { + var this EntityUpdateByIdRequest return &this } -func (o EntityWriteByIDRequest) MarshalJSON() ([]byte, error) { +func (o EntityUpdateByIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disabled"] = o.Disabled diff --git a/schema/model_entity_write_by_name_request.go b/schema/model_entity_update_by_name_request.go similarity index 75% rename from schema/model_entity_write_by_name_request.go rename to schema/model_entity_update_by_name_request.go index 11ef2cca..1119a590 100644 --- a/schema/model_entity_write_by_name_request.go +++ b/schema/model_entity_update_by_name_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// EntityWriteByNameRequest struct for EntityWriteByNameRequest -type EntityWriteByNameRequest struct { +// EntityUpdateByNameRequest struct for EntityUpdateByNameRequest +type EntityUpdateByNameRequest struct { // If set true, tokens tied to this identity will not be able to be used (but will not be revoked). Disabled bool `json:"disabled"` @@ -24,16 +24,16 @@ type EntityWriteByNameRequest struct { Policies []string `json:"policies"` } -// NewEntityWriteByNameRequestWithDefaults instantiates a new EntityWriteByNameRequest object +// NewEntityUpdateByNameRequestWithDefaults instantiates a new EntityUpdateByNameRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewEntityWriteByNameRequestWithDefaults() *EntityWriteByNameRequest { - var this EntityWriteByNameRequest +func NewEntityUpdateByNameRequestWithDefaults() *EntityUpdateByNameRequest { + var this EntityUpdateByNameRequest return &this } -func (o EntityWriteByNameRequest) MarshalJSON() ([]byte, error) { +func (o EntityUpdateByNameRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disabled"] = o.Disabled diff --git a/schema/model_tools_hash_request.go b/schema/model_generate_hash_request.go similarity index 77% rename from schema/model_tools_hash_request.go rename to schema/model_generate_hash_request.go index 015c6758..f57b8058 100644 --- a/schema/model_tools_hash_request.go +++ b/schema/model_generate_hash_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// ToolsHashRequest struct for ToolsHashRequest -type ToolsHashRequest struct { +// GenerateHashRequest struct for GenerateHashRequest +type GenerateHashRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` @@ -24,11 +24,11 @@ type ToolsHashRequest struct { Urlalgorithm string `json:"urlalgorithm"` } -// NewToolsHashRequestWithDefaults instantiates a new ToolsHashRequest object +// NewGenerateHashRequestWithDefaults instantiates a new GenerateHashRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewToolsHashRequestWithDefaults() *ToolsHashRequest { - var this ToolsHashRequest +func NewGenerateHashRequestWithDefaults() *GenerateHashRequest { + var this GenerateHashRequest this.Algorithm = "sha2-256" this.Format = "hex" @@ -36,7 +36,7 @@ func NewToolsHashRequestWithDefaults() *ToolsHashRequest { return &this } -func (o ToolsHashRequest) MarshalJSON() ([]byte, error) { +func (o GenerateHashRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm diff --git a/schema/model_generate_hash_response.go b/schema/model_generate_hash_response.go new file mode 100644 index 00000000..9f8f84aa --- /dev/null +++ b/schema/model_generate_hash_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// GenerateHashResponse struct for GenerateHashResponse +type GenerateHashResponse struct { + Sum string `json:"sum"` +} + +// NewGenerateHashResponseWithDefaults instantiates a new GenerateHashResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewGenerateHashResponseWithDefaults() *GenerateHashResponse { + var this GenerateHashResponse + + return &this +} + +func (o GenerateHashResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["sum"] = o.Sum + + return json.Marshal(toSerialize) +} diff --git a/schema/model_tools_hash_with_request.go b/schema/model_generate_hash_with_algorithm_request.go similarity index 68% rename from schema/model_tools_hash_with_request.go rename to schema/model_generate_hash_with_algorithm_request.go index e0d5758f..406195d1 100644 --- a/schema/model_tools_hash_with_request.go +++ b/schema/model_generate_hash_with_algorithm_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// ToolsHashWithRequest struct for ToolsHashWithRequest -type ToolsHashWithRequest struct { +// GenerateHashWithAlgorithmRequest struct for GenerateHashWithAlgorithmRequest +type GenerateHashWithAlgorithmRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` @@ -21,11 +21,11 @@ type ToolsHashWithRequest struct { Input string `json:"input"` } -// NewToolsHashWithRequestWithDefaults instantiates a new ToolsHashWithRequest object +// NewGenerateHashWithAlgorithmRequestWithDefaults instantiates a new GenerateHashWithAlgorithmRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewToolsHashWithRequestWithDefaults() *ToolsHashWithRequest { - var this ToolsHashWithRequest +func NewGenerateHashWithAlgorithmRequestWithDefaults() *GenerateHashWithAlgorithmRequest { + var this GenerateHashWithAlgorithmRequest this.Algorithm = "sha2-256" this.Format = "hex" @@ -33,7 +33,7 @@ func NewToolsHashWithRequestWithDefaults() *ToolsHashWithRequest { return &this } -func (o ToolsHashWithRequest) MarshalJSON() ([]byte, error) { +func (o GenerateHashWithAlgorithmRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm diff --git a/schema/model_generate_hash_with_algorithm_response.go b/schema/model_generate_hash_with_algorithm_response.go new file mode 100644 index 00000000..4e9b411c --- /dev/null +++ b/schema/model_generate_hash_with_algorithm_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// GenerateHashWithAlgorithmResponse struct for GenerateHashWithAlgorithmResponse +type GenerateHashWithAlgorithmResponse struct { + Sum string `json:"sum"` +} + +// NewGenerateHashWithAlgorithmResponseWithDefaults instantiates a new GenerateHashWithAlgorithmResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewGenerateHashWithAlgorithmResponseWithDefaults() *GenerateHashWithAlgorithmResponse { + var this GenerateHashWithAlgorithmResponse + + return &this +} + +func (o GenerateHashWithAlgorithmResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["sum"] = o.Sum + + return json.Marshal(toSerialize) +} diff --git a/schema/model_tools_generate_random_request.go b/schema/model_generate_random_request.go similarity index 73% rename from schema/model_tools_generate_random_request.go rename to schema/model_generate_random_request.go index bbd3fd07..fac7909b 100644 --- a/schema/model_tools_generate_random_request.go +++ b/schema/model_generate_random_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// ToolsGenerateRandomRequest struct for ToolsGenerateRandomRequest -type ToolsGenerateRandomRequest struct { +// GenerateRandomRequest struct for GenerateRandomRequest +type GenerateRandomRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` @@ -24,11 +24,11 @@ type ToolsGenerateRandomRequest struct { Urlbytes string `json:"urlbytes"` } -// NewToolsGenerateRandomRequestWithDefaults instantiates a new ToolsGenerateRandomRequest object +// NewGenerateRandomRequestWithDefaults instantiates a new GenerateRandomRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewToolsGenerateRandomRequestWithDefaults() *ToolsGenerateRandomRequest { - var this ToolsGenerateRandomRequest +func NewGenerateRandomRequestWithDefaults() *GenerateRandomRequest { + var this GenerateRandomRequest this.Bytes = 32 this.Format = "base64" @@ -37,7 +37,7 @@ func NewToolsGenerateRandomRequestWithDefaults() *ToolsGenerateRandomRequest { return &this } -func (o ToolsGenerateRandomRequest) MarshalJSON() ([]byte, error) { +func (o GenerateRandomRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bytes"] = o.Bytes diff --git a/schema/model_generate_random_response.go b/schema/model_generate_random_response.go new file mode 100644 index 00000000..e580672a --- /dev/null +++ b/schema/model_generate_random_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// GenerateRandomResponse struct for GenerateRandomResponse +type GenerateRandomResponse struct { + RandomBytes string `json:"random_bytes"` +} + +// NewGenerateRandomResponseWithDefaults instantiates a new GenerateRandomResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewGenerateRandomResponseWithDefaults() *GenerateRandomResponse { + var this GenerateRandomResponse + + return &this +} + +func (o GenerateRandomResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["random_bytes"] = o.RandomBytes + + return json.Marshal(toSerialize) +} diff --git a/schema/model_transit_write_random_urlbytes_request.go b/schema/model_generate_random_with_bytes_request.go similarity index 68% rename from schema/model_transit_write_random_urlbytes_request.go rename to schema/model_generate_random_with_bytes_request.go index 816229bf..0205fa98 100644 --- a/schema/model_transit_write_random_urlbytes_request.go +++ b/schema/model_generate_random_with_bytes_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TransitWriteRandomUrlbytesRequest struct for TransitWriteRandomUrlbytesRequest -type TransitWriteRandomUrlbytesRequest struct { +// GenerateRandomWithBytesRequest struct for GenerateRandomWithBytesRequest +type GenerateRandomWithBytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` @@ -21,11 +21,11 @@ type TransitWriteRandomUrlbytesRequest struct { Source string `json:"source"` } -// NewTransitWriteRandomUrlbytesRequestWithDefaults instantiates a new TransitWriteRandomUrlbytesRequest object +// NewGenerateRandomWithBytesRequestWithDefaults instantiates a new GenerateRandomWithBytesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitWriteRandomUrlbytesRequestWithDefaults() *TransitWriteRandomUrlbytesRequest { - var this TransitWriteRandomUrlbytesRequest +func NewGenerateRandomWithBytesRequestWithDefaults() *GenerateRandomWithBytesRequest { + var this GenerateRandomWithBytesRequest this.Bytes = 32 this.Format = "base64" @@ -34,7 +34,7 @@ func NewTransitWriteRandomUrlbytesRequestWithDefaults() *TransitWriteRandomUrlby return &this } -func (o TransitWriteRandomUrlbytesRequest) MarshalJSON() ([]byte, error) { +func (o GenerateRandomWithBytesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bytes"] = o.Bytes diff --git a/schema/model_generate_random_with_bytes_response.go b/schema/model_generate_random_with_bytes_response.go new file mode 100644 index 00000000..d57ee091 --- /dev/null +++ b/schema/model_generate_random_with_bytes_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// GenerateRandomWithBytesResponse struct for GenerateRandomWithBytesResponse +type GenerateRandomWithBytesResponse struct { + RandomBytes string `json:"random_bytes"` +} + +// NewGenerateRandomWithBytesResponseWithDefaults instantiates a new GenerateRandomWithBytesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewGenerateRandomWithBytesResponseWithDefaults() *GenerateRandomWithBytesResponse { + var this GenerateRandomWithBytesResponse + + return &this +} + +func (o GenerateRandomWithBytesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["random_bytes"] = o.RandomBytes + + return json.Marshal(toSerialize) +} diff --git a/schema/model_transit_generate_random_source_bytes_request.go b/schema/model_generate_random_with_source_and_bytes_request.go similarity index 62% rename from schema/model_transit_generate_random_source_bytes_request.go rename to schema/model_generate_random_with_source_and_bytes_request.go index ddb756f9..02f4eefa 100644 --- a/schema/model_transit_generate_random_source_bytes_request.go +++ b/schema/model_generate_random_with_source_and_bytes_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TransitGenerateRandomSourceBytesRequest struct for TransitGenerateRandomSourceBytesRequest -type TransitGenerateRandomSourceBytesRequest struct { +// GenerateRandomWithSourceAndBytesRequest struct for GenerateRandomWithSourceAndBytesRequest +type GenerateRandomWithSourceAndBytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` @@ -18,11 +18,11 @@ type TransitGenerateRandomSourceBytesRequest struct { Format string `json:"format"` } -// NewTransitGenerateRandomSourceBytesRequestWithDefaults instantiates a new TransitGenerateRandomSourceBytesRequest object +// NewGenerateRandomWithSourceAndBytesRequestWithDefaults instantiates a new GenerateRandomWithSourceAndBytesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitGenerateRandomSourceBytesRequestWithDefaults() *TransitGenerateRandomSourceBytesRequest { - var this TransitGenerateRandomSourceBytesRequest +func NewGenerateRandomWithSourceAndBytesRequestWithDefaults() *GenerateRandomWithSourceAndBytesRequest { + var this GenerateRandomWithSourceAndBytesRequest this.Bytes = 32 this.Format = "base64" @@ -30,7 +30,7 @@ func NewTransitGenerateRandomSourceBytesRequestWithDefaults() *TransitGenerateRa return &this } -func (o TransitGenerateRandomSourceBytesRequest) MarshalJSON() ([]byte, error) { +func (o GenerateRandomWithSourceAndBytesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bytes"] = o.Bytes diff --git a/schema/model_generate_random_with_source_and_bytes_response.go b/schema/model_generate_random_with_source_and_bytes_response.go new file mode 100644 index 00000000..8364febf --- /dev/null +++ b/schema/model_generate_random_with_source_and_bytes_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// GenerateRandomWithSourceAndBytesResponse struct for GenerateRandomWithSourceAndBytesResponse +type GenerateRandomWithSourceAndBytesResponse struct { + RandomBytes string `json:"random_bytes"` +} + +// NewGenerateRandomWithSourceAndBytesResponseWithDefaults instantiates a new GenerateRandomWithSourceAndBytesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewGenerateRandomWithSourceAndBytesResponseWithDefaults() *GenerateRandomWithSourceAndBytesResponse { + var this GenerateRandomWithSourceAndBytesResponse + + return &this +} + +func (o GenerateRandomWithSourceAndBytesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["random_bytes"] = o.RandomBytes + + return json.Marshal(toSerialize) +} diff --git a/schema/model_tools_generate_random_source_request.go b/schema/model_generate_random_with_source_request.go similarity index 67% rename from schema/model_tools_generate_random_source_request.go rename to schema/model_generate_random_with_source_request.go index 95de2961..80217398 100644 --- a/schema/model_tools_generate_random_source_request.go +++ b/schema/model_generate_random_with_source_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// ToolsGenerateRandomSourceRequest struct for ToolsGenerateRandomSourceRequest -type ToolsGenerateRandomSourceRequest struct { +// GenerateRandomWithSourceRequest struct for GenerateRandomWithSourceRequest +type GenerateRandomWithSourceRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` @@ -21,11 +21,11 @@ type ToolsGenerateRandomSourceRequest struct { Urlbytes string `json:"urlbytes"` } -// NewToolsGenerateRandomSourceRequestWithDefaults instantiates a new ToolsGenerateRandomSourceRequest object +// NewGenerateRandomWithSourceRequestWithDefaults instantiates a new GenerateRandomWithSourceRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewToolsGenerateRandomSourceRequestWithDefaults() *ToolsGenerateRandomSourceRequest { - var this ToolsGenerateRandomSourceRequest +func NewGenerateRandomWithSourceRequestWithDefaults() *GenerateRandomWithSourceRequest { + var this GenerateRandomWithSourceRequest this.Bytes = 32 this.Format = "base64" @@ -33,7 +33,7 @@ func NewToolsGenerateRandomSourceRequestWithDefaults() *ToolsGenerateRandomSourc return &this } -func (o ToolsGenerateRandomSourceRequest) MarshalJSON() ([]byte, error) { +func (o GenerateRandomWithSourceRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bytes"] = o.Bytes diff --git a/schema/model_generate_random_with_source_response.go b/schema/model_generate_random_with_source_response.go new file mode 100644 index 00000000..0279f57e --- /dev/null +++ b/schema/model_generate_random_with_source_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// GenerateRandomWithSourceResponse struct for GenerateRandomWithSourceResponse +type GenerateRandomWithSourceResponse struct { + RandomBytes string `json:"random_bytes"` +} + +// NewGenerateRandomWithSourceResponseWithDefaults instantiates a new GenerateRandomWithSourceResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewGenerateRandomWithSourceResponseWithDefaults() *GenerateRandomWithSourceResponse { + var this GenerateRandomWithSourceResponse + + return &this +} + +func (o GenerateRandomWithSourceResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["random_bytes"] = o.RandomBytes + + return json.Marshal(toSerialize) +} diff --git a/schema/model_git_hub_write_config_request.go b/schema/model_github_configure_request.go similarity index 89% rename from schema/model_git_hub_write_config_request.go rename to schema/model_github_configure_request.go index a1658278..6a0f6e92 100644 --- a/schema/model_git_hub_write_config_request.go +++ b/schema/model_github_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GitHubWriteConfigRequest struct for GitHubWriteConfigRequest -type GitHubWriteConfigRequest struct { +// GithubConfigureRequest struct for GithubConfigureRequest +type GithubConfigureRequest struct { // The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. BaseUrl string `json:"base_url"` @@ -56,18 +56,18 @@ type GitHubWriteConfigRequest struct { Ttl int32 `json:"ttl"` } -// NewGitHubWriteConfigRequestWithDefaults instantiates a new GitHubWriteConfigRequest object +// NewGithubConfigureRequestWithDefaults instantiates a new GithubConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGitHubWriteConfigRequestWithDefaults() *GitHubWriteConfigRequest { - var this GitHubWriteConfigRequest +func NewGithubConfigureRequestWithDefaults() *GithubConfigureRequest { + var this GithubConfigureRequest this.TokenType = "default-service" return &this } -func (o GitHubWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o GithubConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["base_url"] = o.BaseUrl diff --git a/schema/model_git_hub_login_request.go b/schema/model_github_login_request.go similarity index 65% rename from schema/model_git_hub_login_request.go rename to schema/model_github_login_request.go index 7aa624c4..b2957b81 100644 --- a/schema/model_git_hub_login_request.go +++ b/schema/model_github_login_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// GitHubLoginRequest struct for GitHubLoginRequest -type GitHubLoginRequest struct { +// GithubLoginRequest struct for GithubLoginRequest +type GithubLoginRequest struct { // GitHub personal API token Token string `json:"token"` } -// NewGitHubLoginRequestWithDefaults instantiates a new GitHubLoginRequest object +// NewGithubLoginRequestWithDefaults instantiates a new GithubLoginRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGitHubLoginRequestWithDefaults() *GitHubLoginRequest { - var this GitHubLoginRequest +func NewGithubLoginRequestWithDefaults() *GithubLoginRequest { + var this GithubLoginRequest return &this } -func (o GitHubLoginRequest) MarshalJSON() ([]byte, error) { +func (o GithubLoginRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token"] = o.Token diff --git a/schema/model_git_hub_write_map_team_request.go b/schema/model_github_write_team_mapping_request.go similarity index 57% rename from schema/model_git_hub_write_map_team_request.go rename to schema/model_github_write_team_mapping_request.go index b4b2a40b..91cbb4e4 100644 --- a/schema/model_git_hub_write_map_team_request.go +++ b/schema/model_github_write_team_mapping_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// GitHubWriteMapTeamRequest struct for GitHubWriteMapTeamRequest -type GitHubWriteMapTeamRequest struct { +// GithubWriteTeamMappingRequest struct for GithubWriteTeamMappingRequest +type GithubWriteTeamMappingRequest struct { // Value for teams mapping Value string `json:"value"` } -// NewGitHubWriteMapTeamRequestWithDefaults instantiates a new GitHubWriteMapTeamRequest object +// NewGithubWriteTeamMappingRequestWithDefaults instantiates a new GithubWriteTeamMappingRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGitHubWriteMapTeamRequestWithDefaults() *GitHubWriteMapTeamRequest { - var this GitHubWriteMapTeamRequest +func NewGithubWriteTeamMappingRequestWithDefaults() *GithubWriteTeamMappingRequest { + var this GithubWriteTeamMappingRequest return &this } -func (o GitHubWriteMapTeamRequest) MarshalJSON() ([]byte, error) { +func (o GithubWriteTeamMappingRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["value"] = o.Value diff --git a/schema/model_git_hub_write_map_user_request.go b/schema/model_github_write_user_mapping_request.go similarity index 57% rename from schema/model_git_hub_write_map_user_request.go rename to schema/model_github_write_user_mapping_request.go index 3b483965..3e2f9b73 100644 --- a/schema/model_git_hub_write_map_user_request.go +++ b/schema/model_github_write_user_mapping_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// GitHubWriteMapUserRequest struct for GitHubWriteMapUserRequest -type GitHubWriteMapUserRequest struct { +// GithubWriteUserMappingRequest struct for GithubWriteUserMappingRequest +type GithubWriteUserMappingRequest struct { // Value for users mapping Value string `json:"value"` } -// NewGitHubWriteMapUserRequestWithDefaults instantiates a new GitHubWriteMapUserRequest object +// NewGithubWriteUserMappingRequestWithDefaults instantiates a new GithubWriteUserMappingRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGitHubWriteMapUserRequestWithDefaults() *GitHubWriteMapUserRequest { - var this GitHubWriteMapUserRequest +func NewGithubWriteUserMappingRequestWithDefaults() *GithubWriteUserMappingRequest { + var this GithubWriteUserMappingRequest return &this } -func (o GitHubWriteMapUserRequest) MarshalJSON() ([]byte, error) { +func (o GithubWriteUserMappingRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["value"] = o.Value diff --git a/schema/model_google_cloud_write_auth_config_request.go b/schema/model_google_cloud_configure_auth_request.go similarity index 85% rename from schema/model_google_cloud_write_auth_config_request.go rename to schema/model_google_cloud_configure_auth_request.go index 86b60712..09d294b7 100644 --- a/schema/model_google_cloud_write_auth_config_request.go +++ b/schema/model_google_cloud_configure_auth_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudWriteAuthConfigRequest struct for GoogleCloudWriteAuthConfigRequest -type GoogleCloudWriteAuthConfigRequest struct { +// GoogleCloudConfigureAuthRequest struct for GoogleCloudConfigureAuthRequest +type GoogleCloudConfigureAuthRequest struct { // Google credentials JSON that Vault will use to verify users against GCP APIs. If not specified, will use application default credentials Credentials string `json:"credentials"` @@ -34,11 +34,11 @@ type GoogleCloudWriteAuthConfigRequest struct { IamMetadata []string `json:"iam_metadata"` } -// NewGoogleCloudWriteAuthConfigRequestWithDefaults instantiates a new GoogleCloudWriteAuthConfigRequest object +// NewGoogleCloudConfigureAuthRequestWithDefaults instantiates a new GoogleCloudConfigureAuthRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudWriteAuthConfigRequestWithDefaults() *GoogleCloudWriteAuthConfigRequest { - var this GoogleCloudWriteAuthConfigRequest +func NewGoogleCloudConfigureAuthRequestWithDefaults() *GoogleCloudConfigureAuthRequest { + var this GoogleCloudConfigureAuthRequest this.GceAlias = "role_id" this.IamAlias = "role_id" @@ -46,7 +46,7 @@ func NewGoogleCloudWriteAuthConfigRequestWithDefaults() *GoogleCloudWriteAuthCon return &this } -func (o GoogleCloudWriteAuthConfigRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudConfigureAuthRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["credentials"] = o.Credentials diff --git a/schema/model_google_cloud_write_config_request.go b/schema/model_google_cloud_configure_request.go similarity index 69% rename from schema/model_google_cloud_write_config_request.go rename to schema/model_google_cloud_configure_request.go index e0113fcd..5570c90b 100644 --- a/schema/model_google_cloud_write_config_request.go +++ b/schema/model_google_cloud_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudWriteConfigRequest struct for GoogleCloudWriteConfigRequest -type GoogleCloudWriteConfigRequest struct { +// GoogleCloudConfigureRequest struct for GoogleCloudConfigureRequest +type GoogleCloudConfigureRequest struct { // GCP IAM service account credentials JSON with permissions to create new service accounts and set IAM policies Credentials string `json:"credentials"` @@ -21,16 +21,16 @@ type GoogleCloudWriteConfigRequest struct { Ttl int32 `json:"ttl"` } -// NewGoogleCloudWriteConfigRequestWithDefaults instantiates a new GoogleCloudWriteConfigRequest object +// NewGoogleCloudConfigureRequestWithDefaults instantiates a new GoogleCloudConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudWriteConfigRequestWithDefaults() *GoogleCloudWriteConfigRequest { - var this GoogleCloudWriteConfigRequest +func NewGoogleCloudConfigureRequestWithDefaults() *GoogleCloudConfigureRequest { + var this GoogleCloudConfigureRequest return &this } -func (o GoogleCloudWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["credentials"] = o.Credentials diff --git a/schema/model_google_cloud_write_role_labels_request.go b/schema/model_google_cloud_edit_labels_for_role_request.go similarity index 58% rename from schema/model_google_cloud_write_role_labels_request.go rename to schema/model_google_cloud_edit_labels_for_role_request.go index d088827c..af193a44 100644 --- a/schema/model_google_cloud_write_role_labels_request.go +++ b/schema/model_google_cloud_edit_labels_for_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudWriteRoleLabelsRequest struct for GoogleCloudWriteRoleLabelsRequest -type GoogleCloudWriteRoleLabelsRequest struct { +// GoogleCloudEditLabelsForRoleRequest struct for GoogleCloudEditLabelsForRoleRequest +type GoogleCloudEditLabelsForRoleRequest struct { // BoundLabels to add (in $key:$value) Add []string `json:"add"` @@ -18,16 +18,16 @@ type GoogleCloudWriteRoleLabelsRequest struct { Remove []string `json:"remove"` } -// NewGoogleCloudWriteRoleLabelsRequestWithDefaults instantiates a new GoogleCloudWriteRoleLabelsRequest object +// NewGoogleCloudEditLabelsForRoleRequestWithDefaults instantiates a new GoogleCloudEditLabelsForRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudWriteRoleLabelsRequestWithDefaults() *GoogleCloudWriteRoleLabelsRequest { - var this GoogleCloudWriteRoleLabelsRequest +func NewGoogleCloudEditLabelsForRoleRequestWithDefaults() *GoogleCloudEditLabelsForRoleRequest { + var this GoogleCloudEditLabelsForRoleRequest return &this } -func (o GoogleCloudWriteRoleLabelsRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudEditLabelsForRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["add"] = o.Add diff --git a/schema/model_google_cloud_write_role_service_accounts_request.go b/schema/model_google_cloud_edit_service_accounts_for_role_request.go similarity index 55% rename from schema/model_google_cloud_write_role_service_accounts_request.go rename to schema/model_google_cloud_edit_service_accounts_for_role_request.go index f88e2035..2657f4f1 100644 --- a/schema/model_google_cloud_write_role_service_accounts_request.go +++ b/schema/model_google_cloud_edit_service_accounts_for_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudWriteRoleServiceAccountsRequest struct for GoogleCloudWriteRoleServiceAccountsRequest -type GoogleCloudWriteRoleServiceAccountsRequest struct { +// GoogleCloudEditServiceAccountsForRoleRequest struct for GoogleCloudEditServiceAccountsForRoleRequest +type GoogleCloudEditServiceAccountsForRoleRequest struct { // Service-account emails or IDs to add. Add []string `json:"add"` @@ -18,16 +18,16 @@ type GoogleCloudWriteRoleServiceAccountsRequest struct { Remove []string `json:"remove"` } -// NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults instantiates a new GoogleCloudWriteRoleServiceAccountsRequest object +// NewGoogleCloudEditServiceAccountsForRoleRequestWithDefaults instantiates a new GoogleCloudEditServiceAccountsForRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults() *GoogleCloudWriteRoleServiceAccountsRequest { - var this GoogleCloudWriteRoleServiceAccountsRequest +func NewGoogleCloudEditServiceAccountsForRoleRequestWithDefaults() *GoogleCloudEditServiceAccountsForRoleRequest { + var this GoogleCloudEditServiceAccountsForRoleRequest return &this } -func (o GoogleCloudWriteRoleServiceAccountsRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudEditServiceAccountsForRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["add"] = o.Add diff --git a/schema/model_google_cloud_write_key_request.go b/schema/model_google_cloud_generate_roleset_key_with_parameters2_request.go similarity index 61% rename from schema/model_google_cloud_write_key_request.go rename to schema/model_google_cloud_generate_roleset_key_with_parameters2_request.go index e9866fc5..8955d3fa 100644 --- a/schema/model_google_cloud_write_key_request.go +++ b/schema/model_google_cloud_generate_roleset_key_with_parameters2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudWriteKeyRequest struct for GoogleCloudWriteKeyRequest -type GoogleCloudWriteKeyRequest struct { +// GoogleCloudGenerateRolesetKeyWithParameters2Request struct for GoogleCloudGenerateRolesetKeyWithParameters2Request +type GoogleCloudGenerateRolesetKeyWithParameters2Request struct { // Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\" KeyAlgorithm string `json:"key_algorithm"` @@ -21,11 +21,11 @@ type GoogleCloudWriteKeyRequest struct { Ttl int32 `json:"ttl"` } -// NewGoogleCloudWriteKeyRequestWithDefaults instantiates a new GoogleCloudWriteKeyRequest object +// NewGoogleCloudGenerateRolesetKeyWithParameters2RequestWithDefaults instantiates a new GoogleCloudGenerateRolesetKeyWithParameters2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudWriteKeyRequestWithDefaults() *GoogleCloudWriteKeyRequest { - var this GoogleCloudWriteKeyRequest +func NewGoogleCloudGenerateRolesetKeyWithParameters2RequestWithDefaults() *GoogleCloudGenerateRolesetKeyWithParameters2Request { + var this GoogleCloudGenerateRolesetKeyWithParameters2Request this.KeyAlgorithm = "KEY_ALG_RSA_2048" this.KeyType = "TYPE_GOOGLE_CREDENTIALS_FILE" @@ -33,7 +33,7 @@ func NewGoogleCloudWriteKeyRequestWithDefaults() *GoogleCloudWriteKeyRequest { return &this } -func (o GoogleCloudWriteKeyRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudGenerateRolesetKeyWithParameters2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key_algorithm"] = o.KeyAlgorithm diff --git a/schema/model_google_cloud_write_roleset_key_request.go b/schema/model_google_cloud_generate_roleset_key_with_parameters_request.go similarity index 61% rename from schema/model_google_cloud_write_roleset_key_request.go rename to schema/model_google_cloud_generate_roleset_key_with_parameters_request.go index efce73ba..6a153d1e 100644 --- a/schema/model_google_cloud_write_roleset_key_request.go +++ b/schema/model_google_cloud_generate_roleset_key_with_parameters_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudWriteRolesetKeyRequest struct for GoogleCloudWriteRolesetKeyRequest -type GoogleCloudWriteRolesetKeyRequest struct { +// GoogleCloudGenerateRolesetKeyWithParametersRequest struct for GoogleCloudGenerateRolesetKeyWithParametersRequest +type GoogleCloudGenerateRolesetKeyWithParametersRequest struct { // Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\" KeyAlgorithm string `json:"key_algorithm"` @@ -21,11 +21,11 @@ type GoogleCloudWriteRolesetKeyRequest struct { Ttl int32 `json:"ttl"` } -// NewGoogleCloudWriteRolesetKeyRequestWithDefaults instantiates a new GoogleCloudWriteRolesetKeyRequest object +// NewGoogleCloudGenerateRolesetKeyWithParametersRequestWithDefaults instantiates a new GoogleCloudGenerateRolesetKeyWithParametersRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudWriteRolesetKeyRequestWithDefaults() *GoogleCloudWriteRolesetKeyRequest { - var this GoogleCloudWriteRolesetKeyRequest +func NewGoogleCloudGenerateRolesetKeyWithParametersRequestWithDefaults() *GoogleCloudGenerateRolesetKeyWithParametersRequest { + var this GoogleCloudGenerateRolesetKeyWithParametersRequest this.KeyAlgorithm = "KEY_ALG_RSA_2048" this.KeyType = "TYPE_GOOGLE_CREDENTIALS_FILE" @@ -33,7 +33,7 @@ func NewGoogleCloudWriteRolesetKeyRequestWithDefaults() *GoogleCloudWriteRoleset return &this } -func (o GoogleCloudWriteRolesetKeyRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudGenerateRolesetKeyWithParametersRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key_algorithm"] = o.KeyAlgorithm diff --git a/schema/model_google_cloud_write_static_account_key_request.go b/schema/model_google_cloud_generate_static_account_key_with_parameters_request.go similarity index 59% rename from schema/model_google_cloud_write_static_account_key_request.go rename to schema/model_google_cloud_generate_static_account_key_with_parameters_request.go index b8ad8776..2ea60ee4 100644 --- a/schema/model_google_cloud_write_static_account_key_request.go +++ b/schema/model_google_cloud_generate_static_account_key_with_parameters_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudWriteStaticAccountKeyRequest struct for GoogleCloudWriteStaticAccountKeyRequest -type GoogleCloudWriteStaticAccountKeyRequest struct { +// GoogleCloudGenerateStaticAccountKeyWithParametersRequest struct for GoogleCloudGenerateStaticAccountKeyWithParametersRequest +type GoogleCloudGenerateStaticAccountKeyWithParametersRequest struct { // Private key algorithm for service account key. Defaults to KEY_ALG_RSA_2048.\" KeyAlgorithm string `json:"key_algorithm"` @@ -21,11 +21,11 @@ type GoogleCloudWriteStaticAccountKeyRequest struct { Ttl int32 `json:"ttl"` } -// NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults instantiates a new GoogleCloudWriteStaticAccountKeyRequest object +// NewGoogleCloudGenerateStaticAccountKeyWithParametersRequestWithDefaults instantiates a new GoogleCloudGenerateStaticAccountKeyWithParametersRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults() *GoogleCloudWriteStaticAccountKeyRequest { - var this GoogleCloudWriteStaticAccountKeyRequest +func NewGoogleCloudGenerateStaticAccountKeyWithParametersRequestWithDefaults() *GoogleCloudGenerateStaticAccountKeyWithParametersRequest { + var this GoogleCloudGenerateStaticAccountKeyWithParametersRequest this.KeyAlgorithm = "KEY_ALG_RSA_2048" this.KeyType = "TYPE_GOOGLE_CREDENTIALS_FILE" @@ -33,7 +33,7 @@ func NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults() *GoogleCloudWriteS return &this } -func (o GoogleCloudWriteStaticAccountKeyRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudGenerateStaticAccountKeyWithParametersRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key_algorithm"] = o.KeyAlgorithm diff --git a/schema/model_google_cloud_kms_write_key_config_request.go b/schema/model_google_cloud_kms_configure_key_request.go similarity index 71% rename from schema/model_google_cloud_kms_write_key_config_request.go rename to schema/model_google_cloud_kms_configure_key_request.go index e2cebf73..90b1554f 100644 --- a/schema/model_google_cloud_kms_write_key_config_request.go +++ b/schema/model_google_cloud_kms_configure_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSWriteKeyConfigRequest struct for GoogleCloudKMSWriteKeyConfigRequest -type GoogleCloudKMSWriteKeyConfigRequest struct { +// GoogleCloudKmsConfigureKeyRequest struct for GoogleCloudKmsConfigureKeyRequest +type GoogleCloudKmsConfigureKeyRequest struct { // Maximum allowed crypto key version. If set to a positive value, key versions greater than the given value are not permitted to be used. If set to 0 or a negative value, there is no maximum key version. MaxVersion int32 `json:"max_version"` @@ -18,16 +18,16 @@ type GoogleCloudKMSWriteKeyConfigRequest struct { MinVersion int32 `json:"min_version"` } -// NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults instantiates a new GoogleCloudKMSWriteKeyConfigRequest object +// NewGoogleCloudKmsConfigureKeyRequestWithDefaults instantiates a new GoogleCloudKmsConfigureKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults() *GoogleCloudKMSWriteKeyConfigRequest { - var this GoogleCloudKMSWriteKeyConfigRequest +func NewGoogleCloudKmsConfigureKeyRequestWithDefaults() *GoogleCloudKmsConfigureKeyRequest { + var this GoogleCloudKmsConfigureKeyRequest return &this } -func (o GoogleCloudKMSWriteKeyConfigRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsConfigureKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["max_version"] = o.MaxVersion diff --git a/schema/model_google_cloud_kms_write_config_request.go b/schema/model_google_cloud_kms_configure_request.go similarity index 67% rename from schema/model_google_cloud_kms_write_config_request.go rename to schema/model_google_cloud_kms_configure_request.go index 0b076065..3ded7f4f 100644 --- a/schema/model_google_cloud_kms_write_config_request.go +++ b/schema/model_google_cloud_kms_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSWriteConfigRequest struct for GoogleCloudKMSWriteConfigRequest -type GoogleCloudKMSWriteConfigRequest struct { +// GoogleCloudKmsConfigureRequest struct for GoogleCloudKmsConfigureRequest +type GoogleCloudKmsConfigureRequest struct { // The credentials to use for authenticating to Google Cloud. Leave this blank to use the Default Application Credentials or instance metadata authentication. Credentials string `json:"credentials"` @@ -18,16 +18,16 @@ type GoogleCloudKMSWriteConfigRequest struct { Scopes []string `json:"scopes"` } -// NewGoogleCloudKMSWriteConfigRequestWithDefaults instantiates a new GoogleCloudKMSWriteConfigRequest object +// NewGoogleCloudKmsConfigureRequestWithDefaults instantiates a new GoogleCloudKmsConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSWriteConfigRequestWithDefaults() *GoogleCloudKMSWriteConfigRequest { - var this GoogleCloudKMSWriteConfigRequest +func NewGoogleCloudKmsConfigureRequestWithDefaults() *GoogleCloudKmsConfigureRequest { + var this GoogleCloudKmsConfigureRequest return &this } -func (o GoogleCloudKMSWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["credentials"] = o.Credentials diff --git a/schema/model_google_cloud_kms_decrypt_request.go b/schema/model_google_cloud_kms_decrypt_request.go index 04270dc7..8cd837df 100644 --- a/schema/model_google_cloud_kms_decrypt_request.go +++ b/schema/model_google_cloud_kms_decrypt_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSDecryptRequest struct for GoogleCloudKMSDecryptRequest -type GoogleCloudKMSDecryptRequest struct { +// GoogleCloudKmsDecryptRequest struct for GoogleCloudKmsDecryptRequest +type GoogleCloudKmsDecryptRequest struct { // Optional data that was specified during encryption of this payload. AdditionalAuthenticatedData string `json:"additional_authenticated_data"` @@ -21,16 +21,16 @@ type GoogleCloudKMSDecryptRequest struct { KeyVersion int32 `json:"key_version"` } -// NewGoogleCloudKMSDecryptRequestWithDefaults instantiates a new GoogleCloudKMSDecryptRequest object +// NewGoogleCloudKmsDecryptRequestWithDefaults instantiates a new GoogleCloudKmsDecryptRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSDecryptRequestWithDefaults() *GoogleCloudKMSDecryptRequest { - var this GoogleCloudKMSDecryptRequest +func NewGoogleCloudKmsDecryptRequestWithDefaults() *GoogleCloudKmsDecryptRequest { + var this GoogleCloudKmsDecryptRequest return &this } -func (o GoogleCloudKMSDecryptRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsDecryptRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["additional_authenticated_data"] = o.AdditionalAuthenticatedData diff --git a/schema/model_google_cloud_kms_encrypt_request.go b/schema/model_google_cloud_kms_encrypt_request.go index 7a0486d8..49f1ff0e 100644 --- a/schema/model_google_cloud_kms_encrypt_request.go +++ b/schema/model_google_cloud_kms_encrypt_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSEncryptRequest struct for GoogleCloudKMSEncryptRequest -type GoogleCloudKMSEncryptRequest struct { +// GoogleCloudKmsEncryptRequest struct for GoogleCloudKmsEncryptRequest +type GoogleCloudKmsEncryptRequest struct { // Optional base64-encoded data that, if specified, must also be provided to decrypt this payload. AdditionalAuthenticatedData string `json:"additional_authenticated_data"` @@ -21,16 +21,16 @@ type GoogleCloudKMSEncryptRequest struct { Plaintext string `json:"plaintext"` } -// NewGoogleCloudKMSEncryptRequestWithDefaults instantiates a new GoogleCloudKMSEncryptRequest object +// NewGoogleCloudKmsEncryptRequestWithDefaults instantiates a new GoogleCloudKmsEncryptRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSEncryptRequestWithDefaults() *GoogleCloudKMSEncryptRequest { - var this GoogleCloudKMSEncryptRequest +func NewGoogleCloudKmsEncryptRequestWithDefaults() *GoogleCloudKmsEncryptRequest { + var this GoogleCloudKmsEncryptRequest return &this } -func (o GoogleCloudKMSEncryptRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsEncryptRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["additional_authenticated_data"] = o.AdditionalAuthenticatedData diff --git a/schema/model_google_cloud_kms_reencrypt_request.go b/schema/model_google_cloud_kms_reencrypt_request.go index ff1e7f34..d1e8f9d8 100644 --- a/schema/model_google_cloud_kms_reencrypt_request.go +++ b/schema/model_google_cloud_kms_reencrypt_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSReencryptRequest struct for GoogleCloudKMSReencryptRequest -type GoogleCloudKMSReencryptRequest struct { +// GoogleCloudKmsReencryptRequest struct for GoogleCloudKmsReencryptRequest +type GoogleCloudKmsReencryptRequest struct { // Optional data that, if specified, must also be provided during decryption. AdditionalAuthenticatedData string `json:"additional_authenticated_data"` @@ -21,16 +21,16 @@ type GoogleCloudKMSReencryptRequest struct { KeyVersion int32 `json:"key_version"` } -// NewGoogleCloudKMSReencryptRequestWithDefaults instantiates a new GoogleCloudKMSReencryptRequest object +// NewGoogleCloudKmsReencryptRequestWithDefaults instantiates a new GoogleCloudKmsReencryptRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSReencryptRequestWithDefaults() *GoogleCloudKMSReencryptRequest { - var this GoogleCloudKMSReencryptRequest +func NewGoogleCloudKmsReencryptRequestWithDefaults() *GoogleCloudKmsReencryptRequest { + var this GoogleCloudKmsReencryptRequest return &this } -func (o GoogleCloudKMSReencryptRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsReencryptRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["additional_authenticated_data"] = o.AdditionalAuthenticatedData diff --git a/schema/model_google_cloud_kms_register_key_request.go b/schema/model_google_cloud_kms_register_key_request.go index 81550765..a62eee35 100644 --- a/schema/model_google_cloud_kms_register_key_request.go +++ b/schema/model_google_cloud_kms_register_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSRegisterKeyRequest struct for GoogleCloudKMSRegisterKeyRequest -type GoogleCloudKMSRegisterKeyRequest struct { +// GoogleCloudKmsRegisterKeyRequest struct for GoogleCloudKmsRegisterKeyRequest +type GoogleCloudKmsRegisterKeyRequest struct { // Full resource ID of the crypto key including the project, location, key ring, and crypto key like \"projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s\". This crypto key must already exist in Google Cloud KMS unless verify is set to \"false\". CryptoKey string `json:"crypto_key"` @@ -18,18 +18,18 @@ type GoogleCloudKMSRegisterKeyRequest struct { Verify bool `json:"verify"` } -// NewGoogleCloudKMSRegisterKeyRequestWithDefaults instantiates a new GoogleCloudKMSRegisterKeyRequest object +// NewGoogleCloudKmsRegisterKeyRequestWithDefaults instantiates a new GoogleCloudKmsRegisterKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSRegisterKeyRequestWithDefaults() *GoogleCloudKMSRegisterKeyRequest { - var this GoogleCloudKMSRegisterKeyRequest +func NewGoogleCloudKmsRegisterKeyRequestWithDefaults() *GoogleCloudKmsRegisterKeyRequest { + var this GoogleCloudKmsRegisterKeyRequest this.Verify = true return &this } -func (o GoogleCloudKMSRegisterKeyRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsRegisterKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["crypto_key"] = o.CryptoKey diff --git a/schema/model_google_cloud_kms_sign_request.go b/schema/model_google_cloud_kms_sign_request.go index 86e50add..93aab936 100644 --- a/schema/model_google_cloud_kms_sign_request.go +++ b/schema/model_google_cloud_kms_sign_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSSignRequest struct for GoogleCloudKMSSignRequest -type GoogleCloudKMSSignRequest struct { +// GoogleCloudKmsSignRequest struct for GoogleCloudKmsSignRequest +type GoogleCloudKmsSignRequest struct { // Digest to sign. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required. Digest string `json:"digest"` @@ -18,16 +18,16 @@ type GoogleCloudKMSSignRequest struct { KeyVersion int32 `json:"key_version"` } -// NewGoogleCloudKMSSignRequestWithDefaults instantiates a new GoogleCloudKMSSignRequest object +// NewGoogleCloudKmsSignRequestWithDefaults instantiates a new GoogleCloudKmsSignRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSSignRequestWithDefaults() *GoogleCloudKMSSignRequest { - var this GoogleCloudKMSSignRequest +func NewGoogleCloudKmsSignRequestWithDefaults() *GoogleCloudKmsSignRequest { + var this GoogleCloudKmsSignRequest return &this } -func (o GoogleCloudKMSSignRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsSignRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["digest"] = o.Digest diff --git a/schema/model_google_cloud_kms_verify_request.go b/schema/model_google_cloud_kms_verify_request.go index 05aab6bf..582c0df7 100644 --- a/schema/model_google_cloud_kms_verify_request.go +++ b/schema/model_google_cloud_kms_verify_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSVerifyRequest struct for GoogleCloudKMSVerifyRequest -type GoogleCloudKMSVerifyRequest struct { +// GoogleCloudKmsVerifyRequest struct for GoogleCloudKmsVerifyRequest +type GoogleCloudKmsVerifyRequest struct { // Digest to verify. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required. Digest string `json:"digest"` @@ -21,16 +21,16 @@ type GoogleCloudKMSVerifyRequest struct { Signature string `json:"signature"` } -// NewGoogleCloudKMSVerifyRequestWithDefaults instantiates a new GoogleCloudKMSVerifyRequest object +// NewGoogleCloudKmsVerifyRequestWithDefaults instantiates a new GoogleCloudKmsVerifyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSVerifyRequestWithDefaults() *GoogleCloudKMSVerifyRequest { - var this GoogleCloudKMSVerifyRequest +func NewGoogleCloudKmsVerifyRequestWithDefaults() *GoogleCloudKmsVerifyRequest { + var this GoogleCloudKmsVerifyRequest return &this } -func (o GoogleCloudKMSVerifyRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsVerifyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["digest"] = o.Digest diff --git a/schema/model_google_cloud_kms_write_key_request.go b/schema/model_google_cloud_kms_write_key_request.go index c9cd7f9a..304d69a6 100644 --- a/schema/model_google_cloud_kms_write_key_request.go +++ b/schema/model_google_cloud_kms_write_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GoogleCloudKMSWriteKeyRequest struct for GoogleCloudKMSWriteKeyRequest -type GoogleCloudKMSWriteKeyRequest struct { +// GoogleCloudKmsWriteKeyRequest struct for GoogleCloudKmsWriteKeyRequest +type GoogleCloudKmsWriteKeyRequest struct { // Algorithm to use for encryption, decryption, or signing. The value depends on the key purpose. The value cannot be changed after creation. For a key purpose of \"encrypt_decrypt\", the valid values are: - symmetric_encryption (default) For a key purpose of \"asymmetric_sign\", valid values are: - rsa_sign_pss_2048_sha256 - rsa_sign_pss_3072_sha256 - rsa_sign_pss_4096_sha256 - rsa_sign_pkcs1_2048_sha256 - rsa_sign_pkcs1_3072_sha256 - rsa_sign_pkcs1_4096_sha256 - ec_sign_p256_sha256 - ec_sign_p384_sha384 For a key purpose of \"asymmetric_decrypt\", valid values are: - rsa_decrypt_oaep_2048_sha256 - rsa_decrypt_oaep_3072_sha256 - rsa_decrypt_oaep_4096_sha256 Algorithm string `json:"algorithm"` @@ -33,16 +33,16 @@ type GoogleCloudKMSWriteKeyRequest struct { RotationPeriod int32 `json:"rotation_period"` } -// NewGoogleCloudKMSWriteKeyRequestWithDefaults instantiates a new GoogleCloudKMSWriteKeyRequest object +// NewGoogleCloudKmsWriteKeyRequestWithDefaults instantiates a new GoogleCloudKmsWriteKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGoogleCloudKMSWriteKeyRequestWithDefaults() *GoogleCloudKMSWriteKeyRequest { - var this GoogleCloudKMSWriteKeyRequest +func NewGoogleCloudKmsWriteKeyRequestWithDefaults() *GoogleCloudKmsWriteKeyRequest { + var this GoogleCloudKmsWriteKeyRequest return &this } -func (o GoogleCloudKMSWriteKeyRequest) MarshalJSON() ([]byte, error) { +func (o GoogleCloudKmsWriteKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm diff --git a/schema/model_google_cloud_write_impersonated_account_request.go b/schema/model_google_cloud_write_impersonated_account_request.go new file mode 100644 index 00000000..e91e55a3 --- /dev/null +++ b/schema/model_google_cloud_write_impersonated_account_request.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// GoogleCloudWriteImpersonatedAccountRequest struct for GoogleCloudWriteImpersonatedAccountRequest +type GoogleCloudWriteImpersonatedAccountRequest struct { + // Required. Email of the GCP service account to manage. Cannot be updated. + ServiceAccountEmail string `json:"service_account_email"` + + // List of OAuth scopes to assign to access tokens generated under this account. + TokenScopes []string `json:"token_scopes"` + + // Lifetime of the token for the impersonated account. + Ttl int32 `json:"ttl"` +} + +// NewGoogleCloudWriteImpersonatedAccountRequestWithDefaults instantiates a new GoogleCloudWriteImpersonatedAccountRequest object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewGoogleCloudWriteImpersonatedAccountRequestWithDefaults() *GoogleCloudWriteImpersonatedAccountRequest { + var this GoogleCloudWriteImpersonatedAccountRequest + + return &this +} + +func (o GoogleCloudWriteImpersonatedAccountRequest) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["service_account_email"] = o.ServiceAccountEmail + toSerialize["token_scopes"] = o.TokenScopes + toSerialize["ttl"] = o.Ttl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_group_write_alias_request.go b/schema/model_group_create_alias_request.go similarity index 71% rename from schema/model_group_write_alias_request.go rename to schema/model_group_create_alias_request.go index aa4880de..199987fb 100644 --- a/schema/model_group_write_alias_request.go +++ b/schema/model_group_create_alias_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GroupWriteAliasRequest struct for GroupWriteAliasRequest -type GroupWriteAliasRequest struct { +// GroupCreateAliasRequest struct for GroupCreateAliasRequest +type GroupCreateAliasRequest struct { // ID of the group to which this is an alias. CanonicalId string `json:"canonical_id"` @@ -24,16 +24,16 @@ type GroupWriteAliasRequest struct { Name string `json:"name"` } -// NewGroupWriteAliasRequestWithDefaults instantiates a new GroupWriteAliasRequest object +// NewGroupCreateAliasRequestWithDefaults instantiates a new GroupCreateAliasRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGroupWriteAliasRequestWithDefaults() *GroupWriteAliasRequest { - var this GroupWriteAliasRequest +func NewGroupCreateAliasRequestWithDefaults() *GroupCreateAliasRequest { + var this GroupCreateAliasRequest return &this } -func (o GroupWriteAliasRequest) MarshalJSON() ([]byte, error) { +func (o GroupCreateAliasRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["canonical_id"] = o.CanonicalId diff --git a/schema/model_group_write_request.go b/schema/model_group_create_request.go similarity index 82% rename from schema/model_group_write_request.go rename to schema/model_group_create_request.go index 04637073..d3799732 100644 --- a/schema/model_group_write_request.go +++ b/schema/model_group_create_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GroupWriteRequest struct for GroupWriteRequest -type GroupWriteRequest struct { +// GroupCreateRequest struct for GroupCreateRequest +type GroupCreateRequest struct { // ID of the group. If set, updates the corresponding existing group. Id string `json:"id"` @@ -33,16 +33,16 @@ type GroupWriteRequest struct { Type string `json:"type"` } -// NewGroupWriteRequestWithDefaults instantiates a new GroupWriteRequest object +// NewGroupCreateRequestWithDefaults instantiates a new GroupCreateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGroupWriteRequestWithDefaults() *GroupWriteRequest { - var this GroupWriteRequest +func NewGroupCreateRequestWithDefaults() *GroupCreateRequest { + var this GroupCreateRequest return &this } -func (o GroupWriteRequest) MarshalJSON() ([]byte, error) { +func (o GroupCreateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["id"] = o.Id diff --git a/schema/model_group_lookup_request.go b/schema/model_group_look_up_request.go similarity index 77% rename from schema/model_group_lookup_request.go rename to schema/model_group_look_up_request.go index 4738066b..7c2e41cb 100644 --- a/schema/model_group_lookup_request.go +++ b/schema/model_group_look_up_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GroupLookupRequest struct for GroupLookupRequest -type GroupLookupRequest struct { +// GroupLookUpRequest struct for GroupLookUpRequest +type GroupLookUpRequest struct { // ID of the alias. AliasId string `json:"alias_id"` @@ -27,16 +27,16 @@ type GroupLookupRequest struct { Name string `json:"name"` } -// NewGroupLookupRequestWithDefaults instantiates a new GroupLookupRequest object +// NewGroupLookUpRequestWithDefaults instantiates a new GroupLookUpRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGroupLookupRequestWithDefaults() *GroupLookupRequest { - var this GroupLookupRequest +func NewGroupLookUpRequestWithDefaults() *GroupLookUpRequest { + var this GroupLookUpRequest return &this } -func (o GroupLookupRequest) MarshalJSON() ([]byte, error) { +func (o GroupLookUpRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alias_id"] = o.AliasId diff --git a/schema/model_group_write_alias_by_id_request.go b/schema/model_group_update_alias_by_id_request.go similarity index 67% rename from schema/model_group_write_alias_by_id_request.go rename to schema/model_group_update_alias_by_id_request.go index b53c7bc3..b5d7047a 100644 --- a/schema/model_group_write_alias_by_id_request.go +++ b/schema/model_group_update_alias_by_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GroupWriteAliasByIDRequest struct for GroupWriteAliasByIDRequest -type GroupWriteAliasByIDRequest struct { +// GroupUpdateAliasByIdRequest struct for GroupUpdateAliasByIdRequest +type GroupUpdateAliasByIdRequest struct { // ID of the group to which this is an alias. CanonicalId string `json:"canonical_id"` @@ -21,16 +21,16 @@ type GroupWriteAliasByIDRequest struct { Name string `json:"name"` } -// NewGroupWriteAliasByIDRequestWithDefaults instantiates a new GroupWriteAliasByIDRequest object +// NewGroupUpdateAliasByIdRequestWithDefaults instantiates a new GroupUpdateAliasByIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGroupWriteAliasByIDRequestWithDefaults() *GroupWriteAliasByIDRequest { - var this GroupWriteAliasByIDRequest +func NewGroupUpdateAliasByIdRequestWithDefaults() *GroupUpdateAliasByIdRequest { + var this GroupUpdateAliasByIdRequest return &this } -func (o GroupWriteAliasByIDRequest) MarshalJSON() ([]byte, error) { +func (o GroupUpdateAliasByIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["canonical_id"] = o.CanonicalId diff --git a/schema/model_group_write_by_id_request.go b/schema/model_group_update_by_id_request.go similarity index 79% rename from schema/model_group_write_by_id_request.go rename to schema/model_group_update_by_id_request.go index feb2b11d..7d933b80 100644 --- a/schema/model_group_write_by_id_request.go +++ b/schema/model_group_update_by_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GroupWriteByIDRequest struct for GroupWriteByIDRequest -type GroupWriteByIDRequest struct { +// GroupUpdateByIdRequest struct for GroupUpdateByIdRequest +type GroupUpdateByIdRequest struct { // Entity IDs to be assigned as group members. MemberEntityIds []string `json:"member_entity_ids"` @@ -30,16 +30,16 @@ type GroupWriteByIDRequest struct { Type string `json:"type"` } -// NewGroupWriteByIDRequestWithDefaults instantiates a new GroupWriteByIDRequest object +// NewGroupUpdateByIdRequestWithDefaults instantiates a new GroupUpdateByIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGroupWriteByIDRequestWithDefaults() *GroupWriteByIDRequest { - var this GroupWriteByIDRequest +func NewGroupUpdateByIdRequestWithDefaults() *GroupUpdateByIdRequest { + var this GroupUpdateByIdRequest return &this } -func (o GroupWriteByIDRequest) MarshalJSON() ([]byte, error) { +func (o GroupUpdateByIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["member_entity_ids"] = o.MemberEntityIds diff --git a/schema/model_group_write_by_name_request.go b/schema/model_group_update_by_name_request.go similarity index 79% rename from schema/model_group_write_by_name_request.go rename to schema/model_group_update_by_name_request.go index 00f575df..c50ea4d9 100644 --- a/schema/model_group_write_by_name_request.go +++ b/schema/model_group_update_by_name_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// GroupWriteByNameRequest struct for GroupWriteByNameRequest -type GroupWriteByNameRequest struct { +// GroupUpdateByNameRequest struct for GroupUpdateByNameRequest +type GroupUpdateByNameRequest struct { // ID of the group. If set, updates the corresponding existing group. Id string `json:"id"` @@ -30,16 +30,16 @@ type GroupWriteByNameRequest struct { Type string `json:"type"` } -// NewGroupWriteByNameRequestWithDefaults instantiates a new GroupWriteByNameRequest object +// NewGroupUpdateByNameRequestWithDefaults instantiates a new GroupUpdateByNameRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewGroupWriteByNameRequestWithDefaults() *GroupWriteByNameRequest { - var this GroupWriteByNameRequest +func NewGroupUpdateByNameRequestWithDefaults() *GroupUpdateByNameRequest { + var this GroupUpdateByNameRequest return &this } -func (o GroupWriteByNameRequest) MarshalJSON() ([]byte, error) { +func (o GroupUpdateByNameRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["id"] = o.Id diff --git a/schema/model_ha_status_response.go b/schema/model_ha_status_response.go new file mode 100644 index 00000000..270dbf0b --- /dev/null +++ b/schema/model_ha_status_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// HaStatusResponse struct for HaStatusResponse +type HaStatusResponse struct { + Nodes []map[string]interface{} `json:"nodes"` +} + +// NewHaStatusResponseWithDefaults instantiates a new HaStatusResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewHaStatusResponseWithDefaults() *HaStatusResponse { + var this HaStatusResponse + + return &this +} + +func (o HaStatusResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["nodes"] = o.Nodes + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_init_request.go b/schema/model_initialize_request.go similarity index 88% rename from schema/model_write_init_request.go rename to schema/model_initialize_request.go index 4c120f7b..821ceda6 100644 --- a/schema/model_write_init_request.go +++ b/schema/model_initialize_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteInitRequest struct for WriteInitRequest -type WriteInitRequest struct { +// InitializeRequest struct for InitializeRequest +type InitializeRequest struct { // Specifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as `secret_shares`. PgpKeys []string `json:"pgp_keys"` @@ -36,16 +36,16 @@ type WriteInitRequest struct { StoredShares int32 `json:"stored_shares"` } -// NewWriteInitRequestWithDefaults instantiates a new WriteInitRequest object +// NewInitializeRequestWithDefaults instantiates a new InitializeRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteInitRequestWithDefaults() *WriteInitRequest { - var this WriteInitRequest +func NewInitializeRequestWithDefaults() *InitializeRequest { + var this InitializeRequest return &this } -func (o WriteInitRequest) MarshalJSON() ([]byte, error) { +func (o InitializeRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["pgp_keys"] = o.PgpKeys diff --git a/schema/model_write_internal_counters_config_request.go b/schema/model_internal_client_activity_configure_request.go similarity index 68% rename from schema/model_write_internal_counters_config_request.go rename to schema/model_internal_client_activity_configure_request.go index 2fe9f852..e883b65c 100644 --- a/schema/model_write_internal_counters_config_request.go +++ b/schema/model_internal_client_activity_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteInternalCountersConfigRequest struct for WriteInternalCountersConfigRequest -type WriteInternalCountersConfigRequest struct { +// InternalClientActivityConfigureRequest struct for InternalClientActivityConfigureRequest +type InternalClientActivityConfigureRequest struct { // Number of months to report if no start date specified. DefaultReportMonths int32 `json:"default_report_months"` @@ -21,11 +21,11 @@ type WriteInternalCountersConfigRequest struct { RetentionMonths int32 `json:"retention_months"` } -// NewWriteInternalCountersConfigRequestWithDefaults instantiates a new WriteInternalCountersConfigRequest object +// NewInternalClientActivityConfigureRequestWithDefaults instantiates a new InternalClientActivityConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteInternalCountersConfigRequestWithDefaults() *WriteInternalCountersConfigRequest { - var this WriteInternalCountersConfigRequest +func NewInternalClientActivityConfigureRequestWithDefaults() *InternalClientActivityConfigureRequest { + var this InternalClientActivityConfigureRequest this.DefaultReportMonths = 12 this.Enabled = "default" @@ -34,7 +34,7 @@ func NewWriteInternalCountersConfigRequestWithDefaults() *WriteInternalCountersC return &this } -func (o WriteInternalCountersConfigRequest) MarshalJSON() ([]byte, error) { +func (o InternalClientActivityConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["default_report_months"] = o.DefaultReportMonths diff --git a/schema/model_internal_count_entities_response.go b/schema/model_internal_count_entities_response.go new file mode 100644 index 00000000..ebb67aad --- /dev/null +++ b/schema/model_internal_count_entities_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// InternalCountEntitiesResponse struct for InternalCountEntitiesResponse +type InternalCountEntitiesResponse struct { + Counters map[string]interface{} `json:"counters"` +} + +// NewInternalCountEntitiesResponseWithDefaults instantiates a new InternalCountEntitiesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewInternalCountEntitiesResponseWithDefaults() *InternalCountEntitiesResponse { + var this InternalCountEntitiesResponse + + return &this +} + +func (o InternalCountEntitiesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["counters"] = o.Counters + + return json.Marshal(toSerialize) +} diff --git a/schema/model_internal_count_tokens_response.go b/schema/model_internal_count_tokens_response.go new file mode 100644 index 00000000..e0ff8e3c --- /dev/null +++ b/schema/model_internal_count_tokens_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// InternalCountTokensResponse struct for InternalCountTokensResponse +type InternalCountTokensResponse struct { + Counters map[string]interface{} `json:"counters"` +} + +// NewInternalCountTokensResponseWithDefaults instantiates a new InternalCountTokensResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewInternalCountTokensResponseWithDefaults() *InternalCountTokensResponse { + var this InternalCountTokensResponse + + return &this +} + +func (o InternalCountTokensResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["counters"] = o.Counters + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_internal_specs_open_api_request.go b/schema/model_internal_generate_open_api_document2_request.go similarity index 53% rename from schema/model_write_internal_specs_open_api_request.go rename to schema/model_internal_generate_open_api_document2_request.go index 6b95f336..6ffc2cd9 100644 --- a/schema/model_write_internal_specs_open_api_request.go +++ b/schema/model_internal_generate_open_api_document2_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WriteInternalSpecsOpenAPIRequest struct for WriteInternalSpecsOpenAPIRequest -type WriteInternalSpecsOpenAPIRequest struct { +// InternalGenerateOpenApiDocument2Request struct for InternalGenerateOpenApiDocument2Request +type InternalGenerateOpenApiDocument2Request struct { // Context string appended to every operationId Context string `json:"context"` } -// NewWriteInternalSpecsOpenAPIRequestWithDefaults instantiates a new WriteInternalSpecsOpenAPIRequest object +// NewInternalGenerateOpenApiDocument2RequestWithDefaults instantiates a new InternalGenerateOpenApiDocument2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteInternalSpecsOpenAPIRequestWithDefaults() *WriteInternalSpecsOpenAPIRequest { - var this WriteInternalSpecsOpenAPIRequest +func NewInternalGenerateOpenApiDocument2RequestWithDefaults() *InternalGenerateOpenApiDocument2Request { + var this InternalGenerateOpenApiDocument2Request return &this } -func (o WriteInternalSpecsOpenAPIRequest) MarshalJSON() ([]byte, error) { +func (o InternalGenerateOpenApiDocument2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["context"] = o.Context diff --git a/schema/model_internal_ui_list_enabled_feature_flags_response.go b/schema/model_internal_ui_list_enabled_feature_flags_response.go new file mode 100644 index 00000000..03a27302 --- /dev/null +++ b/schema/model_internal_ui_list_enabled_feature_flags_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// InternalUiListEnabledFeatureFlagsResponse struct for InternalUiListEnabledFeatureFlagsResponse +type InternalUiListEnabledFeatureFlagsResponse struct { + FeatureFlags []string `json:"feature_flags"` +} + +// NewInternalUiListEnabledFeatureFlagsResponseWithDefaults instantiates a new InternalUiListEnabledFeatureFlagsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewInternalUiListEnabledFeatureFlagsResponseWithDefaults() *InternalUiListEnabledFeatureFlagsResponse { + var this InternalUiListEnabledFeatureFlagsResponse + + return &this +} + +func (o InternalUiListEnabledFeatureFlagsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["feature_flags"] = o.FeatureFlags + + return json.Marshal(toSerialize) +} diff --git a/schema/model_internal_ui_list_enabled_visible_mounts_response.go b/schema/model_internal_ui_list_enabled_visible_mounts_response.go new file mode 100644 index 00000000..f447e614 --- /dev/null +++ b/schema/model_internal_ui_list_enabled_visible_mounts_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// InternalUiListEnabledVisibleMountsResponse struct for InternalUiListEnabledVisibleMountsResponse +type InternalUiListEnabledVisibleMountsResponse struct { + // auth mounts + Auth map[string]interface{} `json:"auth"` + + // secret mounts + Secret map[string]interface{} `json:"secret"` +} + +// NewInternalUiListEnabledVisibleMountsResponseWithDefaults instantiates a new InternalUiListEnabledVisibleMountsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewInternalUiListEnabledVisibleMountsResponseWithDefaults() *InternalUiListEnabledVisibleMountsResponse { + var this InternalUiListEnabledVisibleMountsResponse + + return &this +} + +func (o InternalUiListEnabledVisibleMountsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["auth"] = o.Auth + toSerialize["secret"] = o.Secret + + return json.Marshal(toSerialize) +} diff --git a/schema/model_internal_ui_list_namespaces_response.go b/schema/model_internal_ui_list_namespaces_response.go new file mode 100644 index 00000000..cfb939a9 --- /dev/null +++ b/schema/model_internal_ui_list_namespaces_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// InternalUiListNamespacesResponse struct for InternalUiListNamespacesResponse +type InternalUiListNamespacesResponse struct { + // field is only returned if there are one or more namespaces + Keys []string `json:"keys"` +} + +// NewInternalUiListNamespacesResponseWithDefaults instantiates a new InternalUiListNamespacesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewInternalUiListNamespacesResponseWithDefaults() *InternalUiListNamespacesResponse { + var this InternalUiListNamespacesResponse + + return &this +} + +func (o InternalUiListNamespacesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_internal_ui_read_mount_information_response.go b/schema/model_internal_ui_read_mount_information_response.go new file mode 100644 index 00000000..dde2ffc8 --- /dev/null +++ b/schema/model_internal_ui_read_mount_information_response.go @@ -0,0 +1,68 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// InternalUiReadMountInformationResponse struct for InternalUiReadMountInformationResponse +type InternalUiReadMountInformationResponse struct { + Accessor string `json:"accessor"` + + Config map[string]interface{} `json:"config"` + + Description string `json:"description"` + + ExternalEntropyAccess bool `json:"external_entropy_access"` + + Local bool `json:"local"` + + Options map[string]interface{} `json:"options"` + + Path string `json:"path"` + + PluginVersion string `json:"plugin_version"` + + RunningPluginVersion string `json:"running_plugin_version"` + + RunningSha256 string `json:"running_sha256"` + + SealWrap bool `json:"seal_wrap"` + + Type string `json:"type"` + + Uuid string `json:"uuid"` +} + +// NewInternalUiReadMountInformationResponseWithDefaults instantiates a new InternalUiReadMountInformationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewInternalUiReadMountInformationResponseWithDefaults() *InternalUiReadMountInformationResponse { + var this InternalUiReadMountInformationResponse + + return &this +} + +func (o InternalUiReadMountInformationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["accessor"] = o.Accessor + toSerialize["config"] = o.Config + toSerialize["description"] = o.Description + toSerialize["external_entropy_access"] = o.ExternalEntropyAccess + toSerialize["local"] = o.Local + toSerialize["options"] = o.Options + toSerialize["path"] = o.Path + toSerialize["plugin_version"] = o.PluginVersion + toSerialize["running_plugin_version"] = o.RunningPluginVersion + toSerialize["running_sha256"] = o.RunningSha256 + toSerialize["seal_wrap"] = o.SealWrap + toSerialize["type"] = o.Type + toSerialize["uuid"] = o.Uuid + + return json.Marshal(toSerialize) +} diff --git a/schema/model_internal_ui_read_resultant_acl_response.go b/schema/model_internal_ui_read_resultant_acl_response.go new file mode 100644 index 00000000..9504204b --- /dev/null +++ b/schema/model_internal_ui_read_resultant_acl_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// InternalUiReadResultantAclResponse struct for InternalUiReadResultantAclResponse +type InternalUiReadResultantAclResponse struct { + ExactPaths map[string]interface{} `json:"exact_paths"` + + GlobPaths map[string]interface{} `json:"glob_paths"` + + Root bool `json:"root"` +} + +// NewInternalUiReadResultantAclResponseWithDefaults instantiates a new InternalUiReadResultantAclResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewInternalUiReadResultantAclResponseWithDefaults() *InternalUiReadResultantAclResponse { + var this InternalUiReadResultantAclResponse + + return &this +} + +func (o InternalUiReadResultantAclResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["exact_paths"] = o.ExactPaths + toSerialize["glob_paths"] = o.GlobPaths + toSerialize["root"] = o.Root + + return json.Marshal(toSerialize) +} diff --git a/schema/model_jwt_write_config_request.go b/schema/model_jwt_configure_request.go similarity index 91% rename from schema/model_jwt_write_config_request.go rename to schema/model_jwt_configure_request.go index 05dfcfb1..ef45aa36 100644 --- a/schema/model_jwt_write_config_request.go +++ b/schema/model_jwt_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// JWTWriteConfigRequest struct for JWTWriteConfigRequest -type JWTWriteConfigRequest struct { +// JwtConfigureRequest struct for JwtConfigureRequest +type JwtConfigureRequest struct { // The value against which to match the 'iss' claim in a JWT. Optional. BoundIssuer string `json:"bound_issuer"` @@ -54,16 +54,16 @@ type JWTWriteConfigRequest struct { ProviderConfig map[string]interface{} `json:"provider_config"` } -// NewJWTWriteConfigRequestWithDefaults instantiates a new JWTWriteConfigRequest object +// NewJwtConfigureRequestWithDefaults instantiates a new JwtConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewJWTWriteConfigRequestWithDefaults() *JWTWriteConfigRequest { - var this JWTWriteConfigRequest +func NewJwtConfigureRequestWithDefaults() *JwtConfigureRequest { + var this JwtConfigureRequest return &this } -func (o JWTWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o JwtConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bound_issuer"] = o.BoundIssuer diff --git a/schema/model_jwt_login_request.go b/schema/model_jwt_login_request.go index 9653b276..52032d21 100644 --- a/schema/model_jwt_login_request.go +++ b/schema/model_jwt_login_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// JWTLoginRequest struct for JWTLoginRequest -type JWTLoginRequest struct { +// JwtLoginRequest struct for JwtLoginRequest +type JwtLoginRequest struct { // The signed JWT to validate. Jwt string `json:"jwt"` @@ -18,16 +18,16 @@ type JWTLoginRequest struct { Role string `json:"role"` } -// NewJWTLoginRequestWithDefaults instantiates a new JWTLoginRequest object +// NewJwtLoginRequestWithDefaults instantiates a new JwtLoginRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewJWTLoginRequestWithDefaults() *JWTLoginRequest { - var this JWTLoginRequest +func NewJwtLoginRequestWithDefaults() *JwtLoginRequest { + var this JwtLoginRequest return &this } -func (o JWTLoginRequest) MarshalJSON() ([]byte, error) { +func (o JwtLoginRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["jwt"] = o.Jwt diff --git a/schema/model_jwt_write_oidc_callback_request.go b/schema/model_jwt_oidc_callback_with_parameters_request.go similarity index 60% rename from schema/model_jwt_write_oidc_callback_request.go rename to schema/model_jwt_oidc_callback_with_parameters_request.go index 299c7606..c5acc738 100644 --- a/schema/model_jwt_write_oidc_callback_request.go +++ b/schema/model_jwt_oidc_callback_with_parameters_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// JWTWriteOIDCCallbackRequest struct for JWTWriteOIDCCallbackRequest -type JWTWriteOIDCCallbackRequest struct { +// JwtOidcCallbackWithParametersRequest struct for JwtOidcCallbackWithParametersRequest +type JwtOidcCallbackWithParametersRequest struct { ClientNonce string `json:"client_nonce"` Code string `json:"code"` @@ -20,16 +20,16 @@ type JWTWriteOIDCCallbackRequest struct { State string `json:"state"` } -// NewJWTWriteOIDCCallbackRequestWithDefaults instantiates a new JWTWriteOIDCCallbackRequest object +// NewJwtOidcCallbackWithParametersRequestWithDefaults instantiates a new JwtOidcCallbackWithParametersRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewJWTWriteOIDCCallbackRequestWithDefaults() *JWTWriteOIDCCallbackRequest { - var this JWTWriteOIDCCallbackRequest +func NewJwtOidcCallbackWithParametersRequestWithDefaults() *JwtOidcCallbackWithParametersRequest { + var this JwtOidcCallbackWithParametersRequest return &this } -func (o JWTWriteOIDCCallbackRequest) MarshalJSON() ([]byte, error) { +func (o JwtOidcCallbackWithParametersRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_nonce"] = o.ClientNonce diff --git a/schema/model_oidc_write_auth_url_request.go b/schema/model_jwt_oidc_request_authorization_url_request.go similarity index 64% rename from schema/model_oidc_write_auth_url_request.go rename to schema/model_jwt_oidc_request_authorization_url_request.go index 6319ae01..dfe2169c 100644 --- a/schema/model_oidc_write_auth_url_request.go +++ b/schema/model_jwt_oidc_request_authorization_url_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteAuthURLRequest struct for OIDCWriteAuthURLRequest -type OIDCWriteAuthURLRequest struct { +// JwtOidcRequestAuthorizationUrlRequest struct for JwtOidcRequestAuthorizationUrlRequest +type JwtOidcRequestAuthorizationUrlRequest struct { // Optional client-provided nonce that must match during callback, if present. ClientNonce string `json:"client_nonce"` @@ -21,16 +21,16 @@ type OIDCWriteAuthURLRequest struct { Role string `json:"role"` } -// NewOIDCWriteAuthURLRequestWithDefaults instantiates a new OIDCWriteAuthURLRequest object +// NewJwtOidcRequestAuthorizationUrlRequestWithDefaults instantiates a new JwtOidcRequestAuthorizationUrlRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteAuthURLRequestWithDefaults() *OIDCWriteAuthURLRequest { - var this OIDCWriteAuthURLRequest +func NewJwtOidcRequestAuthorizationUrlRequestWithDefaults() *JwtOidcRequestAuthorizationUrlRequest { + var this JwtOidcRequestAuthorizationUrlRequest return &this } -func (o OIDCWriteAuthURLRequest) MarshalJSON() ([]byte, error) { +func (o JwtOidcRequestAuthorizationUrlRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_nonce"] = o.ClientNonce diff --git a/schema/model_jwt_write_oidc_auth_url_request.go b/schema/model_jwt_write_oidc_auth_url_request.go deleted file mode 100644 index ca556403..00000000 --- a/schema/model_jwt_write_oidc_auth_url_request.go +++ /dev/null @@ -1,41 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// JWTWriteOIDCAuthURLRequest struct for JWTWriteOIDCAuthURLRequest -type JWTWriteOIDCAuthURLRequest struct { - // Optional client-provided nonce that must match during callback, if present. - ClientNonce string `json:"client_nonce"` - - // The OAuth redirect_uri to use in the authorization URL. - RedirectUri string `json:"redirect_uri"` - - // The role to issue an OIDC authorization URL against. - Role string `json:"role"` -} - -// NewJWTWriteOIDCAuthURLRequestWithDefaults instantiates a new JWTWriteOIDCAuthURLRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewJWTWriteOIDCAuthURLRequestWithDefaults() *JWTWriteOIDCAuthURLRequest { - var this JWTWriteOIDCAuthURLRequest - - return &this -} - -func (o JWTWriteOIDCAuthURLRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["client_nonce"] = o.ClientNonce - toSerialize["redirect_uri"] = o.RedirectUri - toSerialize["role"] = o.Role - - return json.Marshal(toSerialize) -} diff --git a/schema/model_jwt_write_role_request.go b/schema/model_jwt_write_role_request.go index 3be8e584..2184f4f7 100644 --- a/schema/model_jwt_write_role_request.go +++ b/schema/model_jwt_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// JWTWriteRoleRequest struct for JWTWriteRoleRequest -type JWTWriteRoleRequest struct { +// JwtWriteRoleRequest struct for JwtWriteRoleRequest +type JwtWriteRoleRequest struct { // Comma-separated list of allowed values for redirect_uri AllowedRedirectUris []string `json:"allowed_redirect_uris"` @@ -111,11 +111,11 @@ type JWTWriteRoleRequest struct { VerboseOidcLogging bool `json:"verbose_oidc_logging"` } -// NewJWTWriteRoleRequestWithDefaults instantiates a new JWTWriteRoleRequest object +// NewJwtWriteRoleRequestWithDefaults instantiates a new JwtWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewJWTWriteRoleRequestWithDefaults() *JWTWriteRoleRequest { - var this JWTWriteRoleRequest +func NewJwtWriteRoleRequestWithDefaults() *JwtWriteRoleRequest { + var this JwtWriteRoleRequest this.BoundClaimsType = "string" this.ExpirationLeeway = 150 @@ -125,7 +125,7 @@ func NewJWTWriteRoleRequestWithDefaults() *JWTWriteRoleRequest { return &this } -func (o JWTWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o JwtWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allowed_redirect_uris"] = o.AllowedRedirectUris diff --git a/schema/model_ldap_write_auth_config_request.go b/schema/model_kerberos_configure_ldap_request.go similarity index 85% rename from schema/model_ldap_write_auth_config_request.go rename to schema/model_kerberos_configure_ldap_request.go index 5004b1ed..539711d5 100644 --- a/schema/model_ldap_write_auth_config_request.go +++ b/schema/model_kerberos_configure_ldap_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// LDAPWriteAuthConfigRequest struct for LDAPWriteAuthConfigRequest -type LDAPWriteAuthConfigRequest struct { +// KerberosConfigureLdapRequest struct for KerberosConfigureLdapRequest +type KerberosConfigureLdapRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` @@ -32,9 +32,15 @@ type LDAPWriteAuthConfigRequest struct { // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` + // Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. + ConnectionTimeout int32 `json:"connection_timeout"` + // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` + // When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'. + DereferenceAliases string `json:"dereference_aliases"` + // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` @@ -50,6 +56,9 @@ type LDAPWriteAuthConfigRequest struct { // Skip LDAP server SSL Certificate verification - VERY insecure (optional) InsecureTls bool `json:"insecure_tls"` + // The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged. + MaxPageSize int32 `json:"max_page_size"` + // Timeout, in seconds, for the connection when making requests against the server before returning back an error. RequestTimeout int32 `json:"request_timeout"` @@ -114,16 +123,18 @@ type LDAPWriteAuthConfigRequest struct { UsernameAsAlias bool `json:"username_as_alias"` } -// NewLDAPWriteAuthConfigRequestWithDefaults instantiates a new LDAPWriteAuthConfigRequest object +// NewKerberosConfigureLdapRequestWithDefaults instantiates a new KerberosConfigureLdapRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewLDAPWriteAuthConfigRequestWithDefaults() *LDAPWriteAuthConfigRequest { - var this LDAPWriteAuthConfigRequest +func NewKerberosConfigureLdapRequestWithDefaults() *KerberosConfigureLdapRequest { + var this KerberosConfigureLdapRequest this.AnonymousGroupSearch = false this.DenyNullBind = true + this.DereferenceAliases = "never" this.Groupattr = "cn" this.Groupfilter = "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))" + this.MaxPageSize = 2147483647 this.TlsMaxVersion = "tls12" this.TlsMinVersion = "tls12" this.TokenType = "default-service" @@ -136,7 +147,7 @@ func NewLDAPWriteAuthConfigRequestWithDefaults() *LDAPWriteAuthConfigRequest { return &this } -func (o LDAPWriteAuthConfigRequest) MarshalJSON() ([]byte, error) { +func (o KerberosConfigureLdapRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["anonymous_group_search"] = o.AnonymousGroupSearch @@ -146,12 +157,15 @@ func (o LDAPWriteAuthConfigRequest) MarshalJSON() ([]byte, error) { toSerialize["certificate"] = o.Certificate toSerialize["client_tls_cert"] = o.ClientTlsCert toSerialize["client_tls_key"] = o.ClientTlsKey + toSerialize["connection_timeout"] = o.ConnectionTimeout toSerialize["deny_null_bind"] = o.DenyNullBind + toSerialize["dereference_aliases"] = o.DereferenceAliases toSerialize["discoverdn"] = o.Discoverdn toSerialize["groupattr"] = o.Groupattr toSerialize["groupdn"] = o.Groupdn toSerialize["groupfilter"] = o.Groupfilter toSerialize["insecure_tls"] = o.InsecureTls + toSerialize["max_page_size"] = o.MaxPageSize toSerialize["request_timeout"] = o.RequestTimeout toSerialize["starttls"] = o.Starttls toSerialize["tls_max_version"] = o.TlsMaxVersion diff --git a/schema/model_kerberos_write_config_request.go b/schema/model_kerberos_configure_request.go similarity index 72% rename from schema/model_kerberos_write_config_request.go rename to schema/model_kerberos_configure_request.go index efeb7ea7..21d802f6 100644 --- a/schema/model_kerberos_write_config_request.go +++ b/schema/model_kerberos_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// KerberosWriteConfigRequest struct for KerberosWriteConfigRequest -type KerberosWriteConfigRequest struct { +// KerberosConfigureRequest struct for KerberosConfigureRequest +type KerberosConfigureRequest struct { // If set to true, returns any groups found in LDAP as a group alias. AddGroupAliases bool `json:"add_group_aliases"` @@ -24,16 +24,16 @@ type KerberosWriteConfigRequest struct { ServiceAccount string `json:"service_account"` } -// NewKerberosWriteConfigRequestWithDefaults instantiates a new KerberosWriteConfigRequest object +// NewKerberosConfigureRequestWithDefaults instantiates a new KerberosConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKerberosWriteConfigRequestWithDefaults() *KerberosWriteConfigRequest { - var this KerberosWriteConfigRequest +func NewKerberosConfigureRequestWithDefaults() *KerberosConfigureRequest { + var this KerberosConfigureRequest return &this } -func (o KerberosWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o KerberosConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["add_group_aliases"] = o.AddGroupAliases diff --git a/schema/model_kubernetes_write_auth_config_request.go b/schema/model_kubernetes_configure_auth_request.go similarity index 83% rename from schema/model_kubernetes_write_auth_config_request.go rename to schema/model_kubernetes_configure_auth_request.go index 4e1e5e9e..fb8032ed 100644 --- a/schema/model_kubernetes_write_auth_config_request.go +++ b/schema/model_kubernetes_configure_auth_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// KubernetesWriteAuthConfigRequest struct for KubernetesWriteAuthConfigRequest -type KubernetesWriteAuthConfigRequest struct { +// KubernetesConfigureAuthRequest struct for KubernetesConfigureAuthRequest +type KubernetesConfigureAuthRequest struct { // Disable JWT issuer validation (Deprecated, will be removed in a future release) // Deprecated DisableIssValidation bool `json:"disable_iss_validation"` @@ -35,11 +35,11 @@ type KubernetesWriteAuthConfigRequest struct { TokenReviewerJwt string `json:"token_reviewer_jwt"` } -// NewKubernetesWriteAuthConfigRequestWithDefaults instantiates a new KubernetesWriteAuthConfigRequest object +// NewKubernetesConfigureAuthRequestWithDefaults instantiates a new KubernetesConfigureAuthRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKubernetesWriteAuthConfigRequestWithDefaults() *KubernetesWriteAuthConfigRequest { - var this KubernetesWriteAuthConfigRequest +func NewKubernetesConfigureAuthRequestWithDefaults() *KubernetesConfigureAuthRequest { + var this KubernetesConfigureAuthRequest this.DisableIssValidation = true this.DisableLocalCaJwt = false @@ -47,7 +47,7 @@ func NewKubernetesWriteAuthConfigRequestWithDefaults() *KubernetesWriteAuthConfi return &this } -func (o KubernetesWriteAuthConfigRequest) MarshalJSON() ([]byte, error) { +func (o KubernetesConfigureAuthRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_iss_validation"] = o.DisableIssValidation diff --git a/schema/model_kubernetes_write_config_request.go b/schema/model_kubernetes_configure_request.go similarity index 78% rename from schema/model_kubernetes_write_config_request.go rename to schema/model_kubernetes_configure_request.go index b29fc009..49b2bfc3 100644 --- a/schema/model_kubernetes_write_config_request.go +++ b/schema/model_kubernetes_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// KubernetesWriteConfigRequest struct for KubernetesWriteConfigRequest -type KubernetesWriteConfigRequest struct { +// KubernetesConfigureRequest struct for KubernetesConfigureRequest +type KubernetesConfigureRequest struct { // Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. DisableLocalCaJwt bool `json:"disable_local_ca_jwt"` @@ -24,18 +24,18 @@ type KubernetesWriteConfigRequest struct { ServiceAccountJwt string `json:"service_account_jwt"` } -// NewKubernetesWriteConfigRequestWithDefaults instantiates a new KubernetesWriteConfigRequest object +// NewKubernetesConfigureRequestWithDefaults instantiates a new KubernetesConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKubernetesWriteConfigRequestWithDefaults() *KubernetesWriteConfigRequest { - var this KubernetesWriteConfigRequest +func NewKubernetesConfigureRequestWithDefaults() *KubernetesConfigureRequest { + var this KubernetesConfigureRequest this.DisableLocalCaJwt = false return &this } -func (o KubernetesWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o KubernetesConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_local_ca_jwt"] = o.DisableLocalCaJwt diff --git a/schema/model_kubernetes_write_credentials_request.go b/schema/model_kubernetes_generate_credentials_request.go similarity index 63% rename from schema/model_kubernetes_write_credentials_request.go rename to schema/model_kubernetes_generate_credentials_request.go index 16e66fcc..151e62a8 100644 --- a/schema/model_kubernetes_write_credentials_request.go +++ b/schema/model_kubernetes_generate_credentials_request.go @@ -9,8 +9,11 @@ import ( "encoding/json" ) -// KubernetesWriteCredentialsRequest struct for KubernetesWriteCredentialsRequest -type KubernetesWriteCredentialsRequest struct { +// KubernetesGenerateCredentialsRequest struct for KubernetesGenerateCredentialsRequest +type KubernetesGenerateCredentialsRequest struct { + // The intended audiences of the generated credentials + Audiences []string `json:"audiences"` + // If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. Requires the Vault role to have kubernetes_role_type set to ClusterRole. ClusterRoleBinding bool `json:"cluster_role_binding"` @@ -21,18 +24,19 @@ type KubernetesWriteCredentialsRequest struct { Ttl int32 `json:"ttl"` } -// NewKubernetesWriteCredentialsRequestWithDefaults instantiates a new KubernetesWriteCredentialsRequest object +// NewKubernetesGenerateCredentialsRequestWithDefaults instantiates a new KubernetesGenerateCredentialsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKubernetesWriteCredentialsRequestWithDefaults() *KubernetesWriteCredentialsRequest { - var this KubernetesWriteCredentialsRequest +func NewKubernetesGenerateCredentialsRequestWithDefaults() *KubernetesGenerateCredentialsRequest { + var this KubernetesGenerateCredentialsRequest return &this } -func (o KubernetesWriteCredentialsRequest) MarshalJSON() ([]byte, error) { +func (o KubernetesGenerateCredentialsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) + toSerialize["audiences"] = o.Audiences toSerialize["cluster_role_binding"] = o.ClusterRoleBinding toSerialize["kubernetes_namespace"] = o.KubernetesNamespace toSerialize["ttl"] = o.Ttl diff --git a/schema/model_kubernetes_write_role_request.go b/schema/model_kubernetes_write_role_request.go index 230885de..ace4b79a 100644 --- a/schema/model_kubernetes_write_role_request.go +++ b/schema/model_kubernetes_write_role_request.go @@ -38,6 +38,9 @@ type KubernetesWriteRoleRequest struct { // The pre-existing service account to generate tokens for. Mutually exclusive with all role parameters. If set, only a Kubernetes service account token will be created. ServiceAccountName string `json:"service_account_name"` + // The default audiences for generated Kubernetes service account tokens. If not set or set to \"\", will use k8s cluster default. + TokenDefaultAudiences []string `json:"token_default_audiences"` + // The default ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default. TokenDefaultTtl int32 `json:"token_default_ttl"` @@ -68,6 +71,7 @@ func (o KubernetesWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["kubernetes_role_type"] = o.KubernetesRoleType toSerialize["name_template"] = o.NameTemplate toSerialize["service_account_name"] = o.ServiceAccountName + toSerialize["token_default_audiences"] = o.TokenDefaultAudiences toSerialize["token_default_ttl"] = o.TokenDefaultTtl toSerialize["token_max_ttl"] = o.TokenMaxTtl diff --git a/schema/model_kvv2_write_config_request.go b/schema/model_kv_v2_configure_request.go similarity index 75% rename from schema/model_kvv2_write_config_request.go rename to schema/model_kv_v2_configure_request.go index a21eb3e9..6c6b2ab9 100644 --- a/schema/model_kvv2_write_config_request.go +++ b/schema/model_kv_v2_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// KVv2WriteConfigRequest struct for KVv2WriteConfigRequest -type KVv2WriteConfigRequest struct { +// KvV2ConfigureRequest struct for KvV2ConfigureRequest +type KvV2ConfigureRequest struct { // If true, the backend will require the cas parameter to be set for each write CasRequired bool `json:"cas_required"` @@ -21,16 +21,16 @@ type KVv2WriteConfigRequest struct { MaxVersions int32 `json:"max_versions"` } -// NewKVv2WriteConfigRequestWithDefaults instantiates a new KVv2WriteConfigRequest object +// NewKvV2ConfigureRequestWithDefaults instantiates a new KvV2ConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKVv2WriteConfigRequestWithDefaults() *KVv2WriteConfigRequest { - var this KVv2WriteConfigRequest +func NewKvV2ConfigureRequestWithDefaults() *KvV2ConfigureRequest { + var this KvV2ConfigureRequest return &this } -func (o KVv2WriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o KvV2ConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cas_required"] = o.CasRequired diff --git a/schema/model_kvv2_delete_versions_request.go b/schema/model_kv_v2_delete_versions_request.go similarity index 65% rename from schema/model_kvv2_delete_versions_request.go rename to schema/model_kv_v2_delete_versions_request.go index f84bc7d6..c307da7a 100644 --- a/schema/model_kvv2_delete_versions_request.go +++ b/schema/model_kv_v2_delete_versions_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// KVv2DeleteVersionsRequest struct for KVv2DeleteVersionsRequest -type KVv2DeleteVersionsRequest struct { +// KvV2DeleteVersionsRequest struct for KvV2DeleteVersionsRequest +type KvV2DeleteVersionsRequest struct { // The versions to be archived. The versioned data will not be deleted, but it will no longer be returned in normal get requests. Versions []int32 `json:"versions"` } -// NewKVv2DeleteVersionsRequestWithDefaults instantiates a new KVv2DeleteVersionsRequest object +// NewKvV2DeleteVersionsRequestWithDefaults instantiates a new KvV2DeleteVersionsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKVv2DeleteVersionsRequestWithDefaults() *KVv2DeleteVersionsRequest { - var this KVv2DeleteVersionsRequest +func NewKvV2DeleteVersionsRequestWithDefaults() *KvV2DeleteVersionsRequest { + var this KvV2DeleteVersionsRequest return &this } -func (o KVv2DeleteVersionsRequest) MarshalJSON() ([]byte, error) { +func (o KvV2DeleteVersionsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["versions"] = o.Versions diff --git a/schema/model_kvv2_destroy_versions_request.go b/schema/model_kv_v2_destroy_versions_request.go similarity index 63% rename from schema/model_kvv2_destroy_versions_request.go rename to schema/model_kv_v2_destroy_versions_request.go index 6fa07179..b0c37222 100644 --- a/schema/model_kvv2_destroy_versions_request.go +++ b/schema/model_kv_v2_destroy_versions_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// KVv2DestroyVersionsRequest struct for KVv2DestroyVersionsRequest -type KVv2DestroyVersionsRequest struct { +// KvV2DestroyVersionsRequest struct for KvV2DestroyVersionsRequest +type KvV2DestroyVersionsRequest struct { // The versions to destroy. Their data will be permanently deleted. Versions []int32 `json:"versions"` } -// NewKVv2DestroyVersionsRequestWithDefaults instantiates a new KVv2DestroyVersionsRequest object +// NewKvV2DestroyVersionsRequestWithDefaults instantiates a new KvV2DestroyVersionsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKVv2DestroyVersionsRequestWithDefaults() *KVv2DestroyVersionsRequest { - var this KVv2DestroyVersionsRequest +func NewKvV2DestroyVersionsRequestWithDefaults() *KvV2DestroyVersionsRequest { + var this KvV2DestroyVersionsRequest return &this } -func (o KVv2DestroyVersionsRequest) MarshalJSON() ([]byte, error) { +func (o KvV2DestroyVersionsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["versions"] = o.Versions diff --git a/schema/model_kv_v2_patch_response.go b/schema/model_kv_v2_patch_response.go new file mode 100644 index 00000000..be031b3c --- /dev/null +++ b/schema/model_kv_v2_patch_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// KvV2PatchResponse struct for KvV2PatchResponse +type KvV2PatchResponse struct { + CreatedTime time.Time `json:"created_time"` + + CustomMetadata map[string]interface{} `json:"custom_metadata"` + + DeletionTime string `json:"deletion_time"` + + Destroyed bool `json:"destroyed"` + + Version int64 `json:"version"` +} + +// NewKvV2PatchResponseWithDefaults instantiates a new KvV2PatchResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewKvV2PatchResponseWithDefaults() *KvV2PatchResponse { + var this KvV2PatchResponse + + return &this +} + +func (o KvV2PatchResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["created_time"] = o.CreatedTime + toSerialize["custom_metadata"] = o.CustomMetadata + toSerialize["deletion_time"] = o.DeletionTime + toSerialize["destroyed"] = o.Destroyed + toSerialize["version"] = o.Version + + return json.Marshal(toSerialize) +} diff --git a/schema/model_kv_v2_read_configuration_response.go b/schema/model_kv_v2_read_configuration_response.go new file mode 100644 index 00000000..a0721e2e --- /dev/null +++ b/schema/model_kv_v2_read_configuration_response.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// KvV2ReadConfigurationResponse struct for KvV2ReadConfigurationResponse +type KvV2ReadConfigurationResponse struct { + // If true, the backend will require the cas parameter to be set for each write + CasRequired bool `json:"cas_required"` + + // The length of time before a version is deleted. + DeleteVersionAfter int32 `json:"delete_version_after"` + + // The number of versions to keep for each key. + MaxVersions int32 `json:"max_versions"` +} + +// NewKvV2ReadConfigurationResponseWithDefaults instantiates a new KvV2ReadConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewKvV2ReadConfigurationResponseWithDefaults() *KvV2ReadConfigurationResponse { + var this KvV2ReadConfigurationResponse + + return &this +} + +func (o KvV2ReadConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["cas_required"] = o.CasRequired + toSerialize["delete_version_after"] = o.DeleteVersionAfter + toSerialize["max_versions"] = o.MaxVersions + + return json.Marshal(toSerialize) +} diff --git a/schema/model_kv_v2_read_metadata_response.go b/schema/model_kv_v2_read_metadata_response.go new file mode 100644 index 00000000..68042825 --- /dev/null +++ b/schema/model_kv_v2_read_metadata_response.go @@ -0,0 +1,60 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// KvV2ReadMetadataResponse struct for KvV2ReadMetadataResponse +type KvV2ReadMetadataResponse struct { + CasRequired bool `json:"cas_required"` + + CreatedTime time.Time `json:"created_time"` + + CurrentVersion int64 `json:"current_version"` + + // User-provided key-value pairs that are used to describe arbitrary and version-agnostic information about a secret. + CustomMetadata map[string]interface{} `json:"custom_metadata"` + + // The length of time before a version is deleted. + DeleteVersionAfter int32 `json:"delete_version_after"` + + // The number of versions to keep + MaxVersions int64 `json:"max_versions"` + + OldestVersion int64 `json:"oldest_version"` + + UpdatedTime time.Time `json:"updated_time"` + + Versions map[string]interface{} `json:"versions"` +} + +// NewKvV2ReadMetadataResponseWithDefaults instantiates a new KvV2ReadMetadataResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewKvV2ReadMetadataResponseWithDefaults() *KvV2ReadMetadataResponse { + var this KvV2ReadMetadataResponse + + return &this +} + +func (o KvV2ReadMetadataResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["cas_required"] = o.CasRequired + toSerialize["created_time"] = o.CreatedTime + toSerialize["current_version"] = o.CurrentVersion + toSerialize["custom_metadata"] = o.CustomMetadata + toSerialize["delete_version_after"] = o.DeleteVersionAfter + toSerialize["max_versions"] = o.MaxVersions + toSerialize["oldest_version"] = o.OldestVersion + toSerialize["updated_time"] = o.UpdatedTime + toSerialize["versions"] = o.Versions + + return json.Marshal(toSerialize) +} diff --git a/schema/model_ssh_write_keys_request.go b/schema/model_kv_v2_read_response.go similarity index 50% rename from schema/model_ssh_write_keys_request.go rename to schema/model_kv_v2_read_response.go index 30261021..b8c5bc18 100644 --- a/schema/model_ssh_write_keys_request.go +++ b/schema/model_kv_v2_read_response.go @@ -9,25 +9,27 @@ import ( "encoding/json" ) -// SSHWriteKeysRequest struct for SSHWriteKeysRequest -type SSHWriteKeysRequest struct { - // [Required] SSH private key with super user privileges in host - Key string `json:"key"` +// KvV2ReadResponse struct for KvV2ReadResponse +type KvV2ReadResponse struct { + Data map[string]interface{} `json:"data"` + + Metadata map[string]interface{} `json:"metadata"` } -// NewSSHWriteKeysRequestWithDefaults instantiates a new SSHWriteKeysRequest object +// NewKvV2ReadResponseWithDefaults instantiates a new KvV2ReadResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHWriteKeysRequestWithDefaults() *SSHWriteKeysRequest { - var this SSHWriteKeysRequest +func NewKvV2ReadResponseWithDefaults() *KvV2ReadResponse { + var this KvV2ReadResponse return &this } -func (o SSHWriteKeysRequest) MarshalJSON() ([]byte, error) { +func (o KvV2ReadResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) - toSerialize["key"] = o.Key + toSerialize["data"] = o.Data + toSerialize["metadata"] = o.Metadata return json.Marshal(toSerialize) } diff --git a/schema/model_kv_v2_read_subkeys_response.go b/schema/model_kv_v2_read_subkeys_response.go new file mode 100644 index 00000000..45ab3e1a --- /dev/null +++ b/schema/model_kv_v2_read_subkeys_response.go @@ -0,0 +1,35 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// KvV2ReadSubkeysResponse struct for KvV2ReadSubkeysResponse +type KvV2ReadSubkeysResponse struct { + Metadata map[string]interface{} `json:"metadata"` + + Subkeys map[string]interface{} `json:"subkeys"` +} + +// NewKvV2ReadSubkeysResponseWithDefaults instantiates a new KvV2ReadSubkeysResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewKvV2ReadSubkeysResponseWithDefaults() *KvV2ReadSubkeysResponse { + var this KvV2ReadSubkeysResponse + + return &this +} + +func (o KvV2ReadSubkeysResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["metadata"] = o.Metadata + toSerialize["subkeys"] = o.Subkeys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_kvv2_undelete_versions_request.go b/schema/model_kv_v2_undelete_versions_request.go similarity index 64% rename from schema/model_kvv2_undelete_versions_request.go rename to schema/model_kv_v2_undelete_versions_request.go index a7d0ada4..e0ed2367 100644 --- a/schema/model_kvv2_undelete_versions_request.go +++ b/schema/model_kv_v2_undelete_versions_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// KVv2UndeleteVersionsRequest struct for KVv2UndeleteVersionsRequest -type KVv2UndeleteVersionsRequest struct { +// KvV2UndeleteVersionsRequest struct for KvV2UndeleteVersionsRequest +type KvV2UndeleteVersionsRequest struct { // The versions to unarchive. The versions will be restored and their data will be returned on normal get requests. Versions []int32 `json:"versions"` } -// NewKVv2UndeleteVersionsRequestWithDefaults instantiates a new KVv2UndeleteVersionsRequest object +// NewKvV2UndeleteVersionsRequestWithDefaults instantiates a new KvV2UndeleteVersionsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKVv2UndeleteVersionsRequestWithDefaults() *KVv2UndeleteVersionsRequest { - var this KVv2UndeleteVersionsRequest +func NewKvV2UndeleteVersionsRequestWithDefaults() *KvV2UndeleteVersionsRequest { + var this KvV2UndeleteVersionsRequest return &this } -func (o KVv2UndeleteVersionsRequest) MarshalJSON() ([]byte, error) { +func (o KvV2UndeleteVersionsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["versions"] = o.Versions diff --git a/schema/model_kvv2_write_metadata_request.go b/schema/model_kv_v2_write_metadata_request.go similarity index 80% rename from schema/model_kvv2_write_metadata_request.go rename to schema/model_kv_v2_write_metadata_request.go index 521e6f81..412fb93a 100644 --- a/schema/model_kvv2_write_metadata_request.go +++ b/schema/model_kv_v2_write_metadata_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// KVv2WriteMetadataRequest struct for KVv2WriteMetadataRequest -type KVv2WriteMetadataRequest struct { +// KvV2WriteMetadataRequest struct for KvV2WriteMetadataRequest +type KvV2WriteMetadataRequest struct { // If true the key will require the cas parameter to be set on all write requests. If false, the backend’s configuration will be used. CasRequired bool `json:"cas_required"` @@ -24,16 +24,16 @@ type KVv2WriteMetadataRequest struct { MaxVersions int32 `json:"max_versions"` } -// NewKVv2WriteMetadataRequestWithDefaults instantiates a new KVv2WriteMetadataRequest object +// NewKvV2WriteMetadataRequestWithDefaults instantiates a new KvV2WriteMetadataRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKVv2WriteMetadataRequestWithDefaults() *KVv2WriteMetadataRequest { - var this KVv2WriteMetadataRequest +func NewKvV2WriteMetadataRequestWithDefaults() *KvV2WriteMetadataRequest { + var this KvV2WriteMetadataRequest return &this } -func (o KVv2WriteMetadataRequest) MarshalJSON() ([]byte, error) { +func (o KvV2WriteMetadataRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cas_required"] = o.CasRequired diff --git a/schema/model_kvv2_write_request.go b/schema/model_kv_v2_write_request.go similarity index 80% rename from schema/model_kvv2_write_request.go rename to schema/model_kv_v2_write_request.go index 1ca79efb..4b8d9c5c 100644 --- a/schema/model_kvv2_write_request.go +++ b/schema/model_kv_v2_write_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// KVv2WriteRequest struct for KVv2WriteRequest -type KVv2WriteRequest struct { +// KvV2WriteRequest struct for KvV2WriteRequest +type KvV2WriteRequest struct { // The contents of the data map will be stored and returned on read. Data map[string]interface{} `json:"data"` @@ -21,16 +21,16 @@ type KVv2WriteRequest struct { Version int32 `json:"version"` } -// NewKVv2WriteRequestWithDefaults instantiates a new KVv2WriteRequest object +// NewKvV2WriteRequestWithDefaults instantiates a new KvV2WriteRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKVv2WriteRequestWithDefaults() *KVv2WriteRequest { - var this KVv2WriteRequest +func NewKvV2WriteRequestWithDefaults() *KvV2WriteRequest { + var this KvV2WriteRequest return &this } -func (o KVv2WriteRequest) MarshalJSON() ([]byte, error) { +func (o KvV2WriteRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["data"] = o.Data diff --git a/schema/model_kv_v2_write_response.go b/schema/model_kv_v2_write_response.go new file mode 100644 index 00000000..200e777d --- /dev/null +++ b/schema/model_kv_v2_write_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// KvV2WriteResponse struct for KvV2WriteResponse +type KvV2WriteResponse struct { + CreatedTime time.Time `json:"created_time"` + + CustomMetadata map[string]interface{} `json:"custom_metadata"` + + DeletionTime string `json:"deletion_time"` + + Destroyed bool `json:"destroyed"` + + Version int64 `json:"version"` +} + +// NewKvV2WriteResponseWithDefaults instantiates a new KvV2WriteResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewKvV2WriteResponseWithDefaults() *KvV2WriteResponse { + var this KvV2WriteResponse + + return &this +} + +func (o KvV2WriteResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["created_time"] = o.CreatedTime + toSerialize["custom_metadata"] = o.CustomMetadata + toSerialize["deletion_time"] = o.DeletionTime + toSerialize["destroyed"] = o.Destroyed + toSerialize["version"] = o.Version + + return json.Marshal(toSerialize) +} diff --git a/schema/model_ldap_check_in_manage_library_request.go b/schema/model_ldap_check_in_manage_library_request.go deleted file mode 100644 index a88dbcee..00000000 --- a/schema/model_ldap_check_in_manage_library_request.go +++ /dev/null @@ -1,33 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// LDAPCheckInManageLibraryRequest struct for LDAPCheckInManageLibraryRequest -type LDAPCheckInManageLibraryRequest struct { - // The username/logon name for the service accounts to check in. - ServiceAccountNames []string `json:"service_account_names"` -} - -// NewLDAPCheckInManageLibraryRequestWithDefaults instantiates a new LDAPCheckInManageLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewLDAPCheckInManageLibraryRequestWithDefaults() *LDAPCheckInManageLibraryRequest { - var this LDAPCheckInManageLibraryRequest - - return &this -} - -func (o LDAPCheckInManageLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["service_account_names"] = o.ServiceAccountNames - - return json.Marshal(toSerialize) -} diff --git a/schema/model_kerberos_write_ldap_config_request.go b/schema/model_ldap_configure_auth_request.go similarity index 86% rename from schema/model_kerberos_write_ldap_config_request.go rename to schema/model_ldap_configure_auth_request.go index e75e8c23..00ad2b33 100644 --- a/schema/model_kerberos_write_ldap_config_request.go +++ b/schema/model_ldap_configure_auth_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// KerberosWriteLDAPConfigRequest struct for KerberosWriteLDAPConfigRequest -type KerberosWriteLDAPConfigRequest struct { +// LdapConfigureAuthRequest struct for LdapConfigureAuthRequest +type LdapConfigureAuthRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` @@ -32,9 +32,15 @@ type KerberosWriteLDAPConfigRequest struct { // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` + // Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. + ConnectionTimeout int32 `json:"connection_timeout"` + // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` + // When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'. + DereferenceAliases string `json:"dereference_aliases"` + // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` @@ -50,6 +56,9 @@ type KerberosWriteLDAPConfigRequest struct { // Skip LDAP server SSL Certificate verification - VERY insecure (optional) InsecureTls bool `json:"insecure_tls"` + // The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged. + MaxPageSize int32 `json:"max_page_size"` + // Timeout, in seconds, for the connection when making requests against the server before returning back an error. RequestTimeout int32 `json:"request_timeout"` @@ -114,16 +123,18 @@ type KerberosWriteLDAPConfigRequest struct { UsernameAsAlias bool `json:"username_as_alias"` } -// NewKerberosWriteLDAPConfigRequestWithDefaults instantiates a new KerberosWriteLDAPConfigRequest object +// NewLdapConfigureAuthRequestWithDefaults instantiates a new LdapConfigureAuthRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewKerberosWriteLDAPConfigRequestWithDefaults() *KerberosWriteLDAPConfigRequest { - var this KerberosWriteLDAPConfigRequest +func NewLdapConfigureAuthRequestWithDefaults() *LdapConfigureAuthRequest { + var this LdapConfigureAuthRequest this.AnonymousGroupSearch = false this.DenyNullBind = true + this.DereferenceAliases = "never" this.Groupattr = "cn" this.Groupfilter = "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))" + this.MaxPageSize = 2147483647 this.TlsMaxVersion = "tls12" this.TlsMinVersion = "tls12" this.TokenType = "default-service" @@ -136,7 +147,7 @@ func NewKerberosWriteLDAPConfigRequestWithDefaults() *KerberosWriteLDAPConfigReq return &this } -func (o KerberosWriteLDAPConfigRequest) MarshalJSON() ([]byte, error) { +func (o LdapConfigureAuthRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["anonymous_group_search"] = o.AnonymousGroupSearch @@ -146,12 +157,15 @@ func (o KerberosWriteLDAPConfigRequest) MarshalJSON() ([]byte, error) { toSerialize["certificate"] = o.Certificate toSerialize["client_tls_cert"] = o.ClientTlsCert toSerialize["client_tls_key"] = o.ClientTlsKey + toSerialize["connection_timeout"] = o.ConnectionTimeout toSerialize["deny_null_bind"] = o.DenyNullBind + toSerialize["dereference_aliases"] = o.DereferenceAliases toSerialize["discoverdn"] = o.Discoverdn toSerialize["groupattr"] = o.Groupattr toSerialize["groupdn"] = o.Groupdn toSerialize["groupfilter"] = o.Groupfilter toSerialize["insecure_tls"] = o.InsecureTls + toSerialize["max_page_size"] = o.MaxPageSize toSerialize["request_timeout"] = o.RequestTimeout toSerialize["starttls"] = o.Starttls toSerialize["tls_max_version"] = o.TlsMaxVersion diff --git a/schema/model_open_ldap_write_config_request.go b/schema/model_ldap_configure_request.go similarity index 84% rename from schema/model_open_ldap_write_config_request.go rename to schema/model_ldap_configure_request.go index b530ee31..b53d673a 100644 --- a/schema/model_open_ldap_write_config_request.go +++ b/schema/model_ldap_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OpenLDAPWriteConfigRequest struct for OpenLDAPWriteConfigRequest -type OpenLDAPWriteConfigRequest struct { +// LdapConfigureRequest struct for LdapConfigureRequest +type LdapConfigureRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` @@ -32,9 +32,15 @@ type OpenLDAPWriteConfigRequest struct { // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` + // Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. + ConnectionTimeout int32 `json:"connection_timeout"` + // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` + // When aliases should be dereferenced on search operations. Accepted values are 'never', 'finding', 'searching', 'always'. Defaults to 'never'. + DereferenceAliases string `json:"dereference_aliases"` + // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` @@ -54,6 +60,9 @@ type OpenLDAPWriteConfigRequest struct { // Deprecated Length int32 `json:"length"` + // The maximum number of results to return for a single paged query. If not set, the server default will be used for paged searches. A requested max_page_size of 0 is interpreted as no limit by LDAP servers. If set to a negative value, search requests will not be paged. + MaxPageSize int32 `json:"max_page_size"` + // The maximum password time-to-live. MaxTtl int32 `json:"max_ttl"` @@ -103,16 +112,18 @@ type OpenLDAPWriteConfigRequest struct { UsernameAsAlias bool `json:"username_as_alias"` } -// NewOpenLDAPWriteConfigRequestWithDefaults instantiates a new OpenLDAPWriteConfigRequest object +// NewLdapConfigureRequestWithDefaults instantiates a new LdapConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOpenLDAPWriteConfigRequestWithDefaults() *OpenLDAPWriteConfigRequest { - var this OpenLDAPWriteConfigRequest +func NewLdapConfigureRequestWithDefaults() *LdapConfigureRequest { + var this LdapConfigureRequest this.AnonymousGroupSearch = false this.DenyNullBind = true + this.DereferenceAliases = "never" this.Groupattr = "cn" this.Groupfilter = "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))" + this.MaxPageSize = 2147483647 this.Schema = "openldap" this.TlsMaxVersion = "tls12" this.TlsMinVersion = "tls12" @@ -125,7 +136,7 @@ func NewOpenLDAPWriteConfigRequestWithDefaults() *OpenLDAPWriteConfigRequest { return &this } -func (o OpenLDAPWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o LdapConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["anonymous_group_search"] = o.AnonymousGroupSearch @@ -135,13 +146,16 @@ func (o OpenLDAPWriteConfigRequest) MarshalJSON() ([]byte, error) { toSerialize["certificate"] = o.Certificate toSerialize["client_tls_cert"] = o.ClientTlsCert toSerialize["client_tls_key"] = o.ClientTlsKey + toSerialize["connection_timeout"] = o.ConnectionTimeout toSerialize["deny_null_bind"] = o.DenyNullBind + toSerialize["dereference_aliases"] = o.DereferenceAliases toSerialize["discoverdn"] = o.Discoverdn toSerialize["groupattr"] = o.Groupattr toSerialize["groupdn"] = o.Groupdn toSerialize["groupfilter"] = o.Groupfilter toSerialize["insecure_tls"] = o.InsecureTls toSerialize["length"] = o.Length + toSerialize["max_page_size"] = o.MaxPageSize toSerialize["max_ttl"] = o.MaxTtl toSerialize["password_policy"] = o.PasswordPolicy toSerialize["request_timeout"] = o.RequestTimeout diff --git a/schema/model_ldap_check_in_library_request.go b/schema/model_ldap_library_check_in_request.go similarity index 63% rename from schema/model_ldap_check_in_library_request.go rename to schema/model_ldap_library_check_in_request.go index 4a7fbb0e..6d0a0d57 100644 --- a/schema/model_ldap_check_in_library_request.go +++ b/schema/model_ldap_library_check_in_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// LDAPCheckInLibraryRequest struct for LDAPCheckInLibraryRequest -type LDAPCheckInLibraryRequest struct { +// LdapLibraryCheckInRequest struct for LdapLibraryCheckInRequest +type LdapLibraryCheckInRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` } -// NewLDAPCheckInLibraryRequestWithDefaults instantiates a new LDAPCheckInLibraryRequest object +// NewLdapLibraryCheckInRequestWithDefaults instantiates a new LdapLibraryCheckInRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewLDAPCheckInLibraryRequestWithDefaults() *LDAPCheckInLibraryRequest { - var this LDAPCheckInLibraryRequest +func NewLdapLibraryCheckInRequestWithDefaults() *LdapLibraryCheckInRequest { + var this LdapLibraryCheckInRequest return &this } -func (o LDAPCheckInLibraryRequest) MarshalJSON() ([]byte, error) { +func (o LdapLibraryCheckInRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["service_account_names"] = o.ServiceAccountNames diff --git a/schema/model_ldap_check_out_library_request.go b/schema/model_ldap_library_check_out_request.go similarity index 60% rename from schema/model_ldap_check_out_library_request.go rename to schema/model_ldap_library_check_out_request.go index 5c1a8baa..f5e13f5d 100644 --- a/schema/model_ldap_check_out_library_request.go +++ b/schema/model_ldap_library_check_out_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// LDAPCheckOutLibraryRequest struct for LDAPCheckOutLibraryRequest -type LDAPCheckOutLibraryRequest struct { +// LdapLibraryCheckOutRequest struct for LdapLibraryCheckOutRequest +type LdapLibraryCheckOutRequest struct { // The length of time before the check-out will expire, in seconds. Ttl int32 `json:"ttl"` } -// NewLDAPCheckOutLibraryRequestWithDefaults instantiates a new LDAPCheckOutLibraryRequest object +// NewLdapLibraryCheckOutRequestWithDefaults instantiates a new LdapLibraryCheckOutRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewLDAPCheckOutLibraryRequestWithDefaults() *LDAPCheckOutLibraryRequest { - var this LDAPCheckOutLibraryRequest +func NewLdapLibraryCheckOutRequestWithDefaults() *LdapLibraryCheckOutRequest { + var this LdapLibraryCheckOutRequest return &this } -func (o LDAPCheckOutLibraryRequest) MarshalJSON() ([]byte, error) { +func (o LdapLibraryCheckOutRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["ttl"] = o.Ttl diff --git a/schema/model_open_ldap_write_library_request.go b/schema/model_ldap_library_configure_request.go similarity index 77% rename from schema/model_open_ldap_write_library_request.go rename to schema/model_ldap_library_configure_request.go index 5a52e346..d314b86f 100644 --- a/schema/model_open_ldap_write_library_request.go +++ b/schema/model_ldap_library_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OpenLDAPWriteLibraryRequest struct for OpenLDAPWriteLibraryRequest -type OpenLDAPWriteLibraryRequest struct { +// LdapLibraryConfigureRequest struct for LdapLibraryConfigureRequest +type LdapLibraryConfigureRequest struct { // Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. DisableCheckInEnforcement bool `json:"disable_check_in_enforcement"` @@ -24,11 +24,11 @@ type OpenLDAPWriteLibraryRequest struct { Ttl int32 `json:"ttl"` } -// NewOpenLDAPWriteLibraryRequestWithDefaults instantiates a new OpenLDAPWriteLibraryRequest object +// NewLdapLibraryConfigureRequestWithDefaults instantiates a new LdapLibraryConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOpenLDAPWriteLibraryRequestWithDefaults() *OpenLDAPWriteLibraryRequest { - var this OpenLDAPWriteLibraryRequest +func NewLdapLibraryConfigureRequestWithDefaults() *LdapLibraryConfigureRequest { + var this LdapLibraryConfigureRequest this.DisableCheckInEnforcement = false this.MaxTtl = 86400 @@ -37,7 +37,7 @@ func NewOpenLDAPWriteLibraryRequestWithDefaults() *OpenLDAPWriteLibraryRequest { return &this } -func (o OpenLDAPWriteLibraryRequest) MarshalJSON() ([]byte, error) { +func (o LdapLibraryConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_check_in_enforcement"] = o.DisableCheckInEnforcement diff --git a/schema/model_open_ldap_check_in_library_request.go b/schema/model_ldap_library_force_check_in_request.go similarity index 60% rename from schema/model_open_ldap_check_in_library_request.go rename to schema/model_ldap_library_force_check_in_request.go index bc20c1ae..59a28b3f 100644 --- a/schema/model_open_ldap_check_in_library_request.go +++ b/schema/model_ldap_library_force_check_in_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// OpenLDAPCheckInLibraryRequest struct for OpenLDAPCheckInLibraryRequest -type OpenLDAPCheckInLibraryRequest struct { +// LdapLibraryForceCheckInRequest struct for LdapLibraryForceCheckInRequest +type LdapLibraryForceCheckInRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` } -// NewOpenLDAPCheckInLibraryRequestWithDefaults instantiates a new OpenLDAPCheckInLibraryRequest object +// NewLdapLibraryForceCheckInRequestWithDefaults instantiates a new LdapLibraryForceCheckInRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOpenLDAPCheckInLibraryRequestWithDefaults() *OpenLDAPCheckInLibraryRequest { - var this OpenLDAPCheckInLibraryRequest +func NewLdapLibraryForceCheckInRequestWithDefaults() *LdapLibraryForceCheckInRequest { + var this LdapLibraryForceCheckInRequest return &this } -func (o OpenLDAPCheckInLibraryRequest) MarshalJSON() ([]byte, error) { +func (o LdapLibraryForceCheckInRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["service_account_names"] = o.ServiceAccountNames diff --git a/schema/model_ldap_login_request.go b/schema/model_ldap_login_request.go index e9fa7d5a..154ad3ee 100644 --- a/schema/model_ldap_login_request.go +++ b/schema/model_ldap_login_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// LDAPLoginRequest struct for LDAPLoginRequest -type LDAPLoginRequest struct { +// LdapLoginRequest struct for LdapLoginRequest +type LdapLoginRequest struct { // Password for this user. Password string `json:"password"` } -// NewLDAPLoginRequestWithDefaults instantiates a new LDAPLoginRequest object +// NewLdapLoginRequestWithDefaults instantiates a new LdapLoginRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewLDAPLoginRequestWithDefaults() *LDAPLoginRequest { - var this LDAPLoginRequest +func NewLdapLoginRequestWithDefaults() *LdapLoginRequest { + var this LdapLoginRequest return &this } -func (o LDAPLoginRequest) MarshalJSON() ([]byte, error) { +func (o LdapLoginRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["password"] = o.Password diff --git a/schema/model_ldap_write_config_request.go b/schema/model_ldap_write_config_request.go deleted file mode 100644 index afa6ea8f..00000000 --- a/schema/model_ldap_write_config_request.go +++ /dev/null @@ -1,163 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// LDAPWriteConfigRequest struct for LDAPWriteConfigRequest -type LDAPWriteConfigRequest struct { - // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). - AnonymousGroupSearch bool `json:"anonymous_group_search"` - - // LDAP DN for searching for the user DN (optional) - Binddn string `json:"binddn"` - - // LDAP password for searching for the user DN (optional) - Bindpass string `json:"bindpass"` - - // If true, case sensitivity will be used when comparing usernames and groups for matching policies. - CaseSensitiveNames bool `json:"case_sensitive_names"` - - // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) - Certificate string `json:"certificate"` - - // Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) - ClientTlsCert string `json:"client_tls_cert"` - - // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) - ClientTlsKey string `json:"client_tls_key"` - - // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true - DenyNullBind bool `json:"deny_null_bind"` - - // Use anonymous bind to discover the bind DN of a user (optional) - Discoverdn bool `json:"discoverdn"` - - // LDAP attribute to follow on objects returned by in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn - Groupattr string `json:"groupattr"` - - // LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) - Groupdn string `json:"groupdn"` - - // Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) - Groupfilter string `json:"groupfilter"` - - // Skip LDAP server SSL Certificate verification - VERY insecure (optional) - InsecureTls bool `json:"insecure_tls"` - - // The desired length of passwords that Vault generates. - // Deprecated - Length int32 `json:"length"` - - // The maximum password time-to-live. - MaxTtl int32 `json:"max_ttl"` - - // Password policy to use to generate passwords - PasswordPolicy string `json:"password_policy"` - - // Timeout, in seconds, for the connection when making requests against the server before returning back an error. - RequestTimeout int32 `json:"request_timeout"` - - // The desired LDAP schema used when modifying user account passwords. - Schema string `json:"schema"` - - // Issue a StartTLS command after establishing unencrypted connection (optional) - Starttls bool `json:"starttls"` - - // Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' - TlsMaxVersion string `json:"tls_max_version"` - - // Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' - TlsMinVersion string `json:"tls_min_version"` - - // The default password time-to-live. - Ttl int32 `json:"ttl"` - - // Enables userPrincipalDomain login with [username]@UPNDomain (optional) - Upndomain string `json:"upndomain"` - - // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. - Url string `json:"url"` - - // In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. - UsePre111GroupCnBehavior bool `json:"use_pre111_group_cn_behavior"` - - // If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. - UseTokenGroups bool `json:"use_token_groups"` - - // Attribute used for users (default: cn) - Userattr string `json:"userattr"` - - // LDAP domain to use for users (eg: ou=People,dc=example,dc=org) - Userdn string `json:"userdn"` - - // Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) - Userfilter string `json:"userfilter"` - - // If true, sets the alias name to the username - UsernameAsAlias bool `json:"username_as_alias"` -} - -// NewLDAPWriteConfigRequestWithDefaults instantiates a new LDAPWriteConfigRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewLDAPWriteConfigRequestWithDefaults() *LDAPWriteConfigRequest { - var this LDAPWriteConfigRequest - - this.AnonymousGroupSearch = false - this.DenyNullBind = true - this.Groupattr = "cn" - this.Groupfilter = "(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))" - this.Schema = "openldap" - this.TlsMaxVersion = "tls12" - this.TlsMinVersion = "tls12" - this.Url = "ldap://127.0.0.1" - this.UseTokenGroups = false - this.Userattr = "cn" - this.Userfilter = "({{.UserAttr}}={{.Username}})" - this.UsernameAsAlias = false - - return &this -} - -func (o LDAPWriteConfigRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["anonymous_group_search"] = o.AnonymousGroupSearch - toSerialize["binddn"] = o.Binddn - toSerialize["bindpass"] = o.Bindpass - toSerialize["case_sensitive_names"] = o.CaseSensitiveNames - toSerialize["certificate"] = o.Certificate - toSerialize["client_tls_cert"] = o.ClientTlsCert - toSerialize["client_tls_key"] = o.ClientTlsKey - toSerialize["deny_null_bind"] = o.DenyNullBind - toSerialize["discoverdn"] = o.Discoverdn - toSerialize["groupattr"] = o.Groupattr - toSerialize["groupdn"] = o.Groupdn - toSerialize["groupfilter"] = o.Groupfilter - toSerialize["insecure_tls"] = o.InsecureTls - toSerialize["length"] = o.Length - toSerialize["max_ttl"] = o.MaxTtl - toSerialize["password_policy"] = o.PasswordPolicy - toSerialize["request_timeout"] = o.RequestTimeout - toSerialize["schema"] = o.Schema - toSerialize["starttls"] = o.Starttls - toSerialize["tls_max_version"] = o.TlsMaxVersion - toSerialize["tls_min_version"] = o.TlsMinVersion - toSerialize["ttl"] = o.Ttl - toSerialize["upndomain"] = o.Upndomain - toSerialize["url"] = o.Url - toSerialize["use_pre111_group_cn_behavior"] = o.UsePre111GroupCnBehavior - toSerialize["use_token_groups"] = o.UseTokenGroups - toSerialize["userattr"] = o.Userattr - toSerialize["userdn"] = o.Userdn - toSerialize["userfilter"] = o.Userfilter - toSerialize["username_as_alias"] = o.UsernameAsAlias - - return json.Marshal(toSerialize) -} diff --git a/schema/model_open_ldap_write_role_request.go b/schema/model_ldap_write_dynamic_role_request.go similarity index 78% rename from schema/model_open_ldap_write_role_request.go rename to schema/model_ldap_write_dynamic_role_request.go index f2e19fbc..bc66e3ee 100644 --- a/schema/model_open_ldap_write_role_request.go +++ b/schema/model_ldap_write_dynamic_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OpenLDAPWriteRoleRequest struct for OpenLDAPWriteRoleRequest -type OpenLDAPWriteRoleRequest struct { +// LdapWriteDynamicRoleRequest struct for LdapWriteDynamicRoleRequest +type LdapWriteDynamicRoleRequest struct { // LDIF string used to create new entities within the LDAP system. This LDIF can be templated. CreationLdif string `json:"creation_ldif"` @@ -30,16 +30,16 @@ type OpenLDAPWriteRoleRequest struct { UsernameTemplate string `json:"username_template"` } -// NewOpenLDAPWriteRoleRequestWithDefaults instantiates a new OpenLDAPWriteRoleRequest object +// NewLdapWriteDynamicRoleRequestWithDefaults instantiates a new LdapWriteDynamicRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOpenLDAPWriteRoleRequestWithDefaults() *OpenLDAPWriteRoleRequest { - var this OpenLDAPWriteRoleRequest +func NewLdapWriteDynamicRoleRequestWithDefaults() *LdapWriteDynamicRoleRequest { + var this LdapWriteDynamicRoleRequest return &this } -func (o OpenLDAPWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o LdapWriteDynamicRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["creation_ldif"] = o.CreationLdif diff --git a/schema/model_ldap_write_group_request.go b/schema/model_ldap_write_group_request.go index bb0cc57d..80221377 100644 --- a/schema/model_ldap_write_group_request.go +++ b/schema/model_ldap_write_group_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// LDAPWriteGroupRequest struct for LDAPWriteGroupRequest -type LDAPWriteGroupRequest struct { +// LdapWriteGroupRequest struct for LdapWriteGroupRequest +type LdapWriteGroupRequest struct { // Comma-separated list of policies associated to the group. Policies []string `json:"policies"` } -// NewLDAPWriteGroupRequestWithDefaults instantiates a new LDAPWriteGroupRequest object +// NewLdapWriteGroupRequestWithDefaults instantiates a new LdapWriteGroupRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewLDAPWriteGroupRequestWithDefaults() *LDAPWriteGroupRequest { - var this LDAPWriteGroupRequest +func NewLdapWriteGroupRequestWithDefaults() *LdapWriteGroupRequest { + var this LdapWriteGroupRequest return &this } -func (o LDAPWriteGroupRequest) MarshalJSON() ([]byte, error) { +func (o LdapWriteGroupRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["policies"] = o.Policies diff --git a/schema/model_ldap_write_library_request.go b/schema/model_ldap_write_library_request.go deleted file mode 100644 index 102aed6a..00000000 --- a/schema/model_ldap_write_library_request.go +++ /dev/null @@ -1,49 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// LDAPWriteLibraryRequest struct for LDAPWriteLibraryRequest -type LDAPWriteLibraryRequest struct { - // Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. - DisableCheckInEnforcement bool `json:"disable_check_in_enforcement"` - - // In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours. - MaxTtl int32 `json:"max_ttl"` - - // The username/logon name for the service accounts with which this set will be associated. - ServiceAccountNames []string `json:"service_account_names"` - - // In seconds, the amount of time a check-out should last. Defaults to 24 hours. - Ttl int32 `json:"ttl"` -} - -// NewLDAPWriteLibraryRequestWithDefaults instantiates a new LDAPWriteLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewLDAPWriteLibraryRequestWithDefaults() *LDAPWriteLibraryRequest { - var this LDAPWriteLibraryRequest - - this.DisableCheckInEnforcement = false - this.MaxTtl = 86400 - this.Ttl = 86400 - - return &this -} - -func (o LDAPWriteLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["disable_check_in_enforcement"] = o.DisableCheckInEnforcement - toSerialize["max_ttl"] = o.MaxTtl - toSerialize["service_account_names"] = o.ServiceAccountNames - toSerialize["ttl"] = o.Ttl - - return json.Marshal(toSerialize) -} diff --git a/schema/model_ldap_write_role_request.go b/schema/model_ldap_write_role_request.go deleted file mode 100644 index 78acbe26..00000000 --- a/schema/model_ldap_write_role_request.go +++ /dev/null @@ -1,53 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// LDAPWriteRoleRequest struct for LDAPWriteRoleRequest -type LDAPWriteRoleRequest struct { - // LDIF string used to create new entities within the LDAP system. This LDIF can be templated. - CreationLdif string `json:"creation_ldif"` - - // Default TTL for dynamic credentials - DefaultTtl int32 `json:"default_ttl"` - - // LDIF string used to delete entities created within the LDAP system. This LDIF can be templated. - DeletionLdif string `json:"deletion_ldif"` - - // Max TTL a dynamic credential can be extended to - MaxTtl int32 `json:"max_ttl"` - - // LDIF string used to rollback changes in the event of a failure to create credentials. This LDIF can be templated. - RollbackLdif string `json:"rollback_ldif"` - - // The template used to create a username - UsernameTemplate string `json:"username_template"` -} - -// NewLDAPWriteRoleRequestWithDefaults instantiates a new LDAPWriteRoleRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewLDAPWriteRoleRequestWithDefaults() *LDAPWriteRoleRequest { - var this LDAPWriteRoleRequest - - return &this -} - -func (o LDAPWriteRoleRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["creation_ldif"] = o.CreationLdif - toSerialize["default_ttl"] = o.DefaultTtl - toSerialize["deletion_ldif"] = o.DeletionLdif - toSerialize["max_ttl"] = o.MaxTtl - toSerialize["rollback_ldif"] = o.RollbackLdif - toSerialize["username_template"] = o.UsernameTemplate - - return json.Marshal(toSerialize) -} diff --git a/schema/model_ldap_write_static_role_request.go b/schema/model_ldap_write_static_role_request.go index 97365679..0837bfde 100644 --- a/schema/model_ldap_write_static_role_request.go +++ b/schema/model_ldap_write_static_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// LDAPWriteStaticRoleRequest struct for LDAPWriteStaticRoleRequest -type LDAPWriteStaticRoleRequest struct { +// LdapWriteStaticRoleRequest struct for LdapWriteStaticRoleRequest +type LdapWriteStaticRoleRequest struct { // The distinguished name of the entry to manage. Dn string `json:"dn"` @@ -21,16 +21,16 @@ type LDAPWriteStaticRoleRequest struct { Username string `json:"username"` } -// NewLDAPWriteStaticRoleRequestWithDefaults instantiates a new LDAPWriteStaticRoleRequest object +// NewLdapWriteStaticRoleRequestWithDefaults instantiates a new LdapWriteStaticRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewLDAPWriteStaticRoleRequestWithDefaults() *LDAPWriteStaticRoleRequest { - var this LDAPWriteStaticRoleRequest +func NewLdapWriteStaticRoleRequestWithDefaults() *LdapWriteStaticRoleRequest { + var this LdapWriteStaticRoleRequest return &this } -func (o LDAPWriteStaticRoleRequest) MarshalJSON() ([]byte, error) { +func (o LdapWriteStaticRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["dn"] = o.Dn diff --git a/schema/model_ldap_write_user_request.go b/schema/model_ldap_write_user_request.go index 8f5104cb..6729265b 100644 --- a/schema/model_ldap_write_user_request.go +++ b/schema/model_ldap_write_user_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// LDAPWriteUserRequest struct for LDAPWriteUserRequest -type LDAPWriteUserRequest struct { +// LdapWriteUserRequest struct for LdapWriteUserRequest +type LdapWriteUserRequest struct { // Comma-separated list of additional groups associated with the user. Groups []string `json:"groups"` @@ -18,16 +18,16 @@ type LDAPWriteUserRequest struct { Policies []string `json:"policies"` } -// NewLDAPWriteUserRequestWithDefaults instantiates a new LDAPWriteUserRequest object +// NewLdapWriteUserRequestWithDefaults instantiates a new LdapWriteUserRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewLDAPWriteUserRequestWithDefaults() *LDAPWriteUserRequest { - var this LDAPWriteUserRequest +func NewLdapWriteUserRequestWithDefaults() *LdapWriteUserRequest { + var this LdapWriteUserRequest return &this } -func (o LDAPWriteUserRequest) MarshalJSON() ([]byte, error) { +func (o LdapWriteUserRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["groups"] = o.Groups diff --git a/schema/model_leader_status_response.go b/schema/model_leader_status_response.go new file mode 100644 index 00000000..4f968a08 --- /dev/null +++ b/schema/model_leader_status_response.go @@ -0,0 +1,60 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// LeaderStatusResponse struct for LeaderStatusResponse +type LeaderStatusResponse struct { + ActiveTime time.Time `json:"active_time"` + + HaEnabled bool `json:"ha_enabled"` + + IsSelf bool `json:"is_self"` + + LastWal int64 `json:"last_wal"` + + LeaderAddress string `json:"leader_address"` + + LeaderClusterAddress string `json:"leader_cluster_address"` + + PerformanceStandby bool `json:"performance_standby"` + + PerformanceStandbyLastRemoteWal int64 `json:"performance_standby_last_remote_wal"` + + RaftAppliedIndex int64 `json:"raft_applied_index"` + + RaftCommittedIndex int64 `json:"raft_committed_index"` +} + +// NewLeaderStatusResponseWithDefaults instantiates a new LeaderStatusResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewLeaderStatusResponseWithDefaults() *LeaderStatusResponse { + var this LeaderStatusResponse + + return &this +} + +func (o LeaderStatusResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["active_time"] = o.ActiveTime + toSerialize["ha_enabled"] = o.HaEnabled + toSerialize["is_self"] = o.IsSelf + toSerialize["last_wal"] = o.LastWal + toSerialize["leader_address"] = o.LeaderAddress + toSerialize["leader_cluster_address"] = o.LeaderClusterAddress + toSerialize["performance_standby"] = o.PerformanceStandby + toSerialize["performance_standby_last_remote_wal"] = o.PerformanceStandbyLastRemoteWal + toSerialize["raft_applied_index"] = o.RaftAppliedIndex + toSerialize["raft_committed_index"] = o.RaftCommittedIndex + + return json.Marshal(toSerialize) +} diff --git a/schema/model_leases_count_response.go b/schema/model_leases_count_response.go new file mode 100644 index 00000000..840feb1a --- /dev/null +++ b/schema/model_leases_count_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// LeasesCountResponse struct for LeasesCountResponse +type LeasesCountResponse struct { + // Number of matching leases per mount + Counts int32 `json:"counts"` + + // Number of matching leases + LeaseCount int32 `json:"lease_count"` +} + +// NewLeasesCountResponseWithDefaults instantiates a new LeasesCountResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewLeasesCountResponseWithDefaults() *LeasesCountResponse { + var this LeasesCountResponse + + return &this +} + +func (o LeasesCountResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["counts"] = o.Counts + toSerialize["lease_count"] = o.LeaseCount + + return json.Marshal(toSerialize) +} diff --git a/schema/model_leases_list_response.go b/schema/model_leases_list_response.go new file mode 100644 index 00000000..5e9bbef1 --- /dev/null +++ b/schema/model_leases_list_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// LeasesListResponse struct for LeasesListResponse +type LeasesListResponse struct { + // Number of matching leases per mount + Counts int32 `json:"counts"` + + // Number of matching leases + LeaseCount int32 `json:"lease_count"` +} + +// NewLeasesListResponseWithDefaults instantiates a new LeasesListResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewLeasesListResponseWithDefaults() *LeasesListResponse { + var this LeasesListResponse + + return &this +} + +func (o LeasesListResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["counts"] = o.Counts + toSerialize["lease_count"] = o.LeaseCount + + return json.Marshal(toSerialize) +} diff --git a/schema/model_leases_look_up_response.go b/schema/model_leases_look_up_response.go new file mode 100644 index 00000000..1b37f4f8 --- /dev/null +++ b/schema/model_leases_look_up_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// LeasesLookUpResponse struct for LeasesLookUpResponse +type LeasesLookUpResponse struct { + // A list of lease ids + Keys []string `json:"keys"` +} + +// NewLeasesLookUpResponseWithDefaults instantiates a new LeasesLookUpResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewLeasesLookUpResponseWithDefaults() *LeasesLookUpResponse { + var this LeasesLookUpResponse + + return &this +} + +func (o LeasesLookUpResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_leases_look_up_with_prefix_response.go b/schema/model_leases_look_up_with_prefix_response.go new file mode 100644 index 00000000..3e7b9dfb --- /dev/null +++ b/schema/model_leases_look_up_with_prefix_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// LeasesLookUpWithPrefixResponse struct for LeasesLookUpWithPrefixResponse +type LeasesLookUpWithPrefixResponse struct { + // A list of lease ids + Keys []string `json:"keys"` +} + +// NewLeasesLookUpWithPrefixResponseWithDefaults instantiates a new LeasesLookUpWithPrefixResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewLeasesLookUpWithPrefixResponseWithDefaults() *LeasesLookUpWithPrefixResponse { + var this LeasesLookUpWithPrefixResponse + + return &this +} + +func (o LeasesLookUpWithPrefixResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_leases_lookup_request.go b/schema/model_leases_read_lease_request.go similarity index 61% rename from schema/model_write_leases_lookup_request.go rename to schema/model_leases_read_lease_request.go index e5cf2443..a1cac82f 100644 --- a/schema/model_write_leases_lookup_request.go +++ b/schema/model_leases_read_lease_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WriteLeasesLookupRequest struct for WriteLeasesLookupRequest -type WriteLeasesLookupRequest struct { +// LeasesReadLeaseRequest struct for LeasesReadLeaseRequest +type LeasesReadLeaseRequest struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` } -// NewWriteLeasesLookupRequestWithDefaults instantiates a new WriteLeasesLookupRequest object +// NewLeasesReadLeaseRequestWithDefaults instantiates a new LeasesReadLeaseRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLeasesLookupRequestWithDefaults() *WriteLeasesLookupRequest { - var this WriteLeasesLookupRequest +func NewLeasesReadLeaseRequestWithDefaults() *LeasesReadLeaseRequest { + var this LeasesReadLeaseRequest return &this } -func (o WriteLeasesLookupRequest) MarshalJSON() ([]byte, error) { +func (o LeasesReadLeaseRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["lease_id"] = o.LeaseId diff --git a/schema/model_leases_read_lease_response.go b/schema/model_leases_read_lease_response.go new file mode 100644 index 00000000..048ec2d2 --- /dev/null +++ b/schema/model_leases_read_lease_response.go @@ -0,0 +1,54 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// LeasesReadLeaseResponse struct for LeasesReadLeaseResponse +type LeasesReadLeaseResponse struct { + // Optional lease expiry time + ExpireTime time.Time `json:"expire_time"` + + // Lease id + Id string `json:"id"` + + // Timestamp for the lease's issue time + IssueTime time.Time `json:"issue_time"` + + // Optional Timestamp of the last time the lease was renewed + LastRenewal time.Time `json:"last_renewal"` + + // True if the lease is able to be renewed + Renewable bool `json:"renewable"` + + // Time to Live set for the lease, returns 0 if unset + Ttl int32 `json:"ttl"` +} + +// NewLeasesReadLeaseResponseWithDefaults instantiates a new LeasesReadLeaseResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewLeasesReadLeaseResponseWithDefaults() *LeasesReadLeaseResponse { + var this LeasesReadLeaseResponse + + return &this +} + +func (o LeasesReadLeaseResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["expire_time"] = o.ExpireTime + toSerialize["id"] = o.Id + toSerialize["issue_time"] = o.IssueTime + toSerialize["last_renewal"] = o.LastRenewal + toSerialize["renewable"] = o.Renewable + toSerialize["ttl"] = o.Ttl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_renew_request.go b/schema/model_leases_renew_lease2_request.go similarity index 70% rename from schema/model_renew_request.go rename to schema/model_leases_renew_lease2_request.go index cc582589..8267e391 100644 --- a/schema/model_renew_request.go +++ b/schema/model_leases_renew_lease2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RenewRequest struct for RenewRequest -type RenewRequest struct { +// LeasesRenewLease2Request struct for LeasesRenewLease2Request +type LeasesRenewLease2Request struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` @@ -21,16 +21,16 @@ type RenewRequest struct { UrlLeaseId string `json:"url_lease_id"` } -// NewRenewRequestWithDefaults instantiates a new RenewRequest object +// NewLeasesRenewLease2RequestWithDefaults instantiates a new LeasesRenewLease2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRenewRequestWithDefaults() *RenewRequest { - var this RenewRequest +func NewLeasesRenewLease2RequestWithDefaults() *LeasesRenewLease2Request { + var this LeasesRenewLease2Request return &this } -func (o RenewRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRenewLease2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["increment"] = o.Increment diff --git a/schema/model_write_leases_renew_request.go b/schema/model_leases_renew_lease_request.go similarity index 71% rename from schema/model_write_leases_renew_request.go rename to schema/model_leases_renew_lease_request.go index 1bacda98..e476bcb7 100644 --- a/schema/model_write_leases_renew_request.go +++ b/schema/model_leases_renew_lease_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteLeasesRenewRequest struct for WriteLeasesRenewRequest -type WriteLeasesRenewRequest struct { +// LeasesRenewLeaseRequest struct for LeasesRenewLeaseRequest +type LeasesRenewLeaseRequest struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` @@ -21,16 +21,16 @@ type WriteLeasesRenewRequest struct { UrlLeaseId string `json:"url_lease_id"` } -// NewWriteLeasesRenewRequestWithDefaults instantiates a new WriteLeasesRenewRequest object +// NewLeasesRenewLeaseRequestWithDefaults instantiates a new LeasesRenewLeaseRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLeasesRenewRequestWithDefaults() *WriteLeasesRenewRequest { - var this WriteLeasesRenewRequest +func NewLeasesRenewLeaseRequestWithDefaults() *LeasesRenewLeaseRequest { + var this LeasesRenewLeaseRequest return &this } -func (o WriteLeasesRenewRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRenewLeaseRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["increment"] = o.Increment diff --git a/schema/model_write_leases_renew2_request.go b/schema/model_leases_renew_lease_with_id2_request.go similarity index 63% rename from schema/model_write_leases_renew2_request.go rename to schema/model_leases_renew_lease_with_id2_request.go index 13ae6e43..7b768a83 100644 --- a/schema/model_write_leases_renew2_request.go +++ b/schema/model_leases_renew_lease_with_id2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteLeasesRenew2Request struct for WriteLeasesRenew2Request -type WriteLeasesRenew2Request struct { +// LeasesRenewLeaseWithId2Request struct for LeasesRenewLeaseWithId2Request +type LeasesRenewLeaseWithId2Request struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` @@ -18,16 +18,16 @@ type WriteLeasesRenew2Request struct { LeaseId string `json:"lease_id"` } -// NewWriteLeasesRenew2RequestWithDefaults instantiates a new WriteLeasesRenew2Request object +// NewLeasesRenewLeaseWithId2RequestWithDefaults instantiates a new LeasesRenewLeaseWithId2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLeasesRenew2RequestWithDefaults() *WriteLeasesRenew2Request { - var this WriteLeasesRenew2Request +func NewLeasesRenewLeaseWithId2RequestWithDefaults() *LeasesRenewLeaseWithId2Request { + var this LeasesRenewLeaseWithId2Request return &this } -func (o WriteLeasesRenew2Request) MarshalJSON() ([]byte, error) { +func (o LeasesRenewLeaseWithId2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["increment"] = o.Increment diff --git a/schema/model_renew_for_request.go b/schema/model_leases_renew_lease_with_id_request.go similarity index 63% rename from schema/model_renew_for_request.go rename to schema/model_leases_renew_lease_with_id_request.go index 1b06ccc0..427d58e4 100644 --- a/schema/model_renew_for_request.go +++ b/schema/model_leases_renew_lease_with_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RenewForRequest struct for RenewForRequest -type RenewForRequest struct { +// LeasesRenewLeaseWithIdRequest struct for LeasesRenewLeaseWithIdRequest +type LeasesRenewLeaseWithIdRequest struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` @@ -18,16 +18,16 @@ type RenewForRequest struct { LeaseId string `json:"lease_id"` } -// NewRenewForRequestWithDefaults instantiates a new RenewForRequest object +// NewLeasesRenewLeaseWithIdRequestWithDefaults instantiates a new LeasesRenewLeaseWithIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRenewForRequestWithDefaults() *RenewForRequest { - var this RenewForRequest +func NewLeasesRenewLeaseWithIdRequestWithDefaults() *LeasesRenewLeaseWithIdRequest { + var this LeasesRenewLeaseWithIdRequest return &this } -func (o RenewForRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRenewLeaseWithIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["increment"] = o.Increment diff --git a/schema/model_revoke_request.go b/schema/model_leases_revoke_lease2_request.go similarity index 69% rename from schema/model_revoke_request.go rename to schema/model_leases_revoke_lease2_request.go index 86c31409..1802d278 100644 --- a/schema/model_revoke_request.go +++ b/schema/model_leases_revoke_lease2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RevokeRequest struct for RevokeRequest -type RevokeRequest struct { +// LeasesRevokeLease2Request struct for LeasesRevokeLease2Request +type LeasesRevokeLease2Request struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` @@ -21,18 +21,18 @@ type RevokeRequest struct { UrlLeaseId string `json:"url_lease_id"` } -// NewRevokeRequestWithDefaults instantiates a new RevokeRequest object +// NewLeasesRevokeLease2RequestWithDefaults instantiates a new LeasesRevokeLease2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRevokeRequestWithDefaults() *RevokeRequest { - var this RevokeRequest +func NewLeasesRevokeLease2RequestWithDefaults() *LeasesRevokeLease2Request { + var this LeasesRevokeLease2Request this.Sync = true return &this } -func (o RevokeRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRevokeLease2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["lease_id"] = o.LeaseId diff --git a/schema/model_write_leases_revoke_request.go b/schema/model_leases_revoke_lease_request.go similarity index 71% rename from schema/model_write_leases_revoke_request.go rename to schema/model_leases_revoke_lease_request.go index 21a6f304..57f50146 100644 --- a/schema/model_write_leases_revoke_request.go +++ b/schema/model_leases_revoke_lease_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteLeasesRevokeRequest struct for WriteLeasesRevokeRequest -type WriteLeasesRevokeRequest struct { +// LeasesRevokeLeaseRequest struct for LeasesRevokeLeaseRequest +type LeasesRevokeLeaseRequest struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` @@ -21,18 +21,18 @@ type WriteLeasesRevokeRequest struct { UrlLeaseId string `json:"url_lease_id"` } -// NewWriteLeasesRevokeRequestWithDefaults instantiates a new WriteLeasesRevokeRequest object +// NewLeasesRevokeLeaseRequestWithDefaults instantiates a new LeasesRevokeLeaseRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLeasesRevokeRequestWithDefaults() *WriteLeasesRevokeRequest { - var this WriteLeasesRevokeRequest +func NewLeasesRevokeLeaseRequestWithDefaults() *LeasesRevokeLeaseRequest { + var this LeasesRevokeLeaseRequest this.Sync = true return &this } -func (o WriteLeasesRevokeRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRevokeLeaseRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["lease_id"] = o.LeaseId diff --git a/schema/model_revoke_lease_request.go b/schema/model_leases_revoke_lease_with_id2_request.go similarity index 62% rename from schema/model_revoke_lease_request.go rename to schema/model_leases_revoke_lease_with_id2_request.go index a39d48b2..39343d39 100644 --- a/schema/model_revoke_lease_request.go +++ b/schema/model_leases_revoke_lease_with_id2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RevokeLeaseRequest struct for RevokeLeaseRequest -type RevokeLeaseRequest struct { +// LeasesRevokeLeaseWithId2Request struct for LeasesRevokeLeaseWithId2Request +type LeasesRevokeLeaseWithId2Request struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` @@ -18,18 +18,18 @@ type RevokeLeaseRequest struct { Sync bool `json:"sync"` } -// NewRevokeLeaseRequestWithDefaults instantiates a new RevokeLeaseRequest object +// NewLeasesRevokeLeaseWithId2RequestWithDefaults instantiates a new LeasesRevokeLeaseWithId2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRevokeLeaseRequestWithDefaults() *RevokeLeaseRequest { - var this RevokeLeaseRequest +func NewLeasesRevokeLeaseWithId2RequestWithDefaults() *LeasesRevokeLeaseWithId2Request { + var this LeasesRevokeLeaseWithId2Request this.Sync = true return &this } -func (o RevokeLeaseRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRevokeLeaseWithId2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["lease_id"] = o.LeaseId diff --git a/schema/model_write_leases_revoke2_request.go b/schema/model_leases_revoke_lease_with_id_request.go similarity index 63% rename from schema/model_write_leases_revoke2_request.go rename to schema/model_leases_revoke_lease_with_id_request.go index 096c6422..e3399f3d 100644 --- a/schema/model_write_leases_revoke2_request.go +++ b/schema/model_leases_revoke_lease_with_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteLeasesRevoke2Request struct for WriteLeasesRevoke2Request -type WriteLeasesRevoke2Request struct { +// LeasesRevokeLeaseWithIdRequest struct for LeasesRevokeLeaseWithIdRequest +type LeasesRevokeLeaseWithIdRequest struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` @@ -18,18 +18,18 @@ type WriteLeasesRevoke2Request struct { Sync bool `json:"sync"` } -// NewWriteLeasesRevoke2RequestWithDefaults instantiates a new WriteLeasesRevoke2Request object +// NewLeasesRevokeLeaseWithIdRequestWithDefaults instantiates a new LeasesRevokeLeaseWithIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLeasesRevoke2RequestWithDefaults() *WriteLeasesRevoke2Request { - var this WriteLeasesRevoke2Request +func NewLeasesRevokeLeaseWithIdRequestWithDefaults() *LeasesRevokeLeaseWithIdRequest { + var this LeasesRevokeLeaseWithIdRequest this.Sync = true return &this } -func (o WriteLeasesRevoke2Request) MarshalJSON() ([]byte, error) { +func (o LeasesRevokeLeaseWithIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["lease_id"] = o.LeaseId diff --git a/schema/model_write_leases_revoke_prefix_request.go b/schema/model_leases_revoke_lease_with_prefix2_request.go similarity index 55% rename from schema/model_write_leases_revoke_prefix_request.go rename to schema/model_leases_revoke_lease_with_prefix2_request.go index e7478e44..b3cb1507 100644 --- a/schema/model_write_leases_revoke_prefix_request.go +++ b/schema/model_leases_revoke_lease_with_prefix2_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// WriteLeasesRevokePrefixRequest struct for WriteLeasesRevokePrefixRequest -type WriteLeasesRevokePrefixRequest struct { +// LeasesRevokeLeaseWithPrefix2Request struct for LeasesRevokeLeaseWithPrefix2Request +type LeasesRevokeLeaseWithPrefix2Request struct { // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` } -// NewWriteLeasesRevokePrefixRequestWithDefaults instantiates a new WriteLeasesRevokePrefixRequest object +// NewLeasesRevokeLeaseWithPrefix2RequestWithDefaults instantiates a new LeasesRevokeLeaseWithPrefix2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLeasesRevokePrefixRequestWithDefaults() *WriteLeasesRevokePrefixRequest { - var this WriteLeasesRevokePrefixRequest +func NewLeasesRevokeLeaseWithPrefix2RequestWithDefaults() *LeasesRevokeLeaseWithPrefix2Request { + var this LeasesRevokeLeaseWithPrefix2Request this.Sync = true return &this } -func (o WriteLeasesRevokePrefixRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRevokeLeaseWithPrefix2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["sync"] = o.Sync diff --git a/schema/model_revoke_prefix_request.go b/schema/model_leases_revoke_lease_with_prefix_request.go similarity index 56% rename from schema/model_revoke_prefix_request.go rename to schema/model_leases_revoke_lease_with_prefix_request.go index f6f77cb9..7fd9a53f 100644 --- a/schema/model_revoke_prefix_request.go +++ b/schema/model_leases_revoke_lease_with_prefix_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// RevokePrefixRequest struct for RevokePrefixRequest -type RevokePrefixRequest struct { +// LeasesRevokeLeaseWithPrefixRequest struct for LeasesRevokeLeaseWithPrefixRequest +type LeasesRevokeLeaseWithPrefixRequest struct { // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` } -// NewRevokePrefixRequestWithDefaults instantiates a new RevokePrefixRequest object +// NewLeasesRevokeLeaseWithPrefixRequestWithDefaults instantiates a new LeasesRevokeLeaseWithPrefixRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRevokePrefixRequestWithDefaults() *RevokePrefixRequest { - var this RevokePrefixRequest +func NewLeasesRevokeLeaseWithPrefixRequestWithDefaults() *LeasesRevokeLeaseWithPrefixRequest { + var this LeasesRevokeLeaseWithPrefixRequest this.Sync = true return &this } -func (o RevokePrefixRequest) MarshalJSON() ([]byte, error) { +func (o LeasesRevokeLeaseWithPrefixRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["sync"] = o.Sync diff --git a/schema/model_write_loggers_request.go b/schema/model_loggers_update_verbosity_level_for_request.go similarity index 57% rename from schema/model_write_loggers_request.go rename to schema/model_loggers_update_verbosity_level_for_request.go index e25e6aae..ce8d7824 100644 --- a/schema/model_write_loggers_request.go +++ b/schema/model_loggers_update_verbosity_level_for_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WriteLoggersRequest struct for WriteLoggersRequest -type WriteLoggersRequest struct { +// LoggersUpdateVerbosityLevelForRequest struct for LoggersUpdateVerbosityLevelForRequest +type LoggersUpdateVerbosityLevelForRequest struct { // Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\". Level string `json:"level"` } -// NewWriteLoggersRequestWithDefaults instantiates a new WriteLoggersRequest object +// NewLoggersUpdateVerbosityLevelForRequestWithDefaults instantiates a new LoggersUpdateVerbosityLevelForRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLoggersRequestWithDefaults() *WriteLoggersRequest { - var this WriteLoggersRequest +func NewLoggersUpdateVerbosityLevelForRequestWithDefaults() *LoggersUpdateVerbosityLevelForRequest { + var this LoggersUpdateVerbosityLevelForRequest return &this } -func (o WriteLoggersRequest) MarshalJSON() ([]byte, error) { +func (o LoggersUpdateVerbosityLevelForRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["level"] = o.Level diff --git a/schema/model_write_logger_request.go b/schema/model_loggers_update_verbosity_level_request.go similarity index 58% rename from schema/model_write_logger_request.go rename to schema/model_loggers_update_verbosity_level_request.go index 46fac6b8..231ca779 100644 --- a/schema/model_write_logger_request.go +++ b/schema/model_loggers_update_verbosity_level_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WriteLoggerRequest struct for WriteLoggerRequest -type WriteLoggerRequest struct { +// LoggersUpdateVerbosityLevelRequest struct for LoggersUpdateVerbosityLevelRequest +type LoggersUpdateVerbosityLevelRequest struct { // Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\". Level string `json:"level"` } -// NewWriteLoggerRequestWithDefaults instantiates a new WriteLoggerRequest object +// NewLoggersUpdateVerbosityLevelRequestWithDefaults instantiates a new LoggersUpdateVerbosityLevelRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteLoggerRequestWithDefaults() *WriteLoggerRequest { - var this WriteLoggerRequest +func NewLoggersUpdateVerbosityLevelRequestWithDefaults() *LoggersUpdateVerbosityLevelRequest { + var this LoggersUpdateVerbosityLevelRequest return &this } -func (o WriteLoggerRequest) MarshalJSON() ([]byte, error) { +func (o LoggersUpdateVerbosityLevelRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["level"] = o.Level diff --git a/schema/model_mfa_method_admin_destroy_totp_request.go b/schema/model_mfa_admin_destroy_totp_secret_request.go similarity index 63% rename from schema/model_mfa_method_admin_destroy_totp_request.go rename to schema/model_mfa_admin_destroy_totp_secret_request.go index b488e7c3..7e284738 100644 --- a/schema/model_mfa_method_admin_destroy_totp_request.go +++ b/schema/model_mfa_admin_destroy_totp_secret_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// MFAMethodAdminDestroyTOTPRequest struct for MFAMethodAdminDestroyTOTPRequest -type MFAMethodAdminDestroyTOTPRequest struct { +// MfaAdminDestroyTotpSecretRequest struct for MfaAdminDestroyTotpSecretRequest +type MfaAdminDestroyTotpSecretRequest struct { // Identifier of the entity from which the MFA method secret needs to be removed. EntityId string `json:"entity_id"` @@ -18,16 +18,16 @@ type MFAMethodAdminDestroyTOTPRequest struct { MethodId string `json:"method_id"` } -// NewMFAMethodAdminDestroyTOTPRequestWithDefaults instantiates a new MFAMethodAdminDestroyTOTPRequest object +// NewMfaAdminDestroyTotpSecretRequestWithDefaults instantiates a new MfaAdminDestroyTotpSecretRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAMethodAdminDestroyTOTPRequestWithDefaults() *MFAMethodAdminDestroyTOTPRequest { - var this MFAMethodAdminDestroyTOTPRequest +func NewMfaAdminDestroyTotpSecretRequestWithDefaults() *MfaAdminDestroyTotpSecretRequest { + var this MfaAdminDestroyTotpSecretRequest return &this } -func (o MFAMethodAdminDestroyTOTPRequest) MarshalJSON() ([]byte, error) { +func (o MfaAdminDestroyTotpSecretRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["entity_id"] = o.EntityId diff --git a/schema/model_mfa_method_admin_generate_totp_request.go b/schema/model_mfa_admin_generate_totp_secret_request.go similarity index 62% rename from schema/model_mfa_method_admin_generate_totp_request.go rename to schema/model_mfa_admin_generate_totp_secret_request.go index 0519847f..8647c71f 100644 --- a/schema/model_mfa_method_admin_generate_totp_request.go +++ b/schema/model_mfa_admin_generate_totp_secret_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// MFAMethodAdminGenerateTOTPRequest struct for MFAMethodAdminGenerateTOTPRequest -type MFAMethodAdminGenerateTOTPRequest struct { +// MfaAdminGenerateTotpSecretRequest struct for MfaAdminGenerateTotpSecretRequest +type MfaAdminGenerateTotpSecretRequest struct { // Entity ID on which the generated secret needs to get stored. EntityId string `json:"entity_id"` @@ -18,16 +18,16 @@ type MFAMethodAdminGenerateTOTPRequest struct { MethodId string `json:"method_id"` } -// NewMFAMethodAdminGenerateTOTPRequestWithDefaults instantiates a new MFAMethodAdminGenerateTOTPRequest object +// NewMfaAdminGenerateTotpSecretRequestWithDefaults instantiates a new MfaAdminGenerateTotpSecretRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAMethodAdminGenerateTOTPRequestWithDefaults() *MFAMethodAdminGenerateTOTPRequest { - var this MFAMethodAdminGenerateTOTPRequest +func NewMfaAdminGenerateTotpSecretRequestWithDefaults() *MfaAdminGenerateTotpSecretRequest { + var this MfaAdminGenerateTotpSecretRequest return &this } -func (o MFAMethodAdminGenerateTOTPRequest) MarshalJSON() ([]byte, error) { +func (o MfaAdminGenerateTotpSecretRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["entity_id"] = o.EntityId diff --git a/schema/model_mfa_method_write_duo_request.go b/schema/model_mfa_configure_duo_method_request.go similarity index 74% rename from schema/model_mfa_method_write_duo_request.go rename to schema/model_mfa_configure_duo_method_request.go index 3f654a08..437cd02b 100644 --- a/schema/model_mfa_method_write_duo_request.go +++ b/schema/model_mfa_configure_duo_method_request.go @@ -9,16 +9,16 @@ import ( "encoding/json" ) -// MFAMethodWriteDuoRequest struct for MFAMethodWriteDuoRequest -type MFAMethodWriteDuoRequest struct { +// MfaConfigureDuoMethodRequest struct for MfaConfigureDuoMethodRequest +type MfaConfigureDuoMethodRequest struct { // API host name for Duo. ApiHostname string `json:"api_hostname"` // Integration key for Duo. IntegrationKey string `json:"integration_key"` - // The unique identifier for this MFA method. - MethodId string `json:"method_id"` + // The unique name identifier for this MFA method. + MethodName string `json:"method_name"` // Push information for Duo. PushInfo string `json:"push_info"` @@ -33,21 +33,21 @@ type MFAMethodWriteDuoRequest struct { UsernameFormat string `json:"username_format"` } -// NewMFAMethodWriteDuoRequestWithDefaults instantiates a new MFAMethodWriteDuoRequest object +// NewMfaConfigureDuoMethodRequestWithDefaults instantiates a new MfaConfigureDuoMethodRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAMethodWriteDuoRequestWithDefaults() *MFAMethodWriteDuoRequest { - var this MFAMethodWriteDuoRequest +func NewMfaConfigureDuoMethodRequestWithDefaults() *MfaConfigureDuoMethodRequest { + var this MfaConfigureDuoMethodRequest return &this } -func (o MFAMethodWriteDuoRequest) MarshalJSON() ([]byte, error) { +func (o MfaConfigureDuoMethodRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["api_hostname"] = o.ApiHostname toSerialize["integration_key"] = o.IntegrationKey - toSerialize["method_id"] = o.MethodId + toSerialize["method_name"] = o.MethodName toSerialize["push_info"] = o.PushInfo toSerialize["secret_key"] = o.SecretKey toSerialize["use_passcode"] = o.UsePasscode diff --git a/schema/model_mfa_method_write_okta_request.go b/schema/model_mfa_configure_okta_method_request.go similarity index 72% rename from schema/model_mfa_method_write_okta_request.go rename to schema/model_mfa_configure_okta_method_request.go index 99fc9eaa..8aca1a20 100644 --- a/schema/model_mfa_method_write_okta_request.go +++ b/schema/model_mfa_configure_okta_method_request.go @@ -9,16 +9,16 @@ import ( "encoding/json" ) -// MFAMethodWriteOktaRequest struct for MFAMethodWriteOktaRequest -type MFAMethodWriteOktaRequest struct { +// MfaConfigureOktaMethodRequest struct for MfaConfigureOktaMethodRequest +type MfaConfigureOktaMethodRequest struct { // Okta API key. ApiToken string `json:"api_token"` // The base domain to use for the Okta API. When not specified in the configuration, \"okta.com\" is used. BaseUrl string `json:"base_url"` - // The unique identifier for this MFA method. - MethodId string `json:"method_id"` + // The unique name identifier for this MFA method. + MethodName string `json:"method_name"` // Name of the organization to be used in the Okta API. OrgName string `json:"org_name"` @@ -33,21 +33,21 @@ type MFAMethodWriteOktaRequest struct { UsernameFormat string `json:"username_format"` } -// NewMFAMethodWriteOktaRequestWithDefaults instantiates a new MFAMethodWriteOktaRequest object +// NewMfaConfigureOktaMethodRequestWithDefaults instantiates a new MfaConfigureOktaMethodRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAMethodWriteOktaRequestWithDefaults() *MFAMethodWriteOktaRequest { - var this MFAMethodWriteOktaRequest +func NewMfaConfigureOktaMethodRequestWithDefaults() *MfaConfigureOktaMethodRequest { + var this MfaConfigureOktaMethodRequest return &this } -func (o MFAMethodWriteOktaRequest) MarshalJSON() ([]byte, error) { +func (o MfaConfigureOktaMethodRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["api_token"] = o.ApiToken toSerialize["base_url"] = o.BaseUrl - toSerialize["method_id"] = o.MethodId + toSerialize["method_name"] = o.MethodName toSerialize["org_name"] = o.OrgName toSerialize["primary_email"] = o.PrimaryEmail toSerialize["production"] = o.Production diff --git a/schema/model_mfa_method_write_ping_id_request.go b/schema/model_mfa_configure_ping_id_method_request.go similarity index 67% rename from schema/model_mfa_method_write_ping_id_request.go rename to schema/model_mfa_configure_ping_id_method_request.go index 0ef8692e..e712e2c4 100644 --- a/schema/model_mfa_method_write_ping_id_request.go +++ b/schema/model_mfa_configure_ping_id_method_request.go @@ -9,10 +9,10 @@ import ( "encoding/json" ) -// MFAMethodWritePingIDRequest struct for MFAMethodWritePingIDRequest -type MFAMethodWritePingIDRequest struct { - // The unique identifier for this MFA method. - MethodId string `json:"method_id"` +// MfaConfigurePingIdMethodRequest struct for MfaConfigurePingIdMethodRequest +type MfaConfigurePingIdMethodRequest struct { + // The unique name identifier for this MFA method. + MethodName string `json:"method_name"` // The settings file provided by Ping, Base64-encoded. This must be a settings file suitable for third-party clients, not the PingID SDK or PingFederate. SettingsFileBase64 string `json:"settings_file_base64"` @@ -21,19 +21,19 @@ type MFAMethodWritePingIDRequest struct { UsernameFormat string `json:"username_format"` } -// NewMFAMethodWritePingIDRequestWithDefaults instantiates a new MFAMethodWritePingIDRequest object +// NewMfaConfigurePingIdMethodRequestWithDefaults instantiates a new MfaConfigurePingIdMethodRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAMethodWritePingIDRequestWithDefaults() *MFAMethodWritePingIDRequest { - var this MFAMethodWritePingIDRequest +func NewMfaConfigurePingIdMethodRequestWithDefaults() *MfaConfigurePingIdMethodRequest { + var this MfaConfigurePingIdMethodRequest return &this } -func (o MFAMethodWritePingIDRequest) MarshalJSON() ([]byte, error) { +func (o MfaConfigurePingIdMethodRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) - toSerialize["method_id"] = o.MethodId + toSerialize["method_name"] = o.MethodName toSerialize["settings_file_base64"] = o.SettingsFileBase64 toSerialize["username_format"] = o.UsernameFormat diff --git a/schema/model_mfa_method_write_totp_request.go b/schema/model_mfa_configure_totp_method_request.go similarity index 76% rename from schema/model_mfa_method_write_totp_request.go rename to schema/model_mfa_configure_totp_method_request.go index c629dea1..363060d1 100644 --- a/schema/model_mfa_method_write_totp_request.go +++ b/schema/model_mfa_configure_totp_method_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// MFAMethodWriteTOTPRequest struct for MFAMethodWriteTOTPRequest -type MFAMethodWriteTOTPRequest struct { +// MfaConfigureTotpMethodRequest struct for MfaConfigureTotpMethodRequest +type MfaConfigureTotpMethodRequest struct { // The hashing algorithm used to generate the TOTP token. Options include SHA1, SHA256 and SHA512. Algorithm string `json:"algorithm"` @@ -26,8 +26,8 @@ type MFAMethodWriteTOTPRequest struct { // Max number of allowed validation attempts. MaxValidationAttempts int32 `json:"max_validation_attempts"` - // The unique identifier for this MFA method. - MethodId string `json:"method_id"` + // The unique name identifier for this MFA method. + MethodName string `json:"method_name"` // The length of time used to generate a counter for the TOTP token calculation. Period int32 `json:"period"` @@ -39,11 +39,11 @@ type MFAMethodWriteTOTPRequest struct { Skew int32 `json:"skew"` } -// NewMFAMethodWriteTOTPRequestWithDefaults instantiates a new MFAMethodWriteTOTPRequest object +// NewMfaConfigureTotpMethodRequestWithDefaults instantiates a new MfaConfigureTotpMethodRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAMethodWriteTOTPRequestWithDefaults() *MFAMethodWriteTOTPRequest { - var this MFAMethodWriteTOTPRequest +func NewMfaConfigureTotpMethodRequestWithDefaults() *MfaConfigureTotpMethodRequest { + var this MfaConfigureTotpMethodRequest this.Algorithm = "SHA1" this.Digits = 6 @@ -55,7 +55,7 @@ func NewMFAMethodWriteTOTPRequestWithDefaults() *MFAMethodWriteTOTPRequest { return &this } -func (o MFAMethodWriteTOTPRequest) MarshalJSON() ([]byte, error) { +func (o MfaConfigureTotpMethodRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm @@ -63,7 +63,7 @@ func (o MFAMethodWriteTOTPRequest) MarshalJSON() ([]byte, error) { toSerialize["issuer"] = o.Issuer toSerialize["key_size"] = o.KeySize toSerialize["max_validation_attempts"] = o.MaxValidationAttempts - toSerialize["method_id"] = o.MethodId + toSerialize["method_name"] = o.MethodName toSerialize["period"] = o.Period toSerialize["qr_size"] = o.QrSize toSerialize["skew"] = o.Skew diff --git a/schema/model_mfa_method_generate_totp_request.go b/schema/model_mfa_generate_totp_secret_request.go similarity index 60% rename from schema/model_mfa_method_generate_totp_request.go rename to schema/model_mfa_generate_totp_secret_request.go index 2bccd091..e68cbc19 100644 --- a/schema/model_mfa_method_generate_totp_request.go +++ b/schema/model_mfa_generate_totp_secret_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// MFAMethodGenerateTOTPRequest struct for MFAMethodGenerateTOTPRequest -type MFAMethodGenerateTOTPRequest struct { +// MfaGenerateTotpSecretRequest struct for MfaGenerateTotpSecretRequest +type MfaGenerateTotpSecretRequest struct { // The unique identifier for this MFA method. MethodId string `json:"method_id"` } -// NewMFAMethodGenerateTOTPRequestWithDefaults instantiates a new MFAMethodGenerateTOTPRequest object +// NewMfaGenerateTotpSecretRequestWithDefaults instantiates a new MfaGenerateTotpSecretRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAMethodGenerateTOTPRequestWithDefaults() *MFAMethodGenerateTOTPRequest { - var this MFAMethodGenerateTOTPRequest +func NewMfaGenerateTotpSecretRequestWithDefaults() *MfaGenerateTotpSecretRequest { + var this MfaGenerateTotpSecretRequest return &this } -func (o MFAMethodGenerateTOTPRequest) MarshalJSON() ([]byte, error) { +func (o MfaGenerateTotpSecretRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["method_id"] = o.MethodId diff --git a/schema/model_mfa_validate_request.go b/schema/model_mfa_validate_request.go index 1d497c33..1c888e9e 100644 --- a/schema/model_mfa_validate_request.go +++ b/schema/model_mfa_validate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// MFAValidateRequest struct for MFAValidateRequest -type MFAValidateRequest struct { +// MfaValidateRequest struct for MfaValidateRequest +type MfaValidateRequest struct { // A map from MFA method ID to a slice of passcodes or an empty slice if the method does not use passcodes MfaPayload map[string]interface{} `json:"mfa_payload"` @@ -18,16 +18,16 @@ type MFAValidateRequest struct { MfaRequestId string `json:"mfa_request_id"` } -// NewMFAValidateRequestWithDefaults instantiates a new MFAValidateRequest object +// NewMfaValidateRequestWithDefaults instantiates a new MfaValidateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAValidateRequestWithDefaults() *MFAValidateRequest { - var this MFAValidateRequest +func NewMfaValidateRequestWithDefaults() *MfaValidateRequest { + var this MfaValidateRequest return &this } -func (o MFAValidateRequest) MarshalJSON() ([]byte, error) { +func (o MfaValidateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["mfa_payload"] = o.MfaPayload diff --git a/schema/model_mfa_write_login_enforcement_request.go b/schema/model_mfa_write_login_enforcement_request.go index 7fb61434..bb0651fd 100644 --- a/schema/model_mfa_write_login_enforcement_request.go +++ b/schema/model_mfa_write_login_enforcement_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// MFAWriteLoginEnforcementRequest struct for MFAWriteLoginEnforcementRequest -type MFAWriteLoginEnforcementRequest struct { +// MfaWriteLoginEnforcementRequest struct for MfaWriteLoginEnforcementRequest +type MfaWriteLoginEnforcementRequest struct { // Array of auth mount accessor IDs AuthMethodAccessors []string `json:"auth_method_accessors"` @@ -27,16 +27,16 @@ type MFAWriteLoginEnforcementRequest struct { MfaMethodIds []string `json:"mfa_method_ids"` } -// NewMFAWriteLoginEnforcementRequestWithDefaults instantiates a new MFAWriteLoginEnforcementRequest object +// NewMfaWriteLoginEnforcementRequestWithDefaults instantiates a new MfaWriteLoginEnforcementRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMFAWriteLoginEnforcementRequestWithDefaults() *MFAWriteLoginEnforcementRequest { - var this MFAWriteLoginEnforcementRequest +func NewMfaWriteLoginEnforcementRequestWithDefaults() *MfaWriteLoginEnforcementRequest { + var this MfaWriteLoginEnforcementRequest return &this } -func (o MFAWriteLoginEnforcementRequest) MarshalJSON() ([]byte, error) { +func (o MfaWriteLoginEnforcementRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["auth_method_accessors"] = o.AuthMethodAccessors diff --git a/schema/model_mongo_db_atlas_write_config_request.go b/schema/model_mongo_db_atlas_configure_request.go similarity index 62% rename from schema/model_mongo_db_atlas_write_config_request.go rename to schema/model_mongo_db_atlas_configure_request.go index 41125eea..e1e09d64 100644 --- a/schema/model_mongo_db_atlas_write_config_request.go +++ b/schema/model_mongo_db_atlas_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// MongoDBAtlasWriteConfigRequest struct for MongoDBAtlasWriteConfigRequest -type MongoDBAtlasWriteConfigRequest struct { +// MongoDbAtlasConfigureRequest struct for MongoDbAtlasConfigureRequest +type MongoDbAtlasConfigureRequest struct { // MongoDB Atlas Programmatic Private Key PrivateKey string `json:"private_key"` @@ -18,16 +18,16 @@ type MongoDBAtlasWriteConfigRequest struct { PublicKey string `json:"public_key"` } -// NewMongoDBAtlasWriteConfigRequestWithDefaults instantiates a new MongoDBAtlasWriteConfigRequest object +// NewMongoDbAtlasConfigureRequestWithDefaults instantiates a new MongoDbAtlasConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMongoDBAtlasWriteConfigRequestWithDefaults() *MongoDBAtlasWriteConfigRequest { - var this MongoDBAtlasWriteConfigRequest +func NewMongoDbAtlasConfigureRequestWithDefaults() *MongoDbAtlasConfigureRequest { + var this MongoDbAtlasConfigureRequest return &this } -func (o MongoDBAtlasWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o MongoDbAtlasConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["private_key"] = o.PrivateKey diff --git a/schema/model_mongo_db_atlas_write_role_request.go b/schema/model_mongo_db_atlas_write_role_request.go index b3526dfa..751ba0e8 100644 --- a/schema/model_mongo_db_atlas_write_role_request.go +++ b/schema/model_mongo_db_atlas_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// MongoDBAtlasWriteRoleRequest struct for MongoDBAtlasWriteRoleRequest -type MongoDBAtlasWriteRoleRequest struct { +// MongoDbAtlasWriteRoleRequest struct for MongoDbAtlasWriteRoleRequest +type MongoDbAtlasWriteRoleRequest struct { // Access list entry in CIDR notation to be added for the API key. Optional for organization and project keys. CidrBlocks []string `json:"cidr_blocks"` @@ -36,16 +36,16 @@ type MongoDBAtlasWriteRoleRequest struct { Ttl int32 `json:"ttl"` } -// NewMongoDBAtlasWriteRoleRequestWithDefaults instantiates a new MongoDBAtlasWriteRoleRequest object +// NewMongoDbAtlasWriteRoleRequestWithDefaults instantiates a new MongoDbAtlasWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewMongoDBAtlasWriteRoleRequestWithDefaults() *MongoDBAtlasWriteRoleRequest { - var this MongoDBAtlasWriteRoleRequest +func NewMongoDbAtlasWriteRoleRequestWithDefaults() *MongoDbAtlasWriteRoleRequest { + var this MongoDbAtlasWriteRoleRequest return &this } -func (o MongoDBAtlasWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o MongoDbAtlasWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cidr_blocks"] = o.CidrBlocks diff --git a/schema/model_write_mount_request.go b/schema/model_mounts_enable_secrets_engine_request.go similarity index 81% rename from schema/model_write_mount_request.go rename to schema/model_mounts_enable_secrets_engine_request.go index 854a0e61..4dc063eb 100644 --- a/schema/model_write_mount_request.go +++ b/schema/model_mounts_enable_secrets_engine_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteMountRequest struct for WriteMountRequest -type WriteMountRequest struct { +// MountsEnableSecretsEngineRequest struct for MountsEnableSecretsEngineRequest +type MountsEnableSecretsEngineRequest struct { // Configuration for this mount, such as default_lease_ttl and max_lease_ttl. Config map[string]interface{} `json:"config"` @@ -39,11 +39,11 @@ type WriteMountRequest struct { Type string `json:"type"` } -// NewWriteMountRequestWithDefaults instantiates a new WriteMountRequest object +// NewMountsEnableSecretsEngineRequestWithDefaults instantiates a new MountsEnableSecretsEngineRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteMountRequestWithDefaults() *WriteMountRequest { - var this WriteMountRequest +func NewMountsEnableSecretsEngineRequestWithDefaults() *MountsEnableSecretsEngineRequest { + var this MountsEnableSecretsEngineRequest this.ExternalEntropyAccess = false this.Local = false @@ -52,7 +52,7 @@ func NewWriteMountRequestWithDefaults() *WriteMountRequest { return &this } -func (o WriteMountRequest) MarshalJSON() ([]byte, error) { +func (o MountsEnableSecretsEngineRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["config"] = o.Config diff --git a/schema/model_mounts_read_configuration_response.go b/schema/model_mounts_read_configuration_response.go new file mode 100644 index 00000000..3ed39b90 --- /dev/null +++ b/schema/model_mounts_read_configuration_response.go @@ -0,0 +1,78 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// MountsReadConfigurationResponse struct for MountsReadConfigurationResponse +type MountsReadConfigurationResponse struct { + Accessor string `json:"accessor"` + + // Configuration for this mount, such as default_lease_ttl and max_lease_ttl. + Config map[string]interface{} `json:"config"` + + DeprecationStatus string `json:"deprecation_status"` + + // User-friendly description for this mount. + Description string `json:"description"` + + ExternalEntropyAccess bool `json:"external_entropy_access"` + + // Mark the mount as a local mount, which is not replicated and is unaffected by replication. + Local bool `json:"local"` + + // The options to pass into the backend. Should be a json object with string keys and values. + Options map[string]interface{} `json:"options"` + + // The semantic version of the plugin to use. + PluginVersion string `json:"plugin_version"` + + RunningPluginVersion string `json:"running_plugin_version"` + + RunningSha256 string `json:"running_sha256"` + + // Whether to turn on seal wrapping for the mount. + SealWrap bool `json:"seal_wrap"` + + // The type of the backend. Example: \"passthrough\" + Type string `json:"type"` + + Uuid string `json:"uuid"` +} + +// NewMountsReadConfigurationResponseWithDefaults instantiates a new MountsReadConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewMountsReadConfigurationResponseWithDefaults() *MountsReadConfigurationResponse { + var this MountsReadConfigurationResponse + + this.Local = false + this.SealWrap = false + + return &this +} + +func (o MountsReadConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["accessor"] = o.Accessor + toSerialize["config"] = o.Config + toSerialize["deprecation_status"] = o.DeprecationStatus + toSerialize["description"] = o.Description + toSerialize["external_entropy_access"] = o.ExternalEntropyAccess + toSerialize["local"] = o.Local + toSerialize["options"] = o.Options + toSerialize["plugin_version"] = o.PluginVersion + toSerialize["running_plugin_version"] = o.RunningPluginVersion + toSerialize["running_sha256"] = o.RunningSha256 + toSerialize["seal_wrap"] = o.SealWrap + toSerialize["type"] = o.Type + toSerialize["uuid"] = o.Uuid + + return json.Marshal(toSerialize) +} diff --git a/schema/model_mounts_read_tuning_information_response.go b/schema/model_mounts_read_tuning_information_response.go new file mode 100644 index 00000000..6257e64e --- /dev/null +++ b/schema/model_mounts_read_tuning_information_response.go @@ -0,0 +1,90 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// MountsReadTuningInformationResponse struct for MountsReadTuningInformationResponse +type MountsReadTuningInformationResponse struct { + AllowedManagedKeys []string `json:"allowed_managed_keys"` + + // A list of headers to whitelist and allow a plugin to set on responses. + AllowedResponseHeaders []string `json:"allowed_response_headers"` + + AuditNonHmacRequestKeys []string `json:"audit_non_hmac_request_keys"` + + AuditNonHmacResponseKeys []string `json:"audit_non_hmac_response_keys"` + + // The default lease TTL for this mount. + DefaultLeaseTtl int32 `json:"default_lease_ttl"` + + // User-friendly description for this credential backend. + Description string `json:"description"` + + ExternalEntropyAccess bool `json:"external_entropy_access"` + + ForceNoCache bool `json:"force_no_cache"` + + ListingVisibility string `json:"listing_visibility"` + + // The max lease TTL for this mount. + MaxLeaseTtl int32 `json:"max_lease_ttl"` + + // The options to pass into the backend. Should be a json object with string keys and values. + Options map[string]interface{} `json:"options"` + + PassthroughRequestHeaders []string `json:"passthrough_request_headers"` + + // The semantic version of the plugin to use. + PluginVersion string `json:"plugin_version"` + + // The type of token to issue (service or batch). + TokenType string `json:"token_type"` + + UserLockoutCounterResetDuration int64 `json:"user_lockout_counter_reset_duration"` + + UserLockoutDisable bool `json:"user_lockout_disable"` + + UserLockoutDuration int64 `json:"user_lockout_duration"` + + UserLockoutThreshold int64 `json:"user_lockout_threshold"` +} + +// NewMountsReadTuningInformationResponseWithDefaults instantiates a new MountsReadTuningInformationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewMountsReadTuningInformationResponseWithDefaults() *MountsReadTuningInformationResponse { + var this MountsReadTuningInformationResponse + + return &this +} + +func (o MountsReadTuningInformationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["allowed_managed_keys"] = o.AllowedManagedKeys + toSerialize["allowed_response_headers"] = o.AllowedResponseHeaders + toSerialize["audit_non_hmac_request_keys"] = o.AuditNonHmacRequestKeys + toSerialize["audit_non_hmac_response_keys"] = o.AuditNonHmacResponseKeys + toSerialize["default_lease_ttl"] = o.DefaultLeaseTtl + toSerialize["description"] = o.Description + toSerialize["external_entropy_access"] = o.ExternalEntropyAccess + toSerialize["force_no_cache"] = o.ForceNoCache + toSerialize["listing_visibility"] = o.ListingVisibility + toSerialize["max_lease_ttl"] = o.MaxLeaseTtl + toSerialize["options"] = o.Options + toSerialize["passthrough_request_headers"] = o.PassthroughRequestHeaders + toSerialize["plugin_version"] = o.PluginVersion + toSerialize["token_type"] = o.TokenType + toSerialize["user_lockout_counter_reset_duration"] = o.UserLockoutCounterResetDuration + toSerialize["user_lockout_disable"] = o.UserLockoutDisable + toSerialize["user_lockout_duration"] = o.UserLockoutDuration + toSerialize["user_lockout_threshold"] = o.UserLockoutThreshold + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_mounts_config_request.go b/schema/model_mounts_tune_configuration_parameters_request.go similarity index 84% rename from schema/model_write_mounts_config_request.go rename to schema/model_mounts_tune_configuration_parameters_request.go index 5a9ad838..a2bc7213 100644 --- a/schema/model_write_mounts_config_request.go +++ b/schema/model_mounts_tune_configuration_parameters_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteMountsConfigRequest struct for WriteMountsConfigRequest -type WriteMountsConfigRequest struct { +// MountsTuneConfigurationParametersRequest struct for MountsTuneConfigurationParametersRequest +type MountsTuneConfigurationParametersRequest struct { AllowedManagedKeys []string `json:"allowed_managed_keys"` // A list of headers to whitelist and allow a plugin to set on responses. @@ -50,16 +50,16 @@ type WriteMountsConfigRequest struct { UserLockoutConfig map[string]interface{} `json:"user_lockout_config"` } -// NewWriteMountsConfigRequestWithDefaults instantiates a new WriteMountsConfigRequest object +// NewMountsTuneConfigurationParametersRequestWithDefaults instantiates a new MountsTuneConfigurationParametersRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteMountsConfigRequestWithDefaults() *WriteMountsConfigRequest { - var this WriteMountsConfigRequest +func NewMountsTuneConfigurationParametersRequestWithDefaults() *MountsTuneConfigurationParametersRequest { + var this MountsTuneConfigurationParametersRequest return &this } -func (o WriteMountsConfigRequest) MarshalJSON() ([]byte, error) { +func (o MountsTuneConfigurationParametersRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allowed_managed_keys"] = o.AllowedManagedKeys diff --git a/schema/model_nomad_write_access_config_request.go b/schema/model_nomad_configure_access_request.go similarity index 77% rename from schema/model_nomad_write_access_config_request.go rename to schema/model_nomad_configure_access_request.go index d3be674e..a957e3f7 100644 --- a/schema/model_nomad_write_access_config_request.go +++ b/schema/model_nomad_configure_access_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// NomadWriteAccessConfigRequest struct for NomadWriteAccessConfigRequest -type NomadWriteAccessConfigRequest struct { +// NomadConfigureAccessRequest struct for NomadConfigureAccessRequest +type NomadConfigureAccessRequest struct { // Nomad server address Address string `json:"address"` @@ -30,16 +30,16 @@ type NomadWriteAccessConfigRequest struct { Token string `json:"token"` } -// NewNomadWriteAccessConfigRequestWithDefaults instantiates a new NomadWriteAccessConfigRequest object +// NewNomadConfigureAccessRequestWithDefaults instantiates a new NomadConfigureAccessRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewNomadWriteAccessConfigRequestWithDefaults() *NomadWriteAccessConfigRequest { - var this NomadWriteAccessConfigRequest +func NewNomadConfigureAccessRequestWithDefaults() *NomadConfigureAccessRequest { + var this NomadConfigureAccessRequest return &this } -func (o NomadWriteAccessConfigRequest) MarshalJSON() ([]byte, error) { +func (o NomadConfigureAccessRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["address"] = o.Address diff --git a/schema/model_nomad_write_lease_config_request.go b/schema/model_nomad_configure_lease_request.go similarity index 63% rename from schema/model_nomad_write_lease_config_request.go rename to schema/model_nomad_configure_lease_request.go index a8227c83..49fc2b14 100644 --- a/schema/model_nomad_write_lease_config_request.go +++ b/schema/model_nomad_configure_lease_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// NomadWriteLeaseConfigRequest struct for NomadWriteLeaseConfigRequest -type NomadWriteLeaseConfigRequest struct { +// NomadConfigureLeaseRequest struct for NomadConfigureLeaseRequest +type NomadConfigureLeaseRequest struct { // Duration after which the issued token should not be allowed to be renewed MaxTtl int32 `json:"max_ttl"` @@ -18,16 +18,16 @@ type NomadWriteLeaseConfigRequest struct { Ttl int32 `json:"ttl"` } -// NewNomadWriteLeaseConfigRequestWithDefaults instantiates a new NomadWriteLeaseConfigRequest object +// NewNomadConfigureLeaseRequestWithDefaults instantiates a new NomadConfigureLeaseRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewNomadWriteLeaseConfigRequestWithDefaults() *NomadWriteLeaseConfigRequest { - var this NomadWriteLeaseConfigRequest +func NewNomadConfigureLeaseRequestWithDefaults() *NomadConfigureLeaseRequest { + var this NomadConfigureLeaseRequest return &this } -func (o NomadWriteLeaseConfigRequest) MarshalJSON() ([]byte, error) { +func (o NomadConfigureLeaseRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["max_ttl"] = o.MaxTtl diff --git a/schema/model_oci_write_config_request.go b/schema/model_oci_configure_request.go similarity index 63% rename from schema/model_oci_write_config_request.go rename to schema/model_oci_configure_request.go index 7a73cc68..a9b9fc21 100644 --- a/schema/model_oci_write_config_request.go +++ b/schema/model_oci_configure_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// OCIWriteConfigRequest struct for OCIWriteConfigRequest -type OCIWriteConfigRequest struct { +// OciConfigureRequest struct for OciConfigureRequest +type OciConfigureRequest struct { // The tenancy id of the account. HomeTenancyId string `json:"home_tenancy_id"` } -// NewOCIWriteConfigRequestWithDefaults instantiates a new OCIWriteConfigRequest object +// NewOciConfigureRequestWithDefaults instantiates a new OciConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOCIWriteConfigRequestWithDefaults() *OCIWriteConfigRequest { - var this OCIWriteConfigRequest +func NewOciConfigureRequestWithDefaults() *OciConfigureRequest { + var this OciConfigureRequest return &this } -func (o OCIWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o OciConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["home_tenancy_id"] = o.HomeTenancyId diff --git a/schema/model_oci_login_with_role_request.go b/schema/model_oci_login_request.go similarity index 62% rename from schema/model_oci_login_with_role_request.go rename to schema/model_oci_login_request.go index a9ac1e65..7e7e369d 100644 --- a/schema/model_oci_login_with_role_request.go +++ b/schema/model_oci_login_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// OCILoginWithRoleRequest struct for OCILoginWithRoleRequest -type OCILoginWithRoleRequest struct { +// OciLoginRequest struct for OciLoginRequest +type OciLoginRequest struct { // The signed headers of the client RequestHeaders string `json:"request_headers"` } -// NewOCILoginWithRoleRequestWithDefaults instantiates a new OCILoginWithRoleRequest object +// NewOciLoginRequestWithDefaults instantiates a new OciLoginRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOCILoginWithRoleRequestWithDefaults() *OCILoginWithRoleRequest { - var this OCILoginWithRoleRequest +func NewOciLoginRequestWithDefaults() *OciLoginRequest { + var this OciLoginRequest return &this } -func (o OCILoginWithRoleRequest) MarshalJSON() ([]byte, error) { +func (o OciLoginRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["request_headers"] = o.RequestHeaders diff --git a/schema/model_oci_write_role_request.go b/schema/model_oci_write_role_request.go index 497d7568..f3d67af6 100644 --- a/schema/model_oci_write_role_request.go +++ b/schema/model_oci_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OCIWriteRoleRequest struct for OCIWriteRoleRequest -type OCIWriteRoleRequest struct { +// OciWriteRoleRequest struct for OciWriteRoleRequest +type OciWriteRoleRequest struct { // A comma separated list of Group or Dynamic Group OCIDs that are allowed to take this role. OcidList []string `json:"ocid_list"` @@ -42,18 +42,18 @@ type OCIWriteRoleRequest struct { TokenType string `json:"token_type"` } -// NewOCIWriteRoleRequestWithDefaults instantiates a new OCIWriteRoleRequest object +// NewOciWriteRoleRequestWithDefaults instantiates a new OciWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOCIWriteRoleRequestWithDefaults() *OCIWriteRoleRequest { - var this OCIWriteRoleRequest +func NewOciWriteRoleRequestWithDefaults() *OciWriteRoleRequest { + var this OciWriteRoleRequest this.TokenType = "default-service" return &this } -func (o OCIWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o OciWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["ocid_list"] = o.OcidList diff --git a/schema/model_oidc_write_config_request.go b/schema/model_oidc_configure_request.go similarity index 63% rename from schema/model_oidc_write_config_request.go rename to schema/model_oidc_configure_request.go index 7a1825dd..da77f506 100644 --- a/schema/model_oidc_write_config_request.go +++ b/schema/model_oidc_configure_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// OIDCWriteConfigRequest struct for OIDCWriteConfigRequest -type OIDCWriteConfigRequest struct { +// OidcConfigureRequest struct for OidcConfigureRequest +type OidcConfigureRequest struct { // Issuer URL to be used in the iss claim of the token. If not set, Vault's app_addr will be used. Issuer string `json:"issuer"` } -// NewOIDCWriteConfigRequestWithDefaults instantiates a new OIDCWriteConfigRequest object +// NewOidcConfigureRequestWithDefaults instantiates a new OidcConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteConfigRequestWithDefaults() *OIDCWriteConfigRequest { - var this OIDCWriteConfigRequest +func NewOidcConfigureRequestWithDefaults() *OidcConfigureRequest { + var this OidcConfigureRequest return &this } -func (o OIDCWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o OidcConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["issuer"] = o.Issuer diff --git a/schema/model_oidc_introspect_request.go b/schema/model_oidc_introspect_request.go index a3908398..f168d29f 100644 --- a/schema/model_oidc_introspect_request.go +++ b/schema/model_oidc_introspect_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCIntrospectRequest struct for OIDCIntrospectRequest -type OIDCIntrospectRequest struct { +// OidcIntrospectRequest struct for OidcIntrospectRequest +type OidcIntrospectRequest struct { // Optional client_id to verify ClientId string `json:"client_id"` @@ -18,16 +18,16 @@ type OIDCIntrospectRequest struct { Token string `json:"token"` } -// NewOIDCIntrospectRequestWithDefaults instantiates a new OIDCIntrospectRequest object +// NewOidcIntrospectRequestWithDefaults instantiates a new OidcIntrospectRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCIntrospectRequestWithDefaults() *OIDCIntrospectRequest { - var this OIDCIntrospectRequest +func NewOidcIntrospectRequestWithDefaults() *OidcIntrospectRequest { + var this OidcIntrospectRequest return &this } -func (o OIDCIntrospectRequest) MarshalJSON() ([]byte, error) { +func (o OidcIntrospectRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_id"] = o.ClientId diff --git a/schema/model_oidc_write_provider_authorize_request.go b/schema/model_oidc_provider_authorize2_request.go similarity index 81% rename from schema/model_oidc_write_provider_authorize_request.go rename to schema/model_oidc_provider_authorize2_request.go index 495e4339..4c6074d3 100644 --- a/schema/model_oidc_write_provider_authorize_request.go +++ b/schema/model_oidc_provider_authorize2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteProviderAuthorizeRequest struct for OIDCWriteProviderAuthorizeRequest -type OIDCWriteProviderAuthorizeRequest struct { +// OidcProviderAuthorize2Request struct for OidcProviderAuthorize2Request +type OidcProviderAuthorize2Request struct { // The ID of the requesting client. ClientId string `json:"client_id"` @@ -39,18 +39,18 @@ type OIDCWriteProviderAuthorizeRequest struct { State string `json:"state"` } -// NewOIDCWriteProviderAuthorizeRequestWithDefaults instantiates a new OIDCWriteProviderAuthorizeRequest object +// NewOidcProviderAuthorize2RequestWithDefaults instantiates a new OidcProviderAuthorize2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteProviderAuthorizeRequestWithDefaults() *OIDCWriteProviderAuthorizeRequest { - var this OIDCWriteProviderAuthorizeRequest +func NewOidcProviderAuthorize2RequestWithDefaults() *OidcProviderAuthorize2Request { + var this OidcProviderAuthorize2Request this.CodeChallengeMethod = "plain" return &this } -func (o OIDCWriteProviderAuthorizeRequest) MarshalJSON() ([]byte, error) { +func (o OidcProviderAuthorize2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_id"] = o.ClientId diff --git a/schema/model_oidc_write_provider_token_request.go b/schema/model_oidc_provider_token_request.go similarity index 76% rename from schema/model_oidc_write_provider_token_request.go rename to schema/model_oidc_provider_token_request.go index 6c8db7ad..f26504a6 100644 --- a/schema/model_oidc_write_provider_token_request.go +++ b/schema/model_oidc_provider_token_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteProviderTokenRequest struct for OIDCWriteProviderTokenRequest -type OIDCWriteProviderTokenRequest struct { +// OidcProviderTokenRequest struct for OidcProviderTokenRequest +type OidcProviderTokenRequest struct { // The ID of the requesting client. ClientId string `json:"client_id"` @@ -30,16 +30,16 @@ type OIDCWriteProviderTokenRequest struct { RedirectUri string `json:"redirect_uri"` } -// NewOIDCWriteProviderTokenRequestWithDefaults instantiates a new OIDCWriteProviderTokenRequest object +// NewOidcProviderTokenRequestWithDefaults instantiates a new OidcProviderTokenRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteProviderTokenRequestWithDefaults() *OIDCWriteProviderTokenRequest { - var this OIDCWriteProviderTokenRequest +func NewOidcProviderTokenRequestWithDefaults() *OidcProviderTokenRequest { + var this OidcProviderTokenRequest return &this } -func (o OIDCWriteProviderTokenRequest) MarshalJSON() ([]byte, error) { +func (o OidcProviderTokenRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_id"] = o.ClientId diff --git a/schema/model_oidc_rotate_key_request.go b/schema/model_oidc_rotate_key_request.go index c0a7d3cc..a32e1133 100644 --- a/schema/model_oidc_rotate_key_request.go +++ b/schema/model_oidc_rotate_key_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// OIDCRotateKeyRequest struct for OIDCRotateKeyRequest -type OIDCRotateKeyRequest struct { +// OidcRotateKeyRequest struct for OidcRotateKeyRequest +type OidcRotateKeyRequest struct { // Controls how long the public portion of a key will be available for verification after being rotated. Setting verification_ttl here will override the verification_ttl set on the key. VerificationTtl int32 `json:"verification_ttl"` } -// NewOIDCRotateKeyRequestWithDefaults instantiates a new OIDCRotateKeyRequest object +// NewOidcRotateKeyRequestWithDefaults instantiates a new OidcRotateKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCRotateKeyRequestWithDefaults() *OIDCRotateKeyRequest { - var this OIDCRotateKeyRequest +func NewOidcRotateKeyRequestWithDefaults() *OidcRotateKeyRequest { + var this OidcRotateKeyRequest return &this } -func (o OIDCRotateKeyRequest) MarshalJSON() ([]byte, error) { +func (o OidcRotateKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["verification_ttl"] = o.VerificationTtl diff --git a/schema/model_oidc_write_assignment_request.go b/schema/model_oidc_write_assignment_request.go index 57d6dfa5..e631bc63 100644 --- a/schema/model_oidc_write_assignment_request.go +++ b/schema/model_oidc_write_assignment_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteAssignmentRequest struct for OIDCWriteAssignmentRequest -type OIDCWriteAssignmentRequest struct { +// OidcWriteAssignmentRequest struct for OidcWriteAssignmentRequest +type OidcWriteAssignmentRequest struct { // Comma separated string or array of identity entity IDs EntityIds []string `json:"entity_ids"` @@ -18,16 +18,16 @@ type OIDCWriteAssignmentRequest struct { GroupIds []string `json:"group_ids"` } -// NewOIDCWriteAssignmentRequestWithDefaults instantiates a new OIDCWriteAssignmentRequest object +// NewOidcWriteAssignmentRequestWithDefaults instantiates a new OidcWriteAssignmentRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteAssignmentRequestWithDefaults() *OIDCWriteAssignmentRequest { - var this OIDCWriteAssignmentRequest +func NewOidcWriteAssignmentRequestWithDefaults() *OidcWriteAssignmentRequest { + var this OidcWriteAssignmentRequest return &this } -func (o OIDCWriteAssignmentRequest) MarshalJSON() ([]byte, error) { +func (o OidcWriteAssignmentRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["entity_ids"] = o.EntityIds diff --git a/schema/model_oidc_write_auth_config_request.go b/schema/model_oidc_write_auth_config_request.go deleted file mode 100644 index 8bfae979..00000000 --- a/schema/model_oidc_write_auth_config_request.go +++ /dev/null @@ -1,85 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// OIDCWriteAuthConfigRequest struct for OIDCWriteAuthConfigRequest -type OIDCWriteAuthConfigRequest struct { - // The value against which to match the 'iss' claim in a JWT. Optional. - BoundIssuer string `json:"bound_issuer"` - - // The default role to use if none is provided during login. If not set, a role is required during login. - DefaultRole string `json:"default_role"` - - // The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used. - JwksCaPem string `json:"jwks_ca_pem"` - - // JWKS URL to use to authenticate signatures. Cannot be used with \"oidc_discovery_url\" or \"jwt_validation_pubkeys\". - JwksUrl string `json:"jwks_url"` - - // A list of supported signing algorithms. Defaults to RS256. - JwtSupportedAlgs []string `json:"jwt_supported_algs"` - - // A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with \"jwks_url\" or \"oidc_discovery_url\". - JwtValidationPubkeys []string `json:"jwt_validation_pubkeys"` - - // Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. - NamespaceInState bool `json:"namespace_in_state"` - - // The OAuth Client ID configured with your OIDC provider. - OidcClientId string `json:"oidc_client_id"` - - // The OAuth Client Secret configured with your OIDC provider. - OidcClientSecret string `json:"oidc_client_secret"` - - // The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used. - OidcDiscoveryCaPem string `json:"oidc_discovery_ca_pem"` - - // OIDC Discovery URL, without any .well-known component (base path). Cannot be used with \"jwks_url\" or \"jwt_validation_pubkeys\". - OidcDiscoveryUrl string `json:"oidc_discovery_url"` - - // The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. - OidcResponseMode string `json:"oidc_response_mode"` - - // The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. - OidcResponseTypes []string `json:"oidc_response_types"` - - // Provider-specific configuration. Optional. - ProviderConfig map[string]interface{} `json:"provider_config"` -} - -// NewOIDCWriteAuthConfigRequestWithDefaults instantiates a new OIDCWriteAuthConfigRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewOIDCWriteAuthConfigRequestWithDefaults() *OIDCWriteAuthConfigRequest { - var this OIDCWriteAuthConfigRequest - - return &this -} - -func (o OIDCWriteAuthConfigRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["bound_issuer"] = o.BoundIssuer - toSerialize["default_role"] = o.DefaultRole - toSerialize["jwks_ca_pem"] = o.JwksCaPem - toSerialize["jwks_url"] = o.JwksUrl - toSerialize["jwt_supported_algs"] = o.JwtSupportedAlgs - toSerialize["jwt_validation_pubkeys"] = o.JwtValidationPubkeys - toSerialize["namespace_in_state"] = o.NamespaceInState - toSerialize["oidc_client_id"] = o.OidcClientId - toSerialize["oidc_client_secret"] = o.OidcClientSecret - toSerialize["oidc_discovery_ca_pem"] = o.OidcDiscoveryCaPem - toSerialize["oidc_discovery_url"] = o.OidcDiscoveryUrl - toSerialize["oidc_response_mode"] = o.OidcResponseMode - toSerialize["oidc_response_types"] = o.OidcResponseTypes - toSerialize["provider_config"] = o.ProviderConfig - - return json.Marshal(toSerialize) -} diff --git a/schema/model_oidc_write_auth_role_request.go b/schema/model_oidc_write_auth_role_request.go deleted file mode 100644 index 3fd2a371..00000000 --- a/schema/model_oidc_write_auth_role_request.go +++ /dev/null @@ -1,164 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// OIDCWriteAuthRoleRequest struct for OIDCWriteAuthRoleRequest -type OIDCWriteAuthRoleRequest struct { - // Comma-separated list of allowed values for redirect_uri - AllowedRedirectUris []string `json:"allowed_redirect_uris"` - - // Comma-separated list of 'aud' claims that are valid for login; any match is sufficient - BoundAudiences []string `json:"bound_audiences"` - - // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. - // Deprecated - BoundCidrs []string `json:"bound_cidrs"` - - // Map of claims/values which must match for login - BoundClaims map[string]interface{} `json:"bound_claims"` - - // How to interpret values in the map of claims/values (which must match for login): allowed values are 'string' or 'glob' - BoundClaimsType string `json:"bound_claims_type"` - - // The 'sub' claim that is valid for login. Optional. - BoundSubject string `json:"bound_subject"` - - // Mappings of claims (key) that will be copied to a metadata field (value) - ClaimMappings map[string]interface{} `json:"claim_mappings"` - - // Duration in seconds of leeway when validating all claims to account for clock skew. Defaults to 60 (1 minute) if set to 0 and can be disabled if set to -1. - ClockSkewLeeway int32 `json:"clock_skew_leeway"` - - // Duration in seconds of leeway when validating expiration of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. - ExpirationLeeway int32 `json:"expiration_leeway"` - - // The claim to use for the Identity group alias names - GroupsClaim string `json:"groups_claim"` - - // Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. - MaxAge int32 `json:"max_age"` - - // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. - // Deprecated - MaxTtl int32 `json:"max_ttl"` - - // Duration in seconds of leeway when validating not before values of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. - NotBeforeLeeway int32 `json:"not_before_leeway"` - - // Use \"token_num_uses\" instead. If this and \"token_num_uses\" are both specified, only \"token_num_uses\" will be used. - // Deprecated - NumUses int32 `json:"num_uses"` - - // Comma-separated list of OIDC scopes - OidcScopes []string `json:"oidc_scopes"` - - // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. - // Deprecated - Period int32 `json:"period"` - - // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. - // Deprecated - Policies []string `json:"policies"` - - // Type of the role, either 'jwt' or 'oidc'. - RoleType string `json:"role_type"` - - // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. - TokenBoundCidrs []string `json:"token_bound_cidrs"` - - // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. - TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` - - // The maximum lifetime of the generated token - TokenMaxTtl int32 `json:"token_max_ttl"` - - // If true, the 'default' policy will not automatically be added to generated tokens - TokenNoDefaultPolicy bool `json:"token_no_default_policy"` - - // The maximum number of times a token may be used, a value of zero means unlimited - TokenNumUses int32 `json:"token_num_uses"` - - // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). - TokenPeriod int32 `json:"token_period"` - - // Comma-separated list of policies - TokenPolicies []string `json:"token_policies"` - - // The initial ttl of the token to generate - TokenTtl int32 `json:"token_ttl"` - - // The type of token to generate, service or batch - TokenType string `json:"token_type"` - - // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. - // Deprecated - Ttl int32 `json:"ttl"` - - // The claim to use for the Identity entity alias name - UserClaim string `json:"user_claim"` - - // If true, the user_claim value will use JSON pointer syntax for referencing claims. - UserClaimJsonPointer bool `json:"user_claim_json_pointer"` - - // Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. - VerboseOidcLogging bool `json:"verbose_oidc_logging"` -} - -// NewOIDCWriteAuthRoleRequestWithDefaults instantiates a new OIDCWriteAuthRoleRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewOIDCWriteAuthRoleRequestWithDefaults() *OIDCWriteAuthRoleRequest { - var this OIDCWriteAuthRoleRequest - - this.BoundClaimsType = "string" - this.ExpirationLeeway = 150 - this.NotBeforeLeeway = 150 - this.TokenType = "default-service" - - return &this -} - -func (o OIDCWriteAuthRoleRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["allowed_redirect_uris"] = o.AllowedRedirectUris - toSerialize["bound_audiences"] = o.BoundAudiences - toSerialize["bound_cidrs"] = o.BoundCidrs - toSerialize["bound_claims"] = o.BoundClaims - toSerialize["bound_claims_type"] = o.BoundClaimsType - toSerialize["bound_subject"] = o.BoundSubject - toSerialize["claim_mappings"] = o.ClaimMappings - toSerialize["clock_skew_leeway"] = o.ClockSkewLeeway - toSerialize["expiration_leeway"] = o.ExpirationLeeway - toSerialize["groups_claim"] = o.GroupsClaim - toSerialize["max_age"] = o.MaxAge - toSerialize["max_ttl"] = o.MaxTtl - toSerialize["not_before_leeway"] = o.NotBeforeLeeway - toSerialize["num_uses"] = o.NumUses - toSerialize["oidc_scopes"] = o.OidcScopes - toSerialize["period"] = o.Period - toSerialize["policies"] = o.Policies - toSerialize["role_type"] = o.RoleType - toSerialize["token_bound_cidrs"] = o.TokenBoundCidrs - toSerialize["token_explicit_max_ttl"] = o.TokenExplicitMaxTtl - toSerialize["token_max_ttl"] = o.TokenMaxTtl - toSerialize["token_no_default_policy"] = o.TokenNoDefaultPolicy - toSerialize["token_num_uses"] = o.TokenNumUses - toSerialize["token_period"] = o.TokenPeriod - toSerialize["token_policies"] = o.TokenPolicies - toSerialize["token_ttl"] = o.TokenTtl - toSerialize["token_type"] = o.TokenType - toSerialize["ttl"] = o.Ttl - toSerialize["user_claim"] = o.UserClaim - toSerialize["user_claim_json_pointer"] = o.UserClaimJsonPointer - toSerialize["verbose_oidc_logging"] = o.VerboseOidcLogging - - return json.Marshal(toSerialize) -} diff --git a/schema/model_oidc_write_callback_request.go b/schema/model_oidc_write_callback_request.go deleted file mode 100644 index 357411d5..00000000 --- a/schema/model_oidc_write_callback_request.go +++ /dev/null @@ -1,41 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// OIDCWriteCallbackRequest struct for OIDCWriteCallbackRequest -type OIDCWriteCallbackRequest struct { - ClientNonce string `json:"client_nonce"` - - Code string `json:"code"` - - IdToken string `json:"id_token"` - - State string `json:"state"` -} - -// NewOIDCWriteCallbackRequestWithDefaults instantiates a new OIDCWriteCallbackRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewOIDCWriteCallbackRequestWithDefaults() *OIDCWriteCallbackRequest { - var this OIDCWriteCallbackRequest - - return &this -} - -func (o OIDCWriteCallbackRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["client_nonce"] = o.ClientNonce - toSerialize["code"] = o.Code - toSerialize["id_token"] = o.IdToken - toSerialize["state"] = o.State - - return json.Marshal(toSerialize) -} diff --git a/schema/model_oidc_write_client_request.go b/schema/model_oidc_write_client_request.go index fcae9301..745b1c51 100644 --- a/schema/model_oidc_write_client_request.go +++ b/schema/model_oidc_write_client_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteClientRequest struct for OIDCWriteClientRequest -type OIDCWriteClientRequest struct { +// OidcWriteClientRequest struct for OidcWriteClientRequest +type OidcWriteClientRequest struct { // The time-to-live for access tokens obtained by the client. AccessTokenTtl int32 `json:"access_token_ttl"` @@ -30,11 +30,11 @@ type OIDCWriteClientRequest struct { RedirectUris []string `json:"redirect_uris"` } -// NewOIDCWriteClientRequestWithDefaults instantiates a new OIDCWriteClientRequest object +// NewOidcWriteClientRequestWithDefaults instantiates a new OidcWriteClientRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteClientRequestWithDefaults() *OIDCWriteClientRequest { - var this OIDCWriteClientRequest +func NewOidcWriteClientRequestWithDefaults() *OidcWriteClientRequest { + var this OidcWriteClientRequest this.ClientType = "confidential" this.Key = "default" @@ -42,7 +42,7 @@ func NewOIDCWriteClientRequestWithDefaults() *OIDCWriteClientRequest { return &this } -func (o OIDCWriteClientRequest) MarshalJSON() ([]byte, error) { +func (o OidcWriteClientRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["access_token_ttl"] = o.AccessTokenTtl diff --git a/schema/model_oidc_write_key_request.go b/schema/model_oidc_write_key_request.go index 99a60ee0..4574b063 100644 --- a/schema/model_oidc_write_key_request.go +++ b/schema/model_oidc_write_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteKeyRequest struct for OIDCWriteKeyRequest -type OIDCWriteKeyRequest struct { +// OidcWriteKeyRequest struct for OidcWriteKeyRequest +type OidcWriteKeyRequest struct { // Signing algorithm to use. This will default to RS256. Algorithm string `json:"algorithm"` @@ -24,18 +24,18 @@ type OIDCWriteKeyRequest struct { VerificationTtl int32 `json:"verification_ttl"` } -// NewOIDCWriteKeyRequestWithDefaults instantiates a new OIDCWriteKeyRequest object +// NewOidcWriteKeyRequestWithDefaults instantiates a new OidcWriteKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteKeyRequestWithDefaults() *OIDCWriteKeyRequest { - var this OIDCWriteKeyRequest +func NewOidcWriteKeyRequestWithDefaults() *OidcWriteKeyRequest { + var this OidcWriteKeyRequest this.Algorithm = "RS256" return &this } -func (o OIDCWriteKeyRequest) MarshalJSON() ([]byte, error) { +func (o OidcWriteKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm diff --git a/schema/model_oidc_write_provider_request.go b/schema/model_oidc_write_provider_request.go index de547ad2..46174aa7 100644 --- a/schema/model_oidc_write_provider_request.go +++ b/schema/model_oidc_write_provider_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteProviderRequest struct for OIDCWriteProviderRequest -type OIDCWriteProviderRequest struct { +// OidcWriteProviderRequest struct for OidcWriteProviderRequest +type OidcWriteProviderRequest struct { // The client IDs that are permitted to use the provider AllowedClientIds []string `json:"allowed_client_ids"` @@ -21,16 +21,16 @@ type OIDCWriteProviderRequest struct { ScopesSupported []string `json:"scopes_supported"` } -// NewOIDCWriteProviderRequestWithDefaults instantiates a new OIDCWriteProviderRequest object +// NewOidcWriteProviderRequestWithDefaults instantiates a new OidcWriteProviderRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteProviderRequestWithDefaults() *OIDCWriteProviderRequest { - var this OIDCWriteProviderRequest +func NewOidcWriteProviderRequestWithDefaults() *OidcWriteProviderRequest { + var this OidcWriteProviderRequest return &this } -func (o OIDCWriteProviderRequest) MarshalJSON() ([]byte, error) { +func (o OidcWriteProviderRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allowed_client_ids"] = o.AllowedClientIds diff --git a/schema/model_oidc_write_role_request.go b/schema/model_oidc_write_role_request.go index c16a497e..84e5c41d 100644 --- a/schema/model_oidc_write_role_request.go +++ b/schema/model_oidc_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteRoleRequest struct for OIDCWriteRoleRequest -type OIDCWriteRoleRequest struct { +// OidcWriteRoleRequest struct for OidcWriteRoleRequest +type OidcWriteRoleRequest struct { // Optional client_id ClientId string `json:"client_id"` @@ -24,16 +24,16 @@ type OIDCWriteRoleRequest struct { Ttl int32 `json:"ttl"` } -// NewOIDCWriteRoleRequestWithDefaults instantiates a new OIDCWriteRoleRequest object +// NewOidcWriteRoleRequestWithDefaults instantiates a new OidcWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteRoleRequestWithDefaults() *OIDCWriteRoleRequest { - var this OIDCWriteRoleRequest +func NewOidcWriteRoleRequestWithDefaults() *OidcWriteRoleRequest { + var this OidcWriteRoleRequest return &this } -func (o OIDCWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o OidcWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["client_id"] = o.ClientId diff --git a/schema/model_oidc_write_scope_request.go b/schema/model_oidc_write_scope_request.go index eff3d59b..e6d59629 100644 --- a/schema/model_oidc_write_scope_request.go +++ b/schema/model_oidc_write_scope_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OIDCWriteScopeRequest struct for OIDCWriteScopeRequest -type OIDCWriteScopeRequest struct { +// OidcWriteScopeRequest struct for OidcWriteScopeRequest +type OidcWriteScopeRequest struct { // The description of the scope Description string `json:"description"` @@ -18,16 +18,16 @@ type OIDCWriteScopeRequest struct { Template string `json:"template"` } -// NewOIDCWriteScopeRequestWithDefaults instantiates a new OIDCWriteScopeRequest object +// NewOidcWriteScopeRequestWithDefaults instantiates a new OidcWriteScopeRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOIDCWriteScopeRequestWithDefaults() *OIDCWriteScopeRequest { - var this OIDCWriteScopeRequest +func NewOidcWriteScopeRequestWithDefaults() *OidcWriteScopeRequest { + var this OidcWriteScopeRequest return &this } -func (o OIDCWriteScopeRequest) MarshalJSON() ([]byte, error) { +func (o OidcWriteScopeRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["description"] = o.Description diff --git a/schema/model_okta_write_config_request.go b/schema/model_okta_configure_request.go similarity index 91% rename from schema/model_okta_write_config_request.go rename to schema/model_okta_configure_request.go index 059d0ef1..06477763 100644 --- a/schema/model_okta_write_config_request.go +++ b/schema/model_okta_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// OktaWriteConfigRequest struct for OktaWriteConfigRequest -type OktaWriteConfigRequest struct { +// OktaConfigureRequest struct for OktaConfigureRequest +type OktaConfigureRequest struct { // Okta API key. ApiToken string `json:"api_token"` @@ -71,18 +71,18 @@ type OktaWriteConfigRequest struct { Ttl int32 `json:"ttl"` } -// NewOktaWriteConfigRequestWithDefaults instantiates a new OktaWriteConfigRequest object +// NewOktaConfigureRequestWithDefaults instantiates a new OktaConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewOktaWriteConfigRequestWithDefaults() *OktaWriteConfigRequest { - var this OktaWriteConfigRequest +func NewOktaConfigureRequestWithDefaults() *OktaConfigureRequest { + var this OktaConfigureRequest this.TokenType = "default-service" return &this } -func (o OktaWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o OktaConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["api_token"] = o.ApiToken diff --git a/schema/model_open_ldap_check_in_manage_library_request.go b/schema/model_open_ldap_check_in_manage_library_request.go deleted file mode 100644 index 7af2eded..00000000 --- a/schema/model_open_ldap_check_in_manage_library_request.go +++ /dev/null @@ -1,33 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// OpenLDAPCheckInManageLibraryRequest struct for OpenLDAPCheckInManageLibraryRequest -type OpenLDAPCheckInManageLibraryRequest struct { - // The username/logon name for the service accounts to check in. - ServiceAccountNames []string `json:"service_account_names"` -} - -// NewOpenLDAPCheckInManageLibraryRequestWithDefaults instantiates a new OpenLDAPCheckInManageLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewOpenLDAPCheckInManageLibraryRequestWithDefaults() *OpenLDAPCheckInManageLibraryRequest { - var this OpenLDAPCheckInManageLibraryRequest - - return &this -} - -func (o OpenLDAPCheckInManageLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["service_account_names"] = o.ServiceAccountNames - - return json.Marshal(toSerialize) -} diff --git a/schema/model_open_ldap_check_out_library_request.go b/schema/model_open_ldap_check_out_library_request.go deleted file mode 100644 index 73b77662..00000000 --- a/schema/model_open_ldap_check_out_library_request.go +++ /dev/null @@ -1,33 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// OpenLDAPCheckOutLibraryRequest struct for OpenLDAPCheckOutLibraryRequest -type OpenLDAPCheckOutLibraryRequest struct { - // The length of time before the check-out will expire, in seconds. - Ttl int32 `json:"ttl"` -} - -// NewOpenLDAPCheckOutLibraryRequestWithDefaults instantiates a new OpenLDAPCheckOutLibraryRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewOpenLDAPCheckOutLibraryRequestWithDefaults() *OpenLDAPCheckOutLibraryRequest { - var this OpenLDAPCheckOutLibraryRequest - - return &this -} - -func (o OpenLDAPCheckOutLibraryRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["ttl"] = o.Ttl - - return json.Marshal(toSerialize) -} diff --git a/schema/model_open_ldap_write_static_role_request.go b/schema/model_open_ldap_write_static_role_request.go deleted file mode 100644 index e93272e4..00000000 --- a/schema/model_open_ldap_write_static_role_request.go +++ /dev/null @@ -1,41 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// OpenLDAPWriteStaticRoleRequest struct for OpenLDAPWriteStaticRoleRequest -type OpenLDAPWriteStaticRoleRequest struct { - // The distinguished name of the entry to manage. - Dn string `json:"dn"` - - // Period for automatic credential rotation of the given entry. - RotationPeriod int32 `json:"rotation_period"` - - // The username/logon name for the entry with which this role will be associated. - Username string `json:"username"` -} - -// NewOpenLDAPWriteStaticRoleRequestWithDefaults instantiates a new OpenLDAPWriteStaticRoleRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewOpenLDAPWriteStaticRoleRequestWithDefaults() *OpenLDAPWriteStaticRoleRequest { - var this OpenLDAPWriteStaticRoleRequest - - return &this -} - -func (o OpenLDAPWriteStaticRoleRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["dn"] = o.Dn - toSerialize["rotation_period"] = o.RotationPeriod - toSerialize["username"] = o.Username - - return json.Marshal(toSerialize) -} diff --git a/schema/model_persona_write_request.go b/schema/model_persona_create_request.go similarity index 77% rename from schema/model_persona_write_request.go rename to schema/model_persona_create_request.go index 4e3b664d..e2c013ce 100644 --- a/schema/model_persona_write_request.go +++ b/schema/model_persona_create_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PersonaWriteRequest struct for PersonaWriteRequest -type PersonaWriteRequest struct { +// PersonaCreateRequest struct for PersonaCreateRequest +type PersonaCreateRequest struct { // Entity ID to which this persona belongs to EntityId string `json:"entity_id"` @@ -27,16 +27,16 @@ type PersonaWriteRequest struct { Name string `json:"name"` } -// NewPersonaWriteRequestWithDefaults instantiates a new PersonaWriteRequest object +// NewPersonaCreateRequestWithDefaults instantiates a new PersonaCreateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPersonaWriteRequestWithDefaults() *PersonaWriteRequest { - var this PersonaWriteRequest +func NewPersonaCreateRequestWithDefaults() *PersonaCreateRequest { + var this PersonaCreateRequest return &this } -func (o PersonaWriteRequest) MarshalJSON() ([]byte, error) { +func (o PersonaCreateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["entity_id"] = o.EntityId diff --git a/schema/model_persona_id_write_by_id_request.go b/schema/model_persona_update_by_id_request.go similarity index 74% rename from schema/model_persona_id_write_by_id_request.go rename to schema/model_persona_update_by_id_request.go index 8a411616..af66d58a 100644 --- a/schema/model_persona_id_write_by_id_request.go +++ b/schema/model_persona_update_by_id_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PersonaIDWriteByIDRequest struct for PersonaIDWriteByIDRequest -type PersonaIDWriteByIDRequest struct { +// PersonaUpdateByIdRequest struct for PersonaUpdateByIdRequest +type PersonaUpdateByIdRequest struct { // Entity ID to which this persona should be tied to EntityId string `json:"entity_id"` @@ -24,16 +24,16 @@ type PersonaIDWriteByIDRequest struct { Name string `json:"name"` } -// NewPersonaIDWriteByIDRequestWithDefaults instantiates a new PersonaIDWriteByIDRequest object +// NewPersonaUpdateByIdRequestWithDefaults instantiates a new PersonaUpdateByIdRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPersonaIDWriteByIDRequestWithDefaults() *PersonaIDWriteByIDRequest { - var this PersonaIDWriteByIDRequest +func NewPersonaUpdateByIdRequestWithDefaults() *PersonaUpdateByIdRequest { + var this PersonaUpdateByIdRequest return &this } -func (o PersonaIDWriteByIDRequest) MarshalJSON() ([]byte, error) { +func (o PersonaUpdateByIdRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["entity_id"] = o.EntityId diff --git a/schema/model_pki_write_auto_tidy_config_request.go b/schema/model_pki_configure_auto_tidy_request.go similarity index 50% rename from schema/model_pki_write_auto_tidy_config_request.go rename to schema/model_pki_configure_auto_tidy_request.go index 3c599445..a57ad4d6 100644 --- a/schema/model_pki_write_auto_tidy_config_request.go +++ b/schema/model_pki_configure_auto_tidy_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteAutoTidyConfigRequest struct for PKIWriteAutoTidyConfigRequest -type PKIWriteAutoTidyConfigRequest struct { +// PkiConfigureAutoTidyRequest struct for PkiConfigureAutoTidyRequest +type PkiConfigureAutoTidyRequest struct { // Set to true to enable automatic tidy operations. Enabled bool `json:"enabled"` @@ -20,21 +20,39 @@ type PKIWriteAutoTidyConfigRequest struct { // The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year). IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` + // This configures whether stored certificates are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained. + MaintainStoredCertificateCounts bool `json:"maintain_stored_certificate_counts"` + // The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds. PauseDuration string `json:"pause_duration"` + // This configures whether the stored certificate count is published to the metrics consumer. It does not affect if the stored certificate count is maintained, and if maintained, it will be available on the tidy-status endpoint. + PublishStoredCertificateCountMetrics bool `json:"publish_stored_certificate_count_metrics"` + + // The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal. Setting this too low may remove valid revocation requests before the owning cluster has a chance to process them, especially if the cluster is offline. + RevocationQueueSafetyBuffer int32 `json:"revocation_queue_safety_buffer"` + // The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours. SafetyBuffer int32 `json:"safety_buffer"` // Set to true to enable tidying up the certificate store TidyCertStore bool `json:"tidy_cert_store"` + // Set to true to enable tidying up the cross-cluster revoked certificate store. Only runs on the active primary node. + TidyCrossClusterRevokedCerts bool `json:"tidy_cross_cluster_revoked_certs"` + // Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation. TidyExpiredIssuers bool `json:"tidy_expired_issuers"` + // Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak. This prevents downgrades to pre-Vault 1.11 versions (as older PKI engines do not know about the new multi-issuer storage layout), but improves the performance on seal wrapped PKI mounts. This will only occur if at least issuer_safety_buffer time has occurred after the initial storage migration. This backup is saved in case of an issue in future migrations. Operators may consider removing it via sys/raw if they desire. The backup will be removed via a DELETE /root call, but note that this removes ALL issuers within the mount (and is thus not desirable in most operational scenarios). + TidyMoveLegacyCaBundle bool `json:"tidy_move_legacy_ca_bundle"` + // Deprecated; synonym for 'tidy_revoked_certs TidyRevocationList bool `json:"tidy_revocation_list"` + // Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster. Only runs on the active primary node + TidyRevocationQueue bool `json:"tidy_revocation_queue"` + // Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses. TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` @@ -42,31 +60,41 @@ type PKIWriteAutoTidyConfigRequest struct { TidyRevokedCerts bool `json:"tidy_revoked_certs"` } -// NewPKIWriteAutoTidyConfigRequestWithDefaults instantiates a new PKIWriteAutoTidyConfigRequest object +// NewPkiConfigureAutoTidyRequestWithDefaults instantiates a new PkiConfigureAutoTidyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteAutoTidyConfigRequestWithDefaults() *PKIWriteAutoTidyConfigRequest { - var this PKIWriteAutoTidyConfigRequest +func NewPkiConfigureAutoTidyRequestWithDefaults() *PkiConfigureAutoTidyRequest { + var this PkiConfigureAutoTidyRequest this.IntervalDuration = 43200 this.IssuerSafetyBuffer = 31536000 + this.MaintainStoredCertificateCounts = false this.PauseDuration = "0s" + this.PublishStoredCertificateCountMetrics = false + this.RevocationQueueSafetyBuffer = 172800 this.SafetyBuffer = 259200 + this.TidyRevocationQueue = false return &this } -func (o PKIWriteAutoTidyConfigRequest) MarshalJSON() ([]byte, error) { +func (o PkiConfigureAutoTidyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["enabled"] = o.Enabled toSerialize["interval_duration"] = o.IntervalDuration toSerialize["issuer_safety_buffer"] = o.IssuerSafetyBuffer + toSerialize["maintain_stored_certificate_counts"] = o.MaintainStoredCertificateCounts toSerialize["pause_duration"] = o.PauseDuration + toSerialize["publish_stored_certificate_count_metrics"] = o.PublishStoredCertificateCountMetrics + toSerialize["revocation_queue_safety_buffer"] = o.RevocationQueueSafetyBuffer toSerialize["safety_buffer"] = o.SafetyBuffer toSerialize["tidy_cert_store"] = o.TidyCertStore + toSerialize["tidy_cross_cluster_revoked_certs"] = o.TidyCrossClusterRevokedCerts toSerialize["tidy_expired_issuers"] = o.TidyExpiredIssuers + toSerialize["tidy_move_legacy_ca_bundle"] = o.TidyMoveLegacyCaBundle toSerialize["tidy_revocation_list"] = o.TidyRevocationList + toSerialize["tidy_revocation_queue"] = o.TidyRevocationQueue toSerialize["tidy_revoked_cert_issuer_associations"] = o.TidyRevokedCertIssuerAssociations toSerialize["tidy_revoked_certs"] = o.TidyRevokedCerts diff --git a/schema/model_pki_configure_auto_tidy_response.go b/schema/model_pki_configure_auto_tidy_response.go new file mode 100644 index 00000000..10eeb818 --- /dev/null +++ b/schema/model_pki_configure_auto_tidy_response.go @@ -0,0 +1,77 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiConfigureAutoTidyResponse struct for PkiConfigureAutoTidyResponse +type PkiConfigureAutoTidyResponse struct { + // Specifies whether automatic tidy is enabled or not + Enabled bool `json:"enabled"` + + // Specifies the duration between automatic tidy operation + IntervalDuration int32 `json:"interval_duration"` + + // Issuer safety buffer + IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` + + // Duration to pause between tidying certificates + PauseDuration string `json:"pause_duration"` + + RevocationQueueSafetyBuffer int32 `json:"revocation_queue_safety_buffer"` + + // Safety buffer time duration + SafetyBuffer int32 `json:"safety_buffer"` + + // Specifies whether to tidy up the certificate store + TidyCertStore bool `json:"tidy_cert_store"` + + TidyCrossClusterRevokedCerts bool `json:"tidy_cross_cluster_revoked_certs"` + + // Specifies whether tidy expired issuers + TidyExpiredIssuers bool `json:"tidy_expired_issuers"` + + TidyMoveLegacyCaBundle bool `json:"tidy_move_legacy_ca_bundle"` + + TidyRevocationQueue bool `json:"tidy_revocation_queue"` + + // Specifies whether to associate revoked certificates with their corresponding issuers + TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` + + // Specifies whether to remove all invalid and expired certificates from storage + TidyRevokedCerts bool `json:"tidy_revoked_certs"` +} + +// NewPkiConfigureAutoTidyResponseWithDefaults instantiates a new PkiConfigureAutoTidyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiConfigureAutoTidyResponseWithDefaults() *PkiConfigureAutoTidyResponse { + var this PkiConfigureAutoTidyResponse + + return &this +} + +func (o PkiConfigureAutoTidyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["enabled"] = o.Enabled + toSerialize["interval_duration"] = o.IntervalDuration + toSerialize["issuer_safety_buffer"] = o.IssuerSafetyBuffer + toSerialize["pause_duration"] = o.PauseDuration + toSerialize["revocation_queue_safety_buffer"] = o.RevocationQueueSafetyBuffer + toSerialize["safety_buffer"] = o.SafetyBuffer + toSerialize["tidy_cert_store"] = o.TidyCertStore + toSerialize["tidy_cross_cluster_revoked_certs"] = o.TidyCrossClusterRevokedCerts + toSerialize["tidy_expired_issuers"] = o.TidyExpiredIssuers + toSerialize["tidy_move_legacy_ca_bundle"] = o.TidyMoveLegacyCaBundle + toSerialize["tidy_revocation_queue"] = o.TidyRevocationQueue + toSerialize["tidy_revoked_cert_issuer_associations"] = o.TidyRevokedCertIssuerAssociations + toSerialize["tidy_revoked_certs"] = o.TidyRevokedCerts + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_ca_config_request.go b/schema/model_pki_configure_ca_request.go similarity index 62% rename from schema/model_pki_write_ca_config_request.go rename to schema/model_pki_configure_ca_request.go index 80cfd111..5792c6d5 100644 --- a/schema/model_pki_write_ca_config_request.go +++ b/schema/model_pki_configure_ca_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// PKIWriteCAConfigRequest struct for PKIWriteCAConfigRequest -type PKIWriteCAConfigRequest struct { +// PkiConfigureCaRequest struct for PkiConfigureCaRequest +type PkiConfigureCaRequest struct { // PEM-format, concatenated unencrypted secret key and certificate. PemBundle string `json:"pem_bundle"` } -// NewPKIWriteCAConfigRequestWithDefaults instantiates a new PKIWriteCAConfigRequest object +// NewPkiConfigureCaRequestWithDefaults instantiates a new PkiConfigureCaRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteCAConfigRequestWithDefaults() *PKIWriteCAConfigRequest { - var this PKIWriteCAConfigRequest +func NewPkiConfigureCaRequestWithDefaults() *PkiConfigureCaRequest { + var this PkiConfigureCaRequest return &this } -func (o PKIWriteCAConfigRequest) MarshalJSON() ([]byte, error) { +func (o PkiConfigureCaRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["pem_bundle"] = o.PemBundle diff --git a/schema/model_pki_configure_ca_response.go b/schema/model_pki_configure_ca_response.go new file mode 100644 index 00000000..bf360b71 --- /dev/null +++ b/schema/model_pki_configure_ca_response.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiConfigureCaResponse struct for PkiConfigureCaResponse +type PkiConfigureCaResponse struct { + // Net-new issuers imported as a part of this request + ImportedIssuers []string `json:"imported_issuers"` + + // Net-new keys imported as a part of this request + ImportedKeys []string `json:"imported_keys"` + + // A mapping of issuer_id to key_id for all issuers included in this request + Mapping map[string]interface{} `json:"mapping"` +} + +// NewPkiConfigureCaResponseWithDefaults instantiates a new PkiConfigureCaResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiConfigureCaResponseWithDefaults() *PkiConfigureCaResponse { + var this PkiConfigureCaResponse + + return &this +} + +func (o PkiConfigureCaResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["imported_issuers"] = o.ImportedIssuers + toSerialize["imported_keys"] = o.ImportedKeys + toSerialize["mapping"] = o.Mapping + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_cluster_config_request.go b/schema/model_pki_configure_cluster_request.go similarity index 54% rename from schema/model_pki_write_cluster_config_request.go rename to schema/model_pki_configure_cluster_request.go index 1d7ae653..8c18bcc4 100644 --- a/schema/model_pki_write_cluster_config_request.go +++ b/schema/model_pki_configure_cluster_request.go @@ -9,24 +9,28 @@ import ( "encoding/json" ) -// PKIWriteClusterConfigRequest struct for PKIWriteClusterConfigRequest -type PKIWriteClusterConfigRequest struct { +// PkiConfigureClusterRequest struct for PkiConfigureClusterRequest +type PkiConfigureClusterRequest struct { + // Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki + AiaPath string `json:"aia_path"` + // Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki Path string `json:"path"` } -// NewPKIWriteClusterConfigRequestWithDefaults instantiates a new PKIWriteClusterConfigRequest object +// NewPkiConfigureClusterRequestWithDefaults instantiates a new PkiConfigureClusterRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteClusterConfigRequestWithDefaults() *PKIWriteClusterConfigRequest { - var this PKIWriteClusterConfigRequest +func NewPkiConfigureClusterRequestWithDefaults() *PkiConfigureClusterRequest { + var this PkiConfigureClusterRequest return &this } -func (o PKIWriteClusterConfigRequest) MarshalJSON() ([]byte, error) { +func (o PkiConfigureClusterRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) + toSerialize["aia_path"] = o.AiaPath toSerialize["path"] = o.Path return json.Marshal(toSerialize) diff --git a/schema/model_pki_configure_cluster_response.go b/schema/model_pki_configure_cluster_response.go new file mode 100644 index 00000000..0f89b2d2 --- /dev/null +++ b/schema/model_pki_configure_cluster_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiConfigureClusterResponse struct for PkiConfigureClusterResponse +type PkiConfigureClusterResponse struct { + // Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki + AiaPath string `json:"aia_path"` + + // Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki + Path string `json:"path"` +} + +// NewPkiConfigureClusterResponseWithDefaults instantiates a new PkiConfigureClusterResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiConfigureClusterResponseWithDefaults() *PkiConfigureClusterResponse { + var this PkiConfigureClusterResponse + + return &this +} + +func (o PkiConfigureClusterResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["aia_path"] = o.AiaPath + toSerialize["path"] = o.Path + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_configure_crl_request.go b/schema/model_pki_configure_crl_request.go new file mode 100644 index 00000000..c74bb5e2 --- /dev/null +++ b/schema/model_pki_configure_crl_request.go @@ -0,0 +1,80 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiConfigureCrlRequest struct for PkiConfigureCrlRequest +type PkiConfigureCrlRequest struct { + // If set to true, enables automatic rebuilding of the CRL + AutoRebuild bool `json:"auto_rebuild"` + + // The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h. + AutoRebuildGracePeriod string `json:"auto_rebuild_grace_period"` + + // Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true. + CrossClusterRevocation bool `json:"cross_cluster_revocation"` + + // The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m. + DeltaRebuildInterval string `json:"delta_rebuild_interval"` + + // If set to true, disables generating the CRL entirely. + Disable bool `json:"disable"` + + // Whether to enable delta CRLs between authoritative CRL rebuilds + EnableDelta bool `json:"enable_delta"` + + // The amount of time the generated CRL should be valid; defaults to 72 hours + Expiry string `json:"expiry"` + + // If set to true, ocsp unauthorized responses will be returned. + OcspDisable bool `json:"ocsp_disable"` + + // The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours + OcspExpiry string `json:"ocsp_expiry"` + + // If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP. + UnifiedCrl bool `json:"unified_crl"` + + // If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data + UnifiedCrlOnExistingPaths bool `json:"unified_crl_on_existing_paths"` +} + +// NewPkiConfigureCrlRequestWithDefaults instantiates a new PkiConfigureCrlRequest object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiConfigureCrlRequestWithDefaults() *PkiConfigureCrlRequest { + var this PkiConfigureCrlRequest + + this.AutoRebuildGracePeriod = "12h" + this.DeltaRebuildInterval = "15m" + this.Expiry = "72h" + this.OcspExpiry = "1h" + this.UnifiedCrl = false + this.UnifiedCrlOnExistingPaths = false + + return &this +} + +func (o PkiConfigureCrlRequest) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["auto_rebuild"] = o.AutoRebuild + toSerialize["auto_rebuild_grace_period"] = o.AutoRebuildGracePeriod + toSerialize["cross_cluster_revocation"] = o.CrossClusterRevocation + toSerialize["delta_rebuild_interval"] = o.DeltaRebuildInterval + toSerialize["disable"] = o.Disable + toSerialize["enable_delta"] = o.EnableDelta + toSerialize["expiry"] = o.Expiry + toSerialize["ocsp_disable"] = o.OcspDisable + toSerialize["ocsp_expiry"] = o.OcspExpiry + toSerialize["unified_crl"] = o.UnifiedCrl + toSerialize["unified_crl_on_existing_paths"] = o.UnifiedCrlOnExistingPaths + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_crl_config_request.go b/schema/model_pki_configure_crl_response.go similarity index 63% rename from schema/model_pki_write_crl_config_request.go rename to schema/model_pki_configure_crl_response.go index 573ebf23..94b13a9f 100644 --- a/schema/model_pki_write_crl_config_request.go +++ b/schema/model_pki_configure_crl_response.go @@ -9,14 +9,17 @@ import ( "encoding/json" ) -// PKIWriteCRLConfigRequest struct for PKIWriteCRLConfigRequest -type PKIWriteCRLConfigRequest struct { +// PkiConfigureCrlResponse struct for PkiConfigureCrlResponse +type PkiConfigureCrlResponse struct { // If set to true, enables automatic rebuilding of the CRL AutoRebuild bool `json:"auto_rebuild"` // The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h. AutoRebuildGracePeriod string `json:"auto_rebuild_grace_period"` + // Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true. + CrossClusterRevocation bool `json:"cross_cluster_revocation"` + // The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m. DeltaRebuildInterval string `json:"delta_rebuild_interval"` @@ -34,13 +37,19 @@ type PKIWriteCRLConfigRequest struct { // The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours OcspExpiry string `json:"ocsp_expiry"` + + // If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP. + UnifiedCrl bool `json:"unified_crl"` + + // If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data + UnifiedCrlOnExistingPaths bool `json:"unified_crl_on_existing_paths"` } -// NewPKIWriteCRLConfigRequestWithDefaults instantiates a new PKIWriteCRLConfigRequest object +// NewPkiConfigureCrlResponseWithDefaults instantiates a new PkiConfigureCrlResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteCRLConfigRequestWithDefaults() *PKIWriteCRLConfigRequest { - var this PKIWriteCRLConfigRequest +func NewPkiConfigureCrlResponseWithDefaults() *PkiConfigureCrlResponse { + var this PkiConfigureCrlResponse this.AutoRebuildGracePeriod = "12h" this.DeltaRebuildInterval = "15m" @@ -50,17 +59,20 @@ func NewPKIWriteCRLConfigRequestWithDefaults() *PKIWriteCRLConfigRequest { return &this } -func (o PKIWriteCRLConfigRequest) MarshalJSON() ([]byte, error) { +func (o PkiConfigureCrlResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["auto_rebuild"] = o.AutoRebuild toSerialize["auto_rebuild_grace_period"] = o.AutoRebuildGracePeriod + toSerialize["cross_cluster_revocation"] = o.CrossClusterRevocation toSerialize["delta_rebuild_interval"] = o.DeltaRebuildInterval toSerialize["disable"] = o.Disable toSerialize["enable_delta"] = o.EnableDelta toSerialize["expiry"] = o.Expiry toSerialize["ocsp_disable"] = o.OcspDisable toSerialize["ocsp_expiry"] = o.OcspExpiry + toSerialize["unified_crl"] = o.UnifiedCrl + toSerialize["unified_crl_on_existing_paths"] = o.UnifiedCrlOnExistingPaths return json.Marshal(toSerialize) } diff --git a/schema/model_pki_write_issuers_config_request.go b/schema/model_pki_configure_issuers_request.go similarity index 68% rename from schema/model_pki_write_issuers_config_request.go rename to schema/model_pki_configure_issuers_request.go index aed9c397..9b1a7a2c 100644 --- a/schema/model_pki_write_issuers_config_request.go +++ b/schema/model_pki_configure_issuers_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteIssuersConfigRequest struct for PKIWriteIssuersConfigRequest -type PKIWriteIssuersConfigRequest struct { +// PkiConfigureIssuersRequest struct for PkiConfigureIssuersRequest +type PkiConfigureIssuersRequest struct { // Reference (name or identifier) to the default issuer. Default string `json:"default"` @@ -18,18 +18,18 @@ type PKIWriteIssuersConfigRequest struct { DefaultFollowsLatestIssuer bool `json:"default_follows_latest_issuer"` } -// NewPKIWriteIssuersConfigRequestWithDefaults instantiates a new PKIWriteIssuersConfigRequest object +// NewPkiConfigureIssuersRequestWithDefaults instantiates a new PkiConfigureIssuersRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteIssuersConfigRequestWithDefaults() *PKIWriteIssuersConfigRequest { - var this PKIWriteIssuersConfigRequest +func NewPkiConfigureIssuersRequestWithDefaults() *PkiConfigureIssuersRequest { + var this PkiConfigureIssuersRequest this.DefaultFollowsLatestIssuer = false return &this } -func (o PKIWriteIssuersConfigRequest) MarshalJSON() ([]byte, error) { +func (o PkiConfigureIssuersRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["default"] = o.Default diff --git a/schema/model_pki_configure_issuers_response.go b/schema/model_pki_configure_issuers_response.go new file mode 100644 index 00000000..007ef7b6 --- /dev/null +++ b/schema/model_pki_configure_issuers_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiConfigureIssuersResponse struct for PkiConfigureIssuersResponse +type PkiConfigureIssuersResponse struct { + // Reference (name or identifier) to the default issuer. + Default string `json:"default"` + + // Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false. + DefaultFollowsLatestIssuer bool `json:"default_follows_latest_issuer"` +} + +// NewPkiConfigureIssuersResponseWithDefaults instantiates a new PkiConfigureIssuersResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiConfigureIssuersResponseWithDefaults() *PkiConfigureIssuersResponse { + var this PkiConfigureIssuersResponse + + return &this +} + +func (o PkiConfigureIssuersResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["default"] = o.Default + toSerialize["default_follows_latest_issuer"] = o.DefaultFollowsLatestIssuer + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_keys_config_request.go b/schema/model_pki_configure_keys_request.go similarity index 60% rename from schema/model_pki_write_keys_config_request.go rename to schema/model_pki_configure_keys_request.go index d5adcc47..9e6a411f 100644 --- a/schema/model_pki_write_keys_config_request.go +++ b/schema/model_pki_configure_keys_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// PKIWriteKeysConfigRequest struct for PKIWriteKeysConfigRequest -type PKIWriteKeysConfigRequest struct { +// PkiConfigureKeysRequest struct for PkiConfigureKeysRequest +type PkiConfigureKeysRequest struct { // Reference (name or identifier) of the default key. Default string `json:"default"` } -// NewPKIWriteKeysConfigRequestWithDefaults instantiates a new PKIWriteKeysConfigRequest object +// NewPkiConfigureKeysRequestWithDefaults instantiates a new PkiConfigureKeysRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteKeysConfigRequestWithDefaults() *PKIWriteKeysConfigRequest { - var this PKIWriteKeysConfigRequest +func NewPkiConfigureKeysRequestWithDefaults() *PkiConfigureKeysRequest { + var this PkiConfigureKeysRequest return &this } -func (o PKIWriteKeysConfigRequest) MarshalJSON() ([]byte, error) { +func (o PkiConfigureKeysRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["default"] = o.Default diff --git a/schema/model_pki_configure_keys_response.go b/schema/model_pki_configure_keys_response.go new file mode 100644 index 00000000..4f3f3506 --- /dev/null +++ b/schema/model_pki_configure_keys_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiConfigureKeysResponse struct for PkiConfigureKeysResponse +type PkiConfigureKeysResponse struct { + // Reference (name or identifier) to the default issuer. + Default string `json:"default"` +} + +// NewPkiConfigureKeysResponseWithDefaults instantiates a new PkiConfigureKeysResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiConfigureKeysResponseWithDefaults() *PkiConfigureKeysResponse { + var this PkiConfigureKeysResponse + + return &this +} + +func (o PkiConfigureKeysResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["default"] = o.Default + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_configure_urls_request.go b/schema/model_pki_configure_urls_request.go new file mode 100644 index 00000000..f4d8eccc --- /dev/null +++ b/schema/model_pki_configure_urls_request.go @@ -0,0 +1,47 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiConfigureUrlsRequest struct for PkiConfigureUrlsRequest +type PkiConfigureUrlsRequest struct { + // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. + CrlDistributionPoints []string `json:"crl_distribution_points"` + + // Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}', '{{cluster_path}}', and '{{cluster_aia_path}}' are available, but the addresses are not checked for URI validity until issuance time. Using '{{cluster_path}}' requires /config/cluster's 'path' member to be set on all PR Secondary clusters and using '{{cluster_aia_path}}' requires /config/cluster's 'aia_path' member to be set on all PR secondary clusters. + EnableTemplating bool `json:"enable_templating"` + + // Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. + IssuingCertificates []string `json:"issuing_certificates"` + + // Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. + OcspServers []string `json:"ocsp_servers"` +} + +// NewPkiConfigureUrlsRequestWithDefaults instantiates a new PkiConfigureUrlsRequest object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiConfigureUrlsRequestWithDefaults() *PkiConfigureUrlsRequest { + var this PkiConfigureUrlsRequest + + this.EnableTemplating = false + + return &this +} + +func (o PkiConfigureUrlsRequest) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl_distribution_points"] = o.CrlDistributionPoints + toSerialize["enable_templating"] = o.EnableTemplating + toSerialize["issuing_certificates"] = o.IssuingCertificates + toSerialize["ocsp_servers"] = o.OcspServers + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_url_config_request.go b/schema/model_pki_configure_urls_response.go similarity index 81% rename from schema/model_pki_write_url_config_request.go rename to schema/model_pki_configure_urls_response.go index 71b9109a..6bc56ee6 100644 --- a/schema/model_pki_write_url_config_request.go +++ b/schema/model_pki_configure_urls_response.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteURLConfigRequest struct for PKIWriteURLConfigRequest -type PKIWriteURLConfigRequest struct { +// PkiConfigureUrlsResponse struct for PkiConfigureUrlsResponse +type PkiConfigureUrlsResponse struct { // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. CrlDistributionPoints []string `json:"crl_distribution_points"` @@ -24,18 +24,18 @@ type PKIWriteURLConfigRequest struct { OcspServers []string `json:"ocsp_servers"` } -// NewPKIWriteURLConfigRequestWithDefaults instantiates a new PKIWriteURLConfigRequest object +// NewPkiConfigureUrlsResponseWithDefaults instantiates a new PkiConfigureUrlsResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteURLConfigRequestWithDefaults() *PKIWriteURLConfigRequest { - var this PKIWriteURLConfigRequest +func NewPkiConfigureUrlsResponseWithDefaults() *PkiConfigureUrlsResponse { + var this PkiConfigureUrlsResponse this.EnableTemplating = false return &this } -func (o PKIWriteURLConfigRequest) MarshalJSON() ([]byte, error) { +func (o PkiConfigureUrlsResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["crl_distribution_points"] = o.CrlDistributionPoints diff --git a/schema/model_pki_write_intermediate_cross_sign_request.go b/schema/model_pki_cross_sign_intermediate_request.go similarity index 93% rename from schema/model_pki_write_intermediate_cross_sign_request.go rename to schema/model_pki_cross_sign_intermediate_request.go index 632f43a1..fff8ea96 100644 --- a/schema/model_pki_write_intermediate_cross_sign_request.go +++ b/schema/model_pki_cross_sign_intermediate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteIntermediateCrossSignRequest struct for PKIWriteIntermediateCrossSignRequest -type PKIWriteIntermediateCrossSignRequest struct { +// PkiCrossSignIntermediateRequest struct for PkiCrossSignIntermediateRequest +type PkiCrossSignIntermediateRequest struct { // Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. AddBasicConstraints bool `json:"add_basic_constraints"` @@ -96,11 +96,11 @@ type PKIWriteIntermediateCrossSignRequest struct { UriSans []string `json:"uri_sans"` } -// NewPKIWriteIntermediateCrossSignRequestWithDefaults instantiates a new PKIWriteIntermediateCrossSignRequest object +// NewPkiCrossSignIntermediateRequestWithDefaults instantiates a new PkiCrossSignIntermediateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteIntermediateCrossSignRequestWithDefaults() *PKIWriteIntermediateCrossSignRequest { - var this PKIWriteIntermediateCrossSignRequest +func NewPkiCrossSignIntermediateRequestWithDefaults() *PkiCrossSignIntermediateRequest { + var this PkiCrossSignIntermediateRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -114,7 +114,7 @@ func NewPKIWriteIntermediateCrossSignRequestWithDefaults() *PKIWriteIntermediate return &this } -func (o PKIWriteIntermediateCrossSignRequest) MarshalJSON() ([]byte, error) { +func (o PkiCrossSignIntermediateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["add_basic_constraints"] = o.AddBasicConstraints diff --git a/schema/model_pki_cross_sign_intermediate_response.go b/schema/model_pki_cross_sign_intermediate_response.go new file mode 100644 index 00000000..31bbd824 --- /dev/null +++ b/schema/model_pki_cross_sign_intermediate_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiCrossSignIntermediateResponse struct for PkiCrossSignIntermediateResponse +type PkiCrossSignIntermediateResponse struct { + // Certificate signing request. + Csr string `json:"csr"` + + // Id of the key. + KeyId string `json:"key_id"` + + // Generated private key. + PrivateKey string `json:"private_key"` + + // Specifies the format used for marshaling the private key. + PrivateKeyType string `json:"private_key_type"` +} + +// NewPkiCrossSignIntermediateResponseWithDefaults instantiates a new PkiCrossSignIntermediateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiCrossSignIntermediateResponseWithDefaults() *PkiCrossSignIntermediateResponse { + var this PkiCrossSignIntermediateResponse + + return &this +} + +func (o PkiCrossSignIntermediateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["csr"] = o.Csr + toSerialize["key_id"] = o.KeyId + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_internal_exported_request.go b/schema/model_pki_generate_exported_key_request.go similarity index 78% rename from schema/model_pki_write_internal_exported_request.go rename to schema/model_pki_generate_exported_key_request.go index 598195a5..96135e36 100644 --- a/schema/model_pki_write_internal_exported_request.go +++ b/schema/model_pki_generate_exported_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteInternalExportedRequest struct for PKIWriteInternalExportedRequest -type PKIWriteInternalExportedRequest struct { +// PkiGenerateExportedKeyRequest struct for PkiGenerateExportedKeyRequest +type PkiGenerateExportedKeyRequest struct { // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` @@ -27,11 +27,11 @@ type PKIWriteInternalExportedRequest struct { ManagedKeyName string `json:"managed_key_name"` } -// NewPKIWriteInternalExportedRequestWithDefaults instantiates a new PKIWriteInternalExportedRequest object +// NewPkiGenerateExportedKeyRequestWithDefaults instantiates a new PkiGenerateExportedKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteInternalExportedRequestWithDefaults() *PKIWriteInternalExportedRequest { - var this PKIWriteInternalExportedRequest +func NewPkiGenerateExportedKeyRequestWithDefaults() *PkiGenerateExportedKeyRequest { + var this PkiGenerateExportedKeyRequest this.KeyBits = 0 this.KeyType = "rsa" @@ -39,7 +39,7 @@ func NewPKIWriteInternalExportedRequestWithDefaults() *PKIWriteInternalExportedR return &this } -func (o PKIWriteInternalExportedRequest) MarshalJSON() ([]byte, error) { +func (o PkiGenerateExportedKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key_bits"] = o.KeyBits diff --git a/schema/model_pki_generate_exported_key_response.go b/schema/model_pki_generate_exported_key_response.go new file mode 100644 index 00000000..1f1a108e --- /dev/null +++ b/schema/model_pki_generate_exported_key_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiGenerateExportedKeyResponse struct for PkiGenerateExportedKeyResponse +type PkiGenerateExportedKeyResponse struct { + // ID assigned to this key. + KeyId string `json:"key_id"` + + // Name assigned to this key. + KeyName string `json:"key_name"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. + KeyType string `json:"key_type"` + + // The private key string + PrivateKey string `json:"private_key"` +} + +// NewPkiGenerateExportedKeyResponseWithDefaults instantiates a new PkiGenerateExportedKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiGenerateExportedKeyResponseWithDefaults() *PkiGenerateExportedKeyResponse { + var this PkiGenerateExportedKeyResponse + + return &this +} + +func (o PkiGenerateExportedKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["key_type"] = o.KeyType + toSerialize["private_key"] = o.PrivateKey + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_intermediate_generate_request.go b/schema/model_pki_generate_intermediate_request.go similarity index 93% rename from schema/model_pki_write_intermediate_generate_request.go rename to schema/model_pki_generate_intermediate_request.go index ab7aaa01..041c378b 100644 --- a/schema/model_pki_write_intermediate_generate_request.go +++ b/schema/model_pki_generate_intermediate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteIntermediateGenerateRequest struct for PKIWriteIntermediateGenerateRequest -type PKIWriteIntermediateGenerateRequest struct { +// PkiGenerateIntermediateRequest struct for PkiGenerateIntermediateRequest +type PkiGenerateIntermediateRequest struct { // Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. AddBasicConstraints bool `json:"add_basic_constraints"` @@ -93,11 +93,11 @@ type PKIWriteIntermediateGenerateRequest struct { UriSans []string `json:"uri_sans"` } -// NewPKIWriteIntermediateGenerateRequestWithDefaults instantiates a new PKIWriteIntermediateGenerateRequest object +// NewPkiGenerateIntermediateRequestWithDefaults instantiates a new PkiGenerateIntermediateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteIntermediateGenerateRequestWithDefaults() *PKIWriteIntermediateGenerateRequest { - var this PKIWriteIntermediateGenerateRequest +func NewPkiGenerateIntermediateRequestWithDefaults() *PkiGenerateIntermediateRequest { + var this PkiGenerateIntermediateRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -111,7 +111,7 @@ func NewPKIWriteIntermediateGenerateRequestWithDefaults() *PKIWriteIntermediateG return &this } -func (o PKIWriteIntermediateGenerateRequest) MarshalJSON() ([]byte, error) { +func (o PkiGenerateIntermediateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["add_basic_constraints"] = o.AddBasicConstraints diff --git a/schema/model_pki_generate_intermediate_response.go b/schema/model_pki_generate_intermediate_response.go new file mode 100644 index 00000000..4be31320 --- /dev/null +++ b/schema/model_pki_generate_intermediate_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiGenerateIntermediateResponse struct for PkiGenerateIntermediateResponse +type PkiGenerateIntermediateResponse struct { + // Certificate signing request. + Csr string `json:"csr"` + + // Id of the key. + KeyId string `json:"key_id"` + + // Generated private key. + PrivateKey string `json:"private_key"` + + // Specifies the format used for marshaling the private key. + PrivateKeyType string `json:"private_key_type"` +} + +// NewPkiGenerateIntermediateResponseWithDefaults instantiates a new PkiGenerateIntermediateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiGenerateIntermediateResponseWithDefaults() *PkiGenerateIntermediateResponse { + var this PkiGenerateIntermediateResponse + + return &this +} + +func (o PkiGenerateIntermediateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["csr"] = o.Csr + toSerialize["key_id"] = o.KeyId + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_generate_internal_key_request.go b/schema/model_pki_generate_internal_key_request.go new file mode 100644 index 00000000..badbb75f --- /dev/null +++ b/schema/model_pki_generate_internal_key_request.go @@ -0,0 +1,52 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiGenerateInternalKeyRequest struct for PkiGenerateInternalKeyRequest +type PkiGenerateInternalKeyRequest struct { + // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. + KeyBits int32 `json:"key_bits"` + + // Optional name to be used for this key + KeyName string `json:"key_name"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. + KeyType string `json:"key_type"` + + // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. + ManagedKeyId string `json:"managed_key_id"` + + // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. + ManagedKeyName string `json:"managed_key_name"` +} + +// NewPkiGenerateInternalKeyRequestWithDefaults instantiates a new PkiGenerateInternalKeyRequest object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiGenerateInternalKeyRequestWithDefaults() *PkiGenerateInternalKeyRequest { + var this PkiGenerateInternalKeyRequest + + this.KeyBits = 0 + this.KeyType = "rsa" + + return &this +} + +func (o PkiGenerateInternalKeyRequest) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_bits"] = o.KeyBits + toSerialize["key_name"] = o.KeyName + toSerialize["key_type"] = o.KeyType + toSerialize["managed_key_id"] = o.ManagedKeyId + toSerialize["managed_key_name"] = o.ManagedKeyName + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_generate_internal_key_response.go b/schema/model_pki_generate_internal_key_response.go new file mode 100644 index 00000000..6aab6cca --- /dev/null +++ b/schema/model_pki_generate_internal_key_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiGenerateInternalKeyResponse struct for PkiGenerateInternalKeyResponse +type PkiGenerateInternalKeyResponse struct { + // ID assigned to this key. + KeyId string `json:"key_id"` + + // Name assigned to this key. + KeyName string `json:"key_name"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. + KeyType string `json:"key_type"` + + // The private key string + PrivateKey string `json:"private_key"` +} + +// NewPkiGenerateInternalKeyResponseWithDefaults instantiates a new PkiGenerateInternalKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiGenerateInternalKeyResponseWithDefaults() *PkiGenerateInternalKeyResponse { + var this PkiGenerateInternalKeyResponse + + return &this +} + +func (o PkiGenerateInternalKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["key_type"] = o.KeyType + toSerialize["private_key"] = o.PrivateKey + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_kms_request.go b/schema/model_pki_generate_kms_key_request.go similarity index 81% rename from schema/model_pki_write_kms_request.go rename to schema/model_pki_generate_kms_key_request.go index 1adf3fe8..a731ad8f 100644 --- a/schema/model_pki_write_kms_request.go +++ b/schema/model_pki_generate_kms_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteKMSRequest struct for PKIWriteKMSRequest -type PKIWriteKMSRequest struct { +// PkiGenerateKmsKeyRequest struct for PkiGenerateKmsKeyRequest +type PkiGenerateKmsKeyRequest struct { // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` @@ -27,11 +27,11 @@ type PKIWriteKMSRequest struct { ManagedKeyName string `json:"managed_key_name"` } -// NewPKIWriteKMSRequestWithDefaults instantiates a new PKIWriteKMSRequest object +// NewPkiGenerateKmsKeyRequestWithDefaults instantiates a new PkiGenerateKmsKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteKMSRequestWithDefaults() *PKIWriteKMSRequest { - var this PKIWriteKMSRequest +func NewPkiGenerateKmsKeyRequestWithDefaults() *PkiGenerateKmsKeyRequest { + var this PkiGenerateKmsKeyRequest this.KeyBits = 0 this.KeyType = "rsa" @@ -39,7 +39,7 @@ func NewPKIWriteKMSRequestWithDefaults() *PKIWriteKMSRequest { return &this } -func (o PKIWriteKMSRequest) MarshalJSON() ([]byte, error) { +func (o PkiGenerateKmsKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key_bits"] = o.KeyBits diff --git a/schema/model_pki_generate_kms_key_response.go b/schema/model_pki_generate_kms_key_response.go new file mode 100644 index 00000000..174f34e9 --- /dev/null +++ b/schema/model_pki_generate_kms_key_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiGenerateKmsKeyResponse struct for PkiGenerateKmsKeyResponse +type PkiGenerateKmsKeyResponse struct { + // ID assigned to this key. + KeyId string `json:"key_id"` + + // Name assigned to this key. + KeyName string `json:"key_name"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. + KeyType string `json:"key_type"` + + // The private key string + PrivateKey string `json:"private_key"` +} + +// NewPkiGenerateKmsKeyResponseWithDefaults instantiates a new PkiGenerateKmsKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiGenerateKmsKeyResponseWithDefaults() *PkiGenerateKmsKeyResponse { + var this PkiGenerateKmsKeyResponse + + return &this +} + +func (o PkiGenerateKmsKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["key_type"] = o.KeyType + toSerialize["private_key"] = o.PrivateKey + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_generate_root_request.go b/schema/model_pki_generate_root_request.go index 2b82a9b3..ec27ae73 100644 --- a/schema/model_pki_generate_root_request.go +++ b/schema/model_pki_generate_root_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIGenerateRootRequest struct for PKIGenerateRootRequest -type PKIGenerateRootRequest struct { +// PkiGenerateRootRequest struct for PkiGenerateRootRequest +type PkiGenerateRootRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` @@ -102,11 +102,11 @@ type PKIGenerateRootRequest struct { UsePss bool `json:"use_pss"` } -// NewPKIGenerateRootRequestWithDefaults instantiates a new PKIGenerateRootRequest object +// NewPkiGenerateRootRequestWithDefaults instantiates a new PkiGenerateRootRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIGenerateRootRequestWithDefaults() *PKIGenerateRootRequest { - var this PKIGenerateRootRequest +func NewPkiGenerateRootRequestWithDefaults() *PkiGenerateRootRequest { + var this PkiGenerateRootRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -122,7 +122,7 @@ func NewPKIGenerateRootRequestWithDefaults() *PKIGenerateRootRequest { return &this } -func (o PKIGenerateRootRequest) MarshalJSON() ([]byte, error) { +func (o PkiGenerateRootRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames diff --git a/schema/model_pki_generate_root_response.go b/schema/model_pki_generate_root_response.go new file mode 100644 index 00000000..584e9cea --- /dev/null +++ b/schema/model_pki_generate_root_response.go @@ -0,0 +1,65 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiGenerateRootResponse struct for PkiGenerateRootResponse +type PkiGenerateRootResponse struct { + // The generated self-signed CA certificate. + Certificate string `json:"certificate"` + + // The expiration of the given. + Expiration string `json:"expiration"` + + // The ID of the issuer + IssuerId string `json:"issuer_id"` + + // The name of the issuer. + IssuerName string `json:"issuer_name"` + + // The issuing certificate authority. + IssuingCa string `json:"issuing_ca"` + + // The ID of the key. + KeyId string `json:"key_id"` + + // The key name if given. + KeyName string `json:"key_name"` + + // The private key if exported was specified. + PrivateKey string `json:"private_key"` + + // The requested Subject's named serial number. + SerialNumber string `json:"serial_number"` +} + +// NewPkiGenerateRootResponseWithDefaults instantiates a new PkiGenerateRootResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiGenerateRootResponseWithDefaults() *PkiGenerateRootResponse { + var this PkiGenerateRootResponse + + return &this +} + +func (o PkiGenerateRootResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["private_key"] = o.PrivateKey + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_import_keys_request.go b/schema/model_pki_import_key_request.go similarity index 67% rename from schema/model_pki_import_keys_request.go rename to schema/model_pki_import_key_request.go index c7223547..db7b0d0c 100644 --- a/schema/model_pki_import_keys_request.go +++ b/schema/model_pki_import_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIImportKeysRequest struct for PKIImportKeysRequest -type PKIImportKeysRequest struct { +// PkiImportKeyRequest struct for PkiImportKeyRequest +type PkiImportKeyRequest struct { // Optional name to be used for this key KeyName string `json:"key_name"` @@ -18,16 +18,16 @@ type PKIImportKeysRequest struct { PemBundle string `json:"pem_bundle"` } -// NewPKIImportKeysRequestWithDefaults instantiates a new PKIImportKeysRequest object +// NewPkiImportKeyRequestWithDefaults instantiates a new PkiImportKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIImportKeysRequestWithDefaults() *PKIImportKeysRequest { - var this PKIImportKeysRequest +func NewPkiImportKeyRequestWithDefaults() *PkiImportKeyRequest { + var this PkiImportKeyRequest return &this } -func (o PKIImportKeysRequest) MarshalJSON() ([]byte, error) { +func (o PkiImportKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key_name"] = o.KeyName diff --git a/schema/model_pki_import_key_response.go b/schema/model_pki_import_key_response.go new file mode 100644 index 00000000..870f72e3 --- /dev/null +++ b/schema/model_pki_import_key_response.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiImportKeyResponse struct for PkiImportKeyResponse +type PkiImportKeyResponse struct { + // ID assigned to this key. + KeyId string `json:"key_id"` + + // Name assigned to this key. + KeyName string `json:"key_name"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. + KeyType string `json:"key_type"` +} + +// NewPkiImportKeyResponseWithDefaults instantiates a new PkiImportKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiImportKeyResponseWithDefaults() *PkiImportKeyResponse { + var this PkiImportKeyResponse + + return &this +} + +func (o PkiImportKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["key_type"] = o.KeyType + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_issue_role_request.go b/schema/model_pki_issue_with_role_request.go similarity index 86% rename from schema/model_pki_write_issue_role_request.go rename to schema/model_pki_issue_with_role_request.go index 22244d56..86c46eb1 100644 --- a/schema/model_pki_write_issue_role_request.go +++ b/schema/model_pki_issue_with_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteIssueRoleRequest struct for PKIWriteIssueRoleRequest -type PKIWriteIssueRoleRequest struct { +// PkiIssueWithRoleRequest struct for PkiIssueWithRoleRequest +type PkiIssueWithRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -49,13 +49,16 @@ type PKIWriteIssueRoleRequest struct { // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKIWriteIssueRoleRequestWithDefaults instantiates a new PKIWriteIssueRoleRequest object +// NewPkiIssueWithRoleRequestWithDefaults instantiates a new PkiIssueWithRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteIssueRoleRequestWithDefaults() *PKIWriteIssueRoleRequest { - var this PKIWriteIssueRoleRequest +func NewPkiIssueWithRoleRequestWithDefaults() *PkiIssueWithRoleRequest { + var this PkiIssueWithRoleRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -66,7 +69,7 @@ func NewPKIWriteIssueRoleRequestWithDefaults() *PKIWriteIssueRoleRequest { return &this } -func (o PKIWriteIssueRoleRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssueWithRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -82,6 +85,7 @@ func (o PKIWriteIssueRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["serial_number"] = o.SerialNumber toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_issue_with_role_response.go b/schema/model_pki_issue_with_role_response.go new file mode 100644 index 00000000..dc056930 --- /dev/null +++ b/schema/model_pki_issue_with_role_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssueWithRoleResponse struct for PkiIssueWithRoleResponse +type PkiIssueWithRoleResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssueWithRoleResponseWithDefaults instantiates a new PkiIssueWithRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssueWithRoleResponseWithDefaults() *PkiIssueWithRoleResponse { + var this PkiIssueWithRoleResponse + + return &this +} + +func (o PkiIssueWithRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_issue_role_request.go b/schema/model_pki_issuer_issue_with_role_request.go similarity index 84% rename from schema/model_pki_issuer_issue_role_request.go rename to schema/model_pki_issuer_issue_with_role_request.go index a974a787..b35d0c00 100644 --- a/schema/model_pki_issuer_issue_role_request.go +++ b/schema/model_pki_issuer_issue_with_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerIssueRoleRequest struct for PKIIssuerIssueRoleRequest -type PKIIssuerIssueRoleRequest struct { +// PkiIssuerIssueWithRoleRequest struct for PkiIssuerIssueWithRoleRequest +type PkiIssuerIssueWithRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -46,13 +46,16 @@ type PKIIssuerIssueRoleRequest struct { // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKIIssuerIssueRoleRequestWithDefaults instantiates a new PKIIssuerIssueRoleRequest object +// NewPkiIssuerIssueWithRoleRequestWithDefaults instantiates a new PkiIssuerIssueWithRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerIssueRoleRequestWithDefaults() *PKIIssuerIssueRoleRequest { - var this PKIIssuerIssueRoleRequest +func NewPkiIssuerIssueWithRoleRequestWithDefaults() *PkiIssuerIssueWithRoleRequest { + var this PkiIssuerIssueWithRoleRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -62,7 +65,7 @@ func NewPKIIssuerIssueRoleRequestWithDefaults() *PKIIssuerIssueRoleRequest { return &this } -func (o PKIIssuerIssueRoleRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerIssueWithRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -77,6 +80,7 @@ func (o PKIIssuerIssueRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["serial_number"] = o.SerialNumber toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_issuer_issue_with_role_response.go b/schema/model_pki_issuer_issue_with_role_response.go new file mode 100644 index 00000000..9e6e592a --- /dev/null +++ b/schema/model_pki_issuer_issue_with_role_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerIssueWithRoleResponse struct for PkiIssuerIssueWithRoleResponse +type PkiIssuerIssueWithRoleResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssuerIssueWithRoleResponseWithDefaults instantiates a new PkiIssuerIssueWithRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerIssueWithRoleResponseWithDefaults() *PkiIssuerIssueWithRoleResponse { + var this PkiIssuerIssueWithRoleResponse + + return &this +} + +func (o PkiIssuerIssueWithRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_read_crl_delta_der_response.go b/schema/model_pki_issuer_read_crl_delta_der_response.go new file mode 100644 index 00000000..a53f2e90 --- /dev/null +++ b/schema/model_pki_issuer_read_crl_delta_der_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerReadCrlDeltaDerResponse struct for PkiIssuerReadCrlDeltaDerResponse +type PkiIssuerReadCrlDeltaDerResponse struct { + Crl string `json:"crl"` +} + +// NewPkiIssuerReadCrlDeltaDerResponseWithDefaults instantiates a new PkiIssuerReadCrlDeltaDerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerReadCrlDeltaDerResponseWithDefaults() *PkiIssuerReadCrlDeltaDerResponse { + var this PkiIssuerReadCrlDeltaDerResponse + + return &this +} + +func (o PkiIssuerReadCrlDeltaDerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_read_crl_delta_pem_response.go b/schema/model_pki_issuer_read_crl_delta_pem_response.go new file mode 100644 index 00000000..77e2f86d --- /dev/null +++ b/schema/model_pki_issuer_read_crl_delta_pem_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerReadCrlDeltaPemResponse struct for PkiIssuerReadCrlDeltaPemResponse +type PkiIssuerReadCrlDeltaPemResponse struct { + Crl string `json:"crl"` +} + +// NewPkiIssuerReadCrlDeltaPemResponseWithDefaults instantiates a new PkiIssuerReadCrlDeltaPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerReadCrlDeltaPemResponseWithDefaults() *PkiIssuerReadCrlDeltaPemResponse { + var this PkiIssuerReadCrlDeltaPemResponse + + return &this +} + +func (o PkiIssuerReadCrlDeltaPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_read_crl_delta_response.go b/schema/model_pki_issuer_read_crl_delta_response.go new file mode 100644 index 00000000..f33e5251 --- /dev/null +++ b/schema/model_pki_issuer_read_crl_delta_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerReadCrlDeltaResponse struct for PkiIssuerReadCrlDeltaResponse +type PkiIssuerReadCrlDeltaResponse struct { + Crl string `json:"crl"` +} + +// NewPkiIssuerReadCrlDeltaResponseWithDefaults instantiates a new PkiIssuerReadCrlDeltaResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerReadCrlDeltaResponseWithDefaults() *PkiIssuerReadCrlDeltaResponse { + var this PkiIssuerReadCrlDeltaResponse + + return &this +} + +func (o PkiIssuerReadCrlDeltaResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_read_crl_der_response.go b/schema/model_pki_issuer_read_crl_der_response.go new file mode 100644 index 00000000..7ab0634c --- /dev/null +++ b/schema/model_pki_issuer_read_crl_der_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerReadCrlDerResponse struct for PkiIssuerReadCrlDerResponse +type PkiIssuerReadCrlDerResponse struct { + Crl string `json:"crl"` +} + +// NewPkiIssuerReadCrlDerResponseWithDefaults instantiates a new PkiIssuerReadCrlDerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerReadCrlDerResponseWithDefaults() *PkiIssuerReadCrlDerResponse { + var this PkiIssuerReadCrlDerResponse + + return &this +} + +func (o PkiIssuerReadCrlDerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_read_crl_pem_response.go b/schema/model_pki_issuer_read_crl_pem_response.go new file mode 100644 index 00000000..e685429b --- /dev/null +++ b/schema/model_pki_issuer_read_crl_pem_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerReadCrlPemResponse struct for PkiIssuerReadCrlPemResponse +type PkiIssuerReadCrlPemResponse struct { + Crl string `json:"crl"` +} + +// NewPkiIssuerReadCrlPemResponseWithDefaults instantiates a new PkiIssuerReadCrlPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerReadCrlPemResponseWithDefaults() *PkiIssuerReadCrlPemResponse { + var this PkiIssuerReadCrlPemResponse + + return &this +} + +func (o PkiIssuerReadCrlPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_read_crl_response.go b/schema/model_pki_issuer_read_crl_response.go new file mode 100644 index 00000000..8cf7c1c1 --- /dev/null +++ b/schema/model_pki_issuer_read_crl_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerReadCrlResponse struct for PkiIssuerReadCrlResponse +type PkiIssuerReadCrlResponse struct { + Crl string `json:"crl"` +} + +// NewPkiIssuerReadCrlResponseWithDefaults instantiates a new PkiIssuerReadCrlResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerReadCrlResponseWithDefaults() *PkiIssuerReadCrlResponse { + var this PkiIssuerReadCrlResponse + + return &this +} + +func (o PkiIssuerReadCrlResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_resign_crls_request.go b/schema/model_pki_issuer_resign_crls_request.go index 4e8905b8..2e37d635 100644 --- a/schema/model_pki_issuer_resign_crls_request.go +++ b/schema/model_pki_issuer_resign_crls_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerResignCRLsRequest struct for PKIIssuerResignCRLsRequest -type PKIIssuerResignCRLsRequest struct { +// PkiIssuerResignCrlsRequest struct for PkiIssuerResignCrlsRequest +type PkiIssuerResignCrlsRequest struct { // The sequence number to be written within the CRL Number extension. CrlNumber int32 `json:"crl_number"` @@ -27,11 +27,11 @@ type PKIIssuerResignCRLsRequest struct { NextUpdate string `json:"next_update"` } -// NewPKIIssuerResignCRLsRequestWithDefaults instantiates a new PKIIssuerResignCRLsRequest object +// NewPkiIssuerResignCrlsRequestWithDefaults instantiates a new PkiIssuerResignCrlsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerResignCRLsRequestWithDefaults() *PKIIssuerResignCRLsRequest { - var this PKIIssuerResignCRLsRequest +func NewPkiIssuerResignCrlsRequestWithDefaults() *PkiIssuerResignCrlsRequest { + var this PkiIssuerResignCrlsRequest this.DeltaCrlBaseNumber = -1 this.Format = "pem" @@ -40,7 +40,7 @@ func NewPKIIssuerResignCRLsRequestWithDefaults() *PKIIssuerResignCRLsRequest { return &this } -func (o PKIIssuerResignCRLsRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerResignCrlsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["crl_number"] = o.CrlNumber diff --git a/schema/model_pki_issuer_resign_crls_response.go b/schema/model_pki_issuer_resign_crls_response.go new file mode 100644 index 00000000..9196f15a --- /dev/null +++ b/schema/model_pki_issuer_resign_crls_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerResignCrlsResponse struct for PkiIssuerResignCrlsResponse +type PkiIssuerResignCrlsResponse struct { + // CRL + Crl string `json:"crl"` +} + +// NewPkiIssuerResignCrlsResponseWithDefaults instantiates a new PkiIssuerResignCrlsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerResignCrlsResponseWithDefaults() *PkiIssuerResignCrlsResponse { + var this PkiIssuerResignCrlsResponse + + return &this +} + +func (o PkiIssuerResignCrlsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_sign_intermediate_request.go b/schema/model_pki_issuer_sign_intermediate_request.go index 28448ca5..2a416633 100644 --- a/schema/model_pki_issuer_sign_intermediate_request.go +++ b/schema/model_pki_issuer_sign_intermediate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerSignIntermediateRequest struct for PKIIssuerSignIntermediateRequest -type PKIIssuerSignIntermediateRequest struct { +// PkiIssuerSignIntermediateRequest struct for PkiIssuerSignIntermediateRequest +type PkiIssuerSignIntermediateRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` @@ -93,11 +93,11 @@ type PKIIssuerSignIntermediateRequest struct { UsePss bool `json:"use_pss"` } -// NewPKIIssuerSignIntermediateRequestWithDefaults instantiates a new PKIIssuerSignIntermediateRequest object +// NewPkiIssuerSignIntermediateRequestWithDefaults instantiates a new PkiIssuerSignIntermediateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerSignIntermediateRequestWithDefaults() *PKIIssuerSignIntermediateRequest { - var this PKIIssuerSignIntermediateRequest +func NewPkiIssuerSignIntermediateRequestWithDefaults() *PkiIssuerSignIntermediateRequest { + var this PkiIssuerSignIntermediateRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -113,7 +113,7 @@ func NewPKIIssuerSignIntermediateRequestWithDefaults() *PKIIssuerSignIntermediat return &this } -func (o PKIIssuerSignIntermediateRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerSignIntermediateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames diff --git a/schema/model_pki_issuer_sign_intermediate_response.go b/schema/model_pki_issuer_sign_intermediate_response.go new file mode 100644 index 00000000..03db999e --- /dev/null +++ b/schema/model_pki_issuer_sign_intermediate_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerSignIntermediateResponse struct for PkiIssuerSignIntermediateResponse +type PkiIssuerSignIntermediateResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Expiration Time + Expiration int64 `json:"expiration"` + + // Issuing CA + IssuingCa string `json:"issuing_ca"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssuerSignIntermediateResponseWithDefaults instantiates a new PkiIssuerSignIntermediateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerSignIntermediateResponseWithDefaults() *PkiIssuerSignIntermediateResponse { + var this PkiIssuerSignIntermediateResponse + + return &this +} + +func (o PkiIssuerSignIntermediateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_sign_revocation_list_request.go b/schema/model_pki_issuer_sign_revocation_list_request.go index 0c455929..b660410e 100644 --- a/schema/model_pki_issuer_sign_revocation_list_request.go +++ b/schema/model_pki_issuer_sign_revocation_list_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerSignRevocationListRequest struct for PKIIssuerSignRevocationListRequest -type PKIIssuerSignRevocationListRequest struct { +// PkiIssuerSignRevocationListRequest struct for PkiIssuerSignRevocationListRequest +type PkiIssuerSignRevocationListRequest struct { // The sequence number to be written within the CRL Number extension. CrlNumber int32 `json:"crl_number"` @@ -30,11 +30,11 @@ type PKIIssuerSignRevocationListRequest struct { RevokedCerts []map[string]interface{} `json:"revoked_certs"` } -// NewPKIIssuerSignRevocationListRequestWithDefaults instantiates a new PKIIssuerSignRevocationListRequest object +// NewPkiIssuerSignRevocationListRequestWithDefaults instantiates a new PkiIssuerSignRevocationListRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerSignRevocationListRequestWithDefaults() *PKIIssuerSignRevocationListRequest { - var this PKIIssuerSignRevocationListRequest +func NewPkiIssuerSignRevocationListRequestWithDefaults() *PkiIssuerSignRevocationListRequest { + var this PkiIssuerSignRevocationListRequest this.DeltaCrlBaseNumber = -1 this.Format = "pem" @@ -43,7 +43,7 @@ func NewPKIIssuerSignRevocationListRequestWithDefaults() *PKIIssuerSignRevocatio return &this } -func (o PKIIssuerSignRevocationListRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerSignRevocationListRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["crl_number"] = o.CrlNumber diff --git a/schema/model_pki_issuer_sign_revocation_list_response.go b/schema/model_pki_issuer_sign_revocation_list_response.go new file mode 100644 index 00000000..3f59f531 --- /dev/null +++ b/schema/model_pki_issuer_sign_revocation_list_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerSignRevocationListResponse struct for PkiIssuerSignRevocationListResponse +type PkiIssuerSignRevocationListResponse struct { + // CRL + Crl string `json:"crl"` +} + +// NewPkiIssuerSignRevocationListResponseWithDefaults instantiates a new PkiIssuerSignRevocationListResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerSignRevocationListResponseWithDefaults() *PkiIssuerSignRevocationListResponse { + var this PkiIssuerSignRevocationListResponse + + return &this +} + +func (o PkiIssuerSignRevocationListResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl"] = o.Crl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_sign_self_issued_request.go b/schema/model_pki_issuer_sign_self_issued_request.go index 0d526180..09ecbdfe 100644 --- a/schema/model_pki_issuer_sign_self_issued_request.go +++ b/schema/model_pki_issuer_sign_self_issued_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerSignSelfIssuedRequest struct for PKIIssuerSignSelfIssuedRequest -type PKIIssuerSignSelfIssuedRequest struct { +// PkiIssuerSignSelfIssuedRequest struct for PkiIssuerSignSelfIssuedRequest +type PkiIssuerSignSelfIssuedRequest struct { // PEM-format self-issued certificate to be signed. Certificate string `json:"certificate"` @@ -18,18 +18,18 @@ type PKIIssuerSignSelfIssuedRequest struct { RequireMatchingCertificateAlgorithms bool `json:"require_matching_certificate_algorithms"` } -// NewPKIIssuerSignSelfIssuedRequestWithDefaults instantiates a new PKIIssuerSignSelfIssuedRequest object +// NewPkiIssuerSignSelfIssuedRequestWithDefaults instantiates a new PkiIssuerSignSelfIssuedRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerSignSelfIssuedRequestWithDefaults() *PKIIssuerSignSelfIssuedRequest { - var this PKIIssuerSignSelfIssuedRequest +func NewPkiIssuerSignSelfIssuedRequestWithDefaults() *PkiIssuerSignSelfIssuedRequest { + var this PkiIssuerSignSelfIssuedRequest this.RequireMatchingCertificateAlgorithms = false return &this } -func (o PKIIssuerSignSelfIssuedRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerSignSelfIssuedRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["certificate"] = o.Certificate diff --git a/schema/model_pki_issuer_sign_self_issued_response.go b/schema/model_pki_issuer_sign_self_issued_response.go new file mode 100644 index 00000000..d986eeea --- /dev/null +++ b/schema/model_pki_issuer_sign_self_issued_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerSignSelfIssuedResponse struct for PkiIssuerSignSelfIssuedResponse +type PkiIssuerSignSelfIssuedResponse struct { + // Certificate + Certificate string `json:"certificate"` + + // Issuing CA + IssuingCa string `json:"issuing_ca"` +} + +// NewPkiIssuerSignSelfIssuedResponseWithDefaults instantiates a new PkiIssuerSignSelfIssuedResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerSignSelfIssuedResponseWithDefaults() *PkiIssuerSignSelfIssuedResponse { + var this PkiIssuerSignSelfIssuedResponse + + return &this +} + +func (o PkiIssuerSignSelfIssuedResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["certificate"] = o.Certificate + toSerialize["issuing_ca"] = o.IssuingCa + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_sign_verbatim_request.go b/schema/model_pki_issuer_sign_verbatim_request.go index 8412ed3d..18b57125 100644 --- a/schema/model_pki_issuer_sign_verbatim_request.go +++ b/schema/model_pki_issuer_sign_verbatim_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerSignVerbatimRequest struct for PKIIssuerSignVerbatimRequest -type PKIIssuerSignVerbatimRequest struct { +// PkiIssuerSignVerbatimRequest struct for PkiIssuerSignVerbatimRequest +type PkiIssuerSignVerbatimRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -67,13 +67,16 @@ type PKIIssuerSignVerbatimRequest struct { // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKIIssuerSignVerbatimRequestWithDefaults instantiates a new PKIIssuerSignVerbatimRequest object +// NewPkiIssuerSignVerbatimRequestWithDefaults instantiates a new PkiIssuerSignVerbatimRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerSignVerbatimRequestWithDefaults() *PKIIssuerSignVerbatimRequest { - var this PKIIssuerSignVerbatimRequest +func NewPkiIssuerSignVerbatimRequestWithDefaults() *PkiIssuerSignVerbatimRequest { + var this PkiIssuerSignVerbatimRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -86,7 +89,7 @@ func NewPKIIssuerSignVerbatimRequestWithDefaults() *PKIIssuerSignVerbatimRequest return &this } -func (o PKIIssuerSignVerbatimRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerSignVerbatimRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -108,6 +111,7 @@ func (o PKIIssuerSignVerbatimRequest) MarshalJSON() ([]byte, error) { toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans toSerialize["use_pss"] = o.UsePss + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_issuer_sign_verbatim_response.go b/schema/model_pki_issuer_sign_verbatim_response.go new file mode 100644 index 00000000..1f3e9f45 --- /dev/null +++ b/schema/model_pki_issuer_sign_verbatim_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerSignVerbatimResponse struct for PkiIssuerSignVerbatimResponse +type PkiIssuerSignVerbatimResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssuerSignVerbatimResponseWithDefaults instantiates a new PkiIssuerSignVerbatimResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerSignVerbatimResponseWithDefaults() *PkiIssuerSignVerbatimResponse { + var this PkiIssuerSignVerbatimResponse + + return &this +} + +func (o PkiIssuerSignVerbatimResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_sign_verbatim_role_request.go b/schema/model_pki_issuer_sign_verbatim_with_role_request.go similarity index 87% rename from schema/model_pki_issuer_sign_verbatim_role_request.go rename to schema/model_pki_issuer_sign_verbatim_with_role_request.go index 78ec1e20..702ca33c 100644 --- a/schema/model_pki_issuer_sign_verbatim_role_request.go +++ b/schema/model_pki_issuer_sign_verbatim_with_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerSignVerbatimRoleRequest struct for PKIIssuerSignVerbatimRoleRequest -type PKIIssuerSignVerbatimRoleRequest struct { +// PkiIssuerSignVerbatimWithRoleRequest struct for PkiIssuerSignVerbatimWithRoleRequest +type PkiIssuerSignVerbatimWithRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -64,13 +64,16 @@ type PKIIssuerSignVerbatimRoleRequest struct { // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKIIssuerSignVerbatimRoleRequestWithDefaults instantiates a new PKIIssuerSignVerbatimRoleRequest object +// NewPkiIssuerSignVerbatimWithRoleRequestWithDefaults instantiates a new PkiIssuerSignVerbatimWithRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerSignVerbatimRoleRequestWithDefaults() *PKIIssuerSignVerbatimRoleRequest { - var this PKIIssuerSignVerbatimRoleRequest +func NewPkiIssuerSignVerbatimWithRoleRequestWithDefaults() *PkiIssuerSignVerbatimWithRoleRequest { + var this PkiIssuerSignVerbatimWithRoleRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -83,7 +86,7 @@ func NewPKIIssuerSignVerbatimRoleRequestWithDefaults() *PKIIssuerSignVerbatimRol return &this } -func (o PKIIssuerSignVerbatimRoleRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerSignVerbatimWithRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -104,6 +107,7 @@ func (o PKIIssuerSignVerbatimRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans toSerialize["use_pss"] = o.UsePss + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_issuer_sign_verbatim_with_role_response.go b/schema/model_pki_issuer_sign_verbatim_with_role_response.go new file mode 100644 index 00000000..3b6d7b5c --- /dev/null +++ b/schema/model_pki_issuer_sign_verbatim_with_role_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerSignVerbatimWithRoleResponse struct for PkiIssuerSignVerbatimWithRoleResponse +type PkiIssuerSignVerbatimWithRoleResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssuerSignVerbatimWithRoleResponseWithDefaults instantiates a new PkiIssuerSignVerbatimWithRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerSignVerbatimWithRoleResponseWithDefaults() *PkiIssuerSignVerbatimWithRoleResponse { + var this PkiIssuerSignVerbatimWithRoleResponse + + return &this +} + +func (o PkiIssuerSignVerbatimWithRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuer_sign_role_request.go b/schema/model_pki_issuer_sign_with_role_request.go similarity index 84% rename from schema/model_pki_issuer_sign_role_request.go rename to schema/model_pki_issuer_sign_with_role_request.go index 675f23e4..58f09fbf 100644 --- a/schema/model_pki_issuer_sign_role_request.go +++ b/schema/model_pki_issuer_sign_with_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuerSignRoleRequest struct for PKIIssuerSignRoleRequest -type PKIIssuerSignRoleRequest struct { +// PkiIssuerSignWithRoleRequest struct for PkiIssuerSignWithRoleRequest +type PkiIssuerSignWithRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -49,13 +49,16 @@ type PKIIssuerSignRoleRequest struct { // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKIIssuerSignRoleRequestWithDefaults instantiates a new PKIIssuerSignRoleRequest object +// NewPkiIssuerSignWithRoleRequestWithDefaults instantiates a new PkiIssuerSignWithRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuerSignRoleRequestWithDefaults() *PKIIssuerSignRoleRequest { - var this PKIIssuerSignRoleRequest +func NewPkiIssuerSignWithRoleRequestWithDefaults() *PkiIssuerSignWithRoleRequest { + var this PkiIssuerSignWithRoleRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -66,7 +69,7 @@ func NewPKIIssuerSignRoleRequestWithDefaults() *PKIIssuerSignRoleRequest { return &this } -func (o PKIIssuerSignRoleRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuerSignWithRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -82,6 +85,7 @@ func (o PKIIssuerSignRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["serial_number"] = o.SerialNumber toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_issuer_sign_with_role_response.go b/schema/model_pki_issuer_sign_with_role_response.go new file mode 100644 index 00000000..1bbffe01 --- /dev/null +++ b/schema/model_pki_issuer_sign_with_role_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuerSignWithRoleResponse struct for PkiIssuerSignWithRoleResponse +type PkiIssuerSignWithRoleResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssuerSignWithRoleResponseWithDefaults instantiates a new PkiIssuerSignWithRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuerSignWithRoleResponseWithDefaults() *PkiIssuerSignWithRoleResponse { + var this PkiIssuerSignWithRoleResponse + + return &this +} + +func (o PkiIssuerSignWithRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuers_generate_intermediate_request.go b/schema/model_pki_issuers_generate_intermediate_request.go index 4cb92495..de614b4f 100644 --- a/schema/model_pki_issuers_generate_intermediate_request.go +++ b/schema/model_pki_issuers_generate_intermediate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuersGenerateIntermediateRequest struct for PKIIssuersGenerateIntermediateRequest -type PKIIssuersGenerateIntermediateRequest struct { +// PkiIssuersGenerateIntermediateRequest struct for PkiIssuersGenerateIntermediateRequest +type PkiIssuersGenerateIntermediateRequest struct { // Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. AddBasicConstraints bool `json:"add_basic_constraints"` @@ -93,11 +93,11 @@ type PKIIssuersGenerateIntermediateRequest struct { UriSans []string `json:"uri_sans"` } -// NewPKIIssuersGenerateIntermediateRequestWithDefaults instantiates a new PKIIssuersGenerateIntermediateRequest object +// NewPkiIssuersGenerateIntermediateRequestWithDefaults instantiates a new PkiIssuersGenerateIntermediateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuersGenerateIntermediateRequestWithDefaults() *PKIIssuersGenerateIntermediateRequest { - var this PKIIssuersGenerateIntermediateRequest +func NewPkiIssuersGenerateIntermediateRequestWithDefaults() *PkiIssuersGenerateIntermediateRequest { + var this PkiIssuersGenerateIntermediateRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -111,7 +111,7 @@ func NewPKIIssuersGenerateIntermediateRequestWithDefaults() *PKIIssuersGenerateI return &this } -func (o PKIIssuersGenerateIntermediateRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuersGenerateIntermediateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["add_basic_constraints"] = o.AddBasicConstraints diff --git a/schema/model_pki_issuers_generate_intermediate_response.go b/schema/model_pki_issuers_generate_intermediate_response.go new file mode 100644 index 00000000..2f45ccd7 --- /dev/null +++ b/schema/model_pki_issuers_generate_intermediate_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuersGenerateIntermediateResponse struct for PkiIssuersGenerateIntermediateResponse +type PkiIssuersGenerateIntermediateResponse struct { + // Certificate signing request. + Csr string `json:"csr"` + + // Id of the key. + KeyId string `json:"key_id"` + + // Generated private key. + PrivateKey string `json:"private_key"` + + // Specifies the format used for marshaling the private key. + PrivateKeyType string `json:"private_key_type"` +} + +// NewPkiIssuersGenerateIntermediateResponseWithDefaults instantiates a new PkiIssuersGenerateIntermediateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuersGenerateIntermediateResponseWithDefaults() *PkiIssuersGenerateIntermediateResponse { + var this PkiIssuersGenerateIntermediateResponse + + return &this +} + +func (o PkiIssuersGenerateIntermediateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["csr"] = o.Csr + toSerialize["key_id"] = o.KeyId + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_issuers_generate_root_request.go b/schema/model_pki_issuers_generate_root_request.go index e28366fe..8abcd3f8 100644 --- a/schema/model_pki_issuers_generate_root_request.go +++ b/schema/model_pki_issuers_generate_root_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIIssuersGenerateRootRequest struct for PKIIssuersGenerateRootRequest -type PKIIssuersGenerateRootRequest struct { +// PkiIssuersGenerateRootRequest struct for PkiIssuersGenerateRootRequest +type PkiIssuersGenerateRootRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` @@ -102,11 +102,11 @@ type PKIIssuersGenerateRootRequest struct { UsePss bool `json:"use_pss"` } -// NewPKIIssuersGenerateRootRequestWithDefaults instantiates a new PKIIssuersGenerateRootRequest object +// NewPkiIssuersGenerateRootRequestWithDefaults instantiates a new PkiIssuersGenerateRootRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIIssuersGenerateRootRequestWithDefaults() *PKIIssuersGenerateRootRequest { - var this PKIIssuersGenerateRootRequest +func NewPkiIssuersGenerateRootRequestWithDefaults() *PkiIssuersGenerateRootRequest { + var this PkiIssuersGenerateRootRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -122,7 +122,7 @@ func NewPKIIssuersGenerateRootRequestWithDefaults() *PKIIssuersGenerateRootReque return &this } -func (o PKIIssuersGenerateRootRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuersGenerateRootRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames diff --git a/schema/model_pki_issuers_generate_root_response.go b/schema/model_pki_issuers_generate_root_response.go new file mode 100644 index 00000000..60ec3c2c --- /dev/null +++ b/schema/model_pki_issuers_generate_root_response.go @@ -0,0 +1,65 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuersGenerateRootResponse struct for PkiIssuersGenerateRootResponse +type PkiIssuersGenerateRootResponse struct { + // The generated self-signed CA certificate. + Certificate string `json:"certificate"` + + // The expiration of the given. + Expiration string `json:"expiration"` + + // The ID of the issuer + IssuerId string `json:"issuer_id"` + + // The name of the issuer. + IssuerName string `json:"issuer_name"` + + // The issuing certificate authority. + IssuingCa string `json:"issuing_ca"` + + // The ID of the key. + KeyId string `json:"key_id"` + + // The key name if given. + KeyName string `json:"key_name"` + + // The private key if exported was specified. + PrivateKey string `json:"private_key"` + + // The requested Subject's named serial number. + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssuersGenerateRootResponseWithDefaults instantiates a new PkiIssuersGenerateRootResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuersGenerateRootResponseWithDefaults() *PkiIssuersGenerateRootResponse { + var this PkiIssuersGenerateRootResponse + + return &this +} + +func (o PkiIssuersGenerateRootResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["private_key"] = o.PrivateKey + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_certs_request.go b/schema/model_pki_issuers_import_bundle_request.go similarity index 59% rename from schema/model_pki_write_certs_request.go rename to schema/model_pki_issuers_import_bundle_request.go index 03abd552..9a9eeea6 100644 --- a/schema/model_pki_write_certs_request.go +++ b/schema/model_pki_issuers_import_bundle_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// PKIWriteCertsRequest struct for PKIWriteCertsRequest -type PKIWriteCertsRequest struct { +// PkiIssuersImportBundleRequest struct for PkiIssuersImportBundleRequest +type PkiIssuersImportBundleRequest struct { // PEM-format, concatenated unencrypted secret-key (optional) and certificates. PemBundle string `json:"pem_bundle"` } -// NewPKIWriteCertsRequestWithDefaults instantiates a new PKIWriteCertsRequest object +// NewPkiIssuersImportBundleRequestWithDefaults instantiates a new PkiIssuersImportBundleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteCertsRequestWithDefaults() *PKIWriteCertsRequest { - var this PKIWriteCertsRequest +func NewPkiIssuersImportBundleRequestWithDefaults() *PkiIssuersImportBundleRequest { + var this PkiIssuersImportBundleRequest return &this } -func (o PKIWriteCertsRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuersImportBundleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["pem_bundle"] = o.PemBundle diff --git a/schema/model_pki_issuers_import_bundle_response.go b/schema/model_pki_issuers_import_bundle_response.go new file mode 100644 index 00000000..72ab25d8 --- /dev/null +++ b/schema/model_pki_issuers_import_bundle_response.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuersImportBundleResponse struct for PkiIssuersImportBundleResponse +type PkiIssuersImportBundleResponse struct { + // Net-new issuers imported as a part of this request + ImportedIssuers []string `json:"imported_issuers"` + + // Net-new keys imported as a part of this request + ImportedKeys []string `json:"imported_keys"` + + // A mapping of issuer_id to key_id for all issuers included in this request + Mapping map[string]interface{} `json:"mapping"` +} + +// NewPkiIssuersImportBundleResponseWithDefaults instantiates a new PkiIssuersImportBundleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuersImportBundleResponseWithDefaults() *PkiIssuersImportBundleResponse { + var this PkiIssuersImportBundleResponse + + return &this +} + +func (o PkiIssuersImportBundleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["imported_issuers"] = o.ImportedIssuers + toSerialize["imported_keys"] = o.ImportedKeys + toSerialize["mapping"] = o.Mapping + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_bundle_write_request.go b/schema/model_pki_issuers_import_cert_request.go similarity index 61% rename from schema/model_pki_bundle_write_request.go rename to schema/model_pki_issuers_import_cert_request.go index 8bdfec52..30368180 100644 --- a/schema/model_pki_bundle_write_request.go +++ b/schema/model_pki_issuers_import_cert_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// PKIBundleWriteRequest struct for PKIBundleWriteRequest -type PKIBundleWriteRequest struct { +// PkiIssuersImportCertRequest struct for PkiIssuersImportCertRequest +type PkiIssuersImportCertRequest struct { // PEM-format, concatenated unencrypted secret-key (optional) and certificates. PemBundle string `json:"pem_bundle"` } -// NewPKIBundleWriteRequestWithDefaults instantiates a new PKIBundleWriteRequest object +// NewPkiIssuersImportCertRequestWithDefaults instantiates a new PkiIssuersImportCertRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIBundleWriteRequestWithDefaults() *PKIBundleWriteRequest { - var this PKIBundleWriteRequest +func NewPkiIssuersImportCertRequestWithDefaults() *PkiIssuersImportCertRequest { + var this PkiIssuersImportCertRequest return &this } -func (o PKIBundleWriteRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuersImportCertRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["pem_bundle"] = o.PemBundle diff --git a/schema/model_pki_issuers_import_cert_response.go b/schema/model_pki_issuers_import_cert_response.go new file mode 100644 index 00000000..78d26674 --- /dev/null +++ b/schema/model_pki_issuers_import_cert_response.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuersImportCertResponse struct for PkiIssuersImportCertResponse +type PkiIssuersImportCertResponse struct { + // Net-new issuers imported as a part of this request + ImportedIssuers []string `json:"imported_issuers"` + + // Net-new keys imported as a part of this request + ImportedKeys []string `json:"imported_keys"` + + // A mapping of issuer_id to key_id for all issuers included in this request + Mapping map[string]interface{} `json:"mapping"` +} + +// NewPkiIssuersImportCertResponseWithDefaults instantiates a new PkiIssuersImportCertResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuersImportCertResponseWithDefaults() *PkiIssuersImportCertResponse { + var this PkiIssuersImportCertResponse + + return &this +} + +func (o PkiIssuersImportCertResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["imported_issuers"] = o.ImportedIssuers + toSerialize["imported_keys"] = o.ImportedKeys + toSerialize["mapping"] = o.Mapping + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_rotate_root_request.go b/schema/model_pki_issuers_rotate_root_request.go similarity index 94% rename from schema/model_pki_rotate_root_request.go rename to schema/model_pki_issuers_rotate_root_request.go index 0aa7a373..b1a02502 100644 --- a/schema/model_pki_rotate_root_request.go +++ b/schema/model_pki_issuers_rotate_root_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIRotateRootRequest struct for PKIRotateRootRequest -type PKIRotateRootRequest struct { +// PkiIssuersRotateRootRequest struct for PkiIssuersRotateRootRequest +type PkiIssuersRotateRootRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` @@ -102,11 +102,11 @@ type PKIRotateRootRequest struct { UsePss bool `json:"use_pss"` } -// NewPKIRotateRootRequestWithDefaults instantiates a new PKIRotateRootRequest object +// NewPkiIssuersRotateRootRequestWithDefaults instantiates a new PkiIssuersRotateRootRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIRotateRootRequestWithDefaults() *PKIRotateRootRequest { - var this PKIRotateRootRequest +func NewPkiIssuersRotateRootRequestWithDefaults() *PkiIssuersRotateRootRequest { + var this PkiIssuersRotateRootRequest this.ExcludeCnFromSans = false this.Format = "pem" @@ -122,7 +122,7 @@ func NewPKIRotateRootRequestWithDefaults() *PKIRotateRootRequest { return &this } -func (o PKIRotateRootRequest) MarshalJSON() ([]byte, error) { +func (o PkiIssuersRotateRootRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames diff --git a/schema/model_pki_issuers_rotate_root_response.go b/schema/model_pki_issuers_rotate_root_response.go new file mode 100644 index 00000000..a3972170 --- /dev/null +++ b/schema/model_pki_issuers_rotate_root_response.go @@ -0,0 +1,65 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiIssuersRotateRootResponse struct for PkiIssuersRotateRootResponse +type PkiIssuersRotateRootResponse struct { + // The generated self-signed CA certificate. + Certificate string `json:"certificate"` + + // The expiration of the given. + Expiration string `json:"expiration"` + + // The ID of the issuer + IssuerId string `json:"issuer_id"` + + // The name of the issuer. + IssuerName string `json:"issuer_name"` + + // The issuing certificate authority. + IssuingCa string `json:"issuing_ca"` + + // The ID of the key. + KeyId string `json:"key_id"` + + // The key name if given. + KeyName string `json:"key_name"` + + // The private key if exported was specified. + PrivateKey string `json:"private_key"` + + // The requested Subject's named serial number. + SerialNumber string `json:"serial_number"` +} + +// NewPkiIssuersRotateRootResponseWithDefaults instantiates a new PkiIssuersRotateRootResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiIssuersRotateRootResponseWithDefaults() *PkiIssuersRotateRootResponse { + var this PkiIssuersRotateRootResponse + + return &this +} + +func (o PkiIssuersRotateRootResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["private_key"] = o.PrivateKey + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_list_certs_response.go b/schema/model_pki_list_certs_response.go new file mode 100644 index 00000000..abc2ee41 --- /dev/null +++ b/schema/model_pki_list_certs_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiListCertsResponse struct for PkiListCertsResponse +type PkiListCertsResponse struct { + // A list of keys + Keys []string `json:"keys"` +} + +// NewPkiListCertsResponseWithDefaults instantiates a new PkiListCertsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiListCertsResponseWithDefaults() *PkiListCertsResponse { + var this PkiListCertsResponse + + return &this +} + +func (o PkiListCertsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_list_issuers_response.go b/schema/model_pki_list_issuers_response.go new file mode 100644 index 00000000..4d13e3ce --- /dev/null +++ b/schema/model_pki_list_issuers_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiListIssuersResponse struct for PkiListIssuersResponse +type PkiListIssuersResponse struct { + // Key info with issuer name + KeyInfo map[string]interface{} `json:"key_info"` + + // A list of keys + Keys []string `json:"keys"` +} + +// NewPkiListIssuersResponseWithDefaults instantiates a new PkiListIssuersResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiListIssuersResponseWithDefaults() *PkiListIssuersResponse { + var this PkiListIssuersResponse + + return &this +} + +func (o PkiListIssuersResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_info"] = o.KeyInfo + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_list_keys_response.go b/schema/model_pki_list_keys_response.go new file mode 100644 index 00000000..4e32ee31 --- /dev/null +++ b/schema/model_pki_list_keys_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiListKeysResponse struct for PkiListKeysResponse +type PkiListKeysResponse struct { + // Key info with issuer name + KeyInfo map[string]interface{} `json:"key_info"` + + // A list of keys + Keys []string `json:"keys"` +} + +// NewPkiListKeysResponseWithDefaults instantiates a new PkiListKeysResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiListKeysResponseWithDefaults() *PkiListKeysResponse { + var this PkiListKeysResponse + + return &this +} + +func (o PkiListKeysResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_info"] = o.KeyInfo + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_list_revoked_certs_response.go b/schema/model_pki_list_revoked_certs_response.go new file mode 100644 index 00000000..e3b43761 --- /dev/null +++ b/schema/model_pki_list_revoked_certs_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiListRevokedCertsResponse struct for PkiListRevokedCertsResponse +type PkiListRevokedCertsResponse struct { + // List of Keys + Keys []string `json:"keys"` +} + +// NewPkiListRevokedCertsResponseWithDefaults instantiates a new PkiListRevokedCertsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiListRevokedCertsResponseWithDefaults() *PkiListRevokedCertsResponse { + var this PkiListRevokedCertsResponse + + return &this +} + +func (o PkiListRevokedCertsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_list_roles_response.go b/schema/model_pki_list_roles_response.go new file mode 100644 index 00000000..d4e393ad --- /dev/null +++ b/schema/model_pki_list_roles_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiListRolesResponse struct for PkiListRolesResponse +type PkiListRolesResponse struct { + // List of keys + Keys map[string]interface{} `json:"keys"` +} + +// NewPkiListRolesResponseWithDefaults instantiates a new PkiListRolesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiListRolesResponseWithDefaults() *PkiListRolesResponse { + var this PkiListRolesResponse + + return &this +} + +func (o PkiListRolesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_patch_issuer_response.go b/schema/model_pki_patch_issuer_response.go new file mode 100644 index 00000000..bc4bb0ea --- /dev/null +++ b/schema/model_pki_patch_issuer_response.go @@ -0,0 +1,87 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiPatchIssuerResponse struct for PkiPatchIssuerResponse +type PkiPatchIssuerResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // CRL Distribution Points + CrlDistributionPoints []string `json:"crl_distribution_points"` + + // Issuer Id + IssuerId string `json:"issuer_id"` + + // Issuer Name + IssuerName string `json:"issuer_name"` + + // Issuing Certificates + IssuingCertificates []string `json:"issuing_certificates"` + + // Key Id + KeyId string `json:"key_id"` + + // Leaf Not After Behavior + LeafNotAfterBehavior string `json:"leaf_not_after_behavior"` + + // Manual Chain + ManualChain []string `json:"manual_chain"` + + // OSCP Servers + OcspServers []string `json:"ocsp_servers"` + + // Revocation Signature Alogrithm + RevocationSignatureAlgorithm string `json:"revocation_signature_algorithm"` + + RevocationTime int32 `json:"revocation_time"` + + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` + + // Revoked + Revoked bool `json:"revoked"` + + // Usage + Usage []string `json:"usage"` +} + +// NewPkiPatchIssuerResponseWithDefaults instantiates a new PkiPatchIssuerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiPatchIssuerResponseWithDefaults() *PkiPatchIssuerResponse { + var this PkiPatchIssuerResponse + + return &this +} + +func (o PkiPatchIssuerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["crl_distribution_points"] = o.CrlDistributionPoints + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + toSerialize["issuing_certificates"] = o.IssuingCertificates + toSerialize["key_id"] = o.KeyId + toSerialize["leaf_not_after_behavior"] = o.LeafNotAfterBehavior + toSerialize["manual_chain"] = o.ManualChain + toSerialize["ocsp_servers"] = o.OcspServers + toSerialize["revocation_signature_algorithm"] = o.RevocationSignatureAlgorithm + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + toSerialize["revoked"] = o.Revoked + toSerialize["usage"] = o.Usage + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_patch_role_response.go b/schema/model_pki_patch_role_response.go new file mode 100644 index 00000000..8353b0f7 --- /dev/null +++ b/schema/model_pki_patch_role_response.go @@ -0,0 +1,219 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiPatchRoleResponse struct for PkiPatchRoleResponse +type PkiPatchRoleResponse struct { + // If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. + AllowAnyName bool `json:"allow_any_name"` + + // If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information. + AllowBareDomains bool `json:"allow_bare_domains"` + + // If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information. + AllowGlobDomains bool `json:"allow_glob_domains"` + + // If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed. + AllowIpSans bool `json:"allow_ip_sans"` + + // Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. + AllowLocalhost bool `json:"allow_localhost"` + + // If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information. + AllowSubdomains bool `json:"allow_subdomains"` + + // Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. + AllowTokenDisplayname bool `json:"allow_token_displayname"` + + // If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information. + AllowWildcardCertificates bool `json:"allow_wildcard_certificates"` + + // Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains. + AllowedDomains []string `json:"allowed_domains"` + + // If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. + AllowedDomainsTemplate bool `json:"allowed_domains_template"` + + // If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format ;:. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8). + AllowedOtherSans []string `json:"allowed_other_sans"` + + // If set, an array of allowed serial numbers to put in Subject. These values support globbing. + AllowedSerialNumbers []string `json:"allowed_serial_numbers"` + + // If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. + AllowedUriSans []string `json:"allowed_uri_sans"` + + // If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. + AllowedUriSansTemplate bool `json:"allowed_uri_sans_template"` + + // If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 + AllowedUserIds []string `json:"allowed_user_ids"` + + // Mark Basic Constraints valid when issuing non-CA certificates. + BasicConstraintsValidForNonCa bool `json:"basic_constraints_valid_for_non_ca"` + + // If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. + ClientFlag bool `json:"client_flag"` + + // List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs. + CnValidations []string `json:"cn_validations"` + + // If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12. + CodeSigningFlag bool `json:"code_signing_flag"` + + // If set, Country will be set to this value in certificates issued by this role. + Country []string `json:"country"` + + // If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12. + EmailProtectionFlag bool `json:"email_protection_flag"` + + // If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true. + EnforceHostnames bool `json:"enforce_hostnames"` + + // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12. + ExtKeyUsage []string `json:"ext_key_usage"` + + // A comma-separated string or list of extended key usage oids. + ExtKeyUsageOids []string `json:"ext_key_usage_oids"` + + // If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke \" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault. + GenerateLease bool `json:"generate_lease"` + + // Reference to the issuer used to sign requests serviced by this role. + IssuerRef string `json:"issuer_ref"` + + // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. + KeyBits int32 `json:"key_bits"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values. + KeyType string `json:"key_type"` + + // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3. + KeyUsage []string `json:"key_usage"` + + // If set, Locality will be set to this value in certificates issued by this role. + Locality []string `json:"locality"` + + // The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL. + MaxTtl int32 `json:"max_ttl"` + + // If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\". + NoStore bool `json:"no_store"` + + // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. + NotAfter string `json:"not_after"` + + // The duration before now which the certificate needs to be backdated by. + NotBeforeDuration int32 `json:"not_before_duration"` + + // If set, O (Organization) will be set to this value in certificates issued by this role. + Organization []string `json:"organization"` + + // If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role. + Ou []string `json:"ou"` + + // A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}]. + PolicyIdentifiers []string `json:"policy_identifiers"` + + // If set, Postal Code will be set to this value in certificates issued by this role. + PostalCode []string `json:"postal_code"` + + // If set, Province will be set to this value in certificates issued by this role. + Province []string `json:"province"` + + // If set to false, makes the 'common_name' field optional while generating a certificate. + RequireCn bool `json:"require_cn"` + + // If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. + ServerFlag bool `json:"server_flag"` + + // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). + SignatureBits int32 `json:"signature_bits"` + + // If set, Street Address will be set to this value in certificates issued by this role. + StreetAddress []string `json:"street_address"` + + // The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter. + Ttl int32 `json:"ttl"` + + // If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true. + UseCsrCommonName bool `json:"use_csr_common_name"` + + // If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true. + UseCsrSans bool `json:"use_csr_sans"` + + // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. + UsePss bool `json:"use_pss"` +} + +// NewPkiPatchRoleResponseWithDefaults instantiates a new PkiPatchRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiPatchRoleResponseWithDefaults() *PkiPatchRoleResponse { + var this PkiPatchRoleResponse + + this.ServerFlag = true + + return &this +} + +func (o PkiPatchRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["allow_any_name"] = o.AllowAnyName + toSerialize["allow_bare_domains"] = o.AllowBareDomains + toSerialize["allow_glob_domains"] = o.AllowGlobDomains + toSerialize["allow_ip_sans"] = o.AllowIpSans + toSerialize["allow_localhost"] = o.AllowLocalhost + toSerialize["allow_subdomains"] = o.AllowSubdomains + toSerialize["allow_token_displayname"] = o.AllowTokenDisplayname + toSerialize["allow_wildcard_certificates"] = o.AllowWildcardCertificates + toSerialize["allowed_domains"] = o.AllowedDomains + toSerialize["allowed_domains_template"] = o.AllowedDomainsTemplate + toSerialize["allowed_other_sans"] = o.AllowedOtherSans + toSerialize["allowed_serial_numbers"] = o.AllowedSerialNumbers + toSerialize["allowed_uri_sans"] = o.AllowedUriSans + toSerialize["allowed_uri_sans_template"] = o.AllowedUriSansTemplate + toSerialize["allowed_user_ids"] = o.AllowedUserIds + toSerialize["basic_constraints_valid_for_non_ca"] = o.BasicConstraintsValidForNonCa + toSerialize["client_flag"] = o.ClientFlag + toSerialize["cn_validations"] = o.CnValidations + toSerialize["code_signing_flag"] = o.CodeSigningFlag + toSerialize["country"] = o.Country + toSerialize["email_protection_flag"] = o.EmailProtectionFlag + toSerialize["enforce_hostnames"] = o.EnforceHostnames + toSerialize["ext_key_usage"] = o.ExtKeyUsage + toSerialize["ext_key_usage_oids"] = o.ExtKeyUsageOids + toSerialize["generate_lease"] = o.GenerateLease + toSerialize["issuer_ref"] = o.IssuerRef + toSerialize["key_bits"] = o.KeyBits + toSerialize["key_type"] = o.KeyType + toSerialize["key_usage"] = o.KeyUsage + toSerialize["locality"] = o.Locality + toSerialize["max_ttl"] = o.MaxTtl + toSerialize["no_store"] = o.NoStore + toSerialize["not_after"] = o.NotAfter + toSerialize["not_before_duration"] = o.NotBeforeDuration + toSerialize["organization"] = o.Organization + toSerialize["ou"] = o.Ou + toSerialize["policy_identifiers"] = o.PolicyIdentifiers + toSerialize["postal_code"] = o.PostalCode + toSerialize["province"] = o.Province + toSerialize["require_cn"] = o.RequireCn + toSerialize["server_flag"] = o.ServerFlag + toSerialize["signature_bits"] = o.SignatureBits + toSerialize["street_address"] = o.StreetAddress + toSerialize["ttl"] = o.Ttl + toSerialize["use_csr_common_name"] = o.UseCsrCommonName + toSerialize["use_csr_sans"] = o.UseCsrSans + toSerialize["use_pss"] = o.UsePss + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_auto_tidy_configuration_response.go b/schema/model_pki_read_auto_tidy_configuration_response.go new file mode 100644 index 00000000..0401f361 --- /dev/null +++ b/schema/model_pki_read_auto_tidy_configuration_response.go @@ -0,0 +1,83 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadAutoTidyConfigurationResponse struct for PkiReadAutoTidyConfigurationResponse +type PkiReadAutoTidyConfigurationResponse struct { + // Specifies whether automatic tidy is enabled or not + Enabled bool `json:"enabled"` + + // Specifies the duration between automatic tidy operation + IntervalDuration int32 `json:"interval_duration"` + + // Issuer safety buffer + IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` + + MaintainStoredCertificateCounts bool `json:"maintain_stored_certificate_counts"` + + // Duration to pause between tidying certificates + PauseDuration string `json:"pause_duration"` + + PublishStoredCertificateCountMetrics bool `json:"publish_stored_certificate_count_metrics"` + + RevocationQueueSafetyBuffer int32 `json:"revocation_queue_safety_buffer"` + + // Safety buffer time duration + SafetyBuffer int32 `json:"safety_buffer"` + + // Specifies whether to tidy up the certificate store + TidyCertStore bool `json:"tidy_cert_store"` + + TidyCrossClusterRevokedCerts bool `json:"tidy_cross_cluster_revoked_certs"` + + // Specifies whether tidy expired issuers + TidyExpiredIssuers bool `json:"tidy_expired_issuers"` + + TidyMoveLegacyCaBundle bool `json:"tidy_move_legacy_ca_bundle"` + + TidyRevocationQueue bool `json:"tidy_revocation_queue"` + + // Specifies whether to associate revoked certificates with their corresponding issuers + TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` + + // Specifies whether to remove all invalid and expired certificates from storage + TidyRevokedCerts bool `json:"tidy_revoked_certs"` +} + +// NewPkiReadAutoTidyConfigurationResponseWithDefaults instantiates a new PkiReadAutoTidyConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadAutoTidyConfigurationResponseWithDefaults() *PkiReadAutoTidyConfigurationResponse { + var this PkiReadAutoTidyConfigurationResponse + + return &this +} + +func (o PkiReadAutoTidyConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["enabled"] = o.Enabled + toSerialize["interval_duration"] = o.IntervalDuration + toSerialize["issuer_safety_buffer"] = o.IssuerSafetyBuffer + toSerialize["maintain_stored_certificate_counts"] = o.MaintainStoredCertificateCounts + toSerialize["pause_duration"] = o.PauseDuration + toSerialize["publish_stored_certificate_count_metrics"] = o.PublishStoredCertificateCountMetrics + toSerialize["revocation_queue_safety_buffer"] = o.RevocationQueueSafetyBuffer + toSerialize["safety_buffer"] = o.SafetyBuffer + toSerialize["tidy_cert_store"] = o.TidyCertStore + toSerialize["tidy_cross_cluster_revoked_certs"] = o.TidyCrossClusterRevokedCerts + toSerialize["tidy_expired_issuers"] = o.TidyExpiredIssuers + toSerialize["tidy_move_legacy_ca_bundle"] = o.TidyMoveLegacyCaBundle + toSerialize["tidy_revocation_queue"] = o.TidyRevocationQueue + toSerialize["tidy_revoked_cert_issuer_associations"] = o.TidyRevokedCertIssuerAssociations + toSerialize["tidy_revoked_certs"] = o.TidyRevokedCerts + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_ca_chain_pem_response.go b/schema/model_pki_read_ca_chain_pem_response.go new file mode 100644 index 00000000..ed469012 --- /dev/null +++ b/schema/model_pki_read_ca_chain_pem_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCaChainPemResponse struct for PkiReadCaChainPemResponse +type PkiReadCaChainPemResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCaChainPemResponseWithDefaults instantiates a new PkiReadCaChainPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCaChainPemResponseWithDefaults() *PkiReadCaChainPemResponse { + var this PkiReadCaChainPemResponse + + return &this +} + +func (o PkiReadCaChainPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_ca_der_response.go b/schema/model_pki_read_ca_der_response.go new file mode 100644 index 00000000..a142f419 --- /dev/null +++ b/schema/model_pki_read_ca_der_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCaDerResponse struct for PkiReadCaDerResponse +type PkiReadCaDerResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCaDerResponseWithDefaults instantiates a new PkiReadCaDerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCaDerResponseWithDefaults() *PkiReadCaDerResponse { + var this PkiReadCaDerResponse + + return &this +} + +func (o PkiReadCaDerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_ca_pem_response.go b/schema/model_pki_read_ca_pem_response.go new file mode 100644 index 00000000..2a4cec31 --- /dev/null +++ b/schema/model_pki_read_ca_pem_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCaPemResponse struct for PkiReadCaPemResponse +type PkiReadCaPemResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCaPemResponseWithDefaults instantiates a new PkiReadCaPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCaPemResponseWithDefaults() *PkiReadCaPemResponse { + var this PkiReadCaPemResponse + + return &this +} + +func (o PkiReadCaPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_cert_ca_chain_response.go b/schema/model_pki_read_cert_ca_chain_response.go new file mode 100644 index 00000000..aa011588 --- /dev/null +++ b/schema/model_pki_read_cert_ca_chain_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCertCaChainResponse struct for PkiReadCertCaChainResponse +type PkiReadCertCaChainResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCertCaChainResponseWithDefaults instantiates a new PkiReadCertCaChainResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCertCaChainResponseWithDefaults() *PkiReadCertCaChainResponse { + var this PkiReadCertCaChainResponse + + return &this +} + +func (o PkiReadCertCaChainResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_cert_crl_response.go b/schema/model_pki_read_cert_crl_response.go new file mode 100644 index 00000000..2c14e646 --- /dev/null +++ b/schema/model_pki_read_cert_crl_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCertCrlResponse struct for PkiReadCertCrlResponse +type PkiReadCertCrlResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCertCrlResponseWithDefaults instantiates a new PkiReadCertCrlResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCertCrlResponseWithDefaults() *PkiReadCertCrlResponse { + var this PkiReadCertCrlResponse + + return &this +} + +func (o PkiReadCertCrlResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_cert_delta_crl_response.go b/schema/model_pki_read_cert_delta_crl_response.go new file mode 100644 index 00000000..64d72d76 --- /dev/null +++ b/schema/model_pki_read_cert_delta_crl_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCertDeltaCrlResponse struct for PkiReadCertDeltaCrlResponse +type PkiReadCertDeltaCrlResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCertDeltaCrlResponseWithDefaults instantiates a new PkiReadCertDeltaCrlResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCertDeltaCrlResponseWithDefaults() *PkiReadCertDeltaCrlResponse { + var this PkiReadCertDeltaCrlResponse + + return &this +} + +func (o PkiReadCertDeltaCrlResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_cert_raw_der_response.go b/schema/model_pki_read_cert_raw_der_response.go new file mode 100644 index 00000000..9ff83628 --- /dev/null +++ b/schema/model_pki_read_cert_raw_der_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCertRawDerResponse struct for PkiReadCertRawDerResponse +type PkiReadCertRawDerResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCertRawDerResponseWithDefaults instantiates a new PkiReadCertRawDerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCertRawDerResponseWithDefaults() *PkiReadCertRawDerResponse { + var this PkiReadCertRawDerResponse + + return &this +} + +func (o PkiReadCertRawDerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_cert_raw_pem_response.go b/schema/model_pki_read_cert_raw_pem_response.go new file mode 100644 index 00000000..455e6eec --- /dev/null +++ b/schema/model_pki_read_cert_raw_pem_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCertRawPemResponse struct for PkiReadCertRawPemResponse +type PkiReadCertRawPemResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCertRawPemResponseWithDefaults instantiates a new PkiReadCertRawPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCertRawPemResponseWithDefaults() *PkiReadCertRawPemResponse { + var this PkiReadCertRawPemResponse + + return &this +} + +func (o PkiReadCertRawPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_cert_response.go b/schema/model_pki_read_cert_response.go new file mode 100644 index 00000000..f937081f --- /dev/null +++ b/schema/model_pki_read_cert_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCertResponse struct for PkiReadCertResponse +type PkiReadCertResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCertResponseWithDefaults instantiates a new PkiReadCertResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCertResponseWithDefaults() *PkiReadCertResponse { + var this PkiReadCertResponse + + return &this +} + +func (o PkiReadCertResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_cluster_configuration_response.go b/schema/model_pki_read_cluster_configuration_response.go new file mode 100644 index 00000000..693a20bd --- /dev/null +++ b/schema/model_pki_read_cluster_configuration_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadClusterConfigurationResponse struct for PkiReadClusterConfigurationResponse +type PkiReadClusterConfigurationResponse struct { + // Optional URI to this mount's AIA distribution point; may refer to an external non-Vault responder. This is for resolving AIA URLs and providing the {{cluster_aia_path}} template parameter and will not be used for other purposes. As such, unlike path above, this could safely be an insecure transit mechanism (like HTTP without TLS). For example: http://cdn.example.com/pr1/pki + AiaPath string `json:"aia_path"` + + // Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki + Path string `json:"path"` +} + +// NewPkiReadClusterConfigurationResponseWithDefaults instantiates a new PkiReadClusterConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadClusterConfigurationResponseWithDefaults() *PkiReadClusterConfigurationResponse { + var this PkiReadClusterConfigurationResponse + + return &this +} + +func (o PkiReadClusterConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["aia_path"] = o.AiaPath + toSerialize["path"] = o.Path + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_crl_configuration_response.go b/schema/model_pki_read_crl_configuration_response.go new file mode 100644 index 00000000..1d2edf5d --- /dev/null +++ b/schema/model_pki_read_crl_configuration_response.go @@ -0,0 +1,73 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCrlConfigurationResponse struct for PkiReadCrlConfigurationResponse +type PkiReadCrlConfigurationResponse struct { + // If set to true, enables automatic rebuilding of the CRL + AutoRebuild bool `json:"auto_rebuild"` + + // The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h. + AutoRebuildGracePeriod string `json:"auto_rebuild_grace_period"` + + // Whether to enable a global, cross-cluster revocation queue. Must be used with auto_rebuild=true. + CrossClusterRevocation bool `json:"cross_cluster_revocation"` + + // The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m. + DeltaRebuildInterval string `json:"delta_rebuild_interval"` + + // If set to true, disables generating the CRL entirely. + Disable bool `json:"disable"` + + // Whether to enable delta CRLs between authoritative CRL rebuilds + EnableDelta bool `json:"enable_delta"` + + // The amount of time the generated CRL should be valid; defaults to 72 hours + Expiry string `json:"expiry"` + + // If set to true, ocsp unauthorized responses will be returned. + OcspDisable bool `json:"ocsp_disable"` + + // The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours + OcspExpiry string `json:"ocsp_expiry"` + + // If set to true enables global replication of revocation entries, also enabling unified versions of OCSP and CRLs if their respective features are enabled. disable for CRLs and ocsp_disable for OCSP. + UnifiedCrl bool `json:"unified_crl"` + + // If set to true, existing CRL and OCSP paths will return the unified CRL instead of a response based on cluster-local data + UnifiedCrlOnExistingPaths bool `json:"unified_crl_on_existing_paths"` +} + +// NewPkiReadCrlConfigurationResponseWithDefaults instantiates a new PkiReadCrlConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCrlConfigurationResponseWithDefaults() *PkiReadCrlConfigurationResponse { + var this PkiReadCrlConfigurationResponse + + return &this +} + +func (o PkiReadCrlConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["auto_rebuild"] = o.AutoRebuild + toSerialize["auto_rebuild_grace_period"] = o.AutoRebuildGracePeriod + toSerialize["cross_cluster_revocation"] = o.CrossClusterRevocation + toSerialize["delta_rebuild_interval"] = o.DeltaRebuildInterval + toSerialize["disable"] = o.Disable + toSerialize["enable_delta"] = o.EnableDelta + toSerialize["expiry"] = o.Expiry + toSerialize["ocsp_disable"] = o.OcspDisable + toSerialize["ocsp_expiry"] = o.OcspExpiry + toSerialize["unified_crl"] = o.UnifiedCrl + toSerialize["unified_crl_on_existing_paths"] = o.UnifiedCrlOnExistingPaths + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_crl_delta_pem_response.go b/schema/model_pki_read_crl_delta_pem_response.go new file mode 100644 index 00000000..ec35719d --- /dev/null +++ b/schema/model_pki_read_crl_delta_pem_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCrlDeltaPemResponse struct for PkiReadCrlDeltaPemResponse +type PkiReadCrlDeltaPemResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCrlDeltaPemResponseWithDefaults instantiates a new PkiReadCrlDeltaPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCrlDeltaPemResponseWithDefaults() *PkiReadCrlDeltaPemResponse { + var this PkiReadCrlDeltaPemResponse + + return &this +} + +func (o PkiReadCrlDeltaPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_crl_delta_response.go b/schema/model_pki_read_crl_delta_response.go new file mode 100644 index 00000000..6b20bf96 --- /dev/null +++ b/schema/model_pki_read_crl_delta_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCrlDeltaResponse struct for PkiReadCrlDeltaResponse +type PkiReadCrlDeltaResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCrlDeltaResponseWithDefaults instantiates a new PkiReadCrlDeltaResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCrlDeltaResponseWithDefaults() *PkiReadCrlDeltaResponse { + var this PkiReadCrlDeltaResponse + + return &this +} + +func (o PkiReadCrlDeltaResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_crl_der_response.go b/schema/model_pki_read_crl_der_response.go new file mode 100644 index 00000000..b5c2a182 --- /dev/null +++ b/schema/model_pki_read_crl_der_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCrlDerResponse struct for PkiReadCrlDerResponse +type PkiReadCrlDerResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCrlDerResponseWithDefaults instantiates a new PkiReadCrlDerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCrlDerResponseWithDefaults() *PkiReadCrlDerResponse { + var this PkiReadCrlDerResponse + + return &this +} + +func (o PkiReadCrlDerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_crl_pem_response.go b/schema/model_pki_read_crl_pem_response.go new file mode 100644 index 00000000..94d22d80 --- /dev/null +++ b/schema/model_pki_read_crl_pem_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadCrlPemResponse struct for PkiReadCrlPemResponse +type PkiReadCrlPemResponse struct { + // Issuing CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Revocation time + RevocationTime string `json:"revocation_time"` + + // Revocation time RFC 3339 formatted + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` +} + +// NewPkiReadCrlPemResponseWithDefaults instantiates a new PkiReadCrlPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadCrlPemResponseWithDefaults() *PkiReadCrlPemResponse { + var this PkiReadCrlPemResponse + + return &this +} + +func (o PkiReadCrlPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_issuer_der_response.go b/schema/model_pki_read_issuer_der_response.go new file mode 100644 index 00000000..8487c944 --- /dev/null +++ b/schema/model_pki_read_issuer_der_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadIssuerDerResponse struct for PkiReadIssuerDerResponse +type PkiReadIssuerDerResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Issuer Id + IssuerId string `json:"issuer_id"` + + // Issuer Name + IssuerName string `json:"issuer_name"` +} + +// NewPkiReadIssuerDerResponseWithDefaults instantiates a new PkiReadIssuerDerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadIssuerDerResponseWithDefaults() *PkiReadIssuerDerResponse { + var this PkiReadIssuerDerResponse + + return &this +} + +func (o PkiReadIssuerDerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_issuer_json_response.go b/schema/model_pki_read_issuer_json_response.go new file mode 100644 index 00000000..bec60e6c --- /dev/null +++ b/schema/model_pki_read_issuer_json_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadIssuerJsonResponse struct for PkiReadIssuerJsonResponse +type PkiReadIssuerJsonResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Issuer Id + IssuerId string `json:"issuer_id"` + + // Issuer Name + IssuerName string `json:"issuer_name"` +} + +// NewPkiReadIssuerJsonResponseWithDefaults instantiates a new PkiReadIssuerJsonResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadIssuerJsonResponseWithDefaults() *PkiReadIssuerJsonResponse { + var this PkiReadIssuerJsonResponse + + return &this +} + +func (o PkiReadIssuerJsonResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_issuer_pem_response.go b/schema/model_pki_read_issuer_pem_response.go new file mode 100644 index 00000000..9e745286 --- /dev/null +++ b/schema/model_pki_read_issuer_pem_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadIssuerPemResponse struct for PkiReadIssuerPemResponse +type PkiReadIssuerPemResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Issuer Id + IssuerId string `json:"issuer_id"` + + // Issuer Name + IssuerName string `json:"issuer_name"` +} + +// NewPkiReadIssuerPemResponseWithDefaults instantiates a new PkiReadIssuerPemResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadIssuerPemResponseWithDefaults() *PkiReadIssuerPemResponse { + var this PkiReadIssuerPemResponse + + return &this +} + +func (o PkiReadIssuerPemResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_issuer_response.go b/schema/model_pki_read_issuer_response.go new file mode 100644 index 00000000..ff98a7ac --- /dev/null +++ b/schema/model_pki_read_issuer_response.go @@ -0,0 +1,87 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadIssuerResponse struct for PkiReadIssuerResponse +type PkiReadIssuerResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // CRL Distribution Points + CrlDistributionPoints []string `json:"crl_distribution_points"` + + // Issuer Id + IssuerId string `json:"issuer_id"` + + // Issuer Name + IssuerName string `json:"issuer_name"` + + // Issuing Certificates + IssuingCertificates []string `json:"issuing_certificates"` + + // Key Id + KeyId string `json:"key_id"` + + // Leaf Not After Behavior + LeafNotAfterBehavior string `json:"leaf_not_after_behavior"` + + // Manual Chain + ManualChain []string `json:"manual_chain"` + + // OSCP Servers + OcspServers []string `json:"ocsp_servers"` + + // Revocation Signature Alogrithm + RevocationSignatureAlgorithm string `json:"revocation_signature_algorithm"` + + RevocationTime int32 `json:"revocation_time"` + + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` + + // Revoked + Revoked bool `json:"revoked"` + + // Usage + Usage []string `json:"usage"` +} + +// NewPkiReadIssuerResponseWithDefaults instantiates a new PkiReadIssuerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadIssuerResponseWithDefaults() *PkiReadIssuerResponse { + var this PkiReadIssuerResponse + + return &this +} + +func (o PkiReadIssuerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["crl_distribution_points"] = o.CrlDistributionPoints + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + toSerialize["issuing_certificates"] = o.IssuingCertificates + toSerialize["key_id"] = o.KeyId + toSerialize["leaf_not_after_behavior"] = o.LeafNotAfterBehavior + toSerialize["manual_chain"] = o.ManualChain + toSerialize["ocsp_servers"] = o.OcspServers + toSerialize["revocation_signature_algorithm"] = o.RevocationSignatureAlgorithm + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + toSerialize["revoked"] = o.Revoked + toSerialize["usage"] = o.Usage + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_issuers_configuration_response.go b/schema/model_pki_read_issuers_configuration_response.go new file mode 100644 index 00000000..6140208d --- /dev/null +++ b/schema/model_pki_read_issuers_configuration_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadIssuersConfigurationResponse struct for PkiReadIssuersConfigurationResponse +type PkiReadIssuersConfigurationResponse struct { + // Reference (name or identifier) to the default issuer. + Default string `json:"default"` + + // Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false. + DefaultFollowsLatestIssuer bool `json:"default_follows_latest_issuer"` +} + +// NewPkiReadIssuersConfigurationResponseWithDefaults instantiates a new PkiReadIssuersConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadIssuersConfigurationResponseWithDefaults() *PkiReadIssuersConfigurationResponse { + var this PkiReadIssuersConfigurationResponse + + return &this +} + +func (o PkiReadIssuersConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["default"] = o.Default + toSerialize["default_follows_latest_issuer"] = o.DefaultFollowsLatestIssuer + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_key_response.go b/schema/model_pki_read_key_response.go new file mode 100644 index 00000000..73bca9b8 --- /dev/null +++ b/schema/model_pki_read_key_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadKeyResponse struct for PkiReadKeyResponse +type PkiReadKeyResponse struct { + // Key Id + KeyId string `json:"key_id"` + + // Key Name + KeyName string `json:"key_name"` + + // Key Type + KeyType string `json:"key_type"` + + // Managed Key Id + ManagedKeyId string `json:"managed_key_id"` + + // Managed Key Name + ManagedKeyName string `json:"managed_key_name"` +} + +// NewPkiReadKeyResponseWithDefaults instantiates a new PkiReadKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadKeyResponseWithDefaults() *PkiReadKeyResponse { + var this PkiReadKeyResponse + + return &this +} + +func (o PkiReadKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["key_type"] = o.KeyType + toSerialize["managed_key_id"] = o.ManagedKeyId + toSerialize["managed_key_name"] = o.ManagedKeyName + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_keys_configuration_response.go b/schema/model_pki_read_keys_configuration_response.go new file mode 100644 index 00000000..52bf0d28 --- /dev/null +++ b/schema/model_pki_read_keys_configuration_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadKeysConfigurationResponse struct for PkiReadKeysConfigurationResponse +type PkiReadKeysConfigurationResponse struct { + // Reference (name or identifier) to the default issuer. + Default string `json:"default"` +} + +// NewPkiReadKeysConfigurationResponseWithDefaults instantiates a new PkiReadKeysConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadKeysConfigurationResponseWithDefaults() *PkiReadKeysConfigurationResponse { + var this PkiReadKeysConfigurationResponse + + return &this +} + +func (o PkiReadKeysConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["default"] = o.Default + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_role_response.go b/schema/model_pki_read_role_response.go new file mode 100644 index 00000000..0f859473 --- /dev/null +++ b/schema/model_pki_read_role_response.go @@ -0,0 +1,219 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadRoleResponse struct for PkiReadRoleResponse +type PkiReadRoleResponse struct { + // If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. + AllowAnyName bool `json:"allow_any_name"` + + // If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information. + AllowBareDomains bool `json:"allow_bare_domains"` + + // If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information. + AllowGlobDomains bool `json:"allow_glob_domains"` + + // If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed. + AllowIpSans bool `json:"allow_ip_sans"` + + // Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. + AllowLocalhost bool `json:"allow_localhost"` + + // If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information. + AllowSubdomains bool `json:"allow_subdomains"` + + // Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. + AllowTokenDisplayname bool `json:"allow_token_displayname"` + + // If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information. + AllowWildcardCertificates bool `json:"allow_wildcard_certificates"` + + // Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains. + AllowedDomains []string `json:"allowed_domains"` + + // If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. + AllowedDomainsTemplate bool `json:"allowed_domains_template"` + + // If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format ;:. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8). + AllowedOtherSans []string `json:"allowed_other_sans"` + + // If set, an array of allowed serial numbers to put in Subject. These values support globbing. + AllowedSerialNumbers []string `json:"allowed_serial_numbers"` + + // If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. + AllowedUriSans []string `json:"allowed_uri_sans"` + + // If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. + AllowedUriSansTemplate bool `json:"allowed_uri_sans_template"` + + // If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 + AllowedUserIds []string `json:"allowed_user_ids"` + + // Mark Basic Constraints valid when issuing non-CA certificates. + BasicConstraintsValidForNonCa bool `json:"basic_constraints_valid_for_non_ca"` + + // If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. + ClientFlag bool `json:"client_flag"` + + // List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs. + CnValidations []string `json:"cn_validations"` + + // If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12. + CodeSigningFlag bool `json:"code_signing_flag"` + + // If set, Country will be set to this value in certificates issued by this role. + Country []string `json:"country"` + + // If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12. + EmailProtectionFlag bool `json:"email_protection_flag"` + + // If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true. + EnforceHostnames bool `json:"enforce_hostnames"` + + // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12. + ExtKeyUsage []string `json:"ext_key_usage"` + + // A comma-separated string or list of extended key usage oids. + ExtKeyUsageOids []string `json:"ext_key_usage_oids"` + + // If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke \" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault. + GenerateLease bool `json:"generate_lease"` + + // Reference to the issuer used to sign requests serviced by this role. + IssuerRef string `json:"issuer_ref"` + + // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. + KeyBits int32 `json:"key_bits"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values. + KeyType string `json:"key_type"` + + // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3. + KeyUsage []string `json:"key_usage"` + + // If set, Locality will be set to this value in certificates issued by this role. + Locality []string `json:"locality"` + + // The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL. + MaxTtl int32 `json:"max_ttl"` + + // If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\". + NoStore bool `json:"no_store"` + + // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. + NotAfter string `json:"not_after"` + + // The duration before now which the certificate needs to be backdated by. + NotBeforeDuration int32 `json:"not_before_duration"` + + // If set, O (Organization) will be set to this value in certificates issued by this role. + Organization []string `json:"organization"` + + // If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role. + Ou []string `json:"ou"` + + // A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}]. + PolicyIdentifiers []string `json:"policy_identifiers"` + + // If set, Postal Code will be set to this value in certificates issued by this role. + PostalCode []string `json:"postal_code"` + + // If set, Province will be set to this value in certificates issued by this role. + Province []string `json:"province"` + + // If set to false, makes the 'common_name' field optional while generating a certificate. + RequireCn bool `json:"require_cn"` + + // If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. + ServerFlag bool `json:"server_flag"` + + // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). + SignatureBits int32 `json:"signature_bits"` + + // If set, Street Address will be set to this value in certificates issued by this role. + StreetAddress []string `json:"street_address"` + + // The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter. + Ttl int32 `json:"ttl"` + + // If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true. + UseCsrCommonName bool `json:"use_csr_common_name"` + + // If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true. + UseCsrSans bool `json:"use_csr_sans"` + + // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. + UsePss bool `json:"use_pss"` +} + +// NewPkiReadRoleResponseWithDefaults instantiates a new PkiReadRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadRoleResponseWithDefaults() *PkiReadRoleResponse { + var this PkiReadRoleResponse + + this.ServerFlag = true + + return &this +} + +func (o PkiReadRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["allow_any_name"] = o.AllowAnyName + toSerialize["allow_bare_domains"] = o.AllowBareDomains + toSerialize["allow_glob_domains"] = o.AllowGlobDomains + toSerialize["allow_ip_sans"] = o.AllowIpSans + toSerialize["allow_localhost"] = o.AllowLocalhost + toSerialize["allow_subdomains"] = o.AllowSubdomains + toSerialize["allow_token_displayname"] = o.AllowTokenDisplayname + toSerialize["allow_wildcard_certificates"] = o.AllowWildcardCertificates + toSerialize["allowed_domains"] = o.AllowedDomains + toSerialize["allowed_domains_template"] = o.AllowedDomainsTemplate + toSerialize["allowed_other_sans"] = o.AllowedOtherSans + toSerialize["allowed_serial_numbers"] = o.AllowedSerialNumbers + toSerialize["allowed_uri_sans"] = o.AllowedUriSans + toSerialize["allowed_uri_sans_template"] = o.AllowedUriSansTemplate + toSerialize["allowed_user_ids"] = o.AllowedUserIds + toSerialize["basic_constraints_valid_for_non_ca"] = o.BasicConstraintsValidForNonCa + toSerialize["client_flag"] = o.ClientFlag + toSerialize["cn_validations"] = o.CnValidations + toSerialize["code_signing_flag"] = o.CodeSigningFlag + toSerialize["country"] = o.Country + toSerialize["email_protection_flag"] = o.EmailProtectionFlag + toSerialize["enforce_hostnames"] = o.EnforceHostnames + toSerialize["ext_key_usage"] = o.ExtKeyUsage + toSerialize["ext_key_usage_oids"] = o.ExtKeyUsageOids + toSerialize["generate_lease"] = o.GenerateLease + toSerialize["issuer_ref"] = o.IssuerRef + toSerialize["key_bits"] = o.KeyBits + toSerialize["key_type"] = o.KeyType + toSerialize["key_usage"] = o.KeyUsage + toSerialize["locality"] = o.Locality + toSerialize["max_ttl"] = o.MaxTtl + toSerialize["no_store"] = o.NoStore + toSerialize["not_after"] = o.NotAfter + toSerialize["not_before_duration"] = o.NotBeforeDuration + toSerialize["organization"] = o.Organization + toSerialize["ou"] = o.Ou + toSerialize["policy_identifiers"] = o.PolicyIdentifiers + toSerialize["postal_code"] = o.PostalCode + toSerialize["province"] = o.Province + toSerialize["require_cn"] = o.RequireCn + toSerialize["server_flag"] = o.ServerFlag + toSerialize["signature_bits"] = o.SignatureBits + toSerialize["street_address"] = o.StreetAddress + toSerialize["ttl"] = o.Ttl + toSerialize["use_csr_common_name"] = o.UseCsrCommonName + toSerialize["use_csr_sans"] = o.UseCsrSans + toSerialize["use_pss"] = o.UsePss + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_read_urls_configuration_response.go b/schema/model_pki_read_urls_configuration_response.go new file mode 100644 index 00000000..e3f257c5 --- /dev/null +++ b/schema/model_pki_read_urls_configuration_response.go @@ -0,0 +1,45 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReadUrlsConfigurationResponse struct for PkiReadUrlsConfigurationResponse +type PkiReadUrlsConfigurationResponse struct { + // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. + CrlDistributionPoints []string `json:"crl_distribution_points"` + + // Whether or not to enable templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URI validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. + EnableTemplating bool `json:"enable_templating"` + + // Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. + IssuingCertificates []string `json:"issuing_certificates"` + + // Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. + OcspServers []string `json:"ocsp_servers"` +} + +// NewPkiReadUrlsConfigurationResponseWithDefaults instantiates a new PkiReadUrlsConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReadUrlsConfigurationResponseWithDefaults() *PkiReadUrlsConfigurationResponse { + var this PkiReadUrlsConfigurationResponse + + return &this +} + +func (o PkiReadUrlsConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["crl_distribution_points"] = o.CrlDistributionPoints + toSerialize["enable_templating"] = o.EnableTemplating + toSerialize["issuing_certificates"] = o.IssuingCertificates + toSerialize["ocsp_servers"] = o.OcspServers + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_replace_root_request.go b/schema/model_pki_replace_root_request.go index b0a0f235..c633e6d3 100644 --- a/schema/model_pki_replace_root_request.go +++ b/schema/model_pki_replace_root_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// PKIReplaceRootRequest struct for PKIReplaceRootRequest -type PKIReplaceRootRequest struct { +// PkiReplaceRootRequest struct for PkiReplaceRootRequest +type PkiReplaceRootRequest struct { // Reference (name or identifier) to the default issuer. Default string `json:"default"` } -// NewPKIReplaceRootRequestWithDefaults instantiates a new PKIReplaceRootRequest object +// NewPkiReplaceRootRequestWithDefaults instantiates a new PkiReplaceRootRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIReplaceRootRequestWithDefaults() *PKIReplaceRootRequest { - var this PKIReplaceRootRequest +func NewPkiReplaceRootRequestWithDefaults() *PkiReplaceRootRequest { + var this PkiReplaceRootRequest this.Default = "next" return &this } -func (o PKIReplaceRootRequest) MarshalJSON() ([]byte, error) { +func (o PkiReplaceRootRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["default"] = o.Default diff --git a/schema/model_pki_replace_root_response.go b/schema/model_pki_replace_root_response.go new file mode 100644 index 00000000..3de52227 --- /dev/null +++ b/schema/model_pki_replace_root_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiReplaceRootResponse struct for PkiReplaceRootResponse +type PkiReplaceRootResponse struct { + // Reference (name or identifier) to the default issuer. + Default string `json:"default"` + + // Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false. + DefaultFollowsLatestIssuer bool `json:"default_follows_latest_issuer"` +} + +// NewPkiReplaceRootResponseWithDefaults instantiates a new PkiReplaceRootResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiReplaceRootResponseWithDefaults() *PkiReplaceRootResponse { + var this PkiReplaceRootResponse + + return &this +} + +func (o PkiReplaceRootResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["default"] = o.Default + toSerialize["default_follows_latest_issuer"] = o.DefaultFollowsLatestIssuer + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_revoke_issuer_response.go b/schema/model_pki_revoke_issuer_response.go new file mode 100644 index 00000000..0e943b2f --- /dev/null +++ b/schema/model_pki_revoke_issuer_response.go @@ -0,0 +1,89 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// PkiRevokeIssuerResponse struct for PkiRevokeIssuerResponse +type PkiRevokeIssuerResponse struct { + // Certificate Authority Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Specifies the URL values for the CRL Distribution Points field + CrlDistributionPoints []string `json:"crl_distribution_points"` + + // ID of the issuer + IssuerId string `json:"issuer_id"` + + // Name of the issuer + IssuerName string `json:"issuer_name"` + + // Specifies the URL values for the Issuing Certificate field + IssuingCertificates []string `json:"issuing_certificates"` + + // ID of the Key + KeyId string `json:"key_id"` + + LeafNotAfterBehavior string `json:"leaf_not_after_behavior"` + + // Manual Chain + ManualChain []string `json:"manual_chain"` + + // Specifies the URL values for the OCSP Servers field + OcspServers []string `json:"ocsp_servers"` + + // Which signature algorithm to use when building CRLs + RevocationSignatureAlgorithm string `json:"revocation_signature_algorithm"` + + // Time of revocation + RevocationTime int64 `json:"revocation_time"` + + // RFC formatted time of revocation + RevocationTimeRfc3339 time.Time `json:"revocation_time_rfc3339"` + + // Whether the issuer was revoked + Revoked bool `json:"revoked"` + + // Allowed usage + Usage string `json:"usage"` +} + +// NewPkiRevokeIssuerResponseWithDefaults instantiates a new PkiRevokeIssuerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiRevokeIssuerResponseWithDefaults() *PkiRevokeIssuerResponse { + var this PkiRevokeIssuerResponse + + return &this +} + +func (o PkiRevokeIssuerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["crl_distribution_points"] = o.CrlDistributionPoints + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + toSerialize["issuing_certificates"] = o.IssuingCertificates + toSerialize["key_id"] = o.KeyId + toSerialize["leaf_not_after_behavior"] = o.LeafNotAfterBehavior + toSerialize["manual_chain"] = o.ManualChain + toSerialize["ocsp_servers"] = o.OcspServers + toSerialize["revocation_signature_algorithm"] = o.RevocationSignatureAlgorithm + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + toSerialize["revoked"] = o.Revoked + toSerialize["usage"] = o.Usage + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_revoke_request.go b/schema/model_pki_revoke_request.go index ae1a2532..208e61fd 100644 --- a/schema/model_pki_revoke_request.go +++ b/schema/model_pki_revoke_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIRevokeRequest struct for PKIRevokeRequest -type PKIRevokeRequest struct { +// PkiRevokeRequest struct for PkiRevokeRequest +type PkiRevokeRequest struct { // Certificate to revoke in PEM format; must be signed by an issuer in this mount. Certificate string `json:"certificate"` @@ -18,16 +18,16 @@ type PKIRevokeRequest struct { SerialNumber string `json:"serial_number"` } -// NewPKIRevokeRequestWithDefaults instantiates a new PKIRevokeRequest object +// NewPkiRevokeRequestWithDefaults instantiates a new PkiRevokeRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIRevokeRequestWithDefaults() *PKIRevokeRequest { - var this PKIRevokeRequest +func NewPkiRevokeRequestWithDefaults() *PkiRevokeRequest { + var this PkiRevokeRequest return &this } -func (o PKIRevokeRequest) MarshalJSON() ([]byte, error) { +func (o PkiRevokeRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["certificate"] = o.Certificate diff --git a/schema/model_pki_revoke_response.go b/schema/model_pki_revoke_response.go new file mode 100644 index 00000000..d9fad581 --- /dev/null +++ b/schema/model_pki_revoke_response.go @@ -0,0 +1,42 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// PkiRevokeResponse struct for PkiRevokeResponse +type PkiRevokeResponse struct { + // Revocation Time + RevocationTime int32 `json:"revocation_time"` + + // Revocation Time + RevocationTimeRfc3339 time.Time `json:"revocation_time_rfc3339"` + + // Revocation State + State string `json:"state"` +} + +// NewPkiRevokeResponseWithDefaults instantiates a new PkiRevokeResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiRevokeResponseWithDefaults() *PkiRevokeResponse { + var this PkiRevokeResponse + + return &this +} + +func (o PkiRevokeResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + toSerialize["state"] = o.State + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_revoke_with_key_request.go b/schema/model_pki_revoke_with_key_request.go index 229a27ad..993a8598 100644 --- a/schema/model_pki_revoke_with_key_request.go +++ b/schema/model_pki_revoke_with_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIRevokeWithKeyRequest struct for PKIRevokeWithKeyRequest -type PKIRevokeWithKeyRequest struct { +// PkiRevokeWithKeyRequest struct for PkiRevokeWithKeyRequest +type PkiRevokeWithKeyRequest struct { // Certificate to revoke in PEM format; must be signed by an issuer in this mount. Certificate string `json:"certificate"` @@ -21,16 +21,16 @@ type PKIRevokeWithKeyRequest struct { SerialNumber string `json:"serial_number"` } -// NewPKIRevokeWithKeyRequestWithDefaults instantiates a new PKIRevokeWithKeyRequest object +// NewPkiRevokeWithKeyRequestWithDefaults instantiates a new PkiRevokeWithKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIRevokeWithKeyRequestWithDefaults() *PKIRevokeWithKeyRequest { - var this PKIRevokeWithKeyRequest +func NewPkiRevokeWithKeyRequestWithDefaults() *PkiRevokeWithKeyRequest { + var this PkiRevokeWithKeyRequest return &this } -func (o PKIRevokeWithKeyRequest) MarshalJSON() ([]byte, error) { +func (o PkiRevokeWithKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["certificate"] = o.Certificate diff --git a/schema/model_pki_revoke_with_key_response.go b/schema/model_pki_revoke_with_key_response.go new file mode 100644 index 00000000..c0822a29 --- /dev/null +++ b/schema/model_pki_revoke_with_key_response.go @@ -0,0 +1,42 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// PkiRevokeWithKeyResponse struct for PkiRevokeWithKeyResponse +type PkiRevokeWithKeyResponse struct { + // Revocation Time + RevocationTime int32 `json:"revocation_time"` + + // Revocation Time + RevocationTimeRfc3339 time.Time `json:"revocation_time_rfc3339"` + + // Revocation State + State string `json:"state"` +} + +// NewPkiRevokeWithKeyResponseWithDefaults instantiates a new PkiRevokeWithKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiRevokeWithKeyResponseWithDefaults() *PkiRevokeWithKeyResponse { + var this PkiRevokeWithKeyResponse + + return &this +} + +func (o PkiRevokeWithKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + toSerialize["state"] = o.State + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_root_sign_intermediate_request.go b/schema/model_pki_root_sign_intermediate_request.go index 275290ad..f7ca3ca7 100644 --- a/schema/model_pki_root_sign_intermediate_request.go +++ b/schema/model_pki_root_sign_intermediate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIRootSignIntermediateRequest struct for PKIRootSignIntermediateRequest -type PKIRootSignIntermediateRequest struct { +// PkiRootSignIntermediateRequest struct for PkiRootSignIntermediateRequest +type PkiRootSignIntermediateRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` @@ -96,11 +96,11 @@ type PKIRootSignIntermediateRequest struct { UsePss bool `json:"use_pss"` } -// NewPKIRootSignIntermediateRequestWithDefaults instantiates a new PKIRootSignIntermediateRequest object +// NewPkiRootSignIntermediateRequestWithDefaults instantiates a new PkiRootSignIntermediateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIRootSignIntermediateRequestWithDefaults() *PKIRootSignIntermediateRequest { - var this PKIRootSignIntermediateRequest +func NewPkiRootSignIntermediateRequestWithDefaults() *PkiRootSignIntermediateRequest { + var this PkiRootSignIntermediateRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -117,7 +117,7 @@ func NewPKIRootSignIntermediateRequestWithDefaults() *PKIRootSignIntermediateReq return &this } -func (o PKIRootSignIntermediateRequest) MarshalJSON() ([]byte, error) { +func (o PkiRootSignIntermediateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames diff --git a/schema/model_pki_root_sign_intermediate_response.go b/schema/model_pki_root_sign_intermediate_response.go new file mode 100644 index 00000000..cabeb9c3 --- /dev/null +++ b/schema/model_pki_root_sign_intermediate_response.go @@ -0,0 +1,49 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiRootSignIntermediateResponse struct for PkiRootSignIntermediateResponse +type PkiRootSignIntermediateResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Expiration Time + Expiration int64 `json:"expiration"` + + // Issuing CA + IssuingCa string `json:"issuing_ca"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiRootSignIntermediateResponseWithDefaults instantiates a new PkiRootSignIntermediateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiRootSignIntermediateResponseWithDefaults() *PkiRootSignIntermediateResponse { + var this PkiRootSignIntermediateResponse + + return &this +} + +func (o PkiRootSignIntermediateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_root_sign_self_issued_request.go b/schema/model_pki_root_sign_self_issued_request.go index ebade4b5..14420407 100644 --- a/schema/model_pki_root_sign_self_issued_request.go +++ b/schema/model_pki_root_sign_self_issued_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIRootSignSelfIssuedRequest struct for PKIRootSignSelfIssuedRequest -type PKIRootSignSelfIssuedRequest struct { +// PkiRootSignSelfIssuedRequest struct for PkiRootSignSelfIssuedRequest +type PkiRootSignSelfIssuedRequest struct { // PEM-format self-issued certificate to be signed. Certificate string `json:"certificate"` @@ -21,11 +21,11 @@ type PKIRootSignSelfIssuedRequest struct { RequireMatchingCertificateAlgorithms bool `json:"require_matching_certificate_algorithms"` } -// NewPKIRootSignSelfIssuedRequestWithDefaults instantiates a new PKIRootSignSelfIssuedRequest object +// NewPkiRootSignSelfIssuedRequestWithDefaults instantiates a new PkiRootSignSelfIssuedRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIRootSignSelfIssuedRequestWithDefaults() *PKIRootSignSelfIssuedRequest { - var this PKIRootSignSelfIssuedRequest +func NewPkiRootSignSelfIssuedRequestWithDefaults() *PkiRootSignSelfIssuedRequest { + var this PkiRootSignSelfIssuedRequest this.IssuerRef = "default" this.RequireMatchingCertificateAlgorithms = false @@ -33,7 +33,7 @@ func NewPKIRootSignSelfIssuedRequestWithDefaults() *PKIRootSignSelfIssuedRequest return &this } -func (o PKIRootSignSelfIssuedRequest) MarshalJSON() ([]byte, error) { +func (o PkiRootSignSelfIssuedRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["certificate"] = o.Certificate diff --git a/schema/model_pki_root_sign_self_issued_response.go b/schema/model_pki_root_sign_self_issued_response.go new file mode 100644 index 00000000..c062f80d --- /dev/null +++ b/schema/model_pki_root_sign_self_issued_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiRootSignSelfIssuedResponse struct for PkiRootSignSelfIssuedResponse +type PkiRootSignSelfIssuedResponse struct { + // Certificate + Certificate string `json:"certificate"` + + // Issuing CA + IssuingCa string `json:"issuing_ca"` +} + +// NewPkiRootSignSelfIssuedResponseWithDefaults instantiates a new PkiRootSignSelfIssuedResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiRootSignSelfIssuedResponseWithDefaults() *PkiRootSignSelfIssuedResponse { + var this PkiRootSignSelfIssuedResponse + + return &this +} + +func (o PkiRootSignSelfIssuedResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["certificate"] = o.Certificate + toSerialize["issuing_ca"] = o.IssuingCa + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_rotate_crl_response.go b/schema/model_pki_rotate_crl_response.go new file mode 100644 index 00000000..05015fbd --- /dev/null +++ b/schema/model_pki_rotate_crl_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiRotateCrlResponse struct for PkiRotateCrlResponse +type PkiRotateCrlResponse struct { + // Whether rotation was successful + Success bool `json:"success"` +} + +// NewPkiRotateCrlResponseWithDefaults instantiates a new PkiRotateCrlResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiRotateCrlResponseWithDefaults() *PkiRotateCrlResponse { + var this PkiRotateCrlResponse + + return &this +} + +func (o PkiRotateCrlResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["success"] = o.Success + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_rotate_delta_crl_response.go b/schema/model_pki_rotate_delta_crl_response.go new file mode 100644 index 00000000..89e24aa2 --- /dev/null +++ b/schema/model_pki_rotate_delta_crl_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiRotateDeltaCrlResponse struct for PkiRotateDeltaCrlResponse +type PkiRotateDeltaCrlResponse struct { + // Whether rotation was successful + Success bool `json:"success"` +} + +// NewPkiRotateDeltaCrlResponseWithDefaults instantiates a new PkiRotateDeltaCrlResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiRotateDeltaCrlResponseWithDefaults() *PkiRotateDeltaCrlResponse { + var this PkiRotateDeltaCrlResponse + + return &this +} + +func (o PkiRotateDeltaCrlResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["success"] = o.Success + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_intermediate_set_signed_request.go b/schema/model_pki_set_signed_intermediate_request.go similarity index 61% rename from schema/model_pki_write_intermediate_set_signed_request.go rename to schema/model_pki_set_signed_intermediate_request.go index 3e6c05d9..770f3696 100644 --- a/schema/model_pki_write_intermediate_set_signed_request.go +++ b/schema/model_pki_set_signed_intermediate_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// PKIWriteIntermediateSetSignedRequest struct for PKIWriteIntermediateSetSignedRequest -type PKIWriteIntermediateSetSignedRequest struct { +// PkiSetSignedIntermediateRequest struct for PkiSetSignedIntermediateRequest +type PkiSetSignedIntermediateRequest struct { // PEM-format certificate. This must be a CA certificate with a public key matching the previously-generated key from the generation endpoint. Additional parent CAs may be optionally appended to the bundle. Certificate string `json:"certificate"` } -// NewPKIWriteIntermediateSetSignedRequestWithDefaults instantiates a new PKIWriteIntermediateSetSignedRequest object +// NewPkiSetSignedIntermediateRequestWithDefaults instantiates a new PkiSetSignedIntermediateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteIntermediateSetSignedRequestWithDefaults() *PKIWriteIntermediateSetSignedRequest { - var this PKIWriteIntermediateSetSignedRequest +func NewPkiSetSignedIntermediateRequestWithDefaults() *PkiSetSignedIntermediateRequest { + var this PkiSetSignedIntermediateRequest return &this } -func (o PKIWriteIntermediateSetSignedRequest) MarshalJSON() ([]byte, error) { +func (o PkiSetSignedIntermediateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["certificate"] = o.Certificate diff --git a/schema/model_pki_set_signed_intermediate_response.go b/schema/model_pki_set_signed_intermediate_response.go new file mode 100644 index 00000000..a2d194ea --- /dev/null +++ b/schema/model_pki_set_signed_intermediate_response.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiSetSignedIntermediateResponse struct for PkiSetSignedIntermediateResponse +type PkiSetSignedIntermediateResponse struct { + // Net-new issuers imported as a part of this request + ImportedIssuers []string `json:"imported_issuers"` + + // Net-new keys imported as a part of this request + ImportedKeys []string `json:"imported_keys"` + + // A mapping of issuer_id to key_id for all issuers included in this request + Mapping map[string]interface{} `json:"mapping"` +} + +// NewPkiSetSignedIntermediateResponseWithDefaults instantiates a new PkiSetSignedIntermediateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiSetSignedIntermediateResponseWithDefaults() *PkiSetSignedIntermediateResponse { + var this PkiSetSignedIntermediateResponse + + return &this +} + +func (o PkiSetSignedIntermediateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["imported_issuers"] = o.ImportedIssuers + toSerialize["imported_keys"] = o.ImportedKeys + toSerialize["mapping"] = o.Mapping + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_sign_verbatim_request.go b/schema/model_pki_sign_verbatim_request.go index c5a43b06..b2f8c9cb 100644 --- a/schema/model_pki_sign_verbatim_request.go +++ b/schema/model_pki_sign_verbatim_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKISignVerbatimRequest struct for PKISignVerbatimRequest -type PKISignVerbatimRequest struct { +// PkiSignVerbatimRequest struct for PkiSignVerbatimRequest +type PkiSignVerbatimRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -70,13 +70,16 @@ type PKISignVerbatimRequest struct { // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKISignVerbatimRequestWithDefaults instantiates a new PKISignVerbatimRequest object +// NewPkiSignVerbatimRequestWithDefaults instantiates a new PkiSignVerbatimRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKISignVerbatimRequestWithDefaults() *PKISignVerbatimRequest { - var this PKISignVerbatimRequest +func NewPkiSignVerbatimRequestWithDefaults() *PkiSignVerbatimRequest { + var this PkiSignVerbatimRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -90,7 +93,7 @@ func NewPKISignVerbatimRequestWithDefaults() *PKISignVerbatimRequest { return &this } -func (o PKISignVerbatimRequest) MarshalJSON() ([]byte, error) { +func (o PkiSignVerbatimRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -113,6 +116,7 @@ func (o PKISignVerbatimRequest) MarshalJSON() ([]byte, error) { toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans toSerialize["use_pss"] = o.UsePss + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_sign_verbatim_response.go b/schema/model_pki_sign_verbatim_response.go new file mode 100644 index 00000000..6092e82f --- /dev/null +++ b/schema/model_pki_sign_verbatim_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiSignVerbatimResponse struct for PkiSignVerbatimResponse +type PkiSignVerbatimResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiSignVerbatimResponseWithDefaults instantiates a new PkiSignVerbatimResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiSignVerbatimResponseWithDefaults() *PkiSignVerbatimResponse { + var this PkiSignVerbatimResponse + + return &this +} + +func (o PkiSignVerbatimResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_sign_verbatim_role_request.go b/schema/model_pki_sign_verbatim_with_role_request.go similarity index 88% rename from schema/model_pki_sign_verbatim_role_request.go rename to schema/model_pki_sign_verbatim_with_role_request.go index 8387aea1..0394b1fa 100644 --- a/schema/model_pki_sign_verbatim_role_request.go +++ b/schema/model_pki_sign_verbatim_with_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKISignVerbatimRoleRequest struct for PKISignVerbatimRoleRequest -type PKISignVerbatimRoleRequest struct { +// PkiSignVerbatimWithRoleRequest struct for PkiSignVerbatimWithRoleRequest +type PkiSignVerbatimWithRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -67,13 +67,16 @@ type PKISignVerbatimRoleRequest struct { // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKISignVerbatimRoleRequestWithDefaults instantiates a new PKISignVerbatimRoleRequest object +// NewPkiSignVerbatimWithRoleRequestWithDefaults instantiates a new PkiSignVerbatimWithRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKISignVerbatimRoleRequestWithDefaults() *PKISignVerbatimRoleRequest { - var this PKISignVerbatimRoleRequest +func NewPkiSignVerbatimWithRoleRequestWithDefaults() *PkiSignVerbatimWithRoleRequest { + var this PkiSignVerbatimWithRoleRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -87,7 +90,7 @@ func NewPKISignVerbatimRoleRequestWithDefaults() *PKISignVerbatimRoleRequest { return &this } -func (o PKISignVerbatimRoleRequest) MarshalJSON() ([]byte, error) { +func (o PkiSignVerbatimWithRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -109,6 +112,7 @@ func (o PKISignVerbatimRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans toSerialize["use_pss"] = o.UsePss + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_sign_verbatim_with_role_response.go b/schema/model_pki_sign_verbatim_with_role_response.go new file mode 100644 index 00000000..5007b010 --- /dev/null +++ b/schema/model_pki_sign_verbatim_with_role_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiSignVerbatimWithRoleResponse struct for PkiSignVerbatimWithRoleResponse +type PkiSignVerbatimWithRoleResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiSignVerbatimWithRoleResponseWithDefaults instantiates a new PkiSignVerbatimWithRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiSignVerbatimWithRoleResponseWithDefaults() *PkiSignVerbatimWithRoleResponse { + var this PkiSignVerbatimWithRoleResponse + + return &this +} + +func (o PkiSignVerbatimWithRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_sign_role_request.go b/schema/model_pki_sign_with_role_request.go similarity index 86% rename from schema/model_pki_sign_role_request.go rename to schema/model_pki_sign_with_role_request.go index 1dfd5161..22bf01de 100644 --- a/schema/model_pki_sign_role_request.go +++ b/schema/model_pki_sign_with_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKISignRoleRequest struct for PKISignRoleRequest -type PKISignRoleRequest struct { +// PkiSignWithRoleRequest struct for PkiSignWithRoleRequest +type PkiSignWithRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` @@ -52,13 +52,16 @@ type PKISignRoleRequest struct { // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` + + // The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. + UserIds []string `json:"user_ids"` } -// NewPKISignRoleRequestWithDefaults instantiates a new PKISignRoleRequest object +// NewPkiSignWithRoleRequestWithDefaults instantiates a new PkiSignWithRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKISignRoleRequestWithDefaults() *PKISignRoleRequest { - var this PKISignRoleRequest +func NewPkiSignWithRoleRequestWithDefaults() *PkiSignWithRoleRequest { + var this PkiSignWithRoleRequest this.Csr = "" this.ExcludeCnFromSans = false @@ -70,7 +73,7 @@ func NewPKISignRoleRequestWithDefaults() *PKISignRoleRequest { return &this } -func (o PKISignRoleRequest) MarshalJSON() ([]byte, error) { +func (o PkiSignWithRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["alt_names"] = o.AltNames @@ -87,6 +90,7 @@ func (o PKISignRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["serial_number"] = o.SerialNumber toSerialize["ttl"] = o.Ttl toSerialize["uri_sans"] = o.UriSans + toSerialize["user_ids"] = o.UserIds return json.Marshal(toSerialize) } diff --git a/schema/model_pki_sign_with_role_response.go b/schema/model_pki_sign_with_role_response.go new file mode 100644 index 00000000..97018f1a --- /dev/null +++ b/schema/model_pki_sign_with_role_response.go @@ -0,0 +1,57 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiSignWithRoleResponse struct for PkiSignWithRoleResponse +type PkiSignWithRoleResponse struct { + // Certificate Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // Time of expiration + Expiration string `json:"expiration"` + + // Issuing Certificate Authority + IssuingCa string `json:"issuing_ca"` + + // Private key + PrivateKey string `json:"private_key"` + + // Private key type + PrivateKeyType string `json:"private_key_type"` + + // Serial Number + SerialNumber string `json:"serial_number"` +} + +// NewPkiSignWithRoleResponseWithDefaults instantiates a new PkiSignWithRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiSignWithRoleResponseWithDefaults() *PkiSignWithRoleResponse { + var this PkiSignWithRoleResponse + + return &this +} + +func (o PkiSignWithRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["expiration"] = o.Expiration + toSerialize["issuing_ca"] = o.IssuingCa + toSerialize["private_key"] = o.PrivateKey + toSerialize["private_key_type"] = o.PrivateKeyType + toSerialize["serial_number"] = o.SerialNumber + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_tidy_cancel_response.go b/schema/model_pki_tidy_cancel_response.go new file mode 100644 index 00000000..cb054483 --- /dev/null +++ b/schema/model_pki_tidy_cancel_response.go @@ -0,0 +1,114 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiTidyCancelResponse struct for PkiTidyCancelResponse +type PkiTidyCancelResponse struct { + // The number of certificate storage entries deleted + CertStoreDeletedCount int32 `json:"cert_store_deleted_count"` + + CrossRevokedCertDeletedCount int32 `json:"cross_revoked_cert_deleted_count"` + + // The number of revoked certificate entries deleted + CurrentCertStoreCount int32 `json:"current_cert_store_count"` + + // The number of revoked certificate entries deleted + CurrentRevokedCertCount int32 `json:"current_revoked_cert_count"` + + // The error message + Error string `json:"error"` + + InternalBackendUuid string `json:"internal_backend_uuid"` + + // Issuer safety buffer + IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` + + // Message of the operation + Message string `json:"message"` + + MissingIssuerCertCount int32 `json:"missing_issuer_cert_count"` + + // Duration to pause between tidying certificates + PauseDuration string `json:"pause_duration"` + + RevocationQueueDeletedCount int32 `json:"revocation_queue_deleted_count"` + + // The number of revoked certificate entries deleted + RevokedCertDeletedCount int32 `json:"revoked_cert_deleted_count"` + + // Safety buffer time duration + SafetyBuffer int32 `json:"safety_buffer"` + + // One of Inactive, Running, Finished, or Error + State string `json:"state"` + + // Tidy certificate store + TidyCertStore bool `json:"tidy_cert_store"` + + TidyCrossClusterRevokedCerts bool `json:"tidy_cross_cluster_revoked_certs"` + + // Tidy expired issuers + TidyExpiredIssuers bool `json:"tidy_expired_issuers"` + + TidyMoveLegacyCaBundle bool `json:"tidy_move_legacy_ca_bundle"` + + TidyRevocationQueue bool `json:"tidy_revocation_queue"` + + // Tidy revoked certificate issuer associations + TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` + + // Tidy revoked certificates + TidyRevokedCerts bool `json:"tidy_revoked_certs"` + + // Time the operation finished + TimeFinished string `json:"time_finished"` + + // Time the operation started + TimeStarted string `json:"time_started"` +} + +// NewPkiTidyCancelResponseWithDefaults instantiates a new PkiTidyCancelResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiTidyCancelResponseWithDefaults() *PkiTidyCancelResponse { + var this PkiTidyCancelResponse + + return &this +} + +func (o PkiTidyCancelResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["cert_store_deleted_count"] = o.CertStoreDeletedCount + toSerialize["cross_revoked_cert_deleted_count"] = o.CrossRevokedCertDeletedCount + toSerialize["current_cert_store_count"] = o.CurrentCertStoreCount + toSerialize["current_revoked_cert_count"] = o.CurrentRevokedCertCount + toSerialize["error"] = o.Error + toSerialize["internal_backend_uuid"] = o.InternalBackendUuid + toSerialize["issuer_safety_buffer"] = o.IssuerSafetyBuffer + toSerialize["message"] = o.Message + toSerialize["missing_issuer_cert_count"] = o.MissingIssuerCertCount + toSerialize["pause_duration"] = o.PauseDuration + toSerialize["revocation_queue_deleted_count"] = o.RevocationQueueDeletedCount + toSerialize["revoked_cert_deleted_count"] = o.RevokedCertDeletedCount + toSerialize["safety_buffer"] = o.SafetyBuffer + toSerialize["state"] = o.State + toSerialize["tidy_cert_store"] = o.TidyCertStore + toSerialize["tidy_cross_cluster_revoked_certs"] = o.TidyCrossClusterRevokedCerts + toSerialize["tidy_expired_issuers"] = o.TidyExpiredIssuers + toSerialize["tidy_move_legacy_ca_bundle"] = o.TidyMoveLegacyCaBundle + toSerialize["tidy_revocation_queue"] = o.TidyRevocationQueue + toSerialize["tidy_revoked_cert_issuer_associations"] = o.TidyRevokedCertIssuerAssociations + toSerialize["tidy_revoked_certs"] = o.TidyRevokedCerts + toSerialize["time_finished"] = o.TimeFinished + toSerialize["time_started"] = o.TimeStarted + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_tidy_request.go b/schema/model_pki_tidy_request.go index ca46d2b3..2879eebd 100644 --- a/schema/model_pki_tidy_request.go +++ b/schema/model_pki_tidy_request.go @@ -9,26 +9,44 @@ import ( "encoding/json" ) -// PKITidyRequest struct for PKITidyRequest -type PKITidyRequest struct { +// PkiTidyRequest struct for PkiTidyRequest +type PkiTidyRequest struct { // The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year). IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` + // This configures whether stored certificates are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained. + MaintainStoredCertificateCounts bool `json:"maintain_stored_certificate_counts"` + // The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds. PauseDuration string `json:"pause_duration"` + // This configures whether the stored certificate count is published to the metrics consumer. It does not affect if the stored certificate count is maintained, and if maintained, it will be available on the tidy-status endpoint. + PublishStoredCertificateCountMetrics bool `json:"publish_stored_certificate_count_metrics"` + + // The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal. Setting this too low may remove valid revocation requests before the owning cluster has a chance to process them, especially if the cluster is offline. + RevocationQueueSafetyBuffer int32 `json:"revocation_queue_safety_buffer"` + // The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours. SafetyBuffer int32 `json:"safety_buffer"` // Set to true to enable tidying up the certificate store TidyCertStore bool `json:"tidy_cert_store"` + // Set to true to enable tidying up the cross-cluster revoked certificate store. Only runs on the active primary node. + TidyCrossClusterRevokedCerts bool `json:"tidy_cross_cluster_revoked_certs"` + // Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation. TidyExpiredIssuers bool `json:"tidy_expired_issuers"` + // Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak. This prevents downgrades to pre-Vault 1.11 versions (as older PKI engines do not know about the new multi-issuer storage layout), but improves the performance on seal wrapped PKI mounts. This will only occur if at least issuer_safety_buffer time has occurred after the initial storage migration. This backup is saved in case of an issue in future migrations. Operators may consider removing it via sys/raw if they desire. The backup will be removed via a DELETE /root call, but note that this removes ALL issuers within the mount (and is thus not desirable in most operational scenarios). + TidyMoveLegacyCaBundle bool `json:"tidy_move_legacy_ca_bundle"` + // Deprecated; synonym for 'tidy_revoked_certs TidyRevocationList bool `json:"tidy_revocation_list"` + // Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster. Only runs on the active primary node + TidyRevocationQueue bool `json:"tidy_revocation_queue"` + // Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses. TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` @@ -36,28 +54,38 @@ type PKITidyRequest struct { TidyRevokedCerts bool `json:"tidy_revoked_certs"` } -// NewPKITidyRequestWithDefaults instantiates a new PKITidyRequest object +// NewPkiTidyRequestWithDefaults instantiates a new PkiTidyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKITidyRequestWithDefaults() *PKITidyRequest { - var this PKITidyRequest +func NewPkiTidyRequestWithDefaults() *PkiTidyRequest { + var this PkiTidyRequest this.IssuerSafetyBuffer = 31536000 + this.MaintainStoredCertificateCounts = false this.PauseDuration = "0s" + this.PublishStoredCertificateCountMetrics = false + this.RevocationQueueSafetyBuffer = 172800 this.SafetyBuffer = 259200 + this.TidyRevocationQueue = false return &this } -func (o PKITidyRequest) MarshalJSON() ([]byte, error) { +func (o PkiTidyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["issuer_safety_buffer"] = o.IssuerSafetyBuffer + toSerialize["maintain_stored_certificate_counts"] = o.MaintainStoredCertificateCounts toSerialize["pause_duration"] = o.PauseDuration + toSerialize["publish_stored_certificate_count_metrics"] = o.PublishStoredCertificateCountMetrics + toSerialize["revocation_queue_safety_buffer"] = o.RevocationQueueSafetyBuffer toSerialize["safety_buffer"] = o.SafetyBuffer toSerialize["tidy_cert_store"] = o.TidyCertStore + toSerialize["tidy_cross_cluster_revoked_certs"] = o.TidyCrossClusterRevokedCerts toSerialize["tidy_expired_issuers"] = o.TidyExpiredIssuers + toSerialize["tidy_move_legacy_ca_bundle"] = o.TidyMoveLegacyCaBundle toSerialize["tidy_revocation_list"] = o.TidyRevocationList + toSerialize["tidy_revocation_queue"] = o.TidyRevocationQueue toSerialize["tidy_revoked_cert_issuer_associations"] = o.TidyRevokedCertIssuerAssociations toSerialize["tidy_revoked_certs"] = o.TidyRevokedCerts diff --git a/schema/model_pki_tidy_status_response.go b/schema/model_pki_tidy_status_response.go new file mode 100644 index 00000000..0f6bb204 --- /dev/null +++ b/schema/model_pki_tidy_status_response.go @@ -0,0 +1,114 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiTidyStatusResponse struct for PkiTidyStatusResponse +type PkiTidyStatusResponse struct { + // The number of certificate storage entries deleted + CertStoreDeletedCount int32 `json:"cert_store_deleted_count"` + + CrossRevokedCertDeletedCount int32 `json:"cross_revoked_cert_deleted_count"` + + // The number of revoked certificate entries deleted + CurrentCertStoreCount int32 `json:"current_cert_store_count"` + + // The number of revoked certificate entries deleted + CurrentRevokedCertCount int32 `json:"current_revoked_cert_count"` + + // The error message + Error string `json:"error"` + + InternalBackendUuid string `json:"internal_backend_uuid"` + + // Issuer safety buffer + IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` + + // Message of the operation + Message string `json:"message"` + + MissingIssuerCertCount int32 `json:"missing_issuer_cert_count"` + + // Duration to pause between tidying certificates + PauseDuration string `json:"pause_duration"` + + RevocationQueueDeletedCount int32 `json:"revocation_queue_deleted_count"` + + // The number of revoked certificate entries deleted + RevokedCertDeletedCount int32 `json:"revoked_cert_deleted_count"` + + // Safety buffer time duration + SafetyBuffer int32 `json:"safety_buffer"` + + // One of Inactive, Running, Finished, or Error + State string `json:"state"` + + // Tidy certificate store + TidyCertStore bool `json:"tidy_cert_store"` + + TidyCrossClusterRevokedCerts string `json:"tidy_cross_cluster_revoked_certs"` + + // Tidy expired issuers + TidyExpiredIssuers bool `json:"tidy_expired_issuers"` + + TidyMoveLegacyCaBundle bool `json:"tidy_move_legacy_ca_bundle"` + + TidyRevocationQueue bool `json:"tidy_revocation_queue"` + + // Tidy revoked certificate issuer associations + TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` + + // Tidy revoked certificates + TidyRevokedCerts bool `json:"tidy_revoked_certs"` + + // Time the operation finished + TimeFinished string `json:"time_finished"` + + // Time the operation started + TimeStarted string `json:"time_started"` +} + +// NewPkiTidyStatusResponseWithDefaults instantiates a new PkiTidyStatusResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiTidyStatusResponseWithDefaults() *PkiTidyStatusResponse { + var this PkiTidyStatusResponse + + return &this +} + +func (o PkiTidyStatusResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["cert_store_deleted_count"] = o.CertStoreDeletedCount + toSerialize["cross_revoked_cert_deleted_count"] = o.CrossRevokedCertDeletedCount + toSerialize["current_cert_store_count"] = o.CurrentCertStoreCount + toSerialize["current_revoked_cert_count"] = o.CurrentRevokedCertCount + toSerialize["error"] = o.Error + toSerialize["internal_backend_uuid"] = o.InternalBackendUuid + toSerialize["issuer_safety_buffer"] = o.IssuerSafetyBuffer + toSerialize["message"] = o.Message + toSerialize["missing_issuer_cert_count"] = o.MissingIssuerCertCount + toSerialize["pause_duration"] = o.PauseDuration + toSerialize["revocation_queue_deleted_count"] = o.RevocationQueueDeletedCount + toSerialize["revoked_cert_deleted_count"] = o.RevokedCertDeletedCount + toSerialize["safety_buffer"] = o.SafetyBuffer + toSerialize["state"] = o.State + toSerialize["tidy_cert_store"] = o.TidyCertStore + toSerialize["tidy_cross_cluster_revoked_certs"] = o.TidyCrossClusterRevokedCerts + toSerialize["tidy_expired_issuers"] = o.TidyExpiredIssuers + toSerialize["tidy_move_legacy_ca_bundle"] = o.TidyMoveLegacyCaBundle + toSerialize["tidy_revocation_queue"] = o.TidyRevocationQueue + toSerialize["tidy_revoked_cert_issuer_associations"] = o.TidyRevokedCertIssuerAssociations + toSerialize["tidy_revoked_certs"] = o.TidyRevokedCerts + toSerialize["time_finished"] = o.TimeFinished + toSerialize["time_started"] = o.TimeStarted + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_issuer_ref_der_pem_request.go b/schema/model_pki_write_issuer_request.go similarity index 83% rename from schema/model_pki_write_issuer_ref_der_pem_request.go rename to schema/model_pki_write_issuer_request.go index b5c98c1e..3f7de43a 100644 --- a/schema/model_pki_write_issuer_ref_der_pem_request.go +++ b/schema/model_pki_write_issuer_request.go @@ -9,12 +9,12 @@ import ( "encoding/json" ) -// PkiWriteIssuerRefDerPemRequest struct for PkiWriteIssuerRefDerPemRequest -type PkiWriteIssuerRefDerPemRequest struct { +// PkiWriteIssuerRequest struct for PkiWriteIssuerRequest +type PkiWriteIssuerRequest struct { // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. CrlDistributionPoints []string `json:"crl_distribution_points"` - // Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. + // Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}', '{{cluster_path}}', '{{cluster_aia_path}}' are available, but the addresses are not checked for URL validity until issuance time. Using '{{cluster_path}}' requires /config/cluster's 'path' member to be set on all PR Secondary clusters and using '{{cluster_aia_path}}' requires /config/cluster's 'aia_path' member to be set on all PR secondary clusters. EnableAiaUrlTemplating bool `json:"enable_aia_url_templating"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' @@ -39,11 +39,11 @@ type PkiWriteIssuerRefDerPemRequest struct { Usage []string `json:"usage"` } -// NewPkiWriteIssuerRefDerPemRequestWithDefaults instantiates a new PkiWriteIssuerRefDerPemRequest object +// NewPkiWriteIssuerRequestWithDefaults instantiates a new PkiWriteIssuerRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPkiWriteIssuerRefDerPemRequestWithDefaults() *PkiWriteIssuerRefDerPemRequest { - var this PkiWriteIssuerRefDerPemRequest +func NewPkiWriteIssuerRequestWithDefaults() *PkiWriteIssuerRequest { + var this PkiWriteIssuerRequest this.EnableAiaUrlTemplating = false this.LeafNotAfterBehavior = "err" @@ -52,7 +52,7 @@ func NewPkiWriteIssuerRefDerPemRequestWithDefaults() *PkiWriteIssuerRefDerPemReq return &this } -func (o PkiWriteIssuerRefDerPemRequest) MarshalJSON() ([]byte, error) { +func (o PkiWriteIssuerRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["crl_distribution_points"] = o.CrlDistributionPoints diff --git a/schema/model_pki_write_issuer_response.go b/schema/model_pki_write_issuer_response.go new file mode 100644 index 00000000..e27e3ce0 --- /dev/null +++ b/schema/model_pki_write_issuer_response.go @@ -0,0 +1,87 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiWriteIssuerResponse struct for PkiWriteIssuerResponse +type PkiWriteIssuerResponse struct { + // CA Chain + CaChain []string `json:"ca_chain"` + + // Certificate + Certificate string `json:"certificate"` + + // CRL Distribution Points + CrlDistributionPoints []string `json:"crl_distribution_points"` + + // Issuer Id + IssuerId string `json:"issuer_id"` + + // Issuer Name + IssuerName string `json:"issuer_name"` + + // Issuing Certificates + IssuingCertificates []string `json:"issuing_certificates"` + + // Key Id + KeyId string `json:"key_id"` + + // Leaf Not After Behavior + LeafNotAfterBehavior string `json:"leaf_not_after_behavior"` + + // Manual Chain + ManualChain []string `json:"manual_chain"` + + // OSCP Servers + OcspServers []string `json:"ocsp_servers"` + + // Revocation Signature Alogrithm + RevocationSignatureAlgorithm string `json:"revocation_signature_algorithm"` + + RevocationTime int32 `json:"revocation_time"` + + RevocationTimeRfc3339 string `json:"revocation_time_rfc3339"` + + // Revoked + Revoked bool `json:"revoked"` + + // Usage + Usage []string `json:"usage"` +} + +// NewPkiWriteIssuerResponseWithDefaults instantiates a new PkiWriteIssuerResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiWriteIssuerResponseWithDefaults() *PkiWriteIssuerResponse { + var this PkiWriteIssuerResponse + + return &this +} + +func (o PkiWriteIssuerResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["ca_chain"] = o.CaChain + toSerialize["certificate"] = o.Certificate + toSerialize["crl_distribution_points"] = o.CrlDistributionPoints + toSerialize["issuer_id"] = o.IssuerId + toSerialize["issuer_name"] = o.IssuerName + toSerialize["issuing_certificates"] = o.IssuingCertificates + toSerialize["key_id"] = o.KeyId + toSerialize["leaf_not_after_behavior"] = o.LeafNotAfterBehavior + toSerialize["manual_chain"] = o.ManualChain + toSerialize["ocsp_servers"] = o.OcspServers + toSerialize["revocation_signature_algorithm"] = o.RevocationSignatureAlgorithm + toSerialize["revocation_time"] = o.RevocationTime + toSerialize["revocation_time_rfc3339"] = o.RevocationTimeRfc3339 + toSerialize["revoked"] = o.Revoked + toSerialize["usage"] = o.Usage + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_json_request.go b/schema/model_pki_write_json_request.go deleted file mode 100644 index a62c8b23..00000000 --- a/schema/model_pki_write_json_request.go +++ /dev/null @@ -1,74 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// PkiWriteJsonRequest struct for PkiWriteJsonRequest -type PkiWriteJsonRequest struct { - // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. - CrlDistributionPoints []string `json:"crl_distribution_points"` - - // Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. - EnableAiaUrlTemplating bool `json:"enable_aia_url_templating"` - - // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' - IssuerName string `json:"issuer_name"` - - // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. - IssuerRef string `json:"issuer_ref"` - - // Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. - IssuingCertificates []string `json:"issuing_certificates"` - - // Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs. - LeafNotAfterBehavior string `json:"leaf_not_after_behavior"` - - // Chain of issuer references to use to build this issuer's computed CAChain field, when non-empty. - ManualChain []string `json:"manual_chain"` - - // Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. - OcspServers []string `json:"ocsp_servers"` - - // Which x509.SignatureAlgorithm name to use for signing CRLs. This parameter allows differentiation between PKCS#1v1.5 and PSS keys and choice of signature hash algorithm. The default (empty string) value is for Go to select the signature algorithm. This can fail if the underlying key does not support the requested signature algorithm, which may not be known at modification time (such as with PKCS#11 managed RSA keys). - RevocationSignatureAlgorithm string `json:"revocation_signature_algorithm"` - - // Comma-separated list (or string slice) of usages for this issuer; valid values are \"read-only\", \"issuing-certificates\", \"crl-signing\", and \"ocsp-signing\". Multiple values may be specified. Read-only is implicit and always set. - Usage []string `json:"usage"` -} - -// NewPkiWriteJsonRequestWithDefaults instantiates a new PkiWriteJsonRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewPkiWriteJsonRequestWithDefaults() *PkiWriteJsonRequest { - var this PkiWriteJsonRequest - - this.EnableAiaUrlTemplating = false - this.IssuerRef = "default" - this.LeafNotAfterBehavior = "err" - this.RevocationSignatureAlgorithm = "" - - return &this -} - -func (o PkiWriteJsonRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["crl_distribution_points"] = o.CrlDistributionPoints - toSerialize["enable_aia_url_templating"] = o.EnableAiaUrlTemplating - toSerialize["issuer_name"] = o.IssuerName - toSerialize["issuer_ref"] = o.IssuerRef - toSerialize["issuing_certificates"] = o.IssuingCertificates - toSerialize["leaf_not_after_behavior"] = o.LeafNotAfterBehavior - toSerialize["manual_chain"] = o.ManualChain - toSerialize["ocsp_servers"] = o.OcspServers - toSerialize["revocation_signature_algorithm"] = o.RevocationSignatureAlgorithm - toSerialize["usage"] = o.Usage - - return json.Marshal(toSerialize) -} diff --git a/schema/model_pki_write_key_request.go b/schema/model_pki_write_key_request.go index 9de1dd21..8aa6db3e 100644 --- a/schema/model_pki_write_key_request.go +++ b/schema/model_pki_write_key_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// PKIWriteKeyRequest struct for PKIWriteKeyRequest -type PKIWriteKeyRequest struct { +// PkiWriteKeyRequest struct for PkiWriteKeyRequest +type PkiWriteKeyRequest struct { // Human-readable name for this key. KeyName string `json:"key_name"` } -// NewPKIWriteKeyRequestWithDefaults instantiates a new PKIWriteKeyRequest object +// NewPkiWriteKeyRequestWithDefaults instantiates a new PkiWriteKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteKeyRequestWithDefaults() *PKIWriteKeyRequest { - var this PKIWriteKeyRequest +func NewPkiWriteKeyRequestWithDefaults() *PkiWriteKeyRequest { + var this PkiWriteKeyRequest return &this } -func (o PKIWriteKeyRequest) MarshalJSON() ([]byte, error) { +func (o PkiWriteKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key_name"] = o.KeyName diff --git a/schema/model_pki_write_key_response.go b/schema/model_pki_write_key_response.go new file mode 100644 index 00000000..b778a0b1 --- /dev/null +++ b/schema/model_pki_write_key_response.go @@ -0,0 +1,41 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiWriteKeyResponse struct for PkiWriteKeyResponse +type PkiWriteKeyResponse struct { + // Key Id + KeyId string `json:"key_id"` + + // Key Name + KeyName string `json:"key_name"` + + // Key Type + KeyType string `json:"key_type"` +} + +// NewPkiWriteKeyResponseWithDefaults instantiates a new PkiWriteKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiWriteKeyResponseWithDefaults() *PkiWriteKeyResponse { + var this PkiWriteKeyResponse + + return &this +} + +func (o PkiWriteKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_id"] = o.KeyId + toSerialize["key_name"] = o.KeyName + toSerialize["key_type"] = o.KeyType + + return json.Marshal(toSerialize) +} diff --git a/schema/model_pki_write_role_request.go b/schema/model_pki_write_role_request.go index 9e2824bb..53a82f30 100644 --- a/schema/model_pki_write_role_request.go +++ b/schema/model_pki_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// PKIWriteRoleRequest struct for PKIWriteRoleRequest -type PKIWriteRoleRequest struct { +// PkiWriteRoleRequest struct for PkiWriteRoleRequest +type PkiWriteRoleRequest struct { // If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. AllowAnyName bool `json:"allow_any_name"` @@ -50,6 +50,9 @@ type PKIWriteRoleRequest struct { // If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. AllowedUriSansTemplate bool `json:"allowed_uri_sans_template"` + // If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 + AllowedUserIds []string `json:"allowed_user_ids"` + // Backend Type Backend string `json:"backend"` @@ -150,11 +153,11 @@ type PKIWriteRoleRequest struct { UsePss bool `json:"use_pss"` } -// NewPKIWriteRoleRequestWithDefaults instantiates a new PKIWriteRoleRequest object +// NewPkiWriteRoleRequestWithDefaults instantiates a new PkiWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewPKIWriteRoleRequestWithDefaults() *PKIWriteRoleRequest { - var this PKIWriteRoleRequest +func NewPkiWriteRoleRequestWithDefaults() *PkiWriteRoleRequest { + var this PkiWriteRoleRequest this.AllowIpSans = true this.AllowLocalhost = true @@ -177,7 +180,7 @@ func NewPKIWriteRoleRequestWithDefaults() *PKIWriteRoleRequest { return &this } -func (o PKIWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o PkiWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allow_any_name"] = o.AllowAnyName @@ -193,6 +196,7 @@ func (o PKIWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["allowed_serial_numbers"] = o.AllowedSerialNumbers toSerialize["allowed_uri_sans"] = o.AllowedUriSans toSerialize["allowed_uri_sans_template"] = o.AllowedUriSansTemplate + toSerialize["allowed_user_ids"] = o.AllowedUserIds toSerialize["backend"] = o.Backend toSerialize["basic_constraints_valid_for_non_ca"] = o.BasicConstraintsValidForNonCa toSerialize["client_flag"] = o.ClientFlag diff --git a/schema/model_pki_write_role_response.go b/schema/model_pki_write_role_response.go new file mode 100644 index 00000000..f4fcd837 --- /dev/null +++ b/schema/model_pki_write_role_response.go @@ -0,0 +1,219 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PkiWriteRoleResponse struct for PkiWriteRoleResponse +type PkiWriteRoleResponse struct { + // If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. + AllowAnyName bool `json:"allow_any_name"` + + // If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information. + AllowBareDomains bool `json:"allow_bare_domains"` + + // If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information. + AllowGlobDomains bool `json:"allow_glob_domains"` + + // If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed. + AllowIpSans bool `json:"allow_ip_sans"` + + // Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. + AllowLocalhost bool `json:"allow_localhost"` + + // If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information. + AllowSubdomains bool `json:"allow_subdomains"` + + // Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. + AllowTokenDisplayname bool `json:"allow_token_displayname"` + + // If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information. + AllowWildcardCertificates bool `json:"allow_wildcard_certificates"` + + // Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains. + AllowedDomains []string `json:"allowed_domains"` + + // If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. + AllowedDomainsTemplate bool `json:"allowed_domains_template"` + + // If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format ;:. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8). + AllowedOtherSans []string `json:"allowed_other_sans"` + + // If set, an array of allowed serial numbers to put in Subject. These values support globbing. + AllowedSerialNumbers []string `json:"allowed_serial_numbers"` + + // If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. + AllowedUriSans []string `json:"allowed_uri_sans"` + + // If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. + AllowedUriSansTemplate bool `json:"allowed_uri_sans_template"` + + // If set, an array of allowed user-ids to put in user system login name specified here: https://www.rfc-editor.org/rfc/rfc1274#section-9.3.1 + AllowedUserIds []string `json:"allowed_user_ids"` + + // Mark Basic Constraints valid when issuing non-CA certificates. + BasicConstraintsValidForNonCa bool `json:"basic_constraints_valid_for_non_ca"` + + // If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. + ClientFlag bool `json:"client_flag"` + + // List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs. + CnValidations []string `json:"cn_validations"` + + // If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12. + CodeSigningFlag bool `json:"code_signing_flag"` + + // If set, Country will be set to this value in certificates issued by this role. + Country []string `json:"country"` + + // If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12. + EmailProtectionFlag bool `json:"email_protection_flag"` + + // If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true. + EnforceHostnames bool `json:"enforce_hostnames"` + + // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12. + ExtKeyUsage []string `json:"ext_key_usage"` + + // A comma-separated string or list of extended key usage oids. + ExtKeyUsageOids []string `json:"ext_key_usage_oids"` + + // If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke \" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault. + GenerateLease bool `json:"generate_lease"` + + // Reference to the issuer used to sign requests serviced by this role. + IssuerRef string `json:"issuer_ref"` + + // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. + KeyBits int32 `json:"key_bits"` + + // The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values. + KeyType string `json:"key_type"` + + // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3. + KeyUsage []string `json:"key_usage"` + + // If set, Locality will be set to this value in certificates issued by this role. + Locality []string `json:"locality"` + + // The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL. + MaxTtl int32 `json:"max_ttl"` + + // If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\". + NoStore bool `json:"no_store"` + + // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. + NotAfter string `json:"not_after"` + + // The duration before now which the certificate needs to be backdated by. + NotBeforeDuration int32 `json:"not_before_duration"` + + // If set, O (Organization) will be set to this value in certificates issued by this role. + Organization []string `json:"organization"` + + // If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role. + Ou []string `json:"ou"` + + // A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}]. + PolicyIdentifiers []string `json:"policy_identifiers"` + + // If set, Postal Code will be set to this value in certificates issued by this role. + PostalCode []string `json:"postal_code"` + + // If set, Province will be set to this value in certificates issued by this role. + Province []string `json:"province"` + + // If set to false, makes the 'common_name' field optional while generating a certificate. + RequireCn bool `json:"require_cn"` + + // If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. + ServerFlag bool `json:"server_flag"` + + // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). + SignatureBits int32 `json:"signature_bits"` + + // If set, Street Address will be set to this value in certificates issued by this role. + StreetAddress []string `json:"street_address"` + + // The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter. + Ttl int32 `json:"ttl"` + + // If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true. + UseCsrCommonName bool `json:"use_csr_common_name"` + + // If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true. + UseCsrSans bool `json:"use_csr_sans"` + + // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. + UsePss bool `json:"use_pss"` +} + +// NewPkiWriteRoleResponseWithDefaults instantiates a new PkiWriteRoleResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPkiWriteRoleResponseWithDefaults() *PkiWriteRoleResponse { + var this PkiWriteRoleResponse + + this.ServerFlag = true + + return &this +} + +func (o PkiWriteRoleResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["allow_any_name"] = o.AllowAnyName + toSerialize["allow_bare_domains"] = o.AllowBareDomains + toSerialize["allow_glob_domains"] = o.AllowGlobDomains + toSerialize["allow_ip_sans"] = o.AllowIpSans + toSerialize["allow_localhost"] = o.AllowLocalhost + toSerialize["allow_subdomains"] = o.AllowSubdomains + toSerialize["allow_token_displayname"] = o.AllowTokenDisplayname + toSerialize["allow_wildcard_certificates"] = o.AllowWildcardCertificates + toSerialize["allowed_domains"] = o.AllowedDomains + toSerialize["allowed_domains_template"] = o.AllowedDomainsTemplate + toSerialize["allowed_other_sans"] = o.AllowedOtherSans + toSerialize["allowed_serial_numbers"] = o.AllowedSerialNumbers + toSerialize["allowed_uri_sans"] = o.AllowedUriSans + toSerialize["allowed_uri_sans_template"] = o.AllowedUriSansTemplate + toSerialize["allowed_user_ids"] = o.AllowedUserIds + toSerialize["basic_constraints_valid_for_non_ca"] = o.BasicConstraintsValidForNonCa + toSerialize["client_flag"] = o.ClientFlag + toSerialize["cn_validations"] = o.CnValidations + toSerialize["code_signing_flag"] = o.CodeSigningFlag + toSerialize["country"] = o.Country + toSerialize["email_protection_flag"] = o.EmailProtectionFlag + toSerialize["enforce_hostnames"] = o.EnforceHostnames + toSerialize["ext_key_usage"] = o.ExtKeyUsage + toSerialize["ext_key_usage_oids"] = o.ExtKeyUsageOids + toSerialize["generate_lease"] = o.GenerateLease + toSerialize["issuer_ref"] = o.IssuerRef + toSerialize["key_bits"] = o.KeyBits + toSerialize["key_type"] = o.KeyType + toSerialize["key_usage"] = o.KeyUsage + toSerialize["locality"] = o.Locality + toSerialize["max_ttl"] = o.MaxTtl + toSerialize["no_store"] = o.NoStore + toSerialize["not_after"] = o.NotAfter + toSerialize["not_before_duration"] = o.NotBeforeDuration + toSerialize["organization"] = o.Organization + toSerialize["ou"] = o.Ou + toSerialize["policy_identifiers"] = o.PolicyIdentifiers + toSerialize["postal_code"] = o.PostalCode + toSerialize["province"] = o.Province + toSerialize["require_cn"] = o.RequireCn + toSerialize["server_flag"] = o.ServerFlag + toSerialize["signature_bits"] = o.SignatureBits + toSerialize["street_address"] = o.StreetAddress + toSerialize["ttl"] = o.Ttl + toSerialize["use_csr_common_name"] = o.UseCsrCommonName + toSerialize["use_csr_sans"] = o.UseCsrSans + toSerialize["use_pss"] = o.UsePss + + return json.Marshal(toSerialize) +} diff --git a/schema/model_plugins_catalog_list_plugins_response.go b/schema/model_plugins_catalog_list_plugins_response.go new file mode 100644 index 00000000..51d6329e --- /dev/null +++ b/schema/model_plugins_catalog_list_plugins_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PluginsCatalogListPluginsResponse struct for PluginsCatalogListPluginsResponse +type PluginsCatalogListPluginsResponse struct { + Detailed map[string]interface{} `json:"detailed"` +} + +// NewPluginsCatalogListPluginsResponseWithDefaults instantiates a new PluginsCatalogListPluginsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPluginsCatalogListPluginsResponseWithDefaults() *PluginsCatalogListPluginsResponse { + var this PluginsCatalogListPluginsResponse + + return &this +} + +func (o PluginsCatalogListPluginsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["detailed"] = o.Detailed + + return json.Marshal(toSerialize) +} diff --git a/schema/model_plugins_catalog_list_plugins_with_type_response.go b/schema/model_plugins_catalog_list_plugins_with_type_response.go new file mode 100644 index 00000000..dca25353 --- /dev/null +++ b/schema/model_plugins_catalog_list_plugins_with_type_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PluginsCatalogListPluginsWithTypeResponse struct for PluginsCatalogListPluginsWithTypeResponse +type PluginsCatalogListPluginsWithTypeResponse struct { + // List of plugin names in the catalog + Keys []string `json:"keys"` +} + +// NewPluginsCatalogListPluginsWithTypeResponseWithDefaults instantiates a new PluginsCatalogListPluginsWithTypeResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPluginsCatalogListPluginsWithTypeResponseWithDefaults() *PluginsCatalogListPluginsWithTypeResponse { + var this PluginsCatalogListPluginsWithTypeResponse + + return &this +} + +func (o PluginsCatalogListPluginsWithTypeResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_plugins_catalog_read_plugin_configuration_response.go b/schema/model_plugins_catalog_read_plugin_configuration_response.go new file mode 100644 index 00000000..c0b84930 --- /dev/null +++ b/schema/model_plugins_catalog_read_plugin_configuration_response.go @@ -0,0 +1,55 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PluginsCatalogReadPluginConfigurationResponse struct for PluginsCatalogReadPluginConfigurationResponse +type PluginsCatalogReadPluginConfigurationResponse struct { + // The args passed to plugin command. + Args []string `json:"args"` + + Builtin bool `json:"builtin"` + + // The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. + Command string `json:"command"` + + DeprecationStatus string `json:"deprecation_status"` + + // The name of the plugin + Name string `json:"name"` + + // The SHA256 sum of the executable used in the command field. This should be HEX encoded. + Sha256 string `json:"sha256"` + + // The semantic version of the plugin to use. + Version string `json:"version"` +} + +// NewPluginsCatalogReadPluginConfigurationResponseWithDefaults instantiates a new PluginsCatalogReadPluginConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPluginsCatalogReadPluginConfigurationResponseWithDefaults() *PluginsCatalogReadPluginConfigurationResponse { + var this PluginsCatalogReadPluginConfigurationResponse + + return &this +} + +func (o PluginsCatalogReadPluginConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["args"] = o.Args + toSerialize["builtin"] = o.Builtin + toSerialize["command"] = o.Command + toSerialize["deprecation_status"] = o.DeprecationStatus + toSerialize["name"] = o.Name + toSerialize["sha256"] = o.Sha256 + toSerialize["version"] = o.Version + + return json.Marshal(toSerialize) +} diff --git a/schema/model_plugins_catalog_read_plugin_configuration_with_type_response.go b/schema/model_plugins_catalog_read_plugin_configuration_with_type_response.go new file mode 100644 index 00000000..5de2f172 --- /dev/null +++ b/schema/model_plugins_catalog_read_plugin_configuration_with_type_response.go @@ -0,0 +1,55 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PluginsCatalogReadPluginConfigurationWithTypeResponse struct for PluginsCatalogReadPluginConfigurationWithTypeResponse +type PluginsCatalogReadPluginConfigurationWithTypeResponse struct { + // The args passed to plugin command. + Args []string `json:"args"` + + Builtin bool `json:"builtin"` + + // The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. + Command string `json:"command"` + + DeprecationStatus string `json:"deprecation_status"` + + // The name of the plugin + Name string `json:"name"` + + // The SHA256 sum of the executable used in the command field. This should be HEX encoded. + Sha256 string `json:"sha256"` + + // The semantic version of the plugin to use. + Version string `json:"version"` +} + +// NewPluginsCatalogReadPluginConfigurationWithTypeResponseWithDefaults instantiates a new PluginsCatalogReadPluginConfigurationWithTypeResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPluginsCatalogReadPluginConfigurationWithTypeResponseWithDefaults() *PluginsCatalogReadPluginConfigurationWithTypeResponse { + var this PluginsCatalogReadPluginConfigurationWithTypeResponse + + return &this +} + +func (o PluginsCatalogReadPluginConfigurationWithTypeResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["args"] = o.Args + toSerialize["builtin"] = o.Builtin + toSerialize["command"] = o.Command + toSerialize["deprecation_status"] = o.DeprecationStatus + toSerialize["name"] = o.Name + toSerialize["sha256"] = o.Sha256 + toSerialize["version"] = o.Version + + return json.Marshal(toSerialize) +} diff --git a/schema/model_sys_write_plugins_catalog_name_request.go b/schema/model_plugins_catalog_register_plugin_request.go similarity index 73% rename from schema/model_sys_write_plugins_catalog_name_request.go rename to schema/model_plugins_catalog_register_plugin_request.go index 7115933f..593c9f31 100644 --- a/schema/model_sys_write_plugins_catalog_name_request.go +++ b/schema/model_plugins_catalog_register_plugin_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// SysWritePluginsCatalogNameRequest struct for SysWritePluginsCatalogNameRequest -type SysWritePluginsCatalogNameRequest struct { +// PluginsCatalogRegisterPluginRequest struct for PluginsCatalogRegisterPluginRequest +type PluginsCatalogRegisterPluginRequest struct { // The args passed to plugin command. Args []string `json:"args"` @@ -30,16 +30,16 @@ type SysWritePluginsCatalogNameRequest struct { Version string `json:"version"` } -// NewSysWritePluginsCatalogNameRequestWithDefaults instantiates a new SysWritePluginsCatalogNameRequest object +// NewPluginsCatalogRegisterPluginRequestWithDefaults instantiates a new PluginsCatalogRegisterPluginRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSysWritePluginsCatalogNameRequestWithDefaults() *SysWritePluginsCatalogNameRequest { - var this SysWritePluginsCatalogNameRequest +func NewPluginsCatalogRegisterPluginRequestWithDefaults() *PluginsCatalogRegisterPluginRequest { + var this PluginsCatalogRegisterPluginRequest return &this } -func (o SysWritePluginsCatalogNameRequest) MarshalJSON() ([]byte, error) { +func (o PluginsCatalogRegisterPluginRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["args"] = o.Args diff --git a/schema/model_write_plugins_catalog_by_type_by_name_request.go b/schema/model_plugins_catalog_register_plugin_with_type_request.go similarity index 68% rename from schema/model_write_plugins_catalog_by_type_by_name_request.go rename to schema/model_plugins_catalog_register_plugin_with_type_request.go index 4ae02e32..d4f932ce 100644 --- a/schema/model_write_plugins_catalog_by_type_by_name_request.go +++ b/schema/model_plugins_catalog_register_plugin_with_type_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WritePluginsCatalogByTypeByNameRequest struct for WritePluginsCatalogByTypeByNameRequest -type WritePluginsCatalogByTypeByNameRequest struct { +// PluginsCatalogRegisterPluginWithTypeRequest struct for PluginsCatalogRegisterPluginWithTypeRequest +type PluginsCatalogRegisterPluginWithTypeRequest struct { // The args passed to plugin command. Args []string `json:"args"` @@ -27,16 +27,16 @@ type WritePluginsCatalogByTypeByNameRequest struct { Version string `json:"version"` } -// NewWritePluginsCatalogByTypeByNameRequestWithDefaults instantiates a new WritePluginsCatalogByTypeByNameRequest object +// NewPluginsCatalogRegisterPluginWithTypeRequestWithDefaults instantiates a new PluginsCatalogRegisterPluginWithTypeRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWritePluginsCatalogByTypeByNameRequestWithDefaults() *WritePluginsCatalogByTypeByNameRequest { - var this WritePluginsCatalogByTypeByNameRequest +func NewPluginsCatalogRegisterPluginWithTypeRequestWithDefaults() *PluginsCatalogRegisterPluginWithTypeRequest { + var this PluginsCatalogRegisterPluginWithTypeRequest return &this } -func (o WritePluginsCatalogByTypeByNameRequest) MarshalJSON() ([]byte, error) { +func (o PluginsCatalogRegisterPluginWithTypeRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["args"] = o.Args diff --git a/schema/model_write_plugins_reload_backend_request.go b/schema/model_plugins_reload_backends_request.go similarity index 63% rename from schema/model_write_plugins_reload_backend_request.go rename to schema/model_plugins_reload_backends_request.go index 994ecfd9..f7c482a9 100644 --- a/schema/model_write_plugins_reload_backend_request.go +++ b/schema/model_plugins_reload_backends_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WritePluginsReloadBackendRequest struct for WritePluginsReloadBackendRequest -type WritePluginsReloadBackendRequest struct { +// PluginsReloadBackendsRequest struct for PluginsReloadBackendsRequest +type PluginsReloadBackendsRequest struct { // The mount paths of the plugin backends to reload. Mounts []string `json:"mounts"` @@ -20,16 +20,16 @@ type WritePluginsReloadBackendRequest struct { Scope string `json:"scope"` } -// NewWritePluginsReloadBackendRequestWithDefaults instantiates a new WritePluginsReloadBackendRequest object +// NewPluginsReloadBackendsRequestWithDefaults instantiates a new PluginsReloadBackendsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWritePluginsReloadBackendRequestWithDefaults() *WritePluginsReloadBackendRequest { - var this WritePluginsReloadBackendRequest +func NewPluginsReloadBackendsRequestWithDefaults() *PluginsReloadBackendsRequest { + var this PluginsReloadBackendsRequest return &this } -func (o WritePluginsReloadBackendRequest) MarshalJSON() ([]byte, error) { +func (o PluginsReloadBackendsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["mounts"] = o.Mounts diff --git a/schema/model_plugins_reload_backends_response.go b/schema/model_plugins_reload_backends_response.go new file mode 100644 index 00000000..098ff831 --- /dev/null +++ b/schema/model_plugins_reload_backends_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PluginsReloadBackendsResponse struct for PluginsReloadBackendsResponse +type PluginsReloadBackendsResponse struct { + ReloadId string `json:"reload_id"` +} + +// NewPluginsReloadBackendsResponseWithDefaults instantiates a new PluginsReloadBackendsResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPluginsReloadBackendsResponseWithDefaults() *PluginsReloadBackendsResponse { + var this PluginsReloadBackendsResponse + + return &this +} + +func (o PluginsReloadBackendsResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["reload_id"] = o.ReloadId + + return json.Marshal(toSerialize) +} diff --git a/schema/model_policies_generate_password_from_password_policy_response.go b/schema/model_policies_generate_password_from_password_policy_response.go new file mode 100644 index 00000000..3a1587cc --- /dev/null +++ b/schema/model_policies_generate_password_from_password_policy_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PoliciesGeneratePasswordFromPasswordPolicyResponse struct for PoliciesGeneratePasswordFromPasswordPolicyResponse +type PoliciesGeneratePasswordFromPasswordPolicyResponse struct { + Password string `json:"password"` +} + +// NewPoliciesGeneratePasswordFromPasswordPolicyResponseWithDefaults instantiates a new PoliciesGeneratePasswordFromPasswordPolicyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPoliciesGeneratePasswordFromPasswordPolicyResponseWithDefaults() *PoliciesGeneratePasswordFromPasswordPolicyResponse { + var this PoliciesGeneratePasswordFromPasswordPolicyResponse + + return &this +} + +func (o PoliciesGeneratePasswordFromPasswordPolicyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["password"] = o.Password + + return json.Marshal(toSerialize) +} diff --git a/schema/model_policies_list_acl_policies_response.go b/schema/model_policies_list_acl_policies_response.go new file mode 100644 index 00000000..1a878049 --- /dev/null +++ b/schema/model_policies_list_acl_policies_response.go @@ -0,0 +1,35 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PoliciesListAclPoliciesResponse struct for PoliciesListAclPoliciesResponse +type PoliciesListAclPoliciesResponse struct { + Keys []string `json:"keys"` + + Policies []string `json:"policies"` +} + +// NewPoliciesListAclPoliciesResponseWithDefaults instantiates a new PoliciesListAclPoliciesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPoliciesListAclPoliciesResponseWithDefaults() *PoliciesListAclPoliciesResponse { + var this PoliciesListAclPoliciesResponse + + return &this +} + +func (o PoliciesListAclPoliciesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + toSerialize["policies"] = o.Policies + + return json.Marshal(toSerialize) +} diff --git a/schema/model_policies_list_password_policies_response.go b/schema/model_policies_list_password_policies_response.go new file mode 100644 index 00000000..2902f692 --- /dev/null +++ b/schema/model_policies_list_password_policies_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PoliciesListPasswordPoliciesResponse struct for PoliciesListPasswordPoliciesResponse +type PoliciesListPasswordPoliciesResponse struct { + Keys []string `json:"keys"` +} + +// NewPoliciesListPasswordPoliciesResponseWithDefaults instantiates a new PoliciesListPasswordPoliciesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPoliciesListPasswordPoliciesResponseWithDefaults() *PoliciesListPasswordPoliciesResponse { + var this PoliciesListPasswordPoliciesResponse + + return &this +} + +func (o PoliciesListPasswordPoliciesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_policies_list_response.go b/schema/model_policies_list_response.go new file mode 100644 index 00000000..fe928309 --- /dev/null +++ b/schema/model_policies_list_response.go @@ -0,0 +1,35 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PoliciesListResponse struct for PoliciesListResponse +type PoliciesListResponse struct { + Keys []string `json:"keys"` + + Policies []string `json:"policies"` +} + +// NewPoliciesListResponseWithDefaults instantiates a new PoliciesListResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPoliciesListResponseWithDefaults() *PoliciesListResponse { + var this PoliciesListResponse + + return &this +} + +func (o PoliciesListResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + toSerialize["policies"] = o.Policies + + return json.Marshal(toSerialize) +} diff --git a/schema/model_policies_read_acl_policy2_response.go b/schema/model_policies_read_acl_policy2_response.go new file mode 100644 index 00000000..8d7ca5c7 --- /dev/null +++ b/schema/model_policies_read_acl_policy2_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PoliciesReadAclPolicy2Response struct for PoliciesReadAclPolicy2Response +type PoliciesReadAclPolicy2Response struct { + Name string `json:"name"` + + Policy string `json:"policy"` + + Rules string `json:"rules"` +} + +// NewPoliciesReadAclPolicy2ResponseWithDefaults instantiates a new PoliciesReadAclPolicy2Response object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPoliciesReadAclPolicy2ResponseWithDefaults() *PoliciesReadAclPolicy2Response { + var this PoliciesReadAclPolicy2Response + + return &this +} + +func (o PoliciesReadAclPolicy2Response) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["name"] = o.Name + toSerialize["policy"] = o.Policy + toSerialize["rules"] = o.Rules + + return json.Marshal(toSerialize) +} diff --git a/schema/model_policies_read_acl_policy_response.go b/schema/model_policies_read_acl_policy_response.go new file mode 100644 index 00000000..3afee20f --- /dev/null +++ b/schema/model_policies_read_acl_policy_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PoliciesReadAclPolicyResponse struct for PoliciesReadAclPolicyResponse +type PoliciesReadAclPolicyResponse struct { + Name string `json:"name"` + + Policy string `json:"policy"` + + Rules string `json:"rules"` +} + +// NewPoliciesReadAclPolicyResponseWithDefaults instantiates a new PoliciesReadAclPolicyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPoliciesReadAclPolicyResponseWithDefaults() *PoliciesReadAclPolicyResponse { + var this PoliciesReadAclPolicyResponse + + return &this +} + +func (o PoliciesReadAclPolicyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["name"] = o.Name + toSerialize["policy"] = o.Policy + toSerialize["rules"] = o.Rules + + return json.Marshal(toSerialize) +} diff --git a/schema/model_policies_read_password_policy_response.go b/schema/model_policies_read_password_policy_response.go new file mode 100644 index 00000000..09112ff4 --- /dev/null +++ b/schema/model_policies_read_password_policy_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// PoliciesReadPasswordPolicyResponse struct for PoliciesReadPasswordPolicyResponse +type PoliciesReadPasswordPolicyResponse struct { + Policy string `json:"policy"` +} + +// NewPoliciesReadPasswordPolicyResponseWithDefaults instantiates a new PoliciesReadPasswordPolicyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewPoliciesReadPasswordPolicyResponseWithDefaults() *PoliciesReadPasswordPolicyResponse { + var this PoliciesReadPasswordPolicyResponse + + return &this +} + +func (o PoliciesReadPasswordPolicyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["policy"] = o.Policy + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_policy_request.go b/schema/model_policies_write_acl_policy2_request.go similarity index 60% rename from schema/model_write_policy_request.go rename to schema/model_policies_write_acl_policy2_request.go index 03fccc0a..2dec7d5e 100644 --- a/schema/model_write_policy_request.go +++ b/schema/model_policies_write_acl_policy2_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WritePolicyRequest struct for WritePolicyRequest -type WritePolicyRequest struct { +// PoliciesWriteAclPolicy2Request struct for PoliciesWriteAclPolicy2Request +type PoliciesWriteAclPolicy2Request struct { // The rules of the policy. Policy string `json:"policy"` @@ -19,16 +19,16 @@ type WritePolicyRequest struct { Rules string `json:"rules"` } -// NewWritePolicyRequestWithDefaults instantiates a new WritePolicyRequest object +// NewPoliciesWriteAclPolicy2RequestWithDefaults instantiates a new PoliciesWriteAclPolicy2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWritePolicyRequestWithDefaults() *WritePolicyRequest { - var this WritePolicyRequest +func NewPoliciesWriteAclPolicy2RequestWithDefaults() *PoliciesWriteAclPolicy2Request { + var this PoliciesWriteAclPolicy2Request return &this } -func (o WritePolicyRequest) MarshalJSON() ([]byte, error) { +func (o PoliciesWriteAclPolicy2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["policy"] = o.Policy diff --git a/schema/model_write_policies_acl_request.go b/schema/model_policies_write_acl_policy_request.go similarity index 57% rename from schema/model_write_policies_acl_request.go rename to schema/model_policies_write_acl_policy_request.go index fe6bd7aa..36d55ced 100644 --- a/schema/model_write_policies_acl_request.go +++ b/schema/model_policies_write_acl_policy_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WritePoliciesACLRequest struct for WritePoliciesACLRequest -type WritePoliciesACLRequest struct { +// PoliciesWriteAclPolicyRequest struct for PoliciesWriteAclPolicyRequest +type PoliciesWriteAclPolicyRequest struct { // The rules of the policy. Policy string `json:"policy"` } -// NewWritePoliciesACLRequestWithDefaults instantiates a new WritePoliciesACLRequest object +// NewPoliciesWriteAclPolicyRequestWithDefaults instantiates a new PoliciesWriteAclPolicyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWritePoliciesACLRequestWithDefaults() *WritePoliciesACLRequest { - var this WritePoliciesACLRequest +func NewPoliciesWriteAclPolicyRequestWithDefaults() *PoliciesWriteAclPolicyRequest { + var this PoliciesWriteAclPolicyRequest return &this } -func (o WritePoliciesACLRequest) MarshalJSON() ([]byte, error) { +func (o PoliciesWriteAclPolicyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["policy"] = o.Policy diff --git a/schema/model_write_policies_password_request.go b/schema/model_policies_write_password_policy_request.go similarity index 54% rename from schema/model_write_policies_password_request.go rename to schema/model_policies_write_password_policy_request.go index 88c03b07..5ae30b9f 100644 --- a/schema/model_write_policies_password_request.go +++ b/schema/model_policies_write_password_policy_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WritePoliciesPasswordRequest struct for WritePoliciesPasswordRequest -type WritePoliciesPasswordRequest struct { +// PoliciesWritePasswordPolicyRequest struct for PoliciesWritePasswordPolicyRequest +type PoliciesWritePasswordPolicyRequest struct { // The password policy Policy string `json:"policy"` } -// NewWritePoliciesPasswordRequestWithDefaults instantiates a new WritePoliciesPasswordRequest object +// NewPoliciesWritePasswordPolicyRequestWithDefaults instantiates a new PoliciesWritePasswordPolicyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWritePoliciesPasswordRequestWithDefaults() *WritePoliciesPasswordRequest { - var this WritePoliciesPasswordRequest +func NewPoliciesWritePasswordPolicyRequestWithDefaults() *PoliciesWritePasswordPolicyRequest { + var this PoliciesWritePasswordPolicyRequest return &this } -func (o WritePoliciesPasswordRequest) MarshalJSON() ([]byte, error) { +func (o PoliciesWritePasswordPolicyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["policy"] = o.Policy diff --git a/schema/model_write_capabilities_accessor_request.go b/schema/model_query_token_accessor_capabilities_request.go similarity index 62% rename from schema/model_write_capabilities_accessor_request.go rename to schema/model_query_token_accessor_capabilities_request.go index bf02e417..90b45eed 100644 --- a/schema/model_write_capabilities_accessor_request.go +++ b/schema/model_query_token_accessor_capabilities_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteCapabilitiesAccessorRequest struct for WriteCapabilitiesAccessorRequest -type WriteCapabilitiesAccessorRequest struct { +// QueryTokenAccessorCapabilitiesRequest struct for QueryTokenAccessorCapabilitiesRequest +type QueryTokenAccessorCapabilitiesRequest struct { // Accessor of the token for which capabilities are being queried. Accessor string `json:"accessor"` @@ -22,16 +22,16 @@ type WriteCapabilitiesAccessorRequest struct { Paths []string `json:"paths"` } -// NewWriteCapabilitiesAccessorRequestWithDefaults instantiates a new WriteCapabilitiesAccessorRequest object +// NewQueryTokenAccessorCapabilitiesRequestWithDefaults instantiates a new QueryTokenAccessorCapabilitiesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteCapabilitiesAccessorRequestWithDefaults() *WriteCapabilitiesAccessorRequest { - var this WriteCapabilitiesAccessorRequest +func NewQueryTokenAccessorCapabilitiesRequestWithDefaults() *QueryTokenAccessorCapabilitiesRequest { + var this QueryTokenAccessorCapabilitiesRequest return &this } -func (o WriteCapabilitiesAccessorRequest) MarshalJSON() ([]byte, error) { +func (o QueryTokenAccessorCapabilitiesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["accessor"] = o.Accessor diff --git a/schema/model_write_capabilities_request.go b/schema/model_query_token_capabilities_request.go similarity index 65% rename from schema/model_write_capabilities_request.go rename to schema/model_query_token_capabilities_request.go index 4ef0a4e3..34933c5d 100644 --- a/schema/model_write_capabilities_request.go +++ b/schema/model_query_token_capabilities_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteCapabilitiesRequest struct for WriteCapabilitiesRequest -type WriteCapabilitiesRequest struct { +// QueryTokenCapabilitiesRequest struct for QueryTokenCapabilitiesRequest +type QueryTokenCapabilitiesRequest struct { // Use 'paths' instead. // Deprecated Path []string `json:"path"` @@ -22,16 +22,16 @@ type WriteCapabilitiesRequest struct { Token string `json:"token"` } -// NewWriteCapabilitiesRequestWithDefaults instantiates a new WriteCapabilitiesRequest object +// NewQueryTokenCapabilitiesRequestWithDefaults instantiates a new QueryTokenCapabilitiesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteCapabilitiesRequestWithDefaults() *WriteCapabilitiesRequest { - var this WriteCapabilitiesRequest +func NewQueryTokenCapabilitiesRequestWithDefaults() *QueryTokenCapabilitiesRequest { + var this QueryTokenCapabilitiesRequest return &this } -func (o WriteCapabilitiesRequest) MarshalJSON() ([]byte, error) { +func (o QueryTokenCapabilitiesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["path"] = o.Path diff --git a/schema/model_write_capabilities_self_request.go b/schema/model_query_token_self_capabilities_request.go similarity index 63% rename from schema/model_write_capabilities_self_request.go rename to schema/model_query_token_self_capabilities_request.go index 7e56474e..4a9639df 100644 --- a/schema/model_write_capabilities_self_request.go +++ b/schema/model_query_token_self_capabilities_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteCapabilitiesSelfRequest struct for WriteCapabilitiesSelfRequest -type WriteCapabilitiesSelfRequest struct { +// QueryTokenSelfCapabilitiesRequest struct for QueryTokenSelfCapabilitiesRequest +type QueryTokenSelfCapabilitiesRequest struct { // Use 'paths' instead. // Deprecated Path []string `json:"path"` @@ -22,16 +22,16 @@ type WriteCapabilitiesSelfRequest struct { Token string `json:"token"` } -// NewWriteCapabilitiesSelfRequestWithDefaults instantiates a new WriteCapabilitiesSelfRequest object +// NewQueryTokenSelfCapabilitiesRequestWithDefaults instantiates a new QueryTokenSelfCapabilitiesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteCapabilitiesSelfRequestWithDefaults() *WriteCapabilitiesSelfRequest { - var this WriteCapabilitiesSelfRequest +func NewQueryTokenSelfCapabilitiesRequestWithDefaults() *QueryTokenSelfCapabilitiesRequest { + var this QueryTokenSelfCapabilitiesRequest return &this } -func (o WriteCapabilitiesSelfRequest) MarshalJSON() ([]byte, error) { +func (o QueryTokenSelfCapabilitiesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["path"] = o.Path diff --git a/schema/model_rabbit_mq_write_connection_config_request.go b/schema/model_rabbit_mq_configure_connection_request.go similarity index 74% rename from schema/model_rabbit_mq_write_connection_config_request.go rename to schema/model_rabbit_mq_configure_connection_request.go index 5aa70782..90a797ad 100644 --- a/schema/model_rabbit_mq_write_connection_config_request.go +++ b/schema/model_rabbit_mq_configure_connection_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RabbitMQWriteConnectionConfigRequest struct for RabbitMQWriteConnectionConfigRequest -type RabbitMQWriteConnectionConfigRequest struct { +// RabbitMqConfigureConnectionRequest struct for RabbitMqConfigureConnectionRequest +type RabbitMqConfigureConnectionRequest struct { // RabbitMQ Management URI ConnectionUri string `json:"connection_uri"` @@ -30,18 +30,18 @@ type RabbitMQWriteConnectionConfigRequest struct { VerifyConnection bool `json:"verify_connection"` } -// NewRabbitMQWriteConnectionConfigRequestWithDefaults instantiates a new RabbitMQWriteConnectionConfigRequest object +// NewRabbitMqConfigureConnectionRequestWithDefaults instantiates a new RabbitMqConfigureConnectionRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRabbitMQWriteConnectionConfigRequestWithDefaults() *RabbitMQWriteConnectionConfigRequest { - var this RabbitMQWriteConnectionConfigRequest +func NewRabbitMqConfigureConnectionRequestWithDefaults() *RabbitMqConfigureConnectionRequest { + var this RabbitMqConfigureConnectionRequest this.VerifyConnection = true return &this } -func (o RabbitMQWriteConnectionConfigRequest) MarshalJSON() ([]byte, error) { +func (o RabbitMqConfigureConnectionRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["connection_uri"] = o.ConnectionUri diff --git a/schema/model_rabbit_mq_write_lease_config_request.go b/schema/model_rabbit_mq_configure_lease_request.go similarity index 63% rename from schema/model_rabbit_mq_write_lease_config_request.go rename to schema/model_rabbit_mq_configure_lease_request.go index 08ca01f6..7663d429 100644 --- a/schema/model_rabbit_mq_write_lease_config_request.go +++ b/schema/model_rabbit_mq_configure_lease_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RabbitMQWriteLeaseConfigRequest struct for RabbitMQWriteLeaseConfigRequest -type RabbitMQWriteLeaseConfigRequest struct { +// RabbitMqConfigureLeaseRequest struct for RabbitMqConfigureLeaseRequest +type RabbitMqConfigureLeaseRequest struct { // Duration after which the issued credentials should not be allowed to be renewed MaxTtl int32 `json:"max_ttl"` @@ -18,11 +18,11 @@ type RabbitMQWriteLeaseConfigRequest struct { Ttl int32 `json:"ttl"` } -// NewRabbitMQWriteLeaseConfigRequestWithDefaults instantiates a new RabbitMQWriteLeaseConfigRequest object +// NewRabbitMqConfigureLeaseRequestWithDefaults instantiates a new RabbitMqConfigureLeaseRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRabbitMQWriteLeaseConfigRequestWithDefaults() *RabbitMQWriteLeaseConfigRequest { - var this RabbitMQWriteLeaseConfigRequest +func NewRabbitMqConfigureLeaseRequestWithDefaults() *RabbitMqConfigureLeaseRequest { + var this RabbitMqConfigureLeaseRequest this.MaxTtl = 0 this.Ttl = 0 @@ -30,7 +30,7 @@ func NewRabbitMQWriteLeaseConfigRequestWithDefaults() *RabbitMQWriteLeaseConfigR return &this } -func (o RabbitMQWriteLeaseConfigRequest) MarshalJSON() ([]byte, error) { +func (o RabbitMqConfigureLeaseRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["max_ttl"] = o.MaxTtl diff --git a/schema/model_rabbit_mq_write_role_request.go b/schema/model_rabbit_mq_write_role_request.go index 04f66744..a9f9e9c5 100644 --- a/schema/model_rabbit_mq_write_role_request.go +++ b/schema/model_rabbit_mq_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RabbitMQWriteRoleRequest struct for RabbitMQWriteRoleRequest -type RabbitMQWriteRoleRequest struct { +// RabbitMqWriteRoleRequest struct for RabbitMqWriteRoleRequest +type RabbitMqWriteRoleRequest struct { // Comma-separated list of tags for this role. Tags string `json:"tags"` @@ -21,16 +21,16 @@ type RabbitMQWriteRoleRequest struct { Vhosts string `json:"vhosts"` } -// NewRabbitMQWriteRoleRequestWithDefaults instantiates a new RabbitMQWriteRoleRequest object +// NewRabbitMqWriteRoleRequestWithDefaults instantiates a new RabbitMqWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRabbitMQWriteRoleRequestWithDefaults() *RabbitMQWriteRoleRequest { - var this RabbitMQWriteRoleRequest +func NewRabbitMqWriteRoleRequestWithDefaults() *RabbitMqWriteRoleRequest { + var this RabbitMqWriteRoleRequest return &this } -func (o RabbitMQWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o RabbitMqWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["tags"] = o.Tags diff --git a/schema/model_radius_write_config_request.go b/schema/model_radius_configure_request.go similarity index 89% rename from schema/model_radius_write_config_request.go rename to schema/model_radius_configure_request.go index ca54dd52..c4dc83a6 100644 --- a/schema/model_radius_write_config_request.go +++ b/schema/model_radius_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// RadiusWriteConfigRequest struct for RadiusWriteConfigRequest -type RadiusWriteConfigRequest struct { +// RadiusConfigureRequest struct for RadiusConfigureRequest +type RadiusConfigureRequest struct { // Number of seconds before connect times out (default: 10) DialTimeout int32 `json:"dial_timeout"` @@ -59,15 +59,15 @@ type RadiusWriteConfigRequest struct { // The type of token to generate, service or batch TokenType string `json:"token_type"` - // Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: empty) + // Comma-separated list of policies to grant upon successful RADIUS authentication of an unregistered user (default: empty) UnregisteredUserPolicies string `json:"unregistered_user_policies"` } -// NewRadiusWriteConfigRequestWithDefaults instantiates a new RadiusWriteConfigRequest object +// NewRadiusConfigureRequestWithDefaults instantiates a new RadiusConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewRadiusWriteConfigRequestWithDefaults() *RadiusWriteConfigRequest { - var this RadiusWriteConfigRequest +func NewRadiusConfigureRequestWithDefaults() *RadiusConfigureRequest { + var this RadiusConfigureRequest this.DialTimeout = 10 this.NasIdentifier = "" @@ -80,7 +80,7 @@ func NewRadiusWriteConfigRequestWithDefaults() *RadiusWriteConfigRequest { return &this } -func (o RadiusWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o RadiusConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["dial_timeout"] = o.DialTimeout diff --git a/schema/model_write_quotas_config_request.go b/schema/model_rate_limit_quotas_configure_request.go similarity index 73% rename from schema/model_write_quotas_config_request.go rename to schema/model_rate_limit_quotas_configure_request.go index ceb1128b..986197ec 100644 --- a/schema/model_write_quotas_config_request.go +++ b/schema/model_rate_limit_quotas_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteQuotasConfigRequest struct for WriteQuotasConfigRequest -type WriteQuotasConfigRequest struct { +// RateLimitQuotasConfigureRequest struct for RateLimitQuotasConfigureRequest +type RateLimitQuotasConfigureRequest struct { // If set, starts audit logging of requests that get rejected due to rate limit quota rule violations. EnableRateLimitAuditLogging bool `json:"enable_rate_limit_audit_logging"` @@ -21,16 +21,16 @@ type WriteQuotasConfigRequest struct { RateLimitExemptPaths []string `json:"rate_limit_exempt_paths"` } -// NewWriteQuotasConfigRequestWithDefaults instantiates a new WriteQuotasConfigRequest object +// NewRateLimitQuotasConfigureRequestWithDefaults instantiates a new RateLimitQuotasConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteQuotasConfigRequestWithDefaults() *WriteQuotasConfigRequest { - var this WriteQuotasConfigRequest +func NewRateLimitQuotasConfigureRequestWithDefaults() *RateLimitQuotasConfigureRequest { + var this RateLimitQuotasConfigureRequest return &this } -func (o WriteQuotasConfigRequest) MarshalJSON() ([]byte, error) { +func (o RateLimitQuotasConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["enable_rate_limit_audit_logging"] = o.EnableRateLimitAuditLogging diff --git a/schema/model_app_role_list_secret_id_response.go b/schema/model_rate_limit_quotas_list_response.go similarity index 57% rename from schema/model_app_role_list_secret_id_response.go rename to schema/model_rate_limit_quotas_list_response.go index 777160c5..fd291f13 100644 --- a/schema/model_app_role_list_secret_id_response.go +++ b/schema/model_rate_limit_quotas_list_response.go @@ -9,21 +9,21 @@ import ( "encoding/json" ) -// AppRoleListSecretIDResponse struct for AppRoleListSecretIDResponse -type AppRoleListSecretIDResponse struct { +// RateLimitQuotasListResponse struct for RateLimitQuotasListResponse +type RateLimitQuotasListResponse struct { Keys []string `json:"keys"` } -// NewAppRoleListSecretIDResponseWithDefaults instantiates a new AppRoleListSecretIDResponse object +// NewRateLimitQuotasListResponseWithDefaults instantiates a new RateLimitQuotasListResponse object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewAppRoleListSecretIDResponseWithDefaults() *AppRoleListSecretIDResponse { - var this AppRoleListSecretIDResponse +func NewRateLimitQuotasListResponseWithDefaults() *RateLimitQuotasListResponse { + var this RateLimitQuotasListResponse return &this } -func (o AppRoleListSecretIDResponse) MarshalJSON() ([]byte, error) { +func (o RateLimitQuotasListResponse) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["keys"] = o.Keys diff --git a/schema/model_rate_limit_quotas_read_configuration_response.go b/schema/model_rate_limit_quotas_read_configuration_response.go new file mode 100644 index 00000000..44fccde4 --- /dev/null +++ b/schema/model_rate_limit_quotas_read_configuration_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RateLimitQuotasReadConfigurationResponse struct for RateLimitQuotasReadConfigurationResponse +type RateLimitQuotasReadConfigurationResponse struct { + EnableRateLimitAuditLogging bool `json:"enable_rate_limit_audit_logging"` + + EnableRateLimitResponseHeaders bool `json:"enable_rate_limit_response_headers"` + + RateLimitExemptPaths []string `json:"rate_limit_exempt_paths"` +} + +// NewRateLimitQuotasReadConfigurationResponseWithDefaults instantiates a new RateLimitQuotasReadConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRateLimitQuotasReadConfigurationResponseWithDefaults() *RateLimitQuotasReadConfigurationResponse { + var this RateLimitQuotasReadConfigurationResponse + + return &this +} + +func (o RateLimitQuotasReadConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["enable_rate_limit_audit_logging"] = o.EnableRateLimitAuditLogging + toSerialize["enable_rate_limit_response_headers"] = o.EnableRateLimitResponseHeaders + toSerialize["rate_limit_exempt_paths"] = o.RateLimitExemptPaths + + return json.Marshal(toSerialize) +} diff --git a/schema/model_rate_limit_quotas_read_response.go b/schema/model_rate_limit_quotas_read_response.go new file mode 100644 index 00000000..ce2e19bd --- /dev/null +++ b/schema/model_rate_limit_quotas_read_response.go @@ -0,0 +1,50 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RateLimitQuotasReadResponse struct for RateLimitQuotasReadResponse +type RateLimitQuotasReadResponse struct { + BlockInterval int32 `json:"block_interval"` + + Interval int32 `json:"interval"` + + Name string `json:"name"` + + Path string `json:"path"` + + Rate float32 `json:"rate"` + + Role string `json:"role"` + + Type string `json:"type"` +} + +// NewRateLimitQuotasReadResponseWithDefaults instantiates a new RateLimitQuotasReadResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRateLimitQuotasReadResponseWithDefaults() *RateLimitQuotasReadResponse { + var this RateLimitQuotasReadResponse + + return &this +} + +func (o RateLimitQuotasReadResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["block_interval"] = o.BlockInterval + toSerialize["interval"] = o.Interval + toSerialize["name"] = o.Name + toSerialize["path"] = o.Path + toSerialize["rate"] = o.Rate + toSerialize["role"] = o.Role + toSerialize["type"] = o.Type + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_quotas_rate_limit_request.go b/schema/model_rate_limit_quotas_write_request.go similarity index 80% rename from schema/model_write_quotas_rate_limit_request.go rename to schema/model_rate_limit_quotas_write_request.go index e588063c..c01b97e5 100644 --- a/schema/model_write_quotas_rate_limit_request.go +++ b/schema/model_rate_limit_quotas_write_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteQuotasRateLimitRequest struct for WriteQuotasRateLimitRequest -type WriteQuotasRateLimitRequest struct { +// RateLimitQuotasWriteRequest struct for RateLimitQuotasWriteRequest +type RateLimitQuotasWriteRequest struct { // If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' has elapsed. BlockInterval int32 `json:"block_interval"` @@ -30,16 +30,16 @@ type WriteQuotasRateLimitRequest struct { Type string `json:"type"` } -// NewWriteQuotasRateLimitRequestWithDefaults instantiates a new WriteQuotasRateLimitRequest object +// NewRateLimitQuotasWriteRequestWithDefaults instantiates a new RateLimitQuotasWriteRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteQuotasRateLimitRequestWithDefaults() *WriteQuotasRateLimitRequest { - var this WriteQuotasRateLimitRequest +func NewRateLimitQuotasWriteRequestWithDefaults() *RateLimitQuotasWriteRequest { + var this RateLimitQuotasWriteRequest return &this } -func (o WriteQuotasRateLimitRequest) MarshalJSON() ([]byte, error) { +func (o RateLimitQuotasWriteRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["block_interval"] = o.BlockInterval diff --git a/schema/model_read_wrapping_properties2_response.go b/schema/model_read_wrapping_properties2_response.go new file mode 100644 index 00000000..015098b3 --- /dev/null +++ b/schema/model_read_wrapping_properties2_response.go @@ -0,0 +1,39 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// ReadWrappingProperties2Response struct for ReadWrappingProperties2Response +type ReadWrappingProperties2Response struct { + CreationPath string `json:"creation_path"` + + CreationTime time.Time `json:"creation_time"` + + CreationTtl int32 `json:"creation_ttl"` +} + +// NewReadWrappingProperties2ResponseWithDefaults instantiates a new ReadWrappingProperties2Response object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewReadWrappingProperties2ResponseWithDefaults() *ReadWrappingProperties2Response { + var this ReadWrappingProperties2Response + + return &this +} + +func (o ReadWrappingProperties2Response) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["creation_path"] = o.CreationPath + toSerialize["creation_time"] = o.CreationTime + toSerialize["creation_ttl"] = o.CreationTtl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_read_wrapping_properties_request.go b/schema/model_read_wrapping_properties_request.go new file mode 100644 index 00000000..4c2b8f33 --- /dev/null +++ b/schema/model_read_wrapping_properties_request.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// ReadWrappingPropertiesRequest struct for ReadWrappingPropertiesRequest +type ReadWrappingPropertiesRequest struct { + Token string `json:"token"` +} + +// NewReadWrappingPropertiesRequestWithDefaults instantiates a new ReadWrappingPropertiesRequest object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewReadWrappingPropertiesRequestWithDefaults() *ReadWrappingPropertiesRequest { + var this ReadWrappingPropertiesRequest + + return &this +} + +func (o ReadWrappingPropertiesRequest) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["token"] = o.Token + + return json.Marshal(toSerialize) +} diff --git a/schema/model_read_wrapping_properties_response.go b/schema/model_read_wrapping_properties_response.go new file mode 100644 index 00000000..cc403d70 --- /dev/null +++ b/schema/model_read_wrapping_properties_response.go @@ -0,0 +1,39 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" + "time" +) + +// ReadWrappingPropertiesResponse struct for ReadWrappingPropertiesResponse +type ReadWrappingPropertiesResponse struct { + CreationPath string `json:"creation_path"` + + CreationTime time.Time `json:"creation_time"` + + CreationTtl int32 `json:"creation_ttl"` +} + +// NewReadWrappingPropertiesResponseWithDefaults instantiates a new ReadWrappingPropertiesResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewReadWrappingPropertiesResponseWithDefaults() *ReadWrappingPropertiesResponse { + var this ReadWrappingPropertiesResponse + + return &this +} + +func (o ReadWrappingPropertiesResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["creation_path"] = o.CreationPath + toSerialize["creation_time"] = o.CreationTime + toSerialize["creation_ttl"] = o.CreationTtl + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_rekey_init_request.go b/schema/model_rekey_attempt_initialize_request.go similarity index 79% rename from schema/model_write_rekey_init_request.go rename to schema/model_rekey_attempt_initialize_request.go index 8edbc879..42de71dc 100644 --- a/schema/model_write_rekey_init_request.go +++ b/schema/model_rekey_attempt_initialize_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteRekeyInitRequest struct for WriteRekeyInitRequest -type WriteRekeyInitRequest struct { +// RekeyAttemptInitializeRequest struct for RekeyAttemptInitializeRequest +type RekeyAttemptInitializeRequest struct { // Specifies if using PGP-encrypted keys, whether Vault should also store a plaintext backup of the PGP-encrypted keys. Backup bool `json:"backup"` @@ -27,16 +27,16 @@ type WriteRekeyInitRequest struct { SecretThreshold int32 `json:"secret_threshold"` } -// NewWriteRekeyInitRequestWithDefaults instantiates a new WriteRekeyInitRequest object +// NewRekeyAttemptInitializeRequestWithDefaults instantiates a new RekeyAttemptInitializeRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteRekeyInitRequestWithDefaults() *WriteRekeyInitRequest { - var this WriteRekeyInitRequest +func NewRekeyAttemptInitializeRequestWithDefaults() *RekeyAttemptInitializeRequest { + var this RekeyAttemptInitializeRequest return &this } -func (o WriteRekeyInitRequest) MarshalJSON() ([]byte, error) { +func (o RekeyAttemptInitializeRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["backup"] = o.Backup diff --git a/schema/model_rekey_attempt_initialize_response.go b/schema/model_rekey_attempt_initialize_response.go new file mode 100644 index 00000000..44ed9e72 --- /dev/null +++ b/schema/model_rekey_attempt_initialize_response.go @@ -0,0 +1,59 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyAttemptInitializeResponse struct for RekeyAttemptInitializeResponse +type RekeyAttemptInitializeResponse struct { + Backup bool `json:"backup"` + + N int32 `json:"n"` + + Nounce string `json:"nounce"` + + PgpFingerprints []string `json:"pgp_fingerprints"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started string `json:"started"` + + T int32 `json:"t"` + + VerificationNonce string `json:"verification_nonce"` + + VerificationRequired bool `json:"verification_required"` +} + +// NewRekeyAttemptInitializeResponseWithDefaults instantiates a new RekeyAttemptInitializeResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyAttemptInitializeResponseWithDefaults() *RekeyAttemptInitializeResponse { + var this RekeyAttemptInitializeResponse + + return &this +} + +func (o RekeyAttemptInitializeResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["backup"] = o.Backup + toSerialize["n"] = o.N + toSerialize["nounce"] = o.Nounce + toSerialize["pgp_fingerprints"] = o.PgpFingerprints + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + toSerialize["t"] = o.T + toSerialize["verification_nonce"] = o.VerificationNonce + toSerialize["verification_required"] = o.VerificationRequired + + return json.Marshal(toSerialize) +} diff --git a/schema/model_rekey_attempt_read_progress_response.go b/schema/model_rekey_attempt_read_progress_response.go new file mode 100644 index 00000000..b93316f6 --- /dev/null +++ b/schema/model_rekey_attempt_read_progress_response.go @@ -0,0 +1,59 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyAttemptReadProgressResponse struct for RekeyAttemptReadProgressResponse +type RekeyAttemptReadProgressResponse struct { + Backup bool `json:"backup"` + + N int32 `json:"n"` + + Nounce string `json:"nounce"` + + PgpFingerprints []string `json:"pgp_fingerprints"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started string `json:"started"` + + T int32 `json:"t"` + + VerificationNonce string `json:"verification_nonce"` + + VerificationRequired bool `json:"verification_required"` +} + +// NewRekeyAttemptReadProgressResponseWithDefaults instantiates a new RekeyAttemptReadProgressResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyAttemptReadProgressResponseWithDefaults() *RekeyAttemptReadProgressResponse { + var this RekeyAttemptReadProgressResponse + + return &this +} + +func (o RekeyAttemptReadProgressResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["backup"] = o.Backup + toSerialize["n"] = o.N + toSerialize["nounce"] = o.Nounce + toSerialize["pgp_fingerprints"] = o.PgpFingerprints + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + toSerialize["t"] = o.T + toSerialize["verification_nonce"] = o.VerificationNonce + toSerialize["verification_required"] = o.VerificationRequired + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_rekey_update_request.go b/schema/model_rekey_attempt_update_request.go similarity index 63% rename from schema/model_write_rekey_update_request.go rename to schema/model_rekey_attempt_update_request.go index 64041451..7b3b8d83 100644 --- a/schema/model_write_rekey_update_request.go +++ b/schema/model_rekey_attempt_update_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteRekeyUpdateRequest struct for WriteRekeyUpdateRequest -type WriteRekeyUpdateRequest struct { +// RekeyAttemptUpdateRequest struct for RekeyAttemptUpdateRequest +type RekeyAttemptUpdateRequest struct { // Specifies a single unseal key share. Key string `json:"key"` @@ -18,16 +18,16 @@ type WriteRekeyUpdateRequest struct { Nonce string `json:"nonce"` } -// NewWriteRekeyUpdateRequestWithDefaults instantiates a new WriteRekeyUpdateRequest object +// NewRekeyAttemptUpdateRequestWithDefaults instantiates a new RekeyAttemptUpdateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteRekeyUpdateRequestWithDefaults() *WriteRekeyUpdateRequest { - var this WriteRekeyUpdateRequest +func NewRekeyAttemptUpdateRequestWithDefaults() *RekeyAttemptUpdateRequest { + var this RekeyAttemptUpdateRequest return &this } -func (o WriteRekeyUpdateRequest) MarshalJSON() ([]byte, error) { +func (o RekeyAttemptUpdateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key"] = o.Key diff --git a/schema/model_rekey_attempt_update_response.go b/schema/model_rekey_attempt_update_response.go new file mode 100644 index 00000000..0e1dea2a --- /dev/null +++ b/schema/model_rekey_attempt_update_response.go @@ -0,0 +1,68 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyAttemptUpdateResponse struct for RekeyAttemptUpdateResponse +type RekeyAttemptUpdateResponse struct { + Backup bool `json:"backup"` + + Complete bool `json:"complete"` + + Keys []string `json:"keys"` + + KeysBase64 []string `json:"keys_base64"` + + N int32 `json:"n"` + + Nounce string `json:"nounce"` + + PgpFingerprints []string `json:"pgp_fingerprints"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started string `json:"started"` + + T int32 `json:"t"` + + VerificationNonce string `json:"verification_nonce"` + + VerificationRequired bool `json:"verification_required"` +} + +// NewRekeyAttemptUpdateResponseWithDefaults instantiates a new RekeyAttemptUpdateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyAttemptUpdateResponseWithDefaults() *RekeyAttemptUpdateResponse { + var this RekeyAttemptUpdateResponse + + return &this +} + +func (o RekeyAttemptUpdateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["backup"] = o.Backup + toSerialize["complete"] = o.Complete + toSerialize["keys"] = o.Keys + toSerialize["keys_base64"] = o.KeysBase64 + toSerialize["n"] = o.N + toSerialize["nounce"] = o.Nounce + toSerialize["pgp_fingerprints"] = o.PgpFingerprints + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + toSerialize["t"] = o.T + toSerialize["verification_nonce"] = o.VerificationNonce + toSerialize["verification_required"] = o.VerificationRequired + + return json.Marshal(toSerialize) +} diff --git a/schema/model_rekey_read_backup_key_response.go b/schema/model_rekey_read_backup_key_response.go new file mode 100644 index 00000000..1217f9a2 --- /dev/null +++ b/schema/model_rekey_read_backup_key_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyReadBackupKeyResponse struct for RekeyReadBackupKeyResponse +type RekeyReadBackupKeyResponse struct { + Keys map[string]interface{} `json:"keys"` + + KeysBase64 map[string]interface{} `json:"keys_base64"` + + Nonce string `json:"nonce"` +} + +// NewRekeyReadBackupKeyResponseWithDefaults instantiates a new RekeyReadBackupKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyReadBackupKeyResponseWithDefaults() *RekeyReadBackupKeyResponse { + var this RekeyReadBackupKeyResponse + + return &this +} + +func (o RekeyReadBackupKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + toSerialize["keys_base64"] = o.KeysBase64 + toSerialize["nonce"] = o.Nonce + + return json.Marshal(toSerialize) +} diff --git a/schema/model_rekey_read_backup_recovery_key_response.go b/schema/model_rekey_read_backup_recovery_key_response.go new file mode 100644 index 00000000..ad786f6b --- /dev/null +++ b/schema/model_rekey_read_backup_recovery_key_response.go @@ -0,0 +1,38 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyReadBackupRecoveryKeyResponse struct for RekeyReadBackupRecoveryKeyResponse +type RekeyReadBackupRecoveryKeyResponse struct { + Keys map[string]interface{} `json:"keys"` + + KeysBase64 map[string]interface{} `json:"keys_base64"` + + Nonce string `json:"nonce"` +} + +// NewRekeyReadBackupRecoveryKeyResponseWithDefaults instantiates a new RekeyReadBackupRecoveryKeyResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyReadBackupRecoveryKeyResponseWithDefaults() *RekeyReadBackupRecoveryKeyResponse { + var this RekeyReadBackupRecoveryKeyResponse + + return &this +} + +func (o RekeyReadBackupRecoveryKeyResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + toSerialize["keys_base64"] = o.KeysBase64 + toSerialize["nonce"] = o.Nonce + + return json.Marshal(toSerialize) +} diff --git a/schema/model_rekey_verification_cancel_response.go b/schema/model_rekey_verification_cancel_response.go new file mode 100644 index 00000000..fe7aa2d6 --- /dev/null +++ b/schema/model_rekey_verification_cancel_response.go @@ -0,0 +1,44 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyVerificationCancelResponse struct for RekeyVerificationCancelResponse +type RekeyVerificationCancelResponse struct { + N int32 `json:"n"` + + Nounce string `json:"nounce"` + + Progress int32 `json:"progress"` + + Started string `json:"started"` + + T int32 `json:"t"` +} + +// NewRekeyVerificationCancelResponseWithDefaults instantiates a new RekeyVerificationCancelResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyVerificationCancelResponseWithDefaults() *RekeyVerificationCancelResponse { + var this RekeyVerificationCancelResponse + + return &this +} + +func (o RekeyVerificationCancelResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["n"] = o.N + toSerialize["nounce"] = o.Nounce + toSerialize["progress"] = o.Progress + toSerialize["started"] = o.Started + toSerialize["t"] = o.T + + return json.Marshal(toSerialize) +} diff --git a/schema/model_rekey_verification_read_progress_response.go b/schema/model_rekey_verification_read_progress_response.go new file mode 100644 index 00000000..0e996a4b --- /dev/null +++ b/schema/model_rekey_verification_read_progress_response.go @@ -0,0 +1,44 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyVerificationReadProgressResponse struct for RekeyVerificationReadProgressResponse +type RekeyVerificationReadProgressResponse struct { + N int32 `json:"n"` + + Nounce string `json:"nounce"` + + Progress int32 `json:"progress"` + + Started string `json:"started"` + + T int32 `json:"t"` +} + +// NewRekeyVerificationReadProgressResponseWithDefaults instantiates a new RekeyVerificationReadProgressResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyVerificationReadProgressResponseWithDefaults() *RekeyVerificationReadProgressResponse { + var this RekeyVerificationReadProgressResponse + + return &this +} + +func (o RekeyVerificationReadProgressResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["n"] = o.N + toSerialize["nounce"] = o.Nounce + toSerialize["progress"] = o.Progress + toSerialize["started"] = o.Started + toSerialize["t"] = o.T + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_rekey_verify_request.go b/schema/model_rekey_verification_update_request.go similarity index 62% rename from schema/model_write_rekey_verify_request.go rename to schema/model_rekey_verification_update_request.go index af2f6fe3..2f2a7296 100644 --- a/schema/model_write_rekey_verify_request.go +++ b/schema/model_rekey_verification_update_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteRekeyVerifyRequest struct for WriteRekeyVerifyRequest -type WriteRekeyVerifyRequest struct { +// RekeyVerificationUpdateRequest struct for RekeyVerificationUpdateRequest +type RekeyVerificationUpdateRequest struct { // Specifies a single unseal share key from the new set of shares. Key string `json:"key"` @@ -18,16 +18,16 @@ type WriteRekeyVerifyRequest struct { Nonce string `json:"nonce"` } -// NewWriteRekeyVerifyRequestWithDefaults instantiates a new WriteRekeyVerifyRequest object +// NewRekeyVerificationUpdateRequestWithDefaults instantiates a new RekeyVerificationUpdateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteRekeyVerifyRequestWithDefaults() *WriteRekeyVerifyRequest { - var this WriteRekeyVerifyRequest +func NewRekeyVerificationUpdateRequestWithDefaults() *RekeyVerificationUpdateRequest { + var this RekeyVerificationUpdateRequest return &this } -func (o WriteRekeyVerifyRequest) MarshalJSON() ([]byte, error) { +func (o RekeyVerificationUpdateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key"] = o.Key diff --git a/schema/model_rekey_verification_update_response.go b/schema/model_rekey_verification_update_response.go new file mode 100644 index 00000000..7f035710 --- /dev/null +++ b/schema/model_rekey_verification_update_response.go @@ -0,0 +1,35 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RekeyVerificationUpdateResponse struct for RekeyVerificationUpdateResponse +type RekeyVerificationUpdateResponse struct { + Complete bool `json:"complete"` + + Nounce string `json:"nounce"` +} + +// NewRekeyVerificationUpdateResponseWithDefaults instantiates a new RekeyVerificationUpdateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRekeyVerificationUpdateResponseWithDefaults() *RekeyVerificationUpdateResponse { + var this RekeyVerificationUpdateResponse + + return &this +} + +func (o RekeyVerificationUpdateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["complete"] = o.Complete + toSerialize["nounce"] = o.Nounce + + return json.Marshal(toSerialize) +} diff --git a/schema/model_remount_response.go b/schema/model_remount_response.go new file mode 100644 index 00000000..ced8a85f --- /dev/null +++ b/schema/model_remount_response.go @@ -0,0 +1,32 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RemountResponse struct for RemountResponse +type RemountResponse struct { + MigrationId string `json:"migration_id"` +} + +// NewRemountResponseWithDefaults instantiates a new RemountResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRemountResponseWithDefaults() *RemountResponse { + var this RemountResponse + + return &this +} + +func (o RemountResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["migration_id"] = o.MigrationId + + return json.Marshal(toSerialize) +} diff --git a/schema/model_remount_status_response.go b/schema/model_remount_status_response.go new file mode 100644 index 00000000..dff0042e --- /dev/null +++ b/schema/model_remount_status_response.go @@ -0,0 +1,35 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RemountStatusResponse struct for RemountStatusResponse +type RemountStatusResponse struct { + MigrationId string `json:"migration_id"` + + MigrationInfo map[string]interface{} `json:"migration_info"` +} + +// NewRemountStatusResponseWithDefaults instantiates a new RemountStatusResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRemountStatusResponseWithDefaults() *RemountStatusResponse { + var this RemountStatusResponse + + return &this +} + +func (o RemountStatusResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["migration_id"] = o.MigrationId + toSerialize["migration_info"] = o.MigrationInfo + + return json.Marshal(toSerialize) +} diff --git a/schema/model_wrapping_unwrap_request.go b/schema/model_rewrap_request.go similarity index 60% rename from schema/model_wrapping_unwrap_request.go rename to schema/model_rewrap_request.go index b0a93bb7..0feafa88 100644 --- a/schema/model_wrapping_unwrap_request.go +++ b/schema/model_rewrap_request.go @@ -9,21 +9,21 @@ import ( "encoding/json" ) -// WrappingUnwrapRequest struct for WrappingUnwrapRequest -type WrappingUnwrapRequest struct { +// RewrapRequest struct for RewrapRequest +type RewrapRequest struct { Token string `json:"token"` } -// NewWrappingUnwrapRequestWithDefaults instantiates a new WrappingUnwrapRequest object +// NewRewrapRequestWithDefaults instantiates a new RewrapRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWrappingUnwrapRequestWithDefaults() *WrappingUnwrapRequest { - var this WrappingUnwrapRequest +func NewRewrapRequestWithDefaults() *RewrapRequest { + var this RewrapRequest return &this } -func (o WrappingUnwrapRequest) MarshalJSON() ([]byte, error) { +func (o RewrapRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token"] = o.Token diff --git a/schema/model_write_generate_root_request.go b/schema/model_root_token_generation_initialize2_request.go similarity index 54% rename from schema/model_write_generate_root_request.go rename to schema/model_root_token_generation_initialize2_request.go index b62f7f65..de83d904 100644 --- a/schema/model_write_generate_root_request.go +++ b/schema/model_root_token_generation_initialize2_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WriteGenerateRootRequest struct for WriteGenerateRootRequest -type WriteGenerateRootRequest struct { +// RootTokenGenerationInitialize2Request struct for RootTokenGenerationInitialize2Request +type RootTokenGenerationInitialize2Request struct { // Specifies a base64-encoded PGP public key. PgpKey string `json:"pgp_key"` } -// NewWriteGenerateRootRequestWithDefaults instantiates a new WriteGenerateRootRequest object +// NewRootTokenGenerationInitialize2RequestWithDefaults instantiates a new RootTokenGenerationInitialize2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteGenerateRootRequestWithDefaults() *WriteGenerateRootRequest { - var this WriteGenerateRootRequest +func NewRootTokenGenerationInitialize2RequestWithDefaults() *RootTokenGenerationInitialize2Request { + var this RootTokenGenerationInitialize2Request return &this } -func (o WriteGenerateRootRequest) MarshalJSON() ([]byte, error) { +func (o RootTokenGenerationInitialize2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["pgp_key"] = o.PgpKey diff --git a/schema/model_root_token_generation_initialize2_response.go b/schema/model_root_token_generation_initialize2_response.go new file mode 100644 index 00000000..4e8408f9 --- /dev/null +++ b/schema/model_root_token_generation_initialize2_response.go @@ -0,0 +1,59 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RootTokenGenerationInitialize2Response struct for RootTokenGenerationInitialize2Response +type RootTokenGenerationInitialize2Response struct { + Complete bool `json:"complete"` + + EncodedRootToken string `json:"encoded_root_token"` + + EncodedToken string `json:"encoded_token"` + + Nonce string `json:"nonce"` + + Otp string `json:"otp"` + + OtpLength int32 `json:"otp_length"` + + PgpFingerprint string `json:"pgp_fingerprint"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started bool `json:"started"` +} + +// NewRootTokenGenerationInitialize2ResponseWithDefaults instantiates a new RootTokenGenerationInitialize2Response object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRootTokenGenerationInitialize2ResponseWithDefaults() *RootTokenGenerationInitialize2Response { + var this RootTokenGenerationInitialize2Response + + return &this +} + +func (o RootTokenGenerationInitialize2Response) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["complete"] = o.Complete + toSerialize["encoded_root_token"] = o.EncodedRootToken + toSerialize["encoded_token"] = o.EncodedToken + toSerialize["nonce"] = o.Nonce + toSerialize["otp"] = o.Otp + toSerialize["otp_length"] = o.OtpLength + toSerialize["pgp_fingerprint"] = o.PgpFingerprint + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_generate_root_attempt_request.go b/schema/model_root_token_generation_initialize_request.go similarity index 54% rename from schema/model_write_generate_root_attempt_request.go rename to schema/model_root_token_generation_initialize_request.go index f43f816b..3a3ceb78 100644 --- a/schema/model_write_generate_root_attempt_request.go +++ b/schema/model_root_token_generation_initialize_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// WriteGenerateRootAttemptRequest struct for WriteGenerateRootAttemptRequest -type WriteGenerateRootAttemptRequest struct { +// RootTokenGenerationInitializeRequest struct for RootTokenGenerationInitializeRequest +type RootTokenGenerationInitializeRequest struct { // Specifies a base64-encoded PGP public key. PgpKey string `json:"pgp_key"` } -// NewWriteGenerateRootAttemptRequestWithDefaults instantiates a new WriteGenerateRootAttemptRequest object +// NewRootTokenGenerationInitializeRequestWithDefaults instantiates a new RootTokenGenerationInitializeRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteGenerateRootAttemptRequestWithDefaults() *WriteGenerateRootAttemptRequest { - var this WriteGenerateRootAttemptRequest +func NewRootTokenGenerationInitializeRequestWithDefaults() *RootTokenGenerationInitializeRequest { + var this RootTokenGenerationInitializeRequest return &this } -func (o WriteGenerateRootAttemptRequest) MarshalJSON() ([]byte, error) { +func (o RootTokenGenerationInitializeRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["pgp_key"] = o.PgpKey diff --git a/schema/model_root_token_generation_initialize_response.go b/schema/model_root_token_generation_initialize_response.go new file mode 100644 index 00000000..21619970 --- /dev/null +++ b/schema/model_root_token_generation_initialize_response.go @@ -0,0 +1,59 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RootTokenGenerationInitializeResponse struct for RootTokenGenerationInitializeResponse +type RootTokenGenerationInitializeResponse struct { + Complete bool `json:"complete"` + + EncodedRootToken string `json:"encoded_root_token"` + + EncodedToken string `json:"encoded_token"` + + Nonce string `json:"nonce"` + + Otp string `json:"otp"` + + OtpLength int32 `json:"otp_length"` + + PgpFingerprint string `json:"pgp_fingerprint"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started bool `json:"started"` +} + +// NewRootTokenGenerationInitializeResponseWithDefaults instantiates a new RootTokenGenerationInitializeResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRootTokenGenerationInitializeResponseWithDefaults() *RootTokenGenerationInitializeResponse { + var this RootTokenGenerationInitializeResponse + + return &this +} + +func (o RootTokenGenerationInitializeResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["complete"] = o.Complete + toSerialize["encoded_root_token"] = o.EncodedRootToken + toSerialize["encoded_token"] = o.EncodedToken + toSerialize["nonce"] = o.Nonce + toSerialize["otp"] = o.Otp + toSerialize["otp_length"] = o.OtpLength + toSerialize["pgp_fingerprint"] = o.PgpFingerprint + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + + return json.Marshal(toSerialize) +} diff --git a/schema/model_root_token_generation_read_progress2_response.go b/schema/model_root_token_generation_read_progress2_response.go new file mode 100644 index 00000000..f86427e0 --- /dev/null +++ b/schema/model_root_token_generation_read_progress2_response.go @@ -0,0 +1,59 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RootTokenGenerationReadProgress2Response struct for RootTokenGenerationReadProgress2Response +type RootTokenGenerationReadProgress2Response struct { + Complete bool `json:"complete"` + + EncodedRootToken string `json:"encoded_root_token"` + + EncodedToken string `json:"encoded_token"` + + Nonce string `json:"nonce"` + + Otp string `json:"otp"` + + OtpLength int32 `json:"otp_length"` + + PgpFingerprint string `json:"pgp_fingerprint"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started bool `json:"started"` +} + +// NewRootTokenGenerationReadProgress2ResponseWithDefaults instantiates a new RootTokenGenerationReadProgress2Response object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRootTokenGenerationReadProgress2ResponseWithDefaults() *RootTokenGenerationReadProgress2Response { + var this RootTokenGenerationReadProgress2Response + + return &this +} + +func (o RootTokenGenerationReadProgress2Response) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["complete"] = o.Complete + toSerialize["encoded_root_token"] = o.EncodedRootToken + toSerialize["encoded_token"] = o.EncodedToken + toSerialize["nonce"] = o.Nonce + toSerialize["otp"] = o.Otp + toSerialize["otp_length"] = o.OtpLength + toSerialize["pgp_fingerprint"] = o.PgpFingerprint + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + + return json.Marshal(toSerialize) +} diff --git a/schema/model_root_token_generation_read_progress_response.go b/schema/model_root_token_generation_read_progress_response.go new file mode 100644 index 00000000..ae992049 --- /dev/null +++ b/schema/model_root_token_generation_read_progress_response.go @@ -0,0 +1,59 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RootTokenGenerationReadProgressResponse struct for RootTokenGenerationReadProgressResponse +type RootTokenGenerationReadProgressResponse struct { + Complete bool `json:"complete"` + + EncodedRootToken string `json:"encoded_root_token"` + + EncodedToken string `json:"encoded_token"` + + Nonce string `json:"nonce"` + + Otp string `json:"otp"` + + OtpLength int32 `json:"otp_length"` + + PgpFingerprint string `json:"pgp_fingerprint"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started bool `json:"started"` +} + +// NewRootTokenGenerationReadProgressResponseWithDefaults instantiates a new RootTokenGenerationReadProgressResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRootTokenGenerationReadProgressResponseWithDefaults() *RootTokenGenerationReadProgressResponse { + var this RootTokenGenerationReadProgressResponse + + return &this +} + +func (o RootTokenGenerationReadProgressResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["complete"] = o.Complete + toSerialize["encoded_root_token"] = o.EncodedRootToken + toSerialize["encoded_token"] = o.EncodedToken + toSerialize["nonce"] = o.Nonce + toSerialize["otp"] = o.Otp + toSerialize["otp_length"] = o.OtpLength + toSerialize["pgp_fingerprint"] = o.PgpFingerprint + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + + return json.Marshal(toSerialize) +} diff --git a/schema/model_write_generate_root_update_request.go b/schema/model_root_token_generation_update_request.go similarity index 59% rename from schema/model_write_generate_root_update_request.go rename to schema/model_root_token_generation_update_request.go index 1767903b..c4471aae 100644 --- a/schema/model_write_generate_root_update_request.go +++ b/schema/model_root_token_generation_update_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteGenerateRootUpdateRequest struct for WriteGenerateRootUpdateRequest -type WriteGenerateRootUpdateRequest struct { +// RootTokenGenerationUpdateRequest struct for RootTokenGenerationUpdateRequest +type RootTokenGenerationUpdateRequest struct { // Specifies a single unseal key share. Key string `json:"key"` @@ -18,16 +18,16 @@ type WriteGenerateRootUpdateRequest struct { Nonce string `json:"nonce"` } -// NewWriteGenerateRootUpdateRequestWithDefaults instantiates a new WriteGenerateRootUpdateRequest object +// NewRootTokenGenerationUpdateRequestWithDefaults instantiates a new RootTokenGenerationUpdateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteGenerateRootUpdateRequestWithDefaults() *WriteGenerateRootUpdateRequest { - var this WriteGenerateRootUpdateRequest +func NewRootTokenGenerationUpdateRequestWithDefaults() *RootTokenGenerationUpdateRequest { + var this RootTokenGenerationUpdateRequest return &this } -func (o WriteGenerateRootUpdateRequest) MarshalJSON() ([]byte, error) { +func (o RootTokenGenerationUpdateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["key"] = o.Key diff --git a/schema/model_root_token_generation_update_response.go b/schema/model_root_token_generation_update_response.go new file mode 100644 index 00000000..c263c635 --- /dev/null +++ b/schema/model_root_token_generation_update_response.go @@ -0,0 +1,59 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// RootTokenGenerationUpdateResponse struct for RootTokenGenerationUpdateResponse +type RootTokenGenerationUpdateResponse struct { + Complete bool `json:"complete"` + + EncodedRootToken string `json:"encoded_root_token"` + + EncodedToken string `json:"encoded_token"` + + Nonce string `json:"nonce"` + + Otp string `json:"otp"` + + OtpLength int32 `json:"otp_length"` + + PgpFingerprint string `json:"pgp_fingerprint"` + + Progress int32 `json:"progress"` + + Required int32 `json:"required"` + + Started bool `json:"started"` +} + +// NewRootTokenGenerationUpdateResponseWithDefaults instantiates a new RootTokenGenerationUpdateResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewRootTokenGenerationUpdateResponseWithDefaults() *RootTokenGenerationUpdateResponse { + var this RootTokenGenerationUpdateResponse + + return &this +} + +func (o RootTokenGenerationUpdateResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["complete"] = o.Complete + toSerialize["encoded_root_token"] = o.EncodedRootToken + toSerialize["encoded_token"] = o.EncodedToken + toSerialize["nonce"] = o.Nonce + toSerialize["otp"] = o.Otp + toSerialize["otp_length"] = o.OtpLength + toSerialize["pgp_fingerprint"] = o.PgpFingerprint + toSerialize["progress"] = o.Progress + toSerialize["required"] = o.Required + toSerialize["started"] = o.Started + + return json.Marshal(toSerialize) +} diff --git a/schema/model_seal_status_response.go b/schema/model_seal_status_response.go new file mode 100644 index 00000000..b4c1ffa3 --- /dev/null +++ b/schema/model_seal_status_response.go @@ -0,0 +1,77 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// SealStatusResponse struct for SealStatusResponse +type SealStatusResponse struct { + BuildDate string `json:"build_date"` + + ClusterId string `json:"cluster_id"` + + ClusterName string `json:"cluster_name"` + + HcpLinkResourceID string `json:"hcp_link_resource_ID"` + + HcpLinkStatus string `json:"hcp_link_status"` + + Initialized bool `json:"initialized"` + + Migration bool `json:"migration"` + + N int32 `json:"n"` + + Nonce string `json:"nonce"` + + Progress int32 `json:"progress"` + + RecoverySeal bool `json:"recovery_seal"` + + Sealed bool `json:"sealed"` + + StorageType string `json:"storage_type"` + + T int32 `json:"t"` + + Type string `json:"type"` + + Version string `json:"version"` +} + +// NewSealStatusResponseWithDefaults instantiates a new SealStatusResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewSealStatusResponseWithDefaults() *SealStatusResponse { + var this SealStatusResponse + + return &this +} + +func (o SealStatusResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["build_date"] = o.BuildDate + toSerialize["cluster_id"] = o.ClusterId + toSerialize["cluster_name"] = o.ClusterName + toSerialize["hcp_link_resource_ID"] = o.HcpLinkResourceID + toSerialize["hcp_link_status"] = o.HcpLinkStatus + toSerialize["initialized"] = o.Initialized + toSerialize["migration"] = o.Migration + toSerialize["n"] = o.N + toSerialize["nonce"] = o.Nonce + toSerialize["progress"] = o.Progress + toSerialize["recovery_seal"] = o.RecoverySeal + toSerialize["sealed"] = o.Sealed + toSerialize["storage_type"] = o.StorageType + toSerialize["t"] = o.T + toSerialize["type"] = o.Type + toSerialize["version"] = o.Version + + return json.Marshal(toSerialize) +} diff --git a/schema/model_ssh_write_ca_config_request.go b/schema/model_ssh_configure_ca_request.go similarity index 81% rename from schema/model_ssh_write_ca_config_request.go rename to schema/model_ssh_configure_ca_request.go index fa67de9e..64278fee 100644 --- a/schema/model_ssh_write_ca_config_request.go +++ b/schema/model_ssh_configure_ca_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// SSHWriteCAConfigRequest struct for SSHWriteCAConfigRequest -type SSHWriteCAConfigRequest struct { +// SshConfigureCaRequest struct for SshConfigureCaRequest +type SshConfigureCaRequest struct { // Generate SSH key pair internally rather than use the private_key and public_key fields. GenerateSigningKey bool `json:"generate_signing_key"` @@ -27,11 +27,11 @@ type SSHWriteCAConfigRequest struct { PublicKey string `json:"public_key"` } -// NewSSHWriteCAConfigRequestWithDefaults instantiates a new SSHWriteCAConfigRequest object +// NewSshConfigureCaRequestWithDefaults instantiates a new SshConfigureCaRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHWriteCAConfigRequestWithDefaults() *SSHWriteCAConfigRequest { - var this SSHWriteCAConfigRequest +func NewSshConfigureCaRequestWithDefaults() *SshConfigureCaRequest { + var this SshConfigureCaRequest this.GenerateSigningKey = true this.KeyBits = 0 @@ -40,7 +40,7 @@ func NewSSHWriteCAConfigRequestWithDefaults() *SSHWriteCAConfigRequest { return &this } -func (o SSHWriteCAConfigRequest) MarshalJSON() ([]byte, error) { +func (o SshConfigureCaRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["generate_signing_key"] = o.GenerateSigningKey diff --git a/schema/model_ssh_write_zero_address_config_request.go b/schema/model_ssh_configure_zero_address_request.go similarity index 61% rename from schema/model_ssh_write_zero_address_config_request.go rename to schema/model_ssh_configure_zero_address_request.go index f6785f58..404ca592 100644 --- a/schema/model_ssh_write_zero_address_config_request.go +++ b/schema/model_ssh_configure_zero_address_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// SSHWriteZeroAddressConfigRequest struct for SSHWriteZeroAddressConfigRequest -type SSHWriteZeroAddressConfigRequest struct { +// SshConfigureZeroAddressRequest struct for SshConfigureZeroAddressRequest +type SshConfigureZeroAddressRequest struct { // [Required] Comma separated list of role names which allows credentials to be requested for any IP address. CIDR blocks previously registered under these roles will be ignored. Roles []string `json:"roles"` } -// NewSSHWriteZeroAddressConfigRequestWithDefaults instantiates a new SSHWriteZeroAddressConfigRequest object +// NewSshConfigureZeroAddressRequestWithDefaults instantiates a new SshConfigureZeroAddressRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHWriteZeroAddressConfigRequestWithDefaults() *SSHWriteZeroAddressConfigRequest { - var this SSHWriteZeroAddressConfigRequest +func NewSshConfigureZeroAddressRequestWithDefaults() *SshConfigureZeroAddressRequest { + var this SshConfigureZeroAddressRequest return &this } -func (o SSHWriteZeroAddressConfigRequest) MarshalJSON() ([]byte, error) { +func (o SshConfigureZeroAddressRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["roles"] = o.Roles diff --git a/schema/model_ssh_write_credentials_request.go b/schema/model_ssh_generate_credentials_request.go similarity index 61% rename from schema/model_ssh_write_credentials_request.go rename to schema/model_ssh_generate_credentials_request.go index 7d420b99..f68491d3 100644 --- a/schema/model_ssh_write_credentials_request.go +++ b/schema/model_ssh_generate_credentials_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// SSHWriteCredentialsRequest struct for SSHWriteCredentialsRequest -type SSHWriteCredentialsRequest struct { +// SshGenerateCredentialsRequest struct for SshGenerateCredentialsRequest +type SshGenerateCredentialsRequest struct { // [Required] IP of the remote host Ip string `json:"ip"` @@ -18,16 +18,16 @@ type SSHWriteCredentialsRequest struct { Username string `json:"username"` } -// NewSSHWriteCredentialsRequestWithDefaults instantiates a new SSHWriteCredentialsRequest object +// NewSshGenerateCredentialsRequestWithDefaults instantiates a new SshGenerateCredentialsRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHWriteCredentialsRequestWithDefaults() *SSHWriteCredentialsRequest { - var this SSHWriteCredentialsRequest +func NewSshGenerateCredentialsRequestWithDefaults() *SshGenerateCredentialsRequest { + var this SshGenerateCredentialsRequest return &this } -func (o SSHWriteCredentialsRequest) MarshalJSON() ([]byte, error) { +func (o SshGenerateCredentialsRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["ip"] = o.Ip diff --git a/schema/model_ssh_write_issue_request.go b/schema/model_ssh_issue_certificate_request.go similarity index 83% rename from schema/model_ssh_write_issue_request.go rename to schema/model_ssh_issue_certificate_request.go index ebf7d6f3..e7869865 100644 --- a/schema/model_ssh_write_issue_request.go +++ b/schema/model_ssh_issue_certificate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// SSHWriteIssueRequest struct for SSHWriteIssueRequest -type SSHWriteIssueRequest struct { +// SshIssueCertificateRequest struct for SshIssueCertificateRequest +type SshIssueCertificateRequest struct { // Type of certificate to be created; either \"user\" or \"host\". CertType string `json:"cert_type"` @@ -36,11 +36,11 @@ type SSHWriteIssueRequest struct { ValidPrincipals string `json:"valid_principals"` } -// NewSSHWriteIssueRequestWithDefaults instantiates a new SSHWriteIssueRequest object +// NewSshIssueCertificateRequestWithDefaults instantiates a new SshIssueCertificateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHWriteIssueRequestWithDefaults() *SSHWriteIssueRequest { - var this SSHWriteIssueRequest +func NewSshIssueCertificateRequestWithDefaults() *SshIssueCertificateRequest { + var this SshIssueCertificateRequest this.CertType = "user" this.KeyBits = 0 @@ -49,7 +49,7 @@ func NewSSHWriteIssueRequestWithDefaults() *SSHWriteIssueRequest { return &this } -func (o SSHWriteIssueRequest) MarshalJSON() ([]byte, error) { +func (o SshIssueCertificateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cert_type"] = o.CertType diff --git a/schema/model_ssh_lookup_request.go b/schema/model_ssh_list_roles_by_ip_request.go similarity index 60% rename from schema/model_ssh_lookup_request.go rename to schema/model_ssh_list_roles_by_ip_request.go index 4189abee..39b7c36b 100644 --- a/schema/model_ssh_lookup_request.go +++ b/schema/model_ssh_list_roles_by_ip_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// SSHLookupRequest struct for SSHLookupRequest -type SSHLookupRequest struct { +// SshListRolesByIpRequest struct for SshListRolesByIpRequest +type SshListRolesByIpRequest struct { // [Required] IP address of remote host Ip string `json:"ip"` } -// NewSSHLookupRequestWithDefaults instantiates a new SSHLookupRequest object +// NewSshListRolesByIpRequestWithDefaults instantiates a new SshListRolesByIpRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHLookupRequestWithDefaults() *SSHLookupRequest { - var this SSHLookupRequest +func NewSshListRolesByIpRequestWithDefaults() *SshListRolesByIpRequest { + var this SshListRolesByIpRequest return &this } -func (o SSHLookupRequest) MarshalJSON() ([]byte, error) { +func (o SshListRolesByIpRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["ip"] = o.Ip diff --git a/schema/model_ssh_sign_request.go b/schema/model_ssh_sign_certificate_request.go similarity index 82% rename from schema/model_ssh_sign_request.go rename to schema/model_ssh_sign_certificate_request.go index 28fbbaef..943e9bcb 100644 --- a/schema/model_ssh_sign_request.go +++ b/schema/model_ssh_sign_certificate_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// SSHSignRequest struct for SSHSignRequest -type SSHSignRequest struct { +// SshSignCertificateRequest struct for SshSignCertificateRequest +type SshSignCertificateRequest struct { // Type of certificate to be created; either \"user\" or \"host\". CertType string `json:"cert_type"` @@ -33,18 +33,18 @@ type SSHSignRequest struct { ValidPrincipals string `json:"valid_principals"` } -// NewSSHSignRequestWithDefaults instantiates a new SSHSignRequest object +// NewSshSignCertificateRequestWithDefaults instantiates a new SshSignCertificateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHSignRequestWithDefaults() *SSHSignRequest { - var this SSHSignRequest +func NewSshSignCertificateRequestWithDefaults() *SshSignCertificateRequest { + var this SshSignCertificateRequest this.CertType = "user" return &this } -func (o SSHSignRequest) MarshalJSON() ([]byte, error) { +func (o SshSignCertificateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["cert_type"] = o.CertType diff --git a/schema/model_ssh_verify_request.go b/schema/model_ssh_verify_otp_request.go similarity index 63% rename from schema/model_ssh_verify_request.go rename to schema/model_ssh_verify_otp_request.go index e631b4b2..a293b10e 100644 --- a/schema/model_ssh_verify_request.go +++ b/schema/model_ssh_verify_otp_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// SSHVerifyRequest struct for SSHVerifyRequest -type SSHVerifyRequest struct { +// SshVerifyOtpRequest struct for SshVerifyOtpRequest +type SshVerifyOtpRequest struct { // [Required] One-Time-Key that needs to be validated Otp string `json:"otp"` } -// NewSSHVerifyRequestWithDefaults instantiates a new SSHVerifyRequest object +// NewSshVerifyOtpRequestWithDefaults instantiates a new SshVerifyOtpRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHVerifyRequestWithDefaults() *SSHVerifyRequest { - var this SSHVerifyRequest +func NewSshVerifyOtpRequestWithDefaults() *SshVerifyOtpRequest { + var this SshVerifyOtpRequest return &this } -func (o SSHVerifyRequest) MarshalJSON() ([]byte, error) { +func (o SshVerifyOtpRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["otp"] = o.Otp diff --git a/schema/model_ssh_write_role_request.go b/schema/model_ssh_write_role_request.go index c9cc4fdb..ead244c8 100644 --- a/schema/model_ssh_write_role_request.go +++ b/schema/model_ssh_write_role_request.go @@ -9,107 +9,92 @@ import ( "encoding/json" ) -// SSHWriteRoleRequest struct for SSHWriteRoleRequest -type SSHWriteRoleRequest struct { - // [Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Admin user at remote host. The shared key being registered should be for this user and should have root privileges. Everytime a dynamic credential is being generated for other users, Vault uses this admin username to login to remote host and install the generated credential for the other user. - AdminUser string `json:"admin_user"` - - // When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string. +// SshWriteRoleRequest struct for SshWriteRoleRequest +type SshWriteRoleRequest struct { + // [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string. AlgorithmSigner string `json:"algorithm_signer"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use the base domains listed in \"allowed_domains\", e.g. \"example.com\". This is a separate option as in some cases this can be considered a security threat. + // [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use the base domains listed in \"allowed_domains\", e.g. \"example.com\". This is a separate option as in some cases this can be considered a security threat. AllowBareDomains bool `json:"allow_bare_domains"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'host'. + // [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'host'. AllowHostCertificates bool `json:"allow_host_certificates"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use subdomains of those listed in \"allowed_domains\". + // [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use subdomains of those listed in \"allowed_domains\". AllowSubdomains bool `json:"allow_subdomains"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'user'. + // [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'user'. AllowUserCertificates bool `json:"allow_user_certificates"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If true, users can override the key ID for a signed certificate with the \"key_id\" field. When false, the key ID will always be the token display name. The key ID is logged by the SSH server and can be useful for auditing. + // [Not applicable for OTP type] [Optional for CA type] If true, users can override the key ID for a signed certificate with the \"key_id\" field. When false, the key ID will always be the token display name. The key ID is logged by the SSH server and can be useful for auditing. AllowUserKeyIds bool `json:"allow_user_key_ids"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of critical options that certificates can have when signed. To allow any critical options, set this to an empty string. + // [Not applicable for OTP type] [Optional for CA type] A comma-separated list of critical options that certificates can have when signed. To allow any critical options, set this to an empty string. AllowedCriticalOptions string `json:"allowed_critical_options"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If this option is not specified, client can request for a signed certificate for any valid host. If only certain domains are allowed, then this list enforces it. + // [Not applicable for OTP type] [Optional for CA type] If this option is not specified, client can request for a signed certificate for any valid host. If only certain domains are allowed, then this list enforces it. AllowedDomains string `json:"allowed_domains"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. + // [Not applicable for OTP type] [Optional for CA type] If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. AllowedDomainsTemplate bool `json:"allowed_domains_template"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of extensions that certificates can have when signed. An empty list means that no extension overrides are allowed by an end-user; explicitly specify '*' to allow any extensions to be set. + // [Not applicable for OTP type] [Optional for CA type] A comma-separated list of extensions that certificates can have when signed. An empty list means that no extension overrides are allowed by an end-user; explicitly specify '*' to allow any extensions to be set. AllowedExtensions string `json:"allowed_extensions"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, allows the enforcement of key types and minimum key sizes to be signed. + // [Not applicable for OTP type] [Optional for CA type] If set, allows the enforcement of key types and minimum key sizes to be signed. AllowedUserKeyLengths map[string]interface{} `json:"allowed_user_key_lengths"` // [Optional for all types] [Works differently for CA type] If this option is not specified, or is '*', client can request a credential for any valid user at the remote host, including the admin user. If only certain usernames are to be allowed, then this list enforces it. If this field is set, then credentials can only be created for default_user and usernames present in this list. Setting this option will enable all the users with access to this role to fetch credentials for all other usernames in this list. Use with caution. N.B.: with the CA type, an empty list means that no users are allowed; explicitly specify '*' to allow any user. AllowedUsers string `json:"allowed_users"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed users can be specified using identity template policies. Non-templated users are also permitted. + // [Not applicable for OTP type] [Optional for CA type] If set, Allowed users can be specified using identity template policies. Non-templated users are also permitted. AllowedUsersTemplate bool `json:"allowed_users_template"` - // [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks for which the role is applicable for. CIDR blocks can belong to more than one role. + // [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks for which the role is applicable for. CIDR blocks can belong to more than one role. CidrList string `json:"cidr_list"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Critical options certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_critical_options\". Defaults to none. + // [Not applicable for OTP type] [Optional for CA type] Critical options certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_critical_options\". Defaults to none. DefaultCriticalOptions map[string]interface{} `json:"default_critical_options"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Extensions certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_extensions\". Defaults to none. + // [Not applicable for OTP type] [Optional for CA type] Extensions certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_extensions\". Defaults to none. DefaultExtensions map[string]interface{} `json:"default_extensions"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default extension values can be specified using identity template policies. Non-templated extension values are also permitted. + // [Not applicable for OTP type] [Optional for CA type] If set, Default extension values can be specified using identity template policies. Non-templated extension values are also permitted. DefaultExtensionsTemplate bool `json:"default_extensions_template"` - // [Required for Dynamic type] [Required for OTP type] [Optional for CA type] Default username for which a credential will be generated. When the endpoint 'creds/' is used without a username, this value will be used as default username. + // [Required for OTP type] [Optional for CA type] Default username for which a credential will be generated. When the endpoint 'creds/' is used without a username, this value will be used as default username. DefaultUser string `json:"default_user"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default user can be specified using identity template policies. Non-templated users are also permitted. + // [Not applicable for OTP type] [Optional for CA type] If set, Default user can be specified using identity template policies. Non-templated users are also permitted. DefaultUserTemplate bool `json:"default_user_template"` - // [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks. IP addresses belonging to these blocks are not accepted by the role. This is particularly useful when big CIDR blocks are being used by the role and certain parts of it needs to be kept out. + // [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks. IP addresses belonging to these blocks are not accepted by the role. This is particularly useful when big CIDR blocks are being used by the role and certain parts of it needs to be kept out. ExcludeCidrList string `json:"exclude_cidr_list"` - // [Optional for Dynamic type] [Not-applicable for OTP type] [Not applicable for CA type] Script used to install and uninstall public keys in the target machine. The inbuilt default install script will be for Linux hosts. For sample script, refer the project documentation website. - InstallScript string `json:"install_script"` - - // [Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Name of the registered key in Vault. Before creating the role, use the 'keys/' endpoint to create a named key. - Key string `json:"key"` - - // [Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Length of the RSA dynamic key in bits. It is 1024 by default or it can be 2048. - KeyBits int32 `json:"key_bits"` - - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a custom format for the key id of a signed certificate. The following variables are available for use: '{{token_display_name}}' - The display name of the token used to make the request. '{{role_name}}' - The name of the role signing the request. '{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed. + // [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a custom format for the key id of a signed certificate. The following variables are available for use: '{{token_display_name}}' - The display name of the token used to make the request. '{{role_name}}' - The name of the role signing the request. '{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed. KeyIdFormat string `json:"key_id_format"` - // [Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Comma separated option specifications which will be prefixed to RSA key in authorized_keys file. Options should be valid and comply with authorized_keys file format and should not contain spaces. - KeyOptionSpecs string `json:"key_option_specs"` - - // [Required for all types] Type of key used to login to hosts. It can be either 'otp', 'dynamic' or 'ca'. 'otp' type requires agent to be installed in remote hosts. + // [Required for all types] Type of key used to login to hosts. It can be either 'otp' or 'ca'. 'otp' type requires agent to be installed in remote hosts. KeyType string `json:"key_type"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The maximum allowed lease duration + // [Not applicable for OTP type] [Optional for CA type] The maximum allowed lease duration MaxTtl int32 `json:"max_ttl"` - // The duration that the SSH certificate should be backdated by at issuance. + // [Not applicable for OTP type] [Optional for CA type] The duration that the SSH certificate should be backdated by at issuance. NotBeforeDuration int32 `json:"not_before_duration"` - // [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Port number for SSH connection. Default is '22'. Port number does not play any role in creation of OTP. For 'otp' type, this is just a way to inform client about the port number to use. Port number will be returned to client by Vault server along with OTP. + // [Optional for OTP type] [Not applicable for CA type] Port number for SSH connection. Default is '22'. Port number does not play any role in creation of OTP. For 'otp' type, this is just a way to inform client about the port number to use. Port number will be returned to client by Vault server along with OTP. Port int32 `json:"port"` - // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The lease duration if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the value of max_ttl. + // [Not applicable for OTP type] [Optional for CA type] The lease duration if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the value of max_ttl. Ttl int32 `json:"ttl"` } -// NewSSHWriteRoleRequestWithDefaults instantiates a new SSHWriteRoleRequest object +// NewSshWriteRoleRequestWithDefaults instantiates a new SshWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSSHWriteRoleRequestWithDefaults() *SSHWriteRoleRequest { - var this SSHWriteRoleRequest +func NewSshWriteRoleRequestWithDefaults() *SshWriteRoleRequest { + var this SshWriteRoleRequest this.AllowHostCertificates = false this.AllowUserCertificates = false @@ -122,10 +107,9 @@ func NewSSHWriteRoleRequestWithDefaults() *SSHWriteRoleRequest { return &this } -func (o SSHWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o SshWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) - toSerialize["admin_user"] = o.AdminUser toSerialize["algorithm_signer"] = o.AlgorithmSigner toSerialize["allow_bare_domains"] = o.AllowBareDomains toSerialize["allow_host_certificates"] = o.AllowHostCertificates @@ -146,11 +130,7 @@ func (o SSHWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize["default_user"] = o.DefaultUser toSerialize["default_user_template"] = o.DefaultUserTemplate toSerialize["exclude_cidr_list"] = o.ExcludeCidrList - toSerialize["install_script"] = o.InstallScript - toSerialize["key"] = o.Key - toSerialize["key_bits"] = o.KeyBits toSerialize["key_id_format"] = o.KeyIdFormat - toSerialize["key_option_specs"] = o.KeyOptionSpecs toSerialize["key_type"] = o.KeyType toSerialize["max_ttl"] = o.MaxTtl toSerialize["not_before_duration"] = o.NotBeforeDuration diff --git a/schema/model_terraform_write_config_request.go b/schema/model_terraform_cloud_configure_request.go similarity index 69% rename from schema/model_terraform_write_config_request.go rename to schema/model_terraform_cloud_configure_request.go index 3323b34a..33ad0e62 100644 --- a/schema/model_terraform_write_config_request.go +++ b/schema/model_terraform_cloud_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TerraformWriteConfigRequest struct for TerraformWriteConfigRequest -type TerraformWriteConfigRequest struct { +// TerraformCloudConfigureRequest struct for TerraformCloudConfigureRequest +type TerraformCloudConfigureRequest struct { // The address to access Terraform Cloud or Enterprise. Default is \"https://app.terraform.io\". Address string `json:"address"` @@ -21,11 +21,11 @@ type TerraformWriteConfigRequest struct { Token string `json:"token"` } -// NewTerraformWriteConfigRequestWithDefaults instantiates a new TerraformWriteConfigRequest object +// NewTerraformCloudConfigureRequestWithDefaults instantiates a new TerraformCloudConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTerraformWriteConfigRequestWithDefaults() *TerraformWriteConfigRequest { - var this TerraformWriteConfigRequest +func NewTerraformCloudConfigureRequestWithDefaults() *TerraformCloudConfigureRequest { + var this TerraformCloudConfigureRequest this.Address = "https://app.terraform.io" this.BasePath = "/api/v2/" @@ -33,7 +33,7 @@ func NewTerraformWriteConfigRequestWithDefaults() *TerraformWriteConfigRequest { return &this } -func (o TerraformWriteConfigRequest) MarshalJSON() ([]byte, error) { +func (o TerraformCloudConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["address"] = o.Address diff --git a/schema/model_terraform_write_role_request.go b/schema/model_terraform_cloud_write_role_request.go similarity index 74% rename from schema/model_terraform_write_role_request.go rename to schema/model_terraform_cloud_write_role_request.go index bcac8d7d..35f5dd28 100644 --- a/schema/model_terraform_write_role_request.go +++ b/schema/model_terraform_cloud_write_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TerraformWriteRoleRequest struct for TerraformWriteRoleRequest -type TerraformWriteRoleRequest struct { +// TerraformCloudWriteRoleRequest struct for TerraformCloudWriteRoleRequest +type TerraformCloudWriteRoleRequest struct { // Maximum time for role. If not set or set to 0, will use system default. MaxTtl int32 `json:"max_ttl"` @@ -27,16 +27,16 @@ type TerraformWriteRoleRequest struct { UserId string `json:"user_id"` } -// NewTerraformWriteRoleRequestWithDefaults instantiates a new TerraformWriteRoleRequest object +// NewTerraformCloudWriteRoleRequestWithDefaults instantiates a new TerraformCloudWriteRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTerraformWriteRoleRequestWithDefaults() *TerraformWriteRoleRequest { - var this TerraformWriteRoleRequest +func NewTerraformCloudWriteRoleRequestWithDefaults() *TerraformCloudWriteRoleRequest { + var this TerraformCloudWriteRoleRequest return &this } -func (o TerraformWriteRoleRequest) MarshalJSON() ([]byte, error) { +func (o TerraformCloudWriteRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["max_ttl"] = o.MaxTtl diff --git a/schema/model_token_write_create_with_role_request.go b/schema/model_token_create_against_role_request.go similarity index 81% rename from schema/model_token_write_create_with_role_request.go rename to schema/model_token_create_against_role_request.go index de4c486b..63332bd2 100644 --- a/schema/model_token_write_create_with_role_request.go +++ b/schema/model_token_create_against_role_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TokenWriteCreateWithRoleRequest struct for TokenWriteCreateWithRoleRequest -type TokenWriteCreateWithRoleRequest struct { +// TokenCreateAgainstRoleRequest struct for TokenCreateAgainstRoleRequest +type TokenCreateAgainstRoleRequest struct { // Name to associate with this token DisplayName string `json:"display_name"` @@ -51,16 +51,16 @@ type TokenWriteCreateWithRoleRequest struct { Type string `json:"type"` } -// NewTokenWriteCreateWithRoleRequestWithDefaults instantiates a new TokenWriteCreateWithRoleRequest object +// NewTokenCreateAgainstRoleRequestWithDefaults instantiates a new TokenCreateAgainstRoleRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTokenWriteCreateWithRoleRequestWithDefaults() *TokenWriteCreateWithRoleRequest { - var this TokenWriteCreateWithRoleRequest +func NewTokenCreateAgainstRoleRequestWithDefaults() *TokenCreateAgainstRoleRequest { + var this TokenCreateAgainstRoleRequest return &this } -func (o TokenWriteCreateWithRoleRequest) MarshalJSON() ([]byte, error) { +func (o TokenCreateAgainstRoleRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["display_name"] = o.DisplayName diff --git a/schema/model_token_write_create_orphan_request.go b/schema/model_token_create_orphan_request.go similarity index 83% rename from schema/model_token_write_create_orphan_request.go rename to schema/model_token_create_orphan_request.go index 8feacc0f..027f0fa0 100644 --- a/schema/model_token_write_create_orphan_request.go +++ b/schema/model_token_create_orphan_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TokenWriteCreateOrphanRequest struct for TokenWriteCreateOrphanRequest -type TokenWriteCreateOrphanRequest struct { +// TokenCreateOrphanRequest struct for TokenCreateOrphanRequest +type TokenCreateOrphanRequest struct { // Name to associate with this token DisplayName string `json:"display_name"` @@ -54,16 +54,16 @@ type TokenWriteCreateOrphanRequest struct { Type string `json:"type"` } -// NewTokenWriteCreateOrphanRequestWithDefaults instantiates a new TokenWriteCreateOrphanRequest object +// NewTokenCreateOrphanRequestWithDefaults instantiates a new TokenCreateOrphanRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTokenWriteCreateOrphanRequestWithDefaults() *TokenWriteCreateOrphanRequest { - var this TokenWriteCreateOrphanRequest +func NewTokenCreateOrphanRequestWithDefaults() *TokenCreateOrphanRequest { + var this TokenCreateOrphanRequest return &this } -func (o TokenWriteCreateOrphanRequest) MarshalJSON() ([]byte, error) { +func (o TokenCreateOrphanRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["display_name"] = o.DisplayName diff --git a/schema/model_token_write_create_request.go b/schema/model_token_create_request.go similarity index 84% rename from schema/model_token_write_create_request.go rename to schema/model_token_create_request.go index 328f7c65..8f30c0f7 100644 --- a/schema/model_token_write_create_request.go +++ b/schema/model_token_create_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TokenWriteCreateRequest struct for TokenWriteCreateRequest -type TokenWriteCreateRequest struct { +// TokenCreateRequest struct for TokenCreateRequest +type TokenCreateRequest struct { // Name to associate with this token DisplayName string `json:"display_name"` @@ -51,16 +51,16 @@ type TokenWriteCreateRequest struct { Type string `json:"type"` } -// NewTokenWriteCreateRequestWithDefaults instantiates a new TokenWriteCreateRequest object +// NewTokenCreateRequestWithDefaults instantiates a new TokenCreateRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTokenWriteCreateRequestWithDefaults() *TokenWriteCreateRequest { - var this TokenWriteCreateRequest +func NewTokenCreateRequestWithDefaults() *TokenCreateRequest { + var this TokenCreateRequest return &this } -func (o TokenWriteCreateRequest) MarshalJSON() ([]byte, error) { +func (o TokenCreateRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["display_name"] = o.DisplayName diff --git a/schema/model_token_write_lookup_accessor_request.go b/schema/model_token_look_up_accessor_request.go similarity index 57% rename from schema/model_token_write_lookup_accessor_request.go rename to schema/model_token_look_up_accessor_request.go index 1fa283a8..bcfaca91 100644 --- a/schema/model_token_write_lookup_accessor_request.go +++ b/schema/model_token_look_up_accessor_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// TokenWriteLookupAccessorRequest struct for TokenWriteLookupAccessorRequest -type TokenWriteLookupAccessorRequest struct { +// TokenLookUpAccessorRequest struct for TokenLookUpAccessorRequest +type TokenLookUpAccessorRequest struct { // Accessor of the token to look up (request body) Accessor string `json:"accessor"` } -// NewTokenWriteLookupAccessorRequestWithDefaults instantiates a new TokenWriteLookupAccessorRequest object +// NewTokenLookUpAccessorRequestWithDefaults instantiates a new TokenLookUpAccessorRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTokenWriteLookupAccessorRequestWithDefaults() *TokenWriteLookupAccessorRequest { - var this TokenWriteLookupAccessorRequest +func NewTokenLookUpAccessorRequestWithDefaults() *TokenLookUpAccessorRequest { + var this TokenLookUpAccessorRequest return &this } -func (o TokenWriteLookupAccessorRequest) MarshalJSON() ([]byte, error) { +func (o TokenLookUpAccessorRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["accessor"] = o.Accessor diff --git a/schema/model_token_write_lookup_request.go b/schema/model_token_look_up_request.go similarity index 60% rename from schema/model_token_write_lookup_request.go rename to schema/model_token_look_up_request.go index 624f7db8..baa7f232 100644 --- a/schema/model_token_write_lookup_request.go +++ b/schema/model_token_look_up_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// TokenWriteLookupRequest struct for TokenWriteLookupRequest -type TokenWriteLookupRequest struct { +// TokenLookUpRequest struct for TokenLookUpRequest +type TokenLookUpRequest struct { // Token to lookup (POST request body) Token string `json:"token"` } -// NewTokenWriteLookupRequestWithDefaults instantiates a new TokenWriteLookupRequest object +// NewTokenLookUpRequestWithDefaults instantiates a new TokenLookUpRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTokenWriteLookupRequestWithDefaults() *TokenWriteLookupRequest { - var this TokenWriteLookupRequest +func NewTokenLookUpRequestWithDefaults() *TokenLookUpRequest { + var this TokenLookUpRequest return &this } -func (o TokenWriteLookupRequest) MarshalJSON() ([]byte, error) { +func (o TokenLookUpRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token"] = o.Token diff --git a/schema/model_token_write_lookup_self_request.go b/schema/model_token_look_up_self2_request.go similarity index 59% rename from schema/model_token_write_lookup_self_request.go rename to schema/model_token_look_up_self2_request.go index 790be51f..c5cc8a2c 100644 --- a/schema/model_token_write_lookup_self_request.go +++ b/schema/model_token_look_up_self2_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// TokenWriteLookupSelfRequest struct for TokenWriteLookupSelfRequest -type TokenWriteLookupSelfRequest struct { +// TokenLookUpSelf2Request struct for TokenLookUpSelf2Request +type TokenLookUpSelf2Request struct { // Token to look up (unused, does not need to be set) Token string `json:"token"` } -// NewTokenWriteLookupSelfRequestWithDefaults instantiates a new TokenWriteLookupSelfRequest object +// NewTokenLookUpSelf2RequestWithDefaults instantiates a new TokenLookUpSelf2Request object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTokenWriteLookupSelfRequestWithDefaults() *TokenWriteLookupSelfRequest { - var this TokenWriteLookupSelfRequest +func NewTokenLookUpSelf2RequestWithDefaults() *TokenLookUpSelf2Request { + var this TokenLookUpSelf2Request return &this } -func (o TokenWriteLookupSelfRequest) MarshalJSON() ([]byte, error) { +func (o TokenLookUpSelf2Request) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token"] = o.Token diff --git a/schema/model_totp_write_key_request.go b/schema/model_totp_create_key_request.go similarity index 88% rename from schema/model_totp_write_key_request.go rename to schema/model_totp_create_key_request.go index b7c3a3ff..fbf4e03c 100644 --- a/schema/model_totp_write_key_request.go +++ b/schema/model_totp_create_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TOTPWriteKeyRequest struct for TOTPWriteKeyRequest -type TOTPWriteKeyRequest struct { +// TotpCreateKeyRequest struct for TotpCreateKeyRequest +type TotpCreateKeyRequest struct { // The name of the account associated with the key. Required if generate is true. AccountName string `json:"account_name"` @@ -48,11 +48,11 @@ type TOTPWriteKeyRequest struct { Url string `json:"url"` } -// NewTOTPWriteKeyRequestWithDefaults instantiates a new TOTPWriteKeyRequest object +// NewTotpCreateKeyRequestWithDefaults instantiates a new TotpCreateKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTOTPWriteKeyRequestWithDefaults() *TOTPWriteKeyRequest { - var this TOTPWriteKeyRequest +func NewTotpCreateKeyRequestWithDefaults() *TotpCreateKeyRequest { + var this TotpCreateKeyRequest this.Algorithm = "SHA1" this.Digits = 6 @@ -66,7 +66,7 @@ func NewTOTPWriteKeyRequestWithDefaults() *TOTPWriteKeyRequest { return &this } -func (o TOTPWriteKeyRequest) MarshalJSON() ([]byte, error) { +func (o TotpCreateKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["account_name"] = o.AccountName diff --git a/schema/model_totp_write_code_request.go b/schema/model_totp_validate_code_request.go similarity index 60% rename from schema/model_totp_write_code_request.go rename to schema/model_totp_validate_code_request.go index c7bade5e..a754f31c 100644 --- a/schema/model_totp_write_code_request.go +++ b/schema/model_totp_validate_code_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// TOTPWriteCodeRequest struct for TOTPWriteCodeRequest -type TOTPWriteCodeRequest struct { +// TotpValidateCodeRequest struct for TotpValidateCodeRequest +type TotpValidateCodeRequest struct { // TOTP code to be validated. Code string `json:"code"` } -// NewTOTPWriteCodeRequestWithDefaults instantiates a new TOTPWriteCodeRequest object +// NewTotpValidateCodeRequestWithDefaults instantiates a new TotpValidateCodeRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTOTPWriteCodeRequestWithDefaults() *TOTPWriteCodeRequest { - var this TOTPWriteCodeRequest +func NewTotpValidateCodeRequestWithDefaults() *TotpValidateCodeRequest { + var this TotpValidateCodeRequest return &this } -func (o TOTPWriteCodeRequest) MarshalJSON() ([]byte, error) { +func (o TotpValidateCodeRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["code"] = o.Code diff --git a/schema/model_transit_write_cache_config_request.go b/schema/model_transit_configure_cache_request.go similarity index 58% rename from schema/model_transit_write_cache_config_request.go rename to schema/model_transit_configure_cache_request.go index 783ea0ec..f8eae8f9 100644 --- a/schema/model_transit_write_cache_config_request.go +++ b/schema/model_transit_configure_cache_request.go @@ -9,24 +9,24 @@ import ( "encoding/json" ) -// TransitWriteCacheConfigRequest struct for TransitWriteCacheConfigRequest -type TransitWriteCacheConfigRequest struct { +// TransitConfigureCacheRequest struct for TransitConfigureCacheRequest +type TransitConfigureCacheRequest struct { // Size of cache, use 0 for an unlimited cache size, defaults to 0 Size int32 `json:"size"` } -// NewTransitWriteCacheConfigRequestWithDefaults instantiates a new TransitWriteCacheConfigRequest object +// NewTransitConfigureCacheRequestWithDefaults instantiates a new TransitConfigureCacheRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitWriteCacheConfigRequestWithDefaults() *TransitWriteCacheConfigRequest { - var this TransitWriteCacheConfigRequest +func NewTransitConfigureCacheRequestWithDefaults() *TransitConfigureCacheRequest { + var this TransitConfigureCacheRequest this.Size = 0 return &this } -func (o TransitWriteCacheConfigRequest) MarshalJSON() ([]byte, error) { +func (o TransitConfigureCacheRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["size"] = o.Size diff --git a/schema/model_transit_write_key_config_request.go b/schema/model_transit_configure_key_request.go similarity index 81% rename from schema/model_transit_write_key_config_request.go rename to schema/model_transit_configure_key_request.go index 00939b7b..21503ec3 100644 --- a/schema/model_transit_write_key_config_request.go +++ b/schema/model_transit_configure_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TransitWriteKeyConfigRequest struct for TransitWriteKeyConfigRequest -type TransitWriteKeyConfigRequest struct { +// TransitConfigureKeyRequest struct for TransitConfigureKeyRequest +type TransitConfigureKeyRequest struct { // Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled. AllowPlaintextBackup bool `json:"allow_plaintext_backup"` @@ -30,16 +30,16 @@ type TransitWriteKeyConfigRequest struct { MinEncryptionVersion int32 `json:"min_encryption_version"` } -// NewTransitWriteKeyConfigRequestWithDefaults instantiates a new TransitWriteKeyConfigRequest object +// NewTransitConfigureKeyRequestWithDefaults instantiates a new TransitConfigureKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitWriteKeyConfigRequestWithDefaults() *TransitWriteKeyConfigRequest { - var this TransitWriteKeyConfigRequest +func NewTransitConfigureKeyRequestWithDefaults() *TransitConfigureKeyRequest { + var this TransitConfigureKeyRequest return &this } -func (o TransitWriteKeyConfigRequest) MarshalJSON() ([]byte, error) { +func (o TransitConfigureKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allow_plaintext_backup"] = o.AllowPlaintextBackup diff --git a/schema/model_transit_write_config_keys_request.go b/schema/model_transit_configure_keys_request.go similarity index 60% rename from schema/model_transit_write_config_keys_request.go rename to schema/model_transit_configure_keys_request.go index 3bccb28e..c4d2d108 100644 --- a/schema/model_transit_write_config_keys_request.go +++ b/schema/model_transit_configure_keys_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// TransitWriteConfigKeysRequest struct for TransitWriteConfigKeysRequest -type TransitWriteConfigKeysRequest struct { +// TransitConfigureKeysRequest struct for TransitConfigureKeysRequest +type TransitConfigureKeysRequest struct { // Whether to allow automatic upserting (creation) of keys on the encrypt endpoint. DisableUpsert bool `json:"disable_upsert"` } -// NewTransitWriteConfigKeysRequestWithDefaults instantiates a new TransitWriteConfigKeysRequest object +// NewTransitConfigureKeysRequestWithDefaults instantiates a new TransitConfigureKeysRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitWriteConfigKeysRequestWithDefaults() *TransitWriteConfigKeysRequest { - var this TransitWriteConfigKeysRequest +func NewTransitConfigureKeysRequestWithDefaults() *TransitConfigureKeysRequest { + var this TransitConfigureKeysRequest return &this } -func (o TransitWriteConfigKeysRequest) MarshalJSON() ([]byte, error) { +func (o TransitConfigureKeysRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["disable_upsert"] = o.DisableUpsert diff --git a/schema/model_transit_write_key_request.go b/schema/model_transit_create_key_request.go similarity index 80% rename from schema/model_transit_write_key_request.go rename to schema/model_transit_create_key_request.go index 864542e1..371208b3 100644 --- a/schema/model_transit_write_key_request.go +++ b/schema/model_transit_create_key_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TransitWriteKeyRequest struct for TransitWriteKeyRequest -type TransitWriteKeyRequest struct { +// TransitCreateKeyRequest struct for TransitCreateKeyRequest +type TransitCreateKeyRequest struct { // Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled. AllowPlaintextBackup bool `json:"allow_plaintext_backup"` @@ -32,15 +32,21 @@ type TransitWriteKeyRequest struct { // The key size in bytes for the algorithm. Only applies to HMAC and must be no fewer than 32 bytes and no more than 512 KeySize int32 `json:"key_size"` + // The UUID of the managed key to use for this transit key + ManagedKeyId string `json:"managed_key_id"` + + // The name of the managed key to use for this transit key + ManagedKeyName string `json:"managed_key_name"` + // The type of key to create. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\". Type string `json:"type"` } -// NewTransitWriteKeyRequestWithDefaults instantiates a new TransitWriteKeyRequest object +// NewTransitCreateKeyRequestWithDefaults instantiates a new TransitCreateKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitWriteKeyRequestWithDefaults() *TransitWriteKeyRequest { - var this TransitWriteKeyRequest +func NewTransitCreateKeyRequestWithDefaults() *TransitCreateKeyRequest { + var this TransitCreateKeyRequest this.AutoRotatePeriod = 0 this.KeySize = 0 @@ -49,7 +55,7 @@ func NewTransitWriteKeyRequestWithDefaults() *TransitWriteKeyRequest { return &this } -func (o TransitWriteKeyRequest) MarshalJSON() ([]byte, error) { +func (o TransitCreateKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["allow_plaintext_backup"] = o.AllowPlaintextBackup @@ -59,6 +65,8 @@ func (o TransitWriteKeyRequest) MarshalJSON() ([]byte, error) { toSerialize["derived"] = o.Derived toSerialize["exportable"] = o.Exportable toSerialize["key_size"] = o.KeySize + toSerialize["managed_key_id"] = o.ManagedKeyId + toSerialize["managed_key_name"] = o.ManagedKeyName toSerialize["type"] = o.Type return json.Marshal(toSerialize) diff --git a/schema/model_transit_decrypt_request.go b/schema/model_transit_decrypt_request.go index 5dc2257b..a7f9245b 100644 --- a/schema/model_transit_decrypt_request.go +++ b/schema/model_transit_decrypt_request.go @@ -14,6 +14,9 @@ type TransitDecryptRequest struct { // When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with. AssociatedData string `json:"associated_data"` + // Specifies a list of items to be decrypted in a single batch. When this parameter is set, if the parameters 'ciphertext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input. + BatchInput []map[string]interface{} `json:"batch_input"` + // The ciphertext to decrypt, provided as returned by encrypt. Ciphertext string `json:"ciphertext"` @@ -40,6 +43,7 @@ func (o TransitDecryptRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["associated_data"] = o.AssociatedData + toSerialize["batch_input"] = o.BatchInput toSerialize["ciphertext"] = o.Ciphertext toSerialize["context"] = o.Context toSerialize["nonce"] = o.Nonce diff --git a/schema/model_transit_encrypt_request.go b/schema/model_transit_encrypt_request.go index e650869c..7696f50f 100644 --- a/schema/model_transit_encrypt_request.go +++ b/schema/model_transit_encrypt_request.go @@ -14,6 +14,9 @@ type TransitEncryptRequest struct { // When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with. AssociatedData string `json:"associated_data"` + // Specifies a list of items to be encrypted in a single batch. When this parameter is set, if the parameters 'plaintext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input. + BatchInput []map[string]interface{} `json:"batch_input"` + // Base64 encoded context for key derivation. Required if key derivation is enabled Context string `json:"context"` @@ -51,6 +54,7 @@ func (o TransitEncryptRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["associated_data"] = o.AssociatedData + toSerialize["batch_input"] = o.BatchInput toSerialize["context"] = o.Context toSerialize["convergent_encryption"] = o.ConvergentEncryption toSerialize["key_version"] = o.KeyVersion diff --git a/schema/model_transit_generate_hmac_request.go b/schema/model_transit_generate_hmac_request.go index 7a265d45..aa7093af 100644 --- a/schema/model_transit_generate_hmac_request.go +++ b/schema/model_transit_generate_hmac_request.go @@ -9,11 +9,14 @@ import ( "encoding/json" ) -// TransitGenerateHMACRequest struct for TransitGenerateHMACRequest -type TransitGenerateHMACRequest struct { +// TransitGenerateHmacRequest struct for TransitGenerateHmacRequest +type TransitGenerateHmacRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` + // Specifies a list of items to be processed in a single batch. When this parameter is set, if the parameter 'input' is also set, it will be ignored. Any batch output will preserve the order of the batch input. + BatchInput []map[string]interface{} `json:"batch_input"` + // The base64-encoded input data Input string `json:"input"` @@ -24,21 +27,22 @@ type TransitGenerateHMACRequest struct { Urlalgorithm string `json:"urlalgorithm"` } -// NewTransitGenerateHMACRequestWithDefaults instantiates a new TransitGenerateHMACRequest object +// NewTransitGenerateHmacRequestWithDefaults instantiates a new TransitGenerateHmacRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitGenerateHMACRequestWithDefaults() *TransitGenerateHMACRequest { - var this TransitGenerateHMACRequest +func NewTransitGenerateHmacRequestWithDefaults() *TransitGenerateHmacRequest { + var this TransitGenerateHmacRequest this.Algorithm = "sha2-256" return &this } -func (o TransitGenerateHMACRequest) MarshalJSON() ([]byte, error) { +func (o TransitGenerateHmacRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm + toSerialize["batch_input"] = o.BatchInput toSerialize["input"] = o.Input toSerialize["key_version"] = o.KeyVersion toSerialize["urlalgorithm"] = o.Urlalgorithm diff --git a/schema/model_transit_generate_hmac_with_algorithm_request.go b/schema/model_transit_generate_hmac_with_algorithm_request.go index 68a76743..ef43c965 100644 --- a/schema/model_transit_generate_hmac_with_algorithm_request.go +++ b/schema/model_transit_generate_hmac_with_algorithm_request.go @@ -9,11 +9,14 @@ import ( "encoding/json" ) -// TransitGenerateHMACWithAlgorithmRequest struct for TransitGenerateHMACWithAlgorithmRequest -type TransitGenerateHMACWithAlgorithmRequest struct { +// TransitGenerateHmacWithAlgorithmRequest struct for TransitGenerateHmacWithAlgorithmRequest +type TransitGenerateHmacWithAlgorithmRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` + // Specifies a list of items to be processed in a single batch. When this parameter is set, if the parameter 'input' is also set, it will be ignored. Any batch output will preserve the order of the batch input. + BatchInput []map[string]interface{} `json:"batch_input"` + // The base64-encoded input data Input string `json:"input"` @@ -21,21 +24,22 @@ type TransitGenerateHMACWithAlgorithmRequest struct { KeyVersion int32 `json:"key_version"` } -// NewTransitGenerateHMACWithAlgorithmRequestWithDefaults instantiates a new TransitGenerateHMACWithAlgorithmRequest object +// NewTransitGenerateHmacWithAlgorithmRequestWithDefaults instantiates a new TransitGenerateHmacWithAlgorithmRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitGenerateHMACWithAlgorithmRequestWithDefaults() *TransitGenerateHMACWithAlgorithmRequest { - var this TransitGenerateHMACWithAlgorithmRequest +func NewTransitGenerateHmacWithAlgorithmRequestWithDefaults() *TransitGenerateHmacWithAlgorithmRequest { + var this TransitGenerateHmacWithAlgorithmRequest this.Algorithm = "sha2-256" return &this } -func (o TransitGenerateHMACWithAlgorithmRequest) MarshalJSON() ([]byte, error) { +func (o TransitGenerateHmacWithAlgorithmRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm + toSerialize["batch_input"] = o.BatchInput toSerialize["input"] = o.Input toSerialize["key_version"] = o.KeyVersion diff --git a/schema/model_sys_write_tools_random_urlbytes_request.go b/schema/model_transit_generate_random_with_bytes_request.go similarity index 66% rename from schema/model_sys_write_tools_random_urlbytes_request.go rename to schema/model_transit_generate_random_with_bytes_request.go index 4e5d3a3d..4ee8d734 100644 --- a/schema/model_sys_write_tools_random_urlbytes_request.go +++ b/schema/model_transit_generate_random_with_bytes_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// SysWriteToolsRandomUrlbytesRequest struct for SysWriteToolsRandomUrlbytesRequest -type SysWriteToolsRandomUrlbytesRequest struct { +// TransitGenerateRandomWithBytesRequest struct for TransitGenerateRandomWithBytesRequest +type TransitGenerateRandomWithBytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` @@ -21,11 +21,11 @@ type SysWriteToolsRandomUrlbytesRequest struct { Source string `json:"source"` } -// NewSysWriteToolsRandomUrlbytesRequestWithDefaults instantiates a new SysWriteToolsRandomUrlbytesRequest object +// NewTransitGenerateRandomWithBytesRequestWithDefaults instantiates a new TransitGenerateRandomWithBytesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewSysWriteToolsRandomUrlbytesRequestWithDefaults() *SysWriteToolsRandomUrlbytesRequest { - var this SysWriteToolsRandomUrlbytesRequest +func NewTransitGenerateRandomWithBytesRequestWithDefaults() *TransitGenerateRandomWithBytesRequest { + var this TransitGenerateRandomWithBytesRequest this.Bytes = 32 this.Format = "base64" @@ -34,7 +34,7 @@ func NewSysWriteToolsRandomUrlbytesRequestWithDefaults() *SysWriteToolsRandomUrl return &this } -func (o SysWriteToolsRandomUrlbytesRequest) MarshalJSON() ([]byte, error) { +func (o TransitGenerateRandomWithBytesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bytes"] = o.Bytes diff --git a/schema/model_tools_generate_random_source_bytes_request.go b/schema/model_transit_generate_random_with_source_and_bytes_request.go similarity index 58% rename from schema/model_tools_generate_random_source_bytes_request.go rename to schema/model_transit_generate_random_with_source_and_bytes_request.go index 21ee9dd3..d2418044 100644 --- a/schema/model_tools_generate_random_source_bytes_request.go +++ b/schema/model_transit_generate_random_with_source_and_bytes_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// ToolsGenerateRandomSourceBytesRequest struct for ToolsGenerateRandomSourceBytesRequest -type ToolsGenerateRandomSourceBytesRequest struct { +// TransitGenerateRandomWithSourceAndBytesRequest struct for TransitGenerateRandomWithSourceAndBytesRequest +type TransitGenerateRandomWithSourceAndBytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` @@ -18,11 +18,11 @@ type ToolsGenerateRandomSourceBytesRequest struct { Format string `json:"format"` } -// NewToolsGenerateRandomSourceBytesRequestWithDefaults instantiates a new ToolsGenerateRandomSourceBytesRequest object +// NewTransitGenerateRandomWithSourceAndBytesRequestWithDefaults instantiates a new TransitGenerateRandomWithSourceAndBytesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewToolsGenerateRandomSourceBytesRequestWithDefaults() *ToolsGenerateRandomSourceBytesRequest { - var this ToolsGenerateRandomSourceBytesRequest +func NewTransitGenerateRandomWithSourceAndBytesRequestWithDefaults() *TransitGenerateRandomWithSourceAndBytesRequest { + var this TransitGenerateRandomWithSourceAndBytesRequest this.Bytes = 32 this.Format = "base64" @@ -30,7 +30,7 @@ func NewToolsGenerateRandomSourceBytesRequestWithDefaults() *ToolsGenerateRandom return &this } -func (o ToolsGenerateRandomSourceBytesRequest) MarshalJSON() ([]byte, error) { +func (o TransitGenerateRandomWithSourceAndBytesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bytes"] = o.Bytes diff --git a/schema/model_transit_generate_random_source_request.go b/schema/model_transit_generate_random_with_source_request.go similarity index 65% rename from schema/model_transit_generate_random_source_request.go rename to schema/model_transit_generate_random_with_source_request.go index 8a3f4069..db836217 100644 --- a/schema/model_transit_generate_random_source_request.go +++ b/schema/model_transit_generate_random_with_source_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// TransitGenerateRandomSourceRequest struct for TransitGenerateRandomSourceRequest -type TransitGenerateRandomSourceRequest struct { +// TransitGenerateRandomWithSourceRequest struct for TransitGenerateRandomWithSourceRequest +type TransitGenerateRandomWithSourceRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` @@ -21,11 +21,11 @@ type TransitGenerateRandomSourceRequest struct { Urlbytes string `json:"urlbytes"` } -// NewTransitGenerateRandomSourceRequestWithDefaults instantiates a new TransitGenerateRandomSourceRequest object +// NewTransitGenerateRandomWithSourceRequestWithDefaults instantiates a new TransitGenerateRandomWithSourceRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitGenerateRandomSourceRequestWithDefaults() *TransitGenerateRandomSourceRequest { - var this TransitGenerateRandomSourceRequest +func NewTransitGenerateRandomWithSourceRequestWithDefaults() *TransitGenerateRandomWithSourceRequest { + var this TransitGenerateRandomWithSourceRequest this.Bytes = 32 this.Format = "base64" @@ -33,7 +33,7 @@ func NewTransitGenerateRandomSourceRequestWithDefaults() *TransitGenerateRandomS return &this } -func (o TransitGenerateRandomSourceRequest) MarshalJSON() ([]byte, error) { +func (o TransitGenerateRandomWithSourceRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["bytes"] = o.Bytes diff --git a/schema/model_transit_restore_request.go b/schema/model_transit_restore_and_rename_key_request.go similarity index 63% rename from schema/model_transit_restore_request.go rename to schema/model_transit_restore_and_rename_key_request.go index 72c06f46..458b89d2 100644 --- a/schema/model_transit_restore_request.go +++ b/schema/model_transit_restore_and_rename_key_request.go @@ -9,35 +9,31 @@ import ( "encoding/json" ) -// TransitRestoreRequest struct for TransitRestoreRequest -type TransitRestoreRequest struct { +// TransitRestoreAndRenameKeyRequest struct for TransitRestoreAndRenameKeyRequest +type TransitRestoreAndRenameKeyRequest struct { // Backed up key data to be restored. This should be the output from the 'backup/' endpoint. Backup string `json:"backup"` // If set and a key by the given name exists, force the restore operation and override the key. Force bool `json:"force"` - - // If set, this will be the name of the restored key. - Name string `json:"name"` } -// NewTransitRestoreRequestWithDefaults instantiates a new TransitRestoreRequest object +// NewTransitRestoreAndRenameKeyRequestWithDefaults instantiates a new TransitRestoreAndRenameKeyRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewTransitRestoreRequestWithDefaults() *TransitRestoreRequest { - var this TransitRestoreRequest +func NewTransitRestoreAndRenameKeyRequestWithDefaults() *TransitRestoreAndRenameKeyRequest { + var this TransitRestoreAndRenameKeyRequest this.Force = false return &this } -func (o TransitRestoreRequest) MarshalJSON() ([]byte, error) { +func (o TransitRestoreAndRenameKeyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["backup"] = o.Backup toSerialize["force"] = o.Force - toSerialize["name"] = o.Name return json.Marshal(toSerialize) } diff --git a/schema/model_transit_restore_key_request.go b/schema/model_transit_restore_key_request.go index faf676b8..0a4e0c6e 100644 --- a/schema/model_transit_restore_key_request.go +++ b/schema/model_transit_restore_key_request.go @@ -16,6 +16,9 @@ type TransitRestoreKeyRequest struct { // If set and a key by the given name exists, force the restore operation and override the key. Force bool `json:"force"` + + // If set, this will be the name of the restored key. + Name string `json:"name"` } // NewTransitRestoreKeyRequestWithDefaults instantiates a new TransitRestoreKeyRequest object @@ -34,6 +37,7 @@ func (o TransitRestoreKeyRequest) MarshalJSON() ([]byte, error) { toSerialize["backup"] = o.Backup toSerialize["force"] = o.Force + toSerialize["name"] = o.Name return json.Marshal(toSerialize) } diff --git a/schema/model_transit_rewrap_request.go b/schema/model_transit_rewrap_request.go index 5658721c..bc40a43f 100644 --- a/schema/model_transit_rewrap_request.go +++ b/schema/model_transit_rewrap_request.go @@ -11,6 +11,9 @@ import ( // TransitRewrapRequest struct for TransitRewrapRequest type TransitRewrapRequest struct { + // Specifies a list of items to be re-encrypted in a single batch. When this parameter is set, if the parameters 'ciphertext', 'context' and 'nonce' are also set, they will be ignored. Any batch output will preserve the order of the batch input. + BatchInput []map[string]interface{} `json:"batch_input"` + // Ciphertext value to rewrap Ciphertext string `json:"ciphertext"` @@ -36,6 +39,7 @@ func NewTransitRewrapRequestWithDefaults() *TransitRewrapRequest { func (o TransitRewrapRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) + toSerialize["batch_input"] = o.BatchInput toSerialize["ciphertext"] = o.Ciphertext toSerialize["context"] = o.Context toSerialize["key_version"] = o.KeyVersion diff --git a/schema/model_transit_rotate_key_request.go b/schema/model_transit_rotate_key_request.go new file mode 100644 index 00000000..b0fdd540 --- /dev/null +++ b/schema/model_transit_rotate_key_request.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// TransitRotateKeyRequest struct for TransitRotateKeyRequest +type TransitRotateKeyRequest struct { + // The UUID of the managed key to use for the new version of this transit key + ManagedKeyId string `json:"managed_key_id"` + + // The name of the managed key to use for the new version of this transit key + ManagedKeyName string `json:"managed_key_name"` +} + +// NewTransitRotateKeyRequestWithDefaults instantiates a new TransitRotateKeyRequest object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewTransitRotateKeyRequestWithDefaults() *TransitRotateKeyRequest { + var this TransitRotateKeyRequest + + return &this +} + +func (o TransitRotateKeyRequest) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["managed_key_id"] = o.ManagedKeyId + toSerialize["managed_key_name"] = o.ManagedKeyName + + return json.Marshal(toSerialize) +} diff --git a/schema/model_transit_sign_request.go b/schema/model_transit_sign_request.go index 3dd1fcd0..86250cfb 100644 --- a/schema/model_transit_sign_request.go +++ b/schema/model_transit_sign_request.go @@ -14,6 +14,9 @@ type TransitSignRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` + // Specifies a list of items for processing. When this parameter is set, any supplied 'input' or 'context' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input + BatchInput []map[string]interface{} `json:"batch_input"` + // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` @@ -60,6 +63,7 @@ func (o TransitSignRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm + toSerialize["batch_input"] = o.BatchInput toSerialize["context"] = o.Context toSerialize["hash_algorithm"] = o.HashAlgorithm toSerialize["input"] = o.Input diff --git a/schema/model_transit_sign_with_algorithm_request.go b/schema/model_transit_sign_with_algorithm_request.go index bdd66224..34b0420e 100644 --- a/schema/model_transit_sign_with_algorithm_request.go +++ b/schema/model_transit_sign_with_algorithm_request.go @@ -14,6 +14,9 @@ type TransitSignWithAlgorithmRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` + // Specifies a list of items for processing. When this parameter is set, any supplied 'input' or 'context' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input + BatchInput []map[string]interface{} `json:"batch_input"` + // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` @@ -57,6 +60,7 @@ func (o TransitSignWithAlgorithmRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm + toSerialize["batch_input"] = o.BatchInput toSerialize["context"] = o.Context toSerialize["hash_algorithm"] = o.HashAlgorithm toSerialize["input"] = o.Input diff --git a/schema/model_transit_verify_request.go b/schema/model_transit_verify_request.go index 4f4dbb65..93c9caf9 100644 --- a/schema/model_transit_verify_request.go +++ b/schema/model_transit_verify_request.go @@ -14,6 +14,9 @@ type TransitVerifyRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` + // Specifies a list of items for processing. When this parameter is set, any supplied 'input', 'hmac' or 'signature' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input + BatchInput []map[string]interface{} `json:"batch_input"` + // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` @@ -63,6 +66,7 @@ func (o TransitVerifyRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm + toSerialize["batch_input"] = o.BatchInput toSerialize["context"] = o.Context toSerialize["hash_algorithm"] = o.HashAlgorithm toSerialize["hmac"] = o.Hmac diff --git a/schema/model_transit_verify_with_algorithm_request.go b/schema/model_transit_verify_with_algorithm_request.go index 04568083..b06cd8c7 100644 --- a/schema/model_transit_verify_with_algorithm_request.go +++ b/schema/model_transit_verify_with_algorithm_request.go @@ -14,6 +14,9 @@ type TransitVerifyWithAlgorithmRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` + // Specifies a list of items for processing. When this parameter is set, any supplied 'input', 'hmac' or 'signature' parameters will be ignored. Responses are returned in the 'batch_results' array component of the 'data' element of the response. Any batch output will preserve the order of the batch input + BatchInput []map[string]interface{} `json:"batch_input"` + // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` @@ -60,6 +63,7 @@ func (o TransitVerifyWithAlgorithmRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["algorithm"] = o.Algorithm + toSerialize["batch_input"] = o.BatchInput toSerialize["context"] = o.Context toSerialize["hash_algorithm"] = o.HashAlgorithm toSerialize["hmac"] = o.Hmac diff --git a/schema/model_write_config_ui_header_request.go b/schema/model_ui_headers_configure_request.go similarity index 63% rename from schema/model_write_config_ui_header_request.go rename to schema/model_ui_headers_configure_request.go index 8c9c6e89..f7a16053 100644 --- a/schema/model_write_config_ui_header_request.go +++ b/schema/model_ui_headers_configure_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// WriteConfigUIHeaderRequest struct for WriteConfigUIHeaderRequest -type WriteConfigUIHeaderRequest struct { +// UiHeadersConfigureRequest struct for UiHeadersConfigureRequest +type UiHeadersConfigureRequest struct { // Returns multiple values if true Multivalue bool `json:"multivalue"` @@ -18,16 +18,16 @@ type WriteConfigUIHeaderRequest struct { Values []string `json:"values"` } -// NewWriteConfigUIHeaderRequestWithDefaults instantiates a new WriteConfigUIHeaderRequest object +// NewUiHeadersConfigureRequestWithDefaults instantiates a new UiHeadersConfigureRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWriteConfigUIHeaderRequestWithDefaults() *WriteConfigUIHeaderRequest { - var this WriteConfigUIHeaderRequest +func NewUiHeadersConfigureRequestWithDefaults() *UiHeadersConfigureRequest { + var this UiHeadersConfigureRequest return &this } -func (o WriteConfigUIHeaderRequest) MarshalJSON() ([]byte, error) { +func (o UiHeadersConfigureRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["multivalue"] = o.Multivalue diff --git a/schema/model_ui_headers_list_response.go b/schema/model_ui_headers_list_response.go new file mode 100644 index 00000000..f2a50beb --- /dev/null +++ b/schema/model_ui_headers_list_response.go @@ -0,0 +1,33 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// UiHeadersListResponse struct for UiHeadersListResponse +type UiHeadersListResponse struct { + // Lists of configured UI headers. Omitted if list is empty + Keys []string `json:"keys"` +} + +// NewUiHeadersListResponseWithDefaults instantiates a new UiHeadersListResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewUiHeadersListResponseWithDefaults() *UiHeadersListResponse { + var this UiHeadersListResponse + + return &this +} + +func (o UiHeadersListResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_ui_headers_read_configuration_response.go b/schema/model_ui_headers_read_configuration_response.go new file mode 100644 index 00000000..90a5b34e --- /dev/null +++ b/schema/model_ui_headers_read_configuration_response.go @@ -0,0 +1,37 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// UiHeadersReadConfigurationResponse struct for UiHeadersReadConfigurationResponse +type UiHeadersReadConfigurationResponse struct { + // returns the first header value when `multivalue` request parameter is false + Value string `json:"value"` + + // returns all header values when `multivalue` request parameter is true + Values []string `json:"values"` +} + +// NewUiHeadersReadConfigurationResponseWithDefaults instantiates a new UiHeadersReadConfigurationResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewUiHeadersReadConfigurationResponseWithDefaults() *UiHeadersReadConfigurationResponse { + var this UiHeadersReadConfigurationResponse + + return &this +} + +func (o UiHeadersReadConfigurationResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["value"] = o.Value + toSerialize["values"] = o.Values + + return json.Marshal(toSerialize) +} diff --git a/schema/model_unseal_response.go b/schema/model_unseal_response.go new file mode 100644 index 00000000..193bb1f0 --- /dev/null +++ b/schema/model_unseal_response.go @@ -0,0 +1,77 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// UnsealResponse struct for UnsealResponse +type UnsealResponse struct { + BuildDate string `json:"build_date"` + + ClusterId string `json:"cluster_id"` + + ClusterName string `json:"cluster_name"` + + HcpLinkResourceID string `json:"hcp_link_resource_ID"` + + HcpLinkStatus string `json:"hcp_link_status"` + + Initialized bool `json:"initialized"` + + Migration bool `json:"migration"` + + N int32 `json:"n"` + + Nonce string `json:"nonce"` + + Progress int32 `json:"progress"` + + RecoverySeal bool `json:"recovery_seal"` + + Sealed bool `json:"sealed"` + + StorageType string `json:"storage_type"` + + T int32 `json:"t"` + + Type string `json:"type"` + + Version string `json:"version"` +} + +// NewUnsealResponseWithDefaults instantiates a new UnsealResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewUnsealResponseWithDefaults() *UnsealResponse { + var this UnsealResponse + + return &this +} + +func (o UnsealResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["build_date"] = o.BuildDate + toSerialize["cluster_id"] = o.ClusterId + toSerialize["cluster_name"] = o.ClusterName + toSerialize["hcp_link_resource_ID"] = o.HcpLinkResourceID + toSerialize["hcp_link_status"] = o.HcpLinkStatus + toSerialize["initialized"] = o.Initialized + toSerialize["migration"] = o.Migration + toSerialize["n"] = o.N + toSerialize["nonce"] = o.Nonce + toSerialize["progress"] = o.Progress + toSerialize["recovery_seal"] = o.RecoverySeal + toSerialize["sealed"] = o.Sealed + toSerialize["storage_type"] = o.StorageType + toSerialize["t"] = o.T + toSerialize["type"] = o.Type + toSerialize["version"] = o.Version + + return json.Marshal(toSerialize) +} diff --git a/schema/model_wrapping_rewrap_request.go b/schema/model_unwrap_request.go similarity index 60% rename from schema/model_wrapping_rewrap_request.go rename to schema/model_unwrap_request.go index 01b7b6c7..53fa5942 100644 --- a/schema/model_wrapping_rewrap_request.go +++ b/schema/model_unwrap_request.go @@ -9,21 +9,21 @@ import ( "encoding/json" ) -// WrappingRewrapRequest struct for WrappingRewrapRequest -type WrappingRewrapRequest struct { +// UnwrapRequest struct for UnwrapRequest +type UnwrapRequest struct { Token string `json:"token"` } -// NewWrappingRewrapRequestWithDefaults instantiates a new WrappingRewrapRequest object +// NewUnwrapRequestWithDefaults instantiates a new UnwrapRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewWrappingRewrapRequestWithDefaults() *WrappingRewrapRequest { - var this WrappingRewrapRequest +func NewUnwrapRequestWithDefaults() *UnwrapRequest { + var this UnwrapRequest return &this } -func (o WrappingRewrapRequest) MarshalJSON() ([]byte, error) { +func (o UnwrapRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["token"] = o.Token diff --git a/schema/model_userpass_write_user_password_request.go b/schema/model_userpass_reset_password_request.go similarity index 56% rename from schema/model_userpass_write_user_password_request.go rename to schema/model_userpass_reset_password_request.go index adb40dd9..2113dcc2 100644 --- a/schema/model_userpass_write_user_password_request.go +++ b/schema/model_userpass_reset_password_request.go @@ -9,22 +9,22 @@ import ( "encoding/json" ) -// UserpassWriteUserPasswordRequest struct for UserpassWriteUserPasswordRequest -type UserpassWriteUserPasswordRequest struct { +// UserpassResetPasswordRequest struct for UserpassResetPasswordRequest +type UserpassResetPasswordRequest struct { // Password for this user. Password string `json:"password"` } -// NewUserpassWriteUserPasswordRequestWithDefaults instantiates a new UserpassWriteUserPasswordRequest object +// NewUserpassResetPasswordRequestWithDefaults instantiates a new UserpassResetPasswordRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewUserpassWriteUserPasswordRequestWithDefaults() *UserpassWriteUserPasswordRequest { - var this UserpassWriteUserPasswordRequest +func NewUserpassResetPasswordRequestWithDefaults() *UserpassResetPasswordRequest { + var this UserpassResetPasswordRequest return &this } -func (o UserpassWriteUserPasswordRequest) MarshalJSON() ([]byte, error) { +func (o UserpassResetPasswordRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["password"] = o.Password diff --git a/schema/model_userpass_write_user_policies_request.go b/schema/model_userpass_update_policies_request.go similarity index 64% rename from schema/model_userpass_write_user_policies_request.go rename to schema/model_userpass_update_policies_request.go index fb7575fd..e699f493 100644 --- a/schema/model_userpass_write_user_policies_request.go +++ b/schema/model_userpass_update_policies_request.go @@ -9,8 +9,8 @@ import ( "encoding/json" ) -// UserpassWriteUserPoliciesRequest struct for UserpassWriteUserPoliciesRequest -type UserpassWriteUserPoliciesRequest struct { +// UserpassUpdatePoliciesRequest struct for UserpassUpdatePoliciesRequest +type UserpassUpdatePoliciesRequest struct { // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` @@ -19,16 +19,16 @@ type UserpassWriteUserPoliciesRequest struct { TokenPolicies []string `json:"token_policies"` } -// NewUserpassWriteUserPoliciesRequestWithDefaults instantiates a new UserpassWriteUserPoliciesRequest object +// NewUserpassUpdatePoliciesRequestWithDefaults instantiates a new UserpassUpdatePoliciesRequest object // This constructor will only assign default values to properties that have it defined, // but it doesn't guarantee that properties required by API are set -func NewUserpassWriteUserPoliciesRequestWithDefaults() *UserpassWriteUserPoliciesRequest { - var this UserpassWriteUserPoliciesRequest +func NewUserpassUpdatePoliciesRequestWithDefaults() *UserpassUpdatePoliciesRequest { + var this UserpassUpdatePoliciesRequest return &this } -func (o UserpassWriteUserPoliciesRequest) MarshalJSON() ([]byte, error) { +func (o UserpassUpdatePoliciesRequest) MarshalJSON() ([]byte, error) { toSerialize := make(map[string]interface{}) toSerialize["policies"] = o.Policies diff --git a/schema/model_version_history_response.go b/schema/model_version_history_response.go new file mode 100644 index 00000000..eb0646b4 --- /dev/null +++ b/schema/model_version_history_response.go @@ -0,0 +1,35 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +package schema + +import ( + "encoding/json" +) + +// VersionHistoryResponse struct for VersionHistoryResponse +type VersionHistoryResponse struct { + KeyInfo map[string]interface{} `json:"key_info"` + + Keys []string `json:"keys"` +} + +// NewVersionHistoryResponseWithDefaults instantiates a new VersionHistoryResponse object +// This constructor will only assign default values to properties that have it defined, +// but it doesn't guarantee that properties required by API are set +func NewVersionHistoryResponseWithDefaults() *VersionHistoryResponse { + var this VersionHistoryResponse + + return &this +} + +func (o VersionHistoryResponse) MarshalJSON() ([]byte, error) { + toSerialize := make(map[string]interface{}) + + toSerialize["key_info"] = o.KeyInfo + toSerialize["keys"] = o.Keys + + return json.Marshal(toSerialize) +} diff --git a/schema/model_wrapping_write_lookup_request.go b/schema/model_wrapping_write_lookup_request.go deleted file mode 100644 index c03d6c62..00000000 --- a/schema/model_wrapping_write_lookup_request.go +++ /dev/null @@ -1,32 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// WrappingWriteLookupRequest struct for WrappingWriteLookupRequest -type WrappingWriteLookupRequest struct { - Token string `json:"token"` -} - -// NewWrappingWriteLookupRequestWithDefaults instantiates a new WrappingWriteLookupRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewWrappingWriteLookupRequestWithDefaults() *WrappingWriteLookupRequest { - var this WrappingWriteLookupRequest - - return &this -} - -func (o WrappingWriteLookupRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["token"] = o.Token - - return json.Marshal(toSerialize) -} diff --git a/schema/model_write_raw_path_request.go b/schema/model_write_raw_path_request.go deleted file mode 100644 index b03f39f5..00000000 --- a/schema/model_write_raw_path_request.go +++ /dev/null @@ -1,41 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// WriteRawPathRequest struct for WriteRawPathRequest -type WriteRawPathRequest struct { - Compressed bool `json:"compressed"` - - CompressionType string `json:"compression_type"` - - Encoding string `json:"encoding"` - - Value string `json:"value"` -} - -// NewWriteRawPathRequestWithDefaults instantiates a new WriteRawPathRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewWriteRawPathRequestWithDefaults() *WriteRawPathRequest { - var this WriteRawPathRequest - - return &this -} - -func (o WriteRawPathRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["compressed"] = o.Compressed - toSerialize["compression_type"] = o.CompressionType - toSerialize["encoding"] = o.Encoding - toSerialize["value"] = o.Value - - return json.Marshal(toSerialize) -} diff --git a/schema/model_write_raw_request.go b/schema/model_write_raw_request.go deleted file mode 100644 index f3c8c8e9..00000000 --- a/schema/model_write_raw_request.go +++ /dev/null @@ -1,44 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 -// -// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. - -package schema - -import ( - "encoding/json" -) - -// WriteRawRequest struct for WriteRawRequest -type WriteRawRequest struct { - Compressed bool `json:"compressed"` - - CompressionType string `json:"compression_type"` - - Encoding string `json:"encoding"` - - Path string `json:"path"` - - Value string `json:"value"` -} - -// NewWriteRawRequestWithDefaults instantiates a new WriteRawRequest object -// This constructor will only assign default values to properties that have it defined, -// but it doesn't guarantee that properties required by API are set -func NewWriteRawRequestWithDefaults() *WriteRawRequest { - var this WriteRawRequest - - return &this -} - -func (o WriteRawRequest) MarshalJSON() ([]byte, error) { - toSerialize := make(map[string]interface{}) - - toSerialize["compressed"] = o.Compressed - toSerialize["compression_type"] = o.CompressionType - toSerialize["encoding"] = o.Encoding - toSerialize["path"] = o.Path - toSerialize["value"] = o.Value - - return json.Marshal(toSerialize) -} From e76fd96c41981bcc5c1fd037687cf6652bceb22f Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Mon, 24 Apr 2023 11:00:55 -0400 Subject: [PATCH 3/3] regen --- api_secrets.go | 1020 ++++++++++++++++-------------------------------- 1 file changed, 340 insertions(+), 680 deletions(-) diff --git a/api_secrets.go b/api_secrets.go index a04c1698..5c50f169 100644 --- a/api_secrets.go +++ b/api_secrets.go @@ -20,8 +20,7 @@ type Secrets struct { } // AliCloudConfigure -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudConfigure(ctx context.Context, alicloudMountPath string, request schema.AliCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudConfigure(ctx context.Context, request schema.AliCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -44,8 +43,7 @@ func (s *Secrets) AliCloudConfigure(ctx context.Context, alicloudMountPath strin } // AliCloudDeleteConfiguration -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudDeleteConfiguration(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudDeleteConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -69,8 +67,7 @@ func (s *Secrets) AliCloudDeleteConfiguration(ctx context.Context, alicloudMount // AliCloudDeleteRole Read, write and reference policies and roles that API keys or STS credentials can be made for. // name: The name of the role. -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudDeleteRole(ctx context.Context, name string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -95,8 +92,7 @@ func (s *Secrets) AliCloudDeleteRole(ctx context.Context, name string, alicloudM // AliCloudGenerateCredentials Generate an API key or STS credential using the given role's configuration.' // name: The name of the role. -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudGenerateCredentials(ctx context.Context, name string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudGenerateCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -120,8 +116,7 @@ func (s *Secrets) AliCloudGenerateCredentials(ctx context.Context, name string, } // AliCloudListRoles List the existing roles in this backend. -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudListRoles(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -145,8 +140,7 @@ func (s *Secrets) AliCloudListRoles(ctx context.Context, alicloudMountPath strin } // AliCloudReadConfiguration -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudReadConfiguration(ctx context.Context, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -170,8 +164,7 @@ func (s *Secrets) AliCloudReadConfiguration(ctx context.Context, alicloudMountPa // AliCloudReadRole Read, write and reference policies and roles that API keys or STS credentials can be made for. // name: The name of the role. -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudReadRole(ctx context.Context, name string, alicloudMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -196,8 +189,7 @@ func (s *Secrets) AliCloudReadRole(ctx context.Context, name string, alicloudMou // AliCloudWriteRole Read, write and reference policies and roles that API keys or STS credentials can be made for. // name: The name of the role. -// alicloudMountPath: Path that the backend was mounted at -func (s *Secrets) AliCloudWriteRole(ctx context.Context, name string, alicloudMountPath string, request schema.AliCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AliCloudWriteRole(ctx context.Context, name string, request schema.AliCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -221,8 +213,7 @@ func (s *Secrets) AliCloudWriteRole(ctx context.Context, name string, alicloudMo } // AwsConfigureLease -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsConfigureLease(ctx context.Context, awsMountPath string, request schema.AwsConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsConfigureLease(ctx context.Context, request schema.AwsConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -245,8 +236,7 @@ func (s *Secrets) AwsConfigureLease(ctx context.Context, awsMountPath string, re } // AwsConfigureRootIamCredentials -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsConfigureRootIamCredentials(ctx context.Context, awsMountPath string, request schema.AwsConfigureRootIamCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsConfigureRootIamCredentials(ctx context.Context, request schema.AwsConfigureRootIamCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -270,8 +260,7 @@ func (s *Secrets) AwsConfigureRootIamCredentials(ctx context.Context, awsMountPa // AwsDeleteRole Read, write and reference IAM policies that access keys can be made for. // name: Name of the policy -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsDeleteRole(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -296,8 +285,7 @@ func (s *Secrets) AwsDeleteRole(ctx context.Context, name string, awsMountPath s // AwsGenerateCredentials // name: Name of the role -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsGenerateCredentials(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsGenerateCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -322,8 +310,7 @@ func (s *Secrets) AwsGenerateCredentials(ctx context.Context, name string, awsMo // AwsGenerateCredentials2 // name: Name of the role -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsGenerateCredentials2(ctx context.Context, name string, awsMountPath string, request schema.AwsGenerateCredentials2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsGenerateCredentials2(ctx context.Context, name string, request schema.AwsGenerateCredentials2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -348,8 +335,7 @@ func (s *Secrets) AwsGenerateCredentials2(ctx context.Context, name string, awsM // AwsGenerateStsCredentials // name: Name of the role -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsGenerateStsCredentials(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsGenerateStsCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -374,8 +360,7 @@ func (s *Secrets) AwsGenerateStsCredentials(ctx context.Context, name string, aw // AwsGenerateStsCredentials2 // name: Name of the role -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsGenerateStsCredentials2(ctx context.Context, name string, awsMountPath string, request schema.AwsGenerateStsCredentials2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsGenerateStsCredentials2(ctx context.Context, name string, request schema.AwsGenerateStsCredentials2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -399,8 +384,7 @@ func (s *Secrets) AwsGenerateStsCredentials2(ctx context.Context, name string, a } // AwsListRoles List the existing roles in this backend -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsListRoles(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -424,8 +408,7 @@ func (s *Secrets) AwsListRoles(ctx context.Context, awsMountPath string, options } // AwsReadLeaseConfiguration -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsReadLeaseConfiguration(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsReadLeaseConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -449,8 +432,7 @@ func (s *Secrets) AwsReadLeaseConfiguration(ctx context.Context, awsMountPath st // AwsReadRole Read, write and reference IAM policies that access keys can be made for. // name: Name of the policy -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsReadRole(ctx context.Context, name string, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -474,8 +456,7 @@ func (s *Secrets) AwsReadRole(ctx context.Context, name string, awsMountPath str } // AwsReadRootIamCredentialsConfiguration -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsReadRootIamCredentialsConfiguration(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsReadRootIamCredentialsConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -498,8 +479,7 @@ func (s *Secrets) AwsReadRootIamCredentialsConfiguration(ctx context.Context, aw } // AwsRotateRootIamCredentials -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsRotateRootIamCredentials(ctx context.Context, awsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsRotateRootIamCredentials(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -523,8 +503,7 @@ func (s *Secrets) AwsRotateRootIamCredentials(ctx context.Context, awsMountPath // AwsWriteRole Read, write and reference IAM policies that access keys can be made for. // name: Name of the policy -// awsMountPath: Path that the backend was mounted at -func (s *Secrets) AwsWriteRole(ctx context.Context, name string, awsMountPath string, request schema.AwsWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AwsWriteRole(ctx context.Context, name string, request schema.AwsWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -548,8 +527,7 @@ func (s *Secrets) AwsWriteRole(ctx context.Context, name string, awsMountPath st } // AzureConfigure -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureConfigure(ctx context.Context, azureMountPath string, request schema.AzureConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureConfigure(ctx context.Context, request schema.AzureConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -572,8 +550,7 @@ func (s *Secrets) AzureConfigure(ctx context.Context, azureMountPath string, req } // AzureDeleteConfiguration -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureDeleteConfiguration(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureDeleteConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -597,8 +574,7 @@ func (s *Secrets) AzureDeleteConfiguration(ctx context.Context, azureMountPath s // AzureDeleteRole Manage the Vault roles used to generate Azure credentials. // name: Name of the role. -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureDeleteRole(ctx context.Context, name string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -622,8 +598,7 @@ func (s *Secrets) AzureDeleteRole(ctx context.Context, name string, azureMountPa } // AzureListRoles List existing roles. -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureListRoles(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -647,8 +622,7 @@ func (s *Secrets) AzureListRoles(ctx context.Context, azureMountPath string, opt } // AzureReadConfiguration -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureReadConfiguration(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -672,8 +646,7 @@ func (s *Secrets) AzureReadConfiguration(ctx context.Context, azureMountPath str // AzureReadRole Manage the Vault roles used to generate Azure credentials. // name: Name of the role. -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureReadRole(ctx context.Context, name string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -698,8 +671,7 @@ func (s *Secrets) AzureReadRole(ctx context.Context, name string, azureMountPath // AzureRequestServicePrincipalCredentials // role: Name of the Vault role -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureRequestServicePrincipalCredentials(ctx context.Context, role string, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureRequestServicePrincipalCredentials(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -723,8 +695,7 @@ func (s *Secrets) AzureRequestServicePrincipalCredentials(ctx context.Context, r } // AzureRotateRoot -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureRotateRoot(ctx context.Context, azureMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureRotateRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -748,8 +719,7 @@ func (s *Secrets) AzureRotateRoot(ctx context.Context, azureMountPath string, op // AzureWriteRole Manage the Vault roles used to generate Azure credentials. // name: Name of the role. -// azureMountPath: Path that the backend was mounted at -func (s *Secrets) AzureWriteRole(ctx context.Context, name string, azureMountPath string, request schema.AzureWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) AzureWriteRole(ctx context.Context, name string, request schema.AzureWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -773,8 +743,7 @@ func (s *Secrets) AzureWriteRole(ctx context.Context, name string, azureMountPat } // ConsulConfigureAccess -// consulMountPath: Path that the backend was mounted at -func (s *Secrets) ConsulConfigureAccess(ctx context.Context, consulMountPath string, request schema.ConsulConfigureAccessRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) ConsulConfigureAccess(ctx context.Context, request schema.ConsulConfigureAccessRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -798,8 +767,7 @@ func (s *Secrets) ConsulConfigureAccess(ctx context.Context, consulMountPath str // ConsulDeleteRole // name: Name of the role. -// consulMountPath: Path that the backend was mounted at -func (s *Secrets) ConsulDeleteRole(ctx context.Context, name string, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) ConsulDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -824,8 +792,7 @@ func (s *Secrets) ConsulDeleteRole(ctx context.Context, name string, consulMount // ConsulGenerateCredentials // role: Name of the role. -// consulMountPath: Path that the backend was mounted at -func (s *Secrets) ConsulGenerateCredentials(ctx context.Context, role string, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) ConsulGenerateCredentials(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -849,8 +816,7 @@ func (s *Secrets) ConsulGenerateCredentials(ctx context.Context, role string, co } // ConsulListRoles -// consulMountPath: Path that the backend was mounted at -func (s *Secrets) ConsulListRoles(ctx context.Context, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) ConsulListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -874,8 +840,7 @@ func (s *Secrets) ConsulListRoles(ctx context.Context, consulMountPath string, o } // ConsulReadAccessConfiguration -// consulMountPath: Path that the backend was mounted at -func (s *Secrets) ConsulReadAccessConfiguration(ctx context.Context, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) ConsulReadAccessConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -899,8 +864,7 @@ func (s *Secrets) ConsulReadAccessConfiguration(ctx context.Context, consulMount // ConsulReadRole // name: Name of the role. -// consulMountPath: Path that the backend was mounted at -func (s *Secrets) ConsulReadRole(ctx context.Context, name string, consulMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) ConsulReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -925,8 +889,7 @@ func (s *Secrets) ConsulReadRole(ctx context.Context, name string, consulMountPa // ConsulWriteRole // name: Name of the role. -// consulMountPath: Path that the backend was mounted at -func (s *Secrets) ConsulWriteRole(ctx context.Context, name string, consulMountPath string, request schema.ConsulWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) ConsulWriteRole(ctx context.Context, name string, request schema.ConsulWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1024,8 +987,7 @@ func (s *Secrets) CubbyholeWrite(ctx context.Context, path string, options ...Re // DatabaseConfigureConnection // name: Name of this database connection -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseConfigureConnection(ctx context.Context, name string, databaseMountPath string, request schema.DatabaseConfigureConnectionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseConfigureConnection(ctx context.Context, name string, request schema.DatabaseConfigureConnectionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1050,8 +1012,7 @@ func (s *Secrets) DatabaseConfigureConnection(ctx context.Context, name string, // DatabaseDeleteConnectionConfiguration // name: Name of this database connection -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseDeleteConnectionConfiguration(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseDeleteConnectionConfiguration(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1076,8 +1037,7 @@ func (s *Secrets) DatabaseDeleteConnectionConfiguration(ctx context.Context, nam // DatabaseDeleteRole Manage the roles that can be created with this backend. // name: Name of the role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseDeleteRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1102,8 +1062,7 @@ func (s *Secrets) DatabaseDeleteRole(ctx context.Context, name string, databaseM // DatabaseDeleteStaticRole Manage the static roles that can be created with this backend. // name: Name of the role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseDeleteStaticRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseDeleteStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1128,8 +1087,7 @@ func (s *Secrets) DatabaseDeleteStaticRole(ctx context.Context, name string, dat // DatabaseGenerateCredentials Request database credentials for a certain role. // name: Name of the role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseGenerateCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseGenerateCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1153,8 +1111,7 @@ func (s *Secrets) DatabaseGenerateCredentials(ctx context.Context, name string, } // DatabaseListConnections Configure connection details to a database plugin. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseListConnections(ctx context.Context, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseListConnections(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1178,8 +1135,7 @@ func (s *Secrets) DatabaseListConnections(ctx context.Context, databaseMountPath } // DatabaseListRoles Manage the roles that can be created with this backend. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseListRoles(ctx context.Context, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1203,8 +1159,7 @@ func (s *Secrets) DatabaseListRoles(ctx context.Context, databaseMountPath strin } // DatabaseListStaticRoles Manage the static roles that can be created with this backend. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseListStaticRoles(ctx context.Context, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseListStaticRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1229,8 +1184,7 @@ func (s *Secrets) DatabaseListStaticRoles(ctx context.Context, databaseMountPath // DatabaseReadConnectionConfiguration // name: Name of this database connection -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseReadConnectionConfiguration(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseReadConnectionConfiguration(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1255,8 +1209,7 @@ func (s *Secrets) DatabaseReadConnectionConfiguration(ctx context.Context, name // DatabaseReadRole Manage the roles that can be created with this backend. // name: Name of the role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseReadRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1281,8 +1234,7 @@ func (s *Secrets) DatabaseReadRole(ctx context.Context, name string, databaseMou // DatabaseReadStaticRole Manage the static roles that can be created with this backend. // name: Name of the role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseReadStaticRole(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseReadStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1307,8 +1259,7 @@ func (s *Secrets) DatabaseReadStaticRole(ctx context.Context, name string, datab // DatabaseReadStaticRoleCredentials Request database credentials for a certain static role. These credentials are rotated periodically. // name: Name of the static role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseReadStaticRoleCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseReadStaticRoleCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1333,8 +1284,7 @@ func (s *Secrets) DatabaseReadStaticRoleCredentials(ctx context.Context, name st // DatabaseResetConnection Resets a database plugin. // name: Name of this database connection -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseResetConnection(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseResetConnection(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1359,8 +1309,7 @@ func (s *Secrets) DatabaseResetConnection(ctx context.Context, name string, data // DatabaseRotateRootCredentials // name: Name of this database connection -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseRotateRootCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseRotateRootCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1385,8 +1334,7 @@ func (s *Secrets) DatabaseRotateRootCredentials(ctx context.Context, name string // DatabaseRotateStaticRoleCredentials // name: Name of the static role -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseRotateStaticRoleCredentials(ctx context.Context, name string, databaseMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseRotateStaticRoleCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1411,8 +1359,7 @@ func (s *Secrets) DatabaseRotateStaticRoleCredentials(ctx context.Context, name // DatabaseWriteRole Manage the roles that can be created with this backend. // name: Name of the role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseWriteRole(ctx context.Context, name string, databaseMountPath string, request schema.DatabaseWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseWriteRole(ctx context.Context, name string, request schema.DatabaseWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1437,8 +1384,7 @@ func (s *Secrets) DatabaseWriteRole(ctx context.Context, name string, databaseMo // DatabaseWriteStaticRole Manage the static roles that can be created with this backend. // name: Name of the role. -// databaseMountPath: Path that the backend was mounted at -func (s *Secrets) DatabaseWriteStaticRole(ctx context.Context, name string, databaseMountPath string, request schema.DatabaseWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) DatabaseWriteStaticRole(ctx context.Context, name string, request schema.DatabaseWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1462,8 +1408,7 @@ func (s *Secrets) DatabaseWriteStaticRole(ctx context.Context, name string, data } // GoogleCloudConfigure -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudConfigure(ctx context.Context, gcpMountPath string, request schema.GoogleCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudConfigure(ctx context.Context, request schema.GoogleCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1487,8 +1432,7 @@ func (s *Secrets) GoogleCloudConfigure(ctx context.Context, gcpMountPath string, // GoogleCloudDeleteImpersonatedAccount // name: Required. Name to refer to this impersonated account in Vault. Cannot be updated. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudDeleteImpersonatedAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudDeleteImpersonatedAccount(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1513,8 +1457,7 @@ func (s *Secrets) GoogleCloudDeleteImpersonatedAccount(ctx context.Context, name // GoogleCloudDeleteRoleset // name: Required. Name of the role. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudDeleteRoleset(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudDeleteRoleset(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1539,8 +1482,7 @@ func (s *Secrets) GoogleCloudDeleteRoleset(ctx context.Context, name string, gcp // GoogleCloudDeleteStaticAccount // name: Required. Name to refer to this static account in Vault. Cannot be updated. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudDeleteStaticAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudDeleteStaticAccount(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1565,8 +1507,7 @@ func (s *Secrets) GoogleCloudDeleteStaticAccount(ctx context.Context, name strin // GoogleCloudGenerateImpersonatedAccountAccessToken // name: Required. Name of the impersonated account. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1591,8 +1532,7 @@ func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken(ctx context. // GoogleCloudGenerateImpersonatedAccountAccessToken2 // name: Required. Name of the impersonated account. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken2(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken2(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1617,8 +1557,7 @@ func (s *Secrets) GoogleCloudGenerateImpersonatedAccountAccessToken2(ctx context // GoogleCloudGenerateRolesetAccessToken // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetAccessToken(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetAccessToken(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1643,8 +1582,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetAccessToken(ctx context.Context, rol // GoogleCloudGenerateRolesetAccessToken2 // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetAccessToken2(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetAccessToken2(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1669,8 +1607,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetAccessToken2(ctx context.Context, ro // GoogleCloudGenerateRolesetAccessTokenWithParameters // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1695,8 +1632,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters(ctx contex // GoogleCloudGenerateRolesetAccessTokenWithParameters2 // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters2(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters2(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1721,8 +1657,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetAccessTokenWithParameters2(ctx conte // GoogleCloudGenerateRolesetKey // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetKey(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetKey(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1747,8 +1682,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetKey(ctx context.Context, roleset str // GoogleCloudGenerateRolesetKey2 // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetKey2(ctx context.Context, roleset string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetKey2(ctx context.Context, roleset string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1773,8 +1707,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetKey2(ctx context.Context, roleset st // GoogleCloudGenerateRolesetKeyWithParameters // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters(ctx context.Context, roleset string, gcpMountPath string, request schema.GoogleCloudGenerateRolesetKeyWithParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters(ctx context.Context, roleset string, request schema.GoogleCloudGenerateRolesetKeyWithParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1799,8 +1732,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters(ctx context.Contex // GoogleCloudGenerateRolesetKeyWithParameters2 // roleset: Required. Name of the role set. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters2(ctx context.Context, roleset string, gcpMountPath string, request schema.GoogleCloudGenerateRolesetKeyWithParameters2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters2(ctx context.Context, roleset string, request schema.GoogleCloudGenerateRolesetKeyWithParameters2Request, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1825,8 +1757,7 @@ func (s *Secrets) GoogleCloudGenerateRolesetKeyWithParameters2(ctx context.Conte // GoogleCloudGenerateStaticAccountAccessToken // name: Required. Name of the static account. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateStaticAccountAccessToken(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateStaticAccountAccessToken(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1851,8 +1782,7 @@ func (s *Secrets) GoogleCloudGenerateStaticAccountAccessToken(ctx context.Contex // GoogleCloudGenerateStaticAccountAccessTokenWithParameters // name: Required. Name of the static account. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateStaticAccountAccessTokenWithParameters(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateStaticAccountAccessTokenWithParameters(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1877,8 +1807,7 @@ func (s *Secrets) GoogleCloudGenerateStaticAccountAccessTokenWithParameters(ctx // GoogleCloudGenerateStaticAccountKey // name: Required. Name of the static account. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateStaticAccountKey(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateStaticAccountKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1903,8 +1832,7 @@ func (s *Secrets) GoogleCloudGenerateStaticAccountKey(ctx context.Context, name // GoogleCloudGenerateStaticAccountKeyWithParameters // name: Required. Name of the static account. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudGenerateStaticAccountKeyWithParameters(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudGenerateStaticAccountKeyWithParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudGenerateStaticAccountKeyWithParameters(ctx context.Context, name string, request schema.GoogleCloudGenerateStaticAccountKeyWithParametersRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1928,8 +1856,7 @@ func (s *Secrets) GoogleCloudGenerateStaticAccountKeyWithParameters(ctx context. } // GoogleCloudKmsConfigure -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsConfigure(ctx context.Context, gcpkmsMountPath string, request schema.GoogleCloudKmsConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsConfigure(ctx context.Context, request schema.GoogleCloudKmsConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1953,8 +1880,7 @@ func (s *Secrets) GoogleCloudKmsConfigure(ctx context.Context, gcpkmsMountPath s // GoogleCloudKmsConfigureKey // key: Name of the key in Vault. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsConfigureKey(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsConfigureKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsConfigureKey(ctx context.Context, key string, request schema.GoogleCloudKmsConfigureKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -1979,8 +1905,7 @@ func (s *Secrets) GoogleCloudKmsConfigureKey(ctx context.Context, key string, gc // GoogleCloudKmsDecrypt Decrypt a ciphertext value using a named key // key: Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsDecrypt(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsDecrypt(ctx context.Context, key string, request schema.GoogleCloudKmsDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2004,8 +1929,7 @@ func (s *Secrets) GoogleCloudKmsDecrypt(ctx context.Context, key string, gcpkmsM } // GoogleCloudKmsDeleteConfiguration -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsDeleteConfiguration(ctx context.Context, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsDeleteConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2029,8 +1953,7 @@ func (s *Secrets) GoogleCloudKmsDeleteConfiguration(ctx context.Context, gcpkmsM // GoogleCloudKmsDeleteKey Interact with crypto keys in Vault and Google Cloud KMS // key: Name of the key in Vault. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsDeleteKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsDeleteKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2055,8 +1978,7 @@ func (s *Secrets) GoogleCloudKmsDeleteKey(ctx context.Context, key string, gcpkm // GoogleCloudKmsDeregisterKey // key: Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsDeregisterKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsDeregisterKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2081,8 +2003,7 @@ func (s *Secrets) GoogleCloudKmsDeregisterKey(ctx context.Context, key string, g // GoogleCloudKmsDeregisterKey2 // key: Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsDeregisterKey2(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsDeregisterKey2(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2107,8 +2028,7 @@ func (s *Secrets) GoogleCloudKmsDeregisterKey2(ctx context.Context, key string, // GoogleCloudKmsEncrypt Encrypt a plaintext value using a named key // key: Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsEncrypt(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsEncrypt(ctx context.Context, key string, request schema.GoogleCloudKmsEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2132,8 +2052,7 @@ func (s *Secrets) GoogleCloudKmsEncrypt(ctx context.Context, key string, gcpkmsM } // GoogleCloudKmsListKeys List named keys -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsListKeys(ctx context.Context, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2157,8 +2076,7 @@ func (s *Secrets) GoogleCloudKmsListKeys(ctx context.Context, gcpkmsMountPath st } // GoogleCloudKmsReadConfiguration -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsReadConfiguration(ctx context.Context, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2182,8 +2100,7 @@ func (s *Secrets) GoogleCloudKmsReadConfiguration(ctx context.Context, gcpkmsMou // GoogleCloudKmsReadKey Interact with crypto keys in Vault and Google Cloud KMS // key: Name of the key in Vault. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsReadKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsReadKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2208,8 +2125,7 @@ func (s *Secrets) GoogleCloudKmsReadKey(ctx context.Context, key string, gcpkmsM // GoogleCloudKmsReadKeyConfiguration // key: Name of the key in Vault. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsReadKeyConfiguration(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsReadKeyConfiguration(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2234,8 +2150,7 @@ func (s *Secrets) GoogleCloudKmsReadKeyConfiguration(ctx context.Context, key st // GoogleCloudKmsReencrypt Re-encrypt existing ciphertext data to a new version // key: Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsReencrypt(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsReencryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsReencrypt(ctx context.Context, key string, request schema.GoogleCloudKmsReencryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2260,8 +2175,7 @@ func (s *Secrets) GoogleCloudKmsReencrypt(ctx context.Context, key string, gcpkm // GoogleCloudKmsRegisterKey Register an existing crypto key in Google Cloud KMS // key: Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsRegisterKey(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsRegisterKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsRegisterKey(ctx context.Context, key string, request schema.GoogleCloudKmsRegisterKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2286,8 +2200,7 @@ func (s *Secrets) GoogleCloudKmsRegisterKey(ctx context.Context, key string, gcp // GoogleCloudKmsRetrievePublicKey Retrieve the public key associated with the named key // key: Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsRetrievePublicKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsRetrievePublicKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2312,8 +2225,7 @@ func (s *Secrets) GoogleCloudKmsRetrievePublicKey(ctx context.Context, key strin // GoogleCloudKmsRotateKey Rotate a crypto key to a new primary version // key: Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsRotateKey(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsRotateKey(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2338,8 +2250,7 @@ func (s *Secrets) GoogleCloudKmsRotateKey(ctx context.Context, key string, gcpkm // GoogleCloudKmsSign Signs a message or digest using a named key // key: Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsSign(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsSign(ctx context.Context, key string, request schema.GoogleCloudKmsSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2364,8 +2275,7 @@ func (s *Secrets) GoogleCloudKmsSign(ctx context.Context, key string, gcpkmsMoun // GoogleCloudKmsTrimKeyVersions // key: Name of the key in Vault. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsTrimKeyVersions(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsTrimKeyVersions(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2390,8 +2300,7 @@ func (s *Secrets) GoogleCloudKmsTrimKeyVersions(ctx context.Context, key string, // GoogleCloudKmsTrimKeyVersions2 // key: Name of the key in Vault. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsTrimKeyVersions2(ctx context.Context, key string, gcpkmsMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsTrimKeyVersions2(ctx context.Context, key string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2416,8 +2325,7 @@ func (s *Secrets) GoogleCloudKmsTrimKeyVersions2(ctx context.Context, key string // GoogleCloudKmsVerify Verify a signature using a named key // key: Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsVerify(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsVerify(ctx context.Context, key string, request schema.GoogleCloudKmsVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2442,8 +2350,7 @@ func (s *Secrets) GoogleCloudKmsVerify(ctx context.Context, key string, gcpkmsMo // GoogleCloudKmsWriteKey Interact with crypto keys in Vault and Google Cloud KMS // key: Name of the key in Vault. -// gcpkmsMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudKmsWriteKey(ctx context.Context, key string, gcpkmsMountPath string, request schema.GoogleCloudKmsWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudKmsWriteKey(ctx context.Context, key string, request schema.GoogleCloudKmsWriteKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2467,8 +2374,7 @@ func (s *Secrets) GoogleCloudKmsWriteKey(ctx context.Context, key string, gcpkms } // GoogleCloudListImpersonatedAccounts -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudListImpersonatedAccounts(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudListImpersonatedAccounts(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2492,8 +2398,7 @@ func (s *Secrets) GoogleCloudListImpersonatedAccounts(ctx context.Context, gcpMo } // GoogleCloudListImpersonatedAccounts2 -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudListImpersonatedAccounts2(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudListImpersonatedAccounts2(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2517,8 +2422,7 @@ func (s *Secrets) GoogleCloudListImpersonatedAccounts2(ctx context.Context, gcpM } // GoogleCloudListRolesets -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudListRolesets(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudListRolesets(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2542,8 +2446,7 @@ func (s *Secrets) GoogleCloudListRolesets(ctx context.Context, gcpMountPath stri } // GoogleCloudListRolesets2 -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudListRolesets2(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudListRolesets2(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2567,8 +2470,7 @@ func (s *Secrets) GoogleCloudListRolesets2(ctx context.Context, gcpMountPath str } // GoogleCloudListStaticAccounts -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudListStaticAccounts(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudListStaticAccounts(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2592,8 +2494,7 @@ func (s *Secrets) GoogleCloudListStaticAccounts(ctx context.Context, gcpMountPat } // GoogleCloudListStaticAccounts2 -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudListStaticAccounts2(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudListStaticAccounts2(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2617,8 +2518,7 @@ func (s *Secrets) GoogleCloudListStaticAccounts2(ctx context.Context, gcpMountPa } // GoogleCloudReadConfiguration -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudReadConfiguration(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2642,8 +2542,7 @@ func (s *Secrets) GoogleCloudReadConfiguration(ctx context.Context, gcpMountPath // GoogleCloudReadImpersonatedAccount // name: Required. Name to refer to this impersonated account in Vault. Cannot be updated. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudReadImpersonatedAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudReadImpersonatedAccount(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2668,8 +2567,7 @@ func (s *Secrets) GoogleCloudReadImpersonatedAccount(ctx context.Context, name s // GoogleCloudReadRoleset // name: Required. Name of the role. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudReadRoleset(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudReadRoleset(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2694,8 +2592,7 @@ func (s *Secrets) GoogleCloudReadRoleset(ctx context.Context, name string, gcpMo // GoogleCloudReadStaticAccount // name: Required. Name to refer to this static account in Vault. Cannot be updated. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudReadStaticAccount(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudReadStaticAccount(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2720,8 +2617,7 @@ func (s *Secrets) GoogleCloudReadStaticAccount(ctx context.Context, name string, // GoogleCloudRotateRoleset // name: Name of the role. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudRotateRoleset(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudRotateRoleset(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2746,8 +2642,7 @@ func (s *Secrets) GoogleCloudRotateRoleset(ctx context.Context, name string, gcp // GoogleCloudRotateRolesetKey // name: Name of the role. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudRotateRolesetKey(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudRotateRolesetKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2771,8 +2666,7 @@ func (s *Secrets) GoogleCloudRotateRolesetKey(ctx context.Context, name string, } // GoogleCloudRotateRootCredentials -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudRotateRootCredentials(ctx context.Context, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudRotateRootCredentials(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2796,8 +2690,7 @@ func (s *Secrets) GoogleCloudRotateRootCredentials(ctx context.Context, gcpMount // GoogleCloudRotateStaticAccountKey // name: Name of the account. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudRotateStaticAccountKey(ctx context.Context, name string, gcpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudRotateStaticAccountKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2822,8 +2715,7 @@ func (s *Secrets) GoogleCloudRotateStaticAccountKey(ctx context.Context, name st // GoogleCloudWriteImpersonatedAccount // name: Required. Name to refer to this impersonated account in Vault. Cannot be updated. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudWriteImpersonatedAccount(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudWriteImpersonatedAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudWriteImpersonatedAccount(ctx context.Context, name string, request schema.GoogleCloudWriteImpersonatedAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2848,8 +2740,7 @@ func (s *Secrets) GoogleCloudWriteImpersonatedAccount(ctx context.Context, name // GoogleCloudWriteRoleset // name: Required. Name of the role. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudWriteRoleset(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudWriteRolesetRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudWriteRoleset(ctx context.Context, name string, request schema.GoogleCloudWriteRolesetRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2874,8 +2765,7 @@ func (s *Secrets) GoogleCloudWriteRoleset(ctx context.Context, name string, gcpM // GoogleCloudWriteStaticAccount // name: Required. Name to refer to this static account in Vault. Cannot be updated. -// gcpMountPath: Path that the backend was mounted at -func (s *Secrets) GoogleCloudWriteStaticAccount(ctx context.Context, name string, gcpMountPath string, request schema.GoogleCloudWriteStaticAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) GoogleCloudWriteStaticAccount(ctx context.Context, name string, request schema.GoogleCloudWriteStaticAccountRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2899,8 +2789,7 @@ func (s *Secrets) GoogleCloudWriteStaticAccount(ctx context.Context, name string } // KubernetesCheckConfiguration -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesCheckConfiguration(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesCheckConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2923,8 +2812,7 @@ func (s *Secrets) KubernetesCheckConfiguration(ctx context.Context, kubernetesMo } // KubernetesConfigure -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesConfigure(ctx context.Context, kubernetesMountPath string, request schema.KubernetesConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesConfigure(ctx context.Context, request schema.KubernetesConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2947,8 +2835,7 @@ func (s *Secrets) KubernetesConfigure(ctx context.Context, kubernetesMountPath s } // KubernetesDeleteConfiguration -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesDeleteConfiguration(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesDeleteConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2972,8 +2859,7 @@ func (s *Secrets) KubernetesDeleteConfiguration(ctx context.Context, kubernetesM // KubernetesDeleteRole // name: Name of the role -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesDeleteRole(ctx context.Context, name string, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -2998,8 +2884,7 @@ func (s *Secrets) KubernetesDeleteRole(ctx context.Context, name string, kuberne // KubernetesGenerateCredentials // name: Name of the Vault role -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesGenerateCredentials(ctx context.Context, name string, kubernetesMountPath string, request schema.KubernetesGenerateCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesGenerateCredentials(ctx context.Context, name string, request schema.KubernetesGenerateCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3023,8 +2908,7 @@ func (s *Secrets) KubernetesGenerateCredentials(ctx context.Context, name string } // KubernetesListRoles -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesListRoles(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3048,8 +2932,7 @@ func (s *Secrets) KubernetesListRoles(ctx context.Context, kubernetesMountPath s } // KubernetesReadConfiguration -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesReadConfiguration(ctx context.Context, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3073,8 +2956,7 @@ func (s *Secrets) KubernetesReadConfiguration(ctx context.Context, kubernetesMou // KubernetesReadRole // name: Name of the role -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesReadRole(ctx context.Context, name string, kubernetesMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3099,8 +2981,7 @@ func (s *Secrets) KubernetesReadRole(ctx context.Context, name string, kubernete // KubernetesWriteRole // name: Name of the role -// kubernetesMountPath: Path that the backend was mounted at -func (s *Secrets) KubernetesWriteRole(ctx context.Context, name string, kubernetesMountPath string, request schema.KubernetesWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KubernetesWriteRole(ctx context.Context, name string, request schema.KubernetesWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3125,8 +3006,7 @@ func (s *Secrets) KubernetesWriteRole(ctx context.Context, name string, kubernet // KvV1Delete // path: Location of the secret. -// kvV1MountPath: Path that the backend was mounted at -func (s *Secrets) KvV1Delete(ctx context.Context, path string, kvV1MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV1Delete(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3151,8 +3031,7 @@ func (s *Secrets) KvV1Delete(ctx context.Context, path string, kvV1MountPath str // KvV1Read // path: Location of the secret. -// kvV1MountPath: Path that the backend was mounted at -func (s *Secrets) KvV1Read(ctx context.Context, path string, kvV1MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV1Read(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3178,8 +3057,7 @@ func (s *Secrets) KvV1Read(ctx context.Context, path string, kvV1MountPath strin // KvV1Write // path: Location of the secret. -// kvV1MountPath: Path that the backend was mounted at -func (s *Secrets) KvV1Write(ctx context.Context, path string, kvV1MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV1Write(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3203,8 +3081,7 @@ func (s *Secrets) KvV1Write(ctx context.Context, path string, kvV1MountPath stri } // KvV2Configure Configure backend level settings that are applied to every key in the key-value store. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2Configure(ctx context.Context, kvV2MountPath string, request schema.KvV2ConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV2Configure(ctx context.Context, request schema.KvV2ConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3228,8 +3105,7 @@ func (s *Secrets) KvV2Configure(ctx context.Context, kvV2MountPath string, reque // KvV2Delete // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2Delete(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV2Delete(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3254,8 +3130,7 @@ func (s *Secrets) KvV2Delete(ctx context.Context, path string, kvV2MountPath str // KvV2DeleteMetadata // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2DeleteMetadata(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV2DeleteMetadata(ctx context.Context, path string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3280,8 +3155,7 @@ func (s *Secrets) KvV2DeleteMetadata(ctx context.Context, path string, kvV2Mount // KvV2DeleteVersions // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2DeleteVersions(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2DeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV2DeleteVersions(ctx context.Context, path string, request schema.KvV2DeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3306,8 +3180,7 @@ func (s *Secrets) KvV2DeleteVersions(ctx context.Context, path string, kvV2Mount // KvV2DestroyVersions // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2DestroyVersions(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2DestroyVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV2DestroyVersions(ctx context.Context, path string, request schema.KvV2DestroyVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3332,8 +3205,7 @@ func (s *Secrets) KvV2DestroyVersions(ctx context.Context, path string, kvV2Moun // KvV2Read // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2Read(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadResponse], error) { +func (s *Secrets) KvV2Read(ctx context.Context, path string, options ...RequestOption) (*Response[schema.KvV2ReadResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3357,8 +3229,7 @@ func (s *Secrets) KvV2Read(ctx context.Context, path string, kvV2MountPath strin } // KvV2ReadConfiguration Read the backend level settings. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2ReadConfiguration(ctx context.Context, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadConfigurationResponse], error) { +func (s *Secrets) KvV2ReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.KvV2ReadConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3382,8 +3253,7 @@ func (s *Secrets) KvV2ReadConfiguration(ctx context.Context, kvV2MountPath strin // KvV2ReadMetadata // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2ReadMetadata(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadMetadataResponse], error) { +func (s *Secrets) KvV2ReadMetadata(ctx context.Context, path string, options ...RequestOption) (*Response[schema.KvV2ReadMetadataResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3409,8 +3279,7 @@ func (s *Secrets) KvV2ReadMetadata(ctx context.Context, path string, kvV2MountPa // KvV2ReadSubkeys // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2ReadSubkeys(ctx context.Context, path string, kvV2MountPath string, options ...RequestOption) (*Response[schema.KvV2ReadSubkeysResponse], error) { +func (s *Secrets) KvV2ReadSubkeys(ctx context.Context, path string, options ...RequestOption) (*Response[schema.KvV2ReadSubkeysResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3435,8 +3304,7 @@ func (s *Secrets) KvV2ReadSubkeys(ctx context.Context, path string, kvV2MountPat // KvV2UndeleteVersions // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2UndeleteVersions(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2UndeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV2UndeleteVersions(ctx context.Context, path string, request schema.KvV2UndeleteVersionsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3461,8 +3329,7 @@ func (s *Secrets) KvV2UndeleteVersions(ctx context.Context, path string, kvV2Mou // KvV2Write // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2Write(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2WriteRequest, options ...RequestOption) (*Response[schema.KvV2WriteResponse], error) { +func (s *Secrets) KvV2Write(ctx context.Context, path string, request schema.KvV2WriteRequest, options ...RequestOption) (*Response[schema.KvV2WriteResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3487,8 +3354,7 @@ func (s *Secrets) KvV2Write(ctx context.Context, path string, kvV2MountPath stri // KvV2WriteMetadata // path: Location of the secret. -// kvV2MountPath: Path that the backend was mounted at -func (s *Secrets) KvV2WriteMetadata(ctx context.Context, path string, kvV2MountPath string, request schema.KvV2WriteMetadataRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) KvV2WriteMetadata(ctx context.Context, path string, request schema.KvV2WriteMetadataRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3512,8 +3378,7 @@ func (s *Secrets) KvV2WriteMetadata(ctx context.Context, path string, kvV2MountP } // LdapConfigure -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapConfigure(ctx context.Context, ldapMountPath string, request schema.LdapConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapConfigure(ctx context.Context, request schema.LdapConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3536,8 +3401,7 @@ func (s *Secrets) LdapConfigure(ctx context.Context, ldapMountPath string, reque } // LdapDeleteConfiguration -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapDeleteConfiguration(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapDeleteConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3561,8 +3425,7 @@ func (s *Secrets) LdapDeleteConfiguration(ctx context.Context, ldapMountPath str // LdapDeleteDynamicRole // name: Name of the role (lowercase) -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapDeleteDynamicRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapDeleteDynamicRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3587,8 +3450,7 @@ func (s *Secrets) LdapDeleteDynamicRole(ctx context.Context, name string, ldapMo // LdapDeleteStaticRole // name: Name of the role -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapDeleteStaticRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapDeleteStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3613,8 +3475,7 @@ func (s *Secrets) LdapDeleteStaticRole(ctx context.Context, name string, ldapMou // LdapLibraryCheckIn Check service accounts in to the library. // name: Name of the set. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryCheckIn(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryCheckInRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryCheckIn(ctx context.Context, name string, request schema.LdapLibraryCheckInRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3639,8 +3500,7 @@ func (s *Secrets) LdapLibraryCheckIn(ctx context.Context, name string, ldapMount // LdapLibraryCheckOut Check a service account out from the library. // name: Name of the set -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryCheckOut(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryCheckOutRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryCheckOut(ctx context.Context, name string, request schema.LdapLibraryCheckOutRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3665,8 +3525,7 @@ func (s *Secrets) LdapLibraryCheckOut(ctx context.Context, name string, ldapMoun // LdapLibraryCheckStatus Check the status of the service accounts in a library set. // name: Name of the set. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryCheckStatus(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryCheckStatus(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3691,8 +3550,7 @@ func (s *Secrets) LdapLibraryCheckStatus(ctx context.Context, name string, ldapM // LdapLibraryConfigure Update a library set. // name: Name of the set. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryConfigure(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryConfigure(ctx context.Context, name string, request schema.LdapLibraryConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3717,8 +3575,7 @@ func (s *Secrets) LdapLibraryConfigure(ctx context.Context, name string, ldapMou // LdapLibraryDelete Delete a library set. // name: Name of the set. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryDelete(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryDelete(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3743,8 +3600,7 @@ func (s *Secrets) LdapLibraryDelete(ctx context.Context, name string, ldapMountP // LdapLibraryForceCheckIn Check service accounts in to the library. // name: Name of the set. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryForceCheckIn(ctx context.Context, name string, ldapMountPath string, request schema.LdapLibraryForceCheckInRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryForceCheckIn(ctx context.Context, name string, request schema.LdapLibraryForceCheckInRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3768,8 +3624,7 @@ func (s *Secrets) LdapLibraryForceCheckIn(ctx context.Context, name string, ldap } // LdapLibraryList -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryList(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryList(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3794,8 +3649,7 @@ func (s *Secrets) LdapLibraryList(ctx context.Context, ldapMountPath string, opt // LdapLibraryRead Read a library set. // name: Name of the set. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapLibraryRead(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapLibraryRead(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3819,8 +3673,7 @@ func (s *Secrets) LdapLibraryRead(ctx context.Context, name string, ldapMountPat } // LdapListDynamicRoles -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapListDynamicRoles(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapListDynamicRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3844,8 +3697,7 @@ func (s *Secrets) LdapListDynamicRoles(ctx context.Context, ldapMountPath string } // LdapListStaticRoles -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapListStaticRoles(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapListStaticRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3869,8 +3721,7 @@ func (s *Secrets) LdapListStaticRoles(ctx context.Context, ldapMountPath string, } // LdapReadConfiguration -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapReadConfiguration(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3894,8 +3745,7 @@ func (s *Secrets) LdapReadConfiguration(ctx context.Context, ldapMountPath strin // LdapReadDynamicRole // name: Name of the role (lowercase) -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapReadDynamicRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapReadDynamicRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3920,8 +3770,7 @@ func (s *Secrets) LdapReadDynamicRole(ctx context.Context, name string, ldapMoun // LdapReadStaticRole // name: Name of the role -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapReadStaticRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapReadStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3946,8 +3795,7 @@ func (s *Secrets) LdapReadStaticRole(ctx context.Context, name string, ldapMount // LdapRequestDynamicRoleCredentials // name: Name of the dynamic role. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapRequestDynamicRoleCredentials(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapRequestDynamicRoleCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3972,8 +3820,7 @@ func (s *Secrets) LdapRequestDynamicRoleCredentials(ctx context.Context, name st // LdapRequestStaticRoleCredentials // name: Name of the static role. -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapRequestStaticRoleCredentials(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapRequestStaticRoleCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -3997,8 +3844,7 @@ func (s *Secrets) LdapRequestStaticRoleCredentials(ctx context.Context, name str } // LdapRotateRootCredentials -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapRotateRootCredentials(ctx context.Context, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapRotateRootCredentials(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4022,8 +3868,7 @@ func (s *Secrets) LdapRotateRootCredentials(ctx context.Context, ldapMountPath s // LdapRotateStaticRole // name: Name of the static role -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapRotateStaticRole(ctx context.Context, name string, ldapMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapRotateStaticRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4048,8 +3893,7 @@ func (s *Secrets) LdapRotateStaticRole(ctx context.Context, name string, ldapMou // LdapWriteDynamicRole // name: Name of the role (lowercase) -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapWriteDynamicRole(ctx context.Context, name string, ldapMountPath string, request schema.LdapWriteDynamicRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapWriteDynamicRole(ctx context.Context, name string, request schema.LdapWriteDynamicRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4074,8 +3918,7 @@ func (s *Secrets) LdapWriteDynamicRole(ctx context.Context, name string, ldapMou // LdapWriteStaticRole // name: Name of the role -// ldapMountPath: Path that the backend was mounted at -func (s *Secrets) LdapWriteStaticRole(ctx context.Context, name string, ldapMountPath string, request schema.LdapWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) LdapWriteStaticRole(ctx context.Context, name string, request schema.LdapWriteStaticRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4099,8 +3942,7 @@ func (s *Secrets) LdapWriteStaticRole(ctx context.Context, name string, ldapMoun } // MongoDbAtlasConfigure -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasConfigure(ctx context.Context, mongodbatlasMountPath string, request schema.MongoDbAtlasConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasConfigure(ctx context.Context, request schema.MongoDbAtlasConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4124,8 +3966,7 @@ func (s *Secrets) MongoDbAtlasConfigure(ctx context.Context, mongodbatlasMountPa // MongoDbAtlasDeleteRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. // name: Name of the Roles -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasDeleteRole(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4150,8 +3991,7 @@ func (s *Secrets) MongoDbAtlasDeleteRole(ctx context.Context, name string, mongo // MongoDbAtlasGenerateCredentials // name: Name of the role -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasGenerateCredentials(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasGenerateCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4176,8 +4016,7 @@ func (s *Secrets) MongoDbAtlasGenerateCredentials(ctx context.Context, name stri // MongoDbAtlasGenerateCredentials2 // name: Name of the role -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasGenerateCredentials2(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasGenerateCredentials2(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4201,8 +4040,7 @@ func (s *Secrets) MongoDbAtlasGenerateCredentials2(ctx context.Context, name str } // MongoDbAtlasListRoles List the existing roles in this backend -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasListRoles(ctx context.Context, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4226,8 +4064,7 @@ func (s *Secrets) MongoDbAtlasListRoles(ctx context.Context, mongodbatlasMountPa } // MongoDbAtlasReadConfiguration -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasReadConfiguration(ctx context.Context, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4251,8 +4088,7 @@ func (s *Secrets) MongoDbAtlasReadConfiguration(ctx context.Context, mongodbatla // MongoDbAtlasReadRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. // name: Name of the Roles -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasReadRole(ctx context.Context, name string, mongodbatlasMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4277,8 +4113,7 @@ func (s *Secrets) MongoDbAtlasReadRole(ctx context.Context, name string, mongodb // MongoDbAtlasWriteRole Manage the roles used to generate MongoDB Atlas Programmatic API Keys. // name: Name of the Roles -// mongodbatlasMountPath: Path that the backend was mounted at -func (s *Secrets) MongoDbAtlasWriteRole(ctx context.Context, name string, mongodbatlasMountPath string, request schema.MongoDbAtlasWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) MongoDbAtlasWriteRole(ctx context.Context, name string, request schema.MongoDbAtlasWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4302,8 +4137,7 @@ func (s *Secrets) MongoDbAtlasWriteRole(ctx context.Context, name string, mongod } // NomadConfigureAccess -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadConfigureAccess(ctx context.Context, nomadMountPath string, request schema.NomadConfigureAccessRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadConfigureAccess(ctx context.Context, request schema.NomadConfigureAccessRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4326,8 +4160,7 @@ func (s *Secrets) NomadConfigureAccess(ctx context.Context, nomadMountPath strin } // NomadConfigureLease -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadConfigureLease(ctx context.Context, nomadMountPath string, request schema.NomadConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadConfigureLease(ctx context.Context, request schema.NomadConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4350,8 +4183,7 @@ func (s *Secrets) NomadConfigureLease(ctx context.Context, nomadMountPath string } // NomadDeleteAccessConfiguration -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadDeleteAccessConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadDeleteAccessConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4374,8 +4206,7 @@ func (s *Secrets) NomadDeleteAccessConfiguration(ctx context.Context, nomadMount } // NomadDeleteLeaseConfiguration -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadDeleteLeaseConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadDeleteLeaseConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4399,8 +4230,7 @@ func (s *Secrets) NomadDeleteLeaseConfiguration(ctx context.Context, nomadMountP // NomadDeleteRole // name: Name of the role -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadDeleteRole(ctx context.Context, name string, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4425,8 +4255,7 @@ func (s *Secrets) NomadDeleteRole(ctx context.Context, name string, nomadMountPa // NomadGenerateCredentials // name: Name of the role -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadGenerateCredentials(ctx context.Context, name string, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadGenerateCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4450,8 +4279,7 @@ func (s *Secrets) NomadGenerateCredentials(ctx context.Context, name string, nom } // NomadListRoles -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadListRoles(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4475,8 +4303,7 @@ func (s *Secrets) NomadListRoles(ctx context.Context, nomadMountPath string, opt } // NomadReadAccessConfiguration -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadReadAccessConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadReadAccessConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4499,8 +4326,7 @@ func (s *Secrets) NomadReadAccessConfiguration(ctx context.Context, nomadMountPa } // NomadReadLeaseConfiguration -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadReadLeaseConfiguration(ctx context.Context, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadReadLeaseConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4524,8 +4350,7 @@ func (s *Secrets) NomadReadLeaseConfiguration(ctx context.Context, nomadMountPat // NomadReadRole // name: Name of the role -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadReadRole(ctx context.Context, name string, nomadMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4550,8 +4375,7 @@ func (s *Secrets) NomadReadRole(ctx context.Context, name string, nomadMountPath // NomadWriteRole // name: Name of the role -// nomadMountPath: Path that the backend was mounted at -func (s *Secrets) NomadWriteRole(ctx context.Context, name string, nomadMountPath string, request schema.NomadWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) NomadWriteRole(ctx context.Context, name string, request schema.NomadWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4575,8 +4399,7 @@ func (s *Secrets) NomadWriteRole(ctx context.Context, name string, nomadMountPat } // PkiConfigureAutoTidy -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiConfigureAutoTidy(ctx context.Context, pkiMountPath string, request schema.PkiConfigureAutoTidyRequest, options ...RequestOption) (*Response[schema.PkiConfigureAutoTidyResponse], error) { +func (s *Secrets) PkiConfigureAutoTidy(ctx context.Context, request schema.PkiConfigureAutoTidyRequest, options ...RequestOption) (*Response[schema.PkiConfigureAutoTidyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4599,8 +4422,7 @@ func (s *Secrets) PkiConfigureAutoTidy(ctx context.Context, pkiMountPath string, } // PkiConfigureCa -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiConfigureCa(ctx context.Context, pkiMountPath string, request schema.PkiConfigureCaRequest, options ...RequestOption) (*Response[schema.PkiConfigureCaResponse], error) { +func (s *Secrets) PkiConfigureCa(ctx context.Context, request schema.PkiConfigureCaRequest, options ...RequestOption) (*Response[schema.PkiConfigureCaResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4623,8 +4445,7 @@ func (s *Secrets) PkiConfigureCa(ctx context.Context, pkiMountPath string, reque } // PkiConfigureCluster -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiConfigureCluster(ctx context.Context, pkiMountPath string, request schema.PkiConfigureClusterRequest, options ...RequestOption) (*Response[schema.PkiConfigureClusterResponse], error) { +func (s *Secrets) PkiConfigureCluster(ctx context.Context, request schema.PkiConfigureClusterRequest, options ...RequestOption) (*Response[schema.PkiConfigureClusterResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4647,8 +4468,7 @@ func (s *Secrets) PkiConfigureCluster(ctx context.Context, pkiMountPath string, } // PkiConfigureCrl -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiConfigureCrl(ctx context.Context, pkiMountPath string, request schema.PkiConfigureCrlRequest, options ...RequestOption) (*Response[schema.PkiConfigureCrlResponse], error) { +func (s *Secrets) PkiConfigureCrl(ctx context.Context, request schema.PkiConfigureCrlRequest, options ...RequestOption) (*Response[schema.PkiConfigureCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4671,8 +4491,7 @@ func (s *Secrets) PkiConfigureCrl(ctx context.Context, pkiMountPath string, requ } // PkiConfigureIssuers -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiConfigureIssuers(ctx context.Context, pkiMountPath string, request schema.PkiConfigureIssuersRequest, options ...RequestOption) (*Response[schema.PkiConfigureIssuersResponse], error) { +func (s *Secrets) PkiConfigureIssuers(ctx context.Context, request schema.PkiConfigureIssuersRequest, options ...RequestOption) (*Response[schema.PkiConfigureIssuersResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4695,8 +4514,7 @@ func (s *Secrets) PkiConfigureIssuers(ctx context.Context, pkiMountPath string, } // PkiConfigureKeys -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiConfigureKeys(ctx context.Context, pkiMountPath string, request schema.PkiConfigureKeysRequest, options ...RequestOption) (*Response[schema.PkiConfigureKeysResponse], error) { +func (s *Secrets) PkiConfigureKeys(ctx context.Context, request schema.PkiConfigureKeysRequest, options ...RequestOption) (*Response[schema.PkiConfigureKeysResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4719,8 +4537,7 @@ func (s *Secrets) PkiConfigureKeys(ctx context.Context, pkiMountPath string, req } // PkiConfigureUrls -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiConfigureUrls(ctx context.Context, pkiMountPath string, request schema.PkiConfigureUrlsRequest, options ...RequestOption) (*Response[schema.PkiConfigureUrlsResponse], error) { +func (s *Secrets) PkiConfigureUrls(ctx context.Context, request schema.PkiConfigureUrlsRequest, options ...RequestOption) (*Response[schema.PkiConfigureUrlsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4743,8 +4560,7 @@ func (s *Secrets) PkiConfigureUrls(ctx context.Context, pkiMountPath string, req } // PkiCrossSignIntermediate -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiCrossSignIntermediate(ctx context.Context, pkiMountPath string, request schema.PkiCrossSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiCrossSignIntermediateResponse], error) { +func (s *Secrets) PkiCrossSignIntermediate(ctx context.Context, request schema.PkiCrossSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiCrossSignIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4768,8 +4584,7 @@ func (s *Secrets) PkiCrossSignIntermediate(ctx context.Context, pkiMountPath str // PkiDeleteIssuer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiDeleteIssuer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) PkiDeleteIssuer(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4794,8 +4609,7 @@ func (s *Secrets) PkiDeleteIssuer(ctx context.Context, issuerRef string, pkiMoun // PkiDeleteKey // keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiDeleteKey(ctx context.Context, keyRef string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) PkiDeleteKey(ctx context.Context, keyRef string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4820,8 +4634,7 @@ func (s *Secrets) PkiDeleteKey(ctx context.Context, keyRef string, pkiMountPath // PkiDeleteRole // name: Name of the role -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiDeleteRole(ctx context.Context, name string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) PkiDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4845,8 +4658,7 @@ func (s *Secrets) PkiDeleteRole(ctx context.Context, name string, pkiMountPath s } // PkiDeleteRoot -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiDeleteRoot(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) PkiDeleteRoot(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4869,8 +4681,7 @@ func (s *Secrets) PkiDeleteRoot(ctx context.Context, pkiMountPath string, option } // PkiGenerateExportedKey -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiGenerateExportedKey(ctx context.Context, pkiMountPath string, request schema.PkiGenerateExportedKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateExportedKeyResponse], error) { +func (s *Secrets) PkiGenerateExportedKey(ctx context.Context, request schema.PkiGenerateExportedKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateExportedKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4894,8 +4705,7 @@ func (s *Secrets) PkiGenerateExportedKey(ctx context.Context, pkiMountPath strin // PkiGenerateIntermediate // exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiGenerateIntermediate(ctx context.Context, exported string, pkiMountPath string, request schema.PkiGenerateIntermediateRequest, options ...RequestOption) (*Response[schema.PkiGenerateIntermediateResponse], error) { +func (s *Secrets) PkiGenerateIntermediate(ctx context.Context, exported string, request schema.PkiGenerateIntermediateRequest, options ...RequestOption) (*Response[schema.PkiGenerateIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4919,8 +4729,7 @@ func (s *Secrets) PkiGenerateIntermediate(ctx context.Context, exported string, } // PkiGenerateInternalKey -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiGenerateInternalKey(ctx context.Context, pkiMountPath string, request schema.PkiGenerateInternalKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateInternalKeyResponse], error) { +func (s *Secrets) PkiGenerateInternalKey(ctx context.Context, request schema.PkiGenerateInternalKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateInternalKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4943,8 +4752,7 @@ func (s *Secrets) PkiGenerateInternalKey(ctx context.Context, pkiMountPath strin } // PkiGenerateKmsKey -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiGenerateKmsKey(ctx context.Context, pkiMountPath string, request schema.PkiGenerateKmsKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateKmsKeyResponse], error) { +func (s *Secrets) PkiGenerateKmsKey(ctx context.Context, request schema.PkiGenerateKmsKeyRequest, options ...RequestOption) (*Response[schema.PkiGenerateKmsKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4968,8 +4776,7 @@ func (s *Secrets) PkiGenerateKmsKey(ctx context.Context, pkiMountPath string, re // PkiGenerateRoot // exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiGenerateRoot(ctx context.Context, exported string, pkiMountPath string, request schema.PkiGenerateRootRequest, options ...RequestOption) (*Response[schema.PkiGenerateRootResponse], error) { +func (s *Secrets) PkiGenerateRoot(ctx context.Context, exported string, request schema.PkiGenerateRootRequest, options ...RequestOption) (*Response[schema.PkiGenerateRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -4993,8 +4800,7 @@ func (s *Secrets) PkiGenerateRoot(ctx context.Context, exported string, pkiMount } // PkiImportKey -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiImportKey(ctx context.Context, pkiMountPath string, request schema.PkiImportKeyRequest, options ...RequestOption) (*Response[schema.PkiImportKeyResponse], error) { +func (s *Secrets) PkiImportKey(ctx context.Context, request schema.PkiImportKeyRequest, options ...RequestOption) (*Response[schema.PkiImportKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5018,8 +4824,7 @@ func (s *Secrets) PkiImportKey(ctx context.Context, pkiMountPath string, request // PkiIssueWithRole // role: The desired role with configuration for this request -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssueWithRole(ctx context.Context, role string, pkiMountPath string, request schema.PkiIssueWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssueWithRoleResponse], error) { +func (s *Secrets) PkiIssueWithRole(ctx context.Context, role string, request schema.PkiIssueWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssueWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5045,8 +4850,7 @@ func (s *Secrets) PkiIssueWithRole(ctx context.Context, role string, pkiMountPat // PkiIssuerIssueWithRole // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. // role: The desired role with configuration for this request -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerIssueWithRole(ctx context.Context, issuerRef string, role string, pkiMountPath string, request schema.PkiIssuerIssueWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerIssueWithRoleResponse], error) { +func (s *Secrets) PkiIssuerIssueWithRole(ctx context.Context, issuerRef string, role string, request schema.PkiIssuerIssueWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerIssueWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5072,8 +4876,7 @@ func (s *Secrets) PkiIssuerIssueWithRole(ctx context.Context, issuerRef string, // PkiIssuerReadCrl // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerReadCrl(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlResponse], error) { +func (s *Secrets) PkiIssuerReadCrl(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5098,8 +4901,7 @@ func (s *Secrets) PkiIssuerReadCrl(ctx context.Context, issuerRef string, pkiMou // PkiIssuerReadCrlDelta // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerReadCrlDelta(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaResponse], error) { +func (s *Secrets) PkiIssuerReadCrlDelta(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5124,8 +4926,7 @@ func (s *Secrets) PkiIssuerReadCrlDelta(ctx context.Context, issuerRef string, p // PkiIssuerReadCrlDeltaDer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerReadCrlDeltaDer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaDerResponse], error) { +func (s *Secrets) PkiIssuerReadCrlDeltaDer(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5150,8 +4951,7 @@ func (s *Secrets) PkiIssuerReadCrlDeltaDer(ctx context.Context, issuerRef string // PkiIssuerReadCrlDeltaPem // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerReadCrlDeltaPem(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaPemResponse], error) { +func (s *Secrets) PkiIssuerReadCrlDeltaPem(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDeltaPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5176,8 +4976,7 @@ func (s *Secrets) PkiIssuerReadCrlDeltaPem(ctx context.Context, issuerRef string // PkiIssuerReadCrlDer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerReadCrlDer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDerResponse], error) { +func (s *Secrets) PkiIssuerReadCrlDer(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5202,8 +5001,7 @@ func (s *Secrets) PkiIssuerReadCrlDer(ctx context.Context, issuerRef string, pki // PkiIssuerReadCrlPem // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerReadCrlPem(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlPemResponse], error) { +func (s *Secrets) PkiIssuerReadCrlPem(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiIssuerReadCrlPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5228,8 +5026,7 @@ func (s *Secrets) PkiIssuerReadCrlPem(ctx context.Context, issuerRef string, pki // PkiIssuerResignCrls // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerResignCrls(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerResignCrlsRequest, options ...RequestOption) (*Response[schema.PkiIssuerResignCrlsResponse], error) { +func (s *Secrets) PkiIssuerResignCrls(ctx context.Context, issuerRef string, request schema.PkiIssuerResignCrlsRequest, options ...RequestOption) (*Response[schema.PkiIssuerResignCrlsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5254,8 +5051,7 @@ func (s *Secrets) PkiIssuerResignCrls(ctx context.Context, issuerRef string, pki // PkiIssuerSignIntermediate // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerSignIntermediate(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignIntermediateResponse], error) { +func (s *Secrets) PkiIssuerSignIntermediate(ctx context.Context, issuerRef string, request schema.PkiIssuerSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5280,8 +5076,7 @@ func (s *Secrets) PkiIssuerSignIntermediate(ctx context.Context, issuerRef strin // PkiIssuerSignRevocationList // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerSignRevocationList(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignRevocationListRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignRevocationListResponse], error) { +func (s *Secrets) PkiIssuerSignRevocationList(ctx context.Context, issuerRef string, request schema.PkiIssuerSignRevocationListRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignRevocationListResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5306,8 +5101,7 @@ func (s *Secrets) PkiIssuerSignRevocationList(ctx context.Context, issuerRef str // PkiIssuerSignSelfIssued // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerSignSelfIssued(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignSelfIssuedRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignSelfIssuedResponse], error) { +func (s *Secrets) PkiIssuerSignSelfIssued(ctx context.Context, issuerRef string, request schema.PkiIssuerSignSelfIssuedRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignSelfIssuedResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5332,8 +5126,7 @@ func (s *Secrets) PkiIssuerSignSelfIssued(ctx context.Context, issuerRef string, // PkiIssuerSignVerbatim // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerSignVerbatim(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiIssuerSignVerbatimRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignVerbatimResponse], error) { +func (s *Secrets) PkiIssuerSignVerbatim(ctx context.Context, issuerRef string, request schema.PkiIssuerSignVerbatimRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignVerbatimResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5359,8 +5152,7 @@ func (s *Secrets) PkiIssuerSignVerbatim(ctx context.Context, issuerRef string, p // PkiIssuerSignVerbatimWithRole // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. // role: The desired role with configuration for this request -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerSignVerbatimWithRole(ctx context.Context, issuerRef string, role string, pkiMountPath string, request schema.PkiIssuerSignVerbatimWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignVerbatimWithRoleResponse], error) { +func (s *Secrets) PkiIssuerSignVerbatimWithRole(ctx context.Context, issuerRef string, role string, request schema.PkiIssuerSignVerbatimWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignVerbatimWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5387,8 +5179,7 @@ func (s *Secrets) PkiIssuerSignVerbatimWithRole(ctx context.Context, issuerRef s // PkiIssuerSignWithRole // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. // role: The desired role with configuration for this request -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuerSignWithRole(ctx context.Context, issuerRef string, role string, pkiMountPath string, request schema.PkiIssuerSignWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignWithRoleResponse], error) { +func (s *Secrets) PkiIssuerSignWithRole(ctx context.Context, issuerRef string, role string, request schema.PkiIssuerSignWithRoleRequest, options ...RequestOption) (*Response[schema.PkiIssuerSignWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5414,8 +5205,7 @@ func (s *Secrets) PkiIssuerSignWithRole(ctx context.Context, issuerRef string, r // PkiIssuersGenerateIntermediate // exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuersGenerateIntermediate(ctx context.Context, exported string, pkiMountPath string, request schema.PkiIssuersGenerateIntermediateRequest, options ...RequestOption) (*Response[schema.PkiIssuersGenerateIntermediateResponse], error) { +func (s *Secrets) PkiIssuersGenerateIntermediate(ctx context.Context, exported string, request schema.PkiIssuersGenerateIntermediateRequest, options ...RequestOption) (*Response[schema.PkiIssuersGenerateIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5440,8 +5230,7 @@ func (s *Secrets) PkiIssuersGenerateIntermediate(ctx context.Context, exported s // PkiIssuersGenerateRoot // exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuersGenerateRoot(ctx context.Context, exported string, pkiMountPath string, request schema.PkiIssuersGenerateRootRequest, options ...RequestOption) (*Response[schema.PkiIssuersGenerateRootResponse], error) { +func (s *Secrets) PkiIssuersGenerateRoot(ctx context.Context, exported string, request schema.PkiIssuersGenerateRootRequest, options ...RequestOption) (*Response[schema.PkiIssuersGenerateRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5465,8 +5254,7 @@ func (s *Secrets) PkiIssuersGenerateRoot(ctx context.Context, exported string, p } // PkiIssuersImportBundle -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuersImportBundle(ctx context.Context, pkiMountPath string, request schema.PkiIssuersImportBundleRequest, options ...RequestOption) (*Response[schema.PkiIssuersImportBundleResponse], error) { +func (s *Secrets) PkiIssuersImportBundle(ctx context.Context, request schema.PkiIssuersImportBundleRequest, options ...RequestOption) (*Response[schema.PkiIssuersImportBundleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5489,8 +5277,7 @@ func (s *Secrets) PkiIssuersImportBundle(ctx context.Context, pkiMountPath strin } // PkiIssuersImportCert -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuersImportCert(ctx context.Context, pkiMountPath string, request schema.PkiIssuersImportCertRequest, options ...RequestOption) (*Response[schema.PkiIssuersImportCertResponse], error) { +func (s *Secrets) PkiIssuersImportCert(ctx context.Context, request schema.PkiIssuersImportCertRequest, options ...RequestOption) (*Response[schema.PkiIssuersImportCertResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5514,8 +5301,7 @@ func (s *Secrets) PkiIssuersImportCert(ctx context.Context, pkiMountPath string, // PkiIssuersRotateRoot // exported: Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiIssuersRotateRoot(ctx context.Context, exported string, pkiMountPath string, request schema.PkiIssuersRotateRootRequest, options ...RequestOption) (*Response[schema.PkiIssuersRotateRootResponse], error) { +func (s *Secrets) PkiIssuersRotateRoot(ctx context.Context, exported string, request schema.PkiIssuersRotateRootRequest, options ...RequestOption) (*Response[schema.PkiIssuersRotateRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5539,8 +5325,7 @@ func (s *Secrets) PkiIssuersRotateRoot(ctx context.Context, exported string, pki } // PkiListCerts -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiListCerts(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListCertsResponse], error) { +func (s *Secrets) PkiListCerts(ctx context.Context, options ...RequestOption) (*Response[schema.PkiListCertsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5564,8 +5349,7 @@ func (s *Secrets) PkiListCerts(ctx context.Context, pkiMountPath string, options } // PkiListIssuers -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiListIssuers(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListIssuersResponse], error) { +func (s *Secrets) PkiListIssuers(ctx context.Context, options ...RequestOption) (*Response[schema.PkiListIssuersResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5589,8 +5373,7 @@ func (s *Secrets) PkiListIssuers(ctx context.Context, pkiMountPath string, optio } // PkiListKeys -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiListKeys(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListKeysResponse], error) { +func (s *Secrets) PkiListKeys(ctx context.Context, options ...RequestOption) (*Response[schema.PkiListKeysResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5614,8 +5397,7 @@ func (s *Secrets) PkiListKeys(ctx context.Context, pkiMountPath string, options } // PkiListRevokedCerts -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiListRevokedCerts(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListRevokedCertsResponse], error) { +func (s *Secrets) PkiListRevokedCerts(ctx context.Context, options ...RequestOption) (*Response[schema.PkiListRevokedCertsResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5639,8 +5421,7 @@ func (s *Secrets) PkiListRevokedCerts(ctx context.Context, pkiMountPath string, } // PkiListRoles -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiListRoles(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiListRolesResponse], error) { +func (s *Secrets) PkiListRoles(ctx context.Context, options ...RequestOption) (*Response[schema.PkiListRolesResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5664,8 +5445,7 @@ func (s *Secrets) PkiListRoles(ctx context.Context, pkiMountPath string, options } // PkiQueryOcsp -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiQueryOcsp(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) PkiQueryOcsp(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5689,8 +5469,7 @@ func (s *Secrets) PkiQueryOcsp(ctx context.Context, pkiMountPath string, options // PkiQueryOcspWithGetReq // req: base-64 encoded ocsp request -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiQueryOcspWithGetReq(ctx context.Context, req string, pkiMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) PkiQueryOcspWithGetReq(ctx context.Context, req string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5714,8 +5493,7 @@ func (s *Secrets) PkiQueryOcspWithGetReq(ctx context.Context, req string, pkiMou } // PkiReadAutoTidyConfiguration -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadAutoTidyConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadAutoTidyConfigurationResponse], error) { +func (s *Secrets) PkiReadAutoTidyConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadAutoTidyConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5738,8 +5516,7 @@ func (s *Secrets) PkiReadAutoTidyConfiguration(ctx context.Context, pkiMountPath } // PkiReadCaChainPem -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCaChainPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCaChainPemResponse], error) { +func (s *Secrets) PkiReadCaChainPem(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCaChainPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5762,8 +5539,7 @@ func (s *Secrets) PkiReadCaChainPem(ctx context.Context, pkiMountPath string, op } // PkiReadCaDer -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCaDer(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCaDerResponse], error) { +func (s *Secrets) PkiReadCaDer(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCaDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5786,8 +5562,7 @@ func (s *Secrets) PkiReadCaDer(ctx context.Context, pkiMountPath string, options } // PkiReadCaPem -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCaPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCaPemResponse], error) { +func (s *Secrets) PkiReadCaPem(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCaPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5811,8 +5586,7 @@ func (s *Secrets) PkiReadCaPem(ctx context.Context, pkiMountPath string, options // PkiReadCert // serial: Certificate serial number, in colon- or hyphen-separated octal -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCert(ctx context.Context, serial string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertResponse], error) { +func (s *Secrets) PkiReadCert(ctx context.Context, serial string, options ...RequestOption) (*Response[schema.PkiReadCertResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5836,8 +5610,7 @@ func (s *Secrets) PkiReadCert(ctx context.Context, serial string, pkiMountPath s } // PkiReadCertCaChain -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCertCaChain(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertCaChainResponse], error) { +func (s *Secrets) PkiReadCertCaChain(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCertCaChainResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5860,8 +5633,7 @@ func (s *Secrets) PkiReadCertCaChain(ctx context.Context, pkiMountPath string, o } // PkiReadCertCrl -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCertCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertCrlResponse], error) { +func (s *Secrets) PkiReadCertCrl(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCertCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5884,8 +5656,7 @@ func (s *Secrets) PkiReadCertCrl(ctx context.Context, pkiMountPath string, optio } // PkiReadCertDeltaCrl -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCertDeltaCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertDeltaCrlResponse], error) { +func (s *Secrets) PkiReadCertDeltaCrl(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCertDeltaCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5909,8 +5680,7 @@ func (s *Secrets) PkiReadCertDeltaCrl(ctx context.Context, pkiMountPath string, // PkiReadCertRawDer // serial: Certificate serial number, in colon- or hyphen-separated octal -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCertRawDer(ctx context.Context, serial string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertRawDerResponse], error) { +func (s *Secrets) PkiReadCertRawDer(ctx context.Context, serial string, options ...RequestOption) (*Response[schema.PkiReadCertRawDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5935,8 +5705,7 @@ func (s *Secrets) PkiReadCertRawDer(ctx context.Context, serial string, pkiMount // PkiReadCertRawPem // serial: Certificate serial number, in colon- or hyphen-separated octal -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCertRawPem(ctx context.Context, serial string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCertRawPemResponse], error) { +func (s *Secrets) PkiReadCertRawPem(ctx context.Context, serial string, options ...RequestOption) (*Response[schema.PkiReadCertRawPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5960,8 +5729,7 @@ func (s *Secrets) PkiReadCertRawPem(ctx context.Context, serial string, pkiMount } // PkiReadClusterConfiguration -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadClusterConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadClusterConfigurationResponse], error) { +func (s *Secrets) PkiReadClusterConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadClusterConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -5984,8 +5752,7 @@ func (s *Secrets) PkiReadClusterConfiguration(ctx context.Context, pkiMountPath } // PkiReadCrlConfiguration -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCrlConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlConfigurationResponse], error) { +func (s *Secrets) PkiReadCrlConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCrlConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6008,8 +5775,7 @@ func (s *Secrets) PkiReadCrlConfiguration(ctx context.Context, pkiMountPath stri } // PkiReadCrlDelta -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCrlDelta(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlDeltaResponse], error) { +func (s *Secrets) PkiReadCrlDelta(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCrlDeltaResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6032,8 +5798,7 @@ func (s *Secrets) PkiReadCrlDelta(ctx context.Context, pkiMountPath string, opti } // PkiReadCrlDeltaPem -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCrlDeltaPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlDeltaPemResponse], error) { +func (s *Secrets) PkiReadCrlDeltaPem(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCrlDeltaPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6056,8 +5821,7 @@ func (s *Secrets) PkiReadCrlDeltaPem(ctx context.Context, pkiMountPath string, o } // PkiReadCrlDer -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCrlDer(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlDerResponse], error) { +func (s *Secrets) PkiReadCrlDer(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCrlDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6080,8 +5844,7 @@ func (s *Secrets) PkiReadCrlDer(ctx context.Context, pkiMountPath string, option } // PkiReadCrlPem -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadCrlPem(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadCrlPemResponse], error) { +func (s *Secrets) PkiReadCrlPem(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadCrlPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6105,8 +5868,7 @@ func (s *Secrets) PkiReadCrlPem(ctx context.Context, pkiMountPath string, option // PkiReadIssuer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadIssuer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerResponse], error) { +func (s *Secrets) PkiReadIssuer(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiReadIssuerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6131,8 +5893,7 @@ func (s *Secrets) PkiReadIssuer(ctx context.Context, issuerRef string, pkiMountP // PkiReadIssuerDer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadIssuerDer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerDerResponse], error) { +func (s *Secrets) PkiReadIssuerDer(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiReadIssuerDerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6157,8 +5918,7 @@ func (s *Secrets) PkiReadIssuerDer(ctx context.Context, issuerRef string, pkiMou // PkiReadIssuerJson // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadIssuerJson(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerJsonResponse], error) { +func (s *Secrets) PkiReadIssuerJson(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiReadIssuerJsonResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6183,8 +5943,7 @@ func (s *Secrets) PkiReadIssuerJson(ctx context.Context, issuerRef string, pkiMo // PkiReadIssuerPem // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadIssuerPem(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuerPemResponse], error) { +func (s *Secrets) PkiReadIssuerPem(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiReadIssuerPemResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6208,8 +5967,7 @@ func (s *Secrets) PkiReadIssuerPem(ctx context.Context, issuerRef string, pkiMou } // PkiReadIssuersConfiguration -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadIssuersConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadIssuersConfigurationResponse], error) { +func (s *Secrets) PkiReadIssuersConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadIssuersConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6233,8 +5991,7 @@ func (s *Secrets) PkiReadIssuersConfiguration(ctx context.Context, pkiMountPath // PkiReadKey // keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadKey(ctx context.Context, keyRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadKeyResponse], error) { +func (s *Secrets) PkiReadKey(ctx context.Context, keyRef string, options ...RequestOption) (*Response[schema.PkiReadKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6258,8 +6015,7 @@ func (s *Secrets) PkiReadKey(ctx context.Context, keyRef string, pkiMountPath st } // PkiReadKeysConfiguration -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadKeysConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadKeysConfigurationResponse], error) { +func (s *Secrets) PkiReadKeysConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadKeysConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6283,8 +6039,7 @@ func (s *Secrets) PkiReadKeysConfiguration(ctx context.Context, pkiMountPath str // PkiReadRole // name: Name of the role -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadRole(ctx context.Context, name string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadRoleResponse], error) { +func (s *Secrets) PkiReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[schema.PkiReadRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6308,8 +6063,7 @@ func (s *Secrets) PkiReadRole(ctx context.Context, name string, pkiMountPath str } // PkiReadUrlsConfiguration -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReadUrlsConfiguration(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiReadUrlsConfigurationResponse], error) { +func (s *Secrets) PkiReadUrlsConfiguration(ctx context.Context, options ...RequestOption) (*Response[schema.PkiReadUrlsConfigurationResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6332,8 +6086,7 @@ func (s *Secrets) PkiReadUrlsConfiguration(ctx context.Context, pkiMountPath str } // PkiReplaceRoot -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiReplaceRoot(ctx context.Context, pkiMountPath string, request schema.PkiReplaceRootRequest, options ...RequestOption) (*Response[schema.PkiReplaceRootResponse], error) { +func (s *Secrets) PkiReplaceRoot(ctx context.Context, request schema.PkiReplaceRootRequest, options ...RequestOption) (*Response[schema.PkiReplaceRootResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6356,8 +6109,7 @@ func (s *Secrets) PkiReplaceRoot(ctx context.Context, pkiMountPath string, reque } // PkiRevoke -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiRevoke(ctx context.Context, pkiMountPath string, request schema.PkiRevokeRequest, options ...RequestOption) (*Response[schema.PkiRevokeResponse], error) { +func (s *Secrets) PkiRevoke(ctx context.Context, request schema.PkiRevokeRequest, options ...RequestOption) (*Response[schema.PkiRevokeResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6381,8 +6133,7 @@ func (s *Secrets) PkiRevoke(ctx context.Context, pkiMountPath string, request sc // PkiRevokeIssuer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiRevokeIssuer(ctx context.Context, issuerRef string, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiRevokeIssuerResponse], error) { +func (s *Secrets) PkiRevokeIssuer(ctx context.Context, issuerRef string, options ...RequestOption) (*Response[schema.PkiRevokeIssuerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6406,8 +6157,7 @@ func (s *Secrets) PkiRevokeIssuer(ctx context.Context, issuerRef string, pkiMoun } // PkiRevokeWithKey -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiRevokeWithKey(ctx context.Context, pkiMountPath string, request schema.PkiRevokeWithKeyRequest, options ...RequestOption) (*Response[schema.PkiRevokeWithKeyResponse], error) { +func (s *Secrets) PkiRevokeWithKey(ctx context.Context, request schema.PkiRevokeWithKeyRequest, options ...RequestOption) (*Response[schema.PkiRevokeWithKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6430,8 +6180,7 @@ func (s *Secrets) PkiRevokeWithKey(ctx context.Context, pkiMountPath string, req } // PkiRootSignIntermediate -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiRootSignIntermediate(ctx context.Context, pkiMountPath string, request schema.PkiRootSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiRootSignIntermediateResponse], error) { +func (s *Secrets) PkiRootSignIntermediate(ctx context.Context, request schema.PkiRootSignIntermediateRequest, options ...RequestOption) (*Response[schema.PkiRootSignIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6454,8 +6203,7 @@ func (s *Secrets) PkiRootSignIntermediate(ctx context.Context, pkiMountPath stri } // PkiRootSignSelfIssued -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiRootSignSelfIssued(ctx context.Context, pkiMountPath string, request schema.PkiRootSignSelfIssuedRequest, options ...RequestOption) (*Response[schema.PkiRootSignSelfIssuedResponse], error) { +func (s *Secrets) PkiRootSignSelfIssued(ctx context.Context, request schema.PkiRootSignSelfIssuedRequest, options ...RequestOption) (*Response[schema.PkiRootSignSelfIssuedResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6478,8 +6226,7 @@ func (s *Secrets) PkiRootSignSelfIssued(ctx context.Context, pkiMountPath string } // PkiRotateCrl -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiRotateCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiRotateCrlResponse], error) { +func (s *Secrets) PkiRotateCrl(ctx context.Context, options ...RequestOption) (*Response[schema.PkiRotateCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6502,8 +6249,7 @@ func (s *Secrets) PkiRotateCrl(ctx context.Context, pkiMountPath string, options } // PkiRotateDeltaCrl -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiRotateDeltaCrl(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiRotateDeltaCrlResponse], error) { +func (s *Secrets) PkiRotateDeltaCrl(ctx context.Context, options ...RequestOption) (*Response[schema.PkiRotateDeltaCrlResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6526,8 +6272,7 @@ func (s *Secrets) PkiRotateDeltaCrl(ctx context.Context, pkiMountPath string, op } // PkiSetSignedIntermediate -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiSetSignedIntermediate(ctx context.Context, pkiMountPath string, request schema.PkiSetSignedIntermediateRequest, options ...RequestOption) (*Response[schema.PkiSetSignedIntermediateResponse], error) { +func (s *Secrets) PkiSetSignedIntermediate(ctx context.Context, request schema.PkiSetSignedIntermediateRequest, options ...RequestOption) (*Response[schema.PkiSetSignedIntermediateResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6550,8 +6295,7 @@ func (s *Secrets) PkiSetSignedIntermediate(ctx context.Context, pkiMountPath str } // PkiSignVerbatim -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiSignVerbatim(ctx context.Context, pkiMountPath string, request schema.PkiSignVerbatimRequest, options ...RequestOption) (*Response[schema.PkiSignVerbatimResponse], error) { +func (s *Secrets) PkiSignVerbatim(ctx context.Context, request schema.PkiSignVerbatimRequest, options ...RequestOption) (*Response[schema.PkiSignVerbatimResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6575,8 +6319,7 @@ func (s *Secrets) PkiSignVerbatim(ctx context.Context, pkiMountPath string, requ // PkiSignVerbatimWithRole // role: The desired role with configuration for this request -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiSignVerbatimWithRole(ctx context.Context, role string, pkiMountPath string, request schema.PkiSignVerbatimWithRoleRequest, options ...RequestOption) (*Response[schema.PkiSignVerbatimWithRoleResponse], error) { +func (s *Secrets) PkiSignVerbatimWithRole(ctx context.Context, role string, request schema.PkiSignVerbatimWithRoleRequest, options ...RequestOption) (*Response[schema.PkiSignVerbatimWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6601,8 +6344,7 @@ func (s *Secrets) PkiSignVerbatimWithRole(ctx context.Context, role string, pkiM // PkiSignWithRole // role: The desired role with configuration for this request -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiSignWithRole(ctx context.Context, role string, pkiMountPath string, request schema.PkiSignWithRoleRequest, options ...RequestOption) (*Response[schema.PkiSignWithRoleResponse], error) { +func (s *Secrets) PkiSignWithRole(ctx context.Context, role string, request schema.PkiSignWithRoleRequest, options ...RequestOption) (*Response[schema.PkiSignWithRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6626,8 +6368,7 @@ func (s *Secrets) PkiSignWithRole(ctx context.Context, role string, pkiMountPath } // PkiTidy -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiTidy(ctx context.Context, pkiMountPath string, request schema.PkiTidyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) PkiTidy(ctx context.Context, request schema.PkiTidyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6650,8 +6391,7 @@ func (s *Secrets) PkiTidy(ctx context.Context, pkiMountPath string, request sche } // PkiTidyCancel -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiTidyCancel(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiTidyCancelResponse], error) { +func (s *Secrets) PkiTidyCancel(ctx context.Context, options ...RequestOption) (*Response[schema.PkiTidyCancelResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6674,8 +6414,7 @@ func (s *Secrets) PkiTidyCancel(ctx context.Context, pkiMountPath string, option } // PkiTidyStatus -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiTidyStatus(ctx context.Context, pkiMountPath string, options ...RequestOption) (*Response[schema.PkiTidyStatusResponse], error) { +func (s *Secrets) PkiTidyStatus(ctx context.Context, options ...RequestOption) (*Response[schema.PkiTidyStatusResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6699,8 +6438,7 @@ func (s *Secrets) PkiTidyStatus(ctx context.Context, pkiMountPath string, option // PkiWriteIssuer // issuerRef: Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiWriteIssuer(ctx context.Context, issuerRef string, pkiMountPath string, request schema.PkiWriteIssuerRequest, options ...RequestOption) (*Response[schema.PkiWriteIssuerResponse], error) { +func (s *Secrets) PkiWriteIssuer(ctx context.Context, issuerRef string, request schema.PkiWriteIssuerRequest, options ...RequestOption) (*Response[schema.PkiWriteIssuerResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6725,8 +6463,7 @@ func (s *Secrets) PkiWriteIssuer(ctx context.Context, issuerRef string, pkiMount // PkiWriteKey // keyRef: Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiWriteKey(ctx context.Context, keyRef string, pkiMountPath string, request schema.PkiWriteKeyRequest, options ...RequestOption) (*Response[schema.PkiWriteKeyResponse], error) { +func (s *Secrets) PkiWriteKey(ctx context.Context, keyRef string, request schema.PkiWriteKeyRequest, options ...RequestOption) (*Response[schema.PkiWriteKeyResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6751,8 +6488,7 @@ func (s *Secrets) PkiWriteKey(ctx context.Context, keyRef string, pkiMountPath s // PkiWriteRole // name: Name of the role -// pkiMountPath: Path that the backend was mounted at -func (s *Secrets) PkiWriteRole(ctx context.Context, name string, pkiMountPath string, request schema.PkiWriteRoleRequest, options ...RequestOption) (*Response[schema.PkiWriteRoleResponse], error) { +func (s *Secrets) PkiWriteRole(ctx context.Context, name string, request schema.PkiWriteRoleRequest, options ...RequestOption) (*Response[schema.PkiWriteRoleResponse], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6776,8 +6512,7 @@ func (s *Secrets) PkiWriteRole(ctx context.Context, name string, pkiMountPath st } // RabbitMqConfigureConnection Configure the connection URI, username, and password to talk to RabbitMQ management HTTP API. -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqConfigureConnection(ctx context.Context, rabbitmqMountPath string, request schema.RabbitMqConfigureConnectionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqConfigureConnection(ctx context.Context, request schema.RabbitMqConfigureConnectionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6800,8 +6535,7 @@ func (s *Secrets) RabbitMqConfigureConnection(ctx context.Context, rabbitmqMount } // RabbitMqConfigureLease -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqConfigureLease(ctx context.Context, rabbitmqMountPath string, request schema.RabbitMqConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqConfigureLease(ctx context.Context, request schema.RabbitMqConfigureLeaseRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6825,8 +6559,7 @@ func (s *Secrets) RabbitMqConfigureLease(ctx context.Context, rabbitmqMountPath // RabbitMqDeleteRole Manage the roles that can be created with this backend. // name: Name of the role. -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqDeleteRole(ctx context.Context, name string, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6850,8 +6583,7 @@ func (s *Secrets) RabbitMqDeleteRole(ctx context.Context, name string, rabbitmqM } // RabbitMqListRoles Manage the roles that can be created with this backend. -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqListRoles(ctx context.Context, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6875,8 +6607,7 @@ func (s *Secrets) RabbitMqListRoles(ctx context.Context, rabbitmqMountPath strin } // RabbitMqReadLeaseConfiguration -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqReadLeaseConfiguration(ctx context.Context, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqReadLeaseConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6900,8 +6631,7 @@ func (s *Secrets) RabbitMqReadLeaseConfiguration(ctx context.Context, rabbitmqMo // RabbitMqReadRole Manage the roles that can be created with this backend. // name: Name of the role. -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqReadRole(ctx context.Context, name string, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6926,8 +6656,7 @@ func (s *Secrets) RabbitMqReadRole(ctx context.Context, name string, rabbitmqMou // RabbitMqRequestCredentials Request RabbitMQ credentials for a certain role. // name: Name of the role. -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqRequestCredentials(ctx context.Context, name string, rabbitmqMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqRequestCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6952,8 +6681,7 @@ func (s *Secrets) RabbitMqRequestCredentials(ctx context.Context, name string, r // RabbitMqWriteRole Manage the roles that can be created with this backend. // name: Name of the role. -// rabbitmqMountPath: Path that the backend was mounted at -func (s *Secrets) RabbitMqWriteRole(ctx context.Context, name string, rabbitmqMountPath string, request schema.RabbitMqWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) RabbitMqWriteRole(ctx context.Context, name string, request schema.RabbitMqWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -6977,8 +6705,7 @@ func (s *Secrets) RabbitMqWriteRole(ctx context.Context, name string, rabbitmqMo } // SshConfigureCa -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshConfigureCa(ctx context.Context, sshMountPath string, request schema.SshConfigureCaRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshConfigureCa(ctx context.Context, request schema.SshConfigureCaRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7001,8 +6728,7 @@ func (s *Secrets) SshConfigureCa(ctx context.Context, sshMountPath string, reque } // SshConfigureZeroAddress -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshConfigureZeroAddress(ctx context.Context, sshMountPath string, request schema.SshConfigureZeroAddressRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshConfigureZeroAddress(ctx context.Context, request schema.SshConfigureZeroAddressRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7025,8 +6751,7 @@ func (s *Secrets) SshConfigureZeroAddress(ctx context.Context, sshMountPath stri } // SshDeleteCaConfiguration -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshDeleteCaConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshDeleteCaConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7050,8 +6775,7 @@ func (s *Secrets) SshDeleteCaConfiguration(ctx context.Context, sshMountPath str // SshDeleteRole Manage the 'roles' that can be created with this backend. // role: [Required for all types] Name of the role being created. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshDeleteRole(ctx context.Context, role string, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshDeleteRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7075,8 +6799,7 @@ func (s *Secrets) SshDeleteRole(ctx context.Context, role string, sshMountPath s } // SshDeleteZeroAddressConfiguration -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshDeleteZeroAddressConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshDeleteZeroAddressConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7100,8 +6823,7 @@ func (s *Secrets) SshDeleteZeroAddressConfiguration(ctx context.Context, sshMoun // SshGenerateCredentials Creates a credential for establishing SSH connection with the remote host. // role: [Required] Name of the role -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshGenerateCredentials(ctx context.Context, role string, sshMountPath string, request schema.SshGenerateCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshGenerateCredentials(ctx context.Context, role string, request schema.SshGenerateCredentialsRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7126,8 +6848,7 @@ func (s *Secrets) SshGenerateCredentials(ctx context.Context, role string, sshMo // SshIssueCertificate // role: The desired role with configuration for this request. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshIssueCertificate(ctx context.Context, role string, sshMountPath string, request schema.SshIssueCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshIssueCertificate(ctx context.Context, role string, request schema.SshIssueCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7151,8 +6872,7 @@ func (s *Secrets) SshIssueCertificate(ctx context.Context, role string, sshMount } // SshListRoles Manage the 'roles' that can be created with this backend. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshListRoles(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7176,8 +6896,7 @@ func (s *Secrets) SshListRoles(ctx context.Context, sshMountPath string, options } // SshListRolesByIp List all the roles associated with the given IP address. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshListRolesByIp(ctx context.Context, sshMountPath string, request schema.SshListRolesByIpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshListRolesByIp(ctx context.Context, request schema.SshListRolesByIpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7200,8 +6919,7 @@ func (s *Secrets) SshListRolesByIp(ctx context.Context, sshMountPath string, req } // SshReadCaConfiguration -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshReadCaConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshReadCaConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7224,8 +6942,7 @@ func (s *Secrets) SshReadCaConfiguration(ctx context.Context, sshMountPath strin } // SshReadPublicKey Retrieve the public key. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshReadPublicKey(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshReadPublicKey(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7249,8 +6966,7 @@ func (s *Secrets) SshReadPublicKey(ctx context.Context, sshMountPath string, opt // SshReadRole Manage the 'roles' that can be created with this backend. // role: [Required for all types] Name of the role being created. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshReadRole(ctx context.Context, role string, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshReadRole(ctx context.Context, role string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7274,8 +6990,7 @@ func (s *Secrets) SshReadRole(ctx context.Context, role string, sshMountPath str } // SshReadZeroAddressConfiguration -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshReadZeroAddressConfiguration(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshReadZeroAddressConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7299,8 +7014,7 @@ func (s *Secrets) SshReadZeroAddressConfiguration(ctx context.Context, sshMountP // SshSignCertificate Request signing an SSH key using a certain role with the provided details. // role: The desired role with configuration for this request. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshSignCertificate(ctx context.Context, role string, sshMountPath string, request schema.SshSignCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshSignCertificate(ctx context.Context, role string, request schema.SshSignCertificateRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7324,8 +7038,7 @@ func (s *Secrets) SshSignCertificate(ctx context.Context, role string, sshMountP } // SshTidyDynamicHostKeys This endpoint removes the stored host keys used for the removed Dynamic Key feature, if present. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshTidyDynamicHostKeys(ctx context.Context, sshMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshTidyDynamicHostKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7348,8 +7061,7 @@ func (s *Secrets) SshTidyDynamicHostKeys(ctx context.Context, sshMountPath strin } // SshVerifyOtp Validate the OTP provided by Vault SSH Agent. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshVerifyOtp(ctx context.Context, sshMountPath string, request schema.SshVerifyOtpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshVerifyOtp(ctx context.Context, request schema.SshVerifyOtpRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7373,8 +7085,7 @@ func (s *Secrets) SshVerifyOtp(ctx context.Context, sshMountPath string, request // SshWriteRole Manage the 'roles' that can be created with this backend. // role: [Required for all types] Name of the role being created. -// sshMountPath: Path that the backend was mounted at -func (s *Secrets) SshWriteRole(ctx context.Context, role string, sshMountPath string, request schema.SshWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) SshWriteRole(ctx context.Context, role string, request schema.SshWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7398,8 +7109,7 @@ func (s *Secrets) SshWriteRole(ctx context.Context, role string, sshMountPath st } // TerraformCloudConfigure -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudConfigure(ctx context.Context, terraformMountPath string, request schema.TerraformCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudConfigure(ctx context.Context, request schema.TerraformCloudConfigureRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7422,8 +7132,7 @@ func (s *Secrets) TerraformCloudConfigure(ctx context.Context, terraformMountPat } // TerraformCloudDeleteConfiguration -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudDeleteConfiguration(ctx context.Context, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudDeleteConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7447,8 +7156,7 @@ func (s *Secrets) TerraformCloudDeleteConfiguration(ctx context.Context, terrafo // TerraformCloudDeleteRole // name: Name of the role -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudDeleteRole(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudDeleteRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7473,8 +7181,7 @@ func (s *Secrets) TerraformCloudDeleteRole(ctx context.Context, name string, ter // TerraformCloudGenerateCredentials // name: Name of the role -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudGenerateCredentials(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudGenerateCredentials(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7499,8 +7206,7 @@ func (s *Secrets) TerraformCloudGenerateCredentials(ctx context.Context, name st // TerraformCloudGenerateCredentials2 // name: Name of the role -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudGenerateCredentials2(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudGenerateCredentials2(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7524,8 +7230,7 @@ func (s *Secrets) TerraformCloudGenerateCredentials2(ctx context.Context, name s } // TerraformCloudListRoles -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudListRoles(ctx context.Context, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudListRoles(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7549,8 +7254,7 @@ func (s *Secrets) TerraformCloudListRoles(ctx context.Context, terraformMountPat } // TerraformCloudReadConfiguration -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudReadConfiguration(ctx context.Context, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudReadConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7574,8 +7278,7 @@ func (s *Secrets) TerraformCloudReadConfiguration(ctx context.Context, terraform // TerraformCloudReadRole // name: Name of the role -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudReadRole(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudReadRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7600,8 +7303,7 @@ func (s *Secrets) TerraformCloudReadRole(ctx context.Context, name string, terra // TerraformCloudRotateRole // name: Name of the team or organization role -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudRotateRole(ctx context.Context, name string, terraformMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudRotateRole(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7626,8 +7328,7 @@ func (s *Secrets) TerraformCloudRotateRole(ctx context.Context, name string, ter // TerraformCloudWriteRole // name: Name of the role -// terraformMountPath: Path that the backend was mounted at -func (s *Secrets) TerraformCloudWriteRole(ctx context.Context, name string, terraformMountPath string, request schema.TerraformCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TerraformCloudWriteRole(ctx context.Context, name string, request schema.TerraformCloudWriteRoleRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7652,8 +7353,7 @@ func (s *Secrets) TerraformCloudWriteRole(ctx context.Context, name string, terr // TotpCreateKey // name: Name of the key. -// totpMountPath: Path that the backend was mounted at -func (s *Secrets) TotpCreateKey(ctx context.Context, name string, totpMountPath string, request schema.TotpCreateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TotpCreateKey(ctx context.Context, name string, request schema.TotpCreateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7678,8 +7378,7 @@ func (s *Secrets) TotpCreateKey(ctx context.Context, name string, totpMountPath // TotpDeleteKey // name: Name of the key. -// totpMountPath: Path that the backend was mounted at -func (s *Secrets) TotpDeleteKey(ctx context.Context, name string, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TotpDeleteKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7704,8 +7403,7 @@ func (s *Secrets) TotpDeleteKey(ctx context.Context, name string, totpMountPath // TotpGenerateCode // name: Name of the key. -// totpMountPath: Path that the backend was mounted at -func (s *Secrets) TotpGenerateCode(ctx context.Context, name string, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TotpGenerateCode(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7729,8 +7427,7 @@ func (s *Secrets) TotpGenerateCode(ctx context.Context, name string, totpMountPa } // TotpListKeys Manage the keys that can be created with this backend. -// totpMountPath: Path that the backend was mounted at -func (s *Secrets) TotpListKeys(ctx context.Context, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TotpListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7755,8 +7452,7 @@ func (s *Secrets) TotpListKeys(ctx context.Context, totpMountPath string, option // TotpReadKey // name: Name of the key. -// totpMountPath: Path that the backend was mounted at -func (s *Secrets) TotpReadKey(ctx context.Context, name string, totpMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TotpReadKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7781,8 +7477,7 @@ func (s *Secrets) TotpReadKey(ctx context.Context, name string, totpMountPath st // TotpValidateCode // name: Name of the key. -// totpMountPath: Path that the backend was mounted at -func (s *Secrets) TotpValidateCode(ctx context.Context, name string, totpMountPath string, request schema.TotpValidateCodeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TotpValidateCode(ctx context.Context, name string, request schema.TotpValidateCodeRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7807,8 +7502,7 @@ func (s *Secrets) TotpValidateCode(ctx context.Context, name string, totpMountPa // TransitBackUpKey Backup the named key // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitBackUpKey(ctx context.Context, name string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitBackUpKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7832,8 +7526,7 @@ func (s *Secrets) TransitBackUpKey(ctx context.Context, name string, transitMoun } // TransitConfigureCache Configures a new cache of the specified size -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitConfigureCache(ctx context.Context, transitMountPath string, request schema.TransitConfigureCacheRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitConfigureCache(ctx context.Context, request schema.TransitConfigureCacheRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7857,8 +7550,7 @@ func (s *Secrets) TransitConfigureCache(ctx context.Context, transitMountPath st // TransitConfigureKey Configure a named encryption key // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitConfigureKey(ctx context.Context, name string, transitMountPath string, request schema.TransitConfigureKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitConfigureKey(ctx context.Context, name string, request schema.TransitConfigureKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7882,8 +7574,7 @@ func (s *Secrets) TransitConfigureKey(ctx context.Context, name string, transitM } // TransitConfigureKeys -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitConfigureKeys(ctx context.Context, transitMountPath string, request schema.TransitConfigureKeysRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitConfigureKeys(ctx context.Context, request schema.TransitConfigureKeysRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7907,8 +7598,7 @@ func (s *Secrets) TransitConfigureKeys(ctx context.Context, transitMountPath str // TransitCreateKey // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitCreateKey(ctx context.Context, name string, transitMountPath string, request schema.TransitCreateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitCreateKey(ctx context.Context, name string, request schema.TransitCreateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7933,8 +7623,7 @@ func (s *Secrets) TransitCreateKey(ctx context.Context, name string, transitMoun // TransitDecrypt Decrypt a ciphertext value using a named key // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitDecrypt(ctx context.Context, name string, transitMountPath string, request schema.TransitDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitDecrypt(ctx context.Context, name string, request schema.TransitDecryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7959,8 +7648,7 @@ func (s *Secrets) TransitDecrypt(ctx context.Context, name string, transitMountP // TransitDeleteKey // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitDeleteKey(ctx context.Context, name string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitDeleteKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -7985,8 +7673,7 @@ func (s *Secrets) TransitDeleteKey(ctx context.Context, name string, transitMoun // TransitEncrypt Encrypt a plaintext value or a batch of plaintext blocks using a named key // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitEncrypt(ctx context.Context, name string, transitMountPath string, request schema.TransitEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitEncrypt(ctx context.Context, name string, request schema.TransitEncryptRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8012,8 +7699,7 @@ func (s *Secrets) TransitEncrypt(ctx context.Context, name string, transitMountP // TransitExportKey Export named encryption or signing key // name: Name of the key // type_: Type of key to export (encryption-key, signing-key, hmac-key) -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitExportKey(ctx context.Context, name string, type_ string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitExportKey(ctx context.Context, name string, type_ string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8041,8 +7727,7 @@ func (s *Secrets) TransitExportKey(ctx context.Context, name string, type_ strin // name: Name of the key // type_: Type of key to export (encryption-key, signing-key, hmac-key) // version: Version of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitExportKeyVersion(ctx context.Context, name string, type_ string, version string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitExportKeyVersion(ctx context.Context, name string, type_ string, version string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8070,8 +7755,7 @@ func (s *Secrets) TransitExportKeyVersion(ctx context.Context, name string, type // TransitGenerateDataKey Generate a data key // name: The backend key used for encrypting the data key // plaintext: \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitGenerateDataKey(ctx context.Context, name string, plaintext string, transitMountPath string, request schema.TransitGenerateDataKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitGenerateDataKey(ctx context.Context, name string, plaintext string, request schema.TransitGenerateDataKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8097,8 +7781,7 @@ func (s *Secrets) TransitGenerateDataKey(ctx context.Context, name string, plain // TransitGenerateHmac Generate an HMAC for input data using the named key // name: The key to use for the HMAC function -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitGenerateHmac(ctx context.Context, name string, transitMountPath string, request schema.TransitGenerateHmacRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitGenerateHmac(ctx context.Context, name string, request schema.TransitGenerateHmacRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8124,8 +7807,7 @@ func (s *Secrets) TransitGenerateHmac(ctx context.Context, name string, transitM // TransitGenerateHmacWithAlgorithm Generate an HMAC for input data using the named key // name: The key to use for the HMAC function // urlalgorithm: Algorithm to use (POST URL parameter) -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitGenerateHmacWithAlgorithm(ctx context.Context, name string, urlalgorithm string, transitMountPath string, request schema.TransitGenerateHmacWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitGenerateHmacWithAlgorithm(ctx context.Context, name string, urlalgorithm string, request schema.TransitGenerateHmacWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8150,8 +7832,7 @@ func (s *Secrets) TransitGenerateHmacWithAlgorithm(ctx context.Context, name str } // TransitGenerateRandom Generate random bytes -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitGenerateRandom(ctx context.Context, transitMountPath string, request schema.TransitGenerateRandomRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitGenerateRandom(ctx context.Context, request schema.TransitGenerateRandomRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8175,8 +7856,7 @@ func (s *Secrets) TransitGenerateRandom(ctx context.Context, transitMountPath st // TransitGenerateRandomWithBytes Generate random bytes // urlbytes: The number of bytes to generate (POST URL parameter) -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitGenerateRandomWithBytes(ctx context.Context, urlbytes string, transitMountPath string, request schema.TransitGenerateRandomWithBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitGenerateRandomWithBytes(ctx context.Context, urlbytes string, request schema.TransitGenerateRandomWithBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8201,8 +7881,7 @@ func (s *Secrets) TransitGenerateRandomWithBytes(ctx context.Context, urlbytes s // TransitGenerateRandomWithSource Generate random bytes // source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitGenerateRandomWithSource(ctx context.Context, source string, transitMountPath string, request schema.TransitGenerateRandomWithSourceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitGenerateRandomWithSource(ctx context.Context, source string, request schema.TransitGenerateRandomWithSourceRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8228,8 +7907,7 @@ func (s *Secrets) TransitGenerateRandomWithSource(ctx context.Context, source st // TransitGenerateRandomWithSourceAndBytes Generate random bytes // source: Which system to source random data from, ether \"platform\", \"seal\", or \"all\". // urlbytes: The number of bytes to generate (POST URL parameter) -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitGenerateRandomWithSourceAndBytes(ctx context.Context, source string, urlbytes string, transitMountPath string, request schema.TransitGenerateRandomWithSourceAndBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitGenerateRandomWithSourceAndBytes(ctx context.Context, source string, urlbytes string, request schema.TransitGenerateRandomWithSourceAndBytesRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8254,8 +7932,7 @@ func (s *Secrets) TransitGenerateRandomWithSourceAndBytes(ctx context.Context, s } // TransitHash Generate a hash sum for input data -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitHash(ctx context.Context, transitMountPath string, request schema.TransitHashRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitHash(ctx context.Context, request schema.TransitHashRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8279,8 +7956,7 @@ func (s *Secrets) TransitHash(ctx context.Context, transitMountPath string, requ // TransitHashWithAlgorithm Generate a hash sum for input data // urlalgorithm: Algorithm to use (POST URL parameter) -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitHashWithAlgorithm(ctx context.Context, urlalgorithm string, transitMountPath string, request schema.TransitHashWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitHashWithAlgorithm(ctx context.Context, urlalgorithm string, request schema.TransitHashWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8305,8 +7981,7 @@ func (s *Secrets) TransitHashWithAlgorithm(ctx context.Context, urlalgorithm str // TransitImportKey Imports an externally-generated key into a new transit key // name: The name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitImportKey(ctx context.Context, name string, transitMountPath string, request schema.TransitImportKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitImportKey(ctx context.Context, name string, request schema.TransitImportKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8331,8 +8006,7 @@ func (s *Secrets) TransitImportKey(ctx context.Context, name string, transitMoun // TransitImportKeyVersion Imports an externally-generated key into an existing imported key // name: The name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitImportKeyVersion(ctx context.Context, name string, transitMountPath string, request schema.TransitImportKeyVersionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitImportKeyVersion(ctx context.Context, name string, request schema.TransitImportKeyVersionRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8356,8 +8030,7 @@ func (s *Secrets) TransitImportKeyVersion(ctx context.Context, name string, tran } // TransitListKeys Managed named encryption keys -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitListKeys(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitListKeys(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8381,8 +8054,7 @@ func (s *Secrets) TransitListKeys(ctx context.Context, transitMountPath string, } // TransitReadCacheConfiguration Returns the size of the active cache -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitReadCacheConfiguration(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitReadCacheConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8406,8 +8078,7 @@ func (s *Secrets) TransitReadCacheConfiguration(ctx context.Context, transitMoun // TransitReadKey // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitReadKey(ctx context.Context, name string, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitReadKey(ctx context.Context, name string, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8431,8 +8102,7 @@ func (s *Secrets) TransitReadKey(ctx context.Context, name string, transitMountP } // TransitReadKeysConfiguration -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitReadKeysConfiguration(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitReadKeysConfiguration(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8455,8 +8125,7 @@ func (s *Secrets) TransitReadKeysConfiguration(ctx context.Context, transitMount } // TransitReadWrappingKey Returns the public key to use for wrapping imported keys -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitReadWrappingKey(ctx context.Context, transitMountPath string, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitReadWrappingKey(ctx context.Context, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8480,8 +8149,7 @@ func (s *Secrets) TransitReadWrappingKey(ctx context.Context, transitMountPath s // TransitRestoreAndRenameKey Restore the named key // name: If set, this will be the name of the restored key. -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitRestoreAndRenameKey(ctx context.Context, name string, transitMountPath string, request schema.TransitRestoreAndRenameKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitRestoreAndRenameKey(ctx context.Context, name string, request schema.TransitRestoreAndRenameKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8505,8 +8173,7 @@ func (s *Secrets) TransitRestoreAndRenameKey(ctx context.Context, name string, t } // TransitRestoreKey Restore the named key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitRestoreKey(ctx context.Context, transitMountPath string, request schema.TransitRestoreKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitRestoreKey(ctx context.Context, request schema.TransitRestoreKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8530,8 +8197,7 @@ func (s *Secrets) TransitRestoreKey(ctx context.Context, transitMountPath string // TransitRewrap Rewrap ciphertext // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitRewrap(ctx context.Context, name string, transitMountPath string, request schema.TransitRewrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitRewrap(ctx context.Context, name string, request schema.TransitRewrapRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8556,8 +8222,7 @@ func (s *Secrets) TransitRewrap(ctx context.Context, name string, transitMountPa // TransitRotateKey Rotate named encryption key // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitRotateKey(ctx context.Context, name string, transitMountPath string, request schema.TransitRotateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitRotateKey(ctx context.Context, name string, request schema.TransitRotateKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8582,8 +8247,7 @@ func (s *Secrets) TransitRotateKey(ctx context.Context, name string, transitMoun // TransitSign Generate a signature for input data using the named key // name: The key to use -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitSign(ctx context.Context, name string, transitMountPath string, request schema.TransitSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitSign(ctx context.Context, name string, request schema.TransitSignRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8609,8 +8273,7 @@ func (s *Secrets) TransitSign(ctx context.Context, name string, transitMountPath // TransitSignWithAlgorithm Generate a signature for input data using the named key // name: The key to use // urlalgorithm: Hash algorithm to use (POST URL parameter) -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitSignWithAlgorithm(ctx context.Context, name string, urlalgorithm string, transitMountPath string, request schema.TransitSignWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitSignWithAlgorithm(ctx context.Context, name string, urlalgorithm string, request schema.TransitSignWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8636,8 +8299,7 @@ func (s *Secrets) TransitSignWithAlgorithm(ctx context.Context, name string, url // TransitTrimKey Trim key versions of a named key // name: Name of the key -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitTrimKey(ctx context.Context, name string, transitMountPath string, request schema.TransitTrimKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitTrimKey(ctx context.Context, name string, request schema.TransitTrimKeyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8662,8 +8324,7 @@ func (s *Secrets) TransitTrimKey(ctx context.Context, name string, transitMountP // TransitVerify Verify a signature or HMAC for input data created using the named key // name: The key to use -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitVerify(ctx context.Context, name string, transitMountPath string, request schema.TransitVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitVerify(ctx context.Context, name string, request schema.TransitVerifyRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err @@ -8689,8 +8350,7 @@ func (s *Secrets) TransitVerify(ctx context.Context, name string, transitMountPa // TransitVerifyWithAlgorithm Verify a signature or HMAC for input data created using the named key // name: The key to use // urlalgorithm: Hash algorithm to use (POST URL parameter) -// transitMountPath: Path that the backend was mounted at -func (s *Secrets) TransitVerifyWithAlgorithm(ctx context.Context, name string, urlalgorithm string, transitMountPath string, request schema.TransitVerifyWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { +func (s *Secrets) TransitVerifyWithAlgorithm(ctx context.Context, name string, urlalgorithm string, request schema.TransitVerifyWithAlgorithmRequest, options ...RequestOption) (*Response[map[string]interface{}], error) { requestModifiers, err := requestOptionsToRequestModifiers(options) if err != nil { return nil, err